Man-machine fusion security authentication method based on wearable equipment

A wearable device and authentication method technology, applied in the field of identity authentication, can solve the problem that identity is easily impersonated or replaced by others

Active Publication Date: 2013-09-18
FUDAN UNIV
View PDF5 Cites 100 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the first two methods belong to the traditional identity authentication methods. Because they mainly rely on external objects, once the identity identification items and identification knowledge are stolen or forgotten, their identity is easily impersonated or replaced by others.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man-machine fusion security authentication method based on wearable equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] like figure 1 , the user first registers with the wearable device and stores personal digital identity information into the wearable device. Subsequently, when the user wishes to log in to other devices or websites, the wearable device first authenticates the current user through biometric matching. After confirming that the current user is a legitimate user, the wearable device can initiate an authentication request to other devices or networks, and use the user's personal digital identity information stored in it to pass the authentication.

[0044] In the present invention, the user needs to train the wearable device before using the wearable device for security fusion authentication. During training, the wearable device obtains the user's biological information through its built-in sensors, such as the user's bioelectricity, pulse phase, iris, gait, fing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of personal identity authentication, and particularly relates to a man-machine fusion security authentication method based on wearable equipment. The wearable equipment in which user digital identity information is saved replaces a user to carry out identity authentication in a network space, and a command is not required to be inputted directly by the user. The method comprises the special steps as follows: a method user registers in the wearable equipment to become an authorized user; the method user stores the self digital identity into the wearable equipment; the method user passes the biometric-based identification authentication of the wearable equipment; and the wearable equipment automatically logs in other equipment or information systems in internet space through using the user digital identification stored in the wearable equipment. The method reduces the dependence of the user on a simple command, guarantees the information to be safer, and facilitates the monitoring and management better.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a human-machine fusion authentication method based on a wearable device. Background technique [0002] 1. Wearable devices [0003] A wearable device is a smart device that can be "worn" by the user. Wearable devices, in the form of glasses, wristbands, watches, etc., are directly worn by users or integrated into clothes or accessories, combined with people, and constitute a mobile node through wireless transmission, realizing wearable computing of mobile network computing ( Wearable Computing) mode. [0004] Wearable devices support wearable computing technology and network connectivity, enabling them to share data with users and other devices such as smartphones, computers, etc. Typical wearable devices currently available include: [0005] Smart glasses, such as Google Glass from Google Inc. It is an "extended reality" glasses that have the sam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
Inventor 韩伟力雷畅
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products