Identity authentication method, device and equipment

A technology of identity authentication and authentication methods, applied in the field of identity recognition, can solve problems such as inability to handle business, failure of user identity authentication, etc.

Inactive Publication Date: 2020-04-07
BANK OF CHINA
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the user is authenticated by multiple authentication methods specified by the service provider, often because the user can only pass some of the multiple authentication methods specified by the service provider, the user's identity authentication fails and the relevant business cannot be handled in the end.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and equipment
  • Identity authentication method, device and equipment
  • Identity authentication method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0053] Such as figure 1 As shown, an identity authentication method provided by an embodiment of the present invention may include:

[0054] S100. Obtain an authentication mode group selected by a user, wherein the authentication mode group includes: at least two authentication modes among password authentication, verification code authentication, network electronic identity authentication, and biometric information authentication....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, device and equipment. An authentication mode group selected by a user can be obtained; corresponding authentication is performed according tothe authentication mode selected by the user and an authentication result is obtained; and when the authentication result of each authentication mode in the authentication mode group is that the authentication is passed, it is determined that the identity authentication of the user is successful, and identity authentication is performed on the user according to at least two identity authentication modes selected by the user, thereby facilitating the user to complete the identity authentication according to own actual conditions, and facilitating the user to handle related services in time.

Description

technical field [0001] The present invention relates to the field of identity identification, in particular to an identity authentication method, device and equipment. Background technique [0002] Currently, in order to ensure the security of users' personal information and property, service providers often need to authenticate users when they handle related services. In order to prevent risks brought by only one identity authentication method for users, service providers often use multiple authentication methods to authenticate users. For example: users need to pass password authentication and verification code authentication to handle related businesses. [0003] However, when the user is authenticated by multiple authentication methods specified by the service provider, often because the user can only pass part of the multiple authentication methods specified by the service provider, the user's identity authentication fails in the end and related services cannot be proc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0838H04L63/0861H04L63/0876H04L63/18
Inventor 何胜许彬彬赵丽
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products