Identity authentication method and system, computer equipment and computer readable storage medium
An identity authentication and real-name authentication technology, applied in the computer field, can solve problems such as low security, cumbersome operation, error-prone input information, etc., to achieve the effect of improving accuracy and security, and improving the efficiency of face recognition
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] refer to figure 1 , shows a flow chart of the steps of the identity authentication method in Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. An exemplary description is given below taking the computer device 2 as the execution subject. details as follows.
[0057] Step S100, receiving registration request information from a user, and transmitting the registration request information to a server.
[0058] Specifically, when the terminal accepts the registration request information input by the user, the terminal transmits the registration request information to the server.
[0059] Step S102, receiving response information returned by the server based on the registration request information, where the response information includes facial data acquisition information.
[0060] Specifically, after receiving the registration request information, the server gene...
Embodiment 2
[0098] read on Figure 5, shows a schematic diagram of program modules of Embodiment 2 of the identity authentication system of the embodiment of the present invention. In this embodiment, the identity authentication system 20 may include or be divided into one or more program modules, and one or more program modules are stored in a storage medium and executed by one or more processors to complete this Embodiment of the invention, and can realize the above identity authentication method. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable for describing the execution process of the identity authentication system 20 in the storage medium than the program itself. The following description will specifically introduce the functions of each program module of the present embodiment:
[0099] The first receiving module 200 is configured ...
Embodiment 3
[0132] refer to Figure 6 , is a schematic diagram of the hardware architecture of the computer device according to Embodiment 3 of the present invention. In this embodiment, the computer device 2 is a device capable of automatically performing numerical calculation and / or information processing according to preset or stored instructions. The computer device 2 may be a rack server, a blade server, a tower server or a cabinet server (including an independent server, or a server cluster composed of multiple servers) and the like. Such as Figure 6 As shown, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 and an identity authentication system 20 that can communicate with each other through a system bus. in:
[0133] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com