WO2018040045A1 - Procédé, appareil de surveillance et dispositif électronique - Google Patents

Procédé, appareil de surveillance et dispositif électronique Download PDF

Info

Publication number
WO2018040045A1
WO2018040045A1 PCT/CN2016/097745 CN2016097745W WO2018040045A1 WO 2018040045 A1 WO2018040045 A1 WO 2018040045A1 CN 2016097745 W CN2016097745 W CN 2016097745W WO 2018040045 A1 WO2018040045 A1 WO 2018040045A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
feature information
electronic device
illegal
Prior art date
Application number
PCT/CN2016/097745
Other languages
English (en)
Chinese (zh)
Inventor
江秀
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Priority to PCT/CN2016/097745 priority Critical patent/WO2018040045A1/fr
Priority to CN201680002703.5A priority patent/CN106716429A/zh
Publication of WO2018040045A1 publication Critical patent/WO2018040045A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present disclosure relates to the field of electronic device security monitoring, and in particular to a monitoring method, device, and electronic device.
  • an electronic device when an electronic device performs some sensitive operations, it is required to authenticate the user identity.
  • the electronic device performs this operation when it is confirmed that the user identity is legal.
  • the electronic device does not perform the operation.
  • This mechanism can prevent illegal users from illegally using electronic devices to a certain extent.
  • an illegal user forges the identity authentication information of the legitimate user, the illegal user can perform the illegal operation on the electronic device through the authentication of the electronic device. In this way, it is easy to cause problems such as leakage of user information and damage to user property.
  • the present disclosure provides a monitoring method, apparatus, computer program product, non-transitory computer readable storage medium, and electronic device.
  • a monitoring method applied to an electronic device includes: acquiring user feature information when the user is not aware, the user feature information being used to confirm whether the current user is Is an illegal user; in the authentication information entered according to the user When the user is determined to be legal, the current user is confirmed as an illegal user according to the user characteristic information, and the identity authentication information is used to confirm whether the target authentication operation is allowed; and the current user is confirmed to be illegal according to the user feature information.
  • the specified security action is performed when the user is on.
  • a monitoring apparatus applied to an electronic device, and the apparatus includes: an acquisition module configured to acquire user characteristic information without a user's perception, the user characteristic information
  • the confirmation module is configured to: when determining that the user is legal according to the identity authentication information input by the user, confirming whether the current user is an illegal user according to the user feature information, and the identity authentication information For confirming whether the target authentication operation is allowed; the execution module is configured to perform the specified security operation when confirming that the current user is an illegal user according to the user characteristic information.
  • a computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion of the above monitoring method is executed.
  • a non-transitory computer readable storage medium comprising one or more programs for performing The above monitoring method.
  • an electronic device comprising: the non-transitory computer readable storage medium described above; and one or more processors for executing the non-transitory computer Read the program in the storage medium.
  • the technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: by the above technical solution, even if an illegal user breaks or falsifies the identity authentication information of the legitimate user and successfully enters the electronic device, the electronic device may obtain the current user by acquiring the current user. User feature information to perform secondary verification of the identity of the user. When the secondary verification result indicates that the user is an illegal user, the specified security operation is performed, thereby improving the security of use of the electronic device, effectively reducing leakage of user information and damage to user property caused by illegal operation of the electronic device. And so on.
  • the child device acquires the user feature information without the user's perception, so that the current user is not aware of the situation, thereby reducing the possibility that the user feature information is intentionally imitated or forged by the illegal user, thereby further improving the identity of the current user.
  • the accuracy of the certification is a measure of the accuracy of the certification.
  • FIG. 1A is a schematic diagram of an implementation environment, according to an exemplary embodiment.
  • FIG. 1B is a schematic diagram of an implementation environment, according to another exemplary embodiment.
  • FIG. 2A is a flow chart of a monitoring method, according to an exemplary embodiment.
  • FIG. 2B is a flowchart of a monitoring method according to another exemplary embodiment.
  • FIG. 3 is a schematic diagram of applying the above monitoring method to a screen unlocking scene according to an exemplary embodiment.
  • FIG. 4 is a schematic diagram of a method for applying the above monitoring method to an access unlocking scene according to an exemplary embodiment.
  • FIG. 5 is a schematic diagram of applying the foregoing monitoring method to a payment application scenario according to an exemplary embodiment.
  • FIG. 6 is a block diagram of a monitoring apparatus, according to an exemplary embodiment.
  • FIG. 7 is a block diagram of a monitoring apparatus, according to an exemplary embodiment.
  • FIG. 1A is a schematic diagram of an implementation environment, according to an exemplary embodiment.
  • the implementation environment can include an electronic device 100.
  • the electronic device 100 may be, for example, an intelligent robot, a smart phone, a tablet, a personal digital assistant (PDA), a PC, a notebook computer, an access control unlocking device, or the like.
  • the electronic device 100 is a smart phone as an example.
  • FIG. 1B is a schematic diagram of an implementation environment, according to another exemplary embodiment.
  • the implementation environment may include an electronic device 100 and a cloud server 200.
  • the electronic device 100 and the cloud server 200 can communicate through various wired or wireless modes.
  • the electronic device 100 communicates with the cloud server 200 via WiFi, Bluetooth, 2G, 3G, 4G, and the like.
  • the electronic device 100 can upload data to the cloud server 200 so that the cloud server 200 performs operations such as data storage, data processing, and the like.
  • FIG. 2A is a flowchart of a monitoring method, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to an exemplary embodiment. As shown in FIG. 2A, the method can include:
  • step 201 user feature information is acquired without the user's perception, and the user feature information is used to confirm whether the current user is an illegal user.
  • the electronic device acquires user feature information in a silent manner, and the user feature information may be used to confirm whether the current user is an illegal user.
  • the user feature information may include biometric information of the current user, wherein the biometric information may include, for example but not limited to, at least one of the following: facial feature information, iris feature information, and voiceprint feature. Information, fingerprint feature information, etc.
  • the electronic device may acquire the image information of the current user in a silent manner by configuring the camera thereon, and analyze the image to obtain the face feature information and the iris feature information. .
  • the electronic device can acquire the sound information of the current user in a silent manner through a microphone disposed thereon, and analyze the sound information to obtain voiceprint feature information.
  • the electronic device can collect the fingerprint information of the current user in a silent manner through the fingerprint sensor configured thereon, and analyze the fingerprint information to obtain fingerprint feature information.
  • the user feature information may further include current user operation feature information, wherein the user operation feature information may include, for example but not limited to, at least one of the following: the user is implementing The location at the time of operation, the time when the user performed the operation, the network information of the network to which the electronic device is connected when the user performs the operation, and the like.
  • step 201 the user feature information of the current user can be obtained without the user's perception, and the user does not need to interact with the user. In this way, the illegal user does not know this in advance, and it is not easy to forge the user characteristic information of the legitimate user.
  • step 202 when it is determined that the user is legal according to the identity authentication information input by the user, it is confirmed according to the user feature information whether the current user is an illegal user, wherein the identity authentication information is used to confirm whether the target authentication operation is allowed.
  • the target authentication operation refers to any of the operations in the electronic device that require the user to perform identity authentication and can be performed after the authentication is passed.
  • the target authentication operation may include, for example but not limited to, at least one of a screen unlocking operation, an access unlocking operation, an application login or payment operation, and the like.
  • the application may include a social application, an address book application, a financial application, an application with a payment function, and the like.
  • the identity authentication information can be used to confirm whether the target authentication operation is allowed.
  • the identity authentication information may include, but is not limited to, at least one of the following: digital cryptographic information, graphical cryptographic information, biometric cryptographic information, and the like.
  • the biometric cryptographic information may include, for example but not limited to, at least one of the following: face feature information, iris feature information, fingerprint feature information, voiceprint feature information, and the like.
  • the electronic device When the user wants to perform the target authentication operation, the electronic device prompts the user to input the identity authentication information. After the electronic device receives the identity authentication information input by the user, the electronic device may match the received identity authentication information with the identity authentication information that is preset in the electronic device and belongs to the legal user. When the identity authentication information received by the electronic device matches the preset identity authentication information belonging to the legitimate user, it is determined that the current user is legal. When the identity authentication information received by the electronic device does not match the preset identity authentication information that belongs to the legal user, it is determined that the current user is illegal. At this time, the electronic device may prohibit the current user from performing the target authentication operation.
  • the electronic device may send the received identity authentication information to the cloud server, to determine whether the user is legal by the cloud server.
  • the manner in which the cloud server determines whether the user is legal according to the received identity authentication information is similar to the manner described above on the electronic device side, and details are not described herein again.
  • the cloud server may return an authentication result to the electronic device, where the authentication result may indicate whether the user is legal. In this way, by analyzing the authentication result, the electronic device can know whether the current user is legal.
  • the electronic device may confirm whether the current user is an illegal user according to the user feature information acquired in step 201 to implement secondary authentication of the user identity.
  • the electronic device may match the acquired user feature information with a pre-stored user feature (the pre-stored user feature is a user feature of a legitimate user), and confirm whether the current user is based on the matching result. It is an illegal user. For example, when the acquired user feature information does not match the user feature pre-stored in the electronic device, the electronic device may confirm that the current user is an illegal user; when the acquired user feature information matches the user feature pre-stored in the electronic device, the electronic The device can confirm that the current user is a legitimate user.
  • the pre-stored user feature is a user feature of a legitimate user
  • the electronic device may send the acquired user feature information to the cloud server, to confirm, by the cloud server, whether the current user is an illegal user according to the user feature information.
