Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and identity authentication device

An identity authentication and authentication technology, applied in the computer field, can solve the problems of high cost of identity authentication, high server overhead, etc., and achieve the effect of reducing overhead and saving costs

Active Publication Date: 2016-07-20
ADVANCED NEW TECH CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] It can be seen that when the existing technology authenticates the identity, the overhead of the server is relatively large, and the cost of identity authentication is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and identity authentication device
  • Identity authentication method and identity authentication device
  • Identity authentication method and identity authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0024] S101. Obtain biometric information collected by a first terminal to be authenticated.

[0025] The biological feature information to be authenticated in the embodiment of the present application can be the user's real-time face image, video containing face image, fingerprint image, palmprint image and other physiological feature information, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and an identity authentication device, which are used for reducing overhead of identity authentication for a server. The method comprises the following steps: acquiring to-be-authenticated biological characteristic information acquired by a first terminal, sending the to-be-authenticated biological characteristic information and the preset standard biological characteristic information to a plurality of second terminals for presentation, receiving a first judgment result returned from each second terminal, wherein the first judgment result is the judgment result of judging whether the to-be-authenticated biological characteristic information is identical to the standard biological characteristic information or not by a user of the second terminal; and according to the first judgment result, judging whether the to-be-authenticated biological characteristic information passes the identity authentication or not. Since whether the to-be-authenticated biological characteristic information is identical to the standard biological characteristic information or not is judged by the user of the second terminal instead of the server, the server only needs to judge whether the to-be-authenticated biological characteristic information passes the identity authentication or not according to the first judgment result returned back by the first second terminal, obviously, overhead of identity authentication is reduced for the server.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an identity authentication method and device. Background technique [0002] With the continuous development of Internet technology, more and more users choose to operate on the webpage and obtain various services provided by the server. In order to prevent the account of a legitimate user from being intercepted by an illegal user, the server needs to authenticate the identity of the current user before providing various services to the user. [0003] In the prior art, it is often determined whether the user's identity authentication is passed by authenticating biometric information such as face images, fingerprints, and irises. [0004] The process of user identity authentication in the prior art will be described below by taking the biometric information as a face image as an example. [0005] In the existing technology, the server first identifies the face image c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 吕鲲
Owner ADVANCED NEW TECH CO LTD