Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity authentication method and device, electronic equipment and readable storage medium

A technology of user identity and verification method, which is applied in the fields of devices, electronic equipment and readable storage media, and user identity verification methods, and can solve the problems of inability to confirm key login, user economic or other losses, and inability to judge whether a product processing instruction is for the user Personal real wishes and other issues to achieve the effect of ensuring authenticity and improving security

Pending Publication Date: 2021-10-08
PING AN TRUST CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The current product system generally only needs to log in with the key to perform product processing. For example, when purchasing a product, due to the relatively simple authentication mechanism of the key, the existing product data method cannot confirm whether the key login is operated by the user himself. In addition, Since the key login cannot determine whether the product processing instruction is the user's true will, and whether the user really understands the meaning of product processing, it is easy to bring economic or other losses to the user due to security issues, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device, electronic equipment and readable storage medium
  • User identity authentication method and device, electronic equipment and readable storage medium
  • User identity authentication method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] An embodiment of the present invention provides a user identity verification method. The subject of execution of the user identity verification method includes, but is not limited to, at least one of electronic devices such as a server and a terminal that can be configured to execute the method provided by the embodiment of the present application. In other words, the user identity verification method can be executed by software or hardware installed on the terminal device or server device, and the software can be a block chain platform. The server includes, but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.

[0048] refer to figure 1 Shown is a schematic flowchart of a user identity verification method provided by an embodiment of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, and discloses a user identity authentication method, which comprises the following steps: logging in a product system according to user key information, and performing user authentication through biological recognition information when a product processing instruction sent by a user through a product system is received; when the user passes the authentication, generating a product processing document, and receiving an electronic signature of the user on the product processing document and a face-to-face signature video obtained by executing AI video face-to-face signature on the user; if the electronic signature authentication is not passed or the user will is not real through micro-expression analysis of the face-to-face signature video, skipping to an artificial face-to-face signature page; and if the electronic signature authentication is passed and the willingness of the user is true, executing a corresponding product processing operation. The invention further provides a user identity authentication device, electronic equipment and a storage medium. According to the invention, the safety of product processing can be improved, and the willingness authenticity of the user during product processing is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a user identity verification method, device, electronic equipment and a readable storage medium. Background technique [0002] The current product system generally only needs to log in with the key to perform product processing. For example, when purchasing a product, due to the relatively simple authentication mechanism of the key, the existing product data method cannot confirm whether the key login is operated by the user himself. In addition, Since the key login cannot determine whether the product processing instruction is the user's true will, and whether the user really understands the meaning of product processing, it is easy to bring economic or other losses to the user due to security issues. Contents of the invention [0003] The invention provides a user identity verification method, device, electronic equipment and computer-readable storage medium, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/36
CPCG06F21/32G06F21/36
Inventor 林城彬陈欢欢杨明温强阳超马万里张开李诗李翠
Owner PING AN TRUST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products