METHOD AND DEVICE FOR IDENTITY AUTHENTICATION
First Claim
1. A computer-implemented method, comprising:
- retrieving stored fingerprint information for a user including a plurality of recorded fingerprints for the user, each recorded fingerprint associated with a different finger of the user;
selecting a subset of the recorded fingerprints to be used to authenticate the user;
prompting the user to provide fingerprint information corresponding to each finger associated with a recorded fingerprint in the selected subset;
in response to prompting the user, receiving user-provided fingerprint information from the user;
matching the user-provided fingerprint information against the selected subset of the recorded fingerprints; and
determining that an identity authentication of the user succeeds when the user-provided fingerprint information matches the selected subset of the recorded fingerprints.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure discloses a method and device for identity authentication. One example method includes retrieving stored fingerprint information for a user including a plurality of recorded fingerprints for the user, each recorded fingerprint associated with a different finger of the user; selecting a subset of the recorded fingerprints to be used to authenticate the user; prompting the user to provide fingerprint information corresponding to each finger associated with a recorded fingerprint in the selected subset; in response to prompting the user, receiving user-provided fingerprint information from the user; matching the user-provided fingerprint information against the selected subset of the recorded fingerprints; and determining that an identity authentication of the user succeeds when the user-provided fingerprint information matches the selected subset of the recorded fingerprints.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
retrieving stored fingerprint information for a user including a plurality of recorded fingerprints for the user, each recorded fingerprint associated with a different finger of the user; selecting a subset of the recorded fingerprints to be used to authenticate the user; prompting the user to provide fingerprint information corresponding to each finger associated with a recorded fingerprint in the selected subset; in response to prompting the user, receiving user-provided fingerprint information from the user; matching the user-provided fingerprint information against the selected subset of the recorded fingerprints; and determining that an identity authentication of the user succeeds when the user-provided fingerprint information matches the selected subset of the recorded fingerprints. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium coupled to one or more computers and configured with instructions executable by the one or more computers to:
-
retrieve stored fingerprint information for a user including a plurality of recorded fingerprints for the user, each recorded fingerprint associated with a different finger of the user; select a subset of the recorded fingerprints to be used to authenticate the user; prompt the user to provide fingerprint information corresponding to each finger associated with a recorded fingerprint in the selected subset; in response to prompting the user, receive user-provided fingerprint information from the user; match the user-provided fingerprint information against the selected subset of the recorded fingerprints; and determine that an identity authentication of the user succeeds when the user-provided fingerprint information matches the selected subset of the recorded fingerprints. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
one or more computers; and one or more computer-readable memories coupled to the one or more computers and configured with instructions executable by the one or more computers to; retrieve stored fingerprint information for a user including a plurality of recorded fingerprints for the user, each recorded fingerprint associated with a different finger of the user; select a subset of the recorded fingerprints to be used to authenticate the user; prompt the user to provide fingerprint information corresponding to each finger associated with a recorded fingerprint in the selected subset; in response to prompting the user, receive user-provided fingerprint information from the user; match the user-provided fingerprint information against the selected subset of the recorded fingerprints; and determine that an identity authentication of the user succeeds when the user-provided fingerprint information matches the selected subset of the recorded fingerprints. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification