Supercharge Your Innovation With Domain-Expert AI Agents!

Real person authentication method and device

A real person and certificate technology, applied in the Internet field, can solve the problems of item information leakage, user biometric duplication and theft, etc., to achieve the effect of improving credibility

Active Publication Date: 2020-01-14
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the user's item information is leaked, and the user's biometrics may be copied and stolen during the collection process, it is necessary to provide a more reliable scheme for authenticating the user's identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real person authentication method and device
  • Real person authentication method and device
  • Real person authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Multiple embodiments disclosed in this specification will be described below in conjunction with the accompanying drawings.

[0040] figure 1 A schematic diagram of the application scenario of the real person authentication method provided by an embodiment disclosed in this specification. figure 1 Among them, when the server (for example, the server can be the server of the Alipay application) detects that the user has registered the first account (for example, the first account can be Alipay account) to perform an account operation (for example, the account operation can be registering the first account, or using the funds in the first account for consumption), the real person authentication method provided by the multiple embodiments disclosed in this specification can be used, Perform real-person authentication on the first account to check whether the user requesting the account operation on the first account is consistent with the real-person information in the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided in the embodiments disclosed by the present description is a real person authentication method, comprising: when a server detects an operation request of the user for implementing an account operation on a first account, on the basis of real person information comprised in the registration information of the first account, looking up an account pattern corresponding to the real person information; and, on the basis of behaviour data in the account pattern, providing verification content of the real person authentication to the user. A server receives an operating result of the user on the verification content and, on the basis of the operating result, determines whether the user passes the real person authentication.

Description

technical field [0001] The multiple embodiments disclosed in this specification relate to the field of Internet technology, and in particular to a method and device for constructing an account graph for real person authentication, and a real person authentication method and device. Background technique [0002] With the continuous development of Internet technology, the cases of user identity information being used by others are increasing. If criminals use fraudulent identity information to carry out illegal activities such as money laundering, not only will the criminals be unable to be caught, but it will also have a greater impact on normal users whose identities are fraudulently used. [0003] In this regard, in order to avoid the above-mentioned situation, most network platforms and applications have adopted the method of real-name authentication of accounts. The authentication information in the real-name authentication process mainly includes the user's item informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/0861H04L63/0876
Inventor 厉科嘉
Owner ADVANCED NEW TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More