Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity verification method and device

An identity verification and security level technology, applied in the field of communications, can solve the problems of reducing operational efficiency, financial risks in financial operations, inflexible identity verification methods, etc. Effect

Active Publication Date: 2017-11-28
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, for an application software, if the application software adopts a complex identity verification method, in an environment with high security, the user's complex and cumbersome financial operations will reduce the operation efficiency; if the application software adopts a simple If the identity verification method is not used, in an environment with low security, the user's financial operations will have financial risks; the above two situations make the existing identity verification method inflexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device
  • Identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] figure 1 It is a flow chart of the identity verification method provided by the embodiment of the present invention. Embodiments of the present invention aim at the inflexibility of existing identity verification methods, and select different identity verification methods according to the different environments where the mobile terminal is located, so as to implement identity verification for the operator. The specific steps of the identity verification method are as follows:

[0019] Step S101, acquiring the environment information of the environment where the mobile terminal is located;

[0020] Acquire the environmental information of the environment where the mobile terminal is located. The environmental information may specifically be the geographic location information of the mobile terminal, or the geographic location information and network environment information of the mobile terminal. In the embodiment of the present invention, the geographic location informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides an identity verification method and device. The method includes: acquiring the environment information of the environment where the mobile terminal is located; judging the security level of the environment where the mobile terminal is located according to the environment information; determining an identity verification method according to the security level, and using the identity verification method to The operator implements authentication. In the embodiment of the present invention, by judging the physical location of the mobile terminal and the security level of the WiFi network connected to the mobile terminal, for different security levels, the application software on the mobile terminal adopts different identity verification methods, so that the mobile terminal is more secure In a high-end environment, the use of a simple identity verification method improves the user's operational efficiency. In a low-security environment, a complex identity verification method is used to avoid financial risks in financial operations. Compared with mobile terminals, no matter In any environment, the application software adopts a single identity verification method, which improves the flexibility of identity verification.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to an identity verification method and device. Background technique [0002] With the rapid development of mobile terminals, the types and quantities of mobile terminal application software are also increasing. The application software closely related to life includes banking software, payment software, and wealth management software. Users only need to use mobile terminals. Transfer, payment, wealth management and other financial operations. [0003] When users perform financial operations such as transfer, payment, and wealth management through mobile terminals, it also brings certain financial risks, such as the leakage of user's financial information, theft of financial accounts, and theft of account funds. In order to improve the financial operation of mobile terminals In order to improve the security of the identity verification, financ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W4/02
Inventor 曹万鹏严斌峰
Owner CHINA UNITED NETWORK COMM GRP CO LTD