User identity authentication method for intelligent mobile terminal

A technology for user identity authentication and smart mobile terminals, applied in digital data authentication, instruments, electrical digital data processing, etc., can solve the problems of not being able to distinguish all users, high cost, and large data noise, and achieve simple and natural operation , high stability, and the effect of improving the ability to distinguish

Active Publication Date: 2015-08-19
XI AN JIAOTONG UNIV
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are many authentication technologies on smart terminals that are popular in the market today: handwriting recognition and speech recognition are not accurate enough and are easy to be reproduced by others; Interference with physiological factors, poor stability; fingerprint, pupil, iris recognition security and accuracy are high, but need to provide special hardware equipment support, high cost; some identity authentication methods based on single sensor data such as gyroscope will be Affected by attitude changes such as rotation and translation of the mobile terminal, and the behavior characteristics are unstable and the data is noisy
[0004] Recently, there have also been authentication methods that use multi-finger touch data to extract hand features, but these methods can only extract simple hand features such as finger length difference and finger spacing, and in some cases cannot distinguish all users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method for intelligent mobile terminal
  • User identity authentication method for intelligent mobile terminal
  • User identity authentication method for intelligent mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0037] 1. Example of operation mode

[0038] Two-handed operation (such as figure 1 shown):

[0039] The hand holding the phone drives the mobile terminal to make a 270-degree spatial rotation in a specific mode. While rotating, multiple adjacent fingers of the other hand straighten and close together to rotate and slide on the touch screen. The specific operation is described as follows:

[0040] figure 1 The picture in (a) shows the starting state of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity authentication method for an intelligent mobile terminal, by designing a special movement operation manner of the mobile terminal, active movement of the mobile terminal and screen touching operation are organically combined; by using various sensor behavior data and screen touching behavior data generated during authentication operation of a user, a characteristic vector sequence of a mapping relation between a finger screen touching track and a space pose position of the mobile terminal is established based on a screen touching geodesic distance of the user, so as to judge legality of user identity. The user identity authentication method has the advantages: the operation is simple, and no additional extra equipment need to be increased; behavior characteristics with space translation and rotation invariance are put forward, and influence of change of poses such as rotation and translation of the mobile terminal on an authentication result is effectively avoided.

Description

technical field [0001] The invention relates to a user identity authentication technology, in particular to an authentication method for an intelligent mobile terminal user identity. Background technique [0002] With the progress of society, people pay more and more attention to security and identity information, and the demand for biometric technology continues to expand. Research and development of an identification system with reliable performance and simple operation has gradually become a hot spot in current technology research. [0003] There are many authentication technologies on smart terminals that are popular in the market today: handwriting recognition and speech recognition are not accurate enough and are easy to be reproduced by others; Interference with physiological factors, poor stability; fingerprint, pupil, iris recognition security and accuracy are high, but need to provide special hardware equipment support, high cost; some identity authentication meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32G06F2221/2133
Inventor 蔡忠闽王必成陈旸宋云鹏陈通左一凡贾鹏洪婉诗任航
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products