Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity verification method and identity verification device

An identity verification method and identity verification technology, applied in computer security devices, digital data authentication, data processing applications, etc., can solve problems such as damage to user C's interests, user loss, and other mobile phone users who do not know how to communicate, and achieve The verification process is simple and fast, and the effect of ensuring the flow

Active Publication Date: 2019-07-09
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when users use social software for text communication, they do not know whether the communication partner is the mobile phone user himself, which may cause losses to users.
[0004] For example, user A loses his mobile phone and is picked up by user B. User B borrows money from user C using the mobile phone he found. User C does not know that it is user B who borrowed money, not user C. If he transfers the money rashly, it may cause The interests of user C are damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0065] figure 1 It is a schematic flowchart of an identity verification method shown according to an embodiment of the present disclosure. The identity verification method can be applied to an identity verification system including a first terminal, a second terminal and a verification device. Wherein, the first terminal and the second terminal can be mobile phones, tablet computers,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity verification method, which comprises the following steps that: when a first terminal receives a first instruction, the first terminal sends an identity verification program to a second terminal which is in communication with the first terminal; when the second terminal runs the identity verification program, an image acquisition device of the second terminal acquires an image, and the second terminal sends the acquired image and second identity information of the second terminal to the verification device; the verification device inquires an image of a userof a second terminal corresponding to the second identity information, the verification device verifies whether the collected image is matched with the image of the user, and / or the verification device inquires target identity information corresponding to the collected image, and the verification device verifies whether the target identity information is matched with the second identity information; and the verification device sends a verification result to the first terminal. According to the embodiment of the invention, the user A can complete the verification of the user identity of the second terminal without initiating complex operations such as video chatting, and the verification process is simple and rapid.

Description

technical field [0001] The present disclosure relates to the technical field of communication, and in particular to an identity verification method, an identity verification device, electronic equipment and a computer-readable storage medium. Background technique [0002] Social software is a common application program that people use mobile phones to communicate in daily life. With the development of mobile phone functions, the functions of social software have also been developed. For example, operations such as transferring money can be performed through social software. [0003] However, when users use social software for text communication, they do not know whether the communication partner is the mobile phone user himself, which may cause losses to users. [0004] For example, user A loses his mobile phone and is picked up by user B. User B borrows money from user C using the mobile phone he found. User C does not know that it is user B who borrowed money instead of us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/30G06Q50/00
CPCG06F21/305G06F21/31G06Q50/01
Inventor 邢政谢迎春
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD