Identity authentication method, device and system

An identity authentication and identity information technology, applied in the field of identity authentication, can solve the problems of inconvenient operation and low interaction efficiency, and achieve the effect of simplifying user operation, improving interaction efficiency, and improving interaction security.

Active Publication Date: 2020-11-27
ADVANCED NEW TECH CO LTD
View PDF12 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the user may often be in an inconvenient scene, such as carrying a lot of luggage, resulting in low interaction efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] figure 1 It is a schematic structural diagram of an identity authentication system provided by an exemplary embodiment of the present application. Such as figure 1 As shown, the system may include a server 11, a network 12, several user devices (such as a mobile phone 13, a mobile phone 14, etc.) and interactive devices (such as a cash register device 15, a cash register device 16, etc.).

[0051] The server 11 may be a physical server including an independent host, or the server 11 may be a virtual server hosted by a host cluster, or the server 11 may be a cloud server. During operation, the server 11 can run a server-side program of a certain application to realize the relevant business functions of the application. For example, when the server 51 runs an interactive operation program, it can be configured as a service for realizing the interactive function end.

[0052] A cell phone 13-14 is just one type of user equipment that a user may use. In fact, users can ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method, device and system. The method comprises the steps: that an interaction end receives an interaction instruction initiated for a user, and obtains the identity information of the user; the interaction terminal sends an identity recognition request to the server; wherein the identity recognition request comprises the identity information; wherein the identity recognition request is used for indicating the server to match the identity information with standard identity information of candidate users corresponding to the interaction terminalso as to determine a user account corresponding to the user, and the user account is used for responding to an interaction operation corresponding to the interaction instruction; wherein the user near the interaction terminal is marked as a corresponding candidate user by the server. According to the technical scheme, the identity recognition efficiency and recognition accuracy of the user can beimproved, and the interaction efficiency and safety can be improved.

Description

technical field [0001] The present application relates to the technical field of identity authentication, in particular to an identity authentication method, device and system. Background technique [0002] In related technologies, interactive operations can be implemented between users. During the implementation of the interactive operation, one party uses the interactive device and the other uses the user device, so that the user of the user device can obtain an interactive object of interest, and the provider of the interactive object can communicate between the interactive device and the user device. The interactive operation realized between users obtains the corresponding interactive resources from the user. [0003] In related technologies, the above-mentioned user needs to manually manipulate the user equipment to complete the interactive operation between the user equipment and the interactive device. However, the user may often be in an inconvenient scene, such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/46G06Q20/18G06Q20/20G06Q20/32G06Q20/36G06Q20/40H04W4/80
CPCG06Q20/40145G06Q20/325G06Q20/4014G06Q20/40G06Q20/3674G06Q20/18H04W4/80G06V10/40G06Q20/20G07G1/0009G07G1/14G06Q20/202G06Q20/40155G06Q20/3223G06Q20/3224G06Q20/327G06V40/16
Inventor 陈力张鸿周乐
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products