Terminal authentication method and server

An authentication method and terminal technology, applied in the field of terminal authentication methods and servers, can solve problems such as authentication failure and users' inability to self-help, and achieve the effect of improving user experience and authentication success rate

Pending Publication Date: 2021-07-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the difference between the photo of the ID card and the identity of the person, the verification may fail, and the user cannot activate related services online by himself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentication method and server
  • Terminal authentication method and server
  • Terminal authentication method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific implementation manners of the present application will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementations described here are only used to illustrate and explain the present application, and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present application by showing examples of the present application.

[0029] It should be noted that in the technical solutions involved in this application, the acquisition of user personal information data follows relevant national laws and regulations (for example, "Information Security Technology Personal Information Security Specifications", etc.). In addition, the method of obtaining information is to clearly i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal authentication method and a server, and relates to the technical field of communication. The terminal authentication method comprises the following steps: determining a video verification score according to preset video information and obtained video information of a to-be-authenticated terminal; determining a first verification result according to the video verification score and a preset threshold value; acquiring to-be-verified communication information of the to-be-authenticated terminal; determining a second verification result according to the to-be-verified communication information and preset communication information; and determining whether the to-be-authenticated terminal passes authentication according to the first verification result and the second verification result. Through different verification dimensions, the accuracy of the authentication result is determined, the authentication success rate of the to-be-authenticated terminal is improved, a user can safely complete opening of online services in a self-service manner, and the user experience is improved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a terminal authentication method and server. Background technique [0002] At present, with the rapid development of the mobile Internet and the development of the communication industry, the needs of users are also constantly improving. Users can open an online account on the 5th Generation Mobile Networks (5G) self-service and fast through the mobile Internet, and users can also complete real-name authentication through the mobile Internet, eliminating the need for users to go to offline business halls to handle business the inconvenience. [0003] However, during the process of opening a 5G online account, after the user selects the number, the user will be required to upload a photo of the front / back of his ID card, and then a biometric verification will be performed on the user to determine whether it is the person handling the business. However, due t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W12/06H04W12/40
CPCH04W8/18H04W12/06
Inventor 肖征荣张猛邢建兵田新雪
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products