Identity authentication method and system, computer equipment and computer readable storage medium

An identity authentication and real-name authentication technology, applied in the computer field, can solve problems such as low security, cumbersome operation, error-prone input information, etc., to achieve the effect of improving accuracy and security, and improving the efficiency of face recognition

Pending Publication Date: 2019-11-26
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the operation of this scheme is cumbersome, and it is easy to make mistakes when entering information; the security is low, and if the relevant information is leaked, malicious third parties can easily use the identity information to pass the authentication, thereby obtaining data illegally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system, computer equipment and computer readable storage medium
  • Identity authentication method and system, computer equipment and computer readable storage medium
  • Identity authentication method and system, computer equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] refer to figure 1 , shows a flow chart of the steps of the identity authentication method in Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. An exemplary description is given below taking the computer device 2 as the execution subject. details as follows.

[0057] Step S100, receiving registration request information from a user, and transmitting the registration request information to a server.

[0058] Specifically, when the terminal accepts the registration request information input by the user, the terminal transmits the registration request information to the server.

[0059] Step S102, receiving response information returned by the server based on the registration request information, where the response information includes facial data acquisition information.

[0060] Specifically, after receiving the registration request information, the server gene...

Embodiment 2

[0098] read on Figure 5, shows a schematic diagram of program modules of Embodiment 2 of the identity authentication system of the embodiment of the present invention. In this embodiment, the identity authentication system 20 may include or be divided into one or more program modules, and one or more program modules are stored in a storage medium and executed by one or more processors to complete this Embodiment of the invention, and can realize the above identity authentication method. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable for describing the execution process of the identity authentication system 20 in the storage medium than the program itself. The following description will specifically introduce the functions of each program module of the present embodiment:

[0099] The first receiving module 200 is configured ...

Embodiment 3

[0132] refer to Figure 6 , is a schematic diagram of the hardware architecture of the computer device according to Embodiment 3 of the present invention. In this embodiment, the computer device 2 is a device capable of automatically performing numerical calculation and / or information processing according to preset or stored instructions. The computer device 2 may be a rack server, a blade server, a tower server or a cabinet server (including an independent server, or a server cluster composed of multiple servers) and the like. Such as Figure 6 As shown, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 and an identity authentication system 20 that can communicate with each other through a system bus. in:

[0133] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity authentication method which comprises the following steps: receiving registration request information of a user, and transmitting the registrationrequest information to a server; receiving response information returned by the server based on the registration request information; starting an image acquisition device to acquire a current face image according to the face data acquisition information, and acquiring current face data of the user through the current face image; uploading the current face data to a server, and obtaining user information of the user; receiving user information of the user provided by the server, and displaying the user information on a display screen; and receiving a confirmation instruction of the user, and transmitting the confirmation instruction to the server to complete user registration. The embodiment of the invention provides an identity authentication system, computer equipment and a readable storage medium. According to the embodiment of the invention, the face recognition efficiency in a complex environment is improved, and the accuracy and safety of information entry are improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular, to an identity authentication method, system, computer equipment, and computer-readable storage medium. [0002] technical background [0003] With the development of science and technology, more and more applications (Application, App) have been developed on mobile terminals such as mobile phones and tablets, which can realize various functions. For example, medical platform apps such as medical platforms can replace traditional hospital stores, and can access personal accounts to view or apply for services through the medical platform. The popularization of Apps such as medical platforms saves users' itinerary and queuing time for handling business, liberates the human and material resources of service departments, improves business processing efficiency, and brings great convenience to users' lives. [0004] However, before using the medical platf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/45G06K9/00
CPCG06F21/32G06F21/45G06F2221/2133G06V40/168
Inventor 杨剑青
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products