Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity authentication method and device, user terminal and server

A user identity authentication and identity authentication technology, which is applied in digital data authentication, instrument, character and pattern recognition, etc., can solve problems such as inapplicability and limited application scenarios

Pending Publication Date: 2020-12-15
SHENZHEN NESUN TECH LLC
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Second, it cannot be applied to any text, number or symbol;
[0006] Third, the application scenarios are limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device, user terminal and server
  • User identity authentication method and device, user terminal and server
  • User identity authentication method and device, user terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0067] Embodiments of the present disclosure are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present disclosure from the content disclosed in this specification. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The present disclosure can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present disclosure. It should be noted that, in the case of no conflict, the following embodiments and the features in the embodiments can be combined with each other. Based on the embodiments in the present discl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a user identity authentication method and device, a user terminal and a server. The method comprises the steps of obtaining signature sensor data collected bya sensor of a user terminal in the current user signature process and handwriting screenshot data formed by a user in the signature process; based on the signature sensor data and the handwriting screenshot data, respectively identifying user identities; and if the verification results based on the signature sensor data and the handwriting screenshot data are legal, passing the identity authentication. According to the invention, the behavior characteristics of the handwriting process and the biological characteristics of the handwriting are fused for use, so that the identity authentication of the handwritten signature is carried out more accurately, and the identity authentication speed can be improved.

Description

technical field [0001] The present invention relates to the technical field of artificial intelligence, in particular to a user identity authentication method, device, user terminal and server. Background technique [0002] Currently, there are various methods for authenticating a user. For example, a set of parameters is selected from the obtained handwritten signature to represent the signature, and the authenticity of the signature to be verified is judged by comparing the parameters of the training signature and the signature to be verified. These parameters include the horizontal and vertical coordinates, displacement, velocity and acceleration of the signature, as well as the average value, variance, maximum value and minimum value of these parameters. [0003] But existing technology has the following defects: [0004] First, signature identity authentication needs to be performed based on a dedicated handwriting device (special tablet and stylus); [0005] Second,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06K9/00G06K9/62
CPCG06F21/31G06V40/33G06V40/382G06F18/22G06F18/253
Inventor 李向阳赵景程李德庆潘和平苏洋吴仕威刘广军曾家劲
Owner SHENZHEN NESUN TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products