CN114282192A - AI identification-based intelligent mobile terminal identity authentication method - Google Patents
AI identification-based intelligent mobile terminal identity authentication method Download PDFInfo
- Publication number
- CN114282192A CN114282192A CN202111592076.4A CN202111592076A CN114282192A CN 114282192 A CN114282192 A CN 114282192A CN 202111592076 A CN202111592076 A CN 202111592076A CN 114282192 A CN114282192 A CN 114282192A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- intelligent mobile
- information
- verification
- identity authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses an identity authentication method of an intelligent mobile terminal based on AI identification, which comprises the following steps: the method comprises the steps that mobile terminal information of an intelligent mobile terminal is obtained when the intelligent mobile terminal is in an unlocking state; acquiring verification information of a verified article in an unlocked state of the intelligent mobile terminal; binding the mobile terminal information and the verification information to complete identity registration; acquiring verification information of a verified article when the intelligent mobile terminal is in a locked state; the method comprises the steps that mobile terminal information of an intelligent mobile terminal is obtained when the intelligent mobile terminal is in a locked state; verifying whether the verification information is matched with the mobile terminal information; and unlocking the intelligent mobile terminal when the verification information is matched with the mobile terminal information. According to the AI-recognition-based intelligent mobile terminal identity authentication method, in the registration and verification links, any private information which the user does not want to reveal is not required to be read, so that the verification and unlocking of the intelligent equipment by using the biological information of the user are avoided, the concealment of the biological information of the user is improved, and the leakage of the biological information of the user is avoided.
Description
Technical Field
The invention relates to an identity authentication method of an intelligent mobile terminal based on AI identification.
Background
AI is artificial intelligence, and the accuracy can reach 99% by the current AI identification technology as long as training data are enough.
At present, AI identification technology has deepened into various fields, and in the aspect of identity authentication, AI identification can accurately identify biological characteristics such as human faces, fingerprints and the like. For example, a common smart phone basically applies an AI recognition technology to recognize the identity of a user through biological information such as a human face, thereby unlocking the device.
Face recognition is a biometric technology for identity recognition based on facial feature information of a person. The method comprises the following steps of collecting images or video streams containing human faces by using a camera or a camera, automatically detecting and tracking the human faces in the images, and further carrying out face recognition on the detected human faces. Also commonly referred to as portrait recognition, facial recognition.
But AI recognition techniques based on biometrics inevitably raise a problem: privacy. The user needs to pre-input the face information or fingerprint information of the user into the intelligent device for storage. This is a concern for the personal privacy of the user.
Disclosure of Invention
The invention provides an AI-recognition-based intelligent mobile terminal identity authentication method for solving the technical problems, which specifically adopts the following technical scheme:
an AI identification-based intelligent mobile terminal identity authentication method comprises the following steps:
the method comprises the steps that mobile terminal information of an intelligent mobile terminal is obtained when the intelligent mobile terminal is in an unlocking state;
acquiring verification information of a verified article in an unlocked state of the intelligent mobile terminal;
and binding the mobile terminal information and the verification information to complete identity registration.
Further, the AI identification-based intelligent mobile terminal identity authentication method further includes:
acquiring verification information of a verified article when the intelligent mobile terminal is in a locked state;
the method comprises the steps that mobile terminal information of an intelligent mobile terminal is obtained when the intelligent mobile terminal is in a locked state;
verifying whether the verification information is matched with the mobile terminal information;
and unlocking the intelligent mobile terminal when the verification information is matched with the mobile terminal information.
Further, the mobile terminal information of the intelligent mobile terminal is mobile terminal hardware information.
Further, the mobile terminal information of the intelligent mobile terminal is a random password.
Further, before obtaining the mobile terminal information of the intelligent mobile terminal, the method for authenticating the identity of the intelligent mobile terminal based on AI identification further includes:
a random password is generated.
Further, a specific method for acquiring the verification information of the verification article is as follows:
and carrying out AI training on the verified article through the intelligent mobile terminal to obtain verification information.
Further, the authentication article comprises a three-dimensional object and/or a two-dimensional pattern.
Further, the two-dimensional pattern is a tattoo.
Further, a specific method for acquiring the verification information of the verification object in the unlocking state of the intelligent mobile terminal is as follows:
sequentially acquiring verification information of a plurality of verification articles according to a preset sequence;
the specific method for acquiring the verification information of the verified article in the locked state at the intelligent mobile terminal comprises the following steps:
and acquiring the verification information of a plurality of verification articles in sequence according to a preset sequence.
The AI-recognition-based intelligent mobile terminal identity authentication method has the advantages that in the registration and verification links, any private information which the user does not want to reveal does not need to be read, the verification and unlocking of the intelligent equipment by using the biological information of the user are avoided, the concealment of the biological information of the user is improved, and the leakage of the biological information of the user is avoided.
The AI-recognition-based intelligent mobile terminal identity authentication method has the advantages that the intelligent equipment is unlocked through a plurality of verification objects, and the difficulty of others in breaking identity authentication is improved.
Drawings
Fig. 1 is a schematic diagram of an AI identification-based intelligent mobile terminal identity authentication method according to the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
Fig. 1 shows an AI-recognition-based identity authentication method for an intelligent mobile terminal according to the present application, which includes the following steps: s1: and acquiring the mobile terminal information of the intelligent mobile terminal when the intelligent mobile terminal is in an unlocking state. S2: and acquiring the verification information of the verified article in the unlocking state of the intelligent mobile terminal. S3: and binding the mobile terminal information and the verification information to complete identity registration. The binding of the verification object is completed through the steps. According to the AI-recognition-based intelligent mobile terminal identity authentication method, any private information which the user does not want to reveal does not need to be read, verification unlocking of the intelligent equipment is avoided by using the biological information of the user, the concealment of the biological information of the user is improved, and the leakage of the biological information of the user is avoided.
The above steps are specifically described below.
For step S1: and acquiring the mobile terminal information of the intelligent mobile terminal when the intelligent mobile terminal is in an unlocking state.
In this application, intelligent mobile terminal contains smart mobile phone, smart machine such as dull and stereotyped.
Before identity authentication, authentication information is set.
Specifically, the smart device needs to be bound to the authentication object. Firstly, mobile terminal information of the intelligent mobile terminal is obtained when the intelligent mobile terminal is in an unlocking state.
The mobile terminal information of the intelligent mobile terminal may be mobile terminal hardware information. Such as the IMEI number, MAC address, etc. of the handset, indicating the unique identity of the handset.
It is understood that the mobile terminal information of the intelligent mobile terminal may also be a pre-generated random password. In this way, before obtaining the mobile terminal information of the intelligent mobile terminal, the method for authenticating the identity of the intelligent mobile terminal based on AI identification further includes: a random password is generated. Random passwords can be set at will through a password generation module or a manual password setting mode. The password can be set arbitrarily as required.
For step S2: and acquiring the verification information of the verified article in the unlocking state of the intelligent mobile terminal.
In order to avoid the leakage of the biological information of the user, the authentication objects in the present application are all objects that do not contain biological features (such as human face information and fingerprint information).
In particular, the authentication article comprises a three-dimensional object and/or a two-dimensional pattern.
For three-dimensional objects, the three-dimensional objects can be objects which are easy to carry about and are firm and not easy to damage, such as rings, watches and the like. For a two-dimensional pattern, it may be a pattern on a card. In order to improve the cracking difficulty, the two-dimensional pattern can also be a tattoo pattern on a human body. The difficulty of others' acquisition is improved.
In the present application, a specific method for acquiring authentication information of an authentication article is as follows:
and carrying out AI training on the verified article through the intelligent mobile terminal to obtain verification information.
Specifically, the camera at the intelligent mobile terminal is used for collecting and verifying the related information of the article.
For step S3: and binding the mobile terminal information and the verification information to complete identity registration.
And after the mobile terminal information and the verification information are acquired, binding the mobile terminal information and the verification information. Therefore, when the equipment is unlocked through authentication, whether the equipment is unlocked can be judged by comparing the two pieces of information.
When the intelligent mobile device needs to be unlocked, the method for authenticating the identity of the intelligent mobile terminal based on AI identification further comprises the following steps:
and obtaining the verification information of the verified article when the intelligent mobile terminal is in a locked state.
And obtaining the mobile terminal information of the intelligent mobile terminal when the intelligent mobile terminal is in a locked state.
And verifying whether the verification information is matched with the mobile terminal information.
And unlocking the intelligent mobile terminal when the verification information is matched with the mobile terminal information.
Therefore, when the intelligent mobile device is unlocked, the identity authentication can be completed only through some articles, patterns and the like without providing any biological characteristics.
As an alternative embodiment. The specific method for acquiring the verification information of the verified article comprises the following steps:
and acquiring the verification information of a plurality of verification articles in sequence according to a preset sequence.
The specific method for acquiring the verification information of the verified article again comprises the following steps:
and acquiring the verification information of a plurality of verification articles in sequence according to a preset sequence.
It is to be understood that the authentication item for user identification is not limited to one, and may include a plurality of items. Therefore, during training, the intelligent mobile terminal is trained through a plurality of verification articles in sequence. Similarly, at the time of identification, authentication information of a plurality of authentication items is also acquired in order. Therefore, the complexity of the identity verification of the intelligent mobile terminal can be improved, and the difficulty of cracking the identity verification is improved.
As a more preferred alternative. And when the information is bound, sequentially acquiring the verification information of the plurality of verification articles according to a first sequence. However, in order to improve the cracking difficulty, when unlocking, the intelligent mobile terminal can unlock the plurality of verification objects only by acquiring the verification information of the plurality of verification objects according to a second sequence different from the first sequence.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It should be understood by those skilled in the art that the above embodiments do not limit the present invention in any way, and all technical solutions obtained by using equivalent alternatives or equivalent variations fall within the scope of the present invention.
Claims (9)
1. An AI-recognition-based intelligent mobile terminal identity authentication method is characterized by comprising the following steps:
the method comprises the steps that mobile terminal information of an intelligent mobile terminal is obtained when the intelligent mobile terminal is in an unlocking state;
acquiring verification information of a verified article in an unlocked state of the intelligent mobile terminal;
and binding the mobile terminal information and the verification information to complete identity registration.
2. The AI recognition based intelligent mobile terminal identity authentication method of claim 1,
the identity authentication method of the intelligent mobile terminal based on AI identification further comprises the following steps:
the verification information of the verification object is obtained when the intelligent mobile terminal is in a locked state;
the method comprises the steps that the mobile terminal information of the intelligent mobile terminal is obtained when the intelligent mobile terminal is in a locked state;
verifying whether the verification information is matched with the mobile terminal information;
and unlocking the intelligent mobile terminal when the verification information is matched with the mobile terminal information.
3. The AI recognition based intelligent mobile terminal identity authentication method of claim 2,
and the mobile terminal information of the intelligent mobile terminal is mobile terminal hardware information.
4. The AI recognition based intelligent mobile terminal identity authentication method of claim 2,
the mobile terminal information of the intelligent mobile terminal is a random password.
5. The AI recognition based intelligent mobile terminal identity authentication method of claim 4,
before the obtaining of the mobile terminal information of the intelligent mobile terminal, the method for authenticating the identity of the intelligent mobile terminal based on AI identification further includes:
and generating the random password.
6. The AI recognition based intelligent mobile terminal identity authentication method of claim 2,
the specific method for acquiring the verification information of the verification article comprises the following steps:
and carrying out AI training on the verification object through the intelligent mobile terminal to obtain the verification information.
7. The AI recognition based intelligent mobile terminal identity authentication method of claim 2,
the authentication article comprises a three-dimensional object and/or a two-dimensional pattern.
8. The AI recognition based intelligent mobile terminal identity authentication method of claim 7,
the two-dimensional pattern is a tattoo.
9. The AI recognition based intelligent mobile terminal identity authentication method of claim 2,
the specific method for acquiring the verification information of the verified article in the unlocking state of the intelligent mobile terminal comprises the following steps:
sequentially acquiring the verification information of a plurality of verification articles according to a preset sequence;
the specific method for acquiring the verification information of the verification object in the locked state at the intelligent mobile terminal comprises the following steps:
and sequentially acquiring the verification information of a plurality of verification articles according to a preset sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111592076.4A CN114282192A (en) | 2021-12-23 | 2021-12-23 | AI identification-based intelligent mobile terminal identity authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111592076.4A CN114282192A (en) | 2021-12-23 | 2021-12-23 | AI identification-based intelligent mobile terminal identity authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114282192A true CN114282192A (en) | 2022-04-05 |
Family
ID=80874720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111592076.4A Pending CN114282192A (en) | 2021-12-23 | 2021-12-23 | AI identification-based intelligent mobile terminal identity authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114282192A (en) |
-
2021
- 2021-12-23 CN CN202111592076.4A patent/CN114282192A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101829784B1 (en) | Fingerprint authentication using stitch and cut | |
CN110506275B (en) | Method for fingerprint authentication by using force value | |
CN104156651B (en) | Access control method and device for terminal | |
CN104756135B (en) | System and method for biological characteristic validation relevant to the equipment equipped with camera | |
US20160132711A1 (en) | Creating templates for fingerprint authentication | |
US20130004033A1 (en) | Authentication system, method for authenticating an object, apparatus for producing an identication device, method for producing an identification device | |
WO2022051133A2 (en) | Biometric recognition and security system | |
Ibrahim et al. | Performance analysis of biometric recognition modalities | |
CN110443146A (en) | Auth method, device, equipment and readable medium based on bio-identification | |
CN107958211A (en) | A kind of palm grain identification method based on matrix conversion | |
CN105447369B (en) | A kind of method and mobile terminal for opening application based on iris feature | |
CN114282192A (en) | AI identification-based intelligent mobile terminal identity authentication method | |
Soares et al. | A self banking biometric machine with fake detection applied to fingerprint and iris along with GSM technology for OTP | |
Liu et al. | The research and design of an efficient verification system based on biometrics | |
US20150100493A1 (en) | EyeWatch credit card fraud prevention system | |
CN111478875A (en) | Block chain-based biological sign mixed mode authentication method and system | |
US10867022B2 (en) | Method and apparatus for providing authentication using voice and facial data | |
Li et al. | The evolution of biometrics | |
CN104134025B (en) | Mobile terminal locking method, device and mobile terminal based on SIM card | |
Mitra et al. | ◾ Overview of Biometric Authentication | |
Valisireddy et al. | Fingerprint recognition based on biometric cryptosystem | |
JP2007011710A (en) | Authentication device and authentication method | |
JP2008059408A (en) | Facial image collating device, and facial image authentication system and vein image identification device using it | |
Patil et al. | Iris recognition using fuzzy system | |
CN110012034B (en) | Biological characteristic authentication method with privacy protection function in cloud environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |