Supercharge Your Innovation With Domain-Expert AI Agents!

Identity security verification review method

A technology of security verification and identity authentication, applied in the fields of identity security verification and review, information and data security, it can solve the problems of low security, high access cost, adverse effects of private network security, etc., and achieve high security and convenient operation. Effect

Active Publication Date: 2019-10-11
周洋
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

4. Valuable data security in the account - if virtual value or cash balance is involved in the account, there will be security risks
[0004] The above-mentioned scheme solves the problem of verifying and checking the identity of the existing identity verification review device online to a certain extent, but at least the following problems exist in the plan: 1. Since the real-time timeliness when submitting the identity document has not been technically Restrictions, it is unavoidable to only use information such as pictures or videos containing identity information for identity verification, and it is impossible to ensure that the person who verifies the identity actually holds the identity certificate, and the security is low
2. It needs to be connected to a dedicated network such as the population information database of the Ministry of Public Security, which is likely to adversely affect the security of the dedicated network, and the access cost is high, requiring special equipment, and it is difficult to popularize and apply

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity security verification review method
  • Identity security verification review method
  • Identity security verification review method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 and 3 As shown, this identity security verification review method includes the following steps:

[0040] A. Review guidance: the background server 2 generates review guidance information and sends it to the corresponding terminal 1 to guide the user to place the verification document 4 to be verified on the terminal 1 in the form required by the review guidance information according to the review guidance information. Real-time collection of information that can be collected Area; B. Obtain real-time information: Terminal 1 collects real-time review and verification information containing the information of the document to be verified and the real-time form information of the document to be verified, and transmits the real-time review and verification information to the background server 2; C. Background review and verification: background server 2 According to the real-time review and verification information and review guidance information, verify th...

Embodiment 2

[0071] Such as figure 2 As shown, in this embodiment, the identity security verification review is performed when the specific business operation reaches the last step. At this time, the terminal 1 sends a verification request to the background server 2, and the background server 2 randomly generates the verification request after receiving the verification request from the terminal 1. Review the boot information. Then verify the identity security verification review. If the identity security verification is successful, the specific business operation is successful; if the identity security verification fails, the specific business operation fails. The rest are similar to those in Example 1, and will not be described in detail.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer network, in particular to an identity security verification and checking method. The method is desired to solve the problem of low security in identity security verification and checking. The method comprises the following steps: A) check guiding; B) acquiring and transmitting real-time information on check requests; and C) checking and verifying at background. The invention has the advantages of convenient operation, fast checking of identity verification, and high security. It is required that the information to be verified in the real-time check request information is the same as the credential information used in the identity authentication or the to-be-verified credential information points to the same credential holder and that the shape requirement of the real-time shape information of the to-be-verified document and the checking guidance information is not beyond the set error range, the identity security verification can be a success, therefore, avoiding the identity verification from pictures and video information containing the identity information and ensuring that a tester who passes the complex verification does hold the identity information.

Description

technical field [0001] The invention belongs to the technical field of computer networks, relates to information and data security technology, and in particular relates to an identity security verification review method. Background technique [0002] In the field of network technology, users usually use identity certificates for identity authentication, and identity authentication information is stored in a server. When a user enters a business operation that requires an identity security review and needs to perform identity security verification, there are generally technical problems such as the process is too complicated, not convenient enough, and the security is low. In addition, some security verification processes do not conform to the behavior habits of end users when used; and accounts registered on network terminals using mobile phone numbers as user names have major security risks such as the uniqueness of user names after subjective or objective reasons. Some us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40
Inventor 周洋
Owner 周洋
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More