[go: up one dir, main page]

CN107438076A - A kind of network verifying system and its verification method based on fingerprint - Google Patents

A kind of network verifying system and its verification method based on fingerprint Download PDF

Info

Publication number
CN107438076A
CN107438076A CN201710680669.3A CN201710680669A CN107438076A CN 107438076 A CN107438076 A CN 107438076A CN 201710680669 A CN201710680669 A CN 201710680669A CN 107438076 A CN107438076 A CN 107438076A
Authority
CN
China
Prior art keywords
fingerprint
client
finger print
print information
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710680669.3A
Other languages
Chinese (zh)
Inventor
王斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201710680669.3A priority Critical patent/CN107438076A/en
Publication of CN107438076A publication Critical patent/CN107438076A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to communication authentication field, and in particular to a kind of network verifying system and its verification method based on fingerprint.A kind of network verifying system based on fingerprint, includes client, equipment end and certificate server, it is characterised in that:The client includes fingerprint input module, and the fingerprint input module, which includes, obtains finger print information;The certificate server includes information-storing device, and described information memory storage has and allows the client-side information by checking and corresponding finger print information;Described information memory also includes matching module, and the matching module is used to the finger print information that the fingerprint input module obtains carrying out lookup matching with the finger print information recorded in described information memory.It is an object of the invention to provide a kind of network verifying system and its verification method based on fingerprint, the encrypted message of smart machine is obtained by fingerprint identification module, the physical address for matching smart machine verifies to realize that the access of identity is registered, and realizes the high efficiency of network verification.

Description

A kind of network verifying system and its verification method based on fingerprint
Technical field
The present invention relates to communication authentication field, and in particular to a kind of network verifying system and its authentication based on fingerprint Method.
Background technology
IEEE 802.1X are the Valuation Standards on user access network formulated by IEEE, and full name is " based on port Network access control ".It is formal in 2001 to promulgate, is initially for wired networks design, afterwards in order to coordinate wireless network Access carries out revision correcting, and is completed in 2004.
802.1x agreements are a kind of Network access control agreements based on port, so specific 802.1x authentication functions must It must be configured on device port, the access to Internet resources is controlled by certification to the user equipment accessed on port. 802.1x Verification Systems use network application system typical Client/Server (C/S) structure, including three parts:Client Hold (Client), equipment end (Device) and certificate server (Server).
Wherein, client:LAN subscriber terminal device, but must support EAPOL (Extensible Authentication Protocol over LAN, LAN Extensible Authentication Protocol) equipment (such as PC), can be by opening The 802.1x client softwares installed on dynamic client device initiate 802.1x certifications.
Equipment end:The network equipment (such as interchanger) of 802.1x agreements is supported, the client connected is authenticated.It The port of access to LAN is provided for client, can be physical port or logic port (such as Eth-Trunk mouths).
In addition, certificate server:The equipment for providing authentication service for equipment end 802.1x agreements, is really authenticated Equipment, realize and user is authenticated, authorized and charging, usually radius server.
In this checking system mentioned above, applied as tradition, possess network insertion under certificate server storage The username and password information of authority, and on the client, client is to input username and password by prompting client, pair The information stored in certificate server carries out matching check and correction, if by checking, allows the client to access network.
As the network insertion of equipment is stepped in the development of wireless Internet and the popularization of intelligent and portable equipment, such as smart mobile phone Also it is more and more frequent.But in this process, smart mobile phone uses touch-screen, nine grids input method, capital and small letter switching, English number Word switches, and many factors make it that the input process of user name password is comparatively laborious, and user experience is bad.
The content of the invention
It is an object of the invention to provide a kind of network verifying system and its verification method based on fingerprint, pass through fingerprint recognition Module obtains the encrypted message of smart machine, and the physical address for matching smart machine verifies to realize that the access of identity is registered, real The high efficiency of existing network verification.
The present invention above-mentioned technical purpose technical scheme is that:A kind of network based on fingerprint is tested Card system, comprising client, equipment end and certificate server, the client includes fingerprint input module, the fingerprint input Module is used to obtain finger print information, and the finger print information is sent to the certificate server;
The certificate server includes information-storing device, and described information memory storage has the client allowed by checking Information and corresponding finger print information;
The certificate server also includes matching module, and the matching module is used for obtain the fingerprint input module Finger print information carries out lookup matching with the finger print information recorded in described information memory;
The equipment end provides the port to network for the client.
As a preference of the present invention, the client includes physical address input module, the physical address input module For obtaining the physical address of the client as username information, the fingerprint input module is used to obtain finger print information work For encrypted message, the username information and the encrypted message are as one group of complete user profile.
As a preference of the present invention, the fingerprint input module includes finger scan module and vectorial modular converter, it is described Finger scan module is used to scan finger acquisition finger print information, and the vectorial modular converter is used to finger print information being converted into code As the characteristic vector for representing this fingerprint.
As a preference of the present invention, the client also includes network sweep module.
As a preference of the present invention, the matching module includes comparison module, the comparison module sends out the client The finger print information sent generates fingerprint characteristic coincidence rate, by the fingerprint compared with the data in described information memory Feature coincidence rate is compared with predetermined threshold value.
A kind of verification method of the network verifying system based on fingerprint, is comprised the following steps:
Step 1:Client sends connection request to the network that needs connect;
Step 2:The client obtains the finger print information of user;
Step 3:Finger print information is sent to certificate server by the client;
Step 4:The finger recorded in finger print information and certificate server that the certificate server obtains the client Line information carries out lookup matching;
Step 5:The finger print information that the finger print information that will match in the certificate server obtains with the client enters Row compares, if comparing unanimously, judges that the client passes through network verification.
As a preference of the present invention, in step 3, the client using the physical address of itself as username information, One group of user profile, which is combined into, together with the finger print information got is sent to the certificate server.
As a preference of the present invention, in step 2, after the client obtains the finger print information of user, by finger print information Code is converted into as the characteristic vector for representing this fingerprint.
As a preference of the present invention, before step 1, the client scan network, obtain the network that needs connect Service set.
As a preference of the present invention, in steps of 5, the finger print information that the certificate server sends the client Compared with the data in the certificate server, fingerprint characteristic coincidence rate is generated, by the fingerprint characteristic coincidence rate and in advance If threshold value compares, if being more than or equal to the threshold value, judge that the client passes through checking.The technical program possesses following excellent Point:
1st, easy to verify, typing is efficient as user profile for the use MAC Address and finger print information of the system.
2nd, verification mode is identical with traditional 802.1x verification modes, and network reconstruction is easy.
