Identity authentication method and apparatus
An identity authentication and to-be-authenticated technology, applied in the field of network communication, can solve the problems of inability to determine users and low credibility of identity authentication results, and achieve the effect of improving credibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] In the prior art, the server authenticates the user's identity by verifying the user's credential information. Due to the verification result obtained from the verification of the credential information, it is impossible to determine whether the user who entered the credential information is the legal holder of the credential. the person himself. Considering that in actual application scenarios, both the user's biometric information and certificate information can prove the user's legal identity, and the corresponding relationship between biometric information and certificate information is unique, therefore, this application obtains the pending Authenticate the biometric information and certificate information, and obtain the pre-stored biometric information corresponding to the certificate information, and judge whether the biometric information to be authenticated matches the pre-stored biometric information. If so, it means that the current user who provided the cert...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 