WO2016066040A1 - 一种身份认证方法及装置 - Google Patents

一种身份认证方法及装置 Download PDF

Info

Publication number
WO2016066040A1
WO2016066040A1 PCT/CN2015/092507 CN2015092507W WO2016066040A1 WO 2016066040 A1 WO2016066040 A1 WO 2016066040A1 CN 2015092507 W CN2015092507 W CN 2015092507W WO 2016066040 A1 WO2016066040 A1 WO 2016066040A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
information
authenticated
terminal
biometric information
Prior art date
Application number
PCT/CN2015/092507
Other languages
English (en)
French (fr)
Inventor
冯江
赵磊
唐宏
Original Assignee
阿里巴巴集团控股有限公司
冯江
赵磊
唐宏
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司, 冯江, 赵磊, 唐宏 filed Critical 阿里巴巴集团控股有限公司
Priority to EP15854858.6A priority Critical patent/EP3214798B1/en
Priority to KR1020177014496A priority patent/KR102248242B1/ko
Priority to JP2017522483A priority patent/JP6644777B2/ja
Priority to SG11201703486SA priority patent/SG11201703486SA/en
Priority to KR1020217012932A priority patent/KR102391887B1/ko
Publication of WO2016066040A1 publication Critical patent/WO2016066040A1/zh
Priority to US15/581,752 priority patent/US10572642B2/en
Priority to US16/740,313 priority patent/US10839061B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Definitions

