Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User verification method, user verification device, user verification system and storage medium

A user verification and user technology, which is applied in the field of information security, can solve problems such as poor security and inability to verify, and achieve the effect of improving security

Pending Publication Date: 2021-07-09
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the password set by the user is leaked, others can also use the password to unlock and use the electronic device because it cannot be verified whether it is operated by the user himself, resulting in poor security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User verification method, user verification device, user verification system and storage medium
  • User verification method, user verification device, user verification system and storage medium
  • User verification method, user verification device, user verification system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0035] An aspect of an embodiment of the present disclosure provides a user verification method for an electronic device. The user verification method includes: obtaining the verification data generated by the user to be verified operating the screen of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user verification method applied to electronic equipment, and relates to the field of information security or finance and the like. The user verification method comprises the following steps: obtaining verification data generated by operating a screen of the electronic equipment by a user to be verified; processing the verification data to obtain at least one first feature vector; sending the at least one first feature vector to a server, so that the server compares the at least one first feature vector with at least one pre-stored second feature vector in a one-to-one correspondence manner. and when the comparison result sent by the server is passed, passing the user verification. The invention further provides a user verification method applied to the server, a user verification device, a user verification system and a storage medium.

Description

technical field [0001] The present disclosure relates to the information security field or the financial field, and more specifically, to a user verification method, user verification device, system, and storage medium. Background technique [0002] People use mobile phones, computers and other electronic devices to carry out activities such as work, life or entertainment, resulting in more and more important data stored on the electronic devices used in daily use. For example, a user uses a mobile banking client to handle banking business. Through the bank client, the user can view the bank balance, and can handle transfer, collection or savings and other services. Because it involves property security, it is necessary to set passwords for electronic devices or mobile banking clients to protect them from being used by others. In related technologies, for example, a nine-square gesture password, a digital password, or a combination of letters, numbers and symbols can be set...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q40/02G06F3/041G06K9/62G06N20/00
CPCG06Q20/4014G06Q40/02G06F3/0414G06N20/00G06F18/2411
Inventor 杨瑞光施佳子罗涛
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products