Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity authentication method and user terminal

An identity authentication and user terminal technology, applied in the security field, can solve problems such as the impact of identity authentication security, the difficulty of fingerprinting, and the intrusion recognition is not very good

Active Publication Date: 2018-09-07
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As an important biometric identification technology, fingerprint recognition has been applied to many occasions of identity authentication, but it can be found from the actual implementation that the existing fingerprint recognition technology is not very good for various intrusion identification, and it is not very good for security. In occasions with high requirements, there are certain risks in using fingerprint recognition alone for identity authentication
In addition, with the continuous advancement of technology, the emergence of fingerprint cover (also known as fingerprint film) has greatly restricted the application of fingerprint identification technology, especially in the case of remote identity authentication, it is difficult to determine whether a fingerprint cover is used. This undoubtedly has a serious impact on the security of identity authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity authentication method and user terminal
  • An identity authentication method and user terminal
  • An identity authentication method and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0068] The embodiment of the present invention discloses an identity authentication method and a user terminal. In the embodiment of the present invention, in the identity authentication process, after detecting that the matching degree between the input fingerprint information and the preset fingerprint information is higher than the first preset threshold , it is necessary to continue to detect whether the matching degree between the input voicep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention disclose an identity authentication method and a user terminal. The method comprises the steps of detecting whether the matching degree of the input fingerprint information with the pre-acquired preset fingerprint information is higher than a preset first threshold value or not after a user terminal receives the fingerprint information input by a user; on the condition that the matching degree of the input fingerprint information with the pre-acquired preset fingerprint information is higher than the preset first threshold value, outputting a first prompt message for prompting the input of the voiceprint information; receiving the input voiceprint information input in response to the first prompt message; detecting the matching degree of the input voiceprint information with the pre-acquired preset voiceprint information is higher than a preset second threshold value or not; on the condition that the matching degree of the input voiceprint information with the pre-acquired preset voiceprint information is higher than the preset second threshold value, successfully completing the identity authentication process. The embodiments of the invention can increase the security of identity authentication.

Description

technical field [0001] The invention relates to the field of security technology, in particular to an identity authentication method and a user terminal. Background technique [0002] With the rapid development of electronic technology and the rapid popularization of user terminals, the functions of user terminals are becoming more and more perfect. For example, the user can use the user terminal to access external network data resources, take pictures, and contact with friends. However, when the user terminal brings endless convenience to the user, it also brings concerns to the user, such as the security of data resources stored in the user terminal. In practical applications, in order to improve the security of data resources stored in user terminals, identity authentication is required before viewing data resources stored in user terminals, and corresponding data resources can be viewed only after identity authentication is successful. [0003] As an important biometri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32
CPCG06F21/32G06F2221/2111G06F2221/2141
Inventor 陈涌
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD