Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-intelligent-device identity authenticating method in combination with wearable device

A technology of wearable devices and smart devices, applied in the direction of digital data authentication, etc., can solve the problems of not being able to protect user privacy and property security, user physiological information leakage, etc., and achieve the effect of high safety and reliability, accuracy and reliability improvement

Active Publication Date: 2018-10-09
XI AN JIAOTONG UNIV
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional authentication methods such as password unlocking and graphic unlocking are currently unable to protect user privacy and property security well, while the more popular biometric authentication methods require additional equipment for support, and are likely to cause more serious leakage of user physiological information security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-intelligent-device identity authenticating method in combination with wearable device
  • Multi-intelligent-device identity authenticating method in combination with wearable device
  • Multi-intelligent-device identity authenticating method in combination with wearable device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The multi-smart device identity authentication method combined with the wearable device of the present invention includes the following links:

[0033] Link 1: Time synchronization between multiple devices and trusted status setting of smart bracelets;

[0034] The smart terminal and the smart bracelet align their respective time systems synchronously and set them to the same time stamp system.

[0035] The user pairs and connects the smart terminal with the smart bracelet, and the smart bracelet judges the use according to the signal of wearing the lock buckle and the collected physiological signals such as the user's heartbeat, skin electricity, body temperature, and the signals of the gyroscope, accelerometer and other motion sensors Whether the person wears a smart bracelet:

[0036] 1) If the fastening signal of wearing a lock is detected, and at the same time, one or more physiological signals such as heartbeat, skin electricity, and body temperature of the user ...

Embodiment 2

[0116] The flow chart of concrete implementation example 1 of the present invention is as figure 2 with Figure 4 As shown, it is a multi-smart device identity authentication method and system combined with wearable devices. The smart device is a smart terminal equipped with buttons, and the wearable device is a smart bracelet equipped with acceleration, gyroscope sensors and magnetometers. The button operation performed on the smart terminal, the real-time sensor data such as the acceleration, gyroscope, and magnetometer of the smart terminal and the smart bracelet, and judging the movement time synchronization and spatial attitude consistency between multiple devices during interactive operations are based on this. Realize continuous authentication and unlock authentication of user operations on smart terminals.

[0117] The continuous authentication can be the authentication of the interactive behavior within a sliding time window; the unlocking authentication can be the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a multi-intelligent-device identity authenticating method in combination with a wearable device. The wearing state is accurately sensed through the wearable device, identity authenticationis conducted on a user when the user wears the wearable device, and identity authentication is automatically relieved when the user removes the wearable device. Through the authenticated wearable device, multi-device multi-sensor combination authentication is conducted on the operation process applied on other intelligent devices. By synthesizing the interaction operation of the user on the intelligent devices, the action time synchronism and space attitude consistency indexes of operation behaviors among multiple devices are calculated through data of an acceleration gyroscope and real-timesensors on the intelligent devices and the wearable device, the user operation real-time authentication on the intelligent devices is realized on the basis of the indexes, and the user trust established when the wearable device is worn is senselessly transmitted to the intelligent devices. By judging the action time synchronism and space attitude consistency of operation through the sensor data, the operation-level real-time identity authentication is automatically realized.

Description

technical field [0001] The invention relates to the field of smart device user identity authentication, in particular to a multi-smart device identity authentication method combined with wearable devices, which realizes real-time authentication of user operations on smart devices when interactive behaviors occur. Background technique [0002] With the development of the Internet and the Internet of Things technology, people gradually begin to complete payment transfers, life and office activities on smart devices. These behaviors are closely related to people's privacy and property security, and identity authentication has become very important. Traditional authentication methods such as password unlocking and graphic unlocking are currently unable to protect user privacy and property security well, while the more popular biometric authentication methods require additional equipment for support, and are likely to cause more serious leakage of user physiological information s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45
Inventor 蔡忠闽廉美惠赵宇轩董建敏
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products