  • the present application relates to the field of network communication technologies, and in particular, to an identity authentication method and apparatus.
  • the user can obtain services such as account registration, account login, account activation, account cancellation, and the like provided by the service provider by operating the account on the webpage.
  • services such as account registration, account login, account activation, account cancellation, and the like provided by the service provider by operating the account on the webpage.
  • the service provider needs to authenticate the identity of the current user through the server before providing the user with various services.
  • the identity authentication of the user passes, the The user provides the corresponding service, otherwise, the corresponding service is refused for the user.
  • the server authenticates the identity of the user by verifying the user's credentials information (such as a personal identification number).
  • the server displays the authentication page to the user through the terminal.
  • the server receives the certificate information input by the user on the authentication page, the server can verify whether the document information is legal through the third-party system. Yes, the identity authentication is confirmed, otherwise, the identity authentication is not confirmed.
  • the above-mentioned identity authentication method provided by the prior art can only determine whether the user's ID information is legal, and cannot determine whether the user who inputs the credential information is the legal holder of the document. Therefore, the identity authentication result obtained by the prior art has low credibility.
  • the embodiment of the present application provides an identity authentication method and device, which are used to improve the credibility of user identity authentication.
  • a first acquiring module configured to acquire biometric information to be authenticated collected by the terminal
  • a second acquiring module configured to acquire the credential information sent by the terminal
  • a third acquiring module configured to acquire pre-stored biometric information corresponding to the credential information
  • the identity authentication module is configured to determine whether the biometric information to be authenticated matches the pre-stored biometric information, and if yes, determine that the identity authentication is passed; otherwise, determine that the identity authentication fails.
  • the identity authentication method acquires the biometric feature information to be authenticated collected by the terminal and the certificate information sent by the terminal, and acquires pre-stored biometric information corresponding to the credential information. Determining whether the biometric information to be authenticated matches the pre-stored biometric information, and if so, determining that the identity authentication is passed; otherwise, determining that the identity authentication fails, thereby effectively improving the credibility of the user identity authentication.
  • FIG. 1 is a schematic flowchart of an identity authentication method according to an embodiment of the present application
  • FIG. 2 is a second schematic flowchart of an identity authentication method according to an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of an identity authentication apparatus according to an embodiment of the present application.
  • the server authenticates the identity of the user by verifying the user's credentials information. According to the verification result obtained by verifying the information of the certificate, it is impossible to determine whether the user who inputs the document information is the legal holder of the document. Considering that in the actual application scenario, the biometric information and the credential information of the user can prove the legal identity of the user, and the correspondence between the biometric information and the credential information is unique.
  • the present application obtains the current user's Authenticating the biometric information and the credential information, and obtaining pre-stored biometric information corresponding to the credential information, determining whether the biometric information to be authenticated and the pre-stored biometric information match, and if so, indicating that the current user providing the credential information is the credential information
  • the legal holder himself otherwise, indicates that the current user who provides the document information is the illegal holder of the document information, thereby effectively improving the credibility of the user identity authentication.
  • FIG. 1 is a schematic flowchart of an identity authentication method according to an embodiment of the present disclosure, where the method includes:
  • the biometric information to be authenticated in the embodiment of the present application may be physiological feature information such as facial feature information, fingerprint feature information, and palmprint feature information of the user, or may be behaviors such as gait feature information and sound feature information of the user.
  • Feature information may be physiological feature information such as facial feature information, fingerprint feature information, and palmprint feature information of the user, or may be behaviors such as gait feature information and sound feature information of the user.
  • the server may obtain the face image, the fingerprint image, the palm print image, the gait image or the audio data collected by the terminal, and identify the face image, the fingerprint image, and the palm print image.
  • Biometric information to be authenticated in the gait image or audio data eg, facial feature information, fingerprint feature information, palmprint feature information, gait feature information, or sound feature information.
  • the document information described in the embodiments of the present application may be: user information on a resident ID card, a passport, a military officer's card, a work permit, a student card, a degree certificate, a graduation certificate, a bank card, a membership card, and the like.
  • the server may obtain the ID information input by the user on the page displayed by the terminal.
  • biometric information to be authenticated is the fingerprint feature information
  • ID information is the ID number
  • the server may display the authentication page to the user through the terminal, and prompt the user to collect the fingerprint feature information (biometric information) of the user through the authentication page.
  • the user starts the fingerprint collection device on the terminal and collects the fingerprint image according to the prompt of the authentication page.
  • the terminal identifies the fingerprint feature information in the fingerprint image, and sends the fingerprint feature information as the to-be-authenticated fingerprint feature information to the server, and the server acquires the feature information to be authenticated collected by the terminal.
  • the server can also prompt the user to input an identity card number (document information) through the authentication page.
  • the user enters the ID number on the page according to the prompt on the authentication page.
  • the terminal sends the ID number entered by the user to the server, and the server can obtain the ID number sent by the terminal.
  • the biometric information corresponding to the user's ID information is pre-stored in the third-party system.
  • the identity card management system such as the identity card management system of the Ministry of Public Security
  • the third-party system creates an identity card number uniquely corresponding to the user for the user, and at least collects one and the same.
  • the unique biometric information (such as fingerprint feature information) of the user.
  • the correspondence between the user's ID number and biometric information is stored in advance in the ID management system.
  • the server obtains the ID number (document information) of the user through step S101
  • the fingerprint feature information biometric information
  • the ID card management system searches from the ID card management system, and the fingerprint feature information is obtained.
  • the fingerprint feature information As pre-stored fingerprint feature information.
  • the correspondence between the user's ID card number and the fingerprint feature information is not limited to being stored in the third-party system.
  • the server may be pre-stored in the information base of the server, so that the server searches for the corresponding fingerprint according to the obtained ID card number. Feature information.
  • step S103 Determine whether the to-be-certified biometric information matches the pre-stored biometric information. If yes, go to step S104; otherwise, go to step S105.
  • the server when the server obtains the fingerprint feature information to be authenticated (the biometric information to be authenticated) collected by the terminal in step S101, and obtains the pre-stored fingerprint feature information (pre-stored biometric information) through step S102, the fingerprint to be authenticated is determined. Whether the feature information and the pre-stored fingerprint feature information match. Specifically, the server may determine whether the similarity between the to-be-authenticated fingerprint feature information and the pre-stored fingerprint feature information is greater than a preset threshold. If yes, determine that the to-be-authenticated fingerprint feature information and the pre-stored fingerprint feature information match, and perform step S104; otherwise, If there is no match, step S105 is performed.
  • the server obtains the biometric information of the current user to be authenticated and the pre-stored biometric information corresponding to the document information provided by the current user, and the biometric information and the document information of the user can be obtained.
  • the legal identity of the user is proved, and the correspondence between the biometric information and the document information is unique. Therefore, if it is determined whether the biometric information to be authenticated and the pre-stored biometric information match, it can be determined whether the user currently providing the credential information is the The legal holder of the document information can effectively improve the credibility of the user identity authentication.
  • the terminal compared with the manner in which the user inputs the document information on the page, the terminal obtains the document information by collecting the certificate image and identifying the document information from the document image, thereby improving the user input of the document information. Convenience. Therefore, the terminal of the present application can collect the ID image and identify the ID information in the ID image for the server to obtain the document information collected by the terminal.
  • the terminal may collect an ID card image through an image collection device (such as a camera or a scanner), identify the ID card number, and send the identified ID card number to the server, and the server may obtain the ID number collected by the terminal.
  • an image collection device such as a camera or a scanner
  • the image may also be sent to the server, and the server identifies the ID number in the image.
  • the terminal or the server can recognize characters (such as Chinese characters and numbers) in the image through optical character recognition (OCR) technology to obtain the ID number in the image.
  • OCR optical character recognition
  • the palmprint collection device or the fingerprint collection device needs to be set on the terminal, which not only improves the cost of identity authentication, but also facilitates user operation. Lower.
  • the server uses the gait feature information or the sound feature information collected by the terminal as the biometric information to be authenticated, the user's identity authentication is trusted because the degree of discrimination between different gait feature information (or sound feature information) is low. The degree is low.
  • an image acquisition device such as a camera
  • the terminal can collect the face image at any time through the camera configured by itself, and recognize the facial feature information, and the server can obtain the image.
  • the face feature information collected by the terminal is provided with an image acquisition device (such as a camera), so that the terminal can collect the face image at any time through the camera configured by itself, and recognize the facial feature information, and the server can obtain the image.
  • the face feature information collected by the terminal is provided with an image acquisition device (such as a camera), so that the terminal can collect the face image at any time through the camera configured by itself, and recognize the facial feature information, and the server can obtain the image.
  • the face feature information collected by the terminal is provided with an image acquisition device (such as a camera), so that the terminal can collect the face image at any time through the camera configured by itself, and recognize the facial feature information, and the server can obtain the image.
  • the face feature information collected by the terminal is provided with an image acquisition device (such as a camera), so that the terminal can collect the face image at any time through
  • the identity authentication information to be authenticated collected by the terminal is taken as an example to describe the identity authentication method provided by the terminal, as shown in FIG. 2 .
  • FIG. 2 is a method for a server to authenticate a user identity according to the feature information to be authenticated according to an embodiment of the present disclosure, and specifically includes the following steps:
  • the server may acquire a face image collected by the terminal through the camera, and identify face feature information in the face image.
  • the server uses the recognized face feature information as the face feature information to be authenticated.
  • the server may first determine that a face graphic exists in the image according to the preset facial feature, and then identify the size of the facial features of the human face in the determined facial image, The location and distance wait for the authentication of the face feature information. Further, when the server determines that there is no face graphic in the image, the prompt information may be returned to the terminal to prompt the terminal that the currently collected image does not meet the requirement.
  • the server may also directly obtain the facial feature information sent by the terminal, and the facial feature information may be the facial feature information that is recognized by the terminal according to the collected facial image.
