Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

User authentication method and system

A user authentication and user technology, applied in the field of identity authentication, can solve problems affecting the login security of industrial Internet systems

Active Publication Date: 2020-10-23
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this solution has certain disadvantages. If the mobile phone is lost and picked up by someone who knows how to use the SIM card authentication solution, there may be cases where these people use the mobile phone to maliciously log in to the industrial control website, which seriously affects the login security of the industrial Internet system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and system
  • User authentication method and system
  • User authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Such as figure 1 As shown, this embodiment provides a user authentication method, which is used to effectively authenticate the user when the user needs to identify the user, such as logging in to a website.

[0051] In this embodiment, the user authentication method authenticates the user by collecting the user's ear image. Since the human ear has a rich and stable structure and is similar to a rigid body, it is not easily affected by expression and age changes, so the human ear recognition has a wide range of applications. application prospects.

[0052] The user authentication methods include:

[0053] S11. Receive a user login request.

[0054] S12. Collect the human ear image of the user as the human ear image to be tested.

[0055] S13. Establish a human ear image coordinate system according to the human ear image to be tested, and extract the user's human ear feature r to be tested.

[0056] S14. Calculate the comprehensive similarity ρ between the human ear ...

Embodiment 2

[0060] Such as Figures 2 to 4 As shown, this embodiment provides a user authentication method, which can effectively authenticate the user when the user needs to identify the user's identity when logging in to a website or the like.

[0061] In this embodiment, a user logging in to a website is taken as an example for illustration, and the user authentication method is implemented based on the following background.

[0062] The user submits a registration request to the website, and enters his own ear image as a registration sample (registered ear image); the system obtains and stores the user's registered ear feature r' (the user's ear feature when registering) according to the registration sample.

[0063] Wherein, when the user registers, he can specifically click on register on the website page and input a user name (such as a user name designed by himself, registered mobile phone number, email address, etc.) to apply for registration. Preferably, the user authenticates ...

Embodiment 3

[0126] Such as Figure 5 As shown, this embodiment provides a user authentication system, including a receiving unit, a collecting unit, an extracting unit, a calculating unit, and a judging unit.

[0127] Wherein, the receiving unit receives a user login request.

[0128] The acquisition unit acquires an image of the user's ear as the image of the ear to be tested.

[0129] The extraction unit establishes a human ear image coordinate system according to the human ear image to be tested, and extracts the user's human ear feature r to be tested.

[0130] The calculation unit calculates the comprehensive similarity ρ between the human ear feature r to be tested and the pre-stored user's registered ear feature r' r .

[0131] Preferably, the calculation unit includes a feature vector determination module and a comprehensive similarity ρ r Determine the module.

[0132] Wherein, the eigenvector determination module performs one or more eigenvector determinations according to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authentication method and system, belongs to the technical field of identity authentication, and is intended to solve the problem that as existing user login has poor security, login by thefts easily occurs. The user authentication method comprises: receiving a user login request; acquiring an ear image of a user as an ear image to be detected; establishing an ear image coordinate system according to the ear image to be detected, and extracting the user's ear characteristics r to be detected; calculating integrated similarity Rho r between the ear characteristics r to be detected and the user's registered ear characteristics r' prestored; determining user authentication results according to the integrated similarity Rho r.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a user authentication method and system. Background technique [0002] In the current industrial Internet system, SIM card authentication is generally used to replace traditional users, password website login, and authorization authentication for user authentication in order to protect the security of system access control entrances including the public Internet and industrial Internet. [0003] In this SIM card authentication solution, when a user requests to log in, the corresponding SIM card mobile terminal (mobile phone) needs to confirm to perform user authentication. [0004] However, this solution has certain disadvantages. If the mobile phone is lost and picked up by someone who knows how to use the SIM card authentication solution, there may be cases where these people use the mobile phone to maliciously log in to the industrial control websit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06T7/33
CPCG06T7/33H04L63/0815H04L63/0861
Inventor 刘镝王笑帝刘明辉
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products