A method and device for identity authentication and authentication mode adjustment
An identity authentication and user identity technology, applied in the Internet field, can solve the problems of low authentication process efficiency, data loss, and low authentication process accuracy, and achieve the effect of improving accuracy and authentication efficiency and avoiding data loss.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] see figure 1 As shown, a schematic flowchart of an identity authentication method provided by an embodiment of the present application, when applied to a user terminal, the method includes the following steps:
[0070] Step 101 , a trigger operation on the display screen of the user terminal is detected, and the trigger operation is used to instruct to perform user identity authentication.
[0071] Exemplarily, the display screen of the user terminal may be any touchable display screen. When a trigger operation is detected, identity authentication is performed. Taking the display screen of the mobile phone as an example, it is detected that the user requests to access the mobile phone interface or the application software in the mobile phone. When the trigger operation is performed, the user needs to be authenticated, and only after the identity authentication is passed, the mobile phone interface or the application software in the mobile phone is allowed to enter.
[...
Embodiment 2
[0093] In a possible embodiment of the present application, when applied to a user terminal, the method in the first embodiment further includes:
[0094] The operation parameters of the reference gesture action selected in each authentication process and the authentication result of each authentication process are counted.
[0095]Exemplarily, the corresponding selected reference gesture action is determined according to the operation parameters of the selected reference gesture action, and the reference gesture action selected during the authentication process may include two-finger click, down and right slide, and rotation. During the process, the two-finger click authentication in the selected reference gesture action passed, but the swipe down, right, and rotate authentication in the selected reference gesture action failed. During the authentication process, user B double-clicked, The bottom-right swipe authentication is passed, but the rotation authentication is not pas...
Embodiment 3
[0103] The embodiment of the present application also provides a method for adjusting the authentication mode, see image 3 As shown, a schematic flowchart of a method for adjusting an authentication mode provided by an embodiment of the present application, when applied to a server, the method includes the following steps:
[0104] Step 301: Acquire the operation parameters of the reference gesture action selected by the user terminal when performing each authentication process, and the authentication result of each authentication process.
[0105] Step 302: Classify the reference gesture actions based on the obtained operation parameters and authentication results of the reference gesture actions selected in each authentication process, and calculate the pass rate of the authentication process corresponding to each category of reference gesture actions.
[0106] Specifically, the specific implementation method of the server for screening the gesture action pass rate is the s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


