Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device

An identity authentication device and identity authentication technology, applied in the field of identity authentication methods and devices, can solve the problems of low efficiency of identity authentication and complex identity authentication process of online sales platforms, etc.

Active Publication Date: 2018-11-13
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that in the above identity authentication process, there are multiple interactions between the online sales platform and the user, and multiple identity authentication requests need to be initiated to the authentication platform, which will inevitably make the identity authentication process of the online sales platform too complicated, resulting in Inefficient authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0037]As mentioned above, if the user inquires that the identity authentication has not been completed, the online sales platform will be requested to initiate an identity authentication request to the authentication platform again, so as to judge whether the identity authentication is completed according to the identity authentication result received again.

[0038] It can be seen from the above th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method and device. The identity authentication method comprises the following steps that: a proxy server side receives an identity authentication request initiated by a client according to identity information to be authenticated; the identity information to be authenticated in the identity authentication request is sent to an authentication platform for identity authentication, and an identity authentication result returned by the authentication platform is received; and if the identity authentication result indicates that the authenticationis not completed yet, the authentication platform is requested to return the authentication result again. Through adoption of the identity authentication method and device provided by the invention,the problem that the flow of identity authentication in the prior art is too complicated is solved, and the efficiency of identity authentication is increased effectively.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an identity authentication method and device. Background technique [0002] With the development of Internet technology, more and more online sales platforms provide services for users. For example, users can purchase products through the online sales platform, and the online sales platform is responsible for the delivery and after-sales of the products, which greatly provides users with convenience. [0003] In order to ensure the safety of product sales, the online sales platform usually needs to authenticate the user's identity. The identity authentication process includes: the user submits identity information to be authenticated to the network sales platform, and the network sales platform initiates an identity authentication request to the authentication platform based on the identity information to be authenticated, and receives the identity authentication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/08H04L67/56H04L63/0281H04L63/126
Inventor 罗先贤龙觉刚孙成赖云辉叶俊锋
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products