Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, cloud service system and cloud server based on cloud server-side

A cloud server and identity authentication technology, which is applied in the field of cloud service systems and cloud servers, can solve problems such as difficulty in identifying the identity of the calling party, loss of user property, and ignorance of the user, so as to prevent phone fraud, ensure personal and property safety, and improve Effects of Efficiency and Accuracy

Active Publication Date: 2013-04-03
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When the user is talking, it is difficult to confirm the identity of the other party. The user can only judge whether it is an illegal number by matching the number stored in the mobile terminal or checking the legitimacy of the number online, but the mobile terminal number matching can only know whether it is an unfamiliar number. The number does not know the identity of the other party, and the legitimacy of the online query number is only for the specific number, and the identity of the other party cannot be judged. This makes the user do not know who the user is when the user's friend uses other numbers to contact the user, and sometimes It will cause many users to be deceived by others in the name of friends, companies or banks on the phone, causing serious property losses to users
[0003] At present, although the user can also store the call audio with the cheater, the local audio data resources of this type of mobile terminal are also very insufficient, and are limited by the storage capacity and data processing capacity of the mobile terminal, making it very difficult to analyze the call audio conduct

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, cloud service system and cloud server based on cloud server-side
  • Identity authentication method, cloud service system and cloud server based on cloud server-side
  • Identity authentication method, cloud service system and cloud server based on cloud server-side

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0024] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and system and a cloud server based on a cloud server-side. The method comprises the following steps: the cloud server builds an audio / video database; the cloud server receives audio / video sample data and identity authentication request sent by a mobile terminal; the cloud server performs comparative analysis on the audio / video sample data and an audio / video data source stored in the audio / video database according to the identity authentication request so as to determine identity of an affiliation side of the audio / video sample data; and the cloud server enables results for identity authentication to be returned to the mobile terminal. According to the method, phone fraud behaviors are effectively avoided, users' personal and property safety is guaranteed, the superstrong storage capability and data handling capability of the cloud server are fully utilized to perform identity authentication, and efficiency and accuracy for identity authentication are improved.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to an identity authentication method based on a cloud server, a cloud service system and a cloud server. Background technique [0002] When the user is talking, it is difficult to confirm the identity of the other party. The user can only judge whether it is an illegal number by matching the number stored in the mobile terminal or checking the legitimacy of the number online, but the mobile terminal number matching can only know whether it is an unfamiliar number. The number does not know the identity of the other party, and the legitimacy of the online query number is only for the specific number, and the identity of the other party cannot be judged. This makes the user do not know who the user is when the user's friend uses other numbers to contact the user, and sometimes Can cause a lot of users to be cheated by others in the name of friend, company or bank etc. on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘弟新
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products