  • the server may obtain the ID number sent by the terminal, and the ID number may be the ID number entered by the user acquired by the terminal, or may be the ID number recognized by the terminal from the collected ID image.
  • the ID card management system (a third-party system, such as the ID card management system of the Ministry of Public Security) also collects the user's face image and saves the face image and ID card.
  • the facial feature information saved by the identity card management system includes at least facial feature information such as the size, location, and distance of the facial features.
  • the face feature information corresponding to the ID card number can be searched from the ID card management system as pre-stored face feature information.
  • the face image corresponding to the ID card number may be searched from the ID card management system, and the face feature information in the found face image may be identified as pre-stored face feature information.
  • step S203 Determine whether the face feature information to be authenticated matches the pre-stored face feature information. If yes, go to step S204; otherwise, go to step S205.
  • the server compares the size, location, or distance waiting for authentication sub-feature information in the face feature information to be authenticated, and pre-stored face
  • the pre-existing sub-feature information such as the size, position, or distance of the corresponding facial features in the feature information determines the similarity between the face feature information to be authenticated and the pre-stored face feature information.
  • step S204 When the similarity is greater than the preset threshold, it may be determined that the face feature information to be authenticated matches the pre-stored face feature information, and then step S204 is performed; otherwise, the face feature information to be authenticated and the pre-stored face feature information are determined. If the information does not match, step S205 is performed.
  • step S201 when the server obtains the ID card number, the server may also acquire the ID card image collected by the terminal, and identify the ID card number therefrom.
  • the server may obtain an image that is collected by the terminal and includes the face and the ID card. That is to say, the image of the face feature information to be authenticated collected by the terminal further includes an identity card number, and after the server obtains the image collected by the terminal, the server may identify the face feature information to be authenticated and the identity card number from the image.
  • the server may obtain the feature information of the face to be authenticated (the biometric information to be authenticated) and the ID number (document) After the image of the information, the face feature information to be authenticated is identified from the first preset area of the image, and the identity card number is identified from the second preset area of the image.
  • the first preset area and the second preset area may be displayed on the image collection interface, and the user is prompted to collect the face image in the first preset area, and in the second The preset area captures the ID card image.
  • the server After obtaining the image collected by the terminal, the server only recognizes the face feature information from the first preset area, and only identifies the ID card number from the second preset area, instead of identifying the face feature information and the ID card from the entire image. The number, in this way, can effectively reduce the amount of calculations of the server.
  • an illegal user may use a face image or a face model of a legitimate user as a real-time face image of the current user, and the face image collected by the terminal is not the real-time face image of the current user, and thus, Will lead to a decline in the credibility of identity authentication.
  • the server may acquire at least two face images collected by the terminal, and determine the face image. Whether the specified feature information exists to determine whether the face image is a real-time face image of the current user.
  • the server acquiring the image collected by the terminal specifically includes: acquiring the first image and the second image collected by the terminal.
  • the identifying the face feature information to be authenticated included in the image includes: identifying the first to-be-authenticated face feature information included in the first image; and identifying the second to-be-authenticated face feature information included in the second image.
  • the server may also return a prompt message to the terminal to prompt the terminal that the currently collected image does not meet the requirement.
  • the first designated feature information and the second specified feature information may include, but are not limited to, expression feature information, and the first specified feature information and the second specified feature information are different.
  • the terminal when acquiring the first image, the terminal prompts the user to collect an image of the specified expression (such as a smiley image), and when collecting the second image, prompts the user to collect another image of the specified expression (such as a crying image) to obtain two images. Face images with different expressions. In this way, only the user can make a smiley face expression and a crying face expression, and the terminal can successfully collect two face images of different expressions.
  • an illegal user uses a face image of a legitimate user (eg, a photo of a legitimate user) to act as a real-time face image
  • the face image provided by the illegal user cannot satisfy the terminal's requirement for the image, so that the identity authentication cannot pass. Therefore, the server can determine that the user who provides the face image is an illegal user, thereby effectively improving the credibility of the identity authentication.
  • the server may acquire at least two face images collected by the terminal, and determine two of each image. Whether the preset area includes a face image and an ID card image respectively, to determine whether the face image is a real-time face image of the current user, wherein, in the two images, the relative positions of the two preset areas The location is different.
  • the server acquiring the image collected by the terminal specifically includes: acquiring the first image and the second image collected by the terminal. Identifying the biometric information to be authenticated from the first preset area of the image, specifically: identifying biometric information to be authenticated from the first preset area of the first image and the second image, respectively;
  • the identifying the credential information in the area includes: identifying the credential information from the second preset area of the first image and the second image respectively; wherein, the relative of the first preset area and the second preset area in the first image The position is different from the relative position of the first preset area and the second preset area in the second image.
  • the terminal displays the first image collection interface to the user, and prompts the user to collect the face image in the upper left corner (the first preset area), and collect the identity in the lower right corner (the second preset area). Certificate image.
  • the user places the face and the ID card in the relative positions of the upper left corner and the lower right corner, so that the terminal successfully collects the face image in the upper left corner of the first image acquisition interface, and successfully collects the ID image in the lower right corner.
  • the terminal displays the second image collection interface to the user, and prompts the user to collect the face image in the upper right corner (the first preset area), and collects the ID image in the lower left corner (the second preset area).
  • the user places the face and the ID card in the relative positions of the upper right corner and the lower left corner, so that the terminal successfully collects the face image in the upper right corner of the second image acquisition interface, and successfully collects the ID image in the lower left corner.
  • the relative position of the face and the ID card is required to be different, so as to ensure that the first image and the second image that meet the requirements can be successfully collected.
  • image When an illegal user uses a face image and an ID card image of a legitimate user to serve as an image of a real-time face and an ID card, since the relative position between the face image of the legitimate user and the ID card image is fixed, and the face image is The relative position between the image and the ID card image does not necessarily match the relative position between the first preset area and the second preset area displayed by the current image collection interface, so that the illegal user cannot satisfy the requirement of the image of the terminal, therefore, Its identity authentication could not be passed. In this way, the illegal user can prevent the face image or the face model of the legitimate user as the real-time face image of the current user, and perform identity authentication, thereby effectively improving the credibility of the identity authentication.
  • the document information identified from the second preset area of the first image and the second image may be different, for example, the identification information of the front side of the ID card may be identified from the second preset area of the first image, In the second preset area of the second image, the identification information of the reverse side of the ID card is identified.
  • the terminal when collecting different images (the first image and the second image), the terminal not only requires the user to place the face and the ID card in different relative positions, but also requires the user to place the front and back of the ID card differently. Further, the illegal user is prevented from using the face image or the face model of the legitimate user as the real-time face image of the current user, thereby further improving the credibility of the identity authentication.
  • the terminal when the method shown in FIG. 1 is adopted, the terminal can be prohibited from reading the local image of the terminal, and the user is prevented from using the local image of the terminal as the real-time face image of the current user, which can further improve the identity authentication. Credibility.
  • the embodiment of the present application further provides an identity authentication device, as shown in FIG. 3, including:
  • the first obtaining module 31 is configured to acquire biometric information to be authenticated collected by the terminal;
  • the second obtaining module 32 is configured to obtain the credential information sent by the terminal;
  • the third obtaining module 33 is configured to acquire pre-stored biometric information corresponding to the credential information
  • the identity authentication module 34 is configured to determine whether the biometric information to be authenticated matches the pre-stored biometric information, and if yes, determine that the identity authentication passes, otherwise, determine that the identity authentication fails.
  • the biometric information to be authenticated includes facial feature information to be authenticated
  • the pre-stored biometric information includes pre-stored facial feature information
  • the first obtaining module 31 is configured to acquire an image collected by the terminal, and identify biometric information to be authenticated included in the image.
  • the first acquiring module 31 is configured to: acquire the first image and the second image collected by the terminal, identify the first to-be-authenticated face feature information included in the first image, and identify the second image.
  • the device also includes:
  • a specified feature information determining module 35 configured to determine the biometric information to be authenticated and the pre Before the biometric information is matched, determining that the first to-be-authenticated face feature information includes the first specified feature information, and determining that the second to-be-authenticated face feature information includes the second specified feature information;
  • the first designated feature information and the second specified feature information include expression feature information, and the first specified feature information and the second specified feature information are different.
  • the image includes the credential information; the second obtaining module 32 is specifically configured to: identify the credential information from the image collected by the terminal.
  • the first obtaining module 31 is configured to: identify biometric information to be authenticated from the first preset area of the image, and identify the credential information from the second preset area of the image.
  • the first acquiring module 31 is configured to: acquire the first image and the second image collected by the terminal, and respectively identify the biometric information to be authenticated from the first preset area of the first image and the second image, And identifying the document information from the second preset areas of the first image and the second image, respectively;
  • the relative positions of the first preset area and the second preset area in the first image are different from the first preset area and the second preset area in the second image. Relative position.
  • the server obtains the biometric information of the current user to be authenticated sent by the terminal, and acquires the pre-stored biometric information corresponding to the document information provided by the current user, because the biometric information and the certificate of the user are obtained.
  • the information can prove the legal identity of the user, and the biometric information and the document information are uniquely corresponding. Therefore, if it is determined whether the biometric information to be authenticated and the pre-stored biometric information match, it can be determined whether the user currently providing the document information is The legal holder of the document information itself can effectively improve the credibility of the user identity authentication.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, read-only optical ROM (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette, magnetic tape storage or other magnetic storage device or any other non-transportable medium that can be used to store information that can be accessed by a computing device.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.