  • the cloud server determines whether the user is illegal according to the received user characteristic information. The manner is similar to the manner described above on the electronic device side, and details are not described herein again.
  • the cloud server may send an indication message to the electronic device to characterize whether the current user is an illegal user. In this way, the electronic device can confirm whether the current user is an illegal user according to the indication message.
  • the user feature information acquired in step 201 may include biometric information of the current user.
  • the electronic device or the cloud server confirms whether the current user is an illegal user by matching the acquired biometric information with a pre-stored biometric that belongs to the legal user.
  • the user feature information acquired in step 201 may include current user operation feature information.
  • the electronic device or the cloud server can confirm whether the current user is an illegal user by matching the current user operation feature information with the previously stored historical user operation feature information. The embodiment is based on the current user operation feature information and the historical user operation feature information to determine whether the current user's use of the electronic device conforms to the usage habit of the legitimate user of the electronic device, and thereby confirms whether the current user is an illegal user. .
  • the current user is an illegal user: the current user's location does not belong to the historical user's location; the current user operation time does not belong to the historical user operation time; The network that the device is currently accessing does not belong to the network that the electronic device has historically accessed.
  • step 203 when it is confirmed that the current user is an illegal user according to the user characteristic information, the specified security operation is performed.
  • the electronic device may perform an alarm operation, for example, an alarm sound to alert the current user or other persons around the current user.
  • the electronic device may send the alarm information to the designated user to notify the designated user that the electronic device is currently being illegally operated.
  • the electronic device can send the alarm information by sending an email, a short message, a social application message, and the like to the designated user.
  • the designated user may include a legitimate user of the electronic device, and may also include any user specified by the legitimate user, for example, a relative of the legitimate user, a friend, and the like.
  • the electronic device may perform the permission control operation according to the preset permission rule. For example, if the user successfully logs in to an application by using the identity authentication information, when the electronic device confirms that the user is an illegal user through the secondary authentication process, the user may be controlled to use the current login application. Or all features. For example, the authority of the user is controlled such that the user data under the application cannot be browsed, the message cannot be sent out through the application, the payment, transfer, remittance, and the like involve financial transactions, and the like.
  • the electronic device may send the identity authentication information and/or the user feature information to the cloud server, so that the cloud server is illegal.
  • the identity authentication information used by the user and/or the user feature information of the illegal user are archived, which facilitates real identity confirmation, location tracking, and the like for the illegal user.
  • the electronic device can obtain the identity of the user by acquiring the user characteristic information of the current user. Secondary verification.
  • the secondary verification result indicates that the user is an illegal user
  • the specified security operation is performed, thereby improving the security of use of the electronic device, effectively reducing leakage of user information and damage to user property caused by illegal operation of the electronic device. And so on.
  • the electronic device acquires user feature information without the user's perception, so that the current user is not aware of the situation, thereby reducing the possibility that the user feature information is intentionally imitated or forged by the illegal user, thereby further improving the current user.
  • the accuracy of the identity authentication is based on which the user is an illegal user.
  • FIG. 2B is a flowchart of a monitoring method, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to another exemplary embodiment. As shown in FIG. 2B, the foregoing monitoring method may further include:
  • step 204 when it is determined that the user is legitimate according to the identity authentication information input by the user, the user is allowed to perform the target authentication operation.
  • the user when the illegal user breaks or falsifies the identity authentication information and successfully enters the electronic device, the user is allowed to perform the target authentication operation, thereby reducing the alertness of the illegal user, making it difficult to detect, so that it is not perceived. In the case of successful acquisition of its user feature information, the monitoring is more concealed.
  • the electronic device may acquire user feature information when the user inputs the identity authentication information without the user's perception.
  • the electronic device acquires the user feature information in a silent manner while inputting the identity authentication information, and the electronic device can perform two-factor authentication on the identity authentication information and the user feature information to determine that the current user is a legitimate user. . Even if the electronic device is later used by others, these other persons are not judged to be illegal users, and thus the specified security operation is not performed, thereby improving the practicability of the above scheme.
  • FIG. 3 is a schematic diagram of applying the above monitoring method to a screen unlocking scene according to an exemplary embodiment.
  • the user successfully unlocks by entering a numeric password and enters the interface of the electronic device.
  • the camera 102 of the electronic device 100 can acquire the user face feature information in a silent manner.
  • the user operation authority is controlled at this time. For example, when a user clicks on an app, the electronic device does not respond and the user cannot use any application.
  • FIG. 4 is a schematic diagram of a method for applying the above monitoring method to an access unlocking scene according to an exemplary embodiment.
  • the user successfully opens the access lock through the forged fingerprint sleeve 401.
  • the access unlocking device 400 acquires the iris characteristic information of the user in a silent manner through the camera 402.
  • the access control unlocking device 400 controls the alarm 403 to perform an alarm, and can send an alarm information to the administrator to notify the administrator.
  • FIG. 5 is a schematic diagram of applying the foregoing monitoring method to a payment application scenario according to an exemplary embodiment.
  • the user successfully logs in to the payment application by inputting the username and the login password.
  • the fingerprint sensor built in the electronic device acquires the fingerprint feature information of the user in a silent manner.
  • the functions of the financial transaction such as transfer, remittance, and payment, of the application are disabled.
  • FIG. 6 is a block diagram of a monitoring device 600, which may be applied to an electronic device, such as the electronic device 100 illustrated in FIG. 1A or FIG. 1B, according to an exemplary embodiment.
  • the apparatus 600 may include: an obtaining module 601 configured to acquire user feature information when the user is not aware, the user feature information is used to confirm whether the current user is an illegal user; and the confirmation module 602, When it is determined that the user is legal according to the identity authentication information input by the user, whether the current user is an illegal user is confirmed according to the user feature information acquired by the obtaining module 601, and the identity authentication information is used to confirm the target. Whether the authentication operation is permitted; the execution module 603 is configured to perform the specified security operation when it is confirmed that the current user is an illegal user according to the user characteristic information.
  • the apparatus 600 may further include: a target authentication operation permitting module configured to allow the user to perform a target authentication operation when determining that the user is legal according to the identity authentication information input by the user.
  • a target authentication operation permitting module configured to allow the user to perform a target authentication operation when determining that the user is legal according to the identity authentication information input by the user.
  • the confirmation module 602 may include: a first confirmation submodule configured to match the user feature information with a pre-stored user feature, and confirm the current use according to the matching result. Whether the user is an illegal user; or the confirmation module 402 may include: a first sending submodule configured to send the user feature information to a cloud server, to confirm, by the cloud server, the current user profile information Whether the user is an illegal user; the second confirmation sub-module is configured to receive an indication message sent by the cloud server for characterizing whether the current user is an illegal user, and confirm, according to the indication message, whether the current user is an illegal user.
  • the first confirmation submodule is configured to match the current user operation feature information with the stored history user operation feature information, wherein the user operation feature information may include at least one of the following The location of the user, the operation time of the user, and the network information of the network accessed by the electronic device.
  • the execution module 603 may include at least one of: an alarm sub-module configured to perform an alarm operation; an alarm information transmission sub-module configured to send alarm information to a designated user; and an authority control sub-module,
  • the second transmission sub-module is configured to send the identity authentication information and/or the user feature information to the cloud server.
  • the obtaining module 601 may be configured to acquire user feature information when the user inputs the identity authentication information without the user being aware.
  • FIG. 7 is a block diagram of a monitoring device 700, which may be an electronic device, according to an exemplary embodiment.
  • the apparatus 700 can include a processor 701, a memory 702, a multimedia component 703, an input/output (I/O) interface 704, and a communication component 705.
  • the processor 701 is configured to control the overall operation of the apparatus 700 to complete all or part of the above monitoring methods.
  • Memory 702 is used to store various types of data to support operations at the device 700, such as may include instructions for any application or method operating on the device 700, as well as application related data, such as Contact data, receipt Send messages, pictures, audio, videos, and more.
  • the memory 702 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read only memory ( Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read Only Read-Only Memory (ROM), magnetic memory, flash memory, disk or optical disk.
  • the multimedia component 703 can include a screen and an audio component.
  • the screen may be, for example, a touch screen, and the audio component is used to output and/or input an audio signal.
  • the audio component can include a microphone for receiving an external audio signal.
  • the received audio signal may be further stored in memory 702 or transmitted via communication component 705.
  • the audio component also includes at least one speaker for outputting an audio signal.
  • the I/O interface 704 provides an interface between the processor 701 and other interface modules.
  • the other interface modules may be keyboards, mice, buttons, and the like. These buttons can be virtual buttons or physical buttons.
  • Communication component 705 is used for wired or wireless communication between the device 500 and other devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so the corresponding communication component 705 can include: Wi-Fi module, Bluetooth module, NFC module.
  • the device 700 may be configured by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), and digital signal processing devices (Digital Signal Processors).
  • ASICs Application Specific Integrated Circuits
  • DSPs Digital Signal Processors
  • Digital Signal Processors Digital Signal Processors
  • DSPD Processing Device
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic components Used to perform the above monitoring method.
  • a computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion used to perform the monitoring method described above.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 702 comprising instructions executable by processor 701 of apparatus 700 to perform the monitoring method described above.
  • the non-transitory computer readable storage medium can be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Alarm Systems (AREA)

