Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and identity authentication system based on signature

A handwritten signature and identity authentication technology, applied in the field of pattern recognition, can solve the problems of inability to meet security requirements, easy confusion, illegal attacks, etc., to reduce the time required for verification, avoid forgetting, and improve security.

Active Publication Date: 2015-04-01
HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most user name / password authentication methods require the user to memorize the authentication password. Users tend to use short passwords, which will cause low system security and are easy to be attacked. When users use long passwords, they are easy to forget; when users use the same password for a long time, The storage period is too long, and the possibility of being cracked is increasing day by day, but the password is often changed, and it is easy to confuse
Once the user forgets the authentication password, it cannot be authenticated
Moreover, once an illegal user obtains the authentication password of a legitimate user, he can pass the verification in a legal way, which is less secure.
The password of the identity authentication method based on user name / password is easy to forget, leak and be illegally attacked by others
This method is increasingly unable to meet the security requirements of the existing network, thus an identity authentication scheme with higher security is urgently needed, so the identity authentication scheme based on handwritten signature emerges as the times require

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and identity authentication system based on signature
  • Identity authentication method and identity authentication system based on signature
  • Identity authentication method and identity authentication system based on signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0019] Such as figure 1 As shown, the identity authentication system based on online handwritten signature verification in this embodiment includes a pre-storage device, a digital library and an authentication device. The pre-storage device is used to complete the registration of the handwritten signature, that is, collect the handwritten signature information through the input device, and extract the sample signature features; the database is to store the sample signature features extracted in the registration stage in the sample database for subsequent matching; authentication The device mainly includes an acquisition unit, a preprocessing unit, a feature extraction unit and a matching unit. Acquisition unit: input handwritten signature through the touch screen on products such as computers and mobile phones; preprocessing unit: perform a series of preproc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method and an identity authentication system based on signature. The identity authentication method includes the steps of inputting signature information on a touch screen of a computer or a cellphone online, preprocessing the signature information via zooming a signature waveform, spinning, translating and filtering operation; extracting signature characteristics, finding out an optimized time calibration matching path between signature characteristics of a signature to be detected and signature characteristics of a sample signature, calculating distance between the signature to be detected and the sample signature; judging the signature to be true if the calculated distance is smaller than a threshold value, otherwise, judging the signature to be false. The identity authentication method and the identity authentication system have the advantages that the problems about forgetting a password, disclosure of the password and illegal attack and the like of a signature authentication method are avoided, safety in login and identity authentication is improved, and required authentication time is greatly reduced since the authentication is implemented in a one-to-one mode and authentication of a user name / password based authentication method is implemented in a one-to-many mode.

Description

technical field [0001] The invention relates to the field of pattern recognition for identity authentication by using human biometric features, that is, handwritten signatures, in particular to an identity authentication method and system based on handwritten signatures. Background technique [0002] In the field of identity authentication, most fields adopt a fixed password identity authentication method, that is, a user name / password authentication method. The main principle of the username / password authentication method is to compare the username / password and other information entered by the user with the database. If the comparison is successful, the identity authentication is passed, otherwise, the identity authentication is not passed. For example, the identity authentication of computer users, the identity authentication of network users, the identity authentication of bank card users, the identity authentication of enterprise employees entering the office area, etc. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 罗美美邱柏云贺晓明
Owner HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD