Authentication method, authentication device, terminal equipment, authentication server and system

An authentication method and a technology of an authentication device, which are applied in the field of authentication, can solve problems such as the failure of the scheme for detecting liveness, and achieve the effect of increasing security

Inactive Publication Date: 2015-06-03
IBM CORP
View PDF13 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventors of the present invention have found that the scheme for detecting liveness in the prior art will fail if a fraudster records a video recording of a user and uses this video recording to deceive a mobile device
However, for this situation, so far, it has not been recognized by those skilled in the art, therefore, the inventor of the present invention thinks that it is necessary to improve in this respect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication device, terminal equipment, authentication server and system
  • Authentication method, authentication device, terminal equipment, authentication server and system
  • Authentication method, authentication device, terminal equipment, authentication server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Some preferred embodiments of the present disclosure are shown in the drawings and will be described in more detail below with reference to the drawings. However, the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0026] Those skilled in the art know that various aspects of the present invention can be implemented as a system, method or computer program product. Therefore, various aspects of the present invention can be embodied in the following forms, that is: a complete hardware implementation, a complete software implementation (including firmware, resident software, microcode, etc.), or a combination of hardware and software implementations, These may collectively be referred to herein as "circuits," "modules," or "systems....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An authentication method can include, a random expression prompt, recording of the user's expression actions, and an authentication result. This is completed using a terminal device configured to display authentication information, record the user's inputted information, and send an authentication result. The terminal device may be further configured to package an authentication result, and send it to an authentication server. Subsequent actions of the user are allowed or denied based on the authentication result.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to an authentication method, an authentication device, a terminal device, an authentication server and an authentication system. Background technique [0002] Smart mobile devices are becoming more and more popular in people's daily life. As a big trend in banking / business services, mobile banking / commerce has emerged. However, security is a challenge in the mobile banking / business application space. For example, traditional security authentication methods such as U-shield (USB Key) or one-time password (OTP, One Time Password) are not well suited for smartphones. Since biometric features such as facial features and fingerprint features are a kind of "natural password", it is usually unique and does not require people to memorize, therefore, it has been proposed to apply biometric features to security authentication on mobile devices. technical solutions. [0003] In the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861G06F21/32G06F21/36G06Q20/00G06Q20/4014
Inventor 李敏包胜华苏中钱伟红
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products