Identity authentication method and system
An identity authentication and pending authentication technology, applied in the electronic field, can solve the problems of user property, information loss, different fingerprint data, and small probability of being the same, so as to reduce the probability of identification failure, simplify the operation, and ensure the effect of security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] This embodiment provides an identity authentication method.
[0029] figure 1 is a flow chart of the identity authentication method provided by this embodiment, such as figure 1 As shown, the method mainly includes the following steps S102 to S116.
[0030]Step S102, the first device establishes a communication connection with the second device.
[0031] In this embodiment, the first device may be connected in a wireless or wired manner, for example, NFC, Bluetooth, and the like.
[0032] In an optional implementation of the embodiment of the present invention, the first device can establish a communication connection with the second device through a wireless or wired connection, that is, the first device and the second device communicate through the human body (intra-bodycommunication). , IBC) to establish a link, wherein the biological limbs include but not limited to the human body. For example, the first device can be a POS machine, Alipay application and other ...
Embodiment 2
[0067] This embodiment provides an identity authentication system, which can be used to implement the method in Embodiment 1.
[0068] figure 2 A schematic diagram of the architecture of the identity authentication system provided in this embodiment, such as figure 2 As shown, the system mainly includes: a first device 100 and a background server 200 .
[0069] In this embodiment, the first device 100 is configured to: establish a communication connection with the second device; receive the data to be authenticated transmitted by the second device through the communication connection, wherein the data to be authenticated includes: digital authentication information and an identity; The biological limb enters the preset range of the first device 100, and collects the biological feature information of the biological limb; the first device 100 sends the data to be authenticated and the biological feature information to the background server 200;
[0070] The background server...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 