[go: up one dir, main page]

CN116541817A - User identity authentication method and device, electronic equipment and storage medium - Google Patents

User identity authentication method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116541817A
CN116541817A CN202310520898.4A CN202310520898A CN116541817A CN 116541817 A CN116541817 A CN 116541817A CN 202310520898 A CN202310520898 A CN 202310520898A CN 116541817 A CN116541817 A CN 116541817A
Authority
CN
China
Prior art keywords
fingerprint
mouse
user
authentication
pin code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310520898.4A
Other languages
Chinese (zh)
Inventor
李祖金
陈德伟
池伟强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Guangdong Network Construction Co Ltd
Original Assignee
Digital Guangdong Network Construction Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Guangdong Network Construction Co Ltd filed Critical Digital Guangdong Network Construction Co Ltd
Priority to CN202310520898.4A priority Critical patent/CN116541817A/en
Publication of CN116541817A publication Critical patent/CN116541817A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0354Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
    • G06F3/03543Mice or pucks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/033Indexing scheme relating to G06F3/033
    • G06F2203/0336Mouse integrated fingerprint sensor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application discloses a user identity authentication method, a user identity authentication device, electronic equipment and a storage medium; the method comprises the following steps: the fingerprint mouse receives a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values; acquiring fingerprint information of a user through a fingerprint mouse in response to a fingerprint authentication request, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; and sending the identity authentication result of the user to an authentication platform. The user in this application embodiment uses fingerprint mouse to input the PIN code, can prevent effectively that the PIN code from being stolen by other people to can guarantee the privacy safety of PIN code input in-process.

Description

User identity authentication method and device, electronic equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of security authentication, in particular to a user identity authentication method, a user identity authentication device, electronic equipment and a storage medium.
Background
Fingerprint mice are based on biometric technology to identify a user based on personal fingerprint characteristics. As an alternative way of the traditional password, the fingerprint mouse provides a safer and more convenient authentication way, and effectively avoids attack risks such as weak password, phishing, social engineering attack, violent dictionary cracking and the like. But the fingerprint also has the risk of being copied, can gather the fingerprint and copy out 2D fingerprint through fingerprint pictures or transparent glue of a plurality of angles, also can gather and copy out 3D fingerprint with spurious true through methods such as plasticine, silica gel, electric capacity glue.
For security, two-factor authentication is required to be performed at the same time as fingerprint authentication to ensure system security. After the mouse fingerprint passes verification, the user is required to perform user identity authentication once, and only when the two times of authentication pass, the result is that the authentication passes. However, the personal identification password (Personal Identification Number, abbreviated as PIN code) generally input by the keyboard is at risk of being stolen by the Trojan, if the Trojan is maliciously implanted into the computer for inputting the PIN code, the action of inputting the PIN code by the user on the keyboard can be stolen by the Trojan through monitoring the clicking event of the keyboard by the hook; secondly, in the process of inputting the PIN code by using the keyboard, the PIN code is easy to peep and steal by bystanders; in addition, the common PIN code is stored in the server, the PIN code is separated from the fingerprint, and the PIN code needs additional measures such as encryption protection in transmission and storage, and the like, so that a certain security risk exists.
Disclosure of Invention
The application provides a user identity authentication method, a device, electronic equipment and a storage medium, wherein a user can input a PIN code by using a fingerprint mouse, and the PIN code can be effectively prevented from being stolen by other people, so that the privacy and the safety in the PIN code input process can be ensured.
In a first aspect, an embodiment of the present application provides a user identity authentication method, applied to a fingerprint mouse, where the method includes:
receiving a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values;
responding to the fingerprint authentication request, acquiring fingerprint information of the user through a fingerprint mouse, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information;
if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to a prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user;
and sending the identity authentication result of the user to the authentication platform.
In a second aspect, an embodiment of the present application further provides a user identity authentication method, applied to an authentication platform, where the method includes:
Sending a fingerprint authentication request to a fingerprint mouse, enabling the fingerprint mouse to respond to the fingerprint authentication request to acquire fingerprint information of the user, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to acquire an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to a prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; wherein the fingerprint authentication request comprises: account numbers and challenge values;
and receiving an identity authentication result sent by the fingerprint mouse.
In a third aspect, an embodiment of the present application further provides a user identity authentication device, where the device includes: the fingerprint authentication device comprises a first receiving module, a fingerprint authentication module, a PIN code authentication module and a first sending module; wherein,,
the first receiving module is used for receiving a fingerprint authentication request sent by the authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values;
the fingerprint authentication module is used for responding to the fingerprint authentication request and acquiring fingerprint information of the user by using a fingerprint mouse, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information;
The PIN code authentication module is used for enabling the user to input a PIN code according to the indication of using the roller of the fingerprint mouse if the fingerprint information authentication is passed, and comparing the PIN code input by the target roller of the fingerprint mouse with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user;
the first sending module is used for sending the identity authentication result of the user to the authentication platform.
In a fourth aspect, an embodiment of the present application further provides a user identity authentication device, where the device includes: a second transmitting module and a second receiving module; wherein,,
the second sending module is used for sending a fingerprint authentication request to a fingerprint mouse, so that the fingerprint mouse responds to the fingerprint authentication request to acquire fingerprint information of the user, and the fingerprint information of the user is compared with fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to a prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; wherein the fingerprint authentication request comprises: account numbers and challenge values;
And the second receiving module is used for receiving the identity authentication result of the user sent by the fingerprint mouse.
In a fifth aspect, embodiments of the present application provide an electronic device, including:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the user identity authentication method described in any embodiment of the present application.
In a sixth aspect, embodiments of the present application provide a storage medium having stored thereon a computer program that, when executed by a processor, implements the user identity authentication method according to any embodiment of the present application.
The embodiment of the application provides a user identity authentication method, a device, electronic equipment and a storage medium, and the method, the device and the storage medium are used for receiving a fingerprint authentication request sent by an authentication platform; acquiring fingerprint information of a user through a fingerprint mouse in response to the fingerprint authentication request, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; and then the identity authentication result of the user is sent to an authentication platform. That is, in the technical scheme of the application, a user can input a PIN code by using a fingerprint mouse instead of inputting the PIN code by using a keyboard, a person holding the mouse right in general just can see the input position, and the hand holding the mouse can form shielding to other angles, so that privacy and safety in the PIN input process can be effectively protected. In the prior art, the user may steal the PIN code by monitoring the keyboard click event by the Trojan horse through the hook, and the user is easy to peep by bystanders during the process of inputting the PIN code by using the keyboard. Therefore, compared with the prior art, the user identity authentication method, the device, the electronic equipment and the storage medium provided by the embodiment of the application can be used for inputting the PIN code by using the fingerprint mouse, so that the PIN code can be effectively prevented from being stolen by other people, and the privacy and the safety in the PIN code inputting process can be ensured; in addition, the technical scheme of the embodiment of the application is simple and convenient to realize, convenient to popularize and wider in application range.
Drawings
Fig. 1 is a first flow chart of a user identity authentication method according to an embodiment of the present application;
fig. 2 is a second flow chart of a user identity authentication method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a fingerprint mouse according to an embodiment of the present application;
fig. 4 is a schematic diagram of a finger-print mouse according to an embodiment of the present application;
fig. 5 is a third flow chart of a user identity authentication method according to an embodiment of the present application;
fig. 6 is a schematic diagram of a fingerprint and PIN code entry procedure provided in an embodiment of the present application;
fig. 7 is a schematic diagram of a fingerprint and PIN code authentication procedure provided in an embodiment of the present application;
FIG. 8 is a flowchart of a Windows operating system binding method according to an embodiment of the present application;
FIG. 9 is a flowchart of a Windows operating system login process according to an embodiment of the present application;
fig. 10 is a fourth flowchart of a user identity authentication method according to an embodiment of the present application;
fig. 11 is a first schematic structural diagram of a user identity authentication device according to an embodiment of the present application;
fig. 12 is a second schematic structural diagram of a user identity authentication device according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present application are shown in the drawings.
Example 1
Fig. 1 is a schematic flow chart of a user identity authentication method according to an embodiment of the present application, where the method may be performed by a user identity authentication device or a fingerprint mouse, and the device or the fingerprint mouse may be implemented by software and/or hardware, and the device or the fingerprint mouse may be integrated in any intelligent device having a network communication function. As shown in fig. 1, the user identity authentication method may include the steps of:
s101, receiving a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values.
In the step, the fingerprint mouse can receive a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request may comprise: account numbers and challenge values. Specifically, before receiving a fingerprint authentication request sent by an authentication platform, a user may first log in the authentication platform, add a fingerprint input for a current account, and the authentication platform initiates a fingerprint input request to the fingerprint mouse, where the request may include: account numbers and challenge values; the user can touch the fingerprint module of the mouse according to the prompt, the fingerprint mouse collects fingerprint characteristics and calculates, and a key pair is generated for fingerprint information; the user inputs the PIN code by using the mouse wheel according to the prompt, confirms the completion of the input by using the left mouse button, and completes the acquisition of the PIN code by using the fingerprint mouse; the fingerprint mouse saves the fingerprint feature result and the PIN code in the trusted environment of the device and returns a fingerprint input response, which may include: the method comprises the steps that an ID of fingerprint information, a mouse fingerprint public key and a challenge value input by a user are signed by using a pre-acquired mouse device private key; the authentication platform uses a pre-acquired mouse certificate to check the fingerprint input response, and stores the relation between the mouse fingerprint public key and the ID and account number of the fingerprint information.
S102, responding to a fingerprint authentication request, acquiring fingerprint information of a user through a fingerprint mouse, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information.
In this step, the fingerprint mouse may obtain the fingerprint information of the user in response to the fingerprint authentication request, and compare the fingerprint information of the user with the fingerprint information entered in the fingerprint mouse in advance, to obtain the authentication result of the fingerprint information. Specifically, the fingerprint mouse may first extract the first fingerprint feature and the second fingerprint feature from the fingerprint information of the user and the fingerprint information stored in the fingerprint mouse storage module in advance, then calculate the similarity between the first fingerprint feature and the second fingerprint feature, and then obtain the authentication result of the fingerprint information based on the similarity between the first fingerprint feature and the second fingerprint feature.
And S103, if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user.
In this step, if the fingerprint information passes authentication, the user may input a PIN code according to the prompt using the wheel of the fingerprint mouse, and the fingerprint mouse may compare the PIN code input by the user with the PIN code stored in the fingerprint mouse in advance, so as to obtain an identity authentication result of the user. Specifically, the fingerprint mouse may receive PIN codes input by a user using a wheel of the fingerprint mouse in a front-to-rear order; after the user finishes inputting the PIN code by using the roller of the fingerprint mouse, pressing the left key of the fingerprint mouse to confirm; if the user finds that the input PIN code is wrong, the user can press the right button of the fingerprint mouse to empty. At this point the user can re-use the wheel of the fingerprint mouse to enter the PIN code.
S104, sending the identity authentication result of the user to an authentication platform.
In this step, the fingerprint mouse may send the user's authentication result to the authentication platform. The fingerprint mouse may send a fingerprint authentication response to the authentication platform, the fingerprint authentication response may include: { fingerprint ID, authentication result, challenge value }, and sign the fingerprint authentication response using the mouse fingerprint private key.
It should be noted that, in the embodiment of the present application, three key pairs are related in total, and the key pairs are respectively: a mouse manufacturer key pair, a mouse device key pair and a mouse fingerprint key pair; the mouse manufacturer key pair may include: a mouse factory public key and a mouse factory private key; the mouse device key pair may include: a mouse device public key and a mouse device private key; the mouse fingerprint key pair may include: a mouse fingerprint public key and a mouse fingerprint private key.
In practical application, a manufacturer of the mouse has a pair of public and private keys, which are respectively: a mouse factory public key and a mouse factory private key; when producing the mice, each mouse is provided with a pair of public and private keys of equipment, and the public and private keys are respectively: a mouse device public key and a mouse device private key; the method comprises the steps that a public key of the mouse equipment is signed by a private key of a mouse factory to generate a mouse certificate, the mouse certificate can comprise a signature value of the public key of the mouse equipment and the private key of the mouse factory to the public key of the mouse equipment, and the private key of the mouse equipment and the mouse certificate are burnt into a mouse chip. When the mouse interacts with the authentication platform, the mouse certificate is uploaded to the authentication platform, and the authentication platform uses the public key of the mouse manufacturer to verify the mouse certificate to obtain the public key of the mouse device. In the process of inputting the fingerprint by the mouse, the fingerprint mouse signs a fingerprint input response { fingerprint ID, mouse fingerprint public key, challenge value } by using a mouse device private key, and the authentication platform signs the fingerprint input response by using a mouse certificate (comprising the mouse device public key).
The user identity authentication method provided by the embodiment of the application receives a fingerprint authentication request sent by an authentication platform; acquiring fingerprint information of a user through a fingerprint mouse in response to the fingerprint authentication request, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; and then the identity authentication result of the user is sent to an authentication platform. That is, in the technical scheme of the application, a user can input a PIN code by using a fingerprint mouse instead of inputting the PIN code by using a keyboard, a person holding the mouse right in general just can see the input position, and the hand holding the mouse can form shielding to other angles, so that privacy and safety in the PIN input process can be effectively protected. In the prior art, the user may steal the PIN code by monitoring the keyboard click event by the Trojan horse through the hook, and the user is easy to peep by bystanders during the process of inputting the PIN code by using the keyboard. Therefore, compared with the prior art, the user identity authentication method provided by the embodiment of the application can input the PIN code by using the fingerprint mouse, and can effectively prevent the PIN code from being stolen by other people, so that the privacy and the safety in the PIN code input process can be ensured; in addition, the technical scheme of the embodiment of the application is simple and convenient to realize, convenient to popularize and wider in application range.
Example two
Fig. 2 is a second flowchart of a user identity authentication method according to an embodiment of the present application. Further optimization and expansion based on the above technical solution can be combined with the above various alternative embodiments. As shown in fig. 2, the user identity authentication method may include the steps of:
s201, receiving a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values.
S202, acquiring fingerprint information of a user through a fingerprint mouse in response to a fingerprint authentication request, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information.
And S203, if the fingerprint information passes the authentication, receiving PIN codes input by a user by using a roller of the fingerprint mouse in the sequence from front to back.
S204, after the user finishes inputting the PIN code by using the roller of the fingerprint mouse, pressing the left key of the fingerprint mouse to confirm.
In this step, after the user finishes inputting the PIN code by using the wheel of the fingerprint mouse, the user can press the left key of the fingerprint mouse to confirm. Typically, the number of digits of the PIN is 4-8. If the user finds that the input PIN code is wrong, the user can press the right button of the fingerprint mouse to empty. At this point the user can re-use the wheel of the fingerprint mouse to enter the PIN code.
S205, comparing the PIN code input by the user with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user.
S206, sending the identity authentication result of the user to an authentication platform.
In the specific embodiment of the application, the user can press the left key of the fingerprint mouse to indicate that the input PIN code is confirmed; the user can also press the right button of the fingerprint mouse to indicate that the input PIN code is emptied; at this time, the user can input the PIN code again using the wheel of the fingerprint mouse.
Fig. 3 is a schematic structural diagram of a fingerprint mouse according to an embodiment of the present application. As shown in fig. 3, the fingerprint mouse in the embodiment of the present application may include: fingerprint module and roller state digital display screen; the key (roller) in the mouse is divided into 10 parts, which correspond to the numbers 0-9 respectively, namely, the number represented by each 36 degrees of the roller is added with 1, and the number returns to 0 after one circle of the roller. Scrolling in the opposite direction, the corresponding number is decremented by 1.
Fig. 4 is a schematic diagram of a finger-print mouse according to an embodiment of the present application. As shown in FIG. 4, a small display screen is added behind the left mouse button for displaying the number represented by the current roller state, the position is just the position where the palm is arched, a certain distance is reserved between the mouse and the palm, the position can be just seen by the line of sight of a person holding the mouse in the right hand, and the hand holding the mouse is shielded from other angles, so that the privacy and safety in the PIN input process can be effectively protected. The key in the mouse is pressed, i.e. the number represented by the current wheel state is entered. In the PIN code input process, pressing the left mouse button represents that the whole PIN code input is completed, and pressing the right mouse button clears all the current inputs. The user can use the left mouse button to finish the input of PIN codes with different lengths.
The fingerprint mouse in the embodiment of the application is provided with the SE and the TPM security chip, and has an external unreadable storage space, and when the fingerprint mouse interacts with other equipment modules, the SE security chip encrypts and transmits the key pair generated by aiming at the specific fingerprint. The security chips form a trusted environment of the equipment, the input and the storage of the PIN code are completed in the trusted environment of the equipment, the external Trojan is prevented from being stolen, and meanwhile, the security risk brought by external transmission and storage is also avoided.
The user identity authentication method provided by the embodiment of the application receives a fingerprint authentication request sent by an authentication platform; acquiring fingerprint information of a user through a fingerprint mouse in response to the fingerprint authentication request, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; and then the identity authentication result of the user is sent to an authentication platform. That is, in the technical scheme of the application, a user can input a PIN code by using a fingerprint mouse instead of inputting the PIN code by using a keyboard, a person holding the mouse right in general just can see the input position, and the hand holding the mouse can form shielding to other angles, so that privacy and safety in the PIN input process can be effectively protected. In the prior art, the user may steal the PIN code by monitoring the keyboard click event by the Trojan horse through the hook, and the user is easy to peep by bystanders during the process of inputting the PIN code by using the keyboard. Therefore, compared with the prior art, the user identity authentication method provided by the embodiment of the application can input the PIN code by using the fingerprint mouse, and can effectively prevent the PIN code from being stolen by other people, so that the privacy and the safety in the PIN code input process can be ensured; in addition, the technical scheme of the embodiment of the application is simple and convenient to realize, convenient to popularize and wider in application range.
Example III
Fig. 5 is a third flow chart of a user identity authentication method according to an embodiment of the present application. Further optimization and expansion based on the above technical solution can be combined with the above various alternative embodiments. As shown in fig. 5, the user identity authentication method may include the steps of:
s501, receiving fingerprint information input by a user; and generating a corresponding mouse fingerprint key pair according to fingerprint information input by a user, wherein the mouse fingerprint key pair comprises: a mouse fingerprint public key and a mouse fingerprint private key.
S502, receiving a PIN code input by a user; and storing the fingerprint information input by the user and the PIN code input by the user in a trusted environment.
S503, sending a fingerprint input response to the authentication platform; the fingerprint input response is signed by using a pre-acquired mouse device private key; wherein the fingerprint-entry response comprises: the user inputs the ID of the fingerprint information, the fingerprint mouse public key and the challenge value; the authentication platform uses the pre-acquired mouse certificate to check the fingerprint input response, and stores the relation between the mouse fingerprint public key and the ID and account number of the fingerprint information.
S504, receiving a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values.
S505, the fingerprint information of the user is obtained through a fingerprint mouse in response to the fingerprint authentication request, and the fingerprint information of the user is compared with the fingerprint information input by the user, so that an authentication result of the fingerprint information is obtained.
S506, if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code input by the user, so that an identity authentication result of the user is obtained.
S507, the identity authentication result of the user is sent to an authentication platform.
It should be noted that, in the embodiment of the present application, the fingerprint information is input and authenticated by two independent processes, and the fingerprint is not required to be input once before each authentication process is executed, and the fingerprint is required to be input once before the authentication process is executed for the first time, and the fingerprint is not required to be input again after the authentication process is executed.
Fig. 6 is a schematic diagram of a fingerprint and PIN code entry procedure provided in an embodiment of the present application. As shown in fig. 6, the fingerprint and PIN code entry process may include the steps of: 1) The user logs into the authentication platform. 2) The user adds fingerprint input for the current account, and the authentication platform initiates a fingerprint input request { account number, challenge value }, to the fingerprint mouse. 3) And the user touches the fingerprint module of the mouse according to the prompt, the fingerprint mouse collects fingerprint characteristics and calculates, and a key pair is generated for the fingerprint. 4) And the user inputs the PIN code by using the mouse wheel according to the prompt, confirms the completion of the input by using the left mouse button, and completes the acquisition of the PIN code by using the fingerprint mouse. 5) The fingerprint mouse stores the fingerprint characteristic result and the PIN code in the equipment trusted environment, returns a message { fingerprint ID, public key, challenge value }, and signs by using the private key of the mouse equipment. 6) The authentication platform uses the public key in the mouse certificate to verify the signature, and stores records { account number, fingerprint ID, mouse fingerprint public key }.
Fig. 7 is a schematic diagram of a fingerprint and PIN code authentication procedure according to an embodiment of the present application. As shown in fig. 7, taking a single sign-on procedure of a service system through an authentication platform as an example, the fingerprint and PIN code authentication procedure may include the following steps: 1) The user logs in the service system, the service system authentication platform performs butt joint, and the service system initiates a single sign-on request (authorize) to the authentication platform; 2) After judging that the request has no login state, the authentication platform jumps to an authentication platform login page; 3) The user inputs a login account number on a login page of an authentication platform, and the authentication platform initiates a fingerprint authentication request to a fingerprint mouse, comprising: challenge value and account number; 4) The fingerprint mouse collects user fingerprints, matches and compares the user fingerprints with all fingerprints under the account stored in the trusted environment of the equipment, if the corresponding fingerprints are found, fingerprint verification is passed, and a PIN code verification link is entered; otherwise, returning a fingerprint authentication failure; 5) The user enters the PIN code using the fingerprint mouse wheel and confirms that the entry is complete using the left mouse button. The fingerprint mouse compares the input PIN code with the fingerprint PIN code stored in the device, and if the input PIN code is consistent with the fingerprint PIN code stored in the device, the authentication is successful; otherwise, returning authentication failure; 6) The fingerprint mouse returns an authentication result message, which comprises: fingerprint ID, authentication result and challenge value, and signs by using fingerprint private key; 7) The authentication platform verifies the signature using the public key corresponding to the fingerprint ID. After the signature passes the verification, if the authentication result is successful, returning the user information to the service system; 8) The business system establishes a login state according to the logic of the business system and prompts the user that the login is successful. If the authentication result is failure, the authentication platform login page prompts the user that authentication fails.
Fig. 8 is a schematic flow chart of a binding Windows operating system according to an embodiment of the present application. As shown in fig. 8, the process of binding the Windows operating system by the user using the fingerprint mouse may include the following steps: 1) The user opens a fingerprint mouse on Windows and inputs a Windows login account and a password; 2) The fingerprint client initiates a fingerprint binding request to the fingerprint mouse, comprising: an account number and a password; 3) The fingerprint mouse collects fingerprint characteristics and calculates, and generates a key pair for the fingerprint; 4) The user inputs the PIN code by using the mouse wheel according to the prompt, confirms the completion of the input by using the left mouse button, and completes the acquisition of the PIN code by using the fingerprint mouse; 5) The fingerprint mouse stores { fingerprint ID, fingerprint characteristics, PIN code, account number and login password } in the equipment trusted environment, and returns successful binding; 6) The fingerprint client displays that the binding was successful.
Fig. 9 is a schematic flow chart of logging in a Windows operating system according to an embodiment of the present application. As shown in fig. 9, the process of the user logging into the windows system using the fingerprint and PIN code includes the following steps: 1) The user wakes up after starting up or locking the screen, the login process LogOnUI of the Windows system loads a custom dll, and a fingerprint verification login interface is displayed; 2) The user inputs a login account number of windows, the LogOnUI sends a fingerprint authentication request { account name } to a fingerprint mouse through dll, and prompts the user to touch and press a fingerprint module of the mouse; 3) The fingerprint mouse collects the user fingerprint, matches and compares the user fingerprint with the fingerprint corresponding to the account stored in the trusted environment of the equipment, and enters a PIN code verification link if the comparison is successful; otherwise, returning a fingerprint authentication failure; 4) The user enters the PIN code using the fingerprint mouse wheel and confirms that the entry is complete using the left mouse button. The fingerprint mouse compares the input PIN code with the fingerprint PIN code stored in the device, and if the input PIN code is consistent with the fingerprint PIN code stored in the device, the authentication is successful; otherwise, returning authentication failure; 5) When authentication is successful, the fingerprint mouse returns a Windows login password corresponding to the account; 6) The LogOnUI process of the Windows system checks the Windows password, successfully logs in and enters the Windows system.
The user identity authentication method provided by the embodiment of the application receives a fingerprint authentication request sent by an authentication platform; acquiring fingerprint information of a user through a fingerprint mouse in response to the fingerprint authentication request, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; and then the identity authentication result of the user is sent to an authentication platform. That is, in the technical scheme of the application, a user can input a PIN code by using a fingerprint mouse instead of inputting the PIN code by using a keyboard, a person holding the mouse right in general just can see the input position, and the hand holding the mouse can form shielding to other angles, so that privacy and safety in the PIN input process can be effectively protected. In the prior art, the user may steal the PIN code by monitoring the keyboard click event by the Trojan horse through the hook, and the user is easy to peep by bystanders during the process of inputting the PIN code by using the keyboard. Therefore, compared with the prior art, the user identity authentication method provided by the embodiment of the application can input the PIN code by using the fingerprint mouse, and can effectively prevent the PIN code from being stolen by other people, so that the privacy and the safety in the PIN code input process can be ensured; in addition, the technical scheme of the embodiment of the application is simple and convenient to realize, convenient to popularize and wider in application range.
Example IV
Fig. 10 is a fourth flowchart of a user identity authentication method provided in the embodiment of the present application, where the method may be performed by a user identity authentication device or an authentication platform, where the device or the authentication platform may be implemented by software and/or hardware, and the device or the authentication platform may be integrated into any intelligent device with a network communication function. As shown in fig. 10, the user identity authentication method may include the steps of:
s1001, sending a fingerprint authentication request to a fingerprint mouse, enabling the fingerprint mouse to respond to the fingerprint authentication request and acquire fingerprint information of a user through the fingerprint mouse, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; wherein the fingerprint authentication request comprises: account numbers and challenge values.
S1002, receiving an identity authentication result of a user sent by the fingerprint mouse.
According to the fingerprint authentication method and device, based on fingerprint authentication, the PIN code is added to serve as double-factor authentication, so that fingerprint authentication through a fingerprint mouse after fingerprint copying and counterfeiting is prevented. Even if the fingerprint is cloned and copied, the entire authentication process cannot be completed without stealing the PIN code of the user. The PIN code is stored on the fingerprint mouse device instead of the server, so that the risk of database drag library cracking can be effectively prevented. The security chips such as TEE, SE, TPM ensure the security of the storage and use of fingerprint key pairs and PIN codes, and external software cannot read and crack the fingerprint mouse. Meanwhile, the PIN code is stored in the fingerprint mouse, so that the safety risk brought by external transmission and storage is avoided. The PIN code is entered using a fingerprint mouse instead of using the usual keyboard entry. The process of inputting the PIN code by the fingerprint mouse is not driven by a system, and is only completed in an internal chip of the device, and a malicious Trojan cannot monitor the input event of the device through means such as hooks, so that the PIN code is obtained. The PIN is input by using a mouse roller mode, and the number represented by the current roller state is shielded by the hand holding the mouse, so that privacy and safety in the input process are ensured, and bystanders can be effectively prevented from peeping to steal the PIN. If other people are left when the PIN code is input, the user can also cover the left side of the mouse left and right, so that only the person who inputs the PIN code can see the digital screen on the mouse.
The user identity authentication method provided by the embodiment of the application receives a fingerprint authentication request sent by an authentication platform; acquiring fingerprint information of a user through a fingerprint mouse in response to the fingerprint authentication request, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to the prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; and then the identity authentication result of the user is sent to an authentication platform. That is, in the technical scheme of the application, a user can input a PIN code by using a fingerprint mouse instead of inputting the PIN code by using a keyboard, a person holding the mouse right in general just can see the input position, and the hand holding the mouse can form shielding to other angles, so that privacy and safety in the PIN input process can be effectively protected. In the prior art, the user may steal the PIN code by monitoring the keyboard click event by the Trojan horse through the hook, and the user is easy to peep by bystanders during the process of inputting the PIN code by using the keyboard. Therefore, compared with the prior art, the user identity authentication method provided by the embodiment of the application can input the PIN code by using the fingerprint mouse, and can effectively prevent the PIN code from being stolen by other people, so that the privacy and the safety in the PIN code input process can be ensured; in addition, the technical scheme of the embodiment of the application is simple and convenient to realize, convenient to popularize and wider in application range.
Example five
Fig. 11 is a first schematic structural diagram of a user identity authentication device according to an embodiment of the present application. As shown in fig. 7, the user identity authentication device includes: a first receiving module 1101, a fingerprint authentication module 1102, a PIN code authentication module 1103 and a first transmitting module 1104; wherein,,
the first receiving module 1101 is configured to receive a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values;
the fingerprint authentication module 1102 is configured to obtain fingerprint information of the user using a fingerprint mouse in response to the fingerprint authentication request, and compare the fingerprint information of the user with fingerprint information entered in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information;
the PIN code authentication module 1103 is configured to, if the fingerprint information is authenticated, input a PIN code by the user according to a prompt using a wheel of the fingerprint mouse, and compare the PIN code input by the wheel of the fingerprint mouse with a PIN code stored in the fingerprint mouse in advance, so as to obtain an identity authentication result of the user;
the first sending module 1104 is configured to send an identity authentication result of the user to the authentication platform.
The user identity authentication device can execute the methods provided in the first to third embodiments of the present application, and has the corresponding functional modules and beneficial effects of executing the methods. Technical details not described in detail in the present embodiment can be seen in the user identity authentication methods provided in the first to third embodiments of the present application.
Example six
Fig. 12 is a second schematic structural diagram of a user identity authentication device according to an embodiment of the present application. As shown in fig. 8, the user identity authentication device includes: a second transmitting module 1201 and a second receiving module 1202; wherein,,
the second sending module 1201 is configured to send a fingerprint authentication request to a fingerprint mouse, so that the fingerprint mouse obtains fingerprint information of the user in response to the fingerprint authentication request, and compare the fingerprint information of the user with fingerprint information that is input in the fingerprint mouse in advance, to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to a prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; wherein the fingerprint authentication request comprises: account numbers and challenge values;
And the second receiving module 1202 is configured to receive an identity authentication result sent by the fingerprint mouse to the user.
The user identity authentication device can execute the method provided by the fourth embodiment of the application, and has the corresponding functional modules and beneficial effects of executing the method. Technical details which are not described in detail in the present embodiment can be referred to the user identity authentication method provided in any embodiment four of the present application.
Example seven
Fig. 13 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device in the embodiment of the application may be a fingerprint mouse or an authentication platform. Fig. 13 illustrates a block diagram of an exemplary electronic device suitable for use in implementing embodiments of the present application. The electronic device 12 shown in fig. 13 is merely an example and should not be construed as limiting the functionality and scope of use of the embodiments herein.
As shown in fig. 13, the electronic device 12 is in the form of a general purpose computing device. Components of the electronic device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, a bus 18 that connects the various system components, including the system memory 28 and the processing units 16.
Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, micro channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 12 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by electronic device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32. The electronic device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 13, commonly referred to as a "hard disk drive"). Although not shown in fig. 13, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be coupled to bus 18 through one or more data medium interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of the embodiments of the present application.
A program/utility 40 having a set (at least one) of program modules 42 may be stored in, for example, memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 42 generally perform the functions and/or methods in the embodiments described herein.
The electronic device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), one or more devices that enable a user to interact with the electronic device 12, and/or any devices (e.g., network card, modem, etc.) that enable the electronic device 12 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 22. Also, the electronic device 12 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, through a network adapter 20. As shown, the network adapter 20 communicates with other modules of the electronic device 12 over the bus 18. It should be appreciated that although not shown in fig. 13, other hardware and/or software modules may be used in connection with electronic device 12, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
The processing unit 16 executes various functional applications and data processing by running programs stored in the system memory 28, for example, implementing the user identity authentication method provided in the embodiment of the present application.
Example eight
Embodiments of the present application provide a computer storage medium.
Any combination of one or more computer readable media may be employed in the computer readable storage media of the embodiments herein. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present application may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
Note that the above is only a preferred embodiment of the present application and the technical principle applied. Those skilled in the art will appreciate that the present application is not limited to the particular embodiments described herein, but is capable of numerous obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the present application. Therefore, while the present application has been described in connection with the above embodiments, the present application is not limited to the above embodiments, but may include many other equivalent embodiments without departing from the spirit of the present application, the scope of which is defined by the scope of the appended claims.

Claims (10)

1. A user identity authentication method, applied to a fingerprint mouse, comprising:
receiving a fingerprint authentication request sent by an authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values;
responding to the fingerprint authentication request, acquiring fingerprint information of the user through a fingerprint mouse, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information;
if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to a prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user;
And sending the identity authentication result of the user to the authentication platform.
2. The method of claim 1, wherein the user entering a PIN code using a wheel of the fingerprint mouse according to a prompt, comprising:
receiving PIN codes input by the user by using a roller of the fingerprint mouse in a front-to-back sequence;
after the user finishes inputting the PIN code by using the roller of the fingerprint mouse, the user presses the left key of the fingerprint mouse to confirm.
3. The method of claim 2, wherein receiving the PIN code entered by the user using the wheel of the fingerprint mouse comprises:
taking the current position of the roller of the fingerprint mouse as a starting position and a terminating position;
when the user rolls the roller of the fingerprint mouse from the current position by 36 degrees according to the preset positive direction in the process of rolling the roller of the fingerprint mouse from the initial position to the final position for one week, adding 1 to the number corresponding to the current position as the number corresponding to the target position; and when the user scrolls the roller of the fingerprint mouse from the current position by 36 degrees according to the preset opposite direction, subtracting 1 from the number corresponding to the current position as the number corresponding to the target position.
4. The method of claim 1, wherein prior to receiving the fingerprint authentication request sent by the authentication platform, the method further comprises:
receiving fingerprint information input by the user; and generating a corresponding mouse fingerprint key pair according to the fingerprint information input by the user, wherein the mouse fingerprint key pair comprises: a mouse fingerprint public key and a mouse fingerprint private key;
receiving a PIN code input by the user; storing the fingerprint information input by the user and the PIN code input by the user in a trusted environment;
sending a fingerprint input response to the authentication platform; the fingerprint input response is signed by using a pre-acquired mouse device private key; wherein the fingerprint-entry response comprises: the ID of the fingerprint information, the mouse fingerprint public key and the challenge value which are input by the user; and the authentication platform uses a pre-acquired mouse certificate to check the fingerprint input response, and stores the relation between the mouse fingerprint public key and the ID and the account number of the fingerprint information.
5. A user identity authentication method, applied to an authentication platform, the method comprising:
Sending a fingerprint authentication request to a fingerprint mouse, enabling the fingerprint mouse to respond to the fingerprint authentication request to acquire fingerprint information of the user, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to acquire an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to a prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; wherein the fingerprint authentication request comprises: account numbers and challenge values;
and receiving an identity authentication result sent by the fingerprint mouse.
6. The method of claim 5, wherein prior to sending the fingerprint authentication request to the fingerprint mouse, the method further comprises:
receiving a fingerprint input response sent by the fingerprint mouse; wherein the fingerprint-entry response comprises: the ID of the fingerprint information, the mouse fingerprint public key and the challenge value which are input by the user;
and verifying the fingerprint input response by using a pre-acquired mouse certificate, and storing the relation between the mouse fingerprint public key and the ID of the fingerprint information and the account number.
7. A user identity authentication device, the device comprising: the fingerprint authentication device comprises a first receiving module, a fingerprint authentication module, a PIN code authentication module and a first sending module; wherein,,
the first receiving module is used for receiving a fingerprint authentication request sent by the authentication platform; wherein the fingerprint authentication request comprises: account numbers and challenge values;
the fingerprint authentication module is used for responding to the fingerprint authentication request and acquiring fingerprint information of the user by using a fingerprint mouse, and comparing the fingerprint information of the user with the fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information;
the PIN code authentication module is used for enabling the user to input a PIN code according to the indication of using the roller of the fingerprint mouse if the fingerprint information authentication is passed, and comparing the PIN code input by the target roller of the fingerprint mouse with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user;
the first sending module is used for sending the identity authentication result of the user to the authentication platform.
8. A user identity authentication device, the device comprising: a second transmitting module and a second receiving module; wherein,,
The second sending module is used for sending a fingerprint authentication request to a fingerprint mouse, so that the fingerprint mouse responds to the fingerprint authentication request to acquire fingerprint information of the user, and the fingerprint information of the user is compared with fingerprint information input in the fingerprint mouse in advance to obtain an authentication result of the fingerprint information; if the fingerprint information passes the authentication, the user inputs a PIN code by using a roller of the fingerprint mouse according to a prompt, and the PIN code input by the user is compared with the PIN code pre-stored in the fingerprint mouse to obtain an identity authentication result of the user; wherein the fingerprint authentication request comprises: account numbers and challenge values;
and the second receiving module is used for receiving the identity authentication result of the user sent by the fingerprint mouse.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the user identity authentication method of any of claims 1 to 4 or 5 to 6.
10. A storage medium having stored thereon a computer program, which when executed by a processor implements a user identity authentication method as claimed in any one of claims 1 to 4 or 5 to 6.
CN202310520898.4A 2023-05-10 2023-05-10 User identity authentication method and device, electronic equipment and storage medium Pending CN116541817A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310520898.4A CN116541817A (en) 2023-05-10 2023-05-10 User identity authentication method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310520898.4A CN116541817A (en) 2023-05-10 2023-05-10 User identity authentication method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116541817A true CN116541817A (en) 2023-08-04

Family

ID=87451891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310520898.4A Pending CN116541817A (en) 2023-05-10 2023-05-10 User identity authentication method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116541817A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119494126A (en) * 2024-10-31 2025-02-21 江南信安(北京)科技有限公司 A multi-factor enhanced authentication method and device suitable for trusted fingerprint mouse

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119494126A (en) * 2024-10-31 2025-02-21 江南信安(北京)科技有限公司 A multi-factor enhanced authentication method and device suitable for trusted fingerprint mouse
CN119494126B (en) * 2024-10-31 2025-07-11 江南信安(北京)科技有限公司 Multi-factor enhanced authentication method and device suitable for trusted fingerprint mouse

Similar Documents

Publication Publication Date Title
JP6239788B2 (en) Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium
CN110781468B (en) Identity authentication processing method and device, electronic equipment and storage medium
CN109587162B (en) Login verification method, device, terminal, password server and storage medium
US8856902B2 (en) User authentication via mobile communication device with imaging system
US10931663B2 (en) Terminal authenticated access
CN102035654B (en) Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method
US20180268415A1 (en) Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal
WO2020073513A1 (en) Blockchain-based user authentication method and terminal device
US20110082801A1 (en) Secure Transaction Systems and Methods
EP2343678A1 (en) Secure transaction systems and methods
US8904482B1 (en) Techniques for securing a one-time passcode with an alteration code
US20120167194A1 (en) Client hardware authenticated transactions
EP2936277B1 (en) Method and apparatus for information verification
CN110807624A (en) Digital currency hardware cold wallet system and transaction method thereof
JP2016535881A (en) Method and system for authenticating services
US20200134149A1 (en) Login mechanism for operating system
CN115550002B (en) A smart home remote control method and related device based on TEE
US20190158486A1 (en) Method for authorization code verification and server
CN113826095A (en) Single click login process
WO2022042745A1 (en) Key management method and apparatus
CN112862484A (en) Secure payment method and device based on multi-terminal interaction
CN108337090A (en) A kind of dynamic password acquisition methods, device, terminal and storage medium
CN112150151B (en) Secure payment method, apparatus, electronic device and storage medium
CN116541817A (en) User identity authentication method and device, electronic equipment and storage medium
CN115967581A (en) Login verification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination