Identity verification method and apparatus

An identity verification and identity attribute technology, applied in the field of information identification, can solve problems such as inability to match users, inability to verify user identity, etc., to achieve the effect of expanding usage scenarios

Active Publication Date: 2017-04-19
ADVANCED NEW TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an identity verification method and device, which is used to solve the limitation of the existin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and apparatus
  • Identity verification method and apparatus
  • Identity verification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0051] Embodiment one

[0052] like figure 1 As shown, the flow chart of the identity verification method provided in Embodiment 1 of the present application includes the following steps:

[0053] S101: Receive multiple pieces of identity attribute information input by a user.

[0054] Here, the plurality of identity attribute information input by the user may include: ID card number, name, mobile phone number, address, email address, address, and the like.

[0055] S102: Based on the plurality of identity attribute information, configure at least one identity attribute information set, and based on the stored user identity information database, bind together each identity attribute information belonging to the same identity attribute information set to perform the first security detection , to obtain the safety factor of each identity attribute information set in the at least one identity attribute information set; wherein, each identity attribute information set contains a...

Example Embodiment

[0062] Embodiment two

[0063] like figure 2 As shown, the flow chart of the identity verification method provided in Embodiment 2 of the present application includes the following steps:

[0064] S201: Receive multiple pieces of identity attribute information input by a user.

[0065] S202: Based on the plurality of identity attribute information, configure at least one identity attribute information set, and based on the stored user identity information database, bind together the identity attribute information belonging to the same identity attribute information set to perform the first security detection , to obtain the safety factor of each identity attribute information set in the at least one identity attribute information set; wherein, each identity attribute information set contains at least two identity attribute information.

[0066] S203: Based on the stored user identity information database, perform a second security check on each identity attribute informatio...

Example Embodiment

[0083] Embodiment Three

[0084] like Figure 4 As shown, the flow chart of the identity verification method provided in Embodiment 3 of the present application includes the following steps:

[0085] S401: Receive multiple pieces of identity attribute information input by a user.

[0086] S402: Based on the plurality of identity attribute information, configure at least one identity attribute information set, and based on the stored user identity information database, bind together the identity attribute information belonging to the same identity attribute information set to perform the first security detection , to obtain the safety factor of each identity attribute information set in the at least one identity attribute information set; wherein, each identity attribute information set contains at least two identity attribute information.

[0087] S403: Based on the obtained safety factor of each identity attribute information set, determine each security identity attribute ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information identification, and particularly to an identity verification method and apparatus for solving the problem that the existing identity verification method is limited by identity number matching. The identity verification method provided by the embodiment comprises the steps of receiving multiple pieces of identity attribute information input by a user; configuring at least one identity attribute information set, and based on a stored user identity information database, enabling each identity attribute information belonging to the same identity attribute information set to be bound together to first safety detection to obtain a safety coefficient of each identity attribute information set; based on the stored user identity information database, performing second safety detection on at least one identity attribute information of the multiple pieces of identity attribute information separately to obtain a risk coefficient of each identity attribute information; and based on the obtained safety coefficient of each identity attribute information set and the risk coefficient of each identity attribute information, determining an identity verification result on the user.

Description

technical field [0001] The present application relates to the field of information identification, in particular to an identity verification method and device. Background technique [0002] With the rapid development of Internet information technology, it is becoming more and more common for service providers to develop users and provide services to users through the Internet. However, in the process of developing users and providing services to users through the network, service providers generally face the inability to judge the authenticity of user identities, that is, unable to judge whether the identity information entered by users is the real information of the user (such as identity Whether the information is valid, whether other people’s information is used fraudulently, etc.), which leads to the problem that business services often face various risks. [0003] At present, judging the authenticity of user information is mainly based on the ID number entered by the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/33
Inventor 郑丹丹林述明
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products