Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system

An identity verification method and identity verification technology, applied in the direction of digital data authentication, etc., can solve the problems of complex use of verification technology, easy to be simulated by programs, etc.

Inactive Publication Date: 2018-12-21
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In summary, the prior art verification techniques are complicated to use and easily simulated by programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system
  • Authentication method and system
  • Authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to enable those skilled in the art to better understand the technical solution of the present invention, the identity verification method and system provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0035] figure 1 A flow chart of an identity verification method provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method includes:

[0036] Step 101, the server judges whether the pre-acquired eyeball movement trajectory matches the preset target pattern movement trajectory, if yes, execute step 102; if not, execute step 103.

[0037] Step 102, the server sends verification success information to the client, and the process ends.

[0038] Step 103, the server sends verification failure information to the client, and the process ends.

[0039] In the technical solution of the identity verification method provided in this embodiment, if the server judges that the pre-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method and a system. The method comprises the following steps: the server judges whether the eye movement trajectory acquired in advance matches with the movement trajectory of the preset target pattern; If the server judges that the eye movement trajectory acquired in advance matches the movement trajectory of the preset target pattern, the server sends the verification success information to the client. The invention is simple to use and avoids program simulation.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an identity verification method and system. Background technique [0002] On the Internet, we usually use passwords to protect private information. When we log in to a website, we must first enter the user name and password. This method has been used for a long time. With the development of the Internet, people find that the above method is not safe. Hackers can write a program to try and error the password at a very fast speed until the correct password is guessed. In order to prevent the machine from simulating the login process, there are many methods. The most common is the graphic verification code. The server generates a picture containing text and requires the correct text in the picture to be entered when logging in. It is difficult for people to recognize the text in the picture. It is very simple, relatively complicated for the machine, which prevents hackers fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32
Inventor 李晖徐雷于城
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products