Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent terminal identity authentication method based on similarity

A smart terminal and identity authentication technology, applied in the field of identity authentication, can solve the problems of low authentication accuracy and achieve the effect of improving security, good stability, and improving accuracy

Inactive Publication Date: 2017-09-22
XIDIAN UNIV
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to overcome the defects existing in the above-mentioned existing implicit authentication technology, and propose a similarity-based intelligent terminal identity authentication method, which is used to solve the problem of low authentication accuracy existing in the existing implicit authentication method. technical problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent terminal identity authentication method based on similarity
  • Intelligent terminal identity authentication method based on similarity
  • Intelligent terminal identity authentication method based on similarity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In the following, the present invention will be further described in detail with reference to the drawings and specific embodiments.

[0040] This embodiment takes as an example the identity authentication by touching the screen and inputting the authentication password on the typical representative smart phone of the smart terminal:

[0041] Reference figure 1 , The identity authentication method for smart terminals based on similarity includes a training phase and an authentication phase. The implementation steps are:

[0042] Training phase:

[0043] Step 1. The smartphone obtains the user's training data set:

[0044] Step 1a) The user presets the authentication password and enters the smart phone;

[0045] Step 1b) The user touches the screen multiple times to input the authentication password to collect the training data set. Because the size of the training data set will affect the authentication result, if the scale is too small, the authentication accuracy is not high, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent terminal identity authentication method based on similarity. The method comprises a training period and an authentication period, used for solving the technical problem that in an existing implicit authentication method, authentication accuracy is relatively low. The method comprises implementation steps of acquiring a training data set, pre-processing a training vector set, computing similarity between behavior feature distribution probability vectors in the training vector set based on information entropy to train a user behavior feature model, and presetting an identity authentication threshold; and if an authentication password is completely matched, preprocessing a current behavior feature sequence to acquire the current behavior feature distribution probability vector, acquiring a current average similarity, judging whether a difference percentage of the current average similarity to the user behavior feature model is within a preset identity authentication threshold range, and acquiring an authentication result. The method provided by the invention is high in security and good in user experience, and can be applied to user identity authentication of smart phones and tablet computers.

Description

Technical field [0001] The invention belongs to the technical field of identity authentication, and relates to a smart terminal identity authentication method, in particular to a similarity-based smart terminal identity authentication method, which can be used for user identity authentication such as smart phones and tablets. Background technique [0002] Identity authentication is the process by which the system confirms the identity of the visitor when a computer system user enters the system or accesses system resources with different protection levels. The main idea of ​​identity authentication is: if the identity authentication information provided by the visitor of the current computer system matches the identity authentication information of the existing legitimate user, the current visitor is considered to be legitimate and the access operation is allowed, otherwise the access is denied operating. The purpose of identity authentication is to control the system's authoriz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45G06K9/62
CPCG06F21/31G06F21/45G06F18/22G06F18/214
Inventor 曾勇乔双媛刘志宏周灵杰董丽华马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products