Real-name authentication method based on WeChat public number and system
A WeChat official account and real-name authentication technology, applied in character and pattern recognition, instruments, computer components, etc., can solve the problem of weak prevention
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] figure 1 It shows a schematic structural diagram of a WeChat official account-based real-name authentication system in this embodiment. It can be seen from the figure that the system includes a WeChat server 100, a citizen ID card data storage server 200 of the Ministry of Public Security and a user identity verification platform Server 300. Wherein, the user identity verification platform server 300 may include:
[0040] The first ID card information acquisition module 301 is used to obtain the user's WeChat ID card photo information through the WeChat public account entry of the WeChat server, and extract the first ID card key information of the user's WeChat ID card photo information;
[0041] The second ID card information acquisition module 302 is used to obtain the user corresponding to the ID card number from the citizen ID card database of the citizen ID card data storage server of the Ministry of Public Security according to the ID card number in the key infor...
Embodiment 2
[0044] figure 2 It shows a schematic structural diagram of a WeChat official account-based real-name authentication system provided in this embodiment. It can be seen from the figure that the system is figure 1 On the basis of the system shown in , the WeChat server 100 includes:
[0045]The active head portrait collection module 101 is used to collect N active head portraits of the user, and send the N active head portraits to the user identity verification platform server 300; wherein, N is a positive integer, and N≥2;
[0046] The user identity verification platform server also includes:
[0047] The second identity verification module 304 is used to verify the identity of the user again when the key information of the first ID card is consistent with the key information of the second ID card; the verification method is:
[0048] The N active head portraits are compared in pairs to determine whether the N active head portraits belong to the same user, if so, the user ide...
Embodiment 3
[0052] image 3 Shows that in this example based on figure 1 A flow chart of a real-name authentication method based on the WeChat official account of the system shown in , as can be seen from the figure, the method may include the following steps:
[0053] Step S101: Obtain the ID card photo information of the user through the WeChat official account entry, and extract the first ID card key information of the user's ID card photo information;
[0054] In this step, the ID card photo information of the user who needs to perform real-name authentication is first obtained from the WeChat public account entry of the WeChat server.
[0055] There are two ways to obtain the user’s ID card photo information through the entrance of the WeChat official account. One is to take a photo of the user’s ID card by calling the camera interface provided by the WeChat official account (need to obtain the corresponding authority of the user’s WeChat official account). One is to obtain the ID ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
