Supercharge Your Innovation With Domain-Expert AI Agents!

A method and terminal for identity authentication

An identity authentication and terminal technology, applied in the Internet field, can solve problems such as low efficiency and it is difficult for users to accurately determine the authentication area, and achieve the effect of improving authentication efficiency.

Active Publication Date: 2019-01-15
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, when inputting fingerprint information, it is difficult for users to accurately determine the authentication area, and multiple attempts are required to succeed.
It can be seen that when using biometric information as an identity authentication tool, the efficiency in the authentication process is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and terminal for identity authentication
  • A method and terminal for identity authentication
  • A method and terminal for identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] The embodiment of the present invention discloses an identity authentication method and terminal, which can determine the authentication area according to the position touched by the touch command input by the user without presetting the authentication area during the identity authentication process; thus The authentication efficiency in the identity authentication process can be improved.

[0021] see figure 1 , figure 1 It is a schemati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identity authentication method and a terminal. The identity authentication method comprises the following steps of when the terminal detects a touch instruction input by a user, determining an authentication region for current identity authentication according to the position touched by the touch instruction; and when detecting that biometric information obtained in the authentication region is consistent with the biometric information stored in advance, determining the current identity authentication to be successful. Through implementation of the method disclosed by the embodiment of the invention, the authentication region does not need to beset in advance, and is determined according to the position touched by the touch instruction input by the user, so that the authentication efficiency in the identity authentication process can be improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an identity authentication method and a terminal. Background technique [0002] With the rapid development of the Internet and the rapid popularization of terminals, the functions of terminals have been enhanced day by day, and the security of terminals has attracted more and more attention from users. Since most of the user's own biometric information is unique, there are more and more technologies that use the user's biometric information as the basis for identity authentication to ensure the security of the terminal. At present, using the user's biometric information as the basis for identity authentication is mainly to detect whether the collected user's biometric information is consistent with the pre-stored biometric information. If the detection is consistent, the identity verification is successful, otherwise the identity verification fails. Taking fingerprint recog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32
Inventor 郭雄伟傅文治
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More