Authentication method, device and system
An identity verification method and identity verification technology, applied in the fields of identity verification methods, devices and systems, can solve the problems of legitimate users' personal privacy or property security threats, potential safety hazards, lack of interactive linkage, etc., to make up for limitations and improve security , the effect of increased hardware support
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0047] Figure 4 It is a flowchart of the identity verification method provided by the first embodiment of the present invention. The identity verification method provided in this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Figure 4 As shown, the method includes:
[0048] Step S11: When a service processing request sent by a terminal device is received, at least one first shooting parameter is issued to the terminal device, so that the terminal device controls the shooting device to collect the user’s information for identity verification according to the first shooting parameter. Face image
[0049] The server 200 receives a service processing request sent by the terminal device 100, and the service processing request may include: the service identifier of the service to be processed and the account number of the terminal device 100. Among them, the account of the terminal device 100 is preferably a user ...
no. 2 example
[0063] Figure 5 It is a flowchart of the identity verification method provided by the second embodiment of the present invention. The identity verification method provided in this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Figure 5 As shown, the method includes:
[0064] Step S21: When a service processing request sent by a terminal device is received, at least one shooting parameter is randomly determined from the candidate shooting parameters, and is sent to the terminal device as the first shooting parameter, so that the terminal device controls the shooting device according to the first shooting parameter. A photographing parameter collection of the face image of the user for identity verification;
[0065] The service processing request may include: the service identifier of the service to be processed and the account number of the terminal device 100. Among them, the account of the terminal device ...
no. 3 example
[0096] Image 6 It is a flowchart of the identity verification method provided by the third embodiment of the present invention. The identity verification method provided in this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Image 6 As shown, the method includes:
[0097] Step S31: When the service processing request sent by the terminal device is received, the model of the terminal device is obtained, and at least one shooting parameter corresponding to the model is obtained according to the model, and is sent to the terminal device as the first shooting parameter, so that the terminal device controls The photographing device collects the face image of the user for identity verification according to the first photographing parameter;
[0098] The service processing request sent by the terminal device 100 may include: the service identifier of the service to be processed and the account number of the terminal...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com