Abstract

本申请公开了一种身份认证方法及装置,用以提高对用户身份认证的可信度,该方法包括:获取终端采集的待认证生物特征信息和所述终端发送的证件信息;获取与所述证件信息对应的预存生物特征信息;判断所述待认证生物特征信息与所述预存生物特征信息是否匹配,若是,确定身份认证通过,否则,确定所述身份认证不通过,从而可有效提高对用户身份认证的可信度。

Description

一种身份认证方法及装置 技术领域
本申请涉及网络通信技术领域,尤其涉及一种身份认证方法及装置。
背景技术
随着互联网技术的不断发展,越来越多的用户选择在网页上操作,并获取服务提供商提供的各种服务。例如,用户可通过在网页上对账号进行操作,获取服务提供商提供的诸如账号注册、账号登录、账号激活、账号注销等服务。
在实际应用中,为了避免合法用户的账号被非法用户截取,服务提供商在为用户提供各种服务之前,需要通过服务器对当前用户的身份进行认证,当该用户的身份认证通过时,为该用户提供相应的服务,否则,拒绝为该用户提供相应的服务。
在现有技术中,服务器主要通过验证用户的证件信息(如个人身份证号),来认证该用户的身份。
具体的,假设用户在注册某一账号时,服务器通过终端向用户展示认证页面,当服务器接收到用户在该认证页面上输入的证件信息后,可通过第三方系统验证该证件信息是否合法,如果是,则确认身份认证通过,否则,确认身份认证不通过。
但是,通过现有技术提供的上述身份认证方法,只能确定用户的证件信息是否合法,而无法确定输入证件信息的用户是否是该证件的合法持有者本人。因此,通过现有技术提供的身份认证方法,得到的身份认证结果的可信度较低。
发明内容
本申请实施例提供一种身份认证方法及装置,用以提高对用户身份认证的可信度。
本申请实施例提供的一种身份认证方法,包括:
获取终端采集的待认证生物特征信息和所述终端发送的证件信息;
获取与所述证件信息对应的预存生物特征信息;
判断所述待认证生物特征信息与所述预存生物特征信息是否匹配,若是,确定身份认证通过,否则,确定所述身份认证不通过。
本申请实施例提供的一种身份认证装置,包括:
第一获取模块,用于获取终端采集的待认证生物特征信息;
第二获取模块,用于获取所述终端发送的证件信息;
第三获取模块,用于获取与所述证件信息对应的预存生物特征信息;
身份认证模块,用于判断所述待认证生物特征信息与所述预存生物特征信息是否匹配,若是,确定身份认证通过,否则,确定所述身份认证不通过。
本申请实施例提供的身份认证方法,获取终端采集的待认证生物特征信息和该终端发送的证件信息,获取与该证件信息对应的预存生物特征信息。判断该待认证生物特征信息与预存生物特征信息是否匹配,若是,确定身份认证通过,否则,确定身份认证不通过,从而可有效提高对用户身份认证的可信度。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1为本申请实施例提供的身份认证方法流程示意图之一;
图2为本申请实施例提供的身份认证方法流程示意图之二;
图3为本申请实施例提供的身份认证装置结构示意图。
具体实施方式
在现有技术中,服务器是通过验证用户的证件信息对该用户的身份进行认 证的,由于对该证件信息的验证得到的验证结果,无法确定输入证件信息的用户是否是该证件的合法持有者本人。考虑到在实际应用场景中,用户的生物特征信息与证件信息都能够证明该用户的合法身份,且生物特征信息与证件信息的对应关系是唯一的,因此,本申请通过获取当前用户提供的待认证生物特征信息和证件信息,以及获取该证件信息对应的预存生物特征信息,判断该待认证生物特征信息与预存生物特征信息之间是否匹配,若是,说明提供证件信息的当前用户为该证件信息的合法持有者本人,否则,说明提供证件信息的当前用户为该证件信息的非法持有者,从而可有效提高对用户身份认证的可信度。
为使本申请的目的、技术方案和优点更加清楚,以下将结合本申请具体实施例及相应的附图对本申请技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
以下将具体说明本申请实施例提供的身份认证方法。
参见图1,为本申请实施例提供的身份认证方法的流程示意图,该方法包括:
S101、获取终端采集的待认证生物特征信息和该终端发送的证件信息。
本申请实施例所述的待认证生物特征信息,可以是用户的人脸特征信息、指纹特征信息、掌纹特征信息等生理特征信息,也可以是用户的步态特征信息、声音特征信息等行为特征信息。
服务器在获取终端采集的待认证生物特征信息时,具体可获取终端采集的人脸图像、指纹图像、掌纹图像、步态图像或音频数据等,并识别人脸图像、指纹图像、掌纹图像、步态图像或音频数据中的待认证生物特征信息(如,人脸特征信息、指纹特征信息、掌纹特征信息、步态特征信息或声音特征信息)。
本申请实施例所述的证件信息可以是:居民身份证、护照、军官证、工作证、学生证、学位证、毕业证、银行卡、会员卡等证件上的用户信息。
服务器在获取终端发送的证件信息时,具体的,服务器可获取用户在终端展示的页面上输入的证件信息。
下面以待认证生物特征信息为指纹特征信息,证件信息为身份证号码为例说明。
用户在获取服务提供商提供的某一服务之前,服务器可通过终端向用户展示认证页面,并通过该认证页面提示用户采集该用户的指纹特征信息(生物特征信息)。用户根据认证页面的提示,启动终端上的指纹采集装置并采集指纹图像。终端识别该指纹图像中的指纹特征信息,并将该指纹特征信息作为待认证指纹特征信息发送给服务器,则服务器获取该终端采集的待认证指纹特征信息。
服务器还可通过该认证页面提示用户输入身份证号码(证件信息)。用户根据认证页面的提示,在该页面上输入身份证号码。终端将用户输入的身份证号码发送给服务器,服务器则可获取终端发送的身份证号码。
S102、获取与证件信息对应的预存生物特征信息。
在实际应用过程中,第三方系统中会预先存储有与用户的证件信息对应的生物特征信息。例如用户在申请身份证时,作为第三方系统的身份证管理系统(比如公安部的身份证管理系统)会为该用户创建一个与该用户唯一对应的身份证号码,同时至少采集一种与该用户唯一对应的生物特征信息(如指纹特征信息)。该用户的身份证号码和生物特征信息的对应关系预先存储在该身份证管理系统中。
沿用上例,服务器通过步骤S101获取到用户的身份证号码(证件信息)之后,可从身份证管理系统中查找与该身份证号码对应的指纹特征信息(生物特征信息),将该指纹特征信息作为预存指纹特征信息。
当然,用户的身份证号码和指纹特征信息的对应关系,不限于保存在第三方系统中,例如,也可以预先保存在服务器的信息库中,以供服务器根据获取的身份证号码查找对应的指纹特征信息。
S103、判断该待认证生物特征信息与该预存生物特征信息是否匹配,若是,执行步骤S104,否则,执行步骤S105。
继续沿用上例,当服务器通过步骤S101获取到终端采集的待认证指纹特征信息(待认证生物特征信息),且通过步骤S102获取到预存指纹特征信息(预存生物特征信息)之后,判断待认证指纹特征信息和预存指纹特征信息是否匹配。具体的,服务器可判断该待认证指纹特征信息和预存指纹特征信息之间的相似度是否大于预设阈值,若是,确定待认证指纹特征信息和预存指纹特征信息匹配,并执行步骤S104,否则,不匹配,执行步骤S105。
S104、确定身份认证通过。
当待认证指纹特征信息和预存指纹特征信息匹配时,这说明当前输入身份证号码的用户为该身份证号码的合法持有者,从而确定该用户的身份认证通过。
S105、确定身份认证不通过。
当待认证指纹特征信息和预存指纹特征信息不匹配时,这说明当前输入身份证号码的用户为该身份证号码的非法持有者,从而确定该用户的身份认证不通过。
本申请图1所示的方法,服务器通过获取终端发送的当前用户的待认证生物特征信息,以及获取当前用户提供的证件信息对应的预存生物特征信息,由于用户的生物特征信息与证件信息都能够证明该用户的合法身份,且生物特征信息与证件信息的对应关系是唯一的,因此,只要判断待认证生物特征信息和预存生物特征信息是否匹配,就可以确定当前提供证件信息的用户是否为该证件信息的合法持有者本人,从而可有效提高对用户身份认证的可信度。
在本申请实施例中,相比于通过用户在页面上输入证件信息的方式,终端通过采集证件图像,并从该证件图像中识别证件信息的方式来获取证件信息,可提高用户输入证件信息的便利性。因此,本申请终端可采集证件图像,并识别该证件图像中的证件信息,以供服务器获取终端采集的证件信息。
例如,终端可通过图像采集装置(如摄像头或扫描仪)采集身份证图像,并识别身份证号码,将该识别出的身份证号码发送给服务器,服务器则可获取终端采集的身份证号码。
当然,终端采集到身份证图像后,也可将该图像发送给服务器,由服务器识别该图像中的身份证号码。
需要说明的是,终端或服务器可通过光学字符识别(Optical Character Recognition,OCR)技术识别图像中的文字(如汉字和数字),以获取图像中的身份证号码。
在本申请实施例中,当服务器需要获取该掌纹图像或指纹图像时,需要在终端上设置掌纹采集仪或指纹采集仪,这样不但会提高身份认证的成本,而且用户的操作便利性也较低。当服务器将终端采集的步态特征信息或声音特征信息作为待认证生物特征信息时,由于不同的步态特征信息(或声音特征信息)之间的区分度较低,对用户身份认证的可信度较低。
考虑到在实际应用中,几乎每个终端上均设置有图像采集装置(如摄像头),这样,终端可通过自身配置的摄像头随时采集人脸图像,并识别人脸特征信息,服务器就可获取到终端采集的人脸特征信息。
因此,下面将以服务器获取到的待认证生物特征信息为终端采集的待认证人脸特征信息为例,详细说明本申请提供的身份认证方法,如图2所示。
图2为本申请实施例提供的服务器根据待认证人脸特征信息认证用户身份的方法,具体包括以下步骤:
S201、获取终端采集的待认证人脸特征信息和该终端发送的证件信息。
例如,服务器可获取终端通过摄像头采集的人脸图像,并识别该人脸图像中的人脸特征信息。服务器将识别出的人脸特征信息作为待认证人脸特征信息。
具体的,服务器获取终端采集的图像后,可根据预设人脸特征首先确定该图像中存在人脸图形,然后在确定的人脸图形中识别人脸的五官轮廓的大小、 位置和距离等待认证人脸特征信息。进一步的,当服务器在确定该图像中不存在人脸图形时,可向终端返回提示信息,以提示终端当前采集的图像不符合要求。
当然,服务器也可直接获取终端发送的人脸特征信息,该人脸特征信息可以是终端根据采集的人脸图像识别出的人脸特征信息。
在获取证件信息时,服务器可获取终端发送的身份证号码,该身份证号码可以是终端获取的用户输入的身份证号码,也可以是终端从采集的身份证图像中识别出的身份证号码。
S202、获取与身份证号码对应的预存人脸特征信息。
在实际应用场景中,用户在申请身份证时,身份证管理系统(第三方系统,比如公安部的身份证管理系统。)还会采集用户的人脸图像,并保存该人脸图像与身份证号码的对应关系,或者保存该人脸图像中的人脸特征信息与身份证号码的对应关系。其中,身份证管理系统保存的人脸特征信息至少包括五官轮廓的大小、位置和距离等人脸特征信息。
服务器通过步骤S201获取到该用户的身份证号码之后,可从身份证管理系统查找与该身份证号码对应的人脸特征信息,作为预存人脸特征信息。或者可从身份证管理系统查找与该身份证号码对应的人脸图像,并识别查找到的该人脸图像中的人脸特征信息,作为预存人脸特征信息。
S203、判断该待认证人脸特征信息与该预存人脸特征信息是否匹配,若是,执行步骤S204,否则,执行步骤S205。
具体的,服务器获取到用户的待认证人脸特征信息和预存人脸特征信息之后,比较待认证人脸特征信息中的五官轮廓的大小、位置,或距离等待认证子特征信息,与预存人脸特征信息中对应的五官轮廓的大小、位置,或距离等预存子特征信息,确定待认证人脸特征信息和预存人脸特征信息之间的相似度。
当相似度大于预设阈值时,可确定待认证人脸特征信息与预存人脸特征信息匹配,则执行步骤S204,否则,确定待认证人脸特征信息与预存人脸特征信 息不匹配,执行步骤S205。
S204、确定身份认证通过。
S205、确定所述身份认证不通过。
在步骤S201中,服务器在获取身份证号码时,也可获取终端采集的身份证图像,并从中识别身份证号码。
当服务器通过获取终端采集的图像,来识别图像中的身份证号码时,为了提高身份认证的效率,可选的,服务器可获取终端采集的同时包含人脸和身份证的图像。也就是说,终端采集的包含待认证人脸特征信息的图像中还包含身份证号码,则服务器获取到终端采集的图像后,可从该图像中识别待认证人脸特征信息和身份证号码。
由于服务器是从整个图像中识别人脸特征信息和身份证号码的,为了减少服务器的计算量,服务器可在获取到包含待认证人脸特征信息(待认证生物特征信息)和身份证号码(证件信息)的图像之后,从该图像的第一预设区域中识别待认证人脸特征信息,从该图像的第二预设区域中识别身份证号码。
例如,终端在同时拍摄人脸和身份证时,可在图像采集界面上显示第一预设区域和第二预设区域,并提示用户在第一预设区域采集人脸图像,且在第二预设区域采集身份证图像。服务器获取到终端采集的该图像后,仅从第一预设区域识别人脸特征信息,且仅从第二预设区域识别身份证号码,而不是从整个图像中识别人脸特征信息和身份证号码,这样,就可有效减少服务器的计算量。
在实际应用场景中,可能存在非法用户将合法用户的人脸图像或人脸模型当做当前用户的实时人脸图像,则终端采集的人脸图像就不是当前用户的实时人脸图像,这样,就会导致身份认证的可信度下降。
因此,在本申请实施例中,服务器在判断所述待认证人脸特征信息与所述预存人脸特征信息是否匹配之前,可获取终端采集的至少两幅人脸图像,并判断人脸图像中是否存在指定特征信息,来确定该人脸图像是否为当前用户的实时人脸图像。
具体的,在步骤S201中,服务器获取终端采集的图像,具体包括:获取终端采集的第一图像和第二图像。识别该图像中包含的待认证人脸特征信息,具体包括:识别所述第一图像中包含的第一待认证人脸特征信息;识别第二图像中包含的第二待认证人脸特征信息。判断该第一待认证人脸特征信息中是否包含第一指定特征信息,且判断该第二待认证人脸特征信息中是否包含第二指定特征信息;当第一待认证人脸特征信息中包含第一指定特征信息,且第二待认证人脸特征信息中包含第二指定特征信息,则可确定终端采集的图像为当前用户的实时人脸图像,通过步骤S203判断该待认证人脸特征信息与该预存人脸特征信息是否匹配,否则,确定该图像可能是非法用户提供的人脸图像,则结束后续流程。当然,服务器确定该图像可能是非法用户提供的人脸图像后,还可向终端返回提示信息,以提示终端当前采集的图像不符合要求。
其中,该第一指定特征信息和第二指定特征信息可以但不限于包括表情特征信息,该第一指定特征信息和第二指定特征信息不同。
例如,终端在采集第一图像时,提示用户采集指定表情的图像(如笑脸图像),在采集第二图像时,提示用户采集另一指定表情的图像(如哭脸图像),以获取两幅不同表情的人脸图像。这样,只有用户分别摆出笑脸的表情和哭脸的表情,终端才能成功采集到两幅不同表情的人脸图像。而当非法用户使用合法用户的人脸图像(如,合法用户的照片)充当实时人脸图像时,由于该人脸图像中人的表情是固定的,且该人脸图像中人的表情与终端指定表情不一定相符,因此,非法用户提供的人脸图像无法满足终端对图像的要求,这样其身份认证就无法通过。因此,服务器就可确定提供该人脸图像的用户为非法用户,从而可有效提高身份认证的可信度。
在本申请实施例中,服务器在判断所述待认证人脸特征信息与所述预存人脸特征信息是否匹配之前,可获取终端采集的至少两幅人脸图像,并判断每幅图像中的两个预设区域是否分别包含人脸图像和身份证图像,来确定该人脸图像是否为当前用户的实时人脸图像,其中,两幅图像中,两个预设区域的相对 位置不同。
具体的,在步骤S201中,服务器获取终端采集的图像,具体包括:获取终端采集的第一图像和第二图像。从图像的第一预设区域中识别待认证生物特征信息,具体包括:分别从该第一图像和第二图像的第一预设区域中识别待认证生物特征信息;从该图像的第二预设区域中识别证件信息,具体包括:分别从该第一图像和第二图像的第二预设区域中识别证件信息;其中,第一图像中第一预设区域和第二预设区域的相对位置,不同于第二图像中第一预设区域和第二预设区域的相对位置。
例如,终端在采集第一图像时,向用户展示第一图像采集界面,并提示用户在左上角(第一预设区域)采集人脸图像,且在右下角(第二预设区域)采集身份证图像。用户将人脸和身份证按照左上角和右下角的相对位置摆放,使得终端在第一图像采集界面的左上角成功采集到人脸图像,在右下角成功采集到身份证图像。终端在采集第二图像时,向用户展示第二图像采集界面,并提示用户在右上角(第一预设区域)采集人脸图像,且在左下角(第二预设区域)采集身份证图像。用户将人脸和身份证按照右上角和左下角的相对位置摆放,使得终端在第二图像采集界面的右上角成功采集到人脸图像,在左下角成功采集到身份证图像。
这样,终端在采集不同的图像(第一图像和第二图像)时,要求用户摆放人脸和身份证的相对位置也不相同,以保证可成功采集到符合要求的第一图像和第二图像。而当非法用户使用合法用户的人脸图像和身份证图像充当实时人脸和身份证的图像时,由于合法用户的人脸图像和身份证图像之间的相对位置是固定的,且人脸图像和身份证图像之间的相对位置不一定符合当前图像采集界面展示的第一预设区域和第二预设区域之间的相对位置,这样,非法用户就无法满足终端对图像的要求,因此,其身份认证无法通过。这样就可避免非法用户将合法用户的人脸图像或人脸模型当做当前用户的实时人脸图像,进行身份认证,从而可有效提高身份认证的可信度。
当然,从第一图像和第二图像的第二预设区域中识别出的证件信息可以不同,例如,可从第一图像的第二预设区域中识别身份证正面的证件信息,可从第二图像的第二预设区域中识别身份证反面的证件信息。这样,终端在采集不同的图像(第一图像和第二图像)时,不但要求用户摆放人脸和身份证的相对位置不相同,还要求用户摆放的身份证的正反面不同,这样可进一步避免非法用户将合法用户的人脸图像或人脸模型当做当前用户的实时人脸图像,从而可进一步提高身份认证的可信度。
在本申请实施例中,采用图1所示的方法的同时,可禁止终端读取该终端本地的图像,避免用户采用终端本地的图像作为当前用户的实时人脸图像,可进一步提高身份认证的可信度。
以上为本申请实施例提供的身份认证方法,基于同样的思路,本申请实施例还提供了一种身份认证装置,如图3所示,包括:
第一获取模块31,用于获取终端采集的待认证生物特征信息;
第二获取模块32,用于获取所述终端发送的证件信息;
第三获取模块33,用于获取与所述证件信息对应的预存生物特征信息;
身份认证模块34,用于判断所述待认证生物特征信息与所述预存生物特征信息是否匹配,若是,确定身份认证通过,否则,确定所述身份认证不通过。
可选的,所述待认证生物特征信息包括待认证人脸特征信息,所述预存生物特征信息包括预存人脸特征信息。
可选的,第一获取模块31具体用于,获取终端采集的图像,识别所述图像中包含的待认证生物特征信息。
可选的,第一获取模块31具体用于,获取终端采集的第一图像和第二图像,识别所述第一图像中包含的第一待认证人脸特征信息,识别所述第二图像中包含的第二待认证人脸特征信息;
所述装置还包括:
指定特征信息确定模块35,用于在判断所述待认证生物特征信息与所述预 存生物特征信息是否匹配之前,确定所述第一待认证人脸特征信息中包含第一指定特征信息,且确定所述第二待认证人脸特征信息中包含第二指定特征信息;其中,所述第一指定特征信息和第二指定特征信息包括表情特征信息,所述第一指定特征信息和第二指定特征信息不同。
可选的,所述图像中包含证件信息;第二获取模块32具体用于,从终端采集的所述图像中识别证件信息。
可选的,第一获取模块31具体用于,从所述图像的第一预设区域中识别待认证生物特征信息,从所述图像的第二预设区域中识别证件信息。
可选的,第一获取模块31具体用于,获取终端采集的第一图像和第二图像,分别从所述第一图像和第二图像的第一预设区域中识别待认证生物特征信息,以及分别从所述第一图像和第二图像的第二预设区域中识别证件信息;
其中,所述第一图像中所述第一预设区域和所述第二预设区域的相对位置,不同于所述第二图像中所述第一预设区域和所述第二预设区域的相对位置。
本申请实施例提供的身份认证方法及装置,服务器通过获取终端发送的当前用户的待认证生物特征信息,以及获取当前用户提供的证件信息对应的预存生物特征信息,由于用户的生物特征信息与证件信息都能够证明该用户的合法身份,且生物特征信息与证件信息是唯一对应的,因此,只要判断待认证生物特征信息和预存生物特征信息是否匹配,就可以确定当前提供证件信息的用户是否为该证件信息的合法持有者本人,从而可有效提高对用户身份认证的可信度。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器 (CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
以上仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。

Claims (10)

  1. 一种身份认证方法,其特征在于,包括:
    获取终端采集的待认证生物特征信息和所述终端发送的证件信息;
    获取与所述证件信息对应的预存生物特征信息;
    判断所述待认证生物特征信息与所述预存生物特征信息是否匹配,若是,确定身份认证通过,否则,确定所述身份认证不通过。
  2. 如权利要求1所述的方法,其特征在于,所述待认证生物特征信息包括待认证人脸特征信息,所述预存生物特征信息包括预存人脸特征信息。
  3. 如权利要求2所述的方法,其特征在于,获取终端采集的待认证生物特征信息,具体包括:
    获取终端采集的图像;
    识别所述图像中包含的待认证生物特征信息。
  4. 如权利要求3所述的方法,其特征在于,获取终端采集的图像,具体包括:
    获取终端采集的第一图像和第二图像;
    识别所述图像中包含的待认证生物特征信息,具体包括:
    识别所述第一图像中包含的第一待认证人脸特征信息;以及
    识别所述第二图像中包含的第二待认证人脸特征信息;
    判断所述待认证生物特征信息与所述预存生物特征信息是否匹配之前,所述方法还包括:
    确定所述第一待认证人脸特征信息中包含第一指定特征信息,且确定所述第二待认证人脸特征信息中包含第二指定特征信息;其中,所述第一指定特征信息和第二指定特征信息包括表情特征信息,所述第一指定特征信息和第二指定特征信息不同。
  5. 如权利要求3所述的方法,其特征在于,所述图像中包含证件信息;获取所述终端发送的证件信息,具体包括:
    从终端采集的所述图像中识别证件信息。
  6. 如权利要求5所述的方法,其特征在于,识别所述图像中包含的待认证生物特征信息,具体包括:
    从所述图像的第一预设区域中识别待认证生物特征信息;
    从终端采集的所述图像中识别证件信息,具体包括:
    从所述图像的第二预设区域中识别证件信息。
  7. 如权利要求6所述的方法,其特征在于,获取终端采集的图像,具体包括:
    获取终端采集的第一图像和第二图像;
    从所述图像的第一预设区域中识别待认证生物特征信息,具体包括:
    分别从所述第一图像和第二图像的第一预设区域中识别待认证生物特征信息;
    从所述图像的第二预设区域中识别证件信息,具体包括:
    分别从所述第一图像和第二图像的第二预设区域中识别证件信息;
    其中,所述第一图像中所述第一预设区域和所述第二预设区域的相对位置,不同于所述第二图像中所述第一预设区域和所述第二预设区域的相对位置。
  8. 如权利要求1所述的方法,其特征在于,所述获取与所述证件信息对应的预存生物特征信息,包括:从一第三方系统获得与所述证件信息对应的预存生物特征信息。
  9. 如权利要求8所述的方法,其特征在于,所述第三方系统为公安部的身份证管理系统。
  10. 一种身份认证装置,其特征在于,包括:
    第一获取模块,用于获取终端采集的待认证生物特征信息;
    第二获取模块,用于获取所述终端发送的证件信息;
    第三获取模块,用于获取与所述证件信息对应的预存生物特征信息;
    身份认证模块,用于判断所述待认证生物特征信息与所述预存生物特征信息是否匹配,若是,确定身份认证通过,否则,确定所述身份认证不通过。
PCT/CN2015/092507 2014-10-28 2015-10-22 一种身份认证方法及装置 WO2016066040A1 (zh)

Priority Applications (7)

