Real-name authentication method and device

A real-name authentication and real-name technology, applied in the computer field, can solve problems such as complex authentication process, troublesome users, and poor experience, and achieve the effect of reducing complexity, reducing operations, and improving user experience

Active Publication Date: 2022-04-15
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current real-name authentication authentication process in the Internet industry is too complicated, and requires users to participate in the authentication process. For example, binding bank cards, holding photos, etc. can only be completed, which brings some troubles to users and poor experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-name authentication method and device
  • Real-name authentication method and device
  • Real-name authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the specification. However, this specification can be implemented in many other ways different from those described here, and those skilled in the art can make similar extensions without violating the connotation of this specification, so this specification is not limited by the specific implementations disclosed below.

[0040] Terms used in one or more embodiments of this specification are for the purpose of describing specific embodiments only, and are not intended to limit one or more embodiments of this specification. As used in one or more embodiments of this specification and the appended claims, the singular forms "a", "the", and "the" are also intended to include the plural forms unless the context clearly dictates otherwise. It should also be understood that the term "and / or" used in one or more embodiments of the present specification refers t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification provides a real-name authentication method and device, wherein the real-name authentication method includes: receiving the identity information to be authenticated of the user to be authenticated; obtaining the real-name identity matching the device information of the user to be authenticated from the real-name identity information database information, wherein the real-name identity information database includes the corresponding relationship between the equipment information of users inside and outside the system and the real-name identity information, and the corresponding relationship is mined based on the relationship between the real-name behavior data and equipment information of users inside and outside the system; through Comparing the real-name identity information of the user to be authenticated with the identity information to be authenticated, and performing real-name authentication on the identity information to be authenticated of the user to be authenticated.

Description

technical field [0001] The embodiments of this specification relate to the field of computer technology, and in particular to a real-name authentication method. One or more embodiments of this specification also relate to a real-name authentication device, a computing device, and a computer-readable storage medium. Background technique [0002] Real-name authentication: Real-name authentication is a verification review of the authenticity of user data. Internet companies' real-name authentication of users is not only a requirement for network order supervision and management, but also helps companies determine the identity of their users. Establish a mutually perfect and reliable Internet credit foundation, which will help enterprises to better conduct business. [0003] However, the current real-name authentication authentication process in the Internet industry is too complicated, and requires users to participate in the authentication process. For example, binding bank ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/31G06F16/36G06F16/2458G06Q50/26
CPCH04L63/08G06F21/31G06F16/367G06F16/2465
Inventor 朱通范丰麟孙传亮赵华
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products