Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authenticating by virtue of wearable equipment and wearable equipment

A wearable device and identity authentication technology, which is applied in the communication field, can solve problems such as poor user experience, time-consuming, and difficult unified management, and achieve the effects of reducing memory burden, convenient operation, and ensuring safety

Active Publication Date: 2014-12-03
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In order to protect user information and property security, users need to perform login authentication in various fields, such as terminal startup, bank account, email, traffic equipment security management, etc. Currently, based on the biological characteristics of individual users (such as fingerprints, retina, veins, Iris, voiceprint, etc.) authentication methods have been gradually applied in different fields, however, each biometric feature requires a specific input interface, which is difficult to manage uniformly, and there are cases where no biometric authentication interface is provided. In most fields, Can only rely on traditional account and password login authentication, therefore, users need to spend a lot of time and energy to remember these passwords, inconvenient to use, poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating by virtue of wearable equipment and wearable equipment
  • Method for authenticating by virtue of wearable equipment and wearable equipment
  • Method for authenticating by virtue of wearable equipment and wearable equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The embodiments of the present invention are described in detail below. Examples of the embodiments are shown in the accompanying drawings, in which the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the drawings are exemplary, and are only used to explain the present invention, but should not be understood as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents falling within the scope of the spirit and connotation of the appended claims.

[0020] In the description of the present invention, it should be noted that the terms "connected" and "connected" should be understood in a broad sense unless otherwise clearly specified and limited. For example, they may be fixed connection, detachable connection, or integral Ground connection; it can be a mechanical connectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for authenticating by virtue of wearable equipment and the wearable equipment. The method comprises the steps that the wearable equipment receives physical characteristics input by a user; the wearable equipment acquires identity authentication information of the user according to the physical characteristics; the wearable equipment sends the identity authentication information to a terminal communicating with the wearable equipment, so that the terminal performs authentication according to the identity authentication information. According to the method provided by the embodiment of the invention, the identity authentication information of the user can be acquired according to the physical characteristics and can be sent to the terminal for authentication through the wearable equipment, so that a brand-new authentication mode is provided for the user, the user does not need to memorize and input an authentication password, the memory burdens of the user are relieved, the operation is convenient, the physical characteristics cannot be acquired by other people, and the authentication safety is guaranteed.

Description

Technical field [0001] The present invention relates to the field of communication technology, and in particular to a method for authentication through a wearable device and a wearable device. Background technique [0002] In order to protect user information and property security, users need to perform login authentication in various fields, such as terminal activation, bank account, email, traffic equipment safety management, etc. At present, it is based on the biological characteristics of individual users (such as fingerprints, retina, veins, etc.) The authentication methods of iris, voice ripple, etc.) have been gradually applied in different fields. However, each biological feature requires a specific input interface, which is difficult to manage in a unified manner, and there are cases where a biological feature authentication interface is not provided. In most fields, You can only rely on traditional account and password methods for login authentication. Therefore, users ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 吴先超
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products