CN105262747A - Polymorphic terminal identity verification system and method based on biological characteristic recognition - Google Patents

Polymorphic terminal identity verification system and method based on biological characteristic recognition Download PDF

Info

Publication number
CN105262747A
CN105262747A CN201510662905.XA CN201510662905A CN105262747A CN 105262747 A CN105262747 A CN 105262747A CN 201510662905 A CN201510662905 A CN 201510662905A CN 105262747 A CN105262747 A CN 105262747A
Authority
CN
China
Prior art keywords
user
auditing system
message
safety auditing
biological characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510662905.XA
Other languages
Chinese (zh)
Inventor
李营那
吴松洋
金波
张涛
王磐
张瑜
陈以山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN201510662905.XA priority Critical patent/CN105262747A/en
Publication of CN105262747A publication Critical patent/CN105262747A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to a polymorphic terminal identity verification system and method based on biological characteristic recognition. The system comprises a biological characteristic acquiring terminal, audit terminals, a security audit system, and a security audit control center. The biological characteristic acquiring terminal is a fingerprint acquiring instrument. According to the polymorphic terminal identity verification system and method based on biological characteristic recognition, the fingerprint characteristic of an operator is acquired by the fingerprint acquiring instrument rather than the fingerprint acquiring functions of various terminals. Thus, the consistency of polymorphic terminal acquisition fingerprint standards is guaranteed and a fingerprint identification and matching method is suitable for various terminals manufactured by different manufacturers. The users of the security audit system become valid users after the authorization of the security audit control center rather than local registration. Thus, user authorization and registration are further standardized and further protection is provided for the data security of the security audit system. The polymorphic terminal identity verification system and method are wide in application range.

