Method and device for identity authentication, terminal and storage medium

An identity authentication and mobile terminal technology, applied in the field of security authentication, can solve the problems of inaccurate detection, low precision, low applicability, etc., and achieve the effect of improving accuracy and security

Active Publication Date: 2018-11-20
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the authentication method based on machine vision is: use a camera to capture a series of gait images of the user during walking, and then use the image matching algorithm to realize the user's identity authentication, but this identity authentication method is easily affected by the external environment. Exemplary ones are easily affected by external ambient light, whether there are obstacles, or the shooting distance, so the effect is poor; the authentication method based on the ground sensor is: capture the user's gait through the force sensor set on the floor or in the carpet Features, this authentication method is easily affected by the weight of the items worn by the user, and its application range is small, so it is not universal
The above two methods are to analyze the user's gait data picture from the computer point of view, the cost is high, the identi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identity authentication, terminal and storage medium
  • Method and device for identity authentication, terminal and storage medium
  • Method and device for identity authentication, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] figure 1 It is a schematic flow chart of an identity authentication method provided by Embodiment 1 of the present invention. The embodiment of the present invention is applicable to the situation of authenticating the user's identity. The method can be executed by an identity authentication device, which can use software and / or or in the form of hardware.

[0028] Such as figure 1 Described, the method of the present embodiment comprises:

[0029] S110. Collect the time-domain gait data of the target user based on the sensor in the mobile terminal, use a periodic algorithm to extract the time-domain gait data, obtain the time-domain gait data of each cycle, and extract the time-domain gait data of each cycle Time domain gait data of at least one period in the domain gait data is used as the first gait data.

[0030] Wherein, a mobile terminal refers to a computer device that can be used on the move, such as a mobile phone, a tablet computer, and the like. A sensor ...

Embodiment 2

[0071] Before collecting the current time-domain action information of the target user based on the sensor in the mobile terminal, it is necessary to obtain a feature generation model, so that each user can obtain a feature sequence corresponding to each user through the feature generation model, so that a single classification vector machine can be used The algorithm trains the acquired feature sequence to obtain a single classification model, and the single classification model can also determine whether the current user is the target user according to the feature sequence input by the user. figure 2 It is a schematic flowchart of an identity authentication method provided by Embodiment 2 of the present invention, as shown in figure 2 Described, the method of the embodiment of the present invention comprises:

[0072]S210. Acquire time-domain gait data of at least one user, extract at least time-domain gait data of at least one user by using a periodic algorithm, and obtai...

Embodiment 3

[0095] As a preferred embodiment of the above embodiment, image 3 It is a schematic flowchart of an identity authentication method provided by Embodiment 3 of the present invention, as shown in image 3 Described, the method of the embodiment of the present invention comprises:

[0096] S310. Raw data. The time-domain gait data of the target user is acquired through the built-in sensor of the mobile terminal, wherein the time-domain gait data may be the time-domain gait data of the current user walking at least three steps, optionally six steps, etc.

[0097] S320. Filter data.

[0098] The time-domain gait data obtained at this time has certain noise, and it needs to be de-noised. state data.

[0099] S330, period extraction.

[0100] In the process of walking, the user takes two steps and one cycle, which has a very strong periodicity. Therefore, basically one cycle (about 1 second) contains the gait characteristics of a user, and the time-domain gait data of more tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for identity authentication, a terminal and a storage medium. The method comprises: collecting time domain gait data of a target user based on a sensor in amobile terminal, and extracting the time domain gait data by using the periodic algorithm to obtain time domain gait data of each period as first gait data; performing coordinate transformation on the first gait data to obtain second gait data, converting the second gait data into frequency domain gait information and obtaining a feature sequence corresponding to the target user based on a pre-trained feature generation model; and entering the feature sequence of the target user into a single classification model corresponding to the target user, and passing the authentication when the data output by the single classification model is first preset data. The technical scheme of the embodiment of the invention realizes the technical effect of improvement of the accuracy and security of identity authentication by using the user gait information because of the individualization nature of the user gait information.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of security authentication, and in particular, to an identity authentication method, device, terminal, and storage medium. Background technique [0002] The identity authentication method based on gait recognition was first proposed by Gafurov in 2006. Through a large number of repeated experiments, he found the gait similarities between the same users and the differences between different users, and concluded that each user's Gait is unique and can be authenticated by the user's gait. [0003] There are four main types of gait recognition-based methods in the prior art: identity authentication based on machine vision, based on ground sensors, based on wearable sensors or based on sensors set in mobile terminals. Among them, the authentication method based on machine vision is: use a camera to capture a series of gait images of the user during walking, and then use the image matchi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04M1/725H04M1/72454
CPCH04L9/3231H04M1/72454
Inventor 谈剑锋聂文静杨德光姜立稳
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products