Unlock instant, AI-driven research and patent intelligence for your innovation.

Information authentication method and device taking identity information authentication as carrier

A technology of identity information authentication and carrier, which is applied in the computer field, can solve problems such as restrictions and cumbersome information authentication, and achieve the effect of improving authentication efficiency and avoiding too cumbersome

Pending Publication Date: 2019-04-16
北京金钝宏安科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiments of the present invention is to provide an information authentication method and device based on identity information authentication to solve the problem that the existing information authentication process is too cumbersome and limited by authentication places, industries, and equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information authentication method and device taking identity information authentication as carrier
  • Information authentication method and device taking identity information authentication as carrier
  • Information authentication method and device taking identity information authentication as carrier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] According to Embodiment 1 of the present invention, an information authentication method using identity information authentication as a carrier is provided, such as figure 1 As shown, it is a schematic flowchart of an information authentication method based on identity information authentication provided by Embodiment 1 of the present invention. The method at least includes the following steps:

[0026] S101. Receive an information authentication request from the current user, and extract corresponding information authentication keyword information from the information authentication request;

[0027] S102, matching the corresponding official platform to be accessed according to the information authentication keyword information, and accessing the official platform;

[0028] S103. Receive the information to be authenticated input by the current user, and retrieve the identity information of the current user associated with the information to be authenticated from the o...

Embodiment 2

[0040] According to Embodiment 2 of the present invention, an information authentication device with identity information authentication as the carrier is also provided, such as Figure 4 As shown, it is a schematic structural diagram of an information authentication device using identity information authentication as a carrier provided by Embodiment 2 of the present invention.

[0041] An information authentication device based on identity information authentication provided by Embodiment 2 of the present invention includes a request receiving module 401, an extraction module 402, a matching access module 403, an information receiving module 404, a calling module 405, and an information comparison module 406 and processing module 407 .

[0042] Specifically, the request receiving module 401 receives the information authentication request of the current user;

[0043] The extraction module 402 extracts corresponding information authentication keyword information from the info...

Embodiment 3

[0055] According to Embodiment 3 of the present invention, an electronic device is also provided, and the electronic device includes: a memory and a processor, and the processor and the memory communicate with each other through a bus; The program instruction executed by the processor, the processor calling the program instruction can execute the following method: receiving the information authentication request of the current user, and extracting the corresponding information authentication keyword information from the information authentication request; according to the information authentication keyword information Match the corresponding official platform to be accessed and access the official platform; receive the information to be authenticated input by the current user, and retrieve the identity information of the current user associated with the information to be authenticated from the official platform; Authentication information, compare whether the current user is a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information authentication method and device taking identity information authentication as a carrier. The invention belongs to the technical field of computers, and the method comprises the steps: receiving to-be-authenticated information input by a current user, and comparing whether the current user is a legal user on a database of an official platform according to the identity information and the to-be-authenticated information; judging whether the current user is a legal user or not according to the information comparison result, and if the information comparison result shows that the to-be-authenticated information is consistent with the current user information registered on the official platform, judging that the current user is a legal user, and the information authentication process of the current user is successful. According to the scheme, the intelligent information authentication process is achieved, the identity card information of the current user can be authenticated, other information can be authenticated, the situation that the existing information authentication process is too complex and limited by authentication places, industries and hardware is avoided, and the authentication efficiency of information authentication is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an information authentication method and device using identity information authentication as a carrier. Background technique [0002] With the development of Internet technology, it provides convenience for people's daily life. For example, the authentication process of the current ID card can be networked, so that even if the user does not work or study at the place of residence, for example, the user works or studies across provinces, he can still enjoy the convenience of networking the ID card information. [0003] Now the ID card is more and more closely related to the daily life of the user. For example, when the user stays in a hotel on a business trip, the user needs to carry the ID card with him. If the user’s ID card is lost or left at home, the user cannot Check in hotel smoothly, and this has just brought inconvenience to the user. In addition, if the user loses hi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06Q10/10H04L29/06
CPCH04L63/08G06F21/31G06Q10/10Y02D30/50
Inventor 刘静刘洪欧阳维良胡驰飞于霄雪
Owner 北京金钝宏安科技有限公司