Identity authentication method and device

An identity authentication and user technology, applied in the field of network security, can solve the problems of limiting device security, enhancement, and difficulty in further improving accuracy, and achieve the effect of improving authentication security and accuracy

Active Publication Date: 2019-11-05
BEIJING UNIV OF POSTS & TELECOMM
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, the accuracy of identity authentication based on biometrics is difficult to be further improved, which limits the enhancement of device security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0021] The inventors concluded that the current identity authentication technology based on the behavior characteristics of smart mobile devices to improve the accuracy of identity authentication mainly focuses on proposing new biometric features and new machine learning algorithms. The selection of features fundamentally affects the performance of learning algorithms. Therefore, new and effective features are the key to improving the accuracy of identity authentication technology for smart mobile devices. However, the inventors have found through research that altho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and device, and the method comprises the steps: collecting the real-time biological behavior information of a user of intelligent mobile equipment; extracting user real-time biological behavior characteristics from the user real-time biological behavior information; obtaining user real-time cognitive features according to the user real-timebiological behavior features; and comparing the user real-time biological behavior characteristics and the user real-time cognitive characteristics with a pre-established user model to authenticate the legality of the user identity of the collected intelligent mobile device, and establishing the user model according to user historical biological behavior characteristics and user historical cognitive characteristics. Through the scheme, the accuracy based on identity authentication can be improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an identity authentication method and device. Background technique [0002] With the increasing popularity of computers and their network applications, especially the rapid development of Internet applications, the security management of computers and their network systems has become increasingly prominent, and various illegal computer and network intrusion incidents have occurred frequently. According to preliminary estimates, more than 70% of network intrusions start from stealing legitimate user passwords, especially administrator passwords. [0003] In view of the fact that the password protection mechanism is a simple means of computer security protection, a number of user authentication methods based on various biometric features have been proposed. However, at present, the accuracy of identity authentication based on biometric features is difficult to be further ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/06
CPCH04W12/06H04W12/68
Inventor 吴桐郑康锋武斌伍淳华
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products