Identity verification method, device and system based on smart tattoo equipment
An identity verification method and tattoo technology, applied in the computer field, can solve problems such as the inability to guarantee the reliability of user identity, low system security, and easy cracking of identity verification technology
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] Before describing further details of the various embodiments of the present application, reference will be made to figure 1 to describe one suitable computing architecture that can be used to implement the principles of the present application. In the following description, unless indicated otherwise, various embodiments of the present application are described with reference to acts and symbolic representations of operations that are performed by one or more computers. It will thus be appreciated that such acts and operations, which are sometimes referred to as computer-implemented, include the manipulation of electrical signals representing data in a structured form by the processing unit of a computer. This manipulation transforms the data or maintains it at a location in the computer's memory system, which reconfigures or changes the operation of the computer in a manner well understood by those skilled in the art. A data structure that maintains data is a physical...
Embodiment approach
[0046] Method 1: In the application scenario where the server saves the corresponding relationship between the user identity of the terminal device and the smart tattoo logo of the smart tattoo device, such as figure 2 As shown, the system can perform the function of the terminal device obtaining the security verification result according to the smart tattoo information and determining whether to execute the security operation corresponding to the security operation instruction through the following implementation methods:
[0047] First, the terminal device sends the smart tattoo information and safety operation instructions to the server. Preferably, before this step is performed, the terminal device collects the smart tattoo information of the smart tattoo device, and the collection methods may include: network transmission, device scanning, user input, and the like. Among them, the security operation instructions may be sensitive operations involving password modification...
Embodiment 2
[0060] According to an embodiment of the present invention, a method embodiment for implementing the above-mentioned system embodiment is also provided. It should be noted that the steps shown in the flow charts of the drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0061] image 3 It is a schematic flowchart of an identity verification method based on a smart tattoo device according to Embodiment 2 of the present invention. The methods provided in the foregoing embodiments of the present application may be run on the terminal device 30 . Such as image 3 As shown, the identity verification method based on the smart tattoo device may include the following implementation steps:
[0062] Step S30, can use figure 1 The terminal device 30 in the searc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


