CN116975829A - Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication - Google Patents

Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication Download PDF

Info

Publication number
CN116975829A
CN116975829A CN202311225769.9A CN202311225769A CN116975829A CN 116975829 A CN116975829 A CN 116975829A CN 202311225769 A CN202311225769 A CN 202311225769A CN 116975829 A CN116975829 A CN 116975829A
Authority
CN
China
Prior art keywords
client
information
login user
login
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311225769.9A
Other languages
Chinese (zh)
Inventor
成才义
杨文山
杨厂普
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Geer Guoxin Technology Co ltd
Original Assignee
Beijing Geer Guoxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Geer Guoxin Technology Co ltd filed Critical Beijing Geer Guoxin Technology Co ltd
Priority to CN202311225769.9A priority Critical patent/CN116975829A/en
Publication of CN116975829A publication Critical patent/CN116975829A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to an asset confidentiality method, system, terminal and storage medium based on fingerprint authentication, which comprises the following steps: acquiring fingerprint characteristic data encrypted by a login user; matching the identity information and the authority information of the login user according to the encrypted fingerprint characteristic data; according to the authority information, invoking display content which is matched with the authority of the login user on the corresponding client, and sending authorization information containing the display content to the client; the display content comprises a file name which can be referred and a file name to be authorized; acquiring an access application of a login person to a file to be authorized; the access application is allocated to the client side of any online manager, so that the client side of the manager can return authorization passing information; and according to the authorization passing information, issuing temporary permission to the client. The application has the effect of improving the confidentiality of the electronic asset.

