User identity authentication method and equipment
A technology for user identity authentication and identity authentication, applied in the field of user identity authentication methods and equipment, can solve the problems of low security of identity authentication, and achieve the effects of improving security, flexibility and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] figure 1 is a flow chart of steps of a user identity authentication method provided in Embodiment 1 of the present invention, such as figure 1 As shown, the method can include:
[0065] Step 101: Obtain a preset identity authentication mode; the identity authentication mode is preset by the user according to his own security requirements.
[0066] The identity authentication mode in this embodiment of the present invention may include a first authentication mode and a second authentication mode. The identity authentication mode may be preset by the user according to his own security requirements. Among them, in each authentication mode, the operation process of the terminal for user identity authentication is different.
[0067] Step 102: When the identity authentication mode is the first authentication mode, select an authentication mode from a preset authentication mode set to authenticate the user's identity.
[0068] The preset authentication method set in the e...
Embodiment 2
[0078] figure 2 is a flow chart of the steps of another user identity authentication method provided by the second embodiment of the present invention, such as figure 2 As shown, the method can include:
[0079] Step 201: Obtain a preset identity authentication mode.
[0080] Since the importance of the data in the terminal to be protected by each user is different, the user's own security requirements are also different. In this embodiment of the present invention, the user can preset a corresponding identity authentication mode according to his own security requirements, and when identity authentication is required, the terminal can obtain the preset identity authentication mode to authenticate the user.
[0081] Specifically, the user presets the identity authentication mode, which can be achieved by the following steps:
[0082] Step A: The user sends an identity registration request to the authentication server through the client set on the terminal.
[0083] Step B...
Embodiment 3
[0157] image 3 is a block diagram of a user identity authentication device provided in Embodiment 3 of the present invention, such as image 3 As shown, the device 30 may include:
[0158] The obtaining module 301 is configured to obtain a preset identity authentication mode; the identity authentication mode is preset by the user according to his own security requirements;
[0159] The first authentication module 302 is configured to select an authentication mode from a preset authentication mode set to authenticate the user identity when the identity authentication mode is the first authentication mode; the preset authentication mode set includes: Pattern authentication method, handwriting authentication method, face authentication method and certificate authentication method;
[0160] The second authentication module 303 is configured to, when the identity authentication mode is the second authentication mode, sequentially select the corresponding authentication mode pair...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com