Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and system

An identity authentication and pending authentication technology, applied in the electronic field, can solve the problems of user property, information loss, different fingerprint data, and small probability of being the same, so as to reduce the probability of identification failure, simplify the operation, and ensure the effect of security.

Inactive Publication Date: 2016-09-14
李明
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that with this authorization method in the prior art, other people can use other people's electronic devices to obtain authorization, and then perform illegal operations, resulting in loss of user's property, information, etc.
[0003] In addition, in the prior art, since the probability that different people have the same biological characteristics is very small, for example, fingerprints, therefore, biological characteristics are usually used as user passwords
In this application, in order to protect the security of the user, when verifying the biometric information, the matching rate is set relatively high to avoid the illegal use of the user's account, but in this case, due to the user's biometrics in different states The information collected under different conditions may have slight differences. For example, the fingerprint data obtained by the same fingerprint collection may be different when the user's fingerprint is dry and wet. , the real fingerprint is regarded as a fake fingerprint, thereby rejecting the user's request and requiring the user to input again. In related technologies, the technical solution to this problem is mainly to optimize the fingerprint matching algorithm, but the premise of these solutions is that the collected fingerprint data is complete and accurate. For the difference between the collected fingerprint data and the stored fingerprint data , does not work well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] This embodiment provides an identity authentication method.

[0029] figure 1 is a flow chart of the identity authentication method provided by this embodiment, such as figure 1 As shown, the method mainly includes the following steps S102 to S116.

[0030]Step S102, the first device establishes a communication connection with the second device.

[0031] In this embodiment, the first device may be connected in a wireless or wired manner, for example, NFC, Bluetooth, and the like.

[0032] In an optional implementation of the embodiment of the present invention, the first device can establish a communication connection with the second device through a wireless or wired connection, that is, the first device and the second device communicate through the human body (intra-bodycommunication). , IBC) to establish a link, wherein the biological limbs include but not limited to the human body. For example, the first device can be a POS machine, Alipay application and other ...

Embodiment 2

[0067] This embodiment provides an identity authentication system, which can be used to implement the method in Embodiment 1.

[0068] figure 2 A schematic diagram of the architecture of the identity authentication system provided in this embodiment, such as figure 2 As shown, the system mainly includes: a first device 100 and a background server 200 .

[0069] In this embodiment, the first device 100 is configured to: establish a communication connection with the second device; receive the data to be authenticated transmitted by the second device through the communication connection, wherein the data to be authenticated includes: digital authentication information and an identity; The biological limb enters the preset range of the first device 100, and collects the biological feature information of the biological limb; the first device 100 sends the data to be authenticated and the biological feature information to the background server 200;

[0070] The background server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and system. The method comprises following steps: establishing communication connection between a first device and a second device; receiving data to be authenticated that is transmitted by the second device through communication connection; collecting biological feature information by the first device; sending data to be authenticated and biological feature information to a background server by the first device; receiving data to be authenticated and biological feature information by the background server; acquiring pre-stored authentication factors and biology feature verification information corresponding to identity labels by the background server; verifying digital authentication information based on verification factors and determining whether matching rate of biological feature information and biological feature verification information exceeds the first pre-set value or not; and determining passing of the identity authentication of the second device when the digital authentication information is passed and matching rate of biological feature information and biological feature verification information exceeds the first pre-set value.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an identity authentication method and system. Background technique [0002] When users use electronic devices to obtain authorization for certain specific places (such as office areas, confidential areas, etc.), personal items (cars, safes, etc.), dangerous items (such as guns and ammunition, etc.), the electronic devices and settings in these The electronic system on the site, personal belongings or dangerous goods establishes a communication link, and then sends the stored key to the electronic system, and the electronic system authenticates the key. It can be seen that, with this authorization method in the prior art, other people can use other people's electronic devices to obtain authorization, and then perform illegal operations, resulting in loss of property and information of the user. [0003] In addition, in the prior art, since the probability that different peopl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06F21/34
CPCG06F21/31G06F21/32G06F21/34H04L63/083H04L63/0861H04L63/0876H04L63/123H04L63/126H04W12/06H04W12/33H04L9/3255H04W12/062
Inventor 李明
Owner 李明