CN117349811A - Information authentication system based on user identity - Google Patents

Information authentication system based on user identity Download PDF

Info

Publication number
CN117349811A
CN117349811A CN202311355462.0A CN202311355462A CN117349811A CN 117349811 A CN117349811 A CN 117349811A CN 202311355462 A CN202311355462 A CN 202311355462A CN 117349811 A CN117349811 A CN 117349811A
Authority
CN
China
Prior art keywords
user
authentication
information
module
portrait
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311355462.0A
Other languages
Chinese (zh)
Other versions
CN117349811B (en
Inventor
丘钰霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yuanfeng Intelligent Technology Co ltd
Original Assignee
Guangzhou Yuanfeng Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yuanfeng Intelligent Technology Co ltd filed Critical Guangzhou Yuanfeng Intelligent Technology Co ltd
Priority to CN202311355462.0A priority Critical patent/CN117349811B/en
Publication of CN117349811A publication Critical patent/CN117349811A/en
Application granted granted Critical
Publication of CN117349811B publication Critical patent/CN117349811B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to the field of information authentication, in particular to an information authentication system based on user identity, which comprises an input module for inputting first information of a new user, a database module for storing the first information, an acquisition module for acquiring second information, a comparison module for searching and comparing the first information in the database module according to the second information, a user grade and a corresponding authentication mode according to a user weight value, and changing the user grade based on the frequency of user authentication, and an analysis module for judging whether each authentication mode accords with a preset standard based on the comparison result of the comparison module, a prompt module for sending corresponding prompts, and an adjustment module for adjusting system operation parameters.

Description

Information authentication system based on user identity
Technical Field
The invention relates to the field of information authentication, in particular to an information authentication system based on user identity.
Background
Information authentication is a "gatekeeper" of computers and computer network systems, for example, to authenticate personal and legal identities, and is therefore also referred to as "identity verification" or "identity authentication", so as to determine whether the user has access and use rights to a certain resource, so that the access policies of computers and network systems can be reliably and effectively executed, prevent an attacker from impersonating a legal user to obtain the access rights of the resource, ensure the security of the system and data, and authorize the legal interests of the visitor. Along with the development of authentication and the continuous enrichment of application scenes thereof, a biological recognition technology is gradually introduced into identity authentication. From the initial password unlocking and pattern unlocking, the method advances to the subsequent fingerprint recognition and iris recognition, and then to the popular facial recognition.
Chinese patent publication No.: CN112751838A discloses an identity authentication method, an identity authentication device and an identity authentication system, which acquire the account number of the user to be authenticated and the voice data of the user to be authenticated for reading the dynamic password, and preprocess the voice data; determining voiceprints of users to be authenticated based on the preprocessed voice data; if the voiceprint of the user to be authenticated is matched with the voiceprint corresponding to the account, determining text data corresponding to the voice data based on the preprocessed voice data; and carrying out identity authentication based on the text data and the dynamic password data corresponding to the account. It can be seen that the method of authentication adapted cannot be intelligently matched according to different users, so that the authentication efficiency and the security are insufficient.
Disclosure of Invention
Therefore, the invention provides an information authentication system based on user identity, which is used for solving the problems of insufficient authentication efficiency and security caused by the fact that the authentication mode which cannot be adapted according to the intelligent matching of the user in the prior art.
