Unlock instant, AI-driven research and patent intelligence for your innovation.

Picture-based user authentication method

A user verification and picture technology, applied in the field of identity verification, can solve the problems of increasing the complexity of the verification process, password leakage, and insufficient security, and achieve the effect of improving verification security, preventing theft, and improving verification security.

Inactive Publication Date: 2018-05-08
成都致酷科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the password, encryption algorithm or protocol of such an identity verification method can be very complicated, it also increases the complexity of the verification process, and in the process of entering the verification password, it is easy to cause the password to be leaked and the security is insufficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The present invention provides a picture-based user authentication method, comprising the following steps,

[0026] S1, set the user name, set the fixed picture corresponding to the user name, and set the first verification point in the fixed picture;

[0027] S2, setting an active picture for verification, and setting a second verification point in the active picture;

[0028] S3, drag the active picture to overlap or partially overlap with the fixed picture, which is used for verification by the client;

[0029] S4, the client sends the relative coordinates of the active picture and the fixed picture to the server;

[0030] S5. The server detects the relative position of the second verification point and the first verification point. If the second verification point coincides with the first verification point, the verification is successful; otherwise, the verification fails.

[0031] Steps S1 and S2 are the setting steps of this user verification method. When the u...

Embodiment 2

[0034] The present invention provides a picture-based user verification method, comprising the following steps,

[0035] S1, set the user name, set the fixed picture corresponding to the user name, and set the first verification point in the fixed picture; the first verification point in the fixed picture is 2;

[0036] S2, setting an active picture for verification, and setting a second verification point in the active picture;

[0037] S3, drag the active picture to overlap or partially overlap with the fixed picture, which is used for verification by the client;

[0038] S4, the client sends the relative coordinates of the active picture and the fixed picture to the server;

[0039] S5. The server detects the relative position of the second verification point and the first verification point. If the second verification point coincides with the first verification point, the verification is successful; otherwise, the verification fails.

[0040] Set the first verification p...

Embodiment 3

[0042] The present invention provides a picture-based user authentication method, comprising the following steps,

[0043] S1, set the user name, set the fixed picture corresponding to the user name, and set the first verification point in the fixed picture; the first verification point in the fixed picture is 3; the fixed picture is set as a form filled with numbers or text, the first The verification point is set to one or more numbers or characters specified in the form; the numbers or characters filled in the form are set to be randomly generated;

[0044] S2, setting an active picture for verification, and setting a second verification point in the active picture;

[0045] S3, drag the active picture to overlap or partially overlap with the fixed picture, which is used for verification by the client;

[0046] S4, the client sends the relative coordinates of the active picture and the fixed picture to the server;

[0047] S5. The server detects the relative position of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a picture-based user authentication method. The method comprises the following steps: a username is set, a fixed picture corresponding to the username is set, and a first authentication point is set in the fixed picture; a movable picture for authentication is set, and a second authentication point is set in the movable picture; the movable picture is dragged to be overlapped or partially overlapped with the fixed picture for authentication at a client; the client sends relative coordinates of the movable picture and the fixed picture to a server; and the server detectsthe relative positions of the second authentication point and the first authentication point, and if the second authentication point and the first authentication point are overlapped, successful authentication is achieved. The authentication method adopts a double blind design, that is, when the client carries out authentication, other persons can not know the authentication information on the fixed picture and can not know the authentication information on the movable picture, the other persons can be prevented from peeping at the authentication information of the client, the user does not need to block an authentication area during the authentication process, and the user authentication safety is thus improved.

Description

technical field [0001] The invention belongs to the technical field of identity verification, and in particular relates to a picture-based user verification method. Background technique [0002] Today, with the vigorous development of the financial industry and the Internet industry, people have been in contact with finance and the Internet. Almost everyone needs to perform user identity verification on different platforms. After passing the identity verification, people can obtain the user's information and resources. , then in today's highly electronic information technology, the confidentiality and security of identity verification are particularly important. The traditional identity verification method is that the system checks the user name and password entered by the user to see if it is consistent with the user name and password stored in the system to determine whether the user's identity is correct; more complicated identity authentication methods will be based on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/36
CPCG06F21/36H04L63/0838H04L63/0876
Inventor 肖峰
Owner 成都致酷科技有限公司