Application Number Priority Date Filing Date Title
EP15854858.6A EP3214798B1 (en) 2014-10-28 2015-10-22 Identity authentication method and device
KR1020177014496A KR102248242B1 (ko) 2014-10-28 2015-10-22 신원 인증 방법 및 장치
JP2017522483A JP6644777B2 (ja) 2014-10-28 2015-10-22 本人認証方法および装置
SG11201703486SA SG11201703486SA (en) 2014-10-28 2015-10-22 A method and apparatus for identity authentication
KR1020217012932A KR102391887B1 (ko) 2014-10-28 2015-10-22 신원 인증 방법 및 장치
US15/581,752 US10572642B2 (en) 2014-10-28 2017-04-28 Method and apparatus for identity authentication
US16/740,313 US10839061B2 (en) 2014-10-28 2020-01-10 Method and apparatus for identity authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410589657.6 2014-10-28
CN201410589657.6A CN105553919B (zh) 2014-10-28 2014-10-28 一种身份认证方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/581,752 Continuation US10572642B2 (en) 2014-10-28 2017-04-28 Method and apparatus for identity authentication

Publications (1)

Publication Number Publication Date
WO2016066040A1 true WO2016066040A1 (zh) 2016-05-06

Family

ID=55832855

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/092507 WO2016066040A1 (zh) 2014-10-28 2015-10-22 一种身份认证方法及装置

Country Status (7)

Country Link
US (2) US10572642B2 (zh)
EP (1) EP3214798B1 (zh)
JP (1) JP6644777B2 (zh)
KR (2) KR102391887B1 (zh)
CN (1) CN105553919B (zh)
SG (3) SG11201703486SA (zh)
WO (1) WO2016066040A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831695A (zh) * 2018-12-15 2019-05-31 深圳壹账通智能科技有限公司 直播控制方法、装置、电子设备及存储介质
US10572642B2 (en) 2014-10-28 2020-02-25 Alibaba Group Holding Limited Method and apparatus for identity authentication

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106067224A (zh) * 2016-06-13 2016-11-02 深圳市丰巢科技有限公司 用于快递柜的身份认证方法、身份认证系统以及快递柜
CN106101136B (zh) * 2016-07-22 2019-04-12 飞天诚信科技股份有限公司 一种生物特征对比的认证方法及系统
CN106407780A (zh) * 2016-09-08 2017-02-15 北京小米移动软件有限公司 应用运行的方法及装置
CN107992728B (zh) * 2016-10-27 2022-05-20 腾讯科技(深圳)有限公司 人脸验证方法及装置
US10747859B2 (en) * 2017-01-06 2020-08-18 International Business Machines Corporation System, method and computer program product for stateful instruction-based dynamic man-machine interactions for humanness validation
CN107276974B (zh) * 2017-03-10 2020-11-03 创新先进技术有限公司 一种信息处理方法及装置
CN107426172A (zh) * 2017-06-05 2017-12-01 国政通科技股份有限公司 一种身份信息的匹配推送方法及装置
CN107332825A (zh) * 2017-06-09 2017-11-07 国政通科技股份有限公司 一种客户身份认证方法和系统
CN107331069A (zh) * 2017-07-17 2017-11-07 王海峰 物品租借方法和装置
CN107679457A (zh) * 2017-09-06 2018-02-09 阿里巴巴集团控股有限公司 用户身份校验方法及装置
CN107808118A (zh) * 2017-09-28 2018-03-16 平安科技(深圳)有限公司 身份识别方法、电子装置及计算机可读存储介质
US10594690B2 (en) * 2017-11-16 2020-03-17 Bank Of America Corporation Authenticating access to a computing resource using facial recognition based on involuntary facial movement
CN108062511A (zh) * 2017-11-17 2018-05-22 维库(厦门)信息技术有限公司 一种跨区域多摄像头目标识别关联跟踪方法及计算机设备
CN108062530B (zh) * 2017-12-25 2022-03-04 北京诺君安信息技术股份有限公司 一种身份验证方法及系统
US10170135B1 (en) * 2017-12-29 2019-01-01 Intel Corporation Audio gait detection and identification
CN108322448A (zh) * 2018-01-09 2018-07-24 财付通支付科技有限公司 身份验证方法、装置、系统、存储介质和计算机设备
CN108415666A (zh) * 2018-01-20 2018-08-17 福建省数字福建云计算运营有限公司 一种基于家庭云盘的数据存储方法及系统
KR102535720B1 (ko) * 2018-02-28 2023-05-22 엘지전자 주식회사 전자 기기
CN108521503A (zh) * 2018-03-16 2018-09-11 北京小米移动软件有限公司 终端设备的控制方法及装置
CN108765789A (zh) * 2018-05-22 2018-11-06 北京翔云在线数据技术有限公司 智能开户机器人及开户方法
CN108734003A (zh) * 2018-05-22 2018-11-02 深圳市商汤科技有限公司 身份验证方法、装置、设备、存储介质及程序
CN109003345B (zh) * 2018-07-13 2021-07-27 广东电网有限责任公司 身份验证方法、装置及电子设备
KR102127932B1 (ko) * 2018-07-20 2020-06-29 엘지전자 주식회사 전자 장치 및 그 제어 방법
CN109697404A (zh) 2018-09-28 2019-04-30 中国银联股份有限公司 身份识别系统和方法、终端以及计算机存储介质
CN109544715A (zh) * 2018-10-17 2019-03-29 北京三快在线科技有限公司 签到方法、装置、终端设备、系统及存储介质
CN109639641A (zh) * 2018-11-09 2019-04-16 山西特信环宇信息技术有限公司 一种证件链电子身份网络解析系统
JP6774684B2 (ja) * 2018-12-21 2020-10-28 ワンチェック株式会社 情報処理装置、在留カード確認方法、および在留カード確認プログラム
CN109862401A (zh) * 2018-12-21 2019-06-07 深圳创维-Rgb电子有限公司 账号的实名注册方法、装置、电视机及可读存储介质
WO2020133500A1 (zh) * 2018-12-29 2020-07-02 华为技术有限公司 终端设备的解锁方法、设备和存储介质
CN110135137A (zh) * 2019-05-08 2019-08-16 北京科蓝软件系统股份有限公司 一种基于移动设备的网络身份验证方法和装置
CN110400148A (zh) * 2019-07-26 2019-11-01 中移电子商务有限公司 一种交易系统身份识别方法、装置及存储介质
CN110362752A (zh) * 2019-08-12 2019-10-22 珠海格力电器股份有限公司 一种信息推送的方法、装置及计算机可读存储介质
CN110572825A (zh) * 2019-09-04 2019-12-13 广东轻工职业技术学院 一种可穿戴设备认证装置及认证加密方法
CN110852711A (zh) * 2019-11-05 2020-02-28 北京字节跳动网络技术有限公司 签约方法、装置、存储介质及电子设备
CN112773262A (zh) * 2019-11-08 2021-05-11 珠海市一微半导体有限公司 基于扫地机器人的安防控制方法、扫地机器人及芯片
CN111672130A (zh) * 2020-06-03 2020-09-18 西安万像电子科技有限公司 游戏玩家的身份认证方法、认证装置和云游戏系统
CN111611572B (zh) * 2020-06-28 2022-11-22 支付宝(杭州)信息技术有限公司 一种基于人脸认证的实名认证方法及装置
CN113850608A (zh) * 2021-02-09 2021-12-28 广州畅驿智能科技有限公司 一种律师身份鉴别终端和装置
CN112861104A (zh) * 2021-03-24 2021-05-28 重庆度小满优扬科技有限公司 身份验证方法及相关装置
CN113065463A (zh) * 2021-04-01 2021-07-02 江苏芯灵智能科技有限公司 高安全的身份认证系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826151A (zh) * 2009-03-03 2010-09-08 赵毅 一种人脸比对验证身份的方法和系统
US8371501B1 (en) * 2008-10-27 2013-02-12 United Services Automobile Association (Usaa) Systems and methods for a wearable user authentication factor
CN103440482A (zh) * 2013-09-02 2013-12-11 北方工业大学 基于隐蔽视频的身份证件持有人识别方法、系统和装置
CN103634120A (zh) * 2013-12-18 2014-03-12 上海市数字证书认证中心有限公司 基于人脸识别的实名认证方法及系统
CN103714315A (zh) * 2013-12-10 2014-04-09 柳州译海网络科技有限公司 一种基于生物特征信息的身份认证方法
CN103825744A (zh) * 2014-03-13 2014-05-28 上海市数字证书认证中心有限公司 非现场个人数字证书申请方法及系统