To achieve the above object, the present invention provides an information authentication system based on user identity, including:
the input module is used for responding to the input of the identity, the signature, the portrait and the user weight value of the user when the user is a new user, automatically generating a key after the input is completed, and summarizing the identity, the signature, the portrait, the user weight value and the key of the new user to form first information;
the database module is connected with the input module and used for storing the input first information;
the acquisition module is used for responding to the information of the user when the user is an old user to form second information, wherein the second information comprises an identity, a secret key, a signature and a portrait;
the comparison module is respectively connected with the acquisition module and the database module and is used for retrieving and comparing the first information stored in the database module according to the acquired second information;
the analysis module is respectively connected with the input module, the database module, the acquisition module and the comparison module and is used for judging the user grade and the corresponding authentication mode according to the user weight value, changing the user grade based on the frequency of user authentication and judging whether each authentication mode accords with a preset standard or not based on the comparison result of the comparison module;
the user grades are a primary user, a secondary user and a tertiary user;
the authentication mode is a combination of identity authentication, key authentication, signature authentication and portrait authentication;
the prompt module is connected with the analysis module and used for sending out a corresponding prompt according to the result judged by the analysis module;
and the adjusting module is respectively connected with the database module and the analysis module and is used for adjusting the operation parameters of the system to corresponding values according to the judgment result of the analysis module.
Further, the analysis module judges whether key authentication meets a preset standard or not based on a comparison result of the key of the first information and the key of the second information under a first preset condition, judges that key authentication fails when the key of the first information and the key of the second information are different, and controls the prompt module to send out a prompt of failure of key authentication; the first preset condition is that the comparison module completes comparison of the key of the first information and the key of the second information.
Further, the analysis module judges whether signature authentication meets a preset standard or not based on the similar duty ratio of the signature of the first information and the font outline of the signature of the second information under a second preset condition, judges that the signature authentication fails and controls the prompt module to send out a prompt of the signature authentication failure when judging that the signature authentication does not meet the preset standard, or judges whether the signature authentication meets the preset standard or not for the second time based on the signature duration of the signature of the second information; the second preset condition is that the comparison module completes comparison of the signature of the first information and the signature of the second information.
Further, the analysis module judges whether the signature authentication accords with a preset standard or not based on the signature time length, judges that the signature authentication fails and controls the prompt module to send out a prompt of the signature authentication failure when the signature time length is larger than or equal to the preset signature time length.
Further, the analysis module judges whether the portrait authentication meets a preset standard based on the portrait coincidence ratio of the portrait of the first information and the portrait of the second information under a third preset condition, judges that the portrait authentication fails and controls the prompt module to send out a prompt of the portrait authentication failure when judging that the portrait authentication does not meet the preset standard, or extracts the feature profile of the portrait of the first information and the portrait of the second information and judges whether the portrait authentication meets the preset standard for the second time based on the feature profile similarity; and the third preset condition is that the comparison module is used for completing the comparison of the portrait of the first information and the portrait of the second information.
Further, the analysis module carries out secondary judgment on whether the portrait authentication accords with a preset standard or not based on the feature profile similarity, judges that the portrait authentication passes when the feature profile similarity is larger than or equal to the preset feature profile similarity, and stores the portrait acquired by the portrait authentication in the database module so as to update the portrait of the user.
Further, the analysis module is used for determining the user grade of the new user as a primary user, a secondary user and a tertiary user based on the user weight value under a fourth preset condition; the fourth preset condition is that the input module needs to input the user grade of a new user.
Further, the analysis module judges an authentication mode aiming at the user based on the user grade under a fifth preset condition, wherein the authentication mode comprises an identity and key authentication mode, an identity, key authentication and signature authentication mode and an identity, key authentication, signature authentication and portrait authentication mode; and the fifth preset condition is that the input module completes the judgment of the user grade.
Further, the analysis module determines, based on the frequency of user authentication, that the user level is changed based on the frequency of user authentication under a sixth preset condition, the user level change including a step of increasing the user level, if the user level of the user is three steps, the user level is not changed, or if the user level of the user is one step, the user level is decreased, and if the user level of the user is one step, the user level is not changed; and the sixth preset condition is that the analysis module completes statistics of the user authentication frequency.
Further, the analysis module determines the user as a new user when no result is retrieved in the database module based on the identity of the second information.
