KR101635176B1 - System for vertificating identification - Google Patents

System for vertificating identification Download PDF

Info

Publication number
KR101635176B1
KR101635176B1 KR1020150183899A KR20150183899A KR101635176B1 KR 101635176 B1 KR101635176 B1 KR 101635176B1 KR 1020150183899 A KR1020150183899 A KR 1020150183899A KR 20150183899 A KR20150183899 A KR 20150183899A KR 101635176 B1 KR101635176 B1 KR 101635176B1
Authority
KR
South Korea
Prior art keywords
face
verification
time
scan
login
Prior art date
Application number
KR1020150183899A
Other languages
Korean (ko)
Inventor
최재훈
Original Assignee
최재훈
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 최재훈 filed Critical 최재훈
Priority to KR1020150183899A priority Critical patent/KR101635176B1/en
Application granted granted Critical
Publication of KR101635176B1 publication Critical patent/KR101635176B1/en
Priority to PCT/KR2016/015116 priority patent/WO2017111506A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Multimedia (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)

Abstract

The present invention provides a system for verifying face-to-face identification, wherein whether an identifier faces a person in question can be verified. An embodiment of the present invention may comprise: a scanner for transmitting, to a face-to-face identification verifying server, identifier log-in information, which is the identifier log-in information of an identifier for identifying a subject face-to-face, and subject scanning information, which is the subject scanning information of scanning the identification card of the subject; a face-to-face identification verifying server for verifying the face-to-face identification by comparing a position and time when the identifier log-in information was generated, with a position and time when the subject scanning information was generated to determine whether a difference is within the margin of error, storing the result of verifying the face-to-face identification, and transmitting the result of verifying the face-to-face identification to the mobile communication terminal of the identifier; and a communication network for providing network connection between the scanner and the face-to-face identification verifying server.

Description

System for vertificating identification "

The present invention relates to a face-to-face verification and verification system device, and more particularly, to a face-to-face verification and verification system device that can verify whether an insurance planner or the like faces a subscriber in proceeding a contract.

In the business area, there is an area where the other party must be confronted.

For example, a borrower must sign a loan agreement with a lender for the loan. In the case of an insurance planner, the applicant must explain his / her contract to the insurance contractor himself / herself, or if the insurance contract is renewed, he / she must meet with the insurance contractor and explain the insurance policy contract.

However, when it is necessary to verify whether the confidentiality of confidential information is verified (for example, the delivery of important documents, the delivery of goods, etc.) frequently occurs in transactions between trading companies, it is impossible to verify whether the confidential information has been verified. I can not even manage it.

In the case of loan recruiters, it is not easy to verify that the loan must be signed by the counterparty in the loan transaction contract and the financial institution should supervise and supervise it. In the case of an insurance planner, there is no way for an insurance company to check whether an insurance planner has met him or not, and he verifies the policy contractor verbally by phone.

Therefore, there is an urgent need for a model that can systematically verify whether the person who is engaged in the task of confronting the person is confronted.

Korean Patent Publication No. 10-2009-0008501

The technical problem of the present invention is to provide a face-to-face verification verification system device capable of verifying whether a person identifying himself or herself, such as an insurance planner, The embodiment of the present invention is intended to be utilized for verification in consideration of time and place.

The embodiment of the present invention includes a scanner for transmitting the confirmation log-in information, which is the confirmation log-in information of the principal's confirmation person, to the face-to-face verification server, which is the subject's personal identification information scanned by the person's identification card, The location and time at which the verifier's login information is generated and the location and time at which the subject's scan information is generated are compared with each other to determine whether the verified person's login information is within an error range to perform self face verification verification to store the self face verification verification result, A face-to-face verification server for transmitting face-to-face verification results to the mobile communication terminal of the identity verification person; And a network communication network for providing a network connection between the scanner and the face verification verification server.

The scanner performs login using biometric information of the verified person who verifies the subject person, transmits the verified person login information including the login position, which is the login completion position, and the login time, which is the login completion time, to the face- The identification information of the subject can be scanned and the subject scan information including the scanned image, the scan position as the scan position, and the scan time, which is the scan completion time, can be transmitted to the face verification verification server.

Wherein the scanner comprises: a biometric identification information reading unit for reading biometric identification information of a principal identifying person; A login time generating unit for generating a time at which the biometric identification information of the verifier is read out as a login time; An authenticator log-in information transmission unit that transmits the log-in time to the face-to-face verification server, and transmits the login time to the face-to-face verification server together with the IP address of the scanner connected to the network communication network as a login position when transmitting the login time; A scan unit for generating a scan image by scanning the identification card of the subject and generating a scan time which is a time at which the scan is completed; And transmits the scan image and the scan time to the face-to-face verification server. When the scan image and the scan time are transmitted, the scanner transmits an IP address connected to the network communication network as a scan position to the face- And a subject scan information transmitting unit.

The scanner includes a forgery-and-fake output unit for displaying whether the ID card is forged or falsified or for outputting audio information; A forgery and falsification judging unit for judging whether or not the identification card is forged or falsified by using the material of the identification card, the hologram printing pattern, and the resident registration number to generate the forgery verification result; And transmitting the forgery proof verification result together with the scan image, the scan position, and the scan time to the face-to-face verification server, and when the scanned ID is determined to be a forgery proof ID, the forgery proof verification result indicating that the forgery- And a processing unit.

And the face-to-face verification server transmits the forgery-and-corroboration result to the mobile communication terminal of the principal identity verifier.

Wherein the login authentication is performed when the biometric identification information read by the biometric identification information reading unit matches the biometric identification information of the principal verifier registered in advance in the scanner or is authenticated by the biometric identification information read by the biometric identification information reading unit Is authenticated when the biometric identification information matches the biometric identification information of the principal verifying person registered in advance in the face verification verification server.

The scan unit scans the identification card within a predetermined time limit from the time when the login authentication is completed to generate a scan image, and does not generate a scan image when the limit time elapses.

Wherein the face-to-face verification server receives from the scanner the identifier log-in information including the log-in position and the log-in time, the subject scan information including the scan position and the scan time, and transmits the face- A server communication unit for transmitting to the mobile communication terminal; A position verification unit for determining whether the difference between the login position and the scan position is within a predetermined position threshold range and outputting a position verification success message if the difference is within the position threshold range and outputting a position verification failure message if the difference is outside the position threshold range; ; And outputs a time verification failure message if the difference between the login time and the scan time is within a preset time threshold range, outputs a time verification success message if the difference is within the time threshold range, ; And when the position verification success message and the time verification success message are both output, the face-to-face verification verification result is stored as the face-to-face verification authentication, and when either the position verification failure message or the time verification failure message is output, Face verification verification result storage unit storing the verification result as the face-to-face verification verification failure.

Further, an embodiment of the present invention is a mobile communication terminal used by a subject person, the subject person terminal receiving and displaying an image of an ID of a person identifying the person to be authenticated, A personal identification number terminal for transmitting a telephone number of the subject person's terminal to a face verification verification server and transmitting the terminal identification number to the face identification verification server; And transmits the identification ID image of the principal identifying person who confirms the principal authentication number to the principal authentication terminal and receives the terminal authentication number from the principal identifying terminal, A face-to-face verification server for storing that the authentication of the user is successful if the received terminal authentication number matches the authentication number transmitted to the telephone number of the subject terminal; And a mobile communication network for providing mobile communication between the subject person terminal, the person identification terminal, and the face verification verification server.

According to the embodiment of the present invention, it is possible to accurately verify whether the subject person and the verified person face each other by comparing and verifying the time and place in verifying whether or not the subject person verifies the subject person.

1 is a configuration diagram of a face-to-face verification verification system according to a first embodiment of the present invention;
2 is a block diagram of the configuration of a scanner according to a first embodiment of the present invention;
3 is a configuration block diagram of a face-to-face verification server according to the first embodiment of the present invention;
FIG. 4 is a diagram illustrating a result of verification of face-to-face verification by a mobile communication terminal of a principal identity verifier according to a first embodiment of the present invention. FIG.
FIG. 5 is a diagram illustrating an example in which a face-to-face verification result is stored and output according to the first embodiment of the present invention. FIG.
6 is a configuration diagram of a face-to-face verification system according to a second embodiment of the present invention;

BRIEF DESCRIPTION OF THE DRAWINGS The advantages and features of the present invention, and how to achieve them, will be apparent from the following detailed description of embodiments thereof taken in conjunction with the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as being limited to the exemplary embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of the invention to those skilled in the art. And the present invention is only defined by the scope of the claims. In the following description, well-known functions or constructions are not described in detail since they would obscure the invention in unnecessary detail.

2 is a block diagram of a scanner according to a first embodiment of the present invention. FIG. 3 is a block diagram of a first embodiment of the present invention. 4 is a diagram illustrating an example of a result of verification of face-to-face verification by a mobile communication terminal of a principal identity verifier according to a first embodiment of the present invention, and FIG. 5 is a diagram illustrating an example of a face- FIG. 4 is a diagram illustrating an example in which a face-to-face verification result is stored and output according to the first embodiment of the present invention.

The present invention relates to a system and method for a transaction between a person who intends to purchase a transaction such as a person to be insured (hereinafter referred to as a "subject person") and an insurance agent who intends to insure the insurance (hereinafter referred to as a " It is a means of verifying that the subject person and the identity person face each other before the transaction contract.

In particular, according to the present invention, only the biometric information or the identity information of the identity verifier is collected without collecting the biometric information of the subject, so that the face-to-face verification verification is performed.

To this end, the face-to-face verification system according to the first embodiment of the present invention includes a network communication network 300, a scanner 100, and a face verification verification server 200.

The network communication network 300 provides a network connection between the scanner 100 and the face verification verification server 200. Such a network connection can be established through an Internet network in accordance with an Internet protocol such as TCP / IP (Transmission Control Protocol / Internet Protocol).

The scanner 100 transmits to the face-to-face verification server 200 the verification-use log-in information, which is the verification-person log-in information of the verified person who verifies the subject person, and the subject-subject scanning information that is the subject- That is, the scanner 100 performs log-in using the biometric information of the verified person who verifies the subject to be verified, and transmits the verifier's login information including the login position, which is the log-in completed position, 200). In addition, the scanner 100 scans the identification card of the subject, transmits the subject scan information including the scanned scan image, the scan position as the scan position, and the scan time, which is the scan completion time, to the face-

2, the scanner 100 includes a bio-identification information reading unit 110, a login time generating unit 120, an authenticator login information transmitting unit 130, a scan unit 140, And a transmission unit 150. The scanner 100 may further include a forgery-and-fake output unit 160, a forgery-and-alteration determination unit 170, and a forgery verification verification result processing unit 180.

The living body identification information reading unit 110 is a module for reading the living body identification information of the identity confirming person. Here, biometric information may include biometric information such as fingerprint information, irregularity information, and the like, identification information that is IC chip information recorded on an IC chip card such as an employee ID card, an electronic ID card or an authorized certificate of the principal's identity verifier.

The login time generation unit 120 generates a time at which the biometric identification information of the principal verifier is read as the login time. For example, when the identity verifier reads the fingerprint through the biometric identification information reading unit 110, the time point at which the fingerprint is read is generated as the login time.

The verifier's login information transmission unit 130 transmits the login time to the face verification verification server 200 and transmits the IP address (or GPS information) accessed by the scanner 100 to the network communication network 300 To the face-to-face verification server 200 as a login position. The reader is connected to a network, which is an Internet network, through a wired LAN or a wireless LAN, and communicates with the face-to-face verification server 200 according to the TCP / IP protocol. When communicating through the TCP / IP protocol, the reader transmits the login time including the IP (Internet Protocol) address assigned to the LAN port connected to the reader. Therefore, when the scanner 100 transmits the login time to the verification server 200, the IP address accessed by the scanner 100 is also transmitted as the login position.

Log-in using biometric information can be performed by the scanner 100 itself or through the face-to-face verification server 200. [

In the case where the scanner 100 is self-contained, it is determined whether or not the biometric identification information read by the biometric identification information reading unit 110 coincides with the biometric identification information of the verifier of the principal registered in advance in the scanner 100, Authentication is completed. Here, in the case where the bio-identification information of the verifier is registered and stored in advance in the scanner 100, a hard disk drive, an SSD drive (Solid State Drive), a flash memory (Flash Memory) Such as a CF card (Compact Flash Card), an SD card (Secure Digital Card), an SM card (Smart Media Card), an MMC card (Multi-Media Card), a Memory Stick And can be stored in a separate external memory capable of inputting and outputting information.