Description

Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication
Technical Field
The present application relates to the field of identity authentication technologies, and in particular, to an asset security method, system, terminal and storage medium based on fingerprint authentication.
Background
In many enterprises and public institutions, a large number of intelligent storage devices such as computers are used, and the loss caused by terminal security accidents is often expensive due to the fact that data assets such as business secrets and internal sensitive information exist in the devices. Therefore, the desktop security is guaranteed firstly, namely the identity of the user of the equipment is legal, and the equipment asset security and the data asset security of the organization are guaranteed by carrying out security authentication on the identity of the user using the desktop terminal.
Disclosure of Invention
The application provides an asset confidentiality method, an asset confidentiality system, an asset confidentiality terminal and a storage medium based on fingerprint authentication, which have the effect of improving the confidentiality of electronic assets.
In a first aspect, the present application provides an asset security method based on fingerprint authentication, which adopts the following technical scheme:
an asset privacy method based on fingerprint authentication, comprising:
acquiring fingerprint characteristic data encrypted by a login user;
matching the identity information and the authority information of the login user according to the encrypted fingerprint characteristic data;
according to the authority information, invoking display content which is matched with the authority of the login user on the corresponding client, and sending authorization information containing the display content to the client; the display content comprises a file name which can be referred and a file name to be authorized;
acquiring an access application of a login person to a file to be authorized;
the access application is allocated to the client side of any online manager, so that the client side of the manager can return authorization passing information;
and according to the authorization passing information, issuing temporary permission to the client.
By adopting the technical scheme, the condition that passwords are leaked possibly caused by the traditional modes such as passwords are reduced by adopting the mode of carrying out fingerprint identification on a login user of a login client, and access of the login user to the file is limited according to the login user permission, so that confidentiality of electronic assets in internal equipment is improved.
Optionally, according to the permission information, invoking the display content matching the permission of the login user on the corresponding client, including:
obtaining authority levels of files of a client;
determining the authority level of the login user according to the authority information;
and determining the display content matching the login user permission according to the permission information and the permission grade of the file.
Optionally, the method further comprises performing spot check authentication according to the operation behavior of the login user:
acquiring the operation behavior of a login person;
and after judging that the logger is in a temporary-off state according to the operation behaviors, locking the screen of the corresponding client.
Optionally, determining that the logger is in a temporary-away state according to the operation behavior, and locking the screen of the corresponding client includes:
when the login user does not operate within the first preset time, a prompt message is sent to the client; and when the login user does not operate within the second preset time, locking a screen of the client logged in by the login user, and sending re-verification information to the client.
Optionally, the method further comprises the step of preventing repeated login behavior according to log information of the login user:
inquiring the online state of the login user according to the log information of the login user;
when the online state of the login user is that other clients are online, the connection of the other clients is disconnected while the login is verified for the current client.
Optionally, obtaining the encrypted fingerprint feature data of the login user includes:
acquiring fingerprint characteristic information input by a logger;
and encrypting the fingerprint characteristic information and sending the encrypted fingerprint characteristic information to a user.
Optionally, matching the identity information and the authority information of the login user according to the encrypted fingerprint feature data, including:
decoding the encrypted fingerprint feature data, and performing feature matching in a fingerprint database;
and after the verification is successful, the identity information and the authority information of the login user are called according to the decoded fingerprint characteristic data.
In a second aspect, the present application provides an electronic asset security system based on fingerprint authentication, which adopts the following technical scheme:
an electronic asset privacy system based on fingerprint authentication, comprising:
the acquisition module is used for acquiring the fingerprint characteristic data encrypted by the login user and the access application of the login user to the file to be authorized;
the matching module is used for matching the identity information and the authority information of the login user according to the encrypted fingerprint characteristic data; according to the authority information, invoking display content matched with the login user authority on the corresponding client; the display content comprises a file name which can be referred and a file name to be authorized;
the scheduling module is used for scheduling the access application to the client of any online manager so that the client of the manager can return the authorized passing information;
the issuing module is used for sending authorization information containing the display content to the client; and according to the authorization passing information, issuing temporary permission to the client.
In a third aspect, the present application provides a terminal, which has the characteristic of stably transmitting encrypted data.
The third object of the present application is achieved by the following technical solutions:
a terminal comprising a memory and a processor, said memory having stored thereon a computer program capable of being loaded by the processor and executing the above described data encryption transmission method.
In a fourth aspect, the present application provides a computer storage medium capable of storing a corresponding program, which has the feature of facilitating stable transmission of encrypted data.
The fourth object of the present application is achieved by the following technical solutions:
a computer readable storage medium storing a computer program capable of being loaded by a processor and executing any one of the above data encryption transmission methods.
In summary, the present application includes at least one of the following beneficial technical effects: the method reduces the occurrence of the condition that the password is leaked possibly caused by the traditional modes such as password use and the like by carrying out fingerprint identification on the login user of the login client, and then limits the access of the login user to the file according to the authority of the login user, thereby improving the confidentiality of the electronic asset in the internal equipment.
Drawings
FIG. 1 is a flow chart of an asset privacy method based on fingerprint authentication according to one embodiment of the present application.
FIG. 2 is a schematic diagram of an electronic asset privacy system based on fingerprint authentication according to one embodiment of the present application.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Reference numerals illustrate: 201. an acquisition module; 202. a matching module; 203. a scheduling module; 204. a issuing module; 301. a CPU; 302. a ROM; 303. a RAM; 304. a bus; 305. an I/O interface; 306. an input section; 307. an output section; 308. a storage section; 309. a communication section; 310. a driver; 311. removable media.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
The application is described in further detail below with reference to fig. 1 to 3.
In order to authenticate the identity of the login user through fingerprint identification, the implementation scene further comprises: the fingerprint instrument is connected with the client, the client is communicated with the management server, and a plurality of manager clients are connected under the management server.
In a first aspect, the present application provides an asset security method based on fingerprint authentication in order to improve security of an internal file.
Referring to fig. 1, an asset confidentiality method based on fingerprint authentication, applied to a management server, comprises the following steps:
before use, a fingerprint library and an authorization information repository need to be built.
Specifically, the fingerprint feature information of the user is input into the management server to generate an identity feature template, a unique identity identification code is given, and the identity feature template and the unique identity identification code are stored in the fingerprint database. Binding the user's ID code with the client address which the user is authorized to use, one user can bind a plurality of client addresses, and one client address can bind the ID codes of a plurality of users.
Further, after binding the user with the client, the browsing authority of the user needs to be limited, and the identification code of the user is associated with each client. Wherein, browse right includes: the document can be consulted, the document to be authorized, and the document not displayed. The confidentiality level of the authority is gradually improved, the lowest confidentiality level of the file can be referred, and the file which can be referred after a user finishes logging in is referred, and the name and the content of the file are not confidential to the user. The security level of the file to be authorized is medium, which means that the user can see the file name but can not directly look up, and the manager is required to authorize to obtain the reference authority, which is equivalent to that the name of the file is not secure but the content is secure. The confidentiality level of the file is highest without showing, the user is not authorized to review, and the name and the content of the file are confidential to the user.
S101: and acquiring fingerprint characteristic data after login encryption.
Specifically, when a user logs in the client, the user needs to verify the personal fingerprint to log in the client, the user logs in the fingerprint through a fingerprint instrument, and the fingerprint instrument collects the fingerprint characteristics of the user and sends the fingerprint characteristics to the client. After receiving the fingerprint feature information, the client encrypts the fingerprint feature information and then sends the encrypted fingerprint feature information to the management server. In order to ensure the safety of the fingerprint feature information, the encryption of the fingerprint feature information is completed by adopting a national encryption algorithm.
S102: and matching the identity information and the authority information of the login user according to the encrypted fingerprint characteristic data.
Specifically, the encrypted fingerprint feature data is decoded, and feature matching is performed in a fingerprint database. And if the fingerprint characteristic template which is the same as the fingerprint characteristic data of the login user is matched through a fingerprint identification algorithm, the identity identification code of the login user is further obtained according to the fingerprint characteristic template. And then the identity code further inquires the address of the client bound with the identity code and the authority information of the corresponding client. If the address of the client bound by the identity code of the login user is different from the address of the client for login verification, the representative user does not have the right to login the client, a prompt message of 'you do not have the right to use the device' is sent to the client, and the log information is stored in a log library. If the ID of the login user has binding relation with the client, the authority information of the login user on the client is called. If the fingerprint feature template which is the same as the fingerprint feature of the login user is not matched, the login user is not authorized to access all the clients, warning information of' no person is sent to the clients, and the warning information is stored in a log library.
S103: and according to the authority information, invoking the display content matching the authority of the login user, and sending the authorization information containing the display content to the client.
After the identity information of the login user is successfully matched with the authority information, determining the content to be displayed to the login user from the client according to the authority information. The display content comprises a consultable file name and a file name to be authorized. The obtaining of the consultable file name and the file name to be authorized further comprises: the authority level of each file of the client is obtained, when one file is created or downloaded to the client, the file has one authority level, when a login user has a binding relation with the client, according to the authority level of the login user and the authority level of the client file, the file names which can be referred and the file names to be authorized can be obtained, then the file names are sent to the client, and the client displays the corresponding file to the login user according to the file names which can be referred and the file names to be authorized.
S104: the method comprises the steps of obtaining an access application of a login person to an authorized file, and allocating the access application to a client of any administrator, so that the client of the administrator can return authorization passing information.
Specifically, when the login user needs to access the file to be authorized, an access application can be sent to the management server through the client, and in order to prevent the condition that the administrator is not online, the access application is randomly distributed to the client of any online administrator when the application authorization is carried out. The administrator authorizes the access of the login user through the administrator client, and returns authorization passing information after the authorization is successful.
S105: and issuing temporary permission to the client according to the authorization passing information.
Specifically, after receiving the authorization transmission information, the management server sends temporary rights to a client used by the login user, so that the login user can check a file to be authorized for access. After logging out, the temporary permission is recovered. Thereby achieving confidentiality of the electronic asset during login.
In another implementation scenario, there is also a need to monitor login behavior of a login user, including: the login log of the login user is obtained, after the fingerprint characteristics are successfully matched, the login state of the login user is verified at the same time, and if the login state of the login user is that other equipment is online, the connection of other clients is disconnected while the login is verified on the current client.
In another implementation scenario, after the login, the login user may have a temporary-away station, in this case, a situation that another person browses the content on the client while he/she is on the machine may occur, so that the disclosure of the electronic asset is caused, therefore, the use state of the login user needs to be judged, when the temporary-away condition of the login user occurs, the screen of the client is locked, and after the login user is authenticated again, the screen is unlocked again. The specific implementation mode is as follows: and acquiring an operation log of the login user on the file on the client, and prompting the login user when the login user does not operate within a first preset time. And when the login user does not operate within the second preset time, locking the screen of the client, and unlocking the screen again after the login user is authenticated again. During this time, temporary rights to the document to be authorized are preserved for the login user.
In a second aspect, the present application provides an electronic asset security system based on fingerprint authentication, which adopts the following technical scheme:
referring to fig. 2, an electronic asset privacy system based on fingerprint authentication, comprising:
the obtaining module 201 is configured to obtain the encrypted fingerprint feature data of the login user and an access application of the login user to the file to be authorized.
And the matching module 202 is used for matching the identity information and the authority information of the login user according to the encrypted fingerprint characteristic data. And according to the authority information, invoking the display content matched with the login user authority on the corresponding client.
The scheduling module 203 is used for scheduling the access application to the client of any online manager so that the client of the manager can return the authorized passing information;
and the issuing module 204 is used for sending the authorization information containing the display content to the client. And issuing temporary permission to the client according to the authorization passing information.
Fig. 3 shows a schematic diagram of a terminal suitable for implementing an embodiment of the application.
As shown in fig. 3, the terminal includes a Central Processing Unit (CPU) 301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage section into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data required for the system operation are also stored. The CPU 301, ROM 302, and RAM 303 are connected to each other through a bus 304. An input/output I/O interface 305 is also connected to bus 304.
The following components are connected to the I/O interface 305: an input section 306 including a keyboard, a mouse, and the like; an output portion 307 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 308 including a hard disk or the like; and a communication section 309 including a network interface card such as a LAN card, a modem, or the like. The communication section 309 performs communication processing via a network such as the internet. The drive 310 is also connected to the I/O interface 305 as needed. A removable medium 311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed on the drive 310 as needed, so that a computer program read out therefrom is installed into the storage section 308 as needed.
In particular, the process described above with reference to flowchart 1 may be implemented as a computer software program according to an embodiment of the application. For example, embodiments of the application include a computer program product comprising a computer program embodied on a machine-readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 309, and/or installed from the removable medium 311. The above-described functions defined in the system of the present application are performed when the computer program is executed by a Central Processing Unit (CPU) 301.
The computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules involved in the embodiments of the present application may be implemented in software or in hardware. The described units or modules may also be provided in a processor, for example, as: a processor includes an acquisition module 201, a matching module 202, a scheduling module 203, and an issuing module 204. Wherein the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves.
As another aspect, the present application also provides a computer-readable storage medium, which may be contained in the terminal described in the above embodiment; or may exist alone without being fitted into the terminal. The computer-readable storage medium stores one or more programs that when executed by one or more processors perform the data encryption transmission method described in the present application.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in the present application is not limited to the specific combinations of technical features described above, but also covers other technical features which may be formed by any combination of the technical features described above or their equivalents without departing from the spirit of the disclosure. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.

Claims (10)

1. An asset confidentiality method based on fingerprint authentication, applied to a management server, is characterized by comprising the following steps:
acquiring fingerprint characteristic data encrypted by a login user;
matching the identity information and the authority information of the login user according to the encrypted fingerprint characteristic data;
according to the authority information, invoking display content which is matched with the authority of the login user on the corresponding client, and sending authorization information containing the display content to the client; the display content comprises a file name which can be referred and a file name to be authorized;
acquiring an access application of a login person to a file to be authorized;
the access application is allocated to the client side of any online manager, so that the client side of the manager can return authorization passing information;
and according to the authorization passing information, issuing temporary permission to the client.
2. The asset confidentiality method based on fingerprint authentication of claim 1, wherein invoking presentation content matching login rights on a corresponding client according to said rights information comprises:
obtaining authority levels of files of a client;
determining the authority level of the login user according to the authority information;
and determining the display content matching the login user permission according to the permission information and the permission grade of the file.
3. The fingerprint authentication-based asset privacy method of claim 1, further comprising conducting spot check authentication based on the login user's operational behavior:
acquiring the operation behavior of a login person;
and after judging that the logger is in a temporary-off state according to the operation behaviors, locking the screen of the corresponding client.
4. The asset confidentiality keeping method based on fingerprint authentication according to claim 3, wherein judging that a registrant is in a temporary-away state according to said operation behavior, and locking a corresponding client comprises:
when the login user does not operate within the first preset time, a prompt message is sent to the client; and when the login user does not operate within the second preset time, locking a screen of the client logged in by the login user, and sending re-verification information to the client.
5. The fingerprint authentication-based asset privacy method of claim 2, further comprising preventing re-login behavior based on log information of the login user:
inquiring the online state of the login user according to the log information of the login user;
when the online state of the login user is that other clients are online, the connection of the other clients is disconnected while the login is verified for the current client.
6. The fingerprint authentication-based asset security method of claim 1, wherein obtaining the encrypted fingerprint feature data of the login party comprises:
acquiring fingerprint characteristic information input by a logger;
and encrypting the fingerprint characteristic information and sending the encrypted fingerprint characteristic information to a user.
7. The asset confidentiality method based on fingerprint authentication according to claim 1, wherein matching identity information and authority information of a login user according to said encrypted fingerprint feature data comprises:
decoding the encrypted fingerprint feature data, and performing feature matching in a fingerprint database;
and after the verification is successful, the identity information and the authority information of the login user are called according to the decoded fingerprint characteristic data.
8. An electronic asset privacy system based on fingerprint authentication, comprising:
the acquisition module (201) is used for acquiring the fingerprint characteristic data encrypted by the login user and the access application of the login user to the file to be authorized;
the matching module (202) is used for matching the identity information and the authority information of the login user according to the encrypted fingerprint characteristic data; according to the authority information, invoking display content matched with the login user authority on the corresponding client; the display content comprises a file name which can be referred and a file name to be authorized;
a scheduling module (203) for scheduling the access application to any online manager's client to enable the manager's client to return authorization passing information;
a transmitting module (204) for transmitting authorization information containing the display content to the client; and according to the authorization passing information, issuing temporary permission to the client.
9. A terminal comprising a memory and a processor, the memory having stored thereon a computer program, characterized in that the processor, when executing the program, implements the method according to any of claims 1 to 7.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any one of claims 1 to 7.
CN202311225769.9A 2023-09-22 2023-09-22 Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication Pending CN116975829A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311225769.9A CN116975829A (en) 2023-09-22 2023-09-22 Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311225769.9A CN116975829A (en) 2023-09-22 2023-09-22 Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication

Publications (1)

Publication Number Publication Date
CN116975829A true CN116975829A (en) 2023-10-31

Family

ID=88475253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311225769.9A Pending CN116975829A (en) 2023-09-22 2023-09-22 Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication

Country Status (1)

Country Link
CN (1) CN116975829A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664885A (en) * 2012-04-18 2012-09-12 南京邮电大学 Identity authentication method based on biological feature encryption and homomorphic algorithm
US20190182203A1 (en) * 2017-12-11 2019-06-13 GM Global Technology Operations LLC System and method for directing a tethered device to an in-vehicle stored landing page based on an available credit or data balance
CN110442326A (en) * 2019-08-11 2019-11-12 西藏宁算科技集团有限公司 A kind of method and its system simplifying separation permission control in front and back end based on Vue
CN111510461A (en) * 2020-04-26 2020-08-07 成都安恒信息技术有限公司 System and method for managing WEB application centralized release authority

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664885A (en) * 2012-04-18 2012-09-12 南京邮电大学 Identity authentication method based on biological feature encryption and homomorphic algorithm
US20190182203A1 (en) * 2017-12-11 2019-06-13 GM Global Technology Operations LLC System and method for directing a tethered device to an in-vehicle stored landing page based on an available credit or data balance
CN110442326A (en) * 2019-08-11 2019-11-12 西藏宁算科技集团有限公司 A kind of method and its system simplifying separation permission control in front and back end based on Vue
CN111510461A (en) * 2020-04-26 2020-08-07 成都安恒信息技术有限公司 System and method for managing WEB application centralized release authority

Similar Documents

Publication Publication Date Title
US10382427B2 (en) Single sign on with multiple authentication factors
CN109274652B (en) Identity information verification system, method and device and computer storage medium
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
CN110636043A (en) File authorization access method, device and system based on block chain
CN109412812B (en) Data security processing system, method, device and storage medium
CN104426659A (en) Dynamic password generating method, authentication method, authentication system and corresponding equipment
CN112801663A (en) Block chain evidence storing method, device, system, equipment and medium
CN113487321A (en) Identity identification and verification method and system based on block chain wallet
CN116325654B (en) Tenant aware mutual TLS authentication
CN110995654B (en) Terminal temporary authorization method, device and system based on dynamic two-dimensional code
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN111538973A (en) Personal authorization access control system based on state cryptographic algorithm
CN111030816A (en) Authentication method and device for access platform of evidence obtaining equipment and storage medium
CN115967581A (en) Login verification method and device, electronic equipment and storage medium
CN115514523A (en) Data security access system, method, device and medium based on zero trust system
CN116975829A (en) Asset confidentiality method, system, terminal and storage medium based on fingerprint authentication
CN114553573A (en) Identity authentication method and device
CN114024682A (en) Cross-domain single sign-on method, service equipment and authentication equipment
CN111970126A (en) Key management method and device
CN113297564A (en) Data security management method and device supporting hierarchical control
CN110619236A (en) File authorization access method, device and system based on file credential information
WO2022042746A1 (en) Key management method and apparatus
CN115189975B (en) Login method, login device, electronic equipment and storage medium
CN115174181B (en) Method, device, equipment and storage medium for realizing single sign-on
CN110490003B (en) User trusted data generation method, user trusted data acquisition method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination