Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authenticating user identity and mobile terminal

A technology for user identity authentication and identity authentication, which is applied in the field of mobile terminals and user identity authentication methods, can solve problems such as low efficiency and poor flexibility of user identity authentication, and achieve the goals of improving flexibility, maintaining high accuracy, and increasing diversity Effect

Active Publication Date: 2018-10-26
VIVO MOBILE COMM CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] An embodiment of the present invention provides a user identity authentication method to solve the problem of poor flexibility and low efficiency of user identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating user identity and mobile terminal
  • Method for authenticating user identity and mobile terminal
  • Method for authenticating user identity and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0030] Reference figure 1 , Shows a flowchart of an embodiment of the user identity authentication method of the present invention, which may specifically include the following steps:

[0031] Step 101: Determine the authentication method and the authentication sequence of user identity authentication.

[0032] In specific implementation, the embodiments of the present invention can be applied to mobile terminals, for example, mobile phones, tablet computers, wear...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method for authenticating the user identity and a mobile terminal. The method comprises: determining an authentication mode and an authentication sequence ofthe user identity authentication, wherein the authentication mode comprises at least one of iris identity authentication and face identity authentication; when performing the iris identification authentication according to the authentication sequence, driving the first light supplementary lamp to emit a first ray, calling the first camera to collect first image data under the first ray, and performing iris identification according to the first image data; when the face authentication is performed according to the authentication sequence, driving the second light supplementary lamp to emit a second ray, calling the second camera to collect second image data under the second light, and performing face recognition according to the second image data. Iris recognition and face recognition canbe realized at the same time, which increases the diversity of user authentication and gives consideration to efficiency and security.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to a method for authenticating user identity and a mobile terminal. Background technique [0002] With the development of technology, mobile terminals such as mobile phones and tablet computers have become more and more used in people's work, study, and daily communication. [0003] In the mobile terminal, the user stores private information such as contact information, communication data, emails, photos, etc., and also performs account login and payment operations. [0004] In order to meet the security requirements of these private information and operations, biometric features such as human face and iris are usually used to authenticate the user's identity. [0005] However, mobile terminals often choose one of the biological characteristics for authentication. If only face recognition is performed, it is not easy to apply to operations that require high accuracy such as pay...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V40/161G06V40/168G06V40/18
Inventor 张威陈巍伟
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products