Identity verification method, apparatus and system

An identity verification method and identity verification technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve problems such as illegal user identity, low security, and failed verification, so as to increase complexity, Effects of improving safety and increasing difficulty

Active Publication Date: 2015-10-07
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In these existing authentication schemes, it is generally necessary to save the password or fingerprint entered by the user in advance as sample data, and then obtain the password or fingerprint entered by the user in the authentication stage, and store the password or fingerprint entered by the user. Match the password or fingerprint sample data entered in advance. If they match, the user's identity is determined to be legal and the verification is passed. Otherwise, if it does not match, the user's identity is invalid and the verification fails.
[0003] In the process of research and practice of the prior art, the inventor of the present invention found that the security of the existing scheme is not high, for example, once the password or fingerprint data is stolen by an illegal intruder, the illegal intruder can easily Stealing the information and data in its account, the information security cannot be guaranteed, and the effect of identity verification is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, apparatus and system
  • Identity verification method, apparatus and system
  • Identity verification method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment will be described from the perspective of an identity verification device. The identity verification device may specifically be a device such as a terminal or a server, wherein the terminal may specifically be a device such as a mobile phone, a tablet computer, or a personal computer (PC, Personal Computer).

[0032] An identity verification method, comprising: obtaining a data processing request; obtaining identity verification information according to the data processing request, the identity verification information including image information, sound information, and associated information between the image information and sound information; judging the Whether the identity verification information matches the preset information sample; if yes, pass the data processing request; if not, reject the data processing request.

[0033] Such as Figure 1a As shown, the specific process of the authentication method can be as follows:

[0034] 101. Obtain a da...

Embodiment 2

[0079] In this embodiment, description will be made by taking that the identity verification device is specifically a server as an example.

[0080] see Figure 2a , the communication system to which the identity verification method is applied may include a server and a terminal, specifically as follows:

[0081] (1) terminal;

[0082] The terminal is configured to send a data processing request to the server, and obtain identity verification information after receiving the identity information acquisition request sent by the server, and send the identity verification information to the server.

[0083] Wherein, the identity verification information includes information such as image information, sound information, and associated information between the image information and sound information.

[0084] Wherein, the association information between image information and sound information refers to the positional relationship and / or temporal relationship between the image in th...

Embodiment 3

[0112] In this embodiment, an example will be described in which the identity verification device is specifically a terminal, and the data processing request is specifically a terminal application start request.

[0113] Such as image 3 As shown, an authentication method, the specific process can be as follows:

[0114] 301. The terminal receives a terminal application launch request triggered by a user, for example, may instruct to open a certain terminal application, such as a photo album or a personal document, and so on.

[0115] 302. After receiving the terminal application startup request, the terminal generates and displays prompt information according to the terminal application startup request, wherein the prompt information instructs the user to take a video, or take a series of pictures and record a sound respectively, and receive the user's The prompt information indicates the recorded video, or pictures and information to obtain identity verification information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention disclose an identity verification method, apparatus and system. The method provided by one embodiment of the invention comprises obtaining a data processing request and obtaining identity verification information according to the data processing request, wherein the identify verification information comprises image information, sound information, and association information of the image information and the sound information; determining whether the identify verification information matches a preset information sample, in case of a match, approving the data processing request, and otherwise, in case of a mismatch, rejecting the data processing request. The scheme provided by the invention can enhance the identify verification effect and greatly improves the information security.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity verification method, device and system. Background technique [0002] With the development of Internet technology, information security has attracted more and more attention from all parties. In order to ensure information security, many identity verification schemes have been proposed in the prior art, such as password-based identity verification schemes, fingerprint-based identity verification schemes, or mobile phone binding-based identity verification schemes, and so on. In these existing authentication schemes, it is generally necessary to save the password or fingerprint entered by the user in advance as sample data, and then obtain the password or fingerprint entered by the user in the authentication stage, and store the password or fingerprint entered by the user. Match with the pre-entered password or fingerprint sample data. If they match, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 陈敏浩涂杰王玉叶陈辉陈荣郑兴
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products