Method and device for real name authentication of identity

A technology of real-name authentication and identity, applied in the field of identity authentication, can solve the problem of unable to prevent identity theft and other issues

Active Publication Date: 2016-08-17
王绪胜
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The main purpose of the present invention is to provide a method and device for identity real-name authentication, to at least solve the problem in the related art that identity theft cannot be prevented

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for real name authentication of identity
  • Method and device for real name authentication of identity
  • Method and device for real name authentication of identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0028] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0029] It should be noted that the terms "first" and "second" in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for the real name authentication of an identity. The method for the real name authentication of the identity comprises the following steps of forwarding identity identification data which are used for identifying a target object and having uniqueness to an identity identification verifying party, wherein the target object is a to-be-validated object, and the identity identification verifying party is used for verifying whether the identity identification data are valid or not; when the identity identification verifying party verifies the identity identification data to be valid, inquiring the identity verification data of the target object in an identity verification database according to the identity identification data; generating a first problem set corresponding to the identity verification data according to the identity verification data; obtaining answers of problems in the first problem set, and carrying out verification on the answers of the problems in the first problem set, so as to obtain a verification result; when the verification result accords with a preset condition, determining that an identity data submitting party is the target object. Through the method and the device for the real name authentication of the identity, the effect of preventing the identity from being usurped is achieved.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to a method and device for identity real-name authentication. Background technique [0002] In an information system, an identity represents a participant in a business, and it often appears as a user ID (UserID) or a login name (Login), which may correspond to an organization, an application system, or an individual. In many cases, due to national policies, legal requirements, or the need to improve service quality, the information system must determine the specific organization or individual corresponding to the identity, and correspond the login name in the information system with the actual organization or individual. The need for identity real-name authentication should be implemented And born. [0003] At present, the information system adopts different methods for the real-name identity authentication process of institutions and individuals. The personal real-name auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31H04L29/06
CPCG06F21/31G06F2221/2117H04L63/08
Inventor 王绪胜
Owner 王绪胜
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products