Terminal, identity authentication method, authentication method for authentication center and terminal and authentication system

A technology of identity authentication and authentication center, which is applied in the field of security authentication, can solve problems such as passwords are easy to lose and steal, authentication methods are easy to be forged, and security is not high, so as to improve security, improve authentication accuracy, and reduce error rates. Effect

Inactive Publication Date: 2017-06-30
上海仪电数字技术股份有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to overcome the defects in the prior art that the password of the identity authentication method is volatile and easy to steal, the security is not high, and the authentication method is easy to be forged, and to provide a terminal, an identity authentication method, a terminal Authentication method and system for authentication center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal, identity authentication method, authentication method for authentication center and terminal and authentication system
  • Terminal, identity authentication method, authentication method for authentication center and terminal and authentication system
  • Terminal, identity authentication method, authentication method for authentication center and terminal and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] This embodiment provides a terminal identity authentication method, such as figure 1 As shown, the application situation can be: the user logs in his bank account on the terminal. After entering the account number, in order to avoid the login operation performed by criminals, the terminal needs to perform authentication on the identity of the logged-in user. Specifically, the identity authentication methods include:

[0100] Step 101, randomly display a paragraph of text;

[0101] Among them, the terminal can be mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, sales terminal), vehicle-mounted computer and other equipment, and the terminal can also be used as some admission equipment (such as access control equipment) to Authenticate user identity. The terminal has a display screen, and the text randomly displayed on the display screen is readable characters. The more characters, the better. In fact, the t...

Embodiment 2

[0114] This embodiment provides a terminal identity authentication method, such as figure 2 As shown, the difference between the present embodiment and embodiment 1 is: the feature data extracted in step 103 also includes voice features, and step 104 includes:

[0115] Step 1041, converting the speech features into text through a speech recognition engine;

[0116] Step 1042: Determine whether the number of different characters between the converted text and the text in the database is less than a threshold, if so, perform identity authentication, otherwise, do not perform identity authentication.

[0117] In order to further verify the identity of the user, it is also possible to further verify the identity of the user by judging whether the pronunciation of the text is accurate, so as to more accurately exclude the situation that illegal users use forged audio and video to authenticate their identity. Among them, speech recognition is a speech recognition technology that e...

Embodiment 3

[0130] This embodiment provides a terminal, such as Figure 5 As shown, it includes a display module 1, an audio and video acquisition module 2, an extraction module 3 and a first judgment module 4;

[0131] The display module 1 is used to randomly display a paragraph of text, and the display module 1 may have the function of a display screen.

[0132] The audio and video acquisition module 2 is used to collect the audio and video that the user reads the text to form, and the audio and video acquisition module 2 can have the functions of a microphone and a camera;

[0133] The extraction module 3 is used to extract feature data in the audio and video, and the extraction module 3 can have the function of a processor to process the audio and video files obtained;

[0134] The first judging module 4 is used to judge whether the characteristic data matches the characteristic data in a database, if so, perform identity authentication, otherwise do not perform identity authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal, an identity authentication method, an authentication method for an authentication center and the terminal and an authentication system. The identity authentication method comprise the steps of randomly displaying a text; collecting an audio / video formed by reading the text, wherein the text is read by a user; extracting feature data in the audio / video; and judging whether the feature data matches the feature data in a database or not, if the feature data matches the feature data in the database, performing identity authentication, otherwise not performing the identity authentication. According to the terminal, the methods and the system, the text content displayed on the terminal is replaced continuously, so the audios / videos formed by reading the texts are different, wherein the texts are read by the user, the user can be authenticated according to the changed mouth shape feature data, and an illegal user is prevented from counterfeiting the same audio / video to simulate identity authentication. Compared with a mode of authenticating an identity through utilization of a cipher, the method has the advantages that the cipher does not need to be set, the defect that the security is low due to the fact that the cipher is liable to lose and steal is avoided, the authentication is assisted without configuring an extra device, only field authentication is carried out, and the authentication security is improved.

Description

technical field [0001] The invention relates to the field of security authentication, in particular to a terminal and an identity authentication method, an authentication method and system for a terminal and an authentication center. Background technique [0002] The most common authentication (Authentication) method in electronic transactions and secure logins is password checking. However, there are risks of misappropriation and forgetting in this way, and there is a risk of passwords being stolen by viruses and Trojan horses for ordinary terminals such as personal computers. Another way of identification is to use the unique identification number built into the transaction terminal equipment. For example, a mobile phone has a built-in SIM (Subscriber Identity Module, customer identification module) card, which has a certain identity recognition function, but it can still be used or embezzled when the mobile phone is lost. Another example is the TV payment in the digital...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0861
Inventor 彭召旺郭奕丰
Owner 上海仪电数字技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products