Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device, terminal, storage medium and program product

An identity authentication and identity verification technology, applied in the field of cloud security, can solve the problems of cumbersome verification operations and long verification process, and achieve the effects of simplifying the identity authentication process, improving efficiency, security and accuracy

Pending Publication Date: 2022-07-08
BIGO TECH PTE LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the identity authentication methods in the related art, whether based on two biometrics, password and password, or biometrics and user private information, require the user to perform at least two rounds of input verification operations, such as Input voiceprint and fingerprint, or respectively input fingerprint and password, etc., the verification operation is more cumbersome and the verification process is longer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, terminal, storage medium and program product
  • Identity authentication method and device, terminal, storage medium and program product
  • Identity authentication method and device, terminal, storage medium and program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the objectives, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.

[0031] As used herein, "plurality" refers to two or more. "And / or", which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and / or B, which can mean that A exists alone, A and B exist at the same time, and B exists alone. The character " / " generally indicates that the associated objects are an "or" relationship.

[0032] In the related art, two-factor authentication usually adopts two of the following three authentication factors: 1. User private information, such as user password and PIN; 2. User biometric information, such as voiceprint feature, face feature, fingerprint feature 3. User personal items, such as SMS verification codes, electronic tokens,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and device, a terminal, a storage medium and a program product, and belongs to the technical field of cloud security. The method comprises: in response to an identity verification instruction, displaying password conversion prompt information (201); performing face feature extraction on the identity verification image acquired by the camera to obtain face feature data (202); performing activity detection on the identity verification image to obtain a posture sequence (203); performing password conversion based on the gesture sequence to obtain an original password (204); and performing identity authentication based on the original password and the face feature data (205). By adopting the method, the device, the terminal, the storage medium and the program product, a user identity authentication process can be simplified, a user password is ensured not to be leaked in an input stage, and face recognition is protected from being attacked by forged face features.

Description

technical field [0001] The embodiments of the present application relate to the field of cloud security technologies, and in particular, to an identity authentication method, device, terminal, storage medium, and program product. Background technique [0002] Two-factor authentication (Two-factor Authentication, 2FA) refers to a method of authenticating a user's identity by combining two different types of authentication factors (eg, account password, SMS verification code, biometric feature, etc.). In the authentication process, users need to provide two different authentication factors to prove their identity, which can better protect user certificates and accessible resources than the single-factor authentication method. [0003] In the related art, two-factor authentication usually uses two of the following three authentication factors: 1. User private information, such as user password (password), personal identification number (Personal Identification Number, PIN); 2. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3226H04L9/3231H04L63/0861H04L63/08
Inventor 李岩
Owner BIGO TECH PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products