Method and device for providing and acquiring security identity information

An identity information and security technology, which is applied in the direction of secure communication devices, security devices, computer security devices, etc., can solve the problems of face verification breaches (attacks against real-name and real-person verification, etc., to achieve flexible and convenient verification and ensure accuracy. and authoritative effect

Active Publication Date: 2019-04-16
ADVANCED NEW TECH CO LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, identity verification based on electronic certificates also faces security threats: for example, the photo of the electronic version of the ID card may be ps (attack against real-name verification), face verification may be broken (attack against real-name and real-person verification), etc. A credible verification source is needed to provide identity verification services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for providing and acquiring security identity information
  • Method and device for providing and acquiring security identity information
  • Method and device for providing and acquiring security identity information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0075] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. according to figure 1 In the embodiment, each business party that needs security identity information (that is, the aforementioned scene merchant) registers with the registration platform in advance, and the registration platform generates its own two-dimensional code for each business party. In the scenario where identity verification or identity information needs to be provided offline, the user does not need to directly provide the identity information to the staff of the business party, but scans the QR code displayed by the business party through a trusted application, and then the acquired user Identity information is submitted to an authoritative third-party verification source for identity verification. After passing the ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a method and a device for providing and acquiring security identity information. Under the scene that identity verification needs to be carried out offline or identity information is provided offline, a user can scan a two-dimensional code displayed by a service party through a trusted application, and the two-dimensional code is generated by registering the service party with a registration platform in advance. After the credible application scans the code, the credible application obtains which identity information the service party needs by inquiring inthe registration platform, and then the identity information of the user is collected and obtained. And then, the trusted application sends the acquired identity information to a verification source for verification, encrypts the verified identity information, and forwards the encrypted identity information to a service party through the registration platform.

Description

technical field [0001] One or more embodiments of this specification relate to the field of identity security authentication, and in particular, to methods and devices for providing and obtaining secure identity information. Background technique [0002] In various offline application scenarios, the traditional identity verification of users is usually based on certificates, which follows the logic of "verifying the authenticity of people's identity through certificates". In the specific implementation, the natural person provides the certificate (such as ID card, passport, etc.), and the natural person representing the scene merchant (such as the front desk staff of the hotel, the window staff of the administrative hall) confirms the corresponding relationship between the user and the certificate through visual inspection. And through visual inspection or the assistance of card reading equipment to confirm the authenticity of the certificate, on this basis, the required ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06Q50/26
CPCG06Q30/018G06Q50/265G06Q30/0609G06F21/36G06F21/32H04L63/0442H04W12/06H04L63/0884G06Q30/0185G06Q30/0225G06Q30/0248G06Q50/18H04L9/3228H04L9/3234G06F21/602G06F21/6209G06K19/06037
Inventor 谷晨落红卫
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products