CN109391622A - A kind of the finger print identifying cloud security system and method for loading rule - Google Patents

A kind of the finger print identifying cloud security system and method for loading rule Download PDF

Info

Publication number
CN109391622A
CN109391622A CN201811281278.5A CN201811281278A CN109391622A CN 109391622 A CN109391622 A CN 109391622A CN 201811281278 A CN201811281278 A CN 201811281278A CN 109391622 A CN109391622 A CN 109391622A
Authority
CN
China
Prior art keywords
rule
module
finger print
print identifying
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811281278.5A
Other languages
Chinese (zh)
Inventor
欧耿洲
袁永锋
韩绪仓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CEC Huada Electronic Design Co Ltd
Original Assignee
Beijing CEC Huada Electronic Design Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CEC Huada Electronic Design Co Ltd filed Critical Beijing CEC Huada Electronic Design Co Ltd
Priority to CN201811281278.5A priority Critical patent/CN109391622A/en
Publication of CN109391622A publication Critical patent/CN109391622A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

For the Replay Attack defendd in cloud security certification, in particular for the rogue attacks of finger print identifying mode.The present invention provides the finger print identifying cloud security system and method for a kind of loading rule: the system is made of fingerprint authentication module 1, Certificate Authority module 2, cloud service module 3, customer service module 4, rule execution module 7, rule engine module 8.Client 5 includes total authentication module 9 and customer service module 4.Cloud 6 includes Certificate Authority module 2 and cloud service module 3 and rule engine module 8.Cloud setting is based on time, place, the compound rule of professional level.Positioned at client rule execution module receive based on the time, place, professional level compound rule, executing rule.The fingerprint authentication module of client obtains finger print information, carries out finger print identifying, if finger print identifying passes through, call time in client, place, professional level compound rule implementing result to cloud;If finger print identifying does not pass through, client sends finger print identifying and does not pass through information to cloud.Positioned at cloud Certificate Authority module and rule engine module receive client send authentication information, and carry out the time, place, professional level compound rule meet sex determination.If rule meets, authorization cloud service module carries out respective service;If rule is not met, refusal authorization cloud service module carries out respective service.

Description

A kind of the finger print identifying cloud security system and method for loading rule
Technical field
It is a kind of reinforcement safety that the present invention relates to information security technologies for resisting the rogue attacks for being directed to finger print identifying The finger print identifying cloud security system and method for property.
Background technique
Cloud computing as a kind of new calculation and business model, by internet for user provide Dynamical Deployment, by The resource services such as distribution, calculating, storage, software, platform are needed, and monitor resource service condition in real time.Most as current development For one of rapid new industry, cloud computing is had a vast market foreground, while being also faced with unprecedented security challenge. It shows according to investigations, cloud security not only becomes the primary barrier that user is widely popularized using the maximum misgivings and cloud application of cloud service One of hinder.
In order to guarantee the safety of cloud service, it is necessary to effective authentication is carried out to the user for entering system, according to identifying User identity and authorization data storehouse matching, to determine that can user Internet access resource.And fingerprint recognition is to use at present A kind of more cloud safety certification method.The essence of fingerprint recognition is pattern-recognition, and fingerprint recognition is related to fingerprint collecting, at image 4 reason, characteristics extraction, fingerprint matching steps, and fingerprint characteristic template is stored by fingerprint database.But the fingerprint of current mainstream Cloud security method is authenticated, Replay Attack can not be defendd.
Summary of the invention
For the rogue attacks defendd in cloud security certification, in particular for the attack of finger print identifying mode.The present invention mentions For the finger print identifying cloud security system and method for a kind of loading rule, by setting a series of physical rules, physical rules packet Containing rules such as time rule, place rule, professional level rules, cloud is logged on from by what finger print identifying passed through, It was found that rogue attacks, and then be on the defensive.Meanwhile the physical rules of setting, have substantially no effect on the use of legitimate user.
The present invention proposes the finger print identifying cloud security system and method for a kind of loading rule, it is characterised in that it includes fingerprint Authentication module 1, Certificate Authority module 2, cloud service module 3, customer service module 4, rule execution module 7, rule engine module 8.Fingerprint authentication module 1 and the composition of rule execution module 7 authenticate total module 9.Client 5 includes that total authentication module 9 and client take Business module 4.Cloud 6 includes Certificate Authority module 2 and cloud service module 3 and rule engine module 8.
It authenticates total module 9 and obtains finger print information in client, executing rule, generates finger print identifying information M01 and rule is recognized Demonstrate,prove information M02.Finger print identifying information M01 includes finger print identifying information, and regular authentication information M02 includes time, place, professional level Compound rule execution information.
A kind of finger print identifying cloud security method of loading rule, key step include:
Step 101 cloud rule engine module 8 setting based on the time, place, professional level compound rule M03.
Step 201 client rule execution module 7 receive based on the time, place, professional level compound rule M03, execute rule Then.
Step 301 client fingerprint authentication module 1 obtains finger print information, carries out finger print identifying.
Step 401 client fingerprint authentication module 1 generates finger print identifying information M01 and regular authentication information M02.
Step 501 client fingerprint authentication module 1 reports finger print identifying information M01 and rule authentication information M02 to cloud.
Step 601 cloud Certificate Authority module 2 is awarded according to finger print identifying information M01 and regular authentication information M02 Power/do not authorize respective service.
Step 101 setting based on the time, place, professional level compound rule, function includes but is not limited to include but unlimited In the compound rule of the rule of some period, locations and regions rule, professional level authorization rule and these rules.
Step 201 client, which receives, is based on the time, place, the compound rule of professional level, executing rule, and function includes but not It is limited to time record and judgement, place record and judgement, professional level identifies and judges.
Step 301 client obtains finger print information, carries out finger print identifying, and function includes but is not limited to fingerprint collecting, figure As processing, characteristics extraction, fingerprint matching.
Step 401 generates finger print identifying information M01 and rule authentication information M02, finger print identifying information M01 In finger print identifying information, regular authentication information M02 including but not limited to the time, place, professional level compound rule execution information.
The method of the present invention is suitable for fingerprint authentication module, the equipment such as cloud authorization identifying module.The present invention can apply In the security fields of fingerprint application as described above, such as bank finance, online shopping, security system etc..
For the present invention by the finger print identifying mode of loading rule, refusal service, which is not met, sets regular finger print identifying authorization Request improves safety protection level compared with the finger print identifying cloud security method without rule.
Detailed description of the invention
The finger print identifying cloud security system of Fig. 1 loading rule of the present invention.
The finger print identifying cloud security method of Fig. 2 loading rule of the present invention.
Specific embodiment
As shown in Figure 1, the present invention proposes a kind of cloud security system of the finger print identifying of loading rule, it is characterised in that: it Including fingerprint authentication module 1, Certificate Authority module 2, cloud service module 3, customer service module 4, rule execution module 7, rule Engine modules 8.Fingerprint authentication module 1 and the composition of rule execution module 7 authenticate total module 9.Client 5 includes authenticating total module 9 With customer service module 4.Cloud 6 includes Certificate Authority module 2 and cloud service module 3 and rule engine module 8.Finger print identifying mould Block 1 provides finger print identifying information M01 and regular authentication information M02 to Certificate Authority module 2, and rule engine module 8 is held to rule Row module 7 provides compound rule M03.
The rule engine module 8 of this system introduction has the function that Rule Information M03 is sent to rule execution module.This The rule execution module 7 of method introduction has the function of receiving Rule Information M03, has the function of executing rule information M03.
Rule Information M03 can be the rule of the constraint definition according to physical time.The constraint of physical time refers to certain section of rule Just allow to authorize in the fixed time and log in, as effectively, other times are invalid in 8 points to 18 points of working times.
Rule Information M03 can be the constraint of physical location, including but not limited to determine just to allow to award in defined place Power logs in, forbids logging in the place of multiple Steric clashes.
Rule Information M03 can be professional level Rule Information, refer to the rule defined according to the constraint of professional level department.Including but Being not limited to functional department as defined in having determined just allows the user of authorization login, regulation professional level that authorization is just allowed to log in.
Rule Information M03 can be the compound rule of time rule, place rule, professional level rule.
Fingerprint authentication module 1 obtains fingerprint image, calculates fingerprint matching as a result, reporting fingerprint finger print identifying information M01.
Rule execution module 7 is according to defined rule, such as time rule, place rule, professional level rule, computation rule With judging result, regular authentication information M02 is reported.
Certificate Authority module 2 carries out the judgement for authorizing or not authorizing according to authentication information 101, executes authorization or not The function of authorization.

Claims (7)

1. a kind of finger print identifying cloud security system of loading rule, it is characterised in that: it includes fingerprint authentication module 1, authenticates and award Weigh module 2, cloud service module 3, customer service module 4, rule execution module 7, rule engine module 8, in which: finger print identifying mould Block 1 and the composition of rule execution module 7 authenticate total module 9;It authenticates total module 9 and customer service module forms 4 clients 5;Certification Authorization module 2, cloud service module 3 and rule engine module 8 form cloud 6;Authenticate fingerprint authentication module 1 in total module 9 to Certificate Authority module 2 in cloud 6 provides finger print identifying information M01 and regular authentication information M02, and rule engine module 8 is to rule Then execution module 7 provides compound rule M03.
2. finger print identifying cloud security system as described in claim 1, which is characterized in that the total module 9 of certification is in client 5 Finger print information is obtained, executing rule generates finger print identifying information M01 and regular authentication information M02;Finger print identifying information M01 packet Information containing finger print identifying;Regular authentication information M02 include the time, place, professional level compound rule execution information.
3. a kind of finger print identifying cloud security method of loading rule, which is characterized in that be based on finger print identifying described in claim 1 Cloud security system, key step include:
Step 101 cloud rule engine module 8 setting based on the time, place, professional level compound rule M03;
Step 201 client rule execution module 7 receive based on the time, place, professional level compound rule M03, executing rule;
Step 301 client fingerprint authentication module 1 obtains finger print information, carries out finger print identifying;
Step 401 client fingerprint authentication module 1 generates finger print identifying information M01 and regular authentication information M02;
Step 501 client fingerprint authentication module 1 reports finger print identifying information M01 and rule authentication information M02 to cloud;
Step 601 cloud Certificate Authority module 2 is according to finger print identifying information M01 and regular authentication information M02, whether authorization Respective service.
4. finger print identifying cloud security method as claimed in claim 3, which is characterized in that the step 101 cloud regulation engine mould Block 8 setting based on the time, place, professional level compound rule, function includes but is not limited to the rule of some period, place area The compound rule of domain rule, professional level authorization rule and these rules.
5. finger print identifying cloud security method as claimed in claim 3, which is characterized in that the step 201 client rule is held Row module 7 receive be based on the time, place, the compound rule of professional level, executing rule, function include but is not limited to the time record and Judgement, place record and judgement, professional level identify and judge.
6. finger print identifying cloud security method as claimed in claim 3, which is characterized in that the step 301 client fingerprint is recognized It demonstrate,proves module 1 and obtains finger print information, carry out finger print identifying, function includes but is not limited to fingerprint collecting, image procossing, and characteristic value mentions It takes, fingerprint matching.
7. finger print identifying cloud security method as claimed in claim 3, which is characterized in that the step 401 client fingerprint is recognized It demonstrate,proves module 1 and generates finger print identifying information M01 and regular authentication information M02, finger print identifying information M01 recognizes including but not limited to fingerprint Demonstrate,prove information, regular authentication information M02 including but not limited to the time, place, professional level compound rule execution information.
CN201811281278.5A 2018-10-31 2018-10-31 A kind of the finger print identifying cloud security system and method for loading rule Pending CN109391622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811281278.5A CN109391622A (en) 2018-10-31 2018-10-31 A kind of the finger print identifying cloud security system and method for loading rule

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811281278.5A CN109391622A (en) 2018-10-31 2018-10-31 A kind of the finger print identifying cloud security system and method for loading rule

Publications (1)

Publication Number Publication Date
CN109391622A true CN109391622A (en) 2019-02-26

Family

ID=65427368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811281278.5A Pending CN109391622A (en) 2018-10-31 2018-10-31 A kind of the finger print identifying cloud security system and method for loading rule

Country Status (1)

Country Link
CN (1) CN109391622A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395574A (en) * 2020-12-04 2021-02-23 航天信息股份有限公司 Safety login management method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN103873244A (en) * 2012-12-13 2014-06-18 航天信息股份有限公司 Identity authentication method and system in mobile payment based on fingerprint identification
CN104392226A (en) * 2014-12-15 2015-03-04 金虎林 Fingerprint authentication system and method
CN105912901A (en) * 2016-04-06 2016-08-31 深圳市金立通信设备有限公司 Fingerprint authentication method and terminal
CN107438854A (en) * 2015-02-06 2017-12-05 维里迪乌姆Ip有限责任公司 The system and method that the image captured using mobile device performs the user authentication based on fingerprint
CN108092938A (en) * 2016-11-23 2018-05-29 中移(杭州)信息技术有限公司 Authentication method based on fingerprint, first server and terminal based on finger print identifying
US20180278600A1 (en) * 2016-01-19 2018-09-27 Regwez, Inc. Multi-factor masked access control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873244A (en) * 2012-12-13 2014-06-18 航天信息股份有限公司 Identity authentication method and system in mobile payment based on fingerprint identification
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN104392226A (en) * 2014-12-15 2015-03-04 金虎林 Fingerprint authentication system and method
CN107438854A (en) * 2015-02-06 2017-12-05 维里迪乌姆Ip有限责任公司 The system and method that the image captured using mobile device performs the user authentication based on fingerprint
US20180278600A1 (en) * 2016-01-19 2018-09-27 Regwez, Inc. Multi-factor masked access control system
CN105912901A (en) * 2016-04-06 2016-08-31 深圳市金立通信设备有限公司 Fingerprint authentication method and terminal
CN108092938A (en) * 2016-11-23 2018-05-29 中移(杭州)信息技术有限公司 Authentication method based on fingerprint, first server and terminal based on finger print identifying

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395574A (en) * 2020-12-04 2021-02-23 航天信息股份有限公司 Safety login management method
CN112395574B (en) * 2020-12-04 2024-02-23 航天信息股份有限公司 Safe login management method

Similar Documents

Publication Publication Date Title
Pourvahab et al. An efficient forensics architecture in software-defined networking-IoT using blockchain technology
CN105678125B (en) A kind of user authen method, device
Panaousis et al. Cybersecurity games and investments: A decision support approach
CN109450959A (en) A kind of multiple-factor identity identifying method based on threat level
Ahmed et al. Detecting Computer Intrusions Using Behavioral Biometrics.
KR101985421B1 (en) Method and apparatus for security investment based on evaluating security risks
Baca et al. Prioritizing countermeasures through the countermeasure method for software security (CM-Sec)
CN110717164A (en) Intelligent multidimensional weighting identity authentication and risk control method and system
WO2016048129A2 (en) A system and method for authenticating a user based on user behaviour and environmental factors
CN116418568A (en) Data security access control method, system and storage medium based on dynamic trust evaluation
Dostálek Multi-factor authentication modeling
CN109391622A (en) A kind of the finger print identifying cloud security system and method for loading rule
EP4068125B1 (en) Method of monitoring and protecting access to an online service
De et al. Trusted cloud-and femtocell-based biometric authentication for mobile networks
Al-Ayed et al. An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions.
Salami et al. SIMP-REAUTH: a simple multilevel real user remote authentication scheme for mobile cloud computing
Konoplev et al. Access control method in distributed grid computing networks
Huang et al. A trust-based cloud computing access control model
Shao et al. A Dynamic Access Control Model Based on Game Theory for the Cloud
Haqani et al. Biometric verified access control of critical data on a cloud
Wang et al. ExBLACR: extending BLACR system
Jaiswal et al. Biometric Authentication for the Cloud Computing
Ali et al. AI-Enabled Cloud Security Based on Organized Identity System
CN118041513B (en) Agricultural product supply chain-based data access control method and apparatus
Kanth et al. Enhanced capsule generative adversarial network with Blockchain fostered Intrusion Detection System for Enhancing Cyber security in Cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190226