Identity authentication method, payment method and payment equipment
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An identity authentication and identity technology, applied in the computer field, can solve problems such as time-consuming
Pending Publication Date: 2020-05-19
BEIJING WODONG TIANJUN INFORMATION TECH CO LTD +1
View PDF2 Cites 3 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0005] The existing identity authentication based on face recognition requires
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0074] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
[0075] It should be noted that, in the case of no conflict, the embodiments of the present invention and the technical features in the embodiments can be combined with each other.
[0076] Most of the verification methods of the existing face recognition methods are in the form of verifying the mobile phone number, which takes a certain amount of time. For this reason, the ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses an identity authentication method, a payment method and payment equipment, and relates to the technical field of computers. A specific embodiment of the method comprises the steps of performing face recognition on a user to obtain an undetermined identity, and calculating recognition precision corresponding to the undetermined identity; when the recognition precision is within a preset range, reading a pre-stored gesture of the to-be-determined identity from an identity server, and obtaining a gesture action of the user; and comparing the gesture action with a pre-stored gesture to complete identity authentication. According to the embodiment, verification is completed through the gesture of the user, manual operation of the user is not needed any more, and the identity authentication efficiency is improved.
Description
technical field [0001] The invention relates to the field of computer technology, in particular to an identity authentication method, payment method and payment device. Background technique [0002] Face recognition is a biometric technology for identification based on human facial feature information. A series of related technologies that use a video camera or camera to collect images or video streams containing human faces, automatically detect and track human faces in the images, and then perform facial recognition on the detected faces, usually also called portrait recognition and facial recognition. . Face recognition has become a leader in biometrics due to its non-invasiveness, convenience, friendliness, non-contact, scalability, etc., and has been widely used in finance, justice, military, public security, border inspection, government, aerospace, electric power , factories, education, medical care, and many enterprises and institutions, such as identity recognitio...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.
Login to view more
IPC IPC(8): G06K9/00G06K9/62G06Q20/40
CPCG06Q20/40145G06V40/70G06F18/22
Inventor 姜盛乾付先凯许涵博孙宇晨
Owner BEIJING WODONG TIANJUN INFORMATION TECH CO LTD