Unlock instant, AI-driven research and patent intelligence for your innovation.

An Identity Authentication Method Based on Gait Signal Topological Analysis

A topology analysis and identity authentication technology, applied in the field of identity authentication based on topological analysis of gait signals, can solve problems such as difficulties, interruption of identity authentication and authentication, and achieve the effects of low cost, high recognition accuracy and convenient data collection process.

Active Publication Date: 2022-08-09
GUILIN UNIV OF ELECTRONIC TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, the traditional gait recognition research based on machine vision needs to capture the recognition object under the camera and in a specific environment to carry out identification and authentication. Once the object is blocked, the shooting environment is complex or out of the camera shooting range, the identity authentication Therefore, it is necessary to study a continuous, implicit, and less environmentally demanding way to identify and authenticate users to solve this problem. The implicit authentication method does not rely on the direct participation of the user, but with User behavior recorded by smartphone built-in hardware is closely related to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity Authentication Method Based on Gait Signal Topological Analysis
  • An Identity Authentication Method Based on Gait Signal Topological Analysis
  • An Identity Authentication Method Based on Gait Signal Topological Analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0053] refer to figure 1 , an identity authentication method based on gait signal topology analysis, comprising the following steps:

[0054] 1) Data acquisition: use the built-in sensor of the smartphone to collect the triaxial accelerometer signal for preprocessing, and synthesize the signals in the three directions of x, y, and z of the triaxial accelerometer into a scalar signal, and the preprocessing is as follows: : Median filter the signal of the three-axis accelerometer and filter through a third-order low-pass Butterworth filter with a cutoff frequency of 20Hz to reduce noise. In this example, the smartphone is worn around the tester's waist to perform activities. Use the built-in accelerometer of the Samsung Galaxy S2 smartphone to measure the 3-axis linear acceleration at a constant speed of 50Hz. figure 2 As shown, the signals in the three-axis accelerometer's x, y, and z directions are combined into a scalar signal as image 3 shown;

[0055] 2) Activity recog...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method based on topological analysis of gait signals, which is characterized by comprising the following steps: 1) acquiring data; 2) activity recognition; 3) data segmentation; 4) continuous coherence; 5) feature extraction ; 6) User identification. This method can obtain a detailed understanding of key information lost in conventional statistical analysis through topological analysis of gait signals for high recognition accuracy and robustness.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an identity authentication method based on topological analysis of gait signals. Background technique [0002] Smartphones are becoming one of the most important interfaces of information systems. Recently, there has been a dramatic increase in the number of smartphone applications dealing with financial transactions, health maintenance, contact information, etc. These applications generate more and more personal confidential information, the security of which is not only critical for application developers, Users also care a lot. Therefore, the user authentication and security issues of smartphones have become issues of fundamental significance. [0003] In recent years, various user identification technologies have been proposed for smartphones, including traditional password-based identification, fingerprint identification to face identification, and several ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06V40/20G06K9/62G06V10/74H04M1/72454G06F21/32
CPCG06F21/32H04M2250/12H04M1/72454G06V40/25G06F18/22
Inventor 闫坤张李轩李慧慧陈德富傅琪刘威李执
Owner GUILIN UNIV OF ELECTRONIC TECH