CN110766841A - User registration and verification method and device - Google Patents

User registration and verification method and device Download PDF

Info

Publication number
CN110766841A
CN110766841A CN201910504106.8A CN201910504106A CN110766841A CN 110766841 A CN110766841 A CN 110766841A CN 201910504106 A CN201910504106 A CN 201910504106A CN 110766841 A CN110766841 A CN 110766841A
Authority
CN
China
Prior art keywords
user
photo
verification password
face
account information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910504106.8A
Other languages
Chinese (zh)
Inventor
唐斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Xintai Jiye Electronic Co Ltd
Original Assignee
Tianjin Xintai Jiye Electronic Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Xintai Jiye Electronic Co Ltd filed Critical Tianjin Xintai Jiye Electronic Co Ltd
Priority to CN201910504106.8A priority Critical patent/CN110766841A/en
Publication of CN110766841A publication Critical patent/CN110766841A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention relates to a user registration and verification method and a device, wherein the method comprises the following steps: collecting account information of an access control card of a user; when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user; collecting voice information of a user reading verification password; judging whether the verification password read by the user is correct or not according to the voice information; if the verification password read by the user is correct, acquiring a face photo of the user; and binding and storing the account information, the verification password and the face photo to finish the registration process. The photo collection process of the invention is self-aided in the whole course, centralized collection and manual intervention are not needed, manpower and material resources are saved, and the illegal user can be discriminated by verifying the password for users with similar growth, so that the problems that the illegal user can not be prevented from carrying out illegal invasion by changing appearance and holding an illegally obtained access card by the user registration and verification device based on the existing face recognition technology can be solved.

