Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A user authentication method and device

A user authentication and user technology, applied in the direction of digital data authentication, etc., can solve problems such as loss and personal information leakage, and achieve the effect of not easy to counterfeit and good security.

Active Publication Date: 2019-02-19
ADVANCED NEW TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the identity authentication method based on username-password, because many applications on mobile devices, such as WeChat, Zhihu, Renren and other social applications, usually only authenticate the user’s identity when the user logs in for the first time, and the user only needs to enter it once. account number and password, subsequent users no longer need to repeatedly enter the account number and password when using the application, so when the mobile device is lost, these account numbers and passwords are also in a state of being stolen, and the user's personal information will be leaked at this time , resulting in loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user authentication method and device
  • A user authentication method and device
  • A user authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] This application proposes a user authentication method, which determines whether the user is an authorized user by matching the user's touch behavior data collected by the terminal with the customary touch behavior of the authorized user of the terminal; it is similar to the user authentication method in the existing implementation Compared with this application, since the identity authentication is performed based on the user's touch behavior data collected by the terminal, it is not easy to counterfeit, and the security is better; and this application can complete the identity authentication of the user without the user's knowledge, which has a certain degree of privacy, so When the terminal is lost, it will not cause leakage of personal information.

[0061] The present application is described below through specific embodiments and in combination with different application examples.

[0062] Please refer to figure 1 ,figure 1 It is a user authentication method prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a user authentication method. The method comprises following steps: receiving touch behavior data of users collected by a terminal; determining whether touch behavior data of users are matched with habit touch behaviors of authenticated users for the terminal; determining that users are authenticated if does; and determining that users are not authenticated if not. The user authentication method has following beneficial effects: based on touch behavior data of users collected by the terminal, identity authentication is performed; counterfeiting act is avoided; higher safety is obtained; identity authentication is performed when users are not informed of so that the method is secretive; and leakage of personal information is avoided when the terminal is lost.

Description

technical field [0001] The present application relates to the technical field of terminals, in particular to a user authentication method and device. Background technique [0002] In existing implementations, user identity authentication is usually based on user name-password or physiological characteristics (such as fingerprints). [0003] For the identity authentication method based on username-password, because many applications on mobile devices, such as WeChat, Zhihu, Renren and other social applications, usually only authenticate the user’s identity when the user logs in for the first time, and the user only needs to enter it once. account number and password, subsequent users no longer need to repeatedly enter the account number and password when using the app, so when the mobile device is lost, these account numbers and passwords are also in a state of being stolen, and the user's personal information will be leaked at this time , resulting in losses. [0004] For ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
Inventor 王志扬
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products