Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity authentication method, server and mobile terminal

A mobile terminal and identity authentication technology, applied in the field of data processing, can solve the problems of reducing mobile payment experience, losses, and increasing mobile payment insecurity, and achieve the effects of improving experience, reducing losses, and reducing insecurity

Active Publication Date: 2019-09-27
BEIJING D EAR TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Criminals can enter the illegally stolen user password, and can pass through the identity verification link of the server by imitating the user's voice and other means, thereby bringing losses to the user, increasing the insecurity of mobile payment, and reducing the user's ability to use mobile payment. experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity authentication method, server and mobile terminal
  • An identity authentication method, server and mobile terminal
  • An identity authentication method, server and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] see figure 2 1. This embodiment adopts an identity authentication method, including:

[0081] Step 200, the server acquires an identity verification instruction triggered by the user through the mobile terminal.

[0082] In the above step 200, when the mobile terminal acquires the payment instruction triggered by the user, it will generate the user's identity verification instruction. The above identity verification instruction includes: real-time scene information.

[0083] The above-mentioned payment instruction may be an operation instruction triggered when the user purchases a product or returns a credit card through a mobile terminal.

[0084] The above real-time scene information is the value of the payment amount or the amount of virtual resources used for payment generated when the user performs the payment operation. The virtual resources include but are not limited to: gold coins and gold beans.

[0085] Step 202, the server generates identity verificatio...

Embodiment 2

[0141] In order to perform data interaction with the server proposed in Embodiment 1, this embodiment provides an identity authentication process that can be executed on the mobile terminal side. This enables the user to interact with the server through the mobile terminal to complete the identity authentication operation.

[0142] see image 3 , the present embodiment provides an identity authentication method, comprising the following steps:

[0143] Step 300, the mobile terminal obtains the payment instruction triggered by the user, and the above payment instruction carries the user identification and real-time scene information.

[0144] Step 302, the above-mentioned mobile terminal generates an identity verification instruction carrying the above-mentioned user ID and the above-mentioned real-time scene information, and sends the above-mentioned identity verification instruction to the server.

[0145] Step 304, the mobile terminal receives and presents to the user the ...

Embodiment 3

[0155] see Figure 4 , this embodiment provides a server for performing the above identity authentication method, including:

[0156] An instruction acquisition module 400, configured to acquire an identity verification instruction triggered by a user through a mobile terminal, the above identity verification instruction including: real-time scene information;

[0157] The verification information processing module 402 is configured to generate the identity verification information of the above-mentioned user according to the above-mentioned real-time scene information, and send the above-mentioned identity verification information to the above-mentioned mobile terminal;

[0158] A voice information acquisition module 404, configured to acquire voice verification information sent by the mobile terminal, the voice verification information including voice data in which the user reads the identity verification information aloud;

[0159] The identity verification module 406 is c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method, a server and a mobile terminal. The method comprises the following steps: the server obtains an identity authentication instruction triggered by a user through the mobile terminal, wherein the identity authentication instruction comprises real-time scene information; the server generates identity authentication information of the user according to the real-time scene information, and sends the identity authentication information to the mobile terminal; the server obtains voice verification information sent by the mobile terminal, wherein the voice verification information comprises voice data of the user for reading the voice verification information; and the server verifies the identity of the user through the voice verification information. By adoption of the identity authentication method, the server and the mobile terminal provided by the embodiment of the invention, the security of mobile payment can be improved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to an identity authentication method, a server and a mobile terminal. Background technique [0002] At present, the mobile payment function of mobile terminals has broad development prospects. When a user makes mobile payment through a mobile terminal, the server needs to verify the user's identity, and after the user passes the identity verification, the mobile terminal used by the user completes the mobile payment. [0003] In related technologies, in order to verify the identity of the user, the server can obtain the verification password and voice input by the user, compare the verification password and voice input by the user with the preset password and voice, and when it is determined that the verification password and voice input by the user are consistent with the preset When the set password matches the voice, it is determined that the user has passed the authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G10L15/02G10L17/00G06Q20/40
Inventor 郑方邬晓钧黄小妮
Owner BEIJING D EAR TECH