Authentication method, device and electronic device

An identity verification method and a technology to be verified are applied in the field of devices, electronic equipment, and identity verification methods to achieve the effects of reducing consumption, reducing transmission to a server, and improving efficiency

Inactive Publication Date: 2019-01-29
BEIJING KUANGSHI TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Various fields can also achieve identity authentication through computer identification of certificates, b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and electronic device
  • Authentication method, device and electronic device
  • Authentication method, device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0060] Example one

[0061] First, refer to figure 1 An example electronic device 100 for implementing the identity verification method of the embodiment of the present invention will be described. The example electronic device 100 may be a computer, or a mobile terminal such as a smart phone or a tablet computer.

[0062] Such as figure 1 As shown, the electronic device 100 includes one or more processors 102 and one or more storage devices 104. Optionally, the electronic device 100 may further include an input device 106, an output device 108, and an image acquisition device 110, and these components are interconnected by a bus system 112 and / or other forms of connection mechanisms (not shown). It should be noted that figure 1 The components and structures of the electronic device 100 shown are only exemplary and not restrictive. The electronic device may also have other components and structures as required.

[0063] The processor 102 may be a central processing unit (CPU), a gr...

Example Embodiment

[0070] Example two

[0071] See figure 2 , Is a flowchart of a data encryption method provided by an embodiment of the present invention. The following will figure 2 The specific process shown is elaborated.

[0072] Step S201: Obtain the identity information input by the user to be verified.

[0073] In this embodiment, the identity information may include a certificate number.

[0074] In one embodiment, an information collection page can be provided, and the identity information of the user to be verified can be obtained by receiving a character string entered by the user in the information collection page. Such as image 3 As shown, image 3 A schematic diagram of the information collection page in an example is shown. The figure shows multiple input boxes for receiving user input data, including a name input box and a certificate number input box. further, image 3 There is also a "return" button in it, and the "return" button is configured to return to the previous page.

[...

Example Embodiment

[0132] Example three

[0133] See Figure 5 , Is a schematic diagram of functional modules of the identity verification device provided by the embodiment of the present invention. Each module in the identity verification device in this embodiment is used to execute each step in the method provided in the second embodiment. The identity verification device includes the following modules.

[0134] The obtaining module 301 is configured to obtain the identity information of the user to be verified, and the identity information includes a certificate number.

[0135] The first identification module 302 is used to identify whether the character string at the position limited by the certificate number meets the certificate rules.

[0136] The sending module 303 is configured to send the identity information to the server for verification if the certificate number meets the certificate rules.

[0137] Optionally, the identity verification device further includes:

[0138] The collection modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide an authentication method, device, and an electronic device. The authentication method comprises the following steps: obtaining the identity information input by the user to be verified, wherein the identity information comprises a certificate number; identifying whether a character string at a defined position in the certificate number satisfies a certificate rule; if the certificate number satisfies the certificate rule, the identity information is sent to the server for verification.

Description

Technical field [0001] The present invention relates to the field of data processing, in particular to an identity verification method, device and electronic equipment. Background technique [0002] With the development of computer technology, all aspects of life can be realized through computer technology, for example, education, finance, security and other fields. Various fields have been well developed through computer technology, which has brought convenience to people's lives. Various fields can also achieve identity authentication through computer identification of documents, but the existing possibility is to send the document information to the server for the server to identify. Summary of the invention [0003] In view of this, the purpose of the embodiments of the present invention is to provide an identity verification method, device and electronic equipment. [0004] In the first aspect, an identity verification method provided by an embodiment of the present invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 滕飞
Owner BEIJING KUANGSHI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products