Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and system based on identity authentication

A data processing system and identity verification technology, applied in transmission systems, electrical components, etc., can solve the problems of user churn, high user churn rate, and slow data review efficiency.

Inactive Publication Date: 2015-10-21
SHENZHEN THINKIVE INFORMATION TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Real-time online video recording has extremely high requirements on the customer's network. If the network signal is unstable, the customer's video recording will fail, and the customer needs to re-record the video. The authentication operation is complicated and the user experience is poor.
[0007] 2. In the peak hours of business processing, in the real-time online video link, users need to conduct online video with financial company business personnel. Customers may need to wait in line for a long time to connect to the video. The identity verification operation is complicated and the loss of users is serious.
[0008] 3. In order to meet the 7*24 hours concept of the Internet, regardless of whether the business is in peak hours or not, financial companies need to assign special personnel to be responsible for video verification and audit work. The identity verification operation is complicated and the operation and maintenance costs are high
[0009] 4. With more and more businesses and users, the efficiency of data review will become slower and slower, with high cost and low efficiency
[0010] 5. Due to the need for video and other operations, users must download related APPs and controls for video verification. The identity verification operation is complicated and the user experience is poor, resulting in a high user loss rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and system based on identity authentication
  • Data processing method and system based on identity authentication
  • Data processing method and system based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be implemented in many other ways different from those described here, and those skilled in the art can make similar improvements without departing from the connotation of the present invention, so the present invention is not limited by the specific implementations disclosed below.

[0037] In one embodiment, a data processing method based on identity verification includes the following steps: sending imitation information; collecting photos of feedback actions made by users according to the imitation information; comparing the imitation information with the photos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and system based on identity authentication. The data processing method based on identity authentication comprises the following steps of: sending imitating information; acquiring a picture of feedback motion given by a user according to the imitating information; matching the imitating information with the picture and outputting a matched result used for authenticating an identity. The data processing method based on identity authentication compares the sent imitating information with the acquired picture of the feedback motion given by the user according to the imitating information in order to authenticate the identity of the user, and has advantages of reliable data transmission, simple authentication operation, and high authentication efficiency compared with conventional double-line video and single-line video authentication methods.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data processing method and system based on identity verification. Background technique [0002] When the financial industry transforms offline traditional businesses into the Internet, in order to ensure the safety of users’ personal information and property, technologies such as two-way video and one-way video are generally used to verify the user’s true identity and personal wishes and retain relevant image information. [0003] Two-way video: business personnel conduct real-time, two-way online voice and video with users through video, and compare the obtained user information with the user in the video to confirm whether the customer is the person applying for the business, and then through question and answer To confirm the user's true wishes in order to conduct related business on the Internet. [0004] One-way video: Users can self-record and upload random acti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0861
Inventor 罗大锋
Owner SHENZHEN THINKIVE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products