Method, devices and system for user identity authentication

A user identity authentication and identity authentication technology, applied in the field of user identity authentication, can solve problems such as inability to complete user identity authentication, cost consumption, and easy loss

Inactive Publication Date: 2015-01-07
CHINA CONSTRUCTION BANK
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Although this method of identity authentication is relatively safe, users need to sign a contract with the bank service provider in advance to apply for a dynamic password card, and the dynamic password card needs to be carried with them anytime and anywhere. Without a dynamic password card, user identity authentication cannot be completed, and it cannot be realized. any business operation
The use of dynamic password cards for identity authentication requires carrying additional equipment, which is inconvenient for users to use, easy to lose, and causes additional cost consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, devices and system for user identity authentication
  • Method, devices and system for user identity authentication
  • Method, devices and system for user identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0113] figure 1 It is a flow chart of Embodiment 1 of a user identity authentication method of the present invention, which is applied to a mobile terminal. Embodiment 1 mainly prepares for user identity authentication. The method includes:

[0114] Step 101: When receiving an identity authentication instruction input by a user to be authenticated, send a shooting instruction to the camera of the mobile terminal.

[0115] When the user to be authenticated logs into the bank client terminal on the mobile terminal or the client terminal of the shopping website to make payment for shopping, in order to protect the property safety of the user, it is necessary to perform identity authentication on the user to be authenticated. The user to be authenticated clicks an identity authentication button provided on the client interface of the mobile terminal, etc., to send an identity authentication instruction.

[0116] When the mobile terminal receives the identity authentication instru...

Embodiment 2

[0148] figure 2 It is a flow chart of Embodiment 2 of a user identity authentication method of the present invention, which is applied to an identity authentication server. Embodiment 2 mainly describes the execution process of user identity authentication. The method includes:

[0149] Step 201: Establish a preset expression database in advance, and the preset expression database stores the correspondence between user information and preset expression feature values ​​of at least one type of expression of the user.

[0150] The identity authentication server pre-establishes a database of preset facial expressions, and the database of preset facial expressions stores correspondences between user information of multiple users and feature values ​​of preset facial expressions. Wherein, the preset expression database may store preset expression feature values ​​of various types of expressions for each user.

[0151] When the identity authentication server establishes the preset e...

Embodiment 3

[0192] image 3 It is a sequence diagram of Embodiment 3 of a user identity authentication method of the present invention, which is applied to a user identity authentication system. Embodiment 3 describes the entire process of user identity authentication, and the method includes:

[0193] Step 301: The mobile terminal sends a shooting instruction to the camera of the mobile terminal, acquires preset facial expression images of at least one type of facial expressions of the user captured by the camera of the mobile terminal, and extracts preset expressions in the preset facial expression images of each facial expression type of the user. Expression feature value.

[0194] Step 302: The mobile terminal sends the preset emoticon feature value of each emoticon type to the authentication server.

[0195] Step 303: The authentication server uses the preset expression feature values ​​of each type of expression of the user to pre-establish a preset expression database.

[0196] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, devices and a system for user identity authentication. A mobile terminal obtains a current expression image, taken by a camera of the mobile terminal, of a user to be authenticated, a current expression feature value of the current expression image of the user to be authenticated is extracted, and the current expression feature value and the expression type of the user to be authenticated are sent to an identity authentication server. The identity authentication server receives the current expression feature value and the expression type of the user to be authenticated, obtains a preset expression feature value of the expression type corresponding to user information of the user to be authenticated from a preset expression database and judges whether the current expression feature value is matched with the preset expression feature value, and if yes, identity authentication passing information is returned. By the adoption of the method for achieving user identity authentication by obtaining the current expression image of the user to be authenticated, no extra equipment such as a dynamic password card needs to be carried, user identity authentication is achieved conveniently and rapidly, no extra cost consumption is generated, and safety is high.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, in particular to a method, device and system for user identity authentication. Background technique [0002] With the continuous popularization of smart mobile terminals such as mobile phones and tablet computers, major banks have launched application software based on mobile terminals. Users can perform various banking operations through operations on mobile terminals, such as: query balance, transfer or Remittance and other operations. It is also possible to realize payment for purchased commodities through operations on the application software of the shopping website. [0003] In implementing various operations of the above-mentioned application software, in order to ensure the security of the user's account, it is necessary to authenticate the user's identity before the user performs operations. Commonly used identity authentication methods mainly include: static pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04W12/06
Inventor 李崇辉谭江健李曦温忠源
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products