Identity authentication method and system
An identity authentication and user authentication technology, applied in the field of identity authentication, can solve the problems of inability to verify whether the identity authentication device is the owner, the identity authentication level is low, and the security is low, so as to reduce the risk of being cracked and avoid being hacked. The effect of malicious theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] like figure 1 As shown, the embodiment of the present application provides an identity authentication method, and the method includes:
[0031] Step S100: Obtain user input information and user authentication device information, wherein the user authentication device information has preset verification information;
[0032] Further, the user input information includes fingerprint information and password information.
[0033] Specifically, the user input information is collected according to the verification information set by the user authentication device, including fingerprint information, password information, or other verification information. Among them, fingerprint information is preferred.
[0034] Step S200: judging whether the user input information is the same as the preset verification information;
[0035] Step S300: when the same, obtain first pass information, the first pass information is used to pass the authentication of the user authentication devi...
Embodiment 2
[0063] Based on the same inventive concept as an identity authentication method in the foregoing embodiment, as shown in FIG. 2, the present application provides an identity authentication system, wherein the system includes:
[0064] a first obtaining unit 11, the first obtaining unit 11 is configured to obtain user input information and user authentication device information, wherein the user authentication device information has preset verification information;
[0065] a first judging unit 12, the first judging unit 12 is used to judge whether the user input information is the same as the preset verification information;
[0066] The second obtaining unit 13, the second obtaining unit 13 is configured to obtain first pass information when the same send an authentication request;
[0067] a first sending unit 14, where the first sending unit 14 is configured to send a first authentication request to a server through the user authentication device;
[0068] The first execu...
Embodiment 3
[0094] Based on the same inventive concept as the identity authentication method in the foregoing embodiment, the present application further provides a computer-readable storage medium, where a computer program is stored on the storage medium, and when the computer program is executed by a processor, the The method in Example 1.
[0095] Exemplary Electronics
[0096] Reference below image 3 to describe the electronic device of this application,
[0097] Based on the same inventive concept as the identity authentication method in the foregoing embodiment, the present application further provides an identity authentication system, including: a processor, the processor is coupled with a memory, the memory is used for storing a program, and when all the When the program is executed by the processor, the device is made to execute the steps of the method in the first embodiment.
[0098] The electronic device 300 includes: a processor 302 , a communication interface 303 , and ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


