Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone terminal identity authentication method, system, device, medium, terminal and application

An identity authentication and mobile phone technology, applied in the field of identity authentication, can solve the problems of poor user friendliness, insecure physiological characteristics, and inability to perform live detection, etc., and achieve high user friendliness

Pending Publication Date: 2021-11-16
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Through the above analysis, the existing problems and defects of the existing technology are: the knowledge-based authentication method of the existing smart phone authentication method cannot defend against attack methods such as stain attack, shoulder surfing attack and video attack; the authentication method based on physiological characteristics, such as fingerprint It cannot resist attacks such as 3D printing forged fingerprints, cannot perform liveness detection or the living body detection process is cumbersome, and the user experience is poor; the authentication method based on smart device NFC will perform indiscriminate authentication, and anyone can crack the device after it is lost; based on the built-in sensor of the mobile phone Such as 3D gesture authentication requires users to wave their mobile phones anytime and anywhere, which will put users in an awkward situation in public places, and the user friendliness is poor
[0006] The difficulty of solving the above problems and defects is: it is necessary to find a way to resist all attacks on the mobile phone, but because the user's physiological characteristics become insecure with the emergence of 3D printing emerging technologies, it is necessary to use the user's unique personal Behavior characteristics, behavior characteristics need to collect user behavior data, using the mobile phone's built-in sensor background collection will affect the user's use, and there have been cases where the mobile phone's built-in sensor has become a "bug", so using the smart device worn by the user to collect user data at any time has become a problem. High-quality options, but the collection of data requires a large amount of data and high-quality data, which is a challenge for the present invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone terminal identity authentication method, system, device, medium, terminal and application
  • Mobile phone terminal identity authentication method, system, device, medium, terminal and application
  • Mobile phone terminal identity authentication method, system, device, medium, terminal and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] Aiming at the problems existing in the prior art, the present invention provides a mobile terminal identity authentication method, system, device, medium, terminal and application. The present invention will be described in detail below with reference to the accompanying drawings.

[0053] Tax: x-axis raw accelerometer data.

[0054] Tay: y-axis raw accelerometer data.

[0055] Taz: z-axis raw accelerometer data.

[0056] Lax: x-axis linear accelerometer data.

[0057] Lay: y-axis linear accelerometer data.

[0058] Laz: z-axis linear accelerometer data.

[0059] gx: x-axis gyroscope data.

[0060] gy: y-axis g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of identity authentication, and discloses a mobile phone terminal identity authentication method, system and device, a medium, a terminal and application. Comprising the following steps: collecting three-axis accelerometer data, three-axis gyroscope data and heart rate sensor data generated by behavior actions of a wearer of the intelligent wearable equipment; performing data preprocessing; stacking the formed ten-channel original signal data to form signal image data; performing discrete Fourier transform on the signal image data, and taking the amplitude of the signal image data as a final moving image; obtaining personal characteristics of the wearer by using a machine learning algorithm, and training an identity authentication model; transplanting the identity authentication model to a mobile phone terminal, and receiving ten-channel original data in real time; and carrying out auxiliary identity authentication on the mobile phone by taking the behavior action of the wearer of the intelligent wearable equipment as an identity authentication mode. According to the invention, a series of attacks, such as stain attacks, shoulder surfing attacks and video attacks, aiming at the mobile phone side can be effectively prevented on the premise that the recognition accuracy is not influenced.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a mobile phone terminal identity authentication method, system, equipment, medium, terminal and application. Background technique [0002] At present: touch screen mobile phones occupy a dominant position in the market. It provides more functions and stronger storage capacity. With the continuous development of smart phone touch screen technology, its high flexibility and user-friendliness are popular among users. As a common tool for people, mobile phones store a large amount of personal information. Information leakage will cause immeasurable losses, and mobile phones are easy to be misplaced or stolen. Similarly, with the improvement of attack methods, mobile phones are also vulnerable to smudge attacks, shoulder Various threats such as surfing attacks and video attacks. [0003] As the first line of defense, user authentication is the essence of p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K9/62G06N3/04A61B5/11A61B5/0205A61B5/117
CPCG06F21/32A61B5/11A61B5/0205A61B5/117A61B5/6898A61B5/7267G06N3/045G06F18/214
Inventor 曹进拜晓蒙李晖郭振洋赵兴文付玉龙
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products