Description

Based on polymorphic terminal identity verification system and the method for living things feature recognition
Technical field
The present invention relates to information security field, particularly relate to security audit, specifically refer to a kind of polymorphic terminal identity verification system based on living things feature recognition and method.
Background technology
The fail safe of current every profession and trade to data is more and more paid attention to, and various safety auditing system is also progressively used, and how to ensure that the fail safe of safety auditing system data becomes one, security audit aspect major issue.Existing safety auditing system is generally certification and the access control of being carried out security audit user identity by the method for " user ID+password ".The following Shortcomings of this mode: first, the password more complicated that user is generally arranged in order to safety, cause user to forget Password, and it is more loaded down with trivial details to give cryptographic processes for change; Secondly, in order to prevent forgetting Password, user often use such as birthday, cell-phone number etc. easily by the character string guessed as password, the easy like this password that causes is revealed, and there is potential safety hazard.The present invention, considering current finger print recognition technology comparative maturity, under the factor of advantage of lower cost, utilizes fingerprint identification technology, gives a kind of terminal identity verification method based on living things feature recognition.Existing safety auditing system generally adopts the mode of local registration, local examination & verification, local verification, and namely can not log in the safety auditing system at other the user of this locality registration, user can not share.The present invention proposes the registration of a kind of this locality, concentrates examination & verification, concentrates the user authentication method of authorizing.
Summary of the invention
The object of the invention is the shortcoming overcoming above-mentioned prior art, provide and a kind ofly overcome existing safety auditing system auth method, the polymorphic terminal identity verification system based on living things feature recognition of deficiency of communication for service secure context and method.
To achieve these goals, the polymorphic terminal identity verification system based on living things feature recognition of the present invention and method have following formation:
Should based on the polymorphic terminal identity verification system of living things feature recognition, its main feature is, described system comprises:
Biological characteristic acquisition device, in order to obtain the biological characteristic of user;
Audit terminal, in order to when new user registers, new user's registration service that access security auditing system provides also obtains the essential information of new user, and the essential information of described new user and the biological characteristic corresponding with this new user are formed the log-on message of this new user, and this log-on message is sent to described safety auditing system; And when subscriber authentication, obtain the essential information of user, and the biological characteristic of this essential information and user is sent to safety auditing system;
Safety auditing system, in order to when new user registers, is stored to local data base by described log-on message, and this log-on message is sent to security audit control centre; And when subscriber authentication, the information in the essential information of audit terminal transmission and the biological characteristic of user and safety auditing system local data base is compared;
Security audit control centre, in order to audit the log-on message that safety auditing system sends, and gives satisfactory subscriber authorisation, and authorization message is issued to safety auditing system.
Further, described biological characteristic acquisition device is fingerprint instrument, in order to obtain the fingerprint of user.
Further, described audit terminal comprises:
New user registration module, the new user's registration service provided in order to access security auditing system also obtains the essential information of new user, and the essential information of described new user and the biological characteristic corresponding with this new user are formed the log-on message of this new user, and this log-on message is sent to described safety auditing system;
Subscriber authentication module, in order to obtain the essential information of user, and is sent to safety auditing system by the biological characteristic of this essential information and user;
Security audit data module, in order to provide data to check service to the user be proved to be successful.
Further, described safety auditing system comprises:
First user administration module, in order to store log-on message and the authorization message of user;
Audit log logging modle, in order to store the audit information of user;
Audit information reports administration module, in order to the audit information of user is reported to security audit control centre;
And system log management module.
Further, described security audit control centre comprises:
Second user management module, in order to store log-on message and the authorization message of user;