Description

User registration and verification method and device
Technical Field
The invention relates to the field of identity information management, in particular to a user registration and verification method and device.
Background
The face recognition technology is mature day by day, and the application range is wider and wider at present. In some occasions where people are concentrated, the collection of face photos is always a difficult problem for users. The traditional human face photo collecting method comprises the following steps: 1, all the persons take photos in batches to a specified place within a specified time, and then the taken photos are imported into a face recognition system; 2, the recognized person provides a photo by himself, names the photo with an appointed name, submits the photo to a corresponding manager, and then imports the photo into a face recognition system.
The two methods have respective advantages and disadvantages, wherein in the scheme 1, a large number of people need to be concentrated, all people reach a designated place within a relatively fixed time range, the identity is verified manually, and then the picture is taken, so that time and labor are wasted; in the scheme 2, although the concentration of required personnel is reduced, some illegal users may change their appearances into legal users through ways such as makeup, and then use illegally acquired access cards to achieve the purpose of illegal intrusion.
Disclosure of Invention
In view of the above technical problems, the present invention provides a method and an apparatus for user registration and authentication.
The technical scheme for solving the technical problems is as follows:
a user registration method, comprising the steps of:
collecting account information of an access control card of a user;
when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
collecting voice information of a user reading verification password;
judging whether the verification password read by the user is correct or not according to the voice information;
if the verification password read by the user is correct, acquiring a face photo of the user;
and binding and storing the account information, the verification password and the face photo to finish the registration process.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, before binding and storing the account information, the verification password and the face photo, the method further comprises the following steps:
collecting an identity card photo of a user;
comparing the identity card picture with the face picture;
and if the identity card photo and the face photo are successfully compared, executing the step of binding and storing the account information, the verification password and the face photo.
Further, comparing the identity card photo with the face photo specifically comprises:
and comparing the similarity of the face in the identity card photo and the face photo, if the similarity exceeds a preset threshold value, successfully comparing the identity card photo and the face photo, and otherwise, failing to compare.
In order to achieve the above object, the present invention further provides a user authentication method, including the steps of:
collecting account information of an access control card of a user;
acquiring a verification password and a face photo which are bound and stored with account information;
collecting voice information of a user reading verification password;
extracting an authentication password from the voice information;
acquiring a face photo of a user;
respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and if the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information, generating a verification passing result.
Further, whether the acquired face photo is matched with the acquired face photo bound and stored with the account information or not is verified, and the method specifically comprises the following steps:
and comparing the similarity of the face in the acquired face picture and the acquired face picture bound and stored with the account information, if the similarity exceeds a preset threshold value, matching the acquired face picture with the acquired face picture bound and stored with the account information, and otherwise, not matching.
The present invention also provides a user registration apparatus, including:
the first acquisition module is used for acquiring account information of an access control card of a user;
the first generation module is used for randomly generating a verification password and sending the verification password to the client when a registration instruction is received so as to display the verification password to a user;
the second acquisition module is used for acquiring voice information of the authentication password read by the user;
the judging module is used for judging whether the verification password read by the user is correct or not according to the voice information;
the third acquisition module is used for acquiring a face photo of the user if the judgment module judges that the verification password read by the user is correct;
and the storage module is used for binding and storing the account information, the verification password and the face photo to complete the registration process.
Further, still include:
the fourth acquisition module is used for acquiring the identity card photo of the user;
the comparison module is used for comparing the identity card photo with the face photo;
and the storage module is used for binding and storing the account information, the verification password and the face photo if the comparison module successfully compares the information with the verification password.
Further, the comparison module is specifically configured to compare similarity of faces in the identity card photo and the face photo, and if the similarity exceeds a preset threshold, the identity card photo and the face photo are successfully compared, otherwise, the comparison fails.
The present invention also provides a user authentication apparatus, comprising:
the fifth acquisition module is used for acquiring account information of the access control card of the user;
the acquisition module is used for acquiring the verification password and the face photo which are bound and stored with the account information;
the sixth acquisition module is used for acquiring voice information of the authentication password read by the user;
the extraction module is used for extracting the authentication password from the voice information;
the seventh acquisition module is used for acquiring a face photo of the user;
the verification module is used for respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and the second generation module is used for generating a verification passing result if the verification password extracted by the extraction module and the face photo collected by the seventh acquisition module are matched with the verification password and the face photo which are acquired by the acquisition module and are bound and stored with the account information.
Further, the verification module is specifically configured to compare the similarity between the face picture acquired by the seventh acquisition module and the face in the face picture acquired by the acquisition module and stored in a binding manner with the account information, and if the similarity exceeds a preset threshold, the acquired face picture is matched with the acquired face picture stored in a binding manner with the account information, otherwise, the acquired face picture is not matched.
The invention has the beneficial effects that: the photo collection process is self-aided in the whole process, centralized collection and manual intervention are not needed, manpower and material resources are saved, and users similar in length can be screened out of illegal users through verifying passwords, so that the problem that the illegal users cannot be prevented from carrying out illegal invasion through changing appearances and holding illegally obtained access control cards by user registration and verification devices based on the existing face recognition technology can be solved.
Drawings
Fig. 1 is a flowchart of a user registration method according to an embodiment of the present invention;
fig. 2 is a flowchart of another user registration method according to an embodiment of the present invention;
fig. 3 is a flowchart of a user authentication method according to an embodiment of the present invention;
fig. 4 is a block diagram illustrating a structure of a user registration apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of another user registration apparatus according to an embodiment of the present invention;
