Real-name authentication method and device

A real-name authentication and real-name technology, applied in the computer field, can solve the problems of user trouble, complex authentication process, poor experience, etc.

Active Publication Date: 2020-02-18
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current real-name authentication authentication process in the Internet industry is too complicated, and requires users to participate in the authentication process. For example, binding bank cards, holding photos, etc. can only be completed, which brings some troubles to users and poor experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-name authentication method and device
  • Real-name authentication method and device
  • Real-name authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In the following description, many specific details are explained in order to fully understand this specification. However, this specification can be implemented in many other ways different from those described herein, and those skilled in the art can make similar promotion without violating the connotation of this specification. Therefore, this specification is not limited by the specific implementation disclosed below.

[0040] The terms used in one or more embodiments of this specification are only for the purpose of describing specific embodiments, and are not intended to limit one or more embodiments of this specification. The singular forms of "a", "said" and "the" used in one or more embodiments of this specification and the appended claims are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and / or" used in one or more embodiments of this specification refers to and includes any...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a real-name authentication method and device. The real-name authentication method comprises the steps of receiving to-be-authenticated identity information of a to-be-authenticated user; obtaining the real-name identity information from a real-name identity information base; acquiring real-name identity information matched with the equipment information of theto-be-authenticated user, the real-name identity information library comprising a corresponding relationship between the equipment information of the users inside and outside the system and the real-name identity information, and the corresponding relationship being mined based on a relationship between real-name behavior data of the users inside and outside the system and the equipment information; and comparing the real-name identity information of the to-be-authenticated user with the to-be-authenticated identity information, and performing real-name authentication on the to-be-authenticated identity information of the to-be-authenticated user.

Description

Technical field [0001] The embodiments of this specification relate to the field of computer technology, and in particular to a real-name authentication method. One or more embodiments of this specification simultaneously relate to a real-name authentication device, a computing device, and a computer-readable storage medium. Background technique [0002] Real-name authentication: Real-name authentication is a verification audit for the authenticity of user information. The real-name authentication of users by Internet companies is not only a requirement for network order supervision and management, but also helps enterprises determine the identity of their users. The establishment of a mutually complete and reliable Internet credit foundation is conducive to better business development of enterprises. [0003] However, the current real-name authentication method authentication process in the Internet industry is too complicated and requires users to participate in the authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/31G06F16/36G06F16/2458G06Q50/26
CPCH04L63/08G06F21/31G06F16/367G06F16/2465
Inventor 朱通范丰麟孙传亮赵华
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products