Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity verification method, device and system based on smart tattoo equipment

An identity verification method and tattoo technology, applied in the computer field, can solve problems such as the inability to guarantee the reliability of user identity, low system security, and easy cracking of identity verification technology

Active Publication Date: 2019-05-24
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides an identity verification method, device and system based on smart tattoo equipment, to at least solve the problem that the identity verification technology provided by the related technology is easy to be cracked, and the reliability of the user identity cannot be guaranteed, resulting in low system security. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and system based on smart tattoo equipment
  • Identity verification method, device and system based on smart tattoo equipment
  • Identity verification method, device and system based on smart tattoo equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Before describing further details of the various embodiments of the present application, reference will be made to figure 1 to describe one suitable computing architecture that can be used to implement the principles of the present application. In the following description, unless indicated otherwise, various embodiments of the present application are described with reference to acts and symbolic representations of operations that are performed by one or more computers. It will thus be appreciated that such acts and operations, which are sometimes referred to as computer-implemented, include the manipulation of electrical signals representing data in a structured form by the processing unit of a computer. This manipulation transforms the data or maintains it at a location in the computer's memory system, which reconfigures or changes the operation of the computer in a manner well understood by those skilled in the art. A data structure that maintains data is a physical...

Embodiment approach

[0046] Method 1: In the application scenario where the server saves the corresponding relationship between the user identity of the terminal device and the smart tattoo logo of the smart tattoo device, such as figure 2 As shown, the system can perform the function of the terminal device obtaining the security verification result according to the smart tattoo information and determining whether to execute the security operation corresponding to the security operation instruction through the following implementation methods:

[0047] First, the terminal device sends the smart tattoo information and safety operation instructions to the server. Preferably, before this step is performed, the terminal device collects the smart tattoo information of the smart tattoo device, and the collection methods may include: network transmission, device scanning, user input, and the like. Among them, the security operation instructions may be sensitive operations involving password modification...

Embodiment 2

[0060] According to an embodiment of the present invention, a method embodiment for implementing the above-mentioned system embodiment is also provided. It should be noted that the steps shown in the flow charts of the drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0061] image 3 It is a schematic flowchart of an identity verification method based on a smart tattoo device according to Embodiment 2 of the present invention. The methods provided in the foregoing embodiments of the present application may be run on the terminal device 30 . Such as image 3 As shown, the identity verification method based on the smart tattoo device may include the following implementation steps:

[0062] Step S30, can use figure 1 The terminal device 30 in the searc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method, device and system based on intelligent tattooing equipment. The method comprises the steps: terminal equipment finds the intelligent tattooing equipment bound with the terminal equipment, wherein the binding of the terminal equipment with the intelligent tattooing equipment is achieved through the corresponding relation between user identity verification of the terminal equipment and intelligent tattoo identification of the intelligent tattooing equipment; terminal equipment collects intelligent tattoo information transmitted by the intelligent tattooing equipment; terminal equipment obtains safety verification results according to the intelligent tattoo information, determines whether safety operation corresponding to a safety operation instruction sent by the terminal equipment is carried out or not, and carrying out the safety operation corresponding to the safety operation instruction when the safety verification results are that the intelligent tattoo information passes the verification. According to the invention, the method solves a technical problem of low system safety caused by that the technology of identification provided by related technologies is liable to be cracked and the reliability of user identities cannot be guaranteed.

Description

technical field [0001] The present invention relates to the field of computers, in particular to an identity verification method, device and system based on intelligent tattoo equipment. Background technique [0002] With various computer terminal applications, especially in instant messaging, social platforms, online games and other systems, the application functions are becoming more and more abundant. Various operations in the system, especially the security issues related to user interaction with key information It has become increasingly prominent, for example, security issues such as stolen system user accounts, intercepted virtual property behaviors, and stolen password modification behaviors are rampant, and various network assets of users are increasingly threatened. [0003] The prior art can use identity verification technology to solve the above problems. The identity verification technology mainly includes two links: identity registration and identity authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/32H04L12/58
CPCG06F21/32H04L9/3231H04L63/0861
Inventor 王小叶郭计伟秦雷林陆一
Owner TENCENT TECH (SHENZHEN) CO LTD