Authentication method, system and mobile terminal

A mobile terminal and identity verification technology, applied in the field of communication, can solve the problems of poor mobility, the limitation of the number of processing objects cannot meet the actual needs, and the identity verification system cannot be used flexibly, so as to achieve a good user experience and strong data. The effect of processing power

Inactive Publication Date: 2015-07-01
BEIJING ZHUOSHI SHUYUN TECH CO LTD
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these devices have poor mobility and require the user to be in a specific location to complete the photo and then achieve identity verification
Therefore, this authentication system cannot be used flexibly, especially when users are located in different places, so it brings great troubles to users
[0003] On the other hand, because the existing identity verification system is based on fixed equipment, its processing capacity is limited, and it usually can only support the identity verification of hundreds or thousands of users. For example, the existing face recognition sign-in system
This limitation on the number of processing objects is difficult to meet the actual needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, system and mobile terminal
  • Authentication method, system and mobile terminal
  • Authentication method, system and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In the following description, numerous details are provided in order to provide a thorough understanding of the invention. However, it will be appreciated by those skilled in the art that the following description relates only to preferred embodiments of the invention and that the invention may be practiced without one or more of these details. In addition, in order to avoid confusion with the present invention, some technical features known in the art are not described.

[0058]With the development of smart mobile devices, more and more people have mobile terminals, such as smart phones, Notes and Pads. On the one hand, the portability of mobile devices has brought great convenience to people's lives; on the other hand, mobile devices have been equipped with powerful cameras; on the other hand, communication networks 3G and 4G are also developing rapidly, and the Camera applications have technical support. In addition, with the development of cloud computing, system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method, system and mobile terminal. The authentication method includes the steps that user registration information is received, and the user registration information comprises user identity information and a reference picture; user log-in information from the mobile terminal is received, and the user log-in information comprises user identity information and a verification picture; the reference picture in the corresponding user registration information is search for according to the user identity information in the user log-in information; the verification picture in the user log-in information is compared with the found reference picture in the corresponding user registration information; identity judgment is conducted, that is, whether the identity of a registration user is consistent with the identity of the log-in user or not is judged according to the picture comparison result, wherein the reference picture and the verification picture are one or more of a human face picture, a fingerprint picture and an eye iris picture.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a method, system and mobile terminal for identity verification. Background technique [0002] At present, identity verification applications are mainly implemented by desktop computers or special equipment. However, these devices have poor mobility and require the user to be in a specific location to complete the photo and then achieve identity verification. Therefore, this authentication system cannot be used flexibly, especially when the users are located in different places, so it brings great troubles to the users. [0003] On the other hand, because the existing identity verification systems are based on fixed devices, their processing capabilities are limited, and they usually can only support the identity verification of hundreds or thousands of users, such as the existing face recognition sign-in system. This limitation on the number of processing objects is difficult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
Inventor 廖文浩罗维白玮董大伟
Owner BEIJING ZHUOSHI SHUYUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products