Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for identity authentication and authentication mode adjustment

An identity authentication and user identity technology, applied in the Internet field, can solve the problems of low authentication process efficiency, data loss, and low authentication process accuracy, and achieve the effect of improving accuracy and authentication efficiency and avoiding data loss.

Active Publication Date: 2022-07-29
BEIJING TRUSFORT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The general identity authentication process is by adding a slider authentication or clicking on a picture for authentication. The user terminal collects authentication data and sends the collected authentication data to the background server for authentication. However, in the process of sending authentication data , data loss may occur, resulting in lower accuracy of the authentication process
[0003] Moreover, for a more complex identity authentication process, such as continuous and intersecting gestures provided by the user terminal or the picture similarity in the picture click authentication is too high, there are cases where the user has been unable to pass the authentication, which will also result in low efficiency of the authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identity authentication and authentication mode adjustment
  • A method and device for identity authentication and authentication mode adjustment
  • A method and device for identity authentication and authentication mode adjustment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] see figure 1 As shown, a schematic flowchart of an identity authentication method provided by an embodiment of the present application, when applied to a user terminal, the method includes the following steps:

[0070] Step 101 , a trigger operation on the display screen of the user terminal is detected, and the trigger operation is used to instruct to perform user identity authentication.

[0071] Exemplarily, the display screen of the user terminal may be any touchable display screen. When a trigger operation is detected, identity authentication is performed. Taking the display screen of the mobile phone as an example, it is detected that the user requests to access the mobile phone interface or the application software in the mobile phone. When the trigger operation is performed, the user needs to be authenticated, and only after the identity authentication is passed, the mobile phone interface or the application software in the mobile phone is allowed to enter.

[...

Embodiment 2

[0093] In a possible embodiment of the present application, when applied to a user terminal, the method in the first embodiment further includes:

[0094] The operation parameters of the reference gesture action selected in each authentication process and the authentication result of each authentication process are counted.

[0095]Exemplarily, the corresponding selected reference gesture action is determined according to the operation parameters of the selected reference gesture action, and the reference gesture action selected during the authentication process may include two-finger click, down and right slide, and rotation. During the process, the two-finger click authentication in the selected reference gesture action passed, but the swipe down, right, and rotate authentication in the selected reference gesture action failed. During the authentication process, user B double-clicked, The bottom-right swipe authentication is passed, but the rotation authentication is not pas...

Embodiment 3

[0103] The embodiment of the present application also provides a method for adjusting the authentication mode, see image 3 As shown, a schematic flowchart of a method for adjusting an authentication mode provided by an embodiment of the present application, when applied to a server, the method includes the following steps:

[0104] Step 301: Acquire the operation parameters of the reference gesture action selected by the user terminal when performing each authentication process, and the authentication result of each authentication process.

[0105] Step 302: Classify the reference gesture actions based on the obtained operation parameters and authentication results of the reference gesture actions selected in each authentication process, and calculate the pass rate of the authentication process corresponding to each category of reference gesture actions.

[0106] Specifically, the specific implementation method of the server for screening the gesture action pass rate is the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and device for identity authentication and authentication mode adjustment, including detecting a trigger operation on a display screen of a user terminal, instructing to perform user identity authentication; executing an authentication process, and determining that each authentication process is passed after each authentication process is passed. , and repeat the authentication process until it is determined that the number of passes of the authentication process meets the preset number of times, and the authentication of the user identity is determined to be successful; and then obtain through the server the operation parameters of the reference gesture action selected by the user terminal when performing each authentication process, and each time According to the authentication result of the authentication process, the reference gesture actions are classified, and the pass rate of the authentication process corresponding to each category of reference gesture actions is calculated; the reference gesture actions whose pass rate is lower than the set threshold are filtered out, and the selected The indication information of the gesture action is sent to the user terminal, thereby improving the accuracy of the authentication process and the authentication efficiency in the identity authentication.

Description

technical field [0001] The present application relates to the field of Internet technologies, and in particular, to a method and device for identity authentication and authentication mode adjustment. Background technique [0002] When the user opens the mobile phone interface or opens an application software in the mobile phone, the user needs to be authenticated before the user is allowed to enter the mobile phone interface or the application software. The general identity authentication process is to add slider authentication or image click authentication. The user terminal collects the authentication data, and sends the collected authentication data to the background server, which is authenticated by the background server, but in the process of sending the authentication data , data loss may occur, resulting in lower accuracy of the authentication process. [0003] Moreover, for more complex identity authentication processes, such as continuous and intersecting gesture a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/30H04W12/68H04W12/69H04W12/06
CPCH04W12/06H04W12/35H04W12/69H04W12/68
Inventor 张言超高英明赵军孙悦郭晓鹏
Owner BEIJING TRUSFORT TECH CO LTD