User identity verification method and system, electronic equipment and storage medium

An identity verification method and identity verification technology, applied in the fields of user identity verification methods, systems, electronic equipment and storage media, can solve problems such as data leakage, information privacy security protection, etc.

Pending Publication Date: 2022-07-15
BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this comparison method, when obtaining the user's biometric characteristics or performing identity verification, if maliciously attacked by a third party, it is easy to cause data leakage, and it is impossible to fully protect the privacy and security of user information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity verification method and system, electronic equipment and storage medium
  • User identity verification method and system, electronic equipment and storage medium
  • User identity verification method and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0048] In this application, relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that any such relationship exists between these entities or operations. an actual relationship or sequence. Also the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user identity verification method and system, electronic equipment and a storage medium, and can be applied to the field of computers, the field of big data or the field of finance. The method is applied to a privacy computing platform and receives target user information of a target user; respectively acquiring a first target encrypted biological characteristic fragment, a second target encrypted biological characteristic fragment and a third target encrypted biological characteristic fragment corresponding to the target user id from each security node; wherein each encrypted biological characteristic fragment is generated by utilizing the biological characteristic of the corresponding user and the user id; according to the first target encrypted biological characteristic fragment, the second target encrypted biological characteristic fragment, the third target encrypted biological characteristic fragment and the encrypted biological characteristics of the target user, calculating the verification similarity of the target user; if the verification similarity is greater than a preset similarity threshold, determining that the identity verification of the target user is passed; and if the verification similarity is not greater than a preset similarity threshold, determining that the identity verification of the target user is not passed.

Description

technical field [0001] The present invention relates to the field of computer technology, and more particularly, to a method, system, electronic device and storage medium for user authentication. Background technique [0002] With the continuous development of computers, more and more businesses are carried out by banking institutions. In order to ensure the security of banking business, users can be authenticated when they handle banking business. [0003] In the prior art, the user's biometrics can be collected in advance, so that when the user comes to the bank for banking business, the user's current biometrics are collected, and the currently collected biometrics are compared with the previously stored biometrics. However, in this comparison method, if the user is maliciously attacked by a third party when obtaining the user's biometric features or performing identity verification, it is easy to cause data leakage, and it is impossible to provide comprehensive privacy a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3231H04L63/0861H04L63/0407H04L63/0428
Inventor 廖旺胜庄恩瀚郭慧杰
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products