Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, apparatus, and computer-readable storage medium

An identity verification method and identity verification technology are applied in the fields of devices, computer-readable storage media, and identity verification methods, and can solve problems such as low security of personnel identity verification.

Active Publication Date: 2018-12-28
XIAN IRAIN IOT TECH SERVICES CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide an identity verification method, device and computer-readable storage medium, aiming to solve the technical problem of low security of personnel identity verification in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, apparatus, and computer-readable storage medium
  • Authentication method, apparatus, and computer-readable storage medium
  • Authentication method, apparatus, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] Such as figure 1 as shown, figure 1 It is a schematic structural diagram of the identity verification device of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0030] Such as figure 1 As shown, the identity verification device may include: a processor 1001 , such as a CPU, a network interface 1004 , a user interface 1003 , a memory 1005 , and a communication bus 1002 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, the network interface 1004 may include a standard ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method, a device and a computer-readable storage medium. The identity authentication method comprises the following steps: when an identity authentication event is triggered, a user information collection instruction is sent to a mobile terminal that triggers the identity authentication event; when the user information collection instruction is triggered, the user information collection instruction is sent to a mobile terminal. Receiving user information to be verified fed back by the mobile terminal based on the user information acquisition instruction; acquiring electronic identity card information corresponding to the mobile terminal; detecting whether the user information to be verified is legal user information based on the electronicidentity card information; if the user information to be verified is legal user information, the authentication is passed. Through the invention, the security of the authentication is improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity verification method, device and computer-readable storage medium. Background technique [0002] At present, identity verification channels are set up at important entrances and exits, and personnel need to verify their identities when entering and exiting. Common authentication methods include password authentication and card authentication. [0003] Among them, if the password authentication method is adopted, when the password is accidentally leaked, people who do not have permission to enter the channel can enter the channel through the password, which may cause adverse consequences. If card verification is adopted, when the card is lost, people who have no authority to enter the channel can enter through the card, which may cause adverse consequences. Contents of the invention [0004] The main purpose of the present invention is to provide an i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/0876
Inventor 王林祥赵皎平王银波
Owner XIAN IRAIN IOT TECH SERVICES CO LTD