Identity authentication method and wearing device

An identity verification method and wearable device technology, applied in the field of information security, can solve problems such as inconvenient user memory, cracking by others, and poor security, so as to improve user experience, save cumbersome steps, and improve security.

Inactive Publication Date: 2014-07-09
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: based on the way the user enters the password, if the password is too short and easy to be cracked by others; if the password is too long, it is not easy for the user to remember, remember Prone to confusion and errors with multiple passwords
At the same time, when the user enters the password on the corresponding device (such as a cash machine, smart door), it is easy to be seen by others, and the security is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and wearing device
  • Identity authentication method and wearing device
  • Identity authentication method and wearing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0017] The following describes the identity verification method and the wearable device according to the embodiments of the present invention with reference to the accompanying drawings.

[0018] figure 1 It is a flowchart of an identity verification method according to an embodiment of the present invention. Such as figure 1 As shown, the authentication methods include:

[0019] S101. Detect whether there is an authentication device for authenticating the wearable device in a preset area.

[0020] Specifically, when the wear...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and a wearing device. The identity authentication method includes detecting whether any authentication device for authenticating identity of the wearing device exists in the preset area or not; if yes, transmitting identity authentication request for the authentication device; receiving operation response information fed back by the authentication device according to the identity authentication request. The identity authentication method in the embodiment is used for authenticating identity by the wearing device and the authentication device, and since the acquired identity information is difficult to fake or duplicate, safety is improved, a complicated step of inputting passwords by users is omitted, convenience is improved, identity authentication is more intelligentized, and user experience is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity verification method and a wearable device. Background technique [0002] With the continuous development of social informatization, the application field of identity verification is becoming wider and wider, for example: identity verification is required when logging into a personal online banking account, and identity verification is required when withdrawing money through an ATM. At present, most of the traditional authentication methods are realized by the user inputting a password. [0003] However, in the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: based on the way the user enters the password, if the password is too short and easy to be cracked by others; if the password is too long, it is not easy for the user to remember, remember Multiple passwords are prone to c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44
CPCG06F21/31
Inventor 陈龙
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products