User identity recognition method, identity recognition application client and server

A technology of application client and identity recognition, applied in the information field, can solve the problems of hidden dangers, easy to cause security, hidden dangers, etc., to achieve the effect of ensuring security

Active Publication Date: 2017-03-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When using a physical badge, enter the user identity information in the physical badge, and scan the badge with a scanning device to read the entered user identity information for verification. However, once the user identity information is entered, it is only associated with the badge. It is not bound to the user who uses the work card, and the scanning device cannot know whether the user currently usi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity recognition method, identity recognition application client and server
  • User identity recognition method, identity recognition application client and server
  • User identity recognition method, identity recognition application client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0030] figure 1 It is a schematic diagram of the implementation environment involved in the embodiment of the present invention. see figure 1 , the user identification system 100 includes: a server 101 , a terminal device 102 , an identification client 103 , a scanning device 104 and an access control device 105 . Wherein, the identity recognition client 103 runs on the terminal device 102. When performing user identity recognition, the identity...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity recognition method, an identity recognition application client and a server. The method is applied to the identity recognition application client operated on a terminal device. The method comprises the steps of receiving login information input by a user for an identity recognition application, in response to user operation; sending a user identifier obtaining request carrying the login information to the server, thereby enabling the server to carry out identity verification on the user according to the login information, after the verification is successful, generating user identifier information, and sending the user identifier information to the identity recognition application client; and receiving the user identifier information returned by the server, outputting the user identifier information, thereby enabling a scanning device to read the user identifier information and judge whether the read user identifier information is valid or not, or enabling the scanning device to send the read user identifier information to the server, wherein the server judges whether the received user identifier information is valid or not. Through application of the technical schemes, a resource utilization rate can be improved, and the user identity recognition security is improved.

Description

technical field [0001] The present application relates to the field of information technology (IT, Information Technology), and in particular to a user identity identification method, an identity identification application client and server. Background technique [0002] At present, when identifying a user's identity, a physical work card or fingerprint collection is usually used. [0003] When using a physical badge, enter the user identity information in the physical badge, and scan the badge with a scanning device to read the entered user identity information for verification. However, once the user identity information is entered, it is only associated with the badge. It is not bound to the user using the work card, and the scanning device cannot know whether the user currently using the physical work card is the user corresponding to the identity information when scanning, thus causing a security risk. [0004] For the fingerprint collection method, the scanning device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0876
Inventor 贺威
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products