Compared with the prior art, the invention has the beneficial effects that: the system of the invention is characterized in that by setting an input module for inputting the first information of a new user, a database module for storing the first information, an acquisition module for acquiring the second information, a comparison module for searching and comparing the first information in the database module according to the second information, a user grade and a corresponding authentication mode according to a user weight value, and changing the user grade based on the frequency of user authentication, and an analysis module for judging whether each authentication mode accords with a preset standard based on the comparison result of the comparison module, a prompt module for sending out corresponding prompts and an adjustment module for adjusting system operation parameters, thereby improving the efficiency and safety of information authentication.
Further, the invention judges whether the key matching accords with the standard or not through judging whether the acquired user key is the same as the key stored in the database, thereby ensuring the safety of authentication.
Further, the invention judges whether the signature authentication accords with the preset standard or not through the font outline similarity duty ratio of the signature, and when judging that the signature authentication does not accord with the preset standard, judges whether the signature authentication accords with the preset standard or not secondarily based on the signature duration, or judges that the signature authentication fails, thereby further ensuring the security of the authentication.
Further, the invention carries out secondary judgment on whether the signature authentication accords with the preset standard or not based on the signature duration, and the authenticity of the client is limited by the signature duration, thereby further improving the security of the authentication.
Further, the invention judges whether the portrait authentication meets the preset standard or not through the portrait coincidence degree, judges that the portrait authentication fails when the portrait authentication does not meet the preset standard, or further extracts the characteristic outline of the portrait, and judges whether the portrait authentication meets the preset standard or not for the second time according to the similarity of the characteristic outline, thereby improving the security of the system authentication.
Furthermore, the invention divides the user grades according to the weight value obtained by the user, thereby laying a foundation for the matching of the authentication modes.
Further, the invention judges different authentication modes of the user based on the user grade, including different combinations in identity, key authentication, signature authentication and portrait authentication, thereby improving the authentication security of clients with different weights.
Furthermore, the invention can change the user grade according to the frequency of the user authentication, thereby optimizing the speed and the security of the client authentication.
Further, when the comparison module cannot retrieve the collected information of the user, the user is judged to be a new user, and the system authentication efficiency is further improved.
Drawings
FIG. 1 is a schematic diagram of an information authentication system based on user identity according to an embodiment of the present invention;
FIG. 2 is a flowchart of determining whether signature authentication meets a preset criterion according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a user authentication method according to an embodiment of the present invention;
fig. 4 is a flowchart of a determination of a user level change mode according to an embodiment of the present invention.
Detailed Description
In order that the objects and advantages of the invention will become more apparent, the invention will be further described with reference to the following examples; it should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It should be noted that, the data in this embodiment are obtained by comprehensively analyzing and evaluating the historical authentication data and the corresponding historical authentication results three months before the current authentication by the analysis module.
According to 114420 times of identity information authentication accumulated in the first three months before the current authentication, the analysis module determines the numerical value of each preset parameter standard aiming at the current authentication. It will be understood by those skilled in the art that the determination manner of the system according to the present invention for the parameters mentioned above may be that the value with the highest duty ratio is selected as the preset standard parameter according to the data distribution, the weighted summation is used to take the obtained value as the preset standard parameter, each history data is substituted into a specific formula, and the value obtained by using the formula is taken as the preset standard parameter or other selection manner, as long as different specific conditions in the single item determination process can be definitely defined by the obtained value by the system according to the present invention are satisfied.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are merely for explaining the technical principles of the present invention, and are not intended to limit the scope of the present invention.
Fig. 1, fig. 2, fig. 3, and fig. 4 are schematic diagrams of an information authentication system based on user identity according to an embodiment of the present invention; the embodiment of the invention judges whether the signature authentication accords with a flow chart of a preset standard or not; the embodiment of the invention provides a flow chart for judging the user authentication mode; the embodiment of the invention provides a flow chart for judging a user grade change mode.
The embodiment of the invention provides an information authentication system based on user identity, which comprises the following steps:
and the input module is used for responding to the input of the identity, the signature, the portrait and the user weight value of the user when the user is a new user, automatically generating a key after the input is completed, and summarizing the identity, the signature, the portrait, the user weight value and the key of the new user to form first information.
The identity, such as name or identification card number, is not particularly limited and may be used to target different customers.