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2908320B2 (ja) 1996-06-25 1999-06-21 日本電気移動通信株式会社 送信メッセージ変更方法
JP3738099B2 (ja) 1996-11-12 2006-01-25 沖電気工業株式会社 無人ガソリンスタンドシステム
KR100486062B1 (ko) * 1997-05-09 2005-04-29 지티이 서비스 코포레이션 생측정 증명
JP2002015086A (ja) 2000-06-29 2002-01-18 Oki Electric Ind Co Ltd 身分証明サービス方法及びそのシステム
US20040177097A1 (en) * 2000-12-01 2004-09-09 Philips Electronics North America Corporation Web-based, biometric authentication system and method
JP2006133930A (ja) * 2004-11-04 2006-05-25 Fuji Xerox Co Ltd 認証処理装置、および認証処理方法、並びにコンピュータ・プログラム
US20070288319A1 (en) * 2005-07-25 2007-12-13 Robinson Timothy L System and method for transferring biometrically accessed redemption rights
EP2352321B1 (en) * 2008-10-31 2019-09-11 ZTE Corporation Method and apparatus for authentication processing of mobile terminal
CN102385703B (zh) * 2010-08-27 2015-09-02 北京中星微电子有限公司 一种基于人脸的身份认证方法及系统
US20120140993A1 (en) * 2010-12-05 2012-06-07 Unisys Corp. Secure biometric authentication from an insecure device
US9163952B2 (en) 2011-04-15 2015-10-20 Microsoft Technology Licensing, Llc Suggestive mapping
JP5606382B2 (ja) * 2011-04-20 2014-10-15 株式会社トーショー 個人認証システム
US9082235B2 (en) * 2011-07-12 2015-07-14 Microsoft Technology Licensing, Llc Using facial data for device authentication or subject identification
US9160536B2 (en) * 2011-11-30 2015-10-13 Advanced Biometric Controls, Llc Verification of authenticity and responsiveness of biometric evidence and/or other evidence
JP5870633B2 (ja) 2011-11-08 2016-03-01 日本電気株式会社 情報処理装置、情報処理方法、および情報処理プログラム
JP2013186614A (ja) 2012-03-07 2013-09-19 Nec Software Chubu Ltd 認証情報照合装置、認証情報照合方法、プログラムおよび記録媒体
CN102646190B (zh) * 2012-03-19 2018-05-08 深圳市腾讯计算机系统有限公司 一种基于生物特征的认证方法、装置及系统
US9740917B2 (en) * 2012-09-07 2017-08-22 Stone Lock Global, Inc. Biometric identification systems and methods
JP5970328B2 (ja) * 2012-10-17 2016-08-17 株式会社日立製作所 生体認証サーバおよび生体認証の運用管理方法
CN103425972A (zh) * 2013-09-02 2013-12-04 北方工业大学 身份证件持有人真伪自动识别方法和系统
CN103971043A (zh) * 2014-05-28 2014-08-06 李雪 身份认证方法和认证信息获取方法
CN105553919B (zh) 2014-10-28 2019-02-22 阿里巴巴集团控股有限公司 一种身份认证方法及装置
US20160269411A1 (en) * 2015-03-12 2016-09-15 Ronen MALACHI System and Method for Anonymous Biometric Access Control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8371501B1 (en) * 2008-10-27 2013-02-12 United Services Automobile Association (Usaa) Systems and methods for a wearable user authentication factor
CN101826151A (zh) * 2009-03-03 2010-09-08 赵毅 一种人脸比对验证身份的方法和系统
CN103440482A (zh) * 2013-09-02 2013-12-11 北方工业大学 基于隐蔽视频的身份证件持有人识别方法、系统和装置
CN103714315A (zh) * 2013-12-10 2014-04-09 柳州译海网络科技有限公司 一种基于生物特征信息的身份认证方法
CN103634120A (zh) * 2013-12-18 2014-03-12 上海市数字证书认证中心有限公司 基于人脸识别的实名认证方法及系统
CN103825744A (zh) * 2014-03-13 2014-05-28 上海市数字证书认证中心有限公司 非现场个人数字证书申请方法及系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10572642B2 (en) 2014-10-28 2020-02-25 Alibaba Group Holding Limited Method and apparatus for identity authentication
US10839061B2 (en) 2014-10-28 2020-11-17 Advanced New Technologies, Co., Ltd. Method and apparatus for identity authentication
CN109831695A (zh) * 2018-12-15 2019-05-31 深圳壹账通智能科技有限公司 直播控制方法、装置、电子设备及存储介质
CN109831695B (zh) * 2018-12-15 2022-09-20 深圳壹账通智能科技有限公司 直播控制方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
US10572642B2 (en) 2020-02-25
EP3214798A4 (en) 2017-10-11
KR20210050595A (ko) 2021-05-07
KR102391887B1 (ko) 2022-04-29
US20170235934A1 (en) 2017-08-17
CN105553919B (zh) 2019-02-22
EP3214798B1 (en) 2020-02-05
EP3214798A1 (en) 2017-09-06
KR20170075780A (ko) 2017-07-03
SG10201903661PA (en) 2019-05-30
SG11201703486SA (en) 2017-06-29
SG10202104546PA (en) 2021-05-28
US20200151310A1 (en) 2020-05-14
JP6644777B2 (ja) 2020-02-12
CN105553919A (zh) 2016-05-04
JP2018500634A (ja) 2018-01-11
US10839061B2 (en) 2020-11-17
KR102248242B1 (ko) 2021-05-06

Similar Documents

Publication Publication Date Title
WO2016066040A1 (zh) 一种身份认证方法及装置
CN108804884B (zh) 身份认证的方法、装置及计算机存储介质
US11522848B2 (en) Systems and methods for providing digital identity records to verify identities of users
US9544308B2 (en) Compliant authentication based on dynamically-updated credentials
US10027641B2 (en) Method and apparatus of account login
WO2017167093A1 (zh) 基于生物特征的身份注册、认证的方法和装置
US9122911B2 (en) System, method and computer program for verifying a signatory of a document
KR102070635B1 (ko) 생물학적 특징 인식 장치와 방법 및 생물학적 특징 템플릿 등록 방법
WO2019075840A1 (zh) 身份验证方法、装置、存储介质和计算机设备
US11316699B2 (en) Method for authenticating user contactlessly based on decentralized identifier using verifiable credential and authentication supporting server using the same
JP2015121874A (ja) 生体認証装置、照合用データ検証方法及び照合用データ検証用コンピュータプログラム
WO2022156275A1 (zh) 电子合同生成方法、装置、计算机设备及存储介质
JP2020524860A (ja) 身元認証方法および装置、電子機器、コンピュータプログラムおよび記憶媒体
US20220342967A1 (en) Enhanced biometric authentication
CN105897747B (zh) 基于数字生物签名的数据存储方法、装置及智能设备
CN109344732B (zh) 一种鉴权以及确定鉴权方式的方法、装置及电子设备
CN103049686A (zh) 用Usb Key来实现数据库和用户信息验证方法
Hortai Possibilities of dynamic biometrics for authentication and the circumstances for using dynamic biometric signature
TWM603562U (zh) 人臉辨識系統
Abubakar et al. The Use of Facial Identification in Bank Verification Number (BVN) System in Nigeria
Khan Biometric Security System

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15854858

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2017522483

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 11201703486S

Country of ref document: SG

ENP Entry into the national phase

Ref document number: 20177014496

Country of ref document: KR

Kind code of ref document: A

REEP Request for entry into the european phase

Ref document number: 2015854858

Country of ref document: EP