Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A user identity authentication method and mobile terminal

A technology for user identity authentication and identity authentication, applied in the fields of digital data authentication, instruments, computing, etc., can solve the problems of low efficiency and poor authentication flexibility, and achieve the effect of low cost, high efficiency, and saving of cameras and fill lights.

Active Publication Date: 2020-10-02
VIVO MOBILE COMM CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a user identity authentication method and a mobile terminal to solve the problem of poor flexibility and low efficiency of user identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user identity authentication method and mobile terminal
  • A user identity authentication method and mobile terminal
  • A user identity authentication method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] refer to figure 1 , which shows a flow chart of an embodiment of the user identity authentication method of the present invention, which may specifically include the following steps:

[0030] Step 101, determine the authentication mode and authentication sequence of user identity authentication.

[0031] In a specific implementation, the embodiments of the present invention can be applied in mobile terminals, such as mobile phones, tablet compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides a user identity authentication method and a mobile terminal. The method includes: determining an authentication method and an authentication sequence for user identity authentication, and the authentication method includes at least one of iris identity authentication and face identity authentication Type; when performing the iris identity authentication according to the authentication sequence, drive the supplementary light to emit the first light, call the camera to collect the first image data under the first light, according to the first image data Perform iris recognition; when performing the face identity authentication according to the authentication sequence, drive the supplementary light to emit a second light, call the second camera to collect second image data under the second light, according to the Face recognition is performed on the second image data. It can realize iris recognition and face recognition at the same time, increasing the diversity of user identity authentication, taking into account efficiency and safety.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a user identity authentication method and a mobile terminal. Background technique [0002] With the development of science and technology, mobile terminals such as mobile phones and tablet computers are increasingly used in people's work, study, daily communication and other aspects. [0003] In mobile terminals, users store private information such as contact information, communication data, emails, photos, etc., and also perform operations such as account login and payment. [0004] In order to meet the security requirements of these privacy information and operations, biometric features such as face and iris are usually used to authenticate the user's identity. [0005] However, mobile terminals often choose one of the biometrics for authentication. If only face recognition is performed, due to its high error rate, it is not easy to apply to operations that require hig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06K9/00
CPCG06F21/32G06V40/166G06V40/19
Inventor 张威陈巍伟
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products