Identity authentication method and device and computer readable storage medium

An identity verification method and an identity verification technology are applied in the fields of computer-readable storage media, identity verification methods and devices, and can solve the problems of forging certificates, inconvenience to carry and store, and improving the difficulty of authentic and false identification of jewelry.

Inactive Publication Date: 2018-03-30
SHENZHEN JEWELRY RES INST NAT GEMS & JEWELRY TECH ADMINISTATIVE CENT +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, paper certificates are not easy to carry and store; and paper certificates are easy to be fabricated, such as forging certificates or modifying the certificate number, which increases the difficulty of authenticity identification of jewelry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device and computer readable storage medium
  • Identity authentication method and device and computer readable storage medium
  • Identity authentication method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] The main idea of ​​the solution of the embodiment of the present invention is: the identity verification method obtains the identity information in the chip through the terminal when receiving the identity verification instruction triggered by the user operation, and sends the identity information to the server; When the server receives the identity information, it judges whether the identity information is legitimate identity information according to preset rules; At the end, the present invention realizes the purpose of identifying the authenticity of jewelry online, thereby simplifying the jewelry identification process and reducing the difficulty of jewelry identification.

[0037] refer to figure 1 , figure 1 It is a schematic diagram of the operating terminal structure of the hardware operating environm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and device and a computer readable storage medium. The identity authentication method is characterized in that a terminal obtains identity information in a chip when receiving an identity authentication instruction triggered by user operation, and sends the identity information to a server; the server judges whether the identity informationis legal identity information according to preset rules when receiving the identity information; and the server feeds authentication pass information back to the terminal when judging that the identity information is the legal identity information. Through the method above, jewelry identity information is stored in the chip, and then, the terminal obtains the identity information and sends the identity information to the server for jewelry identity authentication, thereby realizing a purpose of online jewelry authentication and simplifying jewelry authentication process and reducing jewelry identity difficulty.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to an identity verification method, device and computer-readable storage medium. Background technique [0002] The traditional jewelry certification method is to issue a paper jewelry certificate to the jewelry, and the jewelry needs to be transferred together with the jewelry certificate when the jewelry is transferred. When users need to identify the authenticity of jewelry, they need to take the certificate and jewelry to the relevant organization for certification. However, paper certificates are not easy to carry and store; and paper certificates are easy to be fabricated, such as forging certificates or modifying the number of certificates, which increases the difficulty of authenticity identification of jewelry. Contents of the invention [0003] The main purpose of the present invention is to provide an identity verification method, device and computer-reada...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q30/00
CPCG06Q30/0185H04L63/083
Inventor 兰延段元文张天阳李勋贵张小虎邹丽鹏王小清
Owner SHENZHEN JEWELRY RES INST NAT GEMS & JEWELRY TECH ADMINISTATIVE CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products