fig. 6 is a block diagram of a user authentication device according to an embodiment of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
Fig. 1 is a flowchart of a user registration method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
11. collecting account information of an access control card of a user;
specifically, when the user is registered, the user firstly swipes an access card on the card reader, and a self-service acquisition flow is started.
12. When a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
specifically, a user can send a registration instruction through the operation of a card reader and send the registration instruction to a background server, the server starts a registration process, a verification password is generated through a random algorithm, for example, a string of numbers or a session and the like, and then the server displays the verification password to the user through a client side for the user to read.
The randomly generated authentication password can be used as a subsequent authentication item to prevent similar illegal users from invading.
13. Collecting voice information of a user reading verification password;
specifically, the user can read the authentication password through a microphone and other radio equipment, and the radio equipment sends the voice information to the server.
14. Judging whether the verification password read by the user is correct or not according to the voice information;
specifically, the server can analyze the voice information by using the existing voice recognition algorithm, extract the verification password read by the user, verify whether the extracted verification password is matched with the randomly generated verification password, if so, the verification password read by the user is correct, otherwise, the user needs to be prompted to read again.
15. If the verification password read by the user is correct, acquiring a face photo of the user;
specifically, the server starts the camera, presents the user's image that the camera was shot at the display screen, according to the face information that the camera was gathered, reminds the user to adjust the people's face angle, shoots many photos, and specific process is, shows out the approximate outline of simulated people's face on the display screen earlier, divides the face region into four quadrants about, down, left and right. The upper quadrant corresponds to the eyebrows and eyes of a person, the lower quadrant corresponds to the mouth of a person, the left quadrant corresponds to the left face of a person, and the right quadrant corresponds to the right face of a person. The system prompts a user to adjust the angles of the face areas to be respectively positioned in the corresponding quadrants, so that the face can be ensured to be over against the screen. And starting a capturing action when the face is detected to coincide with the four quadrants until a certain number of photos are captured successfully, and then selecting a photo with the best illumination from the shot photos.
16. And binding and storing the account information, the verification password and the face photo to finish the registration process.
Specifically, the server binds the account information, the verification password and the face photo, and then transmits the information to the background database through the TCP network for storage, thereby completing the registration process.
The user registration method provided by the embodiment of the invention has the following advantages:
the photo collection process is self-aided in the whole process, centralized collection and manual intervention are not needed, manpower and material resources are saved, account information, verification passwords and face photos are bound and stored, when a user swipes a card, verification of the face and the verification passwords is carried out, illegal users can be effectively prevented from swiping the card by using illegally obtained access control cards, and face verification is carried out in a mode of changing appearances, so that illegal invasion is carried out.
Alternatively, as an embodiment of the present invention, as shown in fig. 2, the method includes:
21. collecting account information of an access control card of a user;
22. when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
23. collecting voice information of a user reading verification password;
24. judging whether the verification password read by the user is correct or not according to the voice information;
25. if the verification password read by the user is correct, acquiring a face photo and an identity card photo of the user;
specifically, gather user's ID card photo accessible multiple mode and realize, for example, the user can brush the ID card on the ID card reader, reads the ID card photo that contains in the ID card chip by the ID card reader, also can shoot the positive mode of ID card and acquire the ID card photo through the camera.
26. Comparing the identity card picture with the face picture;
specifically, the similarity of the faces in the identity card photo and the face photo can be compared through an open source algorithm, if the similarity is larger than a preset threshold value, the comparison is successful, otherwise, the user is prompted to fail in comparison, and the face photo is collected again. Identity verification is performed through comparison of the identity card and the real face, and the situation that the picture does not correspond to the real face is prevented.
27. If the identity card photo and the face photo are successfully compared, the account information, the verification password and the face photo are bound and stored, and the registration process is completed.
Fig. 3 is a flowchart of a user authentication method according to an embodiment of the present invention, and as shown in fig. 3, the method includes the following steps:
31. collecting account information of an access control card of a user;
32. acquiring a verification password and a face photo which are bound and stored with account information;
33. collecting voice information of a user reading verification password;
34. extracting an authentication password from the voice information;
35. acquiring a face photo of a user;
36. respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
37. and if the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information, generating a verification passing result.
The related technical principles involved in the above steps can refer to the contents in the foregoing embodiments, and are not described herein again.
The user verification method provided by the embodiment of the invention has the following advantages:
after the user swipes the card, the face and the verification password are verified, so that the condition that an illegal user swipes the card by using an illegally acquired access control card can be effectively prevented, and the face verification is carried out in a mode of changing the appearance, so that illegal invasion is carried out.
Optionally, in this embodiment, verifying whether the acquired face photograph is matched with the acquired face photograph bound and stored with the account information specifically includes:
and comparing the similarity of the face in the acquired face picture and the acquired face picture bound and stored with the account information, if the similarity exceeds a preset threshold value, matching the acquired face picture with the acquired face picture bound and stored with the account information, and otherwise, not matching.
Fig. 4 is a block diagram of a user registration apparatus according to an embodiment of the present invention, and as shown in fig. 4, the apparatus includes:
the first acquisition module is used for acquiring account information of an access control card of a user;
the first generation module is used for randomly generating a verification password and sending the verification password to the client when a registration instruction is received so as to display the verification password to a user;
the second acquisition module is used for acquiring voice information of the authentication password read by the user;
the judging module is used for judging whether the verification password read by the user is correct or not according to the voice information;
the third acquisition module is used for acquiring a face photo of the user if the judgment module judges that the verification password read by the user is correct;
and the storage module is used for binding and storing the account information, the verification password and the face photo to complete the registration process.
Optionally, as an embodiment of the present invention, as shown in fig. 5, the apparatus further includes:
the fourth acquisition module is used for acquiring the identity card photo of the user;
the comparison module is used for comparing the identity card photo with the face photo;
and the storage module is used for binding and storing the account information, the verification password and the face photo if the comparison module successfully compares the information with the verification password.
Optionally, in this embodiment, the comparison module is specifically configured to compare similarity between faces in the identification card photo and the face photo, and if the similarity exceeds a preset threshold, the identification card photo and the face photo are successfully compared, otherwise, the comparison fails.
Fig. 6 is a block diagram of a user authentication device according to an embodiment of the present invention, and as shown in fig. 6, the device includes:
the fifth acquisition module is used for acquiring account information of the access control card of the user;
the acquisition module is used for acquiring the verification password and the face photo which are bound and stored with the account information;
the sixth acquisition module is used for acquiring voice information of the authentication password read by the user;
the extraction module is used for extracting the authentication password from the voice information;
the seventh acquisition module is used for acquiring a face photo of the user;
the verification module is used for respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and the second generation module is used for generating a verification passing result if the verification password extracted by the extraction module and the face photo collected by the seventh acquisition module are matched with the verification password and the face photo which are acquired by the acquisition module and are bound and stored with the account information.
Optionally, in this embodiment, the verification module is specifically configured to compare the similarity between the face picture acquired by the seventh acquisition module and a face in the face picture acquired by the acquisition module and stored in a bound manner with the account information, and if the similarity exceeds a preset threshold, match the acquired face picture with the acquired face picture stored in a bound manner with the account information, otherwise, not match the acquired face picture.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. A user registration method, comprising the steps of:
collecting account information of an access control card of a user;
when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
collecting voice information of the verification password read by the user;
judging whether the verification password read by the user is correct or not according to the voice information;
if the verification password read by the user is correct, acquiring a face photo of the user;
and binding and storing the account information, the verification password and the face photo to finish the registration process.
2. The method of claim 1, further comprising, before the binding and saving the account information, the authentication password and the face photo:
collecting an identity card photo of a user;
comparing the identity card photo with the face photo;
and if the identity card photo and the face photo are successfully compared, executing the step of binding and storing the account information, the verification password and the face photo.
3. The method of claim 2, wherein comparing the identification card photo with the face photo specifically comprises:
and comparing the similarity of the faces in the identity card photo and the face photo, if the similarity exceeds a preset threshold value, the identity card photo and the face photo are successfully compared, and otherwise, the comparison fails.
4. A method of user authentication, comprising the steps of:
collecting account information of an access control card of a user;
acquiring a verification password and a face photo which are bound and stored with the account information;
collecting voice information of a user reading verification password;
extracting an authentication password from the voice information;
acquiring a face photo of a user;
respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and if the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information, generating a verification passing result.
5. The method according to claim 4, wherein the verifying whether the acquired face photograph matches the acquired face photograph stored in a manner of being bound to the account information specifically includes:
and comparing the similarity of the face in the acquired face picture and the acquired face picture bound and stored with the account information, if the similarity exceeds a preset threshold value, matching the acquired face picture with the acquired face picture bound and stored with the account information, and otherwise, not matching.
6. A user registration apparatus, comprising:
the first acquisition module is used for acquiring account information of an access control card of a user;
the first generation module is used for randomly generating a verification password and sending the verification password to the client when a registration instruction is received so as to display the verification password to a user;
the second acquisition module is used for acquiring the voice information of the verification password read by the user;
the judging module is used for judging whether the verification password read by the user is correct or not according to the voice information;
the third acquisition module is used for acquiring a face photo of the user if the judgment module judges that the verification password read by the user is correct;
and the storage module is used for binding and storing the account information, the verification password and the face photo to finish the registration process.
7. The apparatus of claim 6, further comprising:
the fourth acquisition module is used for acquiring the identity card photo of the user;
the comparison module is used for comparing the identity card photo with the face photo;
and the storage module is used for binding and storing the account information, the verification password and the face photo if the comparison module successfully compares the account information, the verification password and the face photo.
8. The apparatus of claim 7, wherein the comparison module is specifically configured to compare similarity between faces in the identification card photo and the face photo, and if the similarity exceeds a preset threshold, the identification card photo and the face photo are successfully compared, otherwise, the comparison fails.
9. A user authentication apparatus, comprising:
the fifth acquisition module is used for acquiring account information of the access control card of the user;
the acquisition module is used for acquiring the verification password and the face photo which are bound and stored with the account information;
the sixth acquisition module is used for acquiring voice information of the authentication password read by the user;
the extraction module is used for extracting the authentication password from the voice information;
the seventh acquisition module is used for acquiring a face photo of the user;
the verification module is used for respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and the second generation module is used for generating a verification passing result if the verification password extracted by the extraction module and the face photo collected by the seventh acquisition module are matched with the verification password and the face photo which are acquired by the acquisition module and are bound and stored with the account information.
10. The apparatus according to claim 9, wherein the verification module is specifically configured to compare similarity between the face photograph acquired by the seventh acquisition module and a face in the face photograph acquired by the acquisition module and stored in a bound manner with the account information, and if the similarity exceeds a preset threshold, match the acquired face photograph with the acquired face photograph stored in a bound manner with the account information, otherwise, do not match.
CN201910504106.8A 2019-06-12 2019-06-12 User registration and verification method and device Pending CN110766841A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910504106.8A CN110766841A (en) 2019-06-12 2019-06-12 User registration and verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910504106.8A CN110766841A (en) 2019-06-12 2019-06-12 User registration and verification method and device