The person like, for example, a photograph of the user, is not particularly limited, and the user weight value, for example, deposit of the user or job level of the user, only needs to satisfy that different users can be quantified and distinguished.
Keys such as letter strings, number strings, and random combinations of the two.
The database module, such as a database, is not limited in detail, and only needs to have the function of storing data, and is connected with the input module to store the input first information;
the acquisition module is used for responding to the information of the user when the user is an old user to form second information, wherein the second information comprises an identity, a secret key, a signature and a portrait;
the comparison module is respectively connected with the acquisition module and the database module and is used for searching and comparing the first information stored in the database module according to the acquired second information, wherein the searching can be performed through identity searching;
the analysis module is respectively connected with the input module, the database module, the acquisition module and the comparison module and is used for judging the user grade and the corresponding authentication mode according to the user weight value, changing the user grade based on the frequency of user authentication and judging whether each authentication mode accords with a preset standard or not based on the comparison result of the comparison module;
the user grades are a primary user, a secondary user and a tertiary user;
the authentication mode is a combination of identity authentication, key authentication, signature authentication and portrait authentication;
the prompt module is connected with the analysis module and used for sending out a corresponding prompt according to the result judged by the analysis module;
and the adjusting module is respectively connected with the database module and the analysis module and is used for adjusting the operation parameters of the system to corresponding values according to the judgment result of the analysis module.
Specifically, the analysis module determines whether a key authentication meets a preset standard based on a comparison result of the key of the first information and the key of the second information under a first preset condition, wherein,
the first key authentication is judged as the analysis module judges that the key authentication accords with a preset standard and passes the key authentication; the first key authentication determination satisfies that the key of the first information and the key of the second information are the same;
the second key authentication judges that the analysis module judges that the key authentication does not accord with a preset standard and judges that the key authentication fails, and the analysis module controls the prompt module to send out a prompt of failure of the key authentication; the second key authentication determines that the key satisfying the first information and the key of the second information are different;
the first preset condition is that the comparison module completes comparison of the key of the first information and the key of the second information.
Specifically, the analysis module determines whether signature authentication meets a preset criterion based on a font contour similarity duty ratio of the signature of the first information and the signature of the second information under a second preset condition, wherein,
the first signature authentication judges that the analysis module judges that the signature authentication does not accord with a preset standard and judges that the signature authentication fails, and the analysis module controls the prompt module to send out a prompt of the signature authentication failure; the first signature authentication judgment meets that the font outline similarity duty ratio is smaller than a first preset similarity duty ratio 92%;
the second signature authentication judges that the analysis module judges that the signature authentication does not accord with a preset standard, and judges whether the signature authentication accords with the preset standard or not for the second time based on the signature duration of the signature of the second information; the second signature authentication judgment meets the condition that the font outline similarity duty ratio is greater than or equal to the first preset similarity duty ratio and less than a second preset similarity duty ratio 97%;
the third signature authentication is judged as the analysis module judges that the signature authentication meets a preset standard and passes the signature authentication; the third signature authentication judgment meets the condition that the font outline similarity duty ratio is larger than or equal to the second preset similarity duty ratio;
the second preset condition is that the comparison module completes comparison of the signature of the first information and the signature of the second information.
Specifically, the analysis module makes a secondary determination on whether the signature authentication meets a preset standard based on the signature duration under the second signature authentication determination, wherein,
the first secondary signature authentication is judged as the analysis module judges that the signature authentication accords with a preset standard and passes the signature authentication; the first secondary signature authentication judges that the signature duration is smaller than a preset signature duration for 3.5s;
the second signature authentication is judged to be that the analysis module judges that the signature authentication does not accord with a preset standard and judges that the signature authentication fails, and the analysis module controls the prompt module to send out a prompt of the signature authentication failure; and the second signature authentication judgment meets the signature time length longer than or equal to the preset signature time length.
Specifically, the analysis module determines whether a person authentication meets a preset standard based on the person-to-person ratio of the person image of the first information and the person image of the second information under a third preset condition, wherein,
the first portrait authentication is judged to be that the analysis module judges that the portrait authentication does not accord with a preset standard and judges that the portrait authentication fails, and the analysis module controls the prompt module to send out prompt of failure of the portrait authentication; the first person authentication judgment meets the condition that the person overlapping ratio is less than 85% of a first preset person overlapping ratio;
the second portrait authentication is judged to be that the portrait authentication does not accord with a preset standard, the feature contours of the portrait of the first information and the portrait of the second information are extracted, and the analysis module carries out secondary judgment on whether the portrait authentication accords with the preset standard or not based on the feature contour similarity of the feature contours of the portrait of the first information and the feature contours of the portrait of the second information; the second portrait authentication judgment meets the condition that the portrait overlapping ratio is more than or equal to the first preset portrait overlapping ratio and less than 92% of a second preset portrait overlapping ratio;
the third portrait authentication is judged that the analysis module judges that the portrait authentication meets a preset standard and judges that the portrait authentication passes through the portrait authentication, and the analysis module stores the portrait acquired by the portrait authentication in the database module so as to update the portrait of the user; the third portrait authentication meets the condition that the portrait contact ratio is more than or equal to the first preset portrait contact ratio;
and the third preset condition is that the comparison module is used for completing the comparison of the portrait of the first information and the portrait of the second information.
Specifically, the analysis module makes a secondary determination on whether the portrait authentication meets a preset standard based on the feature profile similarity under the second portrait authentication determination, wherein,
the first secondary portrait authentication is judged to be that the analysis module judges that the portrait authentication does not accord with a preset standard and judges that the portrait authentication fails, and the analysis module controls the prompt module to send out prompt of failure of the portrait authentication; the first secondary portrait authentication judgment meets the condition that the feature profile similarity is less than 88% of the preset feature profile similarity;
the second secondary portrait authentication is judged that the analysis module judges that the portrait authentication meets a preset standard and judges that the portrait authentication passes, and the analysis module stores the portrait acquired by the second portrait authentication into the database module so as to update the portrait of the user; and the second secondary portrait authentication judgment meets the condition that the feature profile similarity is greater than or equal to the preset feature profile similarity.
Specifically, the analysis module determines the determination manner of the user level for the new user based on a user weight value under a fourth preset condition, where the user weight value, for example, the deposit of the user, is not limited in detail, and only needs to satisfy the requirement that different users can be quantified and distinguished, and in this embodiment, the deposit is set as the deposit of the user.
The first user grade judging mode is that the analysis module judges that the new user is a primary user; the first user grade judging mode meets the condition that the user weight value is smaller than a first preset user weight value, and the first preset user weight value is set as 50000 yuan;
the second user grade judging mode is that the analysis module judges that the new user is a secondary user; the second user grade judging mode meets the requirements that the user weight value is larger than or equal to the first preset user weight value and smaller than a second preset user weight value, and the second preset user weight value is set as a deposit 500000 yuan;
the third user grade judging mode is that the analysis module judges that the new user is a third-level user; the third user grade judging mode meets the condition that the user weight value is larger than or equal to the second preset user weight value;
the fourth preset condition is that the input module needs to input the user grade of a new user.
Specifically, the analysis module determines a decision for the user authentication mode based on the user level under a fifth preset condition, wherein,
the first authentication mode judges that the analysis module completes the information authentication of the user by adopting an identity and key authentication mode; the first authentication mode satisfies that the user grade is one grade;
the second authentication mode judges that the analysis module completes the information authentication of the user by adopting an identity, key authentication and signature authentication mode; the second authentication mode satisfies that the user grade is two-level;
the third authentication mode judges that the analysis module completes the information authentication of the user by adopting the modes of identity authentication, secret key authentication, signature authentication and portrait authentication; the third authentication mode satisfies that the user grade is three-grade;
and the fifth preset condition is that the input module completes the judgment of the user grade.
Specifically, the analysis module determines, under a sixth preset condition, a determination of the user-level change mode based on a frequency of user authentication, where the frequency of user authentication is a number of times the user performs authentication within a preset duration, and the preset duration is set to be 1 month,
the first change judgment is that the analysis module judges that the user grade is increased by one step, and if the user grade of the user is three steps, the grade is not changed; the first change judgment meets the condition that the frequency of the user authentication is less than the first preset authentication frequency by 3 times/month;
a second change judgment is that the analysis module judges that the user grade is not changed; the second change judgment meets the condition that the frequency of the user authentication is more than or equal to the first preset authentication frequency and less than the second preset authentication frequency by 10 times/month;
the third change judgment is that the analysis module judges that the user grade is reduced by one step, and if the user grade of the user is one step, the grade is not changed; the third change judgment meets the condition that the frequency of the user authentication is greater than or equal to the second preset authentication frequency;
and the sixth preset condition is that the analysis module completes statistics of the user authentication frequency.
Specifically, the analysis module determines that the user is a new user when no result is retrieved in the database module based on the identity of the second information, and controls the prompt module to send out a prompt that the user is a new user.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will be within the scope of the present invention.
The foregoing description is only of the preferred embodiments of the invention and is not intended to limit the invention; various modifications and variations of the present invention will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An information authentication system based on a user identity, comprising:
the input module is used for responding to the input of the identity, the signature, the portrait and the user weight value of the user when the user is a new user, automatically generating a key after the input is completed, and summarizing the identity, the signature, the portrait, the user weight value and the key of the new user to form first information;
the database module is connected with the input module and used for storing the input first information;
the acquisition module is used for responding to the information of the user when the user is an old user to form second information, wherein the second information comprises an identity, a secret key, a signature and a portrait;
the comparison module is respectively connected with the acquisition module and the database module and is used for retrieving and comparing the first information stored in the database module according to the acquired second information;
the analysis module is respectively connected with the input module, the database module, the acquisition module and the comparison module and is used for judging the user grade and the corresponding authentication mode according to the user weight value, changing the user grade based on the frequency of user authentication and judging whether each authentication mode accords with a preset standard or not based on the comparison result of the comparison module;
the user grades are a primary user, a secondary user and a tertiary user;
the authentication mode is a combination of identity authentication, key authentication, signature authentication and portrait authentication;
the prompt module is connected with the analysis module and used for sending out a corresponding prompt according to the result judged by the analysis module;
and the adjusting module is respectively connected with the database module and the analysis module and is used for adjusting the operation parameters of the system to corresponding values according to the judgment result of the analysis module.
2. The information authentication system based on user identity according to claim 1, wherein the analysis module determines whether key authentication meets a preset standard based on a comparison result of the key of the first information and the key of the second information under a first preset condition, and determines that key authentication fails when the key of the first information and the key of the second information are different, and the analysis module controls the prompt module to issue a prompt of failure of key authentication; the first preset condition is that the comparison module completes comparison of the key of the first information and the key of the second information.
3. The user identity-based information authentication system according to claim 2, wherein the analysis module determines whether signature authentication meets a preset standard based on a font contour similarity ratio of the signature of the first information and the signature of the second information under a second preset condition, and determines that signature authentication fails and controls the prompt module to issue a prompt of signature authentication failure when the preset standard is determined not to be met, or secondarily determines whether signature authentication meets the preset standard based on a signature duration of the signature of the second information; the second preset condition is that the comparison module completes comparison of the signature of the first information and the signature of the second information.
4. The information authentication system based on user identity according to claim 3, wherein the analysis module makes a secondary decision on whether the signature authentication meets a preset standard based on the signature duration, and when the signature duration is longer than or equal to the preset signature duration, decides that the signature authentication fails and controls the prompt module to prompt that the signature authentication fails.
