A method and a device for providing and acquiring security identity information

A technology of identity information and identity, which is applied in the direction of data processing applications, instruments, sensing record carriers, etc., and can solve the problems of face verification breaches (attacks against real-name and real-person verification, etc.)

Active Publication Date: 2019-04-09
ADVANCED NEW TECH CO LTD
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, identity verification based on electronic certificates also faces security threats: for example, the photo of the electronic version of the ID card may be ps (attack against real-n...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and a device for providing and acquiring security identity information
  • A method and a device for providing and acquiring security identity information
  • A method and a device for providing and acquiring security identity information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0206] According to an implementation manner, the third-party trusted verification source includes a first verification source and a second verification source; the credential acquisition unit 50 is configured to:

[0207] Obtaining the first verification information and the second verification information as verification identity information;

[0208] sending the first verification information to the first verification source, and sending the second verification information to a second verification source;

[0209] receiving a first credential from the first verification source and a second credential from the second verification source;

[0210] The first credential and the second credential are combined to generate the trusted credential.

[0211] In one embodiment, the device 500 further includes a registration information generating unit (not shown), which generates an identity index in the following manner:

[0212] using the verified first identity information as the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a device for providing and acquiring security identity information. And under the condition that the user needs to carry out identity verificationor provide safety identity information, the credible application acquires the identity information of the user and sends the identity information to a third-party verification source for verification. And after the verification is passed, the trusted application registers with the registration platform based on the verified information, thereby obtaining the two-dimensional code for the user. Theuser can then display the two-dimensional code through the trusted application. A service party needing security identity information scans the two-dimensional code, and based on the two-dimensionalcode, an identity request for the user is sent to the trusted application through the registration platform to request for obtaining the needed identity information; And then, the trusted applicationreturns required identity information to the service party through the registration platform.

Description

technical field [0001] One or more embodiments of this specification relate to the field of identity security authentication, and in particular, to methods and devices for providing and obtaining secure identity information. Background technique [0002] In various offline application scenarios, the traditional identity verification of users is usually based on certificates, which follows the logic of "verifying the authenticity of people's identity through certificates". In the specific implementation, the natural person provides the certificate (such as ID card, passport, etc.), and the natural person representing the scene merchant (such as the front desk staff of the hotel, the window staff of the administrative hall) confirms the corresponding relationship between the user and the certificate through visual inspection. And through visual inspection or the assistance of card reading equipment to confirm the authenticity of the certificate, on this basis, the required ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q50/26G06K7/14
CPCG06K7/1417G06Q50/265
Inventor 谷晨落红卫
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products