Identity authentication method, cloud service system and cloud server based on cloud server-side

A cloud server and identity authentication technology, which is applied in the field of cloud service systems and cloud servers, can solve problems such as difficulty in identifying the identity of the calling party, loss of user property, and ignorance of the user, so as to prevent phone fraud, ensure personal and property safety, and improve Effects of Efficiency and Accuracy

Active Publication Date: 2013-04-03
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When the user is talking, it is difficult to confirm the identity of the other party. The user can only judge whether it is an illegal number by matching the number stored in the mobile terminal or checking the legitimacy of the number online, but the mobile terminal number matching can only know whether it is an unfamiliar number. The number does not know the identity of the other party, and the legitimacy of the online query number is only for the specific number, and the identity of the other party cannot be judged. This makes the user do not know wh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, cloud service system and cloud server based on cloud server-side
  • Identity authentication method, cloud service system and cloud server based on cloud server-side
  • Identity authentication method, cloud service system and cloud server based on cloud server-side

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] The embodiments of the present invention will be described in detail below. Examples of the embodiments are shown in the accompanying drawings, wherein the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the drawings are exemplary, and are only used to explain the present invention, but should not be understood as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents falling within the scope of the spirit and connotation of the appended claims.

[0024] In the description of the present invention, it should be understood that the terms "first", "second", etc. are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance. In the description of the present invention, it should be noted that the terms "connected" and "con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and system and a cloud server based on a cloud server-side. The method comprises the following steps: the cloud server builds an audio/video database; the cloud server receives audio/video sample data and identity authentication request sent by a mobile terminal; the cloud server performs comparative analysis on the audio/video sample data and an audio/video data source stored in the audio/video database according to the identity authentication request so as to determine identity of an affiliation side of the audio/video sample data; and the cloud server enables results for identity authentication to be returned to the mobile terminal. According to the method, phone fraud behaviors are effectively avoided, users' personal and property safety is guaranteed, the superstrong storage capability and data handling capability of the cloud server are fully utilized to perform identity authentication, and efficiency and accuracy for identity authentication are improved.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to an identity authentication method based on a cloud server, a cloud service system and a cloud server. Background technique [0002] When the user is talking, it is difficult to confirm the identity of the other party. The user can only judge whether it is an illegal number by matching the number stored in the mobile terminal or checking the legitimacy of the number online, but the mobile terminal number matching can only know whether it is an unfamiliar number. The number does not know the identity of the other party, and the legitimacy of the online query number is only for the specific number, and the identity of the other party cannot be judged. This makes the user do not know who the user is when the user's friend uses other numbers to contact the user, and sometimes Can cause a lot of users to be cheated by others in the name of friend, company or bank etc. on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘弟新
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products