Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method, server and computer readable storage medium

An identity authentication and server technology, applied in the field of information security, to save costs, improve work efficiency, and improve speed

Inactive Publication Date: 2018-08-21
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention proposes an identity authentication method and server to solve the problem of how

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, server and computer readable storage medium
  • Identity authentication method, server and computer readable storage medium
  • Identity authentication method, server and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] It should be noted that the descriptions involving "first", "second", etc. in the present invention are only for descriptive purposes, and should not be understood as indicating or implying their relative importance or implicitly indicating the number of indicated technical features . Thus, the features defined as "first" and "second" may explicitly or implicitly include at least one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method which comprises extracting a dynamic mouth shape image of a target user in video data, identifying mouth shape meaning corresponding to the dynamic mouth shape image, mapping the dynamic mouth shape image with a user database to acquire target user identity corresponding to the dynamic mouth shape image, and comparing and analyzing the mouth shape meaning and reference mouth shape meaning to perform living body authentication on the user, to complete identity authentication. The invention also provides a server and a computer readable storage medium. According to the identity authentication method, the server and the computer readable storage medium, the user identity can be quickly verified, the identity authentication speed and accuracy are improved, the cost is greatly reduced, and the working efficiency is enhanced.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an identity authentication method, a server and a computer-readable storage medium. Background technique [0002] At present, many companies have a wide range of business, involving multiple aspects, and each business area needs to communicate with customers, and these businesses include a large number of repetitive dialogues, such as business consultation and customer information acquisition for business transactions. In order to meet business needs, many companies currently mainly use manual and computer-guided methods to handle such businesses. However, when the company has a large customer base, it is time-consuming and labor-intensive to rely on manual processing, which increases business costs. However, the flexibility of computer guidance is poor, and it can only target specific business processes. Identity, unable to quickly and effectively verify the identity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06K9/00
CPCG06F21/32G06V40/171G06V40/172G06V40/161G06V10/454G06F18/24143
Inventor 王义文王健宗肖京
Owner PING AN TECH (SHENZHEN) CO LTD