Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and system, electronic equipment and computer readable storage medium

A technology for identity authentication and identity verification, applied in the field of identity authentication methods and systems, and computer-readable storage media, can solve the problems that cannot fully satisfy the active defense, deciphering, and poor anti-counterfeiting of enterprise user identity information security.

Inactive Publication Date: 2019-05-28
SHENZHEN POWER SUPPLY BUREAU
View PDF7 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The enterprise information system stores a large amount of key information such as people, property, and goods, and the identity authentication of the enterprise information system still uses the traditional password, password, and digital certificate. , forgery, misappropriation, deciphering and other phenomena, there are certain security risks, which can no longer fully meet the needs of active defense of enterprise user identity information security
At the same time, it is difficult to trace the official identity of the illegal intruder, which makes it difficult to effectively recover the material and economic losses suffered by the company due to the lack of strong evidence.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system, electronic equipment and computer readable storage medium
  • Identity authentication method and system, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps closely related to the solution according to the present invention are shown in the drawings, and the related Other details are not relevant to the invention.

[0026] like figure 1 As shown, Embodiment 1 of the present invention provides an identity authentication method, which can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and system, an electronic device, a computer readable storage medium. The method comprises the following steps that first identity verificationis conducted according to user information input by a user, the user information at least comprises a user name and a password, whether the input user name is matched with the password or not is determined according to the user information stored in a database, if yes, second identity verification is conducted, and if not, user verification fails is prompted; And collecting user face feature information to carry out second identity verification, determining whether the collected user face feature information is matched with user information input by the user according to the face feature information stored in the database, if so, granting a corresponding authority to the user, and if not, prompting that the user verification fails. The system, the electronic equipment and the computer readable storage medium are used for realizing the method. According to the invention, a safe, reliable and flexible integrated face recognition authentication service and early warning are provided foran enterprise, and the requirement of enterprise user identity information security active defense is better met.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, in particular to an identity authentication method and system, electronic equipment, and a computer-readable storage medium. Background technique [0002] The enterprise information system stores a large amount of key information such as people, property, and goods, and the identity authentication of the enterprise information system still uses the traditional password, password, and digital certificate. , Forgery, embezzlement, deciphering and other phenomena, there are certain security risks, which can no longer fully meet the needs of active defense of enterprise user identity information security. At the same time, it is difficult to trace the official identity of the illegal intruder, which makes it difficult to effectively recover the material and economic losses suffered by the company due to the lack of strong evidence. Contents of the invention [0003] The pur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/46G06K9/00
Inventor 李厚恩饶竹一李智诚
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products