Identity authentication method, apparatus and system

A technology of identity authentication and identity information, which is applied in the field of identity authentication methods, devices and systems, can solve problems such as inconvenient operation and low interaction efficiency, and achieve the effects of simplifying user operations, improving interaction efficiency, and improving interaction security

Active Publication Date: 2018-11-23
ADVANCED NEW TECH CO LTD
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the user may often be in an inconvenient scene, such as carrying a lot of luggage, resulting in low interaction efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, apparatus and system
  • Identity authentication method, apparatus and system
  • Identity authentication method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] figure 1 It is a schematic structural diagram of an identity authentication system provided by an exemplary embodiment of the present application. Such as figure 1 As shown, the system may include a server 11, a network 12, several user devices (such as a mobile phone 13, a mobile phone 14, etc.) and interactive devices (such as a cash register device 15, a cash register device 16, etc.).

[0051] The server 11 may be a physical server including an independent host, or the server 11 may be a virtual server hosted by a host cluster, or the server 11 may be a cloud server. During operation, the server 11 can run a server-side program of a certain application to realize the relevant business functions of the application. For example, when the server 51 runs an interactive operation program, it can be configured as a service for realizing the interactive function end.

[0052] A cell phone 13-14 is just one type of user equipment that a user may use. In fact, users can ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides an identity authentication method, apparatus and system. The identity authentication method comprises the steps: an interaction terminal receives an interaction instruction initiated for a user and obtains identification information of the user; the interaction terminal sends an identity identification request to a server end, wherein the identity identification request includes the identification information, the identity identification request is used for instructing the server end to match the identification information with the standard identification information of a candidate user corresponding to the interaction terminal to determine a user account corresponding to the user, and the user account is used for responding to an interaction operation corresponding to the interaction instruction, wherein a user in the vicinity of the interaction terminal is marked as a corresponding candidate user by the server end. Through the technical scheme of the application, the identification efficiency and the identification accuracy of the user can be improved, and the interaction efficiency and the security can be improved.

Description

technical field [0001] The present application relates to the technical field of identity authentication, in particular to an identity authentication method, device and system. Background technique [0002] In related technologies, interactive operations can be implemented between users. During the implementation of the interactive operation, one party uses the interactive device and the other uses the user device, so that the user of the user device can obtain an interactive object of interest, and the provider of the interactive object can communicate between the interactive device and the user device. The interactive operation realized between users obtains the corresponding interactive resources from the user. [0003] In related technologies, the above-mentioned user needs to manually manipulate the user equipment to complete the interactive operation between the user equipment and the interactive device. However, the user may often be in an inconvenient scene, such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/40145G06Q20/325G06Q20/4014G06Q20/40G06Q20/3674G06Q20/18H04W4/80G06V10/40G06Q20/20G07G1/0009G07G1/14G06Q20/202G06Q20/40155G06Q20/3223G06Q20/3224G06Q20/327G06V40/16
Inventor 陈力张鸿周乐
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products