An authentication method and device of a user in a knowledge question answering and a terminal device
An identity verification method and user identity technology, applied in the field of identity verification methods, devices and terminal equipment for answering questions in knowledge quizzes, can solve problems such as damage, inability to verify qualifications, and unreliable results of identity verification, so as to avoid defects and avoid The effect of misdirection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0025] refer to Figure 1a , which shows a flow chart of the steps of a method for verifying the user's identity in quizzes and answers according to Embodiment 1 of the present application.
[0026] It is worth noting that the steps S101 to S103 described in this application do not represent the order in which they are executed.
[0027] The identity verification method of the answering user in the knowledge quiz of the present embodiment comprises the following steps:
[0028] Step S101: Verifying the identity of the user with a certificate matching the identity, and judging whether the identity of the user meets the requirements of the certificate verification.
[0029] Specifically, since the user's certificate is the most direct and legal way to represent the user's identity, the embodiment of the present application first performs certificate verification on the user's identity, and judges whether the user's identity is flawed through the certificate verification, that is...
Embodiment 2
[0047] This embodiment includes the above steps S101 to S103. see figure 2 , the step S101 includes:
[0048] S1011. Verify the identity certificate of the user, and the user whose identity certificate matches the user information passes the verification of the identity certificate.
[0049] Specifically, the identity documents include: identity cards, driver's licenses, passports, Hong Kong and Macau travel permits and other documents that can represent identity.
[0050] S1012. Perform certificate verification on the user who has passed the verification of the identity certificate, and the user whose certificate of representation ability matches the information provided by the user meets the requirements of the certificate verification.
[0051] Specifically, the certificates that represent capabilities include: degree certificates, lawyer certificates, accountant certificates, work badges, and other certificates that can represent capabilities.
[0052] Based on the ver...
Embodiment 3
[0057] This embodiment includes the above steps S101 to S103. see Figure 3a , the step S102 includes:
[0058] Step S1021. If yes, obtain the historical behavior data of the user, and analyze the data related to the identity of the user in the historical behavior data of the user.
[0059] Step S1022, if the data related to the user identity does not match the identity information provided by the user, it is determined that there is an alarming behavior in the user's historical behavior.
[0060] Specifically, the embodiment of the present application analyzes the user's historical behavior data to obtain data related to the user's identity. The data related to the user identity is data capable of verifying the user identity, so there is a corresponding relationship between the data related to the user identity and the identity of the user for authentication.
[0061] For example, if a user answers a question in English for identity verification, the language used in the h...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com