Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method and device and computer storage medium

A technology of identity authentication and authentication method, applied in the field of image processing, can solve problems such as low security, potential safety hazards, user privacy or property loss, and achieve the effect of ensuring security and protecting rights and interests

Active Publication Date: 2018-11-13
BEIJING KUANGSHI TECH +1
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, at present, most of the above-mentioned fields use passwords or swiping certificates for interaction and authentication, but these two methods have certain security risks
The password of the former is easy to be stolen by criminals, while the certificate of the latter is easy to be forged or used fraudulently. Therefore, the security of these two methods is low, and it is easy to cause loss of privacy or property to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device and computer storage medium
  • Identity authentication method and device and computer storage medium
  • Identity authentication method and device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the objects, technical solutions and advantages of the present invention more apparent, exemplary embodiments according to the present invention will be described in detail below with reference to the accompanying drawings. Apparently, the described embodiments are only some embodiments of the present invention, rather than all embodiments of the present invention, and it should be understood that the present invention is not limited by the exemplary embodiments described here. Based on the embodiments of the present invention described in the present invention, all other embodiments obtained by those skilled in the art without creative effort shall fall within the protection scope of the present invention.

[0070] Embodiments of the present invention can be applied to electronic equipment, figure 1 Shown is a schematic block diagram of an electronic device according to an embodiment of the present invention. figure 1 The illustrated electronic device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity authentication method and device and a computer storage medium. The method comprises the steps that a predetermined authentication mode is adoptedto perform authentication on a user; after the user passes the predetermined authentication, facial authentication is performed on the user; and if the user passes the facial authentication, it is determined that the user passes identity authentication. It is thus obvious that through the embodiment, in the identity authentication process, security can be guaranteed through the dual authenticationmodes of predetermined authentication and facial authentication, and therefore the rights and interests of the user are safeguarded.

Description

technical field [0001] The present invention relates to the field of image processing, and in particular to an identity authentication method, device and computer storage medium. Background technique [0002] The socialization of the use of scientific and technological products has become a beautiful landscape of modern social life. People's clothing, food, housing and transportation are all closely related to science and technology. Scientific and technological products have gradually been applied to all aspects of social life and become an indispensable and important part of modern human daily life. However, while enjoying the benefits brought by scientific products, people also always feel the negative problems it brings, such as information security issues. [0003] For information security issues, especially in technical fields such as e-commerce, mobile payment, and bank account opening, information security issues are particularly prominent. Specifically, at present,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06Q20/40G06K9/00G06K9/62
CPCG06F21/31G06F21/32G06Q20/4014G06Q20/40145G06V40/16G06V40/161G06V40/20G06V40/45G06F18/24
Inventor 敖翔李浩然
Owner BEIJING KUANGSHI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products