Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Near field information authentication method and device, electronic equipment and computer storage medium

A near-field, pending-authentication technology, applied in the field of information authentication, can solve the problems of poor practicability and convenience

Active Publication Date: 2019-05-03
XUNTENG (GUANGDONG) TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a method, device, electronic equipment and computer storage medium for near-field information authentication, so as to alleviate the technical problems of poor practicability and poor convenience of the existing information authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Near field information authentication method and device, electronic equipment and computer storage medium
  • Near field information authentication method and device, electronic equipment and computer storage medium
  • Near field information authentication method and device, electronic equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] According to an embodiment of the present invention, an embodiment of a method for near-field information authentication is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.

[0041] figure 1 is a flowchart of a method for near-field information authentication according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0042] Step S102: Obtain the current location information of the object to be authenticated, and then determine the target grid area where the object to be authenticated is located, wherein, when the object to be authenticated is located within a preset range of its authorized merchant, the user terminal ...

Embodiment 2

[0156] An embodiment of the present invention further provides an apparatus for near-field information authentication, and the apparatus for near-field information authentication is mainly used to execute the near-field information authentication method provided by the above content of the embodiment of the present invention. The device for near-field information authentication is introduced in detail.

[0157] Figure 7 is a schematic diagram of a near-field information authentication device according to an embodiment of the present invention, such as Figure 7 As shown, the device for near-field information authentication mainly includes an acquisition module 10, a reception module 20, a determination module 30 and an information authentication module 40, wherein:

[0158] The obtaining module is used to obtain the current position information of the object to be authenticated, and then determine the target grid area where the object to be authenticated is located. Periodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a near field information authentication method and device, electronic equipment and a computer storage medium, and the method comprises the steps: obtaining the current positioninformation of a to-be-authenticated object, and determining a target grid area where the to-be-authenticated object is located; receiving an identity authentication request sent by the target service terminal; determining effective users of the target service terminal according to the information of the target service terminal, and determining biological characteristic information of each effective user; and performing identity authentication according to the biological characteristic information of the living body of the to-be-authenticated object and the biological characteristic information of each effective user. When the information authentication is carried out on the to-be-authenticated object, the information authentication is realized through the living body biological characteristic information of the to-be-authenticated object, a user does not need to provide an entity identity card, the information authentication process is simplified, and the user experience when the user carries out information authentication is improved; only when the to-be-authenticated object is within the preset range of the authorized merchant, the current position information of the to-be-authenticated object is sent to the server, so that the position privacy of the user is ensured.

Description

technical field [0001] The present invention relates to the technical field of information authentication, and in particular, to a method, device, electronic device and computer storage medium for near-field information authentication. Background technique [0002] With the continuous development of network technology and automation equipment technology, various electronic self-service terminals including banks, electronic taxation, electronic police, electronic vehicle management offices, airports, high-speed railway stations, hotels, etc. It reduces operating expenses and improves work efficiency, that is, it increases the convenience for people to work. [0003] However, when handling business, it is often necessary to present a physical ID card. In today's electronic age, it is impossible to handle various businesses without carrying an ID card, which will inevitably affect people's travel. [0004] To sum up, the existing methods of information authentication through p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/4015G06Q20/3224G06Q20/40145G06Q20/02G06Q20/206G06Q20/3276G06F21/32G06F21/44H04W12/06H04W12/63H04W12/47H04L63/0861H04L63/102G06Q20/409G06Q20/405G06Q20/382G06Q20/327G06V40/45G06Q20/065
Inventor 简伟明皮爱平黄飞鹰梁华贵陈秋榕
Owner XUNTENG (GUANGDONG) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products