Abstract

La présente invention concerne un procédé, appareil de surveillance et un dispositif électronique. Le procédé comporte les étapes consistant à: acquérir des informations de caractéristiques d'utilisateur sans qu'un utilisateur le perçoive; lors de la détermination de la validité de l'utilisateur d'après les informations d'authentification d'identité saisies par l'utilisateur, confirmer si l'utilisateur actuel est un utilisateur non valide d'après les informations de caractéristiques d'utilisateur, les informations d'authentification d'identité étant utilisées pour confirmer si une opération d'authentification visée est autorisée ou non; et effectuer une opération de sécurité désignée lorsqu'il est confirmé, d'après les informations de caractéristiques d'utilisateur, que l'utilisateur actuel est un utilisateur non valide. Par conséquent, même si l'utilisateur non valide réussit à accéder au dispositif électronique en forçant ou en falsifiant les informations d'authentification d'identité de l'utilisateur valide, le dispositif électronique peut effectuer une validation secondaire sur l'identité de l'utilisateur en acquérant les informations de caractéristiques d'utilisateur de l'utilisateur actuel. Lorsque le résultat de validation secondaire indique que l'utilisateur est un utilisateur non valide, l'opération de sécurité désignée est effectuée, renforçant ainsi la sécurité d'utilisation du dispositif électronique et évitant des problèmes comme la divulgation d'informations de l'utilisateur et la perte de biens de l'utilisateur, etc.
PCT/CN2016/097745 2016-08-31 2016-08-31 Procédé, appareil de surveillance et dispositif électronique WO2018040045A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2016/097745 WO2018040045A1 (fr) 2016-08-31 2016-08-31 Procédé, appareil de surveillance et dispositif électronique
CN201680002703.5A CN106716429A (zh) 2016-08-31 2016-08-31 监控方法、装置及电子设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/097745 WO2018040045A1 (fr) 2016-08-31 2016-08-31 Procédé, appareil de surveillance et dispositif électronique

Publications (1)

Publication Number Publication Date
WO2018040045A1 true WO2018040045A1 (fr) 2018-03-08

Family

ID=58904010

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/097745 WO2018040045A1 (fr) 2016-08-31 2016-08-31 Procédé, appareil de surveillance et dispositif électronique

Country Status (2)

Country Link
CN (1) CN106716429A (fr)
WO (1) WO2018040045A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055472A (zh) * 2021-03-11 2021-06-29 北京德风新征程科技有限公司 一种基于安全认证的物联网数据控制方法及装置

