Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and apparatus

An identity authentication and to-be-authenticated technology, applied in the field of network communication, can solve the problems of inability to determine users and low credibility of identity authentication results, and achieve the effect of improving credibility

Active Publication Date: 2016-05-04
ADVANCED NEW TECH CO LTD
View PDF8 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, through the above identity authentication methods provided by the prior art, it can only be determined whether the user's credential information is legal, but it cannot be determined whether the user who entered the credential information is the legal holder of the credential
Therefore, through the identity authentication method provided by the prior art, the credibility of the identity authentication result obtained is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and apparatus
  • Identity authentication method and apparatus
  • Identity authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In the prior art, the server authenticates the user's identity by verifying the user's credential information. Due to the verification result obtained from the verification of the credential information, it is impossible to determine whether the user who entered the credential information is the legal holder of the credential. the person himself. Considering that in actual application scenarios, both the user's biometric information and certificate information can prove the user's legal identity, and the corresponding relationship between biometric information and certificate information is unique, therefore, this application obtains the pending Authenticate the biometric information and certificate information, and obtain the pre-stored biometric information corresponding to the certificate information, and judge whether the biometric information to be authenticated matches the pre-stored biometric information. If so, it means that the current user who provided the cert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an identity authentication method and an apparatus used for improving the credibility of identity authentication for users. The method includes: obtaining to-be-authenticated biological characteristic information acquired by a terminal and certificate information sent by the terminal; obtaining pre-stored biological characteristic information corresponding to the certificate information; determining whether the to-be-authenticated biological characteristic information and the pre-stored biological characteristic information are matched, determining passing of the identity authentication if yes, and determining not passing of the identity authentication if not. Therefore, the credibility of the identity authentication for the users can be effectively improved.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to an identity authentication method and device. Background technique [0002] With the continuous development of Internet technology, more and more users choose to operate on web pages and obtain various services provided by service providers. For example, the user can obtain services provided by the service provider such as account registration, account login, account activation, and account cancellation by operating the account on the webpage. [0003] In practical applications, in order to prevent legitimate users from being intercepted by illegal users, service providers need to authenticate the current user's identity through the server before providing various services to users. The user provides the corresponding service, otherwise, refuse to provide the corresponding service for the user. [0004] In the prior art, the server mainly authenticates t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/32G06K9/00G06K9/20
CPCH04L9/32H04L63/0861G06F21/32H04L9/321H04L9/3231G06V40/168
Inventor 冯江赵磊唐宏
Owner ADVANCED NEW TECH CO LTD