Publications (1)

Publication Number Publication Date
CN110766841A true CN110766841A (en) 2020-02-07

Family

ID=69329063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910504106.8A Pending CN110766841A (en) 2019-06-12 2019-06-12 User registration and verification method and device

Country Status (1)

Country Link
CN (1) CN110766841A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460435A (en) * 2020-04-02 2020-07-28 广西通途科技有限公司 User registration method, verification method and registration device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0973118A2 (en) * 1998-07-07 2000-01-19 Lsi Card Corporation Fingerprint checking system, fingerprint checking method and memory card used for the same
CN103268549A (en) * 2013-04-24 2013-08-28 徐明亮 Mobile payment verification system based on facial features
CN104598796A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Method and system for identifying identity
CN107992728A (en) * 2016-10-27 2018-05-04 腾讯科技(深圳)有限公司 Face verification method and device
CN108537028A (en) * 2018-04-17 2018-09-14 西安电子科技大学 A kind of computer identity identifying system and method
CN109117707A (en) * 2018-06-20 2019-01-01 安徽继远软件有限公司 A kind of trusted identity authentication method and user terminal
CN109215184A (en) * 2018-07-24 2019-01-15 石数字技术成都有限公司 Face registration, verification method, face registration system and the application in gate inhibition
CN109560937A (en) * 2019-01-04 2019-04-02 平安科技(深圳)有限公司 Command identifying method, device and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0973118A2 (en) * 1998-07-07 2000-01-19 Lsi Card Corporation Fingerprint checking system, fingerprint checking method and memory card used for the same
CN103268549A (en) * 2013-04-24 2013-08-28 徐明亮 Mobile payment verification system based on facial features
CN104598796A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Method and system for identifying identity
CN107992728A (en) * 2016-10-27 2018-05-04 腾讯科技(深圳)有限公司 Face verification method and device
CN108537028A (en) * 2018-04-17 2018-09-14 西安电子科技大学 A kind of computer identity identifying system and method
CN109117707A (en) * 2018-06-20 2019-01-01 安徽继远软件有限公司 A kind of trusted identity authentication method and user terminal
CN109215184A (en) * 2018-07-24 2019-01-15 石数字技术成都有限公司 Face registration, verification method, face registration system and the application in gate inhibition
CN109560937A (en) * 2019-01-04 2019-04-02 平安科技(深圳)有限公司 Command identifying method, device and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460435A (en) * 2020-04-02 2020-07-28 广西通途科技有限公司 User registration method, verification method and registration device

Similar Documents

Publication Publication Date Title
KR101997371B1 (en) Identity authentication method and apparatus, terminal and server
CN106803289A (en) A kind of false proof method and system of registering of intelligent mobile
CN103731271B (en) A kind of online face identity authentication based on homomorphic cryptography and Chaotic Scrambling
US20060280340A1 (en) Conjunctival scans for personal identification
CN113177437A (en) Face recognition method and device
CN108573202A (en) Identity identifying method, device and system and terminal, server and storage medium
CN105224842B (en) Method and device for confirming user identity in VTM system
CN103384234A (en) Method and system for face identity authentication
CN104700094B (en) A kind of face identification method for intelligent robot and system
WO2010001311A1 (en) Networked face recognition system
CN103279764A (en) Real-name network authentication system based on face identification
CN110765830B (en) Full self-service registration method, system, medium and equipment for human face
CN111831995A (en) Trusted identity authentication method and system based on eID and human body biological information
CN111753271A (en) Account opening identity verification method, account opening identity verification device, account opening identity verification equipment and account opening identity verification medium based on AI identification
CN109492555A (en) Newborn identity identifying method, electronic device and computer readable storage medium
CN108629259A (en) Identity identifying method and device and storage medium
CN114218543A (en) Encryption and unlocking system and method based on multi-scene expression recognition
CN111611437A (en) Method and device for preventing face voiceprint verification and replacement attack
CN110766841A (en) User registration and verification method and device
CN111325053A (en) Identity authentication method based on multiple biological characteristics and non-biological characteristics
CN103425978A (en) Method and system for comparing wanted men on Internet quickly with hidden video collecting
US20120219192A1 (en) Method of controlling a session at a self-service terminal, and a self-service terminal
CN107241309A (en) A kind of identity identifying method, authentication device and Verification System
CN103440327A (en) Method and system for quick comparison of online wanted men through hidden video
WO2022222957A1 (en) Method and system for identifying target

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200207