User identity recognition method and device

A technology for user identification and user identification, applied in the field of user identification methods and devices, can solve problems such as inflexibility, low security, and cumbersomeness.

Inactive Publication Date: 2015-07-08
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the use of fingerprint recognition to identify terminal users has been widely used. The most important identification methods in fingerprint recognition are front pressing, back pressing, front sliding, and back sliding. The recognition schemes and recognition effects are not the same, but the existing fingerprint recognition methods can only be recognized in a limited finger size area, requiring the user to place the designated finger in the...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity recognition method and device
  • User identity recognition method and device
  • User identity recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0054] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0055]Mobile terminals may be implemented in various forms. For example, terminals described in the present invention may include devices such as mobile phones, smart phones, notebook computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Tablet Computers), PMPs (Portable Multimedia Players), navigation devices, etc. mobile terminals and fixed terminals such as digital TVs, desktop co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity recognition method. The user identity recognition method comprises the steps that when an operation instruction on a touch screen is detected, and the current operation track and the corresponding finger print information are obtained; the obtained operation track and the corresponding finger print information are matched with verification information in a preset database; recognition is conducted on user identity according to the matched results. The invention further discloses a user identity recognition device. By means of the user identity recognition method and device, the tedious operation including repeated and multiple times of collection, inputting and verification on a designate finger of a user is not needed, the device and method are more simple, and meanwhile the verification is conducted through the operation track and the corresponding finger print information, the user identity recognition method and device are safer and more reliable relative to the verification through the single information of fingerprints of the user.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for user identification. Background technique [0002] At present, the use of fingerprint recognition to identify terminal users has been widely used. The most important identification methods in fingerprint recognition are front pressing, back pressing, front sliding, and back sliding. The recognition schemes and recognition effects are not the same, but the existing fingerprint recognition methods can only be recognized in a limited finger size area, requiring the user to place the designated finger in the detection area and repeat the fingerprint of the designated finger several times. Moreover, a slight difference in the angle and strength of the user's fingers when collecting fingerprints may cause the verification to fail, which is cumbersome and not flexible enough; If the user does not use bionic fingerprints to collect a single piece o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/32G06F3/0488
Inventor 梅容
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products