3rd, certificate server includes information-storing device, is stored with delegatable user profile, and matched and searched is convenient.
Brief description of the drawings
Fig. 1 is each module diagram in embodiment one;
Fig. 2 is each module diagram in client in Fig. 1;
Fig. 3 is the flow chart in embodiment 1.
Embodiment
Specific examples below is only explanation of the invention, and it is not limitation of the present invention, art technology Personnel can make the modification of no creative contribution to the present embodiment as needed after this specification is read, but as long as All protected in scope of the presently claimed invention by Patent Law.
Embodiment 1, as described in this paper background technology, development and intelligent movable equipment with development of Mobile Internet technology Hardware update, people are more and more networked using intelligent movable equipment.In order to solve the network of WLAN peace Full problem, it is proposed that 802.1X agreements, the 802.1X agreements as lan port access control mechanism in ethernet networks by Extensive use, it is used to solve the problems, such as certification and secure context in Ethernet;802.1X agreements are a kind of nets based on port Network access control protocol, and the Network access control based on port refers to:In the port of LAN Gateway to being accessed Client is authenticated and controlled, if the client being connected on port can be accessed in LAN by certification Resource;If the resource in LAN can not can not be accessed by certification.
In the technical program, the hardware of a whole network verifying system build with traditional networking it is too not big Change, this allows for the hardware update for not needing substantial amounts of fund to carry out big degree to network using the technical program.
Intelligent and portable equipment of today, such as mobile phone, either iPhone or other main flow Android mobile phones, often match somebody with somebody For fingerprint sensing identification device, the technical program rests against fingerprint sensing identification device to obtain the fingerprint of user letter Breath, also reduces fund cost caused by HardwareUpgring.
The present embodiment discloses a kind of network verifying system based on fingerprint, as shown in figure 1, the technical program is main hard Part equipment is the structural representation of 802.1X Verification Systems, is included as the structural representation of 802.1X Verification Systems, including:Client Hold A (Client), equipment end B (Device) and certificate server C (Server);The customer end A needs to support EAPOL (Extensible Authentication Protocol over LAN, the Extensible Authentication Protocol on LAN), and client End A can initiate 802.1X certifications by starting customer end A software;In the technical program, customer end A is to support fingerprint to know Other mobile phone.
Equipment end B is the network equipment for supporting 802.1X agreements, for providing the port of access to LAN for customer end A, Specific example, in hardware can be router, and router has the function of judging network address and select IP paths, and it can be more In internetworking environment, flexible connection is established, each seed can be connected with media access method with entirely different packet Net, customer end A can rely on router and connect into internet.Except router, network hotspot, i.e. wireless network can also be In access point, access point, compared with wireless router mentioned above, common wireless aps do not have route work( Can, increase coverage during its more function, the wireless terminal of access and original network are to belong to same subnet.
Certificate server C is to provide the entity of authentication service, and for being authenticated, authorizing to customer end A and charging, it can Think that RADIUS (Remote Authentication Dial-In User Service, remote authentication dial-in user service) takes Business device.In the checking system of this case, 802.1X verification process can with triggering mode can be it is a variety of, can be by client Actively initiate, can also be initiated by equipment end.In " customer end A active triggering mode ", actively sent out from client to equipment end EAPOL-Start (EAPOL starts) message is sent to carry out triggering authentication;And being used for support in " equipment end active triggering mode " can not lead The dynamic client for sending EAPOL-Start messages, such as the 802.1x clients that Windows XP are carried.Either which kind of is triggered Mode, 802.1x Verification Systems are all to realize authentication information between client, equipment end and certificate server using EAP protocol Exchange.The EAPOL forms based on ethernet local area network are used to encapsulate EAP messages between client and equipment end, then It is carried in ethernet data frame and interacts.
In the present case, customer end A, i.e. mobile phone, progress web search step, user can put open WIFI switches, make first With mobile phone searching whole network, to find the network based on 802.1X certifications, on mobile phone screen corresponding to the real network SSID.SSID is Service Set Identifier abbreviation, is meant:Service set.SSID technologies can be by one WLAN is divided into several sub-networks for needing different identity to verify, each sub-network is required for independent authentication, Corresponding sub-network can just only be entered by the user of authentication, prevent unauthorized user from entering present networks.
User finds the network for needing to connect, SSID corresponding to click, now mobile phone ejection fingerprint input mark.Such as Fig. 2 It is shown, customer end A, i.e. mobile phone, include fingerprint input module A3.Fingerprint input module A3 include finger scan modules A 31 and to Measure modular converter A32.Finger scan modules A 31 can use the Fingerprint Identification Unit of capacitive sensing on hardware, installed in mobile phone Surface.The general principle of capacitive sensing technology is that it conducts fingerprint image according to the resistance variations on user's finger top layer.Carefully The combination of both arrangement modes of particular electrical quality and cell in born of the same parents enables the resistance of skin surface to be measured to And its change is unique.Fingerprint Identification Unit reads the resistance variations of finger live body epidermis first, and then conduction shows these changes Finger figure.
It should be noted that customer end A obtains the finger print information of user using fingerprint input module A3, and it is corresponding , the information-storing device C1 in certificate server C must also include the corresponding finger print information that can be verified for use by examination & verification, Consequently facilitating later stage matching and comparison.Due to the data volume of finger print information and little, very big hardware load will not be caused, so In practical operation, multiple finger print informations can be included, form a complete finger print information group.Such as four can be supported altogether Finger print information, the left hand thumb of user, hand thumb, left index finger and right hand forefinger are corresponded to respectively.Because in component environment, Due to user, some finger there may be greasy dirt, cause finger print information not distinguish, it is difficult to input.Completely refer to when in the presence of one group Line group information, you can user can voluntarily select the finger of cleaning to be operated during checking.
As shown in figure 1, fingerprint input module A3 is also comprising the vectorial modular converter being used cooperatively with finger scan modules A 31 A32, in the technical program, the vectorial modular converter A32 finger print information that gets of acting as scanning enters line code, makees Vector is characterized, the concrete form of characteristic vector is string number.In the processing procedure of fingerprint, it is broadly divided into fingerprint image Collection, Fingerprint enhancement, the several parts of feature extraction and matching, wherein feature extraction and matching is the difficult point of technology, whole Also occupy critical role in individual system.In the technical program, it can use in the prior art to the mode of Finger print characteristic abstract, Such as original fingerprint image is pre-processed and feature extraction, by original fingerprint image be converted into by limited individual feature point group into Data link table, the neighbor point of characteristic point and its surrounding is handled, generate matching characteristic vector, characteristic vector represent Structural relation between each characteristic point.
Obtain including the finger print information of characteristic vector, just obtain corresponding encrypted message in the technical program.It is and right The username information answered, the title input of user name is carried out without user on mobile phone, but is also inputted comprising physical address Modules A 2.
By physical address input module A2, customer end A gets the physical address of itself, i.e. MAC (Media automatically Access Control, medium access control) address, unlike IP address, IP address can according to the setting of user come It is changed, and MAC Address, after any network equipment is once produced, its MAC Address can not be by matching somebody with somebody in locality connection Put and modify.Based on the characteristic that MAC Address is more fixed, in the technical program, user name that MAC Address is just used as. Mobile phone uses MAC Address as user name, and the characteristic vector of fingerprint carries out 802.1X network verification for password.
As shown in figure 1, in the system, certificate server C, i.e. 802.1X radius server ends, include information and deposit Reservoir C1.Corresponding MAC Address and spy can be contained naturally by the user profile of checking by being stored with information-storing device C1 Levy vector information.
The mac address information and the fingerprint characteristic vector information of user obtained in customer end A is sent to certificate server C, Verified to certificate server C.Specifically, matching module C2 can be searched, matches, be compared finger print information.Matching module C2 By mac address information, in certificate server C, the fingerprint database corresponding to the mac address information is found.Actually should In, the mac address information and finger print data information that are stored on information-storing device C1 not necessarily correspond, it is possible to It is one-to-many.Such case is because the multiple fingers of same user same customer end A typing in other words refer to as mandate Line.Matching module C2 is additionally operable to calculate, and calculates the characteristic vector of representative this fingerprint now transmitted and registered fingerprint Similarity, its similarity are judged as identifying successfully when exceeding threshold value (threshold).If its similar degree is just sentenced for more than 95% It is set to certification success, now threshold value is exactly that 0.95. threshold values decide authentication result.And the setting of threshold value can be in system building It is manually set by keeper.So far, comparison match step is completed.
, can be with tradition and 802.1x specific exchange method and authentication mode includes the form of message in the technical program 802.1x verification mode be consistent, do not make an amendment.
By such mode of operation, user can use mobile phone as customer end A, it is no longer necessary to as conventional art field In, username information and encrypted message are manually entered on the touchscreen, then carry out 802.1x network verification.
But use physical address input module A2 obtains mobile phone in itself and unique MAC hardware address, eliminates manually The trouble of input, and the input value of password need to be scanned by finger scan modules A 31 and obtain and enter by vectorial modular converter A32 The code metaplasia of row characteristic vector into, you can carry out transmission checking in a network, convenient and swift, user experience is good.
The effect of modules and annexation, are described further technical scheme in the present embodiment as detailed above One complete job step.
First, start to sweep into step 1, network sweep step, in this step, the network sweep modules A 1 of customer end A Retouch, show the service set of each network and be shown on the display screen of customer end A.
Then, into step 2, fingerprint scanning step.In this step, user selects to need the network institute connected first Corresponding service set, system send the request for connecting the network, customer end A ejection prompting, prompt to need user's input to refer to Line.
Finger is seated in customer end A by user, i.e., on the Fingerprint Identification Unit on mobile phone, the finger scan mould in customer end A Block A31 obtains the finger print information of active user.
Now, into step 3, step of converting.In this step, fingerprint input module A3 vectorial modular converter A32 will The finger print information code got, switchs to characteristic vector.
Into step 4, forwarding step.The characteristic vector of the fingerprint is sent to certificate server C from customer end A.Now send out The information sent includes username information and encrypted message.In the present embodiment, corresponding to username information and encrypted message are distinguished It is the physical MAC address and finger print information of customer end A.
After certificate server C receives username information and encrypted message, step 5, comparison match step are put into.Visitor Family end A just includes information-storing device C1 originally, wherein including username information and finger print information, matching module C2 is looked into Look for, the finger print information acquired in step 4 characteristic vector will be compared with the finger print information in certificate server C, Fingerprint characteristic coincidence rate is obtained, then compared with predetermined threshold value.Threshold value can carry out systemic presupposition, such as 95% according to actual conditions.
Afterwards, into step 6, step is verified, when fingerprint characteristic coincidence rate is more than or equal to predetermined threshold value, the client A passes through checking.After checking, customer end A completes 802.1x certifications by normal 802.1x interaction flows.The present embodiment In 802.1x authentication methods and traditional 802.1x authentication methods be consistent, do not change any 802.1x message identifyings and friendship Mutual process.

Claims (10)

1. a kind of network verifying system based on fingerprint, includes client, equipment end and certificate server, it is characterised in that:Institute State client and include fingerprint input module, the fingerprint input module is used to obtain finger print information, and the finger print information is sent To the certificate server;
The certificate server includes information-storing device, and described information memory storage has the client-side information allowed by checking With corresponding finger print information;
The certificate server also includes matching module, and the matching module is used for the fingerprint for obtaining the fingerprint input module Information carries out lookup matching with the finger print information recorded in described information memory;
The equipment end provides the port to network for the client.
A kind of 2. network verifying system based on fingerprint according to claim 1, it is characterised in that:The client includes Physical address input module, the physical address that the physical address input module is used to obtain the client are believed as user name Breath, the fingerprint input module are used to obtain finger print information as encrypted message, the username information and the encrypted message As one group of complete user profile.
A kind of 3. network verifying system based on fingerprint according to claim 1, it is characterised in that:The fingerprint inputs mould Block includes finger scan module and vectorial modular converter, and the finger scan module is used to scan finger acquisition finger print information, institute Vectorial modular converter is stated to be used to finger print information being converted into code as the characteristic vector for representing this fingerprint.
A kind of 4. network verifying system based on fingerprint according to claim 3, it is characterised in that:The client is also wrapped Module containing network sweep.
A kind of 5. network verifying system based on fingerprint according to claim 1 or 2 or 3 or 4, it is characterised in that:It is described Matching module includes comparison module, the finger print information that the comparison module sends the client and described information memory In data be compared, generate fingerprint characteristic coincidence rate, the fingerprint characteristic coincidence rate is compared with predetermined threshold value.
6. a kind of verification method of the network verifying system based on fingerprint, it is characterised in that comprise the following steps:
Step 1:Client sends connection request to the network that needs connect;
Step 2:The client obtains the finger print information of user;
Step 3:Finger print information is sent to certificate server by the client;
Step 4:The fingerprint letter recorded in finger print information and certificate server that the certificate server obtains the client Breath carries out lookup matching;
Step 5:The finger print information that the finger print information that will match in the certificate server obtains with the client is compared It is right, if comparing unanimously, judge that the client passes through network verification.
A kind of 7. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that:In step In rapid 3, the client is combined into one group using the physical address of itself as username information together with the finger print information got User profile is sent to the certificate server.
A kind of 8. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that:In step In rapid 2, after the client obtains the finger print information of user, finger print information is converted into code as the feature for representing this fingerprint Vector.
A kind of 9. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that:In step Before rapid 1, the client scan network, acquisition needs the service set of the network connected.
A kind of 10. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that: In step 5, the certificate server enters the finger print information that the client is sent and the data in the certificate server Row compares, and generates fingerprint characteristic coincidence rate, the fingerprint characteristic coincidence rate is compared with predetermined threshold value, if more than or equal to described Threshold value, then judge that the client passes through checking.
CN201710680669.3A 2017-08-10 2017-08-10 A kind of network verifying system and its verification method based on fingerprint Pending CN107438076A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710680669.3A CN107438076A (en) 2017-08-10 2017-08-10 A kind of network verifying system and its verification method based on fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710680669.3A CN107438076A (en) 2017-08-10 2017-08-10 A kind of network verifying system and its verification method based on fingerprint

Publications (1)

Publication Number Publication Date
CN107438076A true CN107438076A (en) 2017-12-05

Family

ID=60461366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710680669.3A Pending CN107438076A (en) 2017-08-10 2017-08-10 A kind of network verifying system and its verification method based on fingerprint

Country Status (1)

Country Link
CN (1) CN107438076A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572773A (en) * 2021-07-27 2021-10-29 迈普通信技术股份有限公司 Access equipment and terminal access control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394531A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Wireless network connecting method of a terminal device
US20170024605A1 (en) * 2008-07-22 2017-01-26 Synaptics Incorporated Systems and methods for authenticating a user of a biometric sensor
WO2017053494A1 (en) * 2015-09-23 2017-03-30 Alibaba Group Holding Limited Method, apparatus and system for preventing cross-site request forgery
US20170149840A1 (en) * 2015-11-19 2017-05-25 Bank Of America Corporation Selectively Enabling and Disabling Biometric Authentication Based on Mobile Device State Information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170024605A1 (en) * 2008-07-22 2017-01-26 Synaptics Incorporated Systems and methods for authenticating a user of a biometric sensor
CN104394531A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Wireless network connecting method of a terminal device
WO2017053494A1 (en) * 2015-09-23 2017-03-30 Alibaba Group Holding Limited Method, apparatus and system for preventing cross-site request forgery
US20170149840A1 (en) * 2015-11-19 2017-05-25 Bank Of America Corporation Selectively Enabling and Disabling Biometric Authentication Based on Mobile Device State Information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572773A (en) * 2021-07-27 2021-10-29 迈普通信技术股份有限公司 Access equipment and terminal access control method

Similar Documents

Publication Publication Date Title
US12075342B2 (en) Cellular network onboarding through wireless local area network
US20230328516A1 (en) Device based credentials
JP3869392B2 (en) User authentication method in public wireless LAN service system and recording medium storing program for causing computer to execute the method
US7633953B2 (en) Method, system and device for service selection via a wireless local area network
US20040073793A1 (en) Network system, information processing device, repeater, and method of building network system
CN105898743B (en) A kind of method for connecting network, apparatus and system
CN103297968B (en) A kind of method, equipment and the system of wireless terminal certification
CN101102188B (en) Method and system for mobile access to virtual local area network
JP2006527432A (en) Login method with multiple identifiers for instant messaging system
CN107948979B (en) Information processing method and device and auditing equipment
CN101616414A (en) Method, system and server for terminal authentication
US20060291659A1 (en) Wireless communication authentication
CN106961683B (en) A method, system and discoverer AP for detecting illegal AP
US20060112269A1 (en) Level-specific authentication system and method in home network
CN102882851A (en) Generating method of address book and server
CN107612883A (en) A kind of mobile applications automatic logging method and system
CN107135506B (en) A kind of portal authentication method, apparatus and system
CN108834146A (en) A kind of Bidirectional identity authentication method between terminal and authentication gateway
CN114554474B (en) Access method, system and network intercommunication functional entity for NSA users roaming to SA
CN106657034A (en) Service authentication method and authentication capability opening server
CN107438076A (en) A kind of network verifying system and its verification method based on fingerprint
JP2013504828A (en) ICP website login method, system and login device for user in ID / locator separation network
CN101321100B (en) Communication method and system, and household base station
CN107172185A (en) Network collocating method and device
JP2007536844A (en) Method and system for storing temporary I-WLAN identities - Patents.com

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171205