Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method and system

An identity authentication and user terminal technology, applied in the field of system security, can solve problems such as different message types, achieve the effects of convenient use, avoiding errors, and avoiding system freezes

Active Publication Date: 2022-08-09
BEIJING ZOHETEC CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in practical applications, due to the different processing capabilities of different wearable devices, the types of messages they can process are also different.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The invention will be further described below with reference to the accompanying drawings and specific embodiments.

[0051] This section includes several different examples.

[0052] However, it should be pointed out that different embodiments of the present invention respectively solve one or more technical problems mentioned in the background art, and achieve corresponding technical effects, and different combinations of embodiments can solve all the mentioned technical problems and achieve all technical problems. effect; however, it is not required that every single embodiment of the present invention solves all technical problems or obtains all improvements. The corresponding embodiments aimed at solving a certain problem or improving a single technical effect can all constitute independent technical solutions of the present invention.

[0053] see figure 1 , figure 1 It is a schematic flowchart of an identity authentication method according to an embodiment of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and system, and belongs to the technical field of system security. The method is applied to the wearable device and comprises the following steps that the wearable device receives user input parameters in response to the connection state of the wearable device and a user terminal; when the user input parameter meets a first preset condition, displaying a first user interface on the user terminal; and when the user input parameter does not meet the first preset condition, displaying a second user interface on the user terminal. The identity authentication system comprises the wearable device and the user terminal, and the user terminal has a notification message receiving function and a message digest generating function. And when the notification message received by the user terminal satisfies a fourth display condition, receiving a user identity authentication message through the wearable device, and displaying the notification message on the wearable device. According to the identity authentication scheme provided by the invention, message switching display and identity characteristics of the user terminal and the wearable equipment can be realized in a self-adaptive manner, and convenience is brought to the use of a user.

Description

technical field [0001] The invention belongs to the technical field of system security, and in particular relates to an identity authentication method and system. Background technique [0002] Thanks to the fingerprint authentication function of biometric authentication sensors in smart terminals (including smartphones and wearable devices), biometric authentication has gradually entered the mainstream. Biometric authentication is more widely used in wearables due to the "on-body" nature of wearables and new sensors that can capture and generate more complex, reliable, and difficult-to-tamper biometric identities. [0003] Currently, a user may wear more than one wearable device to communicate with a user terminal (eg, a smart phone terminal, a smart large-screen display terminal), and perform data processing and transaction interaction based on the interaction between the wearable device and the user terminal. [0004] However, in practical applications, due to the differe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/72454H04M1/67
CPCH04M1/72454H04M1/67
Inventor 袁潮赵月峰其他发明人请求不公开姓名
Owner BEIJING ZOHETEC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products