A method and system for product experience authentication based on member authentication

An identity verification method and ID card technology, applied in the product experience identity verification method and system field based on membership authentication, to achieve the effects of easy operation, protection of physical and mental health, and good scalability

Inactive Publication Date: 2018-12-18
赵东 +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, there is no method or system that can realize this solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for product experience authentication based on member authentication
  • A method and system for product experience authentication based on member authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] On the one hand, this embodiment discloses a product experience authentication method based on membership authentication, see figure 1 , which includes:

[0040] Membership authentication based on the user's identity information;

[0041] After the authentication is passed, the membership authority is issued to the user;

[0042] Send operation permissions to users according to membership permissions.

[0043] Membership authentication is performed before granting operation authority to the user. The membership authentication process is the process of verifying and entering the user's identity information for the first time. When logging in again, the member's identity information used when logging in will be combined with the stored user's identity. The information is compared one by one, and the login is completed after the comparison is successful. This identity verification method is easy to operate, and can record the user's operation preferences. After the user ...

Embodiment 2

[0050] On the basis of Embodiment 1, the user's identity information includes ID card information, that is, membership verification is performed through the ID card, see figure 2 , the process of membership authentication includes:

[0051] Obtain the user's ID card photo, specifically, take a photo of the user's ID card photo through the camera;

[0052] Identify the ID card information in the ID card photo. The identification process can be realized through the current general OCR (optical character recognition) and other text recognition modules. The ID card information includes the date of birth;

[0053] Calculate the user's age according to the date of birth in the identified ID card information, specifically this calculation is realized by a calculation module, and the specific calculation process is the user's age=the current date-the date of birth in the ID card information;

[0054] Comparing the calculated age of the user with the preset age, the authentication is...

Embodiment 3

[0057] On the basis of Embodiment 1, the user's identity information includes two-dimensional code information, and member authentication includes:

[0058] Acquiring and identifying the two-dimensional code information;

[0059] Call the date of birth in the QR code information and calculate the user's age based on the date of birth, and compare the user's age with the preset age. If the user's age is not less than the preset age, the authentication is passed. Let age be authentication failure.

[0060] The difference between this embodiment and embodiment 2 is that the data sources that need to be entered during membership authentication are different. Embodiment 2 uses ID card information as the data source, and this embodiment uses two-dimensional codes as the data source. Other authentication processes are the same. About The same part is no longer described repeatedly, and the following is only described as follows with respect to the different parts of Embodiment 2:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for product experience authentication based on member authentication. The method comprises the following steps: the member authentication is performed according to the identity information of a user; after the authentication is passed, the user shall be granted the membership right; Send operating rights to users based on membership rights. The invention has the advantages that: The membership authentication process is the process of verifying and inputting the user's identity information for the first time, When logging in again, the identity information of the member used when logging in and the stored identity information of the user are compared one by one, and the login is completed after the comparison is successful. The authentication method is simple to operate and can record the operation preference of the user, and the user can easily view his operation record after logging in through the member authority, and is convenient to operate; When extended to tobacco vending machines, users younger than the preset age (e.g. 18 years) cannot pass membership certification, thereby preventing people younger than the preset age from purchasing tobacco and protecting the physical and mental health of minors.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a product experience authentication method and system based on member authentication. Background technique [0002] At present, the realization of some operation functions needs to grant certain rights to the operator, and the identity of the operator itself needs to be verified before granting the corresponding rights to the operator, so as to grant corresponding rights to the corresponding identities. But at present, there is no method or system that can realize this solution. Contents of the invention [0003] The purpose of the present invention is to provide a product experience identity verification method based on member authentication to solve the existing above-mentioned problems. [0004] To achieve the above object, the technical solution of the present invention is [0005] On the one hand, the present invention discloses a product experience authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06Q30/02
CPCG06F21/45G06F2221/2133G06Q30/0207
Inventor 赵东胡桂彩
Owner 赵东
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products