Security audit server management module, in order to audit the log-on message that safety auditing system sends, and gives satisfactory subscriber authorisation, and authorization message is issued to safety auditing system;
Security audit Service Data Management module, in order to the operation information of storage security audit server administration module;
And audit termination management module.
The invention still further relates to a kind of polymorphic terminal identity verification method based on living things feature recognition, its main feature is, described method comprises the following steps:
(1) new user sends log-on message by described biological characteristic acquisition device and described audit terminal to described safety auditing system;
(2) described log-on message is sent to described security audit control centre by the safety auditing system described in;
(3) log-on message that the security audit control centre examination & verification safety auditing system described in sends, and give satisfactory subscriber authorisation, and authorization message is issued to safety auditing system.
Further, described step (1) specifically comprises the following steps:
(1.1) the biological characteristic acquisition device described in obtains the biological characteristic of user;
(1.2) new user's registration service that the audit terminal access safety auditing system described in provides also obtains the essential information of new user, and the essential information of described new user and the biological characteristic corresponding with this new user are formed the log-on message of this new user, and this log-on message is sent to described safety auditing system.
Further, described step (2) specifically comprises the following steps:
(2.1) log-on message described in the safety auditing system described in is stored to local data base;
(2.2) described log-on message is sent to described security audit control centre by the safety auditing system described in.
Further, described step (3) specifically comprises the following steps:
(3.1) log-on message that described safety auditing system sends is saved to the local data base of described security audit control centre by the security audit control centre described in;
(3.2) log-on message that the security audit control centre examination & verification safety auditing system described in sends, and the authorization message of satisfactory user is issued to safety auditing system.
Again further, described is issued to safety auditing system by the authorization message of satisfactory user, is specially:
The authorization message of satisfactory user and the log-on message corresponding with this user are issued to several safety auditing system.
Further, further comprising the steps of after described step (3):
(4) the biological characteristic acquisition device described in obtains the biological characteristic of user;
(5) the audit terminal described in obtains the essential information of user, and described biological characteristic and essential information are sent to described safety auditing system;
(6) whether the biological characteristic described in the safety auditing system described in judges and essential information meet the requirements;
(7) if described biological characteristic and essential information meet the requirements, then described safety auditing system provides corresponding security audit data to described user;
(8) if described biological characteristic and essential information undesirable, then described safety auditing system sends the information of authentication failure to described audit terminal;
(9) information of the audit terminal demonstration authentication failure described in.
Further, whether the biological characteristic described in described safety auditing system judges and essential information meet the requirements, and are specially:
(6.1) safety auditing system described in adopt increase income that described biological characteristic and essential information and local data base have been authorized by SDKSourceAFIS method and in the fingerprint characteristic comparison one by one of the user of the term of validity;
(6.2) whether the biological characteristic described in the safety auditing system described in judges according to comparing result and essential information meet the requirements.
Have employed the polymorphic terminal identity verification system based on living things feature recognition in this invention and method, based on fingerprint identification technology, authentication mandate is carried out to operator, ensure that normalization, the legitimacy of the fail safe of safety auditing system, audit user operation; Adopt the fingerprint characteristic of fingerprint acquisition instrument acquisition operations person and finger print collecting function that each terminal of non-usage carries ensure that polymorphic terminal gathers the consistency of fingerprint standard, the various terminal making fingerprint recognition and matching process be applicable to different vendor to produce; The user of each safety auditing system to issue after being authorized by security audit control centre and to be the validated user further specification mandate of user, registration after non-local registration, and the fail safe for safety auditing system data provides many one and heavily protects.
Accompanying drawing explanation
Fig. 1 is the structural representation of the polymorphic terminal identity verification system based on living things feature recognition of the present invention.
Fig. 2 is the structural representation of audit terminal of the present invention.
Fig. 3 be in one embodiment of the invention safety auditing system to the rate-determining steps flow chart of communicated tokens.
Fig. 4 is the structural representation of safety auditing system of the present invention.
Fig. 5 is the structural representation of security audit control centre of the present invention.
Fig. 6 is the flow chart of steps of the polymorphic terminal identity verification method based on living things feature recognition of the present invention.
Embodiment
In order to more clearly describe technology contents of the present invention, conduct further description below in conjunction with specific embodiment.
The present invention relates to fingerprint identification technology, utilize the characteristic of fingerprint to realize authentication to the user of service of the polymorphic terminals such as mobile phone, flat board, notebook, guarantee the fail safe of normalization that safety auditing system accesses, safety auditing system data.
The present invention relates to fingerprint recognition and security audit field.The present invention is based on fingerprint identification technology, give a kind of auth method supporting polymorphic terminal, authentication process itself based on fingerprint be by a collection in worksite to fingerprint carry out comparison one by one, the process determined one's identity with registered fingerprint.What the present invention adopted is authentication process itself based on the Internet, and its network design figure as shown in Figure 1, relates generally to security audit control centre system, safety auditing system, terminal and fingerprint acquisition instrument four part.
Polymorphic terminal is portable set can be smart mobile phone, flat board and notebook computer, and be the entrance that user carries out authentication, access embody rule, terminal can connect certificate server by wired or wireless mode.The Audit data representing safety auditing system storage of endgame visualization, provides user to register and user authentication feature simultaneously, and its composition as shown in Figure 2.The essential information that user registration module gathers user and the many groups fingerprint characteristic using fingerprint acquisition instrument to collect, it can be used as the information reporting of a mark user to safety auditing system.Subscriber authentication module receives the user fingerprints feature collected by fingerprint acquisition instrument, is reported connected safety auditing system and carries out user rs authentication, can be logged in by the user of user rs authentication; Simultaneously safety auditing system to be terminal distribution term of validity the be communicated tokens of 30 minutes, other service that terminal access safety auditing system provides as audit log check, early warning information is checked etc. needs to use the required parameter of this communicated tokens cryptographic services as a head parameter Authorization; First the service request that safety auditing system receives terminal resolves Authorization character string acquisition terminal use communicated tokens, if failure, and compulsory withdrawal system; This token compares with the token in local token pond by success again, and it fails to match, then compulsory withdrawal system; The match is successful then uses other parameter of this token cryptographic services to generate character string Authorization1, Authorization and Authorization1 is compared, not identical, then compulsory withdrawal system, identical, the term of validity of this token is set to 30 minutes again, return the result of terminal request, its process as shown in Figure 3 simultaneously.
Safety auditing system connects application server and terminal, is the bridge that security audit control centre communicates with portable terminal.The major function of safety auditing system as shown in Figure 4, mainly stores Audit data and is reported to control centre after being analyzed by Audit data in audit management; In user authentication, mainly accept user's registration information that portable terminal reports and be stored in local data base, regularly the user's registration information that this locality stores will be reported to security audit control centre; Accept the authorized user message that security information control centre issues, be stored in local data base; Accept the user rs authentication request of portable terminal, the fingerprint characteristic of all authorized users before the deadline that the user fingerprints feature provided by portable terminal and security audit control centre the issue user of endpoint registration (but not by) adopts and carries out comparison one by one with the identity of authentication of users based on going here and there the Feature Correspondence Algorithm of distance.Safety auditing system is per hour to carry out heartbeat detection with security audit control centre and generates a communicated tokens reporting security audit control centre, the each service call of safety auditing system and security audit control centre all needs to use up-to-date token cryptographic service request parameter, specific implementation as the communication of terminal and safety auditing system, as shown in Figure 3.
Security audit control centre system mainly manages safety system system, security audit user, audit terminal, and add up etc. the Audit data of each safety auditing system, it mainly forms as shown in Figure 5.User management carries out review operations to the user reported, security audit Authorized operation can be carried out to it: select the one or more safety auditing systems that will authorize to auditing the user passed through, the term of validity is authorized in setting, after determining by subscriber authorisation to multiple safety auditing system, control centre is in real time by authorized user message: fingerprint characteristic, user basic information, the term of validity are issued to authorized multiple safety auditing systems.Security audit control centre descends photos and sending messages to all calling corresponding safety auditing system up-to-date token cryptographic service request parameter during safety auditing system at every turn, specific implementation as the communication of terminal and safety auditing system, as shown in Figure 3.
In order to increase the fail safe of system, comprise fingerprint characteristic, the access request of user, Audit data all through XOR encryption in portable terminal, all data of transmitting between safety auditing system and security audit control centre, data receiver receives data to be needed first just can obtain correct data according to the password to decipher of setting.Meanwhile, fingerprint characteristic and relevant user authentication, log-on message are all kept in the local data base of safety auditing system and security audit control centre, and this database can only be accessed by local process, in case user profile is revealed.
A kind of polymorphic its flow process of terminal identity verification technique based on living things feature recognition as shown in Figure 6, mainly contains three processes: new user's registration, the mandate of security audit control centre, subscriber authentication.
User carries out personal information registration by portable terminal, typing user basic information is as user name, contact method etc., and organize finger print information by fingerprint acquisition instrument collection more, user's registration service that portable terminal access security auditing system provides, reports safety auditing system by new user's registration information; Safety auditing system receives user's registration information and is stored in the local data base of safety auditing system, then all user's registration informations is reported security audit control centre; The user's registration information that security audit control centre reception safety auditing system reports also is stored in local data base.
The keeper of security audit control centre carries out review operations to all pending user's registration informations in this locality, multiple safety auditing system can be authorized for auditing the user passed through, and authorization message is comprised user basic information, the term of validity etc. and be issued to authorized safety auditing system, only have and authorize this safety auditing system and user within the mandate phase just can by the authentication of safety auditing system, and then other service that access security auditing system provides.
When user carries out authentication, fingerprint acquisition instrument first by connecting portable terminal gathers fingerprint, the safety auditing system that the finger print information of user sends to terminal to connect by terminal, safety auditing system adopt increase income that the fingerprint characteristic of acceptance and local data base have been authorized by SDKSourceAFIS method and in the fingerprint characteristic comparison one by one of the user of the term of validity, if the user in limited period can be matched, by authentication, otherwise authentication failure.
Have employed the polymorphic terminal identity verification system based on living things feature recognition in this invention and method, based on fingerprint identification technology, authentication mandate is carried out to operator, ensure that normalization, the legitimacy of the fail safe of safety auditing system, audit user operation; Adopt the fingerprint characteristic of fingerprint acquisition instrument acquisition operations person and finger print collecting function that each terminal of non-usage carries ensure that polymorphic terminal gathers the consistency of fingerprint standard, the various terminal making fingerprint recognition and matching process be applicable to different vendor to produce; The user of each safety auditing system to issue after being authorized by security audit control centre and to be the validated user further specification mandate of user, registration after non-local registration, and the fail safe for safety auditing system data provides many one and heavily protects.
In this description, the present invention is described with reference to its specific embodiment.But, still can make various amendment and conversion obviously and not deviate from the spirit and scope of the present invention.Therefore, specification and accompanying drawing are regarded in an illustrative, rather than a restrictive.

