Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method and device

An identity verification and identity document technology, applied in the Internet field, can solve the problem of high time cost

Active Publication Date: 2016-06-15
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides an identity verification method and device to at least solve the technical problem of relatively high time cost in online identity verification in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device
  • Identity verification method and device
  • Identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] According to an embodiment of the present invention, an identity verification method is provided, the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although the logic shown in the flowchart order, but in some cases the steps shown or described may be performed in an order different from that presented here.

[0036] Optionally, in this embodiment, the above method can be applied to figure 1 In the hardware environment composed of the terminal 10 and the server 20 shown. Such as figure 1As shown, the terminal 20 is connected to the server 20 through the network. The above-mentioned terminals may be mobile terminals or fixed terminals, such as notebook computers, desktop computers, tablet computers, PDAs, and other handheld devices.

[0037] The above-mentioned network includes but not limited to: wide area network, metropolitan area network or local area network. ...

Embodiment 2

[0168] According to an embodiment of the present invention, an identity verification method is also provided, which can be applied to such as figure 1 In the hardware environment composed of the terminal 10 and the server 20 shown. Such as Image 6 As shown, the method includes:

[0169] Step S601, after receiving the collection instruction information sent by the server, collect the identity certificate image of the target identity certificate of the object to be verified, and send the identity certificate image to the server.

[0170] Step S602, receiving the information collection instruction sent by the server, wherein the information collection instruction is generated when the second identity information of the target ID card matches the first identity information of the resource account, the resource account has a corresponding relationship with the terminal, and the second The identity information is of the same type as the first identity information.

[0171] Step ...

Embodiment 3

[0184] According to an embodiment of the present invention, an identity verification device for implementing the above identity verification method is also provided, such as Figure 7 As shown, the device includes: a first acquiring unit 30 , a judging unit 40 , a second acquiring unit 50 and a determining unit 60 .

[0185] The first obtaining unit 30 is configured to obtain the first identity information corresponding to the resource account and the image of the identity certificate collected by the terminal.

[0186] The judging unit 40 is used for judging whether the second identity information in the identity certificate image matches the first identity information.

[0187] The second acquiring unit 50 is configured to acquire the multimedia information of the object to be verified corresponding to the image of the ID card collected by the terminal when the second identity information matches the first identity information.

[0188] The determining unit 60 is configured...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method and an identity verification device. The method comprises the steps of acquiring first identity information corresponding to a resource account and an identity document image collected by a terminal; judging that whether the second identity information in the identity document image is matched with the first identity information; in the case that the second identity information is matched with the first identity information, acquiring the multimedia information of an object to be verified corresponding to the identity document image and collected by the terminal; and determining the identity verification result of the object to be verified based on the multimedia information and the identity document image. According to the method, the technical problem that in the related technologies, the time cost is high when the online identity verification is performed is solved.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to an identity verification method and device. Background technique [0002] In the prior art, when a user conducts identity verification for business, the traditional verification method is an offline method. This verification method requires the user to visit the network point where the service is provided for on-site verification, which consumes a lot of manpower and material resources, and this verification method Verification information needs to be entered manually, which is costly and inefficient. [0003] With the development of computer technology, users can complete various operations by themselves with the assistance of computers, such as remote handling of various businesses with the help of network technology, such as remote control, remote login, etc. In this way, users can conduct remote verification (that is, online verification) when handling various businesses. This ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 赵海郭振声王栋徐丰李翠陈平杨木辉那军武林晓智许士涛李季檩汪铖杰谭国富江晓力倪辉陈骏武谢建国晏栋
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products