User identity verification and permission identification method and system

A technology of user identity and identification method, which is applied in the field based on the combination of user ID extraction and face recognition of mobile communication terminals, can solve problems such as unusable, achieve great social and economic benefits, improve mobile payment experience, and improve traffic The effect of experience and efficiency

Inactive Publication Date: 2018-11-16
NANJING PANDA ELECTRONICS +3
View PDF9 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this invention must ensure that the mobile communication terminal perception device is connected to the external network in real time, so that the verification, identification and extraction of user identity can be realized, so this invention cannot be used in the case of only a private network or a disconnected network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity verification and permission identification method and system
  • User identity verification and permission identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the drawings and specific embodiments.

[0036] Such as figure 1 As shown, the embodiment discloses a fast, accurate and safe user identity verification and permission recognition system, including a service system, camera equipment, and mobile communication terminal perception equipment. The camera captures the face image that enters the shooting area in real time, compares the face image captured in real time with the user data in the temporary database, verifies the legitimacy of the identity of the user holding the mobile communication terminal, and when the verification is legal Send a corresponding service signal to a device that provides a specific service.

[0037] Correspondingly, such as figure 2 As shown, the embodiment also discloses a fast, accurate and safe user identity verification and permission recognition method, which establishes a safe and sound user's face image and the user's m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity verification and permission identification method. The method includes: establishing a user database including face images of users, terminal IDs and one-to-onecorrespondence relationships of the face images and the terminal IDs; acquiring, through mobile-communication-terminal sensing equipment, a user terminal ID of a mobile communication terminal entering a communication coverage range thereof; finding the acquired terminal ID in the user database, and establishing a temporary database including the terminal ID, a face image corresponding thereto anda correspondence relationship between the two parts; and capturing, through shooting equipment, an image of a face entering a shooting area in real time, comparing the captured face image and user data in the temporary database in real time to verify legality of holding an identity of the user, and issuing corresponding service signals when the legality is verified. Through the method, fast, accurate and secure user identity verification and permission identification can be realized to complete signal output of payment information exchange, control on hardware equipment or the like.

Description

Technical field [0001] The invention belongs to the technical field of user identity verification and authority recognition in the technical field of mobile communication terminal information processing, and in particular relates to a method based on the combination of user mobile communication terminal ID extraction and face recognition. Background technique [0002] In recent years, the Internet has flourished, and Internet payments such as Alipay, WeChat Pay, and JD Finance have emerged. Because these payment methods are convenient to use, people have become more and more adaptable to these payment methods. But with the rapid development of the information age, people are paying more and more attention to their own information security, and they are beginning to worry about the security of their accounts. [0003] At present, the main forms of subway and bus tickets are coin-operated and stored-value cards. However, with the development of wireless communication technology, NFC ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/32G06Q20/40H04N5/232
CPCG06Q20/3227G06Q20/40145H04N23/611
Inventor 许欣郭庆牟中平任伟黄承
Owner NANJING PANDA ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products