Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication management method, device, terminal and medium

A technology of identity authentication and management methods, which is applied in digital data authentication, data processing applications, instruments, etc., and can solve the problems of increasing the processing pressure of identity authentication requests by third-party organizations

Inactive Publication Date: 2019-02-15
SHENZHEN MAIMAITI INFORMATION TECH CO LTD
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of user authentication, the same user may perform multiple repeated authentications, which increases the pressure on third-party agencies to process identity authentication requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication management method, device, terminal and medium
  • Identity authentication management method, device, terminal and medium
  • Identity authentication management method, device, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] The identity authentication management method provided by the embodiment of the present invention is implemented in a terminal, and the terminal includes electronic equipment such as a smart phone, a tablet computer, a digital audio and video player, an e-reader, a handheld game console, or a vehicle-mounted electronic device, and the terminal can carry For various business systems, the terminal may also be a background server of the business sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity authentication management method and a terminal, wherein, the method comprises the following steps of receiving an identity authentication requestinstruction, wherein the identity authentication request instruction comprises the user identity data; acquiring a hash value of the user identity data and matching the hash value with a real hash value stored in a first preset database, wherein the real hash value is a hash value of the real identity data; if the matching fails, forwarding the authentication request instruction to a third party authority and receiving the verification result returned by the third party authority. By implementing the embodiment of the invention, the identity data uploaded by the user can be preprocessed, and the verification pressure of the third party organization for the identity authentication can be reduced.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to an identity authentication management method, an identity authentication management device, a terminal and a computer storage medium. Background technique [0002] In the process of each business system handling business for the user, it is usually necessary to authenticate the user's identity. If the authentication is successful, the business system will handle the corresponding business for the user. If the authentication fails, the business process cannot be entered. In the process of identity authentication, the user sends the identity data filled in by himself to the third-party authentication agency through the business system (the third-party organization keeps a large number of users' real identity data and provides identity authentication services for various business systems). The third-party organization judges whether the identity data uploaded by the user i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/31G06Q10/10
CPCG06F21/31G06F21/45G06Q10/103
Inventor 陈全友
Owner SHENZHEN MAIMAITI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products