Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for user identity authentication based on mobile equipment

A user identity authentication, mobile device technology, applied in digital data authentication, neural learning methods, instruments, etc., can solve the problems of not being able to mass-produce smart devices, permanently unproven, and difficult to miniaturize products, so as to improve user experience. , The effect of realizing data privacy protection and simplifying the process

Active Publication Date: 2020-03-20
SHENZHEN UNIV
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Vein recognition and iris recognition also take physiological characteristic signals according to the different physiological characteristics of each person, and then perform a series of analysis and processing on the signals, and finally achieve the function of recognition. These two biometric technologies can achieve high recognition Accuracy, but it is also accompanied by some disadvantages. The veins on the back of the hand in vein recognition may still change with age and physiological changes, and the permanence has not yet been confirmed. Due to the limitation of the collection method by its own characteristics, it is difficult to miniaturize the product and cannot Mass production is carried out on smart devices. At the same time, the acquisition equipment has special requirements, the design is relatively complicated, and the manufacturing cost is high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for user identity authentication based on mobile equipment
  • A method and system for user identity authentication based on mobile equipment
  • A method and system for user identity authentication based on mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The preferred embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 As shown, this example provides a mobile device-based user identity authentication method, including the following steps:

[0031] Step S1, collecting the sensor signal of the mobile device from the pick-up position to the static state through the mobile device;

[0032] Step S2, filtering the sensor signal;

[0033] Step S3, performing signal preprocessing on the filtered sensor signal, and extracting time-domain features and frequency-domain features in the event of picking up the mobile device;

[0034] In step S4, the time-domain features and frequency-domain features are put into a neural network identification algorithm for training, so as to realize identification and judgment of user data.

[0035] The mobile devices mentioned in this example refer to existing mobile smart devices, including smar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a user identity authentication method and system based on a mobile device. The user identity authentication method includes the following steps: step S1, collecting the sensor signal of the mobile device from the pick-up position to the static state through the mobile device; step S2, Filtering the sensor signal; step S3, performing signal preprocessing on the filtered sensor signal, extracting the time domain feature and frequency domain feature in the event of picking up the mobile device; step S4, combining the time domain feature and the frequency domain feature The frequency domain features are put into the neural network recognition algorithm for training to realize the recognition and judgment of user data. The present invention extracts the user's behavior characteristics through the existing mobile device, and uses the neural network identification algorithm of the machine learning identification model to identify the user's identity, which can effectively simplify the process of user identity authentication, greatly improve the user experience, and do not need to increase any hardware costs , the system is simple, effective and convenient to use, and has good practicability.

Description

technical field [0001] The invention relates to a user identity authentication method, in particular to a mobile device-based user identity authentication method, and to a user identity authentication system adopting the mobile device-based user identity authentication method. Background technique [0002] With the continuous advancement of the intelligent society process and the continuous development of emerging smart devices, smart devices are becoming more and more important in daily life, but there are many unsafe and inconvenient data privacy protection. The unlocking of smart devices now It can be roughly divided into the following aspects. [0003] The traditional protection methods are as follows: on smart phones, PIN codes, passwords or patterns and fingerprint recognition are often used for protection; there are also technologies such as fingerprint recognition, vein recognition, iris recognition and face recognition. [0004] First of all, the more commonly used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06N3/04
CPCG06F21/316G06N3/045G06N3/08
Inventor 伍楷舜赵猛王丹邹永攀
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products