Method and system for realizing user authentication through biological characteristic information

A biometric information, user authentication technology, applied in transmission systems, digital data authentication, electrical components, etc., can solve problems such as user loss, cracking, inconvenience, etc., to improve reliability and security, authentication process safety, and upgrade The effect of operating experience

Inactive Publication Date: 2016-08-17
LETV HLDG BEIJING CO LTD +1
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Register and log in with username / password, which is easy to be cracked by hacker software and leak data of mobile smart device users
For example, if information such as account passwords is leaked, it may cause losses to users.
And the user will change the password regularly in order to ensure that the account name / password method is not cracked, and the account name / password that has not been used for a long time is easy to forget, resulting in the inability to use mobile smart device applications and causing inconvenience
[0007] In addition, although the fingerprint payment method launched by Alipay uses the user's biometric information, it can only be compared and authenticated locally on the mobile smart device, and the information of the local comparison and authentication cannot be used as an account / password to log in to the server.
It makes it impossible for users to use biometric information on other mobile smart devices to conveniently complete the login of the software, so that the user experience cannot be improved
Moreover, mobile smart devices bound with biometric feature authentication need to re-register when users switch mobile smart devices, which is quite inconvenient to use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing user authentication through biological characteristic information
  • Method and system for realizing user authentication through biological characteristic information
  • Method and system for realizing user authentication through biological characteristic information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0031]To facilitate the description of the specific implementation of this embodiment, the biometric information involved in the following takes fingerprint collection as an example, and iris information collection and its ID value conversion are the same as fingerprint collection.

[0032] The embodiment of the present invention provides a new identity authentication method different from the traditional username / password method, that is, a method and system for implementing user authentication using biometric information.

[0033] Please refer to figure 1 As shown,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for realizing user authentication through biological characteristic information. The method comprises the following steps: a user initiates an authentication request on the basis of an application of biometric identification equipment; a security kernel of the biometric identification equipment acquires the biological characteristic information of the user on the basis of the authentication request, generates a corresponding user ID value according to the biological characteristic information and returns the user ID value to the application initiating the authentication request; the application sends the user ID value returned by the security kernel to an application server, and the application server finishes user authentication according to the user ID value. One novel internet user identity authentication method is provided, so that the user does not need a user name or a password, and the login effect of the user name and the password can be finished on different sets of equipment through simple operation.

Description

technical field [0001] The invention relates to the technical field of biological identification, in particular to a method and system for realizing user authentication by using biological feature information. Background technique [0002] Biometric technology is already very mature. Biometrics, also known as biometric authentication, is the use of computing equipment to use the inherent physiological or behavioral characteristics of the human body for personal identification. Commonly used biometrics include face, iris, fingerprints, palm prints, voice, handwriting, etc. With the rapid development of biometric technology, biometric functions have become the standard configuration of many smart devices, such as smart phones, smart homes, smart cars, and smart cash machines with biometric functions that may appear in the future. Taking smartphones as an example, fingerprint recognition and iris recognition technologies have been applied in concrete ways. [0003] Fingerprin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32H04L29/06
CPCH04L63/0428H04L63/0861G06F21/32
Inventor 甘书宇于燕
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products