Method for authenticating smartphone user based on multi-image switching

A user authentication and smart phone technology, applied in digital data authentication, computer security devices, data processing input/output process, etc., can solve problems such as large amount of calculation, large amount of processed data, complex algorithm, etc., and achieve high recognition rate and security, high resistance to brute force attack performance, and the effect of key space expansion

Inactive Publication Date: 2014-01-22
SOUTHEAST UNIV
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, there are a variety of user authentication methods based on biometrics. The more mature one is fingerprint recognition. At present, the accuracy of fingerprint recognition is relatively high, but the general smart terminal touch screen does not have the fingerprint collection function, so it is necessary to install additional special fingerprint collection. equipment
There are also some smart phones that have launched face recognition, but the accuracy of face recognition is low, and the algorithm is complex, the amount of data processed is large, and the time required is long, which affects the user experience.
In addition, there is a method to recognize the user's handwritten signature, but its calculation is also relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating smartphone user based on multi-image switching
  • Method for authenticating smartphone user based on multi-image switching
  • Method for authenticating smartphone user based on multi-image switching

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The specific implementation manner of the present invention will be described below in conjunction with the accompanying drawings.

[0016] The implementation of the present invention is divided into 2 steps, namely:

[0017] The first step is the user registration process;

[0018] The second step is the user authentication process.

[0019] The user registration process is as follows figure 1 As shown, the specific steps are described in detail as follows:

[0020] (1) Create a user name;

[0021] The user name consists of 6 to 20 alphanumeric characters, such as "zhangsan2013", "wangguihua" and so on.

[0022] (2), select the image sequence;

[0023] List an image collection for the user to select multiple images, for example 5, to form an image sequence. For safety reasons, the image sequence should be saved in the internal memory card of the smart phone instead of an external memory card such as an SD card. The image format is not limited, and JPG files are g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for authenticating a smartphone user based on multi-image switching. The method comprises the steps of firstly, selecting an image sequence by the user, then, recording a motion feature sequence of fingers when the user switches images, wherein the image sequence is stored in an internal storage of a smartphone, and the motion feature sequence comprises starting point coordinates, end point coordinates, speed and the like. The feature sequence is processed and then marked as feature codes of the user, wherein the feature codes are used for distinguishing different users. Compared with PIN authentication, the method has the advantages of greatly expanding secrete key space, being convenient to use, practical and free of adding any additional device, and having the quite high recognition rate and safety.

Description

technical field [0001] The invention relates to a user authentication technology of a smart phone, more specifically, a method for safely and effectively authenticating user identity on a smart phone equipped with a touch screen. Background technique [0002] Smartphones have developed rapidly in recent years. They have rich interfaces (such as touch screen, WIFI, 3G, camera, etc.) and powerful processing capabilities. Due to its unique portability and diverse applications, smart phones have become more and more important to affect people's daily life. Photos, emails, contacts, and even bank accounts are almost all stored in smart terminals. Therefore, how to authenticate the identity of the smartphone user to protect the security of these private data has become an urgent problem to be solved. [0003] Currently, the most commonly used user authentication method is personal identification number (Personal Identification Number, PIN) authentication. Similar to computer pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F3/0488
CPCG06F3/04883G06F21/316
Inventor 秦中元胡爱群杨中云
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products