5. The information authentication system based on user identity according to claim 4, wherein the analysis module determines whether or not the portrait authentication meets a preset standard based on the portrait coincidence ratio of the portrait of the first information and the portrait of the second information under a third preset condition, and when it is determined that the portrait authentication does not meet the preset standard, determines that the portrait authentication fails and controls the prompt module to issue a prompt of failure of the portrait authentication, or extracts feature profiles of the portrait of the first information and the portrait of the second information and secondarily determines whether or not the portrait authentication meets the preset standard based on feature profile similarity; and the third preset condition is that the comparison module is used for completing the comparison of the portrait of the first information and the portrait of the second information.
6. The information authentication system based on user identity according to claim 5, wherein the analysis module makes a secondary determination on whether the portrait authentication meets a preset standard based on the feature profile similarity, determines that the portrait authentication is passed when the feature profile similarity is greater than or equal to the preset feature profile similarity, and stores the portrait acquired by the present portrait authentication in the database module to update the portrait of the user.
7. The user identity-based information authentication system of claim 6, wherein the analysis module is configured to rank the new user into a primary user, a secondary user, and a tertiary user based on a user weight value under a fourth preset condition; the fourth preset condition is that the input module needs to input the user grade of a new user.
8. The information authentication system based on user identity according to claim 7, wherein the analysis module determines an authentication mode for the user based on the user level under a fifth preset condition, the authentication mode including an identity and key authentication mode, an identity, key authentication and signature authentication mode, and an identity, key authentication, signature authentication and portrait authentication mode; and the fifth preset condition is that the input module completes the judgment of the user grade.
9. The system of claim 8, wherein the analysis module determines, based on the frequency of user authentication, that the user level is changed for the user level under a sixth preset condition, the user level change including a user level up by one step, if the user level of the user is three steps, no level change is made, or a user level down by one step, if the user level of the user is one step, no level change is made; and the sixth preset condition is that the analysis module completes statistics of the user authentication frequency.
10. The user identity based information authentication system of claim 9, wherein the analysis module determines the user as a new user based on the identity of the second information when no result is retrieved in the database module.
CN202311355462.0A 2023-10-18 2023-10-18 Information authentication system based on user identity Active CN117349811B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311355462.0A CN117349811B (en) 2023-10-18 2023-10-18 Information authentication system based on user identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311355462.0A CN117349811B (en) 2023-10-18 2023-10-18 Information authentication system based on user identity

Publications (2)

Publication Number Publication Date
CN117349811A true CN117349811A (en) 2024-01-05
CN117349811B CN117349811B (en) 2024-04-05

Family

ID=89368799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311355462.0A Active CN117349811B (en) 2023-10-18 2023-10-18 Information authentication system based on user identity

Country Status (1)

Country Link
CN (1) CN117349811B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
JP2011145906A (en) * 2010-01-15 2011-07-28 Hitachi Omron Terminal Solutions Corp Transaction processing device and transaction processing method
JP2012118833A (en) * 2010-12-02 2012-06-21 Hitachi Ltd Access control method
WO2012130035A1 (en) * 2011-04-01 2012-10-04 Wang Dongmei User authentication and authorization method and implementation system thereof
WO2013046807A1 (en) * 2011-09-28 2013-04-04 株式会社日立製作所 Authentication relay device, authentication relay system and authentication relay method
US20140208419A1 (en) * 2013-01-24 2014-07-24 International Business Machines Corporation User Authentication
JP2014225186A (en) * 2013-05-17 2014-12-04 日本電信電話株式会社 User authentication device, method and program
