Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and system based on touch screen equipment and security and privacy encryption method

A technology of identity authentication and encryption method, which is applied in the field of security and privacy encryption, can solve the problems of limited application range of identity authentication and security privacy encryption, passwords are easy to be stolen, and complex operations, so as to improve information security and reduce the cost of acquisition and copying risk effect

Inactive Publication Date: 2014-12-10
王洋 +1
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Common security authentication methods in the prior art include: password authentication, fingerprint authentication, gesture recognition authentication, graphic pattern recognition authentication, face recognition authentication, etc. These security authentication methods can be used alone or in combination to enhance security security authentication level, but at the same time increases the user's operation process
In addition, the current common security verification methods have obvious disadvantages of being copied: the password of the password authentication method is easy to be stolen; the fingerprint of the fingerprint authentication method can be simulated with a special material; The face of face recognition authentication can be authenticated by photos, etc.
[0003] In addition, in some special fields, especially when people conduct financial transactions, the importance of information security becomes more and more prominent. There are many cases of property loss caused by the leakage of personal information in life: when people enter passwords, If it is seen by others, it will be recorded and stolen; the information received in the chat software cannot be determined to be operated by the person, and the account is stolen to defraud money
Although there are many advanced authentication methods in the prior art to strengthen information security and identity authentication, including the hardware needed to improve password identification, the significant disadvantage is that the operation is complicated, which leads to the scope of application of identity authentication and security privacy encryption. restricted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system based on touch screen equipment and security and privacy encryption method
  • Identity authentication method and system based on touch screen equipment and security and privacy encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Please refer to figure 1 , the identity authentication method based on the touch screen device of the present invention includes: S100, the user operates the touch screen device to generate touch behavior data; S200, stores and uploads the touch behavior data; S300, analyzes and processes the touch Control behavior data to identify whether the touch screen device is operated by the user himself. If it is verified that the user operates the touch screen device, the identity authentication is passed; otherwise, the above steps are repeated until the user passes the identity authentication.

[0024] Preferably, the touch behavior data includes: touch coordinates, touch area, touch angle, touch force, and / or click time.

[0025] Preferably, said storing and uploading said touch behavior data includes: storing said touch behavior data locally, and / or uploading and storing said touch behavior data to a server.

[0026] Preferably, the analysis and processing of the touch beh...

Embodiment 2

[0031] The identity authentication method based on the touch screen device in this embodiment includes: the user operates the touch screen device to generate touch behavior data; stores and uploads the touch behavior data; analyzes and processes the touch behavior data to identify Whether the touch screen device is operated by the user himself or not, if it is verified that the user himself operates the touch screen device, the identity authentication is passed; otherwise, the above steps are repeated until the user passes the identity authentication.

[0032] Preferably, the touch behavior data includes: touch coordinates.

[0033] Preferably, the touch coordinate data is stored locally, and / or the touch coordinate data is uploaded and stored to the server.

[0034] Preferably, the touch coordinate data is subjected to algorithmic analysis to verify whether the touch coordinate data is within the range of data analyzed by the algorithm, and the algorithm analysis is as follows:...

Embodiment 3

[0036] The identity authentication method based on the touch screen device in this embodiment includes: the user operates the touch screen device to generate touch behavior data; stores and uploads the touch behavior data; analyzes and processes the touch behavior data to identify Whether the touch screen device is operated by the user himself or not, if it is verified that the user himself operates the touch screen device, the identity authentication is passed; otherwise, the above steps are repeated until the user passes the identity authentication.

[0037] Preferably, the touch behavior data includes: touch area.

[0038] Preferably, the touch area data is stored locally, and / or the touch area data is uploaded and stored to the server.

[0039] Preferably, the touch area data is subjected to algorithmic analysis to verify whether the touch area data is within the range of data analyzed by the algorithm, and the algorithm analysis is as follows: after setting the initial ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and system based on touch screen equipment. The method comprises the steps that a user operates the touch screen equipment to generate touch behavior data; the touch behavior data are stored and uploaded; the touch behavior data are analyzed and processed so as to identify whether the touch screen equipment is operated by the user in person or not, and if yes, identify authentication succeeds; if not, the steps are executed again until the user passes identity authentication. The invention further discloses a security and privacy encryption method. The identity authentication method and system based on the touch screen equipment and the security and privacy encryption method have the advantages that unique identifiability is provided, only operations of binding personnel are recognized, and even if other users input correct content, it is judged that the operation is not carried out by the user in person; information security is improved, the other users cannot carry out operation even though inputting the same passwords as the user, and the user does not need to worry about the technical problem of password leakage.

Description

technical field [0001] The invention relates to an identity authentication method and system based on a touch screen device, and in particular, to a security and privacy encryption method. Background technique [0002] With the continuous improvement of people's living standards, intelligent touch-screen devices including mobile phones and tablet computers are more and more widely used. While these touch-screen devices bring convenience to people's lives, they also cause prominent problems in information security hidden dangers. . Taking touch mobile phones as an example, in order to protect personal information and privacy, people usually set a security verification method when turning on the screen. Common security authentication methods in the prior art include: password authentication, fingerprint authentication, gesture recognition authentication, graphic pattern recognition authentication, face recognition authentication, etc. These security authentication methods can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06Q20/40H04L29/08
CPCG06F21/316G06F21/32G06Q20/40145
Inventor 王洋林帅杨一琳
Owner 王洋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products