Identity authentication method, identity authentication device and identity authentication system

An identity authentication device and an identity authentication technology are applied in the fields of authentication devices, identity authentication methods, and authentication systems, and can solve problems such as potential safety hazards, and achieve the effects of improving security, increasing the difficulty of authentication cracking, and improving accuracy.

Inactive Publication Date: 2017-10-10
PHICOMM (SHANGHAI) CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this face recognition authentication method also has some security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, identity authentication device and identity authentication system
  • Identity authentication method, identity authentication device and identity authentication system
  • Identity authentication method, identity authentication device and identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0035] In order to make the drawing concise, each drawing only schematically shows the parts related to the present invention, and they do not represent the actual structure of the product. In addition, to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. Herein, "a" not only means "only one", but also means "more than one".

[0036] like figu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method. The method comprises the following steps: S10, obtaining multi-angle facial feature information in multiple identity feature information of a current user; S20, verifying whether the multi-angle facial feature information is consistent with preset multi-angle facial feature information corresponding to a preset user; and S30, when the multi-angle facial feature information is consistent with the preset multi-angle facial feature information, passing the authentication of the multi-angle facial feature information in the multiple identity feature information. According to the identity authentication method, by means of the multiple authentication of the multi-angle facial feature information of the current user, on one hand, whether the current user face is the preset user is identified from multiple angles, thereby improving the identification accuracy and improving the authentication cracking difficulty; and on the other hand, whether the current user face is real and valid is identified.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and relates to an identity authentication method, an authentication device and an authentication system. Background technique [0002] Identity authentication, also known as "identity verification" or "identity authentication", refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, and then make the computer And network system access policies can be implemented reliably and effectively, preventing attackers from posing as legitimate users to gain access to resources, ensuring the security of systems and data, and the legitimate interests of authorized visitors. [0003] At present, with the continuous development of science and technology, identity authentication technology has gradually developed from static password and dynamic password authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/08
Inventor 李长柏
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products