Terminal implicit identity authentication method based on Sudoku password

An identity authentication and grid password technology, applied in the field of terminal implicit identity authentication based on Jiugong grid password, can solve the problem of not being able to apply Jiugong grid graphic password well, and achieve the effect of improving the accuracy rate

Active Publication Date: 2020-05-15
BEIJING JIAOTONG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method enhances the security of user identity authentication, but this method only constructs behavioral characteristics related to taxiing speed. However, in actual situations, user behavior is determined by many characteristics, and a simple certain type of characteristic is not very good. summary of user behavior information
On the other hand, the system only constructs feature templates for part of the sliding direction and turning angle, and does not mention the processing method of sliding behavior data that is not in the template library. Therefore, this method is not very suitable for Jiugongge graphic password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal implicit identity authentication method based on Sudoku password
  • Terminal implicit identity authentication method based on Sudoku password
  • Terminal implicit identity authentication method based on Sudoku password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] like figure 1 As shown, the embodiment of the present invention provides a mobile phone terminal implicit identity authentication method based on Jiugongge password, from figure 1 It can be seen that the method includes two stages: the training of the identity authentication classifier and the identity authentication of the user to be authenticated. In the training phase, the data of the preset Jiugongge password of legitimate users is collected to train the authentication model. In the authentication stage, the behavior data of the Jiugongge password to be authenticated is used for authentication by the trained authentication model to determine the legitimacy of the user.

[0048] The determination of the basic unit of the broken line of the Jiugongge password is independent of the training phase and the certification phase, as follows:

[0049] In the establishment of the basic unit of the broken line, according to the drawing rules of the Jiugongge cipher, exhaustiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile phone terminal implicit identity authentication method based on a Sudoku password and belongs to the technical field of information security protection. The method comprises the following steps: dividing a broken line basic unit of a Sudoku password to be authenticated, extracting feature data of each broken line basic unit of the to-be-authenticated Sudoku password, performing standardization processing, inputting the standardized feature data of each broken line basic unit of the to-be-authenticated Sudoku password into a trained identity authentication classifier model, determining a legality authentication index of the to-be-authenticated Sudoku password in combination with the weight coefficient assignment of the broken line basic units, and if the legality authentication index is greater than an authentication threshold value 0, determining that the to-be-authenticated Sudoku password is legal, otherwise, determining that the to-be-authenticated Sudoku password is illegal. According to the method, the multi-source and multi-dimensional characteristics of the preset Sudoku password are extracted, the Sudoku password gesture is divided by takingthe broken line containing more user information as a basic unit, fine grit detection of user behavior information is realized, the segmented gesture is weighted, and the password authentication accuracy is improved.

Description

technical field [0001] The invention relates to the technical field of information security protection, in particular to a terminal implicit identity authentication method based on Jiugongge cipher. Background technique [0002] With the rapid development of communication technology and information technology, mobile devices such as smartphones proliferate, and their storage and computing capabilities are also getting stronger. Nowadays, smartphones have become an integral part of our lives, and the diversification of built-in sensors and application software makes people more and more dependent on smartphones. Activities closely related to life, such as online payment, financial management, and shopping, lead to a large amount of private data being stored on mobile phones. Once the phone is lost. The security of user privacy data will face a huge impact. Therefore, it is imperative to restrict access to devices by untrusted users by implementing reliable and convenient a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06K9/62
CPCG06F21/46G06F18/2411G06F18/214
Inventor 师代陶丹
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products