Identity authentication method and system based on body shapes and movements

A body shape, identity authentication technology, applied in the field of wireless networks, can solve the problem of cumbersome authentication process

Inactive Publication Date: 2018-05-04
台州市吉吉知识产权运营有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides an identity authentication method and system based on body shape and action, which is used to solve the problem of cumbersome authentication process in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system based on body shapes and movements
  • Identity authentication method and system based on body shapes and movements
  • Identity authentication method and system based on body shapes and movements

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] figure 1 It is a flow chart of an identity authentication method based on body shape actions in this embodiment, such as figure 1 As shown, a kind of identity authentication method based on body shape action in the present embodiment comprises steps:

[0063] S1. Obtain the first body shape action sent by the first device, and the first body shape action is the basis for judging the device's online identity authentication;

[0064] This step is mainly the body shape action preset to be used as the router authentication password, that is, the first body shape action.

[0065] figure 2 Obtain the specific flow chart of the first body shape action for the router, such as figure 2 As shown, the router obtains the first body shape action sent by the first device as follows:

[0066] S11. Receive pictures and / or videos containing body movements sent by the first device;

[0067] In this step, the first device is a terminal device that has established a network connecti...

Embodiment 2

[0108] Figure 5 It is a structural diagram of an identity authentication system based on body shape and action in this embodiment, such as Figure 5 As shown, a kind of identity authentication system based on body shape action in the present embodiment comprises:

[0109] Device 10, configured to send pictures and / or videos containing body movements to the router;

[0110] The router 20 is configured to acquire the first body shape action and the second body shape action according to the picture and / or video containing the body shape action sent by the device. The first body shape action is the basis for judging the identity authentication of the device online, so The second body shape action is used for identity authentication; when the router is not connected to the Internet, it is used to judge whether the first body shape action is consistent with the second body shape action, and pass or reject the identity of the device according to the judgment result authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and system based on body shapes and movements. The method comprises the following steps: S1, acquiring first body shapes and movements sent byfirst equipment, wherein the first body shapes and movements serve as a judgment basis for identity authentication for network access of equipment; S2, after second equipment is connected to a router, acquiring second body shapes and movements sent by the second equipment and used for the identity authentication; and S3, judging whether the first body shapes and movements are identical to the second body shapes and movements or not, and approving an identity authentication request of the second equipment if the first body shapes and movements are identical to the second body shapes and movements. The method and system provided by the embodiment of the invention has the advantages that the body shapes and movements are identified for the identity authentication, so that the identity authentication is more intelligent and convenient, and better propagation effects and more fun are achieved.

Description

technical field [0001] The invention relates to the technical field of wireless networks, in particular to an identity authentication method and system based on body shape movements. Background technique [0002] With the development of wireless network technology, current smart wireless routers have become very popular. When users connect to a new network, they need to authenticate their identity through the router of the network. [0003] At present, a relatively common permission authentication method is usually to set a dialog window on the client side, and the user directly enters the WiFi user name and password in the dialog window, and through verification of the user name and password, the login is realized and the permission matching the user name is obtained. . However, this permission authentication method has the following disadvantages. First, the operation steps are cumbersome and increase the user's memory cost; second, there are relatively large security ri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/00
CPCH04L63/08G06V40/20
Inventor 祖东辉
Owner 台州市吉吉知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products