Check patentability & draft patents in minutes with Patsnap Eureka AI!

Identity authentication method, apparatus and device

An identity verification method and identity verification technology, applied in the field of devices and equipment, and identity verification methods, can solve problems such as poor convenience and long user operation process, and achieve the effects of improving security, shortening operation process, and improving convenience

Inactive Publication Date: 2018-05-11
ADVANCED NEW TECH CO LTD
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned method requires the user to perform more operations before finally completing the identity verification process when performing identity verification, which will make the user's operation process longer and less convenient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, apparatus and device
  • Identity authentication method, apparatus and device
  • Identity authentication method, apparatus and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] like figure 1 As shown, the embodiment of the present application provides an identity verification method. The execution body of the method can be a terminal device or a server, and the terminal device can be a mobile terminal device such as a mobile phone or a tablet computer, or a terminal device such as a personal computer. The device and the server can be an independent server, or a server cluster composed of multiple servers. In the embodiment of the present application, in order to improve the efficiency of identification, the execution subject of the method takes the server as an example to describe in detail. For the case of the terminal device, it can refer to the specific processing and execution of the server below, and details will not be repeated here. The method specifically may include the following steps:

[0076] In step S102, the action data generated on the terminal device corresponding to the user to be verified is acquired.

[0077] Wherein, the ...

Embodiment 2

[0090] like image 3 As shown, the embodiment of the present application provides an identity verification method. The execution body of the method can be a terminal device or a server, and the terminal device can be a mobile terminal device such as a mobile phone or a tablet computer, or a personal computer, etc. For the terminal device, the server can be an independent server, or a server cluster composed of multiple servers. In the embodiment of the present application, in order to improve the efficiency of identification, the execution subject of the method takes the server as an example to describe in detail. For the case of the terminal device, it can refer to the specific processing and execution of the server below, and details will not be repeated here. The method specifically may include the following steps:

[0091] In step S302, an identity verification request initiated by a user to be verified is received.

[0092] In implementation, personal information securi...

Embodiment 3

[0116] Combined with practical application scenarios, such as Figure 4 As shown, the embodiment of the present application also provides an identity verification method. The execution body of the method may be a terminal device or a server, and the terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, or may be a personal computer, etc. For the terminal device, the server can be an independent server, or a server cluster composed of multiple servers. In the embodiment of the present application, in order to improve the efficiency of identification, the execution subject of the method takes the server as an example to describe in detail. For the case of the terminal device, it can refer to the specific processing and execution of the server below, and details will not be repeated here. The method specifically may include the following steps:

[0117] In step S402, according to the information of the user to be paid, a corresponding verif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identity authentication method, apparatus and device. The method comprises the steps of: obtaining motion data generated on a terminal device correspondingto a user to be subjected to authentication, determining whether the motion data is matched with an authentication motion rule for authentication of the user or not; and if yes, determining that theuser to be subjected to authentication passes the authentication. According to the embodiment, the safety of a target account of the user can be improved, an operation flow of identity authenticationof the user can be shortened, and the convenience of identity authentication can be improved.

Description

technical field [0001] The present application relates to the technical field of authentication, and in particular to an identity verification method, device and equipment. Background technique [0002] Personal information security, especially the security of personal information in applications in financial scenarios has attracted more and more attention. How to ensure user information security, improve user experience, and eliminate people's worries about using related applications has become a problem that needs to be solved. important question. [0003] In most cases, identity verification is an indispensable module of the online system. It is used to determine whether the user corresponding to the account currently logged in to the server is a registered user himself. Only by ensuring that the user corresponding to the account currently logged in belongs to the user himself , the user's resources stored in the server can be guaranteed to be safe and controllable. Cur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06K9/00H04L29/06
CPCH04L63/08G06Q20/4014G06Q20/40145G06V40/20
Inventor 刘贺李哲赵宏伟
Owner ADVANCED NEW TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More