Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device

An identity authentication and identity technology, applied in the field of identity authentication methods and devices, can solve problems such as inconvenience of use, and achieve the effect of alleviating the inconvenience of use.

Inactive Publication Date: 2018-05-18
Fisherman Information Technology Co Ltd
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide an identity authentication method and device to alleviate the technical problem of inconvenient use in traditional identity authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] An identity authentication method provided by an embodiment of the present invention, such as figure 1 shown, including:

[0051] Step S102, obtaining the request information of the user requesting the authentication identity;

[0052]Step S104, selecting the current mode for user identity authentication from a plurality of preset modes to obtain a selection result, wherein the preset mode is a preset mode for user identity authentication;

[0053] Step S106, according to the selection result, the user's identity authentication process is performed.

[0054] Specifically, the identity authentication method is applied to a device for authenticating a user, so as to realize the identity authentication for the user. It should be emphasized that the request information is the information that the user requests to authenticate the identity, and obtaining the request information can be obtained from the request information sent by the user using the client, or from some req...

Embodiment 2

[0093] An identity authentication device provided by an embodiment of the present invention, such as image 3 shown, including:

[0094] Obtaining module 100, for obtaining the request information of user request authentication identity;

[0095] The selection module 200 is used to select a mode that currently authenticates the user from a plurality of preset modes to obtain a selection result, wherein the preset mode is a preset mode for authenticating the user;

[0096] The authentication module 300 is configured to perform an identity authentication process for the user according to the selection result.

[0097] In the embodiment of the present invention, the obtaining module 100 obtains the request information of the user requesting the authentication identity; the selecting module 200 selects the current mode for user identity authentication from a plurality of preset modes, and obtains the selection result, wherein the preset mode is the preset mode The set mode for a...

Embodiment 3

[0125] An embodiment of the present invention provides a computer-readable medium having a non-volatile program code executable by a processor, and the program code causes the processor to execute the identity authentication method of Embodiment 1.

[0126] Specifically, the storage medium includes: a USB flash drive, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk or an optical disk, and other media that can store program codes. .

[0127] In the embodiment of the present invention, the program code causes the processor to execute the identity authentication method of the first embodiment, that is, to obtain the request information of the user requesting the authentication identity; to select the current mode of identity authentication for the user from a plurality of preset modes, and obtain the selected As a result, the preset mode is a preset mode for authenticating the user; the identity a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and device, and relates to the technical field of identity authentication. The method comprises the steps of: obtaining request information foridentity authentication of a user; selecting a mode for identity authentication of the user currently from multiple pre-set modes, so that a selection result is obtained, wherein the pre-set modes are pre-set modes used for identity authentication of the user; and, performing an identity authentication process of the user according to the selection result. By means of the identity authenticationmethod and device provided by the invention, the technical problem that the traditional identity authentication mode is inconvenient to use can be relieved.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an identity authentication method and device. Background technique [0002] At present, identity authentication adopts a fixed authentication mode, either fingerprint authentication mode or iris authentication mode. [0003] There are many inconveniences in the use of the identity authentication method of the fixed authentication mode. For example, when the current authentication mode is found to be risky, the identity authentication can only be suspended, which will affect the normal use of identity authentication; When changing the current certification mode, the product can only be redesigned to develop a new certification system, which not only greatly increases the research and development costs, but also the old certification system can only implement the old certification mode, and the new certification system can only implement the new In the authenticati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3234H04L9/3231
Inventor 邱英红宋志华徐波
Owner Fisherman Information Technology Co Ltd
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products