JP2016066132A (en) * 2014-09-24 2016-04-28 株式会社日立ソリューションズ Multilevel authentication device and multilevel authentication method
JP2017072979A (en) * 2015-10-07 2017-04-13 Kddi株式会社 Authentication system, authentication server, provider server, and user terminal
KR101754954B1 (en) * 2016-04-28 2017-07-07 주식회사 피노텍 Certification system and method using autograph and voice
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
US20170230362A1 (en) * 2014-09-30 2017-08-10 Huawei Technologies Co., Ltd. Identity Authentication Method and Apparatus, and User Equipment
WO2018090839A1 (en) * 2016-11-16 2018-05-24 阿里巴巴集团控股有限公司 Identity verification system, method, device, and account verification method
JP2020009305A (en) * 2018-07-11 2020-01-16 凸版印刷株式会社 IC chip, IC card and program
CN113095839A (en) * 2021-04-30 2021-07-09 中国银行股份有限公司 Authentication mode recommendation method, device, equipment and storage medium

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
JP2011145906A (en) * 2010-01-15 2011-07-28 Hitachi Omron Terminal Solutions Corp Transaction processing device and transaction processing method
JP2012118833A (en) * 2010-12-02 2012-06-21 Hitachi Ltd Access control method
WO2012130035A1 (en) * 2011-04-01 2012-10-04 Wang Dongmei User authentication and authorization method and implementation system thereof
WO2013046807A1 (en) * 2011-09-28 2013-04-04 株式会社日立製作所 Authentication relay device, authentication relay system and authentication relay method
US20140208419A1 (en) * 2013-01-24 2014-07-24 International Business Machines Corporation User Authentication
JP2014225186A (en) * 2013-05-17 2014-12-04 日本電信電話株式会社 User authentication device, method and program
JP2016066132A (en) * 2014-09-24 2016-04-28 株式会社日立ソリューションズ Multilevel authentication device and multilevel authentication method
US20170230362A1 (en) * 2014-09-30 2017-08-10 Huawei Technologies Co., Ltd. Identity Authentication Method and Apparatus, and User Equipment
JP2017072979A (en) * 2015-10-07 2017-04-13 Kddi株式会社 Authentication system, authentication server, provider server, and user terminal
KR101754954B1 (en) * 2016-04-28 2017-07-07 주식회사 피노텍 Certification system and method using autograph and voice
WO2018090839A1 (en) * 2016-11-16 2018-05-24 阿里巴巴集团控股有限公司 Identity verification system, method, device, and account verification method
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
JP2020009305A (en) * 2018-07-11 2020-01-16 凸版印刷株式会社 IC chip, IC card and program
CN113095839A (en) * 2021-04-30 2021-07-09 中国银行股份有限公司 Authentication mode recommendation method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN117349811B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
JP4939121B2 (en) Methods, systems, and programs for sequential authentication using one or more error rates that characterize each security challenge
US6580814B1 (en) System and method for compressing biometric models
Kumar Jindal et al. Face template protection using deep convolutional neural network
US5375244A (en) System and method for granting access to a resource
CN100356388C (en) Biocharacteristics fusioned identity distinguishing and identification method
US6591224B1 (en) Biometric score normalizer
CN101478401B (en) Authentication method and system based on key stroke characteristic recognition
EP2477136B1 (en) Method for continuously verifying user identity via keystroke dynamics
EP3553703A1 (en) Biometric identification and verification
US9385868B2 (en) Methods and systems for testing performance of biometric authentication systems
CN103841108A (en) Authentication method and system of biological characteristics of user
NZ536210A (en) A method of detecting a likelihood of voice identity fraud in a voice access system
EP1074005A1 (en) Method of providing secure user access
US20230401302A1 (en) Multimodal biometric fusion based authentication
CN112330035A (en) Training method and device of risk prediction model
WO2007128975A2 (en) Biometric security systems
JP5391631B2 (en) Parameter control device, parameter control program, and multistage collation device
JP4812497B2 (en) Biometric verification system
Mukhaiyar Analysis of Galton-Henry classification method for fingerprint database FVC 2002 and 2004
CN117349811B (en) Information authentication system based on user identity
US20070233667A1 (en) Method and apparatus for sample categorization
CN114694227A (en) Identity authentication continuous optimization method based on face recognition technology
JP4884052B2 (en) Biometric authentication system
Matsuoka et al. A score fusion method by neural network in multi-factor authentication
CN111917693A (en) Network identity authentication system for dynamically identifying digital identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant