Automatic authentication method and device, equipment and storage medium
An authentication method and technology to be authenticated, applied in the field of devices, equipment and storage media, and automatic authentication methods, can solve the problems of cumbersome authentication process and low authentication efficiency, and achieve the effects of saving manpower, improving authentication efficiency, and the convenience of authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] figure 2 The flow chart of the automated authentication method provided by Embodiment 1 of the present invention, this embodiment is applicable to the situation where the user submits the authentication data submitted by the user when registering on the employment platform. This method can be implemented by an automated authentication device to execute. see figure 1 , including the following steps:
[0024] S110. Obtain the video of the willingness to be authenticated and the image of the ID card to be authenticated submitted by the user.
[0025] In this embodiment, when the user wants to complete the incubating operation on the employment platform, that is, to complete the registration as a platform user, he needs to upload relevant materials to be authenticated to the employment platform through the client, and verify whether the relevant authentication materials meet the requirements of the platform. Authentication rules to implement user registration operations...
Embodiment 2
[0046] image 3 It is a schematic structural diagram of an automatic authentication device provided in Embodiment 2 of the present invention. The automatic authentication device provided in this embodiment of the present invention can execute an automatic authentication method described in any one of the above-mentioned embodiments of the present invention. see image 3 , the device may specifically include an acquisition module 210 and an authentication module 220 .
[0047] Wherein, the above-mentioned obtaining module 210 is used for obtaining the willingness video to be authenticated and the picture of the ID card to be authenticated submitted by the user;
[0048] The authentication module 220 is used to determine whether the video of the willingness to be authenticated and the image of the ID card to be authenticated comply with the authentication rules based on the image analysis technology and the audio processing technology, and if so, the authentication is passed. ...
Embodiment 3
[0063] Figure 4 It is a schematic structural diagram of a device provided by Embodiment 3 of the present invention. Figure 4 A block diagram of an exemplary device 12 suitable for use in implementing embodiments of the invention is shown. Figure 4 The shown device 12 is only an example and should not impose any limitation on the functions and scope of use of the embodiments of the present invention.
[0064] Such as Figure 4 As shown, device 12 takes the form of a general purpose computing device. Components of device 12 may include, but are not limited to: one or more processors or processing units 16, system memory 28, bus 18 connecting various system components including system memory 28 and processing unit 16.
[0065] Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus structures. These architectures i...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com