Claims (12)

1., based on a polymorphic terminal identity verification system for living things feature recognition, it is characterized in that, described system comprises:
Biological characteristic acquisition device, in order to obtain the biological characteristic of user;
Audit terminal, in order to when new user registers, new user's registration service that access security auditing system provides also obtains the essential information of new user, and the essential information of described new user and the biological characteristic corresponding with this new user are formed the log-on message of this new user, and this log-on message is sent to described safety auditing system; And when subscriber authentication, obtain the essential information of user, and the biological characteristic of this essential information and user is sent to safety auditing system;
Safety auditing system, in order to when new user registers, is stored to local data base by described log-on message, and this log-on message is sent to security audit control centre; And when subscriber authentication, the information in the essential information of audit terminal transmission and the biological characteristic of user and safety auditing system local data base is compared;
Security audit control centre, in order to audit the log-on message that safety auditing system sends, and gives satisfactory subscriber authorisation, and authorization message is issued to safety auditing system.
2. the polymorphic terminal identity verification system based on living things feature recognition according to claim 1, it is characterized in that, described biological characteristic acquisition device is fingerprint instrument, in order to obtain the fingerprint of user.
3. the polymorphic terminal identity verification system based on living things feature recognition according to claim 1, it is characterized in that, described audit terminal comprises:
New user registration module, the new user's registration service provided in order to access security auditing system also obtains the essential information of new user, and the essential information of described new user and the biological characteristic corresponding with this new user are formed the log-on message of this new user, and this log-on message is sent to described safety auditing system;
Subscriber authentication module, in order to obtain the essential information of user, and is sent to safety auditing system by the biological characteristic of this essential information and user;
Security audit data module, in order to provide data to check service to the user be proved to be successful.
4. the polymorphic terminal identity verification system based on living things feature recognition according to claim 1, it is characterized in that, described safety auditing system comprises:
First user administration module, in order to store log-on message and the authorization message of user;
Audit log logging modle, in order to store the audit information of user;
Audit information reports administration module, in order to the audit information of user is reported to security audit control centre;
And system log management module.
5. the polymorphic terminal identity verification system based on living things feature recognition according to claim 1, it is characterized in that, described security audit control centre comprises:
Second user management module, in order to store log-on message and the authorization message of user;
Security audit server management module, in order to audit the log-on message that safety auditing system sends, and gives satisfactory subscriber authorisation, and authorization message is issued to safety auditing system;
Security audit Service Data Management module, in order to the operation information of storage security audit server administration module;
And audit termination management module.
6. realize the polymorphic terminal identity verification method based on living things feature recognition based on the system described in claim 1 to 5, it is characterized in that, described method comprises the following steps:
(1) new user sends log-on message by described biological characteristic acquisition device and described audit terminal to described safety auditing system;
(2) described log-on message is sent to described security audit control centre by the safety auditing system described in;
(3) log-on message that the security audit control centre examination & verification safety auditing system described in sends, and give satisfactory subscriber authorisation, and authorization message is issued to safety auditing system.
7. the polymorphic terminal identity verification method based on living things feature recognition according to claim 6, is characterized in that, described step (1) specifically comprises the following steps:
(1.1) the biological characteristic acquisition device described in obtains the biological characteristic of user;
(1.2) new user's registration service that the audit terminal access safety auditing system described in provides also obtains the essential information of new user, and the essential information of described new user and the biological characteristic corresponding with this new user are formed the log-on message of this new user, and this log-on message is sent to described safety auditing system.
8. the polymorphic terminal identity verification method based on living things feature recognition according to claim 7, is characterized in that, described step (2) specifically comprises the following steps:
(2.1) log-on message described in the safety auditing system described in is stored to local data base;
(2.2) described log-on message is sent to described security audit control centre by the safety auditing system described in.
9. the polymorphic terminal identity verification method based on living things feature recognition according to claim 8, is characterized in that, described step (3) specifically comprises the following steps:
(3.1) log-on message that described safety auditing system sends is saved to the local data base of described security audit control centre by the security audit control centre described in;
(3.2) log-on message that the security audit control centre examination & verification safety auditing system described in sends, and the authorization message of satisfactory user is issued to safety auditing system.
10. the polymorphic terminal identity verification method based on living things feature recognition according to claim 9, it is characterized in that, described is issued to safety auditing system by the authorization message of satisfactory user, is specially:
The authorization message of satisfactory user and the log-on message corresponding with this user are issued to several safety auditing system.
The 11. polymorphic terminal identity verification methods based on living things feature recognition according to claim 6, is characterized in that, further comprising the steps of after described step (3):
(4) the biological characteristic acquisition device described in obtains the biological characteristic of user;
(5) the audit terminal described in obtains the essential information of user, and described biological characteristic and essential information are sent to described safety auditing system;
(6) whether the biological characteristic described in the safety auditing system described in judges and essential information meet the requirements;
(7) if described biological characteristic and essential information meet the requirements, then described safety auditing system provides corresponding security audit data to described user;
(8) if described biological characteristic and essential information undesirable, then described safety auditing system sends the information of authentication failure to described audit terminal;
(9) information of the audit terminal demonstration authentication failure described in.
The 12. polymorphic terminal identity verification methods based on living things feature recognition according to claim 11, is characterized in that, whether the biological characteristic described in described safety auditing system judges and essential information meet the requirements, and are specially:
(6.1) safety auditing system described in adopt increase income that described biological characteristic and essential information and local data base have been authorized by SDKSourceAFIS method and in the fingerprint characteristic comparison one by one of the user of the term of validity;
(6.2) whether the biological characteristic described in the safety auditing system described in judges according to comparing result and essential information meet the requirements.
CN201510662905.XA 2015-10-14 2015-10-14 Polymorphic terminal identity verification system and method based on biological characteristic recognition Pending CN105262747A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510662905.XA CN105262747A (en) 2015-10-14 2015-10-14 Polymorphic terminal identity verification system and method based on biological characteristic recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510662905.XA CN105262747A (en) 2015-10-14 2015-10-14 Polymorphic terminal identity verification system and method based on biological characteristic recognition

Publications (1)

Publication Number Publication Date
CN105262747A true CN105262747A (en) 2016-01-20

Family

ID=55102252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510662905.XA Pending CN105262747A (en) 2015-10-14 2015-10-14 Polymorphic terminal identity verification system and method based on biological characteristic recognition

Country Status (1)

Country Link
CN (1) CN105262747A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571951A (en) * 2016-10-19 2017-04-19 北京神州绿盟信息安全科技股份有限公司 Audit log obtaining, generating and verifying method and system and device
CN109241761A (en) * 2017-07-11 2019-01-18 沈思远 The system and method that personal information summarizes and inquires
CN110048853A (en) * 2019-04-12 2019-07-23 廖斌 A kind of long-range sports judge can auditing system and method
CN110135353A (en) * 2019-05-17 2019-08-16 北京海鑫高科指纹技术有限公司 A kind of method and system excluding victim and relevant people scene fingers and palms line

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364260A (en) * 2008-08-27 2009-02-11 福建师范大学 Self- registration embedded fingerprint authentication system and control method thereof
CN103428191A (en) * 2012-05-18 2013-12-04 无锡指网生物识别科技有限公司 Single sign on method based on combination of CAS framework and fingerprint
CN104318149A (en) * 2014-11-04 2015-01-28 公安部第三研究所 System and method for improving massive biometric authentication efficiency
EP2860934A1 (en) * 2013-10-09 2015-04-15 Telefonica Digital España, S.L.U. A computer implemented method to prevent attacks against authorization systems and computer programs products thereof
CN104765998A (en) * 2015-04-16 2015-07-08 国家电网公司 User identity reliably-verifying system based on face identification and using method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364260A (en) * 2008-08-27 2009-02-11 福建师范大学 Self- registration embedded fingerprint authentication system and control method thereof
CN103428191A (en) * 2012-05-18 2013-12-04 无锡指网生物识别科技有限公司 Single sign on method based on combination of CAS framework and fingerprint
EP2860934A1 (en) * 2013-10-09 2015-04-15 Telefonica Digital España, S.L.U. A computer implemented method to prevent attacks against authorization systems and computer programs products thereof
CN104318149A (en) * 2014-11-04 2015-01-28 公安部第三研究所 System and method for improving massive biometric authentication efficiency
CN104765998A (en) * 2015-04-16 2015-07-08 国家电网公司 User identity reliably-verifying system based on face identification and using method thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571951A (en) * 2016-10-19 2017-04-19 北京神州绿盟信息安全科技股份有限公司 Audit log obtaining, generating and verifying method and system and device
CN106571951B (en) * 2016-10-19 2020-02-07 北京神州绿盟信息安全科技股份有限公司 Audit log obtaining method, system and device
CN109241761A (en) * 2017-07-11 2019-01-18 沈思远 The system and method that personal information summarizes and inquires
CN110048853A (en) * 2019-04-12 2019-07-23 廖斌 A kind of long-range sports judge can auditing system and method
CN110048853B (en) * 2019-04-12 2021-11-16 廖斌 Auditable system and method for remote sports competition officials
CN110135353A (en) * 2019-05-17 2019-08-16 北京海鑫高科指纹技术有限公司 A kind of method and system excluding victim and relevant people scene fingers and palms line

Similar Documents

Publication Publication Date Title
US9589399B2 (en) Credential quality assessment engine systems and methods
TW201741922A (en) Biological feature based safety certification method and device
AU2014262138B2 (en) User authentication
US20130054433A1 (en) Multi-Factor Identity Fingerprinting with User Behavior
CN105593867B (en) Method for assessing certificate
US20080305769A1 (en) Device Method & System For Facilitating Mobile Transactions
CN102664903A (en) Network user identifying method and system
US20050138394A1 (en) Biometric access control using a mobile telephone terminal
CN107729727A (en) The real name identification method and device of a kind of account number
CN113132404B (en) Identity authentication method, terminal and storage medium
CN105262747A (en) Polymorphic terminal identity verification system and method based on biological characteristic recognition
CN110545274A (en) Method, device and system for UMA service based on people and evidence integration
US20190180278A1 (en) Mobile authentication method and system therefor
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
CN106202415A (en) A kind of earth geography information data sharing method
US10541813B2 (en) Incorporating multiple authentication systems and protocols in conjunction
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
KR101611099B1 (en) Method for issuing of authentication token for real name identification, method for certifying user using the authentication token and apparatus for performing the method
CN115600178A (en) Transaction request processing method and device, electronic equipment and storage medium
CN116777441A (en) Information verification method, device, equipment and computer readable storage medium
CN113271591B (en) Two-standard four-real data encryption interaction method and device based on 5G slice network
US11146544B2 (en) Emulation of federative authentication
KR101381388B1 (en) Real name authentication system by smart terminal
CN106203166A (en) A kind of auto navigation information data sharing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160120

RJ01 Rejection of invention patent application after publication