Identity authentication method, system and device and computer storage medium

A technology of identity authentication and authentication methods, which is applied in the field of identity authentication methods, systems, devices, and computer storage media, and can solve the problems of long time-consuming authentication process and heavy processing burden of business servers

Active Publication Date: 2020-08-18
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this application provides an identity authentication method, system, device and computer storage medium, which can be used to solve the ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system and device and computer storage medium
  • Identity authentication method, system and device and computer storage medium
  • Identity authentication method, system and device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0111] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0112] Before explaining the embodiment of the present application in detail, the application scenario of the embodiment of the present application will be described first.

[0113] With the rapid development of the financial industry and the Internet, users tend to conduct financial business-related operations through authentication terminals such as mobile phones. For example, log in to the mobile client for online consumption, or cancel and handle business through online banking. In order to further protect the data security between business parties and users, more and more offline and online businesses gradually require identity authentication. For example, in the process of applying for a bank card online or making online pay...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, system and device and a computer storage medium, and belongs to the field of business processing, wherein the method comprises the followingsteps: forming a substrate; the authentication server receives an authentication detection request sent by the service server, according to a service identifier of a target service carried by the authentication detection request, determining N identity authentication modes configured by the target service from the service configuration information of the target service, at least one available identity authentication mode is determined from the N identity authentication modes, mode information of the at least one available identity authentication mode is sent to the authentication terminal through the service server, the authentication terminal displays an available authentication mode list, and the available authentication mode list comprises the at least one available identity authentication mode. That is to say, the authentication server performs availability detection on the identity authentication modes in a unified manner; unavailable authentication modes can be screened out; onlythe available authentication modes are presented to the user; the possibility of authentication failure is reduced; and the authentication time is saved.

Description

technical field [0001] The present application relates to the field of business processing, in particular to an identity authentication method, system, device and computer storage medium. Background technique [0002] With the development of Internet technology, in order to ensure the data security of users during business processing, the business side needs to authenticate users to verify the authenticity of user identities. Through identity authentication, it helps to establish a sound and reliable Internet credit foundation between business parties and users. [0003] In related technologies, when a user processes a service, the service server corresponding to the processed service usually performs identity authentication for the user. When the service server of a certain service receives the user's identity authentication request, it needs to first determine at least one authentication method configured for the service, and provide the at least one authentication method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06Q40/02
CPCG06F21/32G06Q40/02
Inventor 闫洪康李昊吕亚明赵发刘保江
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products