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107437016B (zh) * 2017-07-11 2020-05-26 Oppo广东移动通信有限公司 应用控制方法及相关产品
CN107423604B (zh) * 2017-07-11 2021-03-09 Oppo广东移动通信有限公司 应用控制方法及相关产品
CN108563933A (zh) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 应用程序的控制方法、装置、存储介质及移动终端
CN108647510A (zh) * 2018-05-16 2018-10-12 阿里巴巴集团控股有限公司 应用程序访问方法及装置
CN110827021A (zh) * 2019-10-24 2020-02-21 海南新软软件有限公司 数字资产提取监测方法及装置
CN113438272A (zh) * 2021-05-20 2021-09-24 江苏谷德运维信息技术有限公司 一种基于大数据的安全监控系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609695A (zh) * 2012-02-14 2012-07-25 上海博物馆 一种多角度人脸识别方法及系统
WO2015137645A1 (fr) * 2014-03-13 2015-09-17 엘지전자 주식회사 Terminal mobile et son procédé de commande
CN105516961A (zh) * 2015-12-09 2016-04-20 上海斐讯数据通信技术有限公司 无感知认证方法系统,基于该方法系统的控制方法、系统
CN105656851A (zh) * 2014-11-13 2016-06-08 腾讯数码(深圳)有限公司 一种信息验证的方法、用户终端、服务器及系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664903A (zh) * 2012-05-16 2012-09-12 李明 一种网络用户验证方法及系统
CN105809005A (zh) * 2016-03-29 2016-07-27 四川效率源信息安全技术股份有限公司 一种基于指纹锁定/解锁电脑屏幕的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609695A (zh) * 2012-02-14 2012-07-25 上海博物馆 一种多角度人脸识别方法及系统
WO2015137645A1 (fr) * 2014-03-13 2015-09-17 엘지전자 주식회사 Terminal mobile et son procédé de commande
CN105656851A (zh) * 2014-11-13 2016-06-08 腾讯数码(深圳)有限公司 一种信息验证的方法、用户终端、服务器及系统
CN105516961A (zh) * 2015-12-09 2016-04-20 上海斐讯数据通信技术有限公司 无感知认证方法系统,基于该方法系统的控制方法、系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055472A (zh) * 2021-03-11 2021-06-29 北京德风新征程科技有限公司 一种基于安全认证的物联网数据控制方法及装置
CN113055472B (zh) * 2021-03-11 2022-09-09 北京德风新征程科技有限公司 一种基于安全认证的物联网数据控制方法及装置

Also Published As

Publication number Publication date
CN106716429A (zh) 2017-05-24

Similar Documents

Publication Publication Date Title
US11341475B2 (en) System and method of notifying mobile devices to complete transactions after additional agent verification
WO2018040045A1 (fr) Procédé, appareil de surveillance et dispositif électronique
US11847199B2 (en) Remote usage of locally stored biometric authentication data
US10735412B2 (en) Use of a biometric image for authorization
US20220021664A1 (en) Device Identification Scoring
US20220058255A1 (en) Biometric authentication
US20220075856A1 (en) Identifying and authenticating users based on passive factors determined from sensor data
US10440019B2 (en) Method, computer program, and system for identifying multiple users based on their behavior
KR102038851B1 (ko) 신원들을 검증하기 위한 방법 및 시스템
CN107735999B (zh) 基于设备功能和用户请求通过多个途径的认证
KR101571741B1 (ko) 소셜 네트워크들에 대한 사용자-기반 식별 시스템
US20220122088A1 (en) Unified login biometric authentication support
CN107800672B (zh) 一种信息验证方法、电子设备、服务器及信息验证系统
US20140230019A1 (en) Authentication to a first device using a second device
US20180107813A1 (en) User Authentication Persistence
KR20170015091A (ko) 모바일 전화번호 및 개인정보를 이용한 본인 인증 시스템 및 방법
KR102633314B1 (ko) 인증 정보 처리 방법 및 장치와 인증 정보 처리 방법 장치를 포함한 사용자 단말
KR101719687B1 (ko) 스마트 기기와 그를 활용한 본인인증 시스템 및 방법
JP6273240B2 (ja) 継承システム、サーバ装置、端末装置、継承方法及び継承プログラム
KR102593260B1 (ko) 생체정보 템플릿을 이용한 좌석 이탈 관리 방법 및 장치
KR101986244B1 (ko) 모바일 기기 기반의 생체인식 정보 검증 방법
KR20170111942A (ko) 고유정보연동 오티피(otp) 방식의 전자 인증 방법 및 전자 인증 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16914611

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07/06/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16914611

Country of ref document: EP

Kind code of ref document: A1