When log-in is performed through the face-to-face verification server 200, the biometric identification information read by the biometric identification information reading unit 110 is stored in the biometric authentication server 200, If they match, login authentication is completed. That is, the biometric identification information reading unit 110 transmits the biometric identification information to the face authentication verification server 200, and the face authentication verification server 200 compares the biometric identification information of the identity verifier registered in advance with the server If they match, a message indicating that login authentication has been completed is transmitted to the scanner 100.

On the other hand, when the verification of the identity of the person is completed successfully, the identification of the person is scanned. For this, when the login authentication is completed, the scan unit 140 generates a scan image by scanning the identification card of the subject, and generates a scan time, which is a time at which the scan is completed. In addition, the scan unit 140 can scan the fingerprint of the subject by obtaining the consent of the subject person.

The scan unit 140 scans the identification card within a predetermined time limit from the time when the login authentication is completed to generate a scan image, and does not generate a scan image when the time limit elapses. If the identification of the applicant is scanned after the login of the verifier is completed and the time limit (for example, 5 minutes) has elapsed, it is because the applicant and the verifier are not in close proximity to each other.

The subject scan information transmission unit 150 transmits the scan image and the scan time to the face verification server 200. When the scanner 100 transmits the scan image and the scan time, To the face-to-face verification server 200 as a scan position.

The scanner 100 includes a LAN port (not shown) and is connected to a network, which is an Internet network, via a wired LAN or a wireless LAN, and communicates with the face confirmation verification server 200 according to the TCP / IP protocol. When communicating through the TCP / IP protocol, the reader transmits the scan image and scan time including the IP (Internet Protocol) address assigned to the LAN port connected thereto. Accordingly, when the scanner 100 transmits the scan image and the scan time to the verification server 200, the IP address connected to the scanner 100 is included as a scan position and is transmitted together.

The forgery and fidelity output unit 160 displays whether a forgery or falsification of the ID card is displayed on a lamp or a screen or outputs it as audio. The forgery / fidelity output unit 160 may be output as a lamp, a screen, and a speaker, and may be displayed as an audio forgery or falsification of an ID card.

The forgery and falsification determining unit 170 determines whether or not the identification card is forged or falsified, and generates a forgery verification result. The forgery and falsification can be judged by using the material of the ID card, the hologram printing pattern, the resident registration number, and the like. For example, if the material of the ID card is not a pre-registered material, it is judged to be a fake ID card. If the hologram printing pattern to be printed on the ID card is not a registered hologram printing pattern, it is judged to be a fake ID card. (Driver's license number) is a resident registration number (driver's license number) that does not match the name of the party.

The forgery verification verification result processing unit 180 transmits the forgery verification result to the face verification verification server 200 together with the scan image, the scan position, and the scan time. The face-to-face verification server 200 transmits the forgery-and-tampering verification result to the mobile communication terminal of the identity verification person. Accordingly, the mobile communication terminal (smart phone) used by the identity checker such as the insurance planner is shown whether or not the identity card forged by the subject person is forged or not as shown in FIG. 4, so that the identity checker can instantly recognize whether the ID card submitted by the subject person is forged or not do.

If the scanned ID card is judged to be a forgery ID card, the forgery-and-alteration verification result processing unit 180 displays or forwards the message through the forgery-and-alteration output unit 160 for the forgery or falsification.

On the other hand, the face-to-face verification server 200 has the same configuration as a typical web server in terms of hardware, and is implemented in various types of languages such as C, C ++, Jaba, Visual Basic, And includes program modules that perform various functions. Therefore, the face-to-face verification server 200 compares the position and time at which the verifier's login information was generated with the position and time at which the subject's scan information was generated to determine whether it is within the error range, Stores the confirmation verification result, and transmits the verification result of the face-to-face verification to the mobile communication terminal of the identity verification person. This error range exists in the position critical range and the time critical range, respectively.

3, the face-to-face verification server 200 includes a server communication unit 210, a position verification unit 220, a time verification unit 230, and a face-to-face verification result storage unit 240 .

The server communication unit 210 supports hardware and software protocols for communicating with the scanner 100. The server communication unit 210 can perform network communication according to an Internet protocol such as TCP / IP (Transmission Control Protocol / Internet Protocol). Therefore, the server communication unit 210 receives the identifier log-in information including the login position and the login time from the scanner 100, and the subject scan information including the scan position and the scan time.

Also, the server communication unit 210 transmits the face-to-face verification result, which is the face-to-face verification result obtained by the face-to-face verification server 200 using the confirmer log-in information and the subject scanning information, to the mobile communication terminal of the identity verification server.

The position verification unit 220 determines whether the difference between the login position and the scan position is within a preset position threshold range and outputs a position verification success message if it is within a position threshold range that can be regarded as an error range, , A location verification failure message is output. If the location threshold range is within the IP address range, a location verification success message is output if the IP address of the login location and the IP address of the scan location are equal to or less than the specified IP address range. If the IP address range is out of the IP address range, Output. Field A [a'a '']. B field b'b ''. C field c'c ''. D field [d'd ''] (D ') of the fourth D field in the second B field, the IP address of the third C field, and the tens digit (d') of the last A field, the IP address of the login location, (D ') of the first A field, the second B field, the third C field, and the fourth D field are all the same, even if the IP address of the first D field is different from the number of jobs d' (D ') of the first A field, the second B field, the third C field, and the fourth D field do not match, a position verification failure message is output .

For example, if the login position is 192.184.142.11 and the scan position is 192.184.142.10 ~ 192.184.142.19, it is determined that it is in the same position range and a position verification success message is output. If the login position is 192.184.142.11 and the scan position is 192.184 If it has .143.10, it outputs a position verification failure message.

The time verifying unit 230 determines whether the difference between the login time and the scan time is within a predetermined time threshold range. If the difference is within a time threshold range that can be regarded as an error range, the time verifying unit 230 outputs a time verification success message. , A time verification failure message is output. For example, if the time critical range is 5 minutes, if the difference between the login time and the scan time is less than 5 minutes, it is determined that the time is in the same place and a time verification success message is output. Otherwise, a position verification failure message is output .

When the location verification success message and the time verification success message are both output, the face-to-face verification result storage unit 240 stores the face-to-face verification result as the face-to-face verification authentication, , The result of verification of face-to-face verification is stored as failure of face-to-face verification. The result of verification of the face-to-face verification stored as described above is output as shown in FIG. 5, and can be used to determine whether or not the face-to-face verification is made later.

6 is a configuration diagram of a face-to-face verification system according to a second embodiment of the present invention.

The face-to-face verification verification system according to the second embodiment of the present invention may include the subject communication terminal 400, the subject person terminal 10, the identity verification terminal 20, and the face-to-face verification server 200. [

The mobile communication network 400 provides mobile communication such as 3G / 4G / LTE between the subject terminal 10, the identity verification terminal 20 and the face verification verification server 200. A mobile communication network 400 including a Base Transceiver Station (BTS), a Mobile Switching Center (MSC), and a Home Location Register (HLR) So that data communication can be performed. For reference, a mobile radio communication network includes, in addition to a base station (BTS), a mobile switching center (MSC), and a home location register (HLR), an access gateway (Access Gateway) Data Serving Node), and the like.

The subject person terminal (10) is a mobile communication terminal used by the subject person. In the drawing, a smart phone is taken as an example, but not only a smart phone, but also a desktop PC, a tablet PC, a slate PC, and a notebook computer have. Of course, it is needless to say that the terminal to which the present invention is applicable is not limited to the above-described type, but may include both terminals capable of communicating with external devices. This is also true of the identity verification terminal 20 to be described later.

The subject person's terminal 10 receives and displays an image of an identification card of the person identifying the person to be verified with the terminal authentication number from the face-to-face verification server 200. [

The identity verification terminal (20) is a mobile communication terminal of a person who confirms the identity of the person himself / herself. The person identification terminal 20 transmits the telephone number of the subject terminal 10 to the face verification verification server 200. [ Also, the identity verification terminal 20 transmits the terminal authentication number confirmed and confirmed by the subject terminal 10 in the neighborhood to the face verification verification server 200. Also, the identity verification terminal 20 receives and displays the face-to-face confirmation authentication result from the face-to-face verification server 200. [

To this end, an application (hereinafter, referred to as a "face-to-face verification application") is installed in the identity verification terminal 20 to connect to the face-to-face verification server 200 by execution of the face- Transmission of the number of the terminal, transmission of the terminal authentication number, and reception of the authentication result of the face-to-face confirmation. The face-to-face verification application can be downloaded from Google Market, Apple Store, etc. and installed on the smartphone.

