Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Personal information sharing system, personal information sharing method and identity authentication method thereof

An identity authentication and information sharing technology, applied in the field of personal information sharing systems, can solve the problems of fraud, verification, and inability to carry out personal identity, and achieve the effect of improving security and reducing workload.

Active Publication Date: 2018-09-18
张文
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although someone from Tencent specializes in dealing with such incidents and immediately freezes the account of members who use QQ or WeChat to engage in fraudulent or illegal activities, however, since QQ and WeChat are virtual networks, personal identity verification cannot be carried out, so you freeze his account. I applied to open an account again, and continued to carry out fraudulent activities without changing my profile picture and nickname; and although the dating site also accepted complaints from everyone, it put some marriage trustees, wine trustees, pyramid sales personnel, futures salespersons, insurance, commodity salesmen's The ID number is frozen. After the ID number of some illegal members is blocked, they change to a new ID and start cheating on the matchmaking network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal information sharing system, personal information sharing method and identity authentication method thereof
  • Personal information sharing system, personal information sharing method and identity authentication method thereof
  • Personal information sharing system, personal information sharing method and identity authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Embodiments of the present invention will now be described with reference to the drawings, in which like reference numerals represent like elements.

[0072] Please refer to Figure 1 to Figure 2 , the present invention provides a personal identity authentication method for a personal identity authentication system, the method includes a network authentication method and a face-to-face authentication method, wherein the personal identity authentication system corresponds to a website and an identity authentication server, wherein the network authentication method is as figure 1 shown, including the following steps:

[0073] Step S101, the user enters personal data on the website of the personal identity authentication system, and selects the network authentication method of the personal data; wherein the personal data includes the user's ID card number, telephone number, account address, marital status, photos and other information, and the network Authentication metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personal information sharing system which comprises a personal identity authentication system, a social contact application server and a financing institution server. The social contact application server and the financing institution server are related to the personal identity authentication system. The personal identity authentication system comprises a member information storing module, a big data collecting module, a social contact application autonym authentication module and an online account opening module, wherein the social contact application autonym authentication module can receive autonym authentication requests from the social contact application server and feed personal information back to carry out autonym authentication, the online account opening module can send account opening requests to the financing institution server, and the financing institution server can inquire personal information stored in the member information storing module or an opened account organization, confirm the member identities and duplicate the personal information to finish online account opening. Compared with the prior art, the personal information sharing system achieves autonym authentication and online account opening of social contact application accounts, improves social contact safety and reduces the work amount of workers of an account opening organization. The invention further discloses a personal information sharing method and a personal information authentication method.

Description

technical field [0001] The present invention relates to the technical field of network security, and more specifically relates to a personal information sharing system, a personal information sharing method and an identity authentication method thereof. Background technique [0002] At present, the world has entered the network world, and people can conduct banking transactions online, shop online, and date and make friends online. However, because the Internet is a virtual world, many lawbreakers take advantage of this feature to carry out online fraud activities. Various illegal activities such as fraud, fraudulent brushing, and malicious marketing are constantly endangering the security of the Internet. A huge black industrial chain has been formed. . [0003] Among them, the fraudulent activities of QQ, WeChat, and dating websites are the most serious in social networks. In China, a fraud profession has been formed, and millions of criminals use QQ, WeChat, and dating w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 张文
Owner 张文
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products