Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Authentication identification method, electronic device, and computer-readable storage medium

A technology of identity verification and identification method, applied in the field of blockchain, can solve the problems of poor controllability and generality, and achieve the effect of improving generality, security reliability, and controllability

Pending Publication Date: 2019-02-19
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an identity verification and identification method, an electronic device, and a computer-readable storage medium, so as to solve the existing technical problems that the user's biometric information is not controllable and universal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication identification method, electronic device, and computer-readable storage medium
  • Authentication identification method, electronic device, and computer-readable storage medium
  • Authentication identification method, electronic device, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] The identity verification and identification method provided by the present invention will be described below in conjunction with the accompanying drawings.

[0061] figure 1 It is an optional schematic flow chart of the identity verification and identification method of the present invention, such as figure 1 As shown, the method may include the following steps:

[0062] Step 101: Obtain the biological characteristics of the target user in response to the identity confirmation request;

[0063] That is, when the user uses the system for feature recognition through the front-end device integrated with SDK, the system can collect the user's biometric features through the front-end, and use them to perform algorithmic matching with the biometric features recorded on the chain, and find the identity and password corresponding to the biometric features. text identity information.

[0064] Step 102: Match the collected biometrics with the biometrics recorded on the blockc...

Embodiment 2

[0103] Based on the identity verification and recognition method provided in the first embodiment above, this embodiment provides an identity verification and recognition system, specifically, figure 2 and image 3 An optional structural block diagram of the identity verification and recognition system is shown, the identity verification and recognition system is divided into one or more program modules, one or more program modules are stored in a storage medium, and processed by one or more implemented by the device to complete the present invention. The program module referred to in the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable than the program itself to describe the execution process of the identity verification and identification system in the storage medium. The following description will specifically introduce each program module of this embodiment The function:

[010...

Embodiment 3

[0117] An electronic device is provided in the third preferred embodiment of the present invention. Figure 4 It is a schematic diagram of the hardware architecture of an embodiment of the electronic device according to the present invention. In this embodiment, the electronic device 2 is a device capable of automatically performing numerical calculation and / or information processing according to preset or stored instructions. For example, it may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a cabinet server (including an independent server, or a server cluster composed of multiple servers), etc. As shown in the figure, the electronic device 2 at least includes but is not limited to: a memory 21 , a processor 22 , a network interface 23 , and an identity verification system 20 that can communicate with each other via a system bus. in:

[0118] Memory 21 includes at least one type of computer-re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication identification method, an electronic device, and a computer-readable storage medium.. The method comprises the following steps of: matching the collected biometrics with the biometrics recorded on the block chain to determine the biometrics recorded on the chain that is associated with the collected biometrics, wherein, the biometrics recorded on the blockchain are added to the nodes shared by the block chain; acquiring virtual identity and ciphertext identity information corresponding to the biometric features recorded on the matching chain; pushingthe ciphertext identity information to a user side based on the virtual identity; receiving an authorization instruction of the user to the ciphertext identity information to complete the authentication identification of the target user. The scheme solves the technical problems that the user's biometric information is not controllable and universal in the existing identification and authenticationprocess, and achieves the technical effect of effectively improving the universality, security and reliability of the biometric information.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to an identity verification and identification method, an electronic device, and a computer-readable storage medium. Background technique [0002] At present, the application scenarios of biometrics in daily life are becoming more and more extensive. Biometrics refers to the collection and identification of individual fingerprints, faces, voiceprints, iris and other biological characteristics, and then based on different comparison retrieval methods for identity verification (to prove that you are you), identity recognition (to prove who you are) ), identity extraction (identify who you are). [0003] Currently, there are many channels and methods to obtain user biometric features. However, the biometric feature data collection of various companies is not shared. This has led each company to improve the accuracy and recognition ability of biometrics, in addition to alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V40/1365G06V40/197G06V40/172G06V40/10G06V40/53
Inventor 金龙
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products