The face-to-face verification server 200 transmits the image of the identity of the principal's identity verifying person, who confirms the identity of the principal with the terminal authentication number, with the telephone number of the subject's terminal 10 received from the principal's identity terminal 20, When the terminal authentication number received from the identity verification terminal (20) matches the authentication number transmitted to the telephone number of the subject terminal (10), it is determined that the authentication of the user is successful .

The embodiments of the present invention described above are selected and presented in order to facilitate the understanding of those skilled in the art from a variety of possible examples. The technical idea of the present invention is not necessarily limited to or limited to these embodiments Various changes, modifications, and other equivalent embodiments are possible without departing from the spirit of the present invention.

100: scanner 200: face-to-face verification server
210: server communication unit 220:
230: time verifying unit 240: personal verification verification result storage unit

Claims (9)

A scanner for transmitting confirmation person login information which is confirmation person log-in information of the principal's confirmation person confronting the subject person and subject person's scan information which is the subject person's scan information of the person's identification card to the face-to-face verification server;
The location and time at which the verifier's login information is generated and the location and time at which the subject's scan information is generated are compared with each other to determine whether the verified person's login information is within an error range to perform self face verification verification to store the self face verification verification result, A face-to-face verification server for transmitting face-to-face verification results to the mobile communication terminal of the identity verification person; And
A network communication network for providing a network connection between the scanner and the face verification verification server,
The scanner includes:
A biometric identification information reading unit for reading biometric identification information of a principal identifying person;
A login time generating unit for generating a time at which the biometric identification information of the verifier is read out as a login time;
An authenticator log-in information transmission unit that transmits the log-in time to the face-to-face verification server, and transmits the login time to the face-to-face verification server together with the IP address of the scanner connected to the network communication network as a login position when transmitting the login time;
When the login authentication is completed, the ID of the subject is scanned within a predetermined time limit from the time when the login authentication is completed to generate a scan image and a scan time, which is a time at which the scan is completed. A scan unit that does not generate scan signals;
And transmits the scanned image and the scan time to the facial affirmation verification server. When the scanner transmits the scan image and the scan time, the scanner sets the IP address connected to the network communication network as a scan position, A scan information transmitting unit;
A forgery-and-fake output unit for displaying whether the ID card is forged or falsified or outputting it as audio;
A forgery and falsification judging unit for judging whether or not the identification card is forged or falsified by using the material of the identification card, the hologram printing pattern, and the resident registration number to generate the forgery verification result; And
A forgery verification result processing unit for transmitting the forgery proof verification result together with the scan image, the scan position, and the scan time to the face-to-face verification server, and, if the scanned ID is determined to be a forgery ID, Lt; / RTI >
The face-to-face verification server comprises:
And a controller for receiving from the scanner the identifier login information including the login position and the login time which is the time at which the login is completed and the subject scan information including the scan position and the scan time, A server communication unit for transmitting to the terminal;
A position verification unit for determining whether the difference between the login position and the scan position is within a predetermined position threshold range and outputting a position verification success message if the difference is within the position threshold range and outputting a position verification failure message if the difference is outside the position threshold range; ;
And outputs a time verification failure message if the difference between the login time and the scan time is within a preset time threshold range, outputs a time verification success message if the difference is within the time threshold range, ; And
Face confirmation verification result when the location verification success message and the time verification success message are both output, and when the location verification failure message and the time verification failure message are output, Face verification verification system apparatus including a storage unit for storing face-to-face verification verification results storing verification results as face-to-face verification verification failures.
delete delete delete The system according to claim 1, wherein the face-
And transmits the forgery verification result to the mobile communication terminal of the principal identity verifier.
The method according to claim 1,
When the biometric identification information read by the biometric identification information reading unit matches the biometric identification information of the verified identity registered in advance in the scanner,
Or when the biometric identification information read by the biometric identification information reading unit matches the biometric identification information of the verified identity person registered in advance in the face verification verification server.
delete delete delete
KR1020150183899A 2015-12-22 2015-12-22 System for vertificating identification KR101635176B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020150183899A KR101635176B1 (en) 2015-12-22 2015-12-22 System for vertificating identification
PCT/KR2016/015116 WO2017111506A1 (en) 2015-12-22 2016-12-22 Subject face-to-face confirmation verification system device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150183899A KR101635176B1 (en) 2015-12-22 2015-12-22 System for vertificating identification

Publications (1)

Publication Number Publication Date
KR101635176B1 true KR101635176B1 (en) 2016-06-30

Family

ID=56352982

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150183899A KR101635176B1 (en) 2015-12-22 2015-12-22 System for vertificating identification

Country Status (2)

Country Link
KR (1) KR101635176B1 (en)
WO (1) WO2017111506A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200044503A (en) * 2018-10-19 2020-04-29 라인 가부시키가이샤 Method, computer apparatus, and computer program for providing authentication data

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109413495A (en) * 2018-09-06 2019-03-01 广州虎牙信息科技有限公司 A kind of login method, device, system, electronic equipment and storage medium
WO2023022367A1 (en) * 2021-08-19 2023-02-23 민팃(주) Personal authentication method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040058368A (en) * 2002-12-26 2004-07-05 한민규 A log-in/log-out method by using a mobile communication device and a system for enabling the method
KR20060052049A (en) * 2004-10-05 2006-05-19 문희열 Apparatus of auto-selling note issuing entrance and exit control by using identification card
US20090008501A1 (en) 2003-04-07 2009-01-08 Airbus Uk Limited Landing gear
KR20150087541A (en) * 2014-01-22 2015-07-30 서울신용평가정보 주식회사 Method for authenticating user of face-to-face type based on location information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070036491A (en) * 2005-09-29 2007-04-03 삼도산업전기(주) Id card verifying system and method thereof
KR20150034463A (en) * 2013-09-26 2015-04-03 한국전자통신연구원 Authentication system and authentication method for smartwork using mobile device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040058368A (en) * 2002-12-26 2004-07-05 한민규 A log-in/log-out method by using a mobile communication device and a system for enabling the method
US20090008501A1 (en) 2003-04-07 2009-01-08 Airbus Uk Limited Landing gear
KR20060052049A (en) * 2004-10-05 2006-05-19 문희열 Apparatus of auto-selling note issuing entrance and exit control by using identification card
KR20150087541A (en) * 2014-01-22 2015-07-30 서울신용평가정보 주식회사 Method for authenticating user of face-to-face type based on location information

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200044503A (en) * 2018-10-19 2020-04-29 라인 가부시키가이샤 Method, computer apparatus, and computer program for providing authentication data
KR102565422B1 (en) * 2018-10-19 2023-08-09 라인 가부시키가이샤 Method, computer apparatus, and computer program for providing authentication data

Also Published As

Publication number Publication date
WO2017111506A1 (en) 2017-06-29

Similar Documents

Publication Publication Date Title
US11736296B2 (en) Biometric verification process using certification token
US20210166241A1 (en) Methods, apparatuses, storage mediums and terminal devices for authentication
JP6648110B2 (en) System and method for authenticating a client to a device
US11157905B2 (en) Secure on device cardholder authentication using biometric data
US8510797B2 (en) Online user authentication
KR102510706B1 (en) User authentication based on radio frequency identifiable identification documents and gesture request-response protocols
EP2065798A1 (en) Method for performing secure online transactions with a mobile station and a mobile station
US20130023241A1 (en) Authentication method and system using portable terminal
CN111742314B (en) Biometric sensor on portable device
KR20180013710A (en) Public key infrastructure based service authentication method and system
KR101937136B1 (en) System and method for authenticating identity using multi-biometrics
JP2015088080A (en) Authentication system, authentication method, and program
KR101635176B1 (en) System for vertificating identification
KR101282824B1 (en) Meeting attestation system and providing method thereof
CN107240023A (en) client identity confirmation method, device and system
CN107292579A (en) Declaration form saves treating method and apparatus from damage
TWI666565B (en) Identity authentication system and method thereof
KR101240231B1 (en) A mobile phone id card security system
US20200412715A1 (en) Biometric data contextual processing
KR20170052903A (en) Method for Converging Certification of Remote Facing and Non-facing Certification
WO2022091221A1 (en) Information processing device, information processing method, and program
KR102392147B1 (en) Method for Converging Facing and Non-facing Certification
US20200204377A1 (en) Digital notarization station that uses a biometric identification service
KR20150105937A (en) Method for loan covenant and apparatus for using the same
KR20140142465A (en) Method for loan covenant and apparatus for using the same

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20190410

Year of fee payment: 4