Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device

A technology for identity authentication and identity authentication results, applied in the field of identity authentication methods and devices, can solve the problems of unreasonable identity authentication methods and poor user experience, and achieve the effect of flexible identity authentication methods and good user experience.

Active Publication Date: 2019-07-12
DEEPBLUE TECH (SHANGHAI) CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an identity authentication method and device to solve the problems of unreasonable identity authentication methods and poor user experience in the access control system in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to solve the problems of unreasonable identity authentication methods and poor user experience in the access control system in the prior art, embodiments of the present application provide an identity authentication method and device.

[0049] The preferred embodiments of this application will be described below in conjunction with the accompanying drawings of the specification. It should be understood that the preferred embodiments described here are only used to illustrate and explain this application, and are not used to limit this application, and in the case of no conflict, this application The embodiments in and the features in the embodiments can be combined with each other.

[0050] See figure 1 , figure 1 Shows a schematic diagram of the application scenario of the identity authentication method provided by the embodiments of the present application, including a server, an access control terminal, and an access control system. The access control system inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and device, and belongs to the technical field of information security. The identity authentication device is applied to an access control system with two or more identity authentication methods;theidentity authentication method comprises the steps that an identity authentication request sent by an access control terminal is received, the identity authentication request comprises the identity authentication information collected by the access control terminal and identity authentication method identification information used for authenticating the identity authentication information; whether the identity authentication method corresponding to the identification information is an effective identity authentication method of the accesscontrol system or not is determined;if yes, then the identity authentication information is authenticated according to the identity authentication method corresponding to the identification information, and whether to control the access control terminal to open the door lock or not is determined according to an identity authentication result; and otherwise, the identity authentication request isrejected.

Description

Technical field [0001] This application relates to the field of information security technology, and in particular to an identity authentication method and device. Background technique [0002] At present, access control systems are set up in communities, buildings and other places to prevent users without authorization from entering and exiting communities or buildings at will, and to strengthen the security of communities or buildings. [0003] In the prior art, the access control system generally uses fingerprints or swiping cards to identify the user's identity. If a legitimate user's finger is injured, the user's identity cannot be identified, and the door cannot be opened. In addition, if a legitimate user forgets to bring the card, the door cannot be opened, these conditions will affect the user experience. [0004] It can be seen that the access control system in the prior art has problems of unreasonable identity authentication methods and poor user experience. Summary of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/20G07C9/27G07C9/37G07C9/38
Inventor 陈海波
Owner DEEPBLUE TECH (SHANGHAI) CO LTD