Identity verification method and apparatus thereof
An identity verification method and identity verification technology, applied in the field of identity verification methods and devices, can solve problems such as lack of security, and achieve the effect of solving lack of security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0029] Figure 3 shows a flow chart of the identity verification method provided by the embodiment of the present invention. See image 3 , the method includes:
[0030] Step S110: Obtain identity verification information input by the user in input order, the identity verification information including face information, unlocking image information, password information and action verification information.
[0031] Before performing identity verification, identity verification information needs to be collected, so that the identity verification information can be obtained and used to verify the user's identity.
[0032] In the embodiment of the present invention, the identity verification information includes a variety of information, specifically, face information, unlocking image information, password information, and action verification information. Of course, the specific content of various information included in the identity verification information may not be limited in...
no. 2 example
[0061] The second embodiment of the present invention provides an identity verification device 200, which is applied to the terminal device of the security system. Please refer to Figure 5 , the identity verification device 200 includes an information acquisition module 210 , a matching judgment module 220 and an execution module 230 . Wherein, the information obtaining module 210 is used to obtain identity verification information input by the user according to the input order, and the identity verification information includes face information, unlocking image information, password information and action verification information; the matching judgment module 220 is used to Judging whether the input sequence matches the preset sequence, and judging whether the identity verification information matches the preset identity information; the execution module 230 is configured to match the input sequence and the preset If the identity information matches, the identity verificatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


