Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication method and device based on slide trajectory

A user and authentication technology, applied in the field of user authentication based on sliding trajectory, can solve the problems of complex password, unfavorable security, and difficulty in remembering, and achieve the effect of good operation experience and fast key input method.

Inactive Publication Date: 2018-01-09
深圳市驿固科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the password is a string of boring character strings. When the password is set too short, it is not conducive to security, and if the password is set too long and complex, it is often difficult to remember, especially many systems today require passwords with a certain complexity. passwords are often a burden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device based on slide trajectory
  • User authentication method and device based on slide trajectory
  • User authentication method and device based on slide trajectory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 It is a flowchart of an embodiment of the present invention, and the method steps include:

[0026] Step 101. Acquire the sliding trajectory of the pending state of the input module.

[0027] For example, the input module includes at least two sample collection points, and these sample collection points form an irregular matrix, and each sample collection point inside the matrix has a unique ID for identifying the sample collection point. The input module can be a touch screen, a touch-sensitive button module, or a mechanical push button module, etc. Those skilled in the art can use any method to realize the information input module, which will not be repeated here.

[0028] The sliding trajectory is a series of data generated when the user touches a series of sample collection points on the input module. The data is sorted in sequence to form a set of ordered series, which represents the user sliding on the input module. track.

[0029] For example, if im...

Embodiment 2

[0035] In the above-mentioned embodiments, it is mentioned that the ordered sequence stored on the storage module is added by authorized users, and the process is as follows figure 2 :

[0036] Step 201, the administrator activates the function of adding users.

[0037] When the administrator activates the function of adding users, the input module is ready to collect the trajectory that the user will glide.

[0038] Step 202, acquiring the sliding trajectory of the pending state of the input module.

[0039] As described in detail above, the user generates an ordered number sequence in the input module sliding trajectory, and the ordered number sequence represents the sliding trajectory.

[0040] Step 203: Save the ordered sequence in a storage module according to the sequence generated by the taxiing trajectory.

[0041] The ordered sequence generated by the user sliding track on the input module is the key representing the user. After the device saves the ordered seque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authentication method based on a slide trajectory. The method includes the steps that an ordered series is generated by a user based on the slide trajectory of an input module, a device compares the ordered series with a stored ordered series, the ordered series is authenticated if the comparison result shows that the ordered series and the stored ordered series are consistent, otherwise the ordered series is not authenticated. The user authentication device based on the slide trajectory comprises the input module for providing the slide trajectory of the input module for the user, an obtaining module for allowing the user to obtain the to-be-processed ordered series generated based on the slide trajectory, a storing module for storing a secret key, namely theordered series, of the authorized user, and a processing module for comparing the to-be-processed ordered series with the ordered series of the storing module. By means of the method and device, by replacing a boring character string with a vivid trajectory, the input mode of the secret key of the user becomes rapid and efficient, and operation experience is good.

Description

technical field [0001] The invention relates to the field of smart devices, in particular to a user authentication method and device based on taxiing trajectories. Background technique [0002] Passwords have been around for a long time as a form of user authentication. Even so, smart locks that are widely used today still use passwords as a way of authentication. [0003] However, the password is a string of boring character strings. When the password is set too short, it is not conducive to security, and if the password is set too long and complex, it is often difficult to remember, especially many systems today require passwords with a certain complexity. Passwords are often a burden. Contents of the invention [0004] In view of this, the present invention provides a user authentication method based on taxiing trajectory, including: [0005] The user generates a set of sequenced sequence in the sliding trajectory of the input module, and the device compares the sequ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F3/0488
Inventor 陈瑞波
Owner 深圳市驿固科技有限公司