CN106645409A - Document authenticity identifying method and device - Google Patents

Document authenticity identifying method and device Download PDF

Info

Publication number
CN106645409A
CN106645409A CN201611246247.7A CN201611246247A CN106645409A CN 106645409 A CN106645409 A CN 106645409A CN 201611246247 A CN201611246247 A CN 201611246247A CN 106645409 A CN106645409 A CN 106645409A
Authority
CN
China
Prior art keywords
certificate
attack
user
vocal print
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611246247.7A
Other languages
Chinese (zh)
Inventor
周舒畅
汪彧之
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kuangshi Technology Co Ltd
Beijing Megvii Technology Co Ltd
Beijing Aperture Science and Technology Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Beijing Aperture Science and Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd, Beijing Aperture Science and Technology Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201611246247.7A priority Critical patent/CN106645409A/en
Publication of CN106645409A publication Critical patent/CN106645409A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N29/00Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic waves; Visualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object
    • G01N29/04Analysing solids
    • G01N29/045Analysing solids by imparting shocks to the workpiece and detecting the vibrations or the acoustic waves caused by the shocks
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N2291/00Indexing codes associated with group G01N29/00
    • G01N2291/02Indexing codes associated with the analysed material
    • G01N2291/023Solids

Landscapes

  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Storage Device Security (AREA)

Abstract

An embodiment of the invention provides a document authenticity identifying method. The method comprises the following steps: a video including document flicking by a user is acquired; a voiceprint produced by the user for flicking the document in the video is compared with a preset voiceprint; whether the document is real is judged according to a comparison result. According to the embodiment of the invention, the document authenticity can be determined on the basis of the voiceprint produced by the user for flicking the document in the video, so that loss caused by the fact that an attacker uses an illegal document can be avoided.

Description

Distinguish the method and device of certificate authenticity
Technical field
The present invention relates to field of image recognition, relates more specifically to a kind of method and device for distinguishing certificate authenticity.
Background technology
There is substantial amounts of remote validation status need in reality, such as apply for new cell-phone card on the net, open security account on the net Family etc. is required for remote validation identity card.A kind of conventional verification method requires that user uploads certificate image, and Jing is manual or automatic Distinguish and complete after the true and false authentication.
This verification process first has to guarantee the validity of the certificate image that user is uploaded, and mainly prevents attacker's profit Image is forged with various instruments, such as with photo-editing software synthesis, usurps other people certificate images, reproduction other people certificate images etc. Deng.Therefore, a kind of method that can distinguish certificate authenticity is needed badly.
The content of the invention
The present invention is proposed in view of the problems referred to above.The invention provides a kind of method for distinguishing certificate authenticity, energy Enough determine whether certificate is true, so as to prevent attacker from using illegal certificate.
According to the first aspect of the invention, there is provided a kind of method for distinguishing certificate authenticity, including:
Acquisition includes the video of user's attack certificate;
The vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring;And
According to the comparison result, judge whether the certificate is true.
Exemplarily, in the vocal print for producing in certificate described in user's attack described in the video and the vocal print for prestoring Before comparing, also include:
According to the video, the type of credential of the certificate and the attack mode of the user are determined;
According to the type of credential and the attack mode, the corresponding vocal print for prestoring is obtained.
Exemplarily, the type of credential includes:In identity card, driver's license, passport, social security card, residence permit one Kind.
Exemplarily, the attack mode includes:The fixed form of the certificate and/or the attack position of the user.
Exemplarily, it is described to enter the vocal print that certificate described in user's attack described in the video is produced with the vocal print for prestoring Row is compared, including:
By neutral net, the vocal print that certificate described in user's attack described in the video is produced is entered with the vocal print for prestoring Row is compared.
Exemplarily, it is described to enter the vocal print that certificate described in user's attack described in the video is produced with the vocal print for prestoring Row is compared, including:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
Exemplarily, it is described to obtain the video for including user's attack certificate, including:Being obtained by client includes the use The video of certificate described in the attack of family.
Exemplarily, it is described according to the comparison result, judge whether the certificate is true, including:
If the comparison result be more than or equal to default threshold value, it is determined that the certificate be it is true,
Wherein, the comparison result is between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced The goodness of fit.
According to the second aspect of the invention, there is provided a kind of device for distinguishing certificate authenticity, including:
Acquisition module, for obtaining the video for including user's attack certificate;
Comparing module, produces for certificate described in user's attack described in the video that obtains the acquisition module Vocal print is compared with the vocal print for prestoring;And
Judge module, for according to the comparison result of the comparing module, judging whether the certificate is true.
Exemplarily, also including determining module:
The determining module, for according to the video, determining the type of credential of the certificate and the bullet of the user Hit mode;
The acquisition module, is additionally operable to, according to the type of credential and the attack mode, obtain the corresponding sound for prestoring Line.
Exemplarily, the type of credential includes:In identity card, driver's license, passport, social security card, residence permit one Kind.
Exemplarily, the attack mode includes:The fixed form of the certificate and/or the attack position of the user.
Exemplarily, the comparing module, is used for:By neutral net, by described in user's attack described in the video The vocal print that certificate is produced is compared with the vocal print for prestoring.
Exemplarily, the comparing module, is used for:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
Exemplarily, the acquisition module, is used for:Being obtained by client includes the institute of certificate described in user's attack State video.
Exemplarily, the judge module, is used for:If the comparison result is more than or equal to default threshold value, really The fixed certificate be it is true,
Wherein, the comparison result is between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced The goodness of fit.
The device described in second aspect is implemented for the method for distinguishing certificate authenticity of aforementioned first aspect.
According to the third aspect of the invention we, there is provided a kind of computer chip, the computer chip includes processor and deposits Reservoir.The memory storage has instruction code, and the processor is used to perform the instruction code, and when the processor is held During row instruction code, the method for distinguishing certificate authenticity described in aforementioned first aspect can be realized.
According to the fourth aspect of the invention, there is provided a kind of system for distinguishing certificate authenticity, including:
Client;And
The described device of any implementation of second aspect or second aspect,
Wherein, the client is used to send to described device including the video of user's attack certificate.
Described device can realize the method for distinguishing certificate authenticity described in aforementioned first aspect.
The embodiment of the present invention can be based on the vocal print of the user's attack certificate in video, to determine the authenticity of certificate, this Sample can avoid the loss that attacker is caused using illegal certificate.
Description of the drawings
The embodiment of the present invention is described in more detail by combining accompanying drawing, above-mentioned and other purposes of the present invention, Feature and advantage will be apparent from.Accompanying drawing is used for providing further understanding the embodiment of the present invention, and constitutes explanation A part for book, is used to explain the present invention together with the embodiment of the present invention, is not construed as limiting the invention.In the accompanying drawings, Identical reference number typically represents same parts or step.
Fig. 1 is a schematic block diagram of the electronic equipment of the embodiment of the present invention;
Fig. 2 is an indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 3 is another indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 4 is another indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 5 is a schematic block diagram of the device for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 6 is another schematic block diagram of the device for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 7 is a schematic block diagram of the system for distinguishing certificate authenticity of the embodiment of the present invention.
Specific embodiment
In order that the object, technical solutions and advantages of the present invention become apparent from, root is described in detail below with reference to accompanying drawings According to the example embodiment of the present invention.Obviously, described embodiment is only a part of embodiment of the present invention, rather than this Bright whole embodiments, it should be appreciated that the present invention is not limited by example embodiment described herein.Described in the present invention The embodiment of the present invention, those skilled in the art's all other embodiment resulting in the case where creative work is not paid All should fall under the scope of the present invention.
The embodiment of the present invention can apply to electronic equipment, and Fig. 1 show of the electronic equipment of the embodiment of the present invention Schematic block diagram.Electronic equipment 10 shown in Fig. 1 include one or more processors 102, one or more storage devices 104, Input unit 106, output device 108, imageing sensor 110 and one or more non-image sensors 114, these components lead to Cross bus system 112 and/or other forms interconnection.It should be noted that the component and structure of the electronic equipment 10 shown in Fig. 1 simply show Example property, and it is nonrestrictive, and as needed, the electronic equipment can also have other assemblies and structure.
The processor 102 can include CPU 1021 and GPU 1022 or with data-handling capacity and/or instruction The processing unit of the other forms of executive capability, and other components in the electronic equipment 10 can be controlled to perform expectation Function.
The storage device 104 can include one or more computer programs, and the computer program can With including various forms of computer-readable recording mediums, such as volatile memory 1041 and/or nonvolatile memory 1042.The volatile memory 1041 can for example include random access memory (Random Access Memory, RAM) And/or cache memory (cache) etc..The nonvolatile memory 1042 can for example include read-only storage (Read-Only Memory, ROM), hard disk, flash memory etc..One or many can be stored on the computer-readable recording medium Individual computer program instructions, processor 102 can run described program instruction, to realize various desired functions.In the meter Various application programs and various data can also be stored in calculation machine readable storage medium storing program for executing, such as application program use and/or Various data for producing etc..
The input unit 106 can be device of the user for input instruction, and can include keyboard, mouse, wheat One or more in gram wind and touch-screen etc..
The output device 108 can export various information (such as image or sound) to outside (such as user), and One or more in display, loudspeaker etc. can be included.
Described image sensor 110 can shoot the desired image of user (such as photo, video etc.), and will be captured Image be stored in the storage device 104 so that other components are used.
Work as attention, the component and structure of the electronic equipment 10 shown in Fig. 1 are exemplary, although the electronics shown in Fig. 1 Equipment 10 includes multiple different devices, but as needed, some of which device can not be necessary, some of which The quantity of device can be of the invention that this is not limited with more etc..
Identity document can be referred to as certificate, can be used to prove the identity of individual in various occasions.Conventional certificate has Identity card, driver's license, passport, social security card, residence permit etc..Open an account in such as Web bank, Internet securities account is opened an account Etc. in situation, user can enter certification on line by the mode such as application program (application, APP) or webpage.Typically Ground, needs the hand-held identity card of user to show identity.However, the possible forged identity certificate of some attackers, such as by voluntarily The false identity document of printing and making is opened an account on the net, is so easily caused damage for real holder, it is therefore necessary to The authenticity of identity document is determined on line during certification.
Fig. 2 is an indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention.Side shown in Fig. 2 Method can be performed by the server end being authenticated.Method shown in Fig. 2 includes:
S101, acquisition includes the video of user's attack certificate.
Specifically, during user is authenticated, user can be pointed out to carry out the video of user's attack certificate Pass.
Exemplarily, the video for including user's attack certificate can be obtained by client.Wherein, client can be APP or webpage, for example, can be specific credible APP or credible webpages.Alternatively, before S101, client can be pointed out User is authenticated preparing operation, and points out user attack certificate.
Exemplarily, as shown in figure 3, certification end 202 obtains the video from client 201.Wherein, client 201 can be with Positioned at the mobile terminal with image capture device, mobile terminal for example can be smart mobile phone, panel computer, PC Deng video is the video data containing dynamic image data and voice data.
For example, user can carry out video acquisition by the APP or webpage etc. positioned at mobile terminal, wherein, APP or Webpage is specific credible APP or credible webpages, and credible APP or credible webpages are used to ensure the reliability that video data is originated, The video data for avoiding lawless person from processing using Jing.Before S101, certification end 202 or client 201 can be pointed out to use Shooting (or the referred to as recording a video) function of mobile terminal is opened at family, and points out user attack certificate.Subsequently user can carry according to this Show the corresponding operation of execution, such as user can be sent video to certification end 202 by client 201 according to prompting.
Alternatively, client 201 can gather the video of user's attack certificate, and the video is uploaded to into certification end 202. Or, alternatively, certification end 202 directly can be obtained by the picture pick-up device (or referred to as image capture device) of mobile terminal should The video of user's attack certificate.The present invention is not limited this.
Exemplarily, the two field picture in the video can be intercepted, and obtains the thermodynamic chart of a two field picture (heatmap).Further determined according to the thermodynamic chart and whether there is in the video certificate.
For example, if the value in the thermodynamic chart is more than or equal to default heating power threshold value, show to be deposited in the video In certificate.S102 can then be continued executing with.
If it is understood that determining there is no certificate according to the thermodynamic chart of the two field picture, intercepted again another in the video One two field picture is judged.If after n times two field picture is intercepted, determining there is no certificate, S101 can be re-executed.Its Middle N is predefined positive integer, and such as N=5 or N=10, the present invention is not limited this.
This step S101 carries out data acquisition by being provided with the user side 101 of particular clients, ensure that video counts According to the reliability in source;Certification end 202 is authenticated to video data rather than static image data common at present is recognized Card, considerably increasing lawless person carries out the difficulty of data fabrication, improves the accuracy and authenticity of certification.
S102, the vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring.
Vocal print corresponding with the certificate can be previously stored with the database of certification end 202, and (or referred to as sound refers to Line).Wherein, before the method shown in Fig. 2, the sound that the fitting of the methods such as experiment and/or numerical simulation obtains prestoring can be passed through Line, or can also other modes obtain the vocal print that prestores, the present invention is not limited this.
For example, can only be using a kind of this perfect instrument of identity card if opening bank account on the net, then recognized The certification end 202 of card can be previously stored with the vocal print of identity card.That is, vocal print of the vocal print for prestoring for identity card.
So, S102 can include:The vocal print that user's attack certificate is produced is obtained from video, and the attack certificate is produced Raw vocal print is compared with the vocal print for prestoring.
Exemplarily, can include:By neutral net, certificate described in user's attack described in the video is produced Vocal print is compared with the vocal print for prestoring.For example, the goodness of fit between the two can be obtained by the algorithm of neutral net.Its In, neutral net herein is referred to as certificate detection neutral net.
Exemplarily, the vocal print of user's attack certificate generation can be obtained from video, the sound produced to the attack certificate Line carries out feature extraction, and the result of the feature extraction is compared with the vocal print for prestoring.Wherein, feature extraction As a result it is properly termed as feature extraction sub-network.
Alternatively, as a kind of implementation, if can select one from various perfect instruments during certification used, for example may be used With using any one in identity card or passport.Due to differences such as the materials that different certificates is used, for example, identity card compared with It is hard thicker, and driver's license is softer relatively thin, its corresponding vocal print is also different.After S101 and before S102, can also include: According to the video, the type of credential of the certificate is determined;According to the type of credential, the corresponding vocal print for prestoring is obtained.
For example, certificate can be determined by optical character identification (Optical Character Recognition, OCR) Type, and further database inquired about obtaining the corresponding vocal print for prestoring according to type of credential.
Wherein, type of credential can include:Identity card, driver's license, passport, social security card, residence permit etc..Here, may be used To determine the one kind of type of credential as identity card, in driver's license, passport, social security card, residence permit according to video.
That is, the vocal print of various different certificates can be prestored in the database of certification end 202.For example, may be used It is as shown in table 1 below with the corresponding relation between the vocal print that prestores type of credential and prestore.It is understood that described in above-mentioned basis Type of credential, obtains the corresponding vocal print for prestoring, and refers to:Obtain the vocal print for prestoring corresponding with type of credential.
Table 1
Type of credential The vocal print for prestoring
Identity card The vocal print 1 for prestoring
Driver's license The vocal print 2 for prestoring
If the certificate in S101 is identity card, the vocal print for prestoring in S102 is the sound for prestoring corresponding with identity card Line 1.If the certificate in S101 is driver's license, the vocal print for prestoring in S102 is the vocal print 2 for prestoring corresponding with driver's license.
By this step S102, certification end 202 carries out vocal print on the basis of video image certification and compares certification, due to sound Line feature determines that, with its particularity, this is just further increased by many kinds of parameters such as material, thickness, size of certificate The data fabrication difficulty of lawless person, lifts the reliability of remote authentication result.
Alternatively, as another kind of implementation, because different attack modes can also produce different vocal prints.In S101 Afterwards and before S102, as shown in figure 4, can also include:
S1011, according to the video, determines the type of credential of the certificate and the attack mode of the user;
S1012, according to the type of credential and the attack mode, obtains and the type of credential and the attack mode The corresponding vocal print for prestoring.
That is, various different certificates can be prestored in the database of certification end 202 in different attack sides Vocal print under formula.For example, the corresponding relation between type of credential, attack mode and the vocal print that prestores can be prestored, it is as follows Shown in table 2:
Table 2
Wherein, the attack mode can include:The fixed form of the certificate and/or the attack position of the user. For example, can be so that attack mode 1 to be defined as:One hand of user fixes two of certificate diagonally, in another hand attack certificate Heart position.Can be so that attack mode 2 to be defined as:One hand of user pinches an angle of certificate, in another hand attack certificate Heart position.Can be so that attack mode 3 to be defined as:One hand of user pinches an angle of certificate, another hand attack certificate it is right Angle.Etc..It should be noted that attack mode here is only illustrative, the present invention is not limited this.
Alternatively, before step S101, also including step S100:Prompting carries out certificate attack using the first attack mode Operation;Wherein, the first attack mode is the one kind randomly selected in the attack mode that all vocal prints for prestoring are adopted;Further Alternatively, between step S1011 and step S1012, also including step S1013:Judge attack mode and the institute of the user State whether the first attack mode matches, if matching, execution step S1012, otherwise, return to step S100;
Because the vocal print feature that different attack modes is produced has certain otherness, by such scheme, certification end 202 can at random point out user to choose different attack modes, then by the voice print database for obtaining and the specific attack mode of storage Corresponding voiceprint is compared, and lawless person is difficult to obtain the corresponding voice print database of all of attack mode, so as to enter one Step increased the difficulty of bogus authentication, effectively lift reliability of the certification end 202 to voiceprint result.
S103, according to the comparison result, judges whether the certificate is true.
Exemplarily, if the comparison result be more than or equal to default threshold value, it is determined that the certificate be it is true, its In, comparison result is the goodness of fit between the vocal print that user's attack certificate is produced and the vocal print for prestoring.
Specifically, can by neural computing draw from video obtain user's attack certificate produce vocal print with The goodness of fit between the vocal print for prestoring, the scope of the goodness of fit is between 0 to 1.The goodness of fit is that 1 expression fits like a glove, the goodness of fit Represent for 0 and misfit completely.
If the goodness of fit is more than or equal to default threshold value, it is determined that the certificate is true, that is to say, that the certification Process passes through.If the goodness of fit is less than default threshold value, it is determined that the certificate is false, that is to say, that the verification process loses Lose.
Exemplarily, as shown in figure 3, after S103, can also include:
S104, will determine that result is returned.
Specifically, can will determine that result returns to client 201.If it is determined that certificate is true, can return "true" or " True " or " T " or " certification passes through " etc..If it is determined that certificate is false, "false" or " False " or " F " can be returned or " recognized Card failure " etc..Here, the embodiment of the present invention is not construed as limiting to the concrete presentation for returning.
As can be seen here, the embodiment of the present invention can be based on the vocal print of the user's attack certificate in video, to determine certificate Authenticity, the loss that can so avoid attacker from causing using illegal certificate.
Fig. 5 is a schematic block diagram of the device for distinguishing certificate authenticity of the embodiment of the present invention.Device shown in Fig. 5 50 include:Acquisition module 501, comparing module 502 and judge module 503.
Acquisition module 501, for obtaining the video for including user's attack certificate;
Comparing module 502, for certificate described in user's attack described in the video that obtains the acquisition module 501 The vocal print of generation is compared with the vocal print for prestoring;And
Judge module 503, for according to the comparison result of the comparing module 502, judging whether the certificate is true It is real.
Exemplarily, as shown in fig. 6, also including determining module 504.The determining module 504 can be used for according to described Video, determines the type of credential of the certificate and the attack mode of the user.Acquisition module 501 can be also used for according to really The type of credential and the attack mode that cover half block 504 determines, obtain the corresponding vocal print for prestoring.
Exemplarily, the type of credential can include:In identity card, driver's license, passport, social security card, residence permit One kind.
Exemplarily, the attack mode can include:The fixed form of the certificate and/or the attack position of the user Put.
Exemplarily, comparing module 502 can be used for:By neutral net, by user's attack institute described in the video The vocal print for stating certificate generation is compared with the vocal print for prestoring.
Exemplarily, comparing module 502 can be used for:The sound that certificate described in user's attack described in the video is produced Line carries out feature extraction;The result of the feature extraction is compared with the vocal print for prestoring.
Exemplarily, acquisition module 501 can be specifically for:Being obtained by client includes being demonstrate,proved described in user's attack The video of part.
Exemplarily, judge module 503 can be used for:If the comparison result is more than or equal to default threshold value, Determine that the certificate is true, wherein, the comparison result is that the vocal print that certificate described in user's attack is produced prestores with described Vocal print between the goodness of fit.
Device 50 shown in Fig. 5 or Fig. 6 is implemented for the side for distinguishing certificate authenticity shown in aforementioned Fig. 2 to Fig. 4 Method.Exemplarily, certification end illustrated in fig. 3 202 may be located in the device 50.
In addition, the embodiment of the present invention additionally provides the device that another kind distinguishes certificate authenticity, the device can include place Reason device and memory, wherein, memory is used for store instruction code, during the computing device instruction code, it is possible to achieve aforementioned The methods that distinguish certificate authenticity of the Fig. 2 to Fig. 4 shown in any one.
In addition, the embodiment of the present invention additionally provides a kind of electronic equipment, the electronic equipment can be included shown in Fig. 5 or Fig. 6 Device 50.The electronic equipment can realize the methods that distinguish certificate authenticity of the aforementioned Fig. 2 to Fig. 4 shown in any one, the electricity Sub- equipment can be the equipment for being located at server end.
In addition, as shown in fig. 7, the embodiment of the present invention additionally provides a kind of system for distinguishing certificate authenticity, the system 70 Including client 701 and device 702, the device 702 can be used for for the device 501 shown in Fig. 5 or Fig. 6, and the client 701 To send to device 702 including the video of user's attack certificate.
A kind of optional specific embodiment is that client 701 is located at independently of device 702 with image capture device Terminal in, terminal can be smart mobile phone, panel computer, PC, security protection control end etc., and client 701 is independently of dress Putting 702 can make the system that the present embodiment is provided meet plurality of application scenes according to demand, meanwhile, device 702 can be located simultaneously The video that reason multiple terminal is uploaded, the operating efficiency of effective lifting device 702.
Optional another kind specific embodiment is that client 701 is structure as a whole with device 702, prevents client 701 The video of acquisition is trapped in upload procedure to be distorted, while avoiding the video caused because of factors such as network, power supply, natural environments Upload failure, the reliability of lift system.
Exemplarily, client 701 can be used for pointing out user to be authenticated preparing operation, and point out user's attack to demonstrate,prove Part.For example, the prompting that certification prepares to operate can be including order and required material the step of the verification process etc..Example Such as, user can prepare certificate, press video recording key etc. according to the prompting of client 701.
To send to device 702 including the video of user's attack certificate in client 701, device 702 can be used for Judge whether the certificate is true, generates judged result and outgoing according to the video.For example, device 702 can sentence this Disconnected result is sent to the first client 701.Further it is understood that client 701 can be also used for the transmission of reception device 702 The judged result.
The embodiment of the present invention can be based on the vocal print of the user's attack certificate in video, to determine the authenticity of certificate, this Sample can avoid the loss that attacker is caused using illegal certificate.
Although the example embodiment by reference to Description of Drawings here, it should be understood that above-mentioned example embodiment is merely exemplary , and be not intended to limit the scope of the invention to this.Those of ordinary skill in the art can wherein carry out various changes And modification, it is made without departing from the scope of the present invention and spirit.All such changes and modifications are intended to be included in claims Within required the scope of the present invention.
Those of ordinary skill in the art are it is to be appreciated that the list of each example with reference to the embodiments described herein description Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Each specific application can be used different methods to realize described function, but this realization it is not considered that exceeding The scope of the present invention.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can be passed through Its mode is realized.For example, apparatus embodiments described above are only schematic, for example, the division of the unit, and only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Close or be desirably integrated into another equipment, or some features can be ignored, or do not perform.
In specification mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the present invention and help understand one or more in each inventive aspect, exist To the present invention exemplary embodiment description in, the present invention each feature be grouped together into sometimes single embodiment, figure, Or in descriptions thereof.However, the method for the present invention should be construed to reflect following intention:It is i.e. required for protection The more features of feature that application claims ratio is expressly recited in each claim.More precisely, such as corresponding power As sharp claim reflects, its inventive point is can be with the spy of all features less than certain disclosed single embodiment Levy to solve corresponding technical problem.Therefore, it then follows it is concrete that thus claims of specific embodiment are expressly incorporated in this Separate embodiments of the embodiment, wherein each claim as the present invention itself.
It will be understood to those skilled in the art that in addition to mutually exclusive between feature, any combinations pair can be adopted All features and so disclosed any method disclosed in this specification (including adjoint claim, summary and accompanying drawing) Or all processes or unit of equipment are combined.Unless expressly stated otherwise, this specification (will including adjoint right Ask, make a summary and accompanying drawing) disclosed in each feature can, equivalent identical by offer or similar purpose alternative features replacing.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment required for protection one of arbitrarily Can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation Software module realize, or with combinations thereof realization.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) to realize article analytical equipment according to embodiments of the present invention in some moulds The some or all functions of block.The present invention is also implemented as the part for performing method as described herein or complete The program of device (for example, computer program and computer program) in portion.Such program for realizing the present invention can be stored On a computer-readable medium, or can have one or more signal form.Such signal can be from internet Download on website and obtain, or provide on carrier signal, or provide in any other form.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design without departing from the scope of the appended claims alternative embodiment.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame Claim.
The above, the only specific embodiment of the present invention or the explanation to specific embodiment, the protection of the present invention Scope is not limited thereto, any those familiar with the art the invention discloses technical scope in, can be easily Expect change or replacement, all should be included within the scope of the present invention.Protection scope of the present invention should be with claim Protection domain is defined.

Claims (17)

1. a kind of method for distinguishing certificate authenticity, it is characterised in that include:
Acquisition includes the video of user's attack certificate;
The vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring;And
According to the comparison result, judge whether the certificate is true.
2. the method for claim 1, it is characterised in that described by certificate described in user's attack described in the video Before the vocal print of generation is compared with the vocal print for prestoring, also include:
According to the video, the type of credential of the certificate and the attack mode of the user are determined;
According to the type of credential and the attack mode, the corresponding vocal print for prestoring is obtained.
3. method as claimed in claim 2, it is characterised in that the type of credential includes:Identity card, driver's license, passport, society The one kind in card, residence permit can be ensured.
4. method as claimed in claim 2, it is characterised in that the attack mode includes:The fixed form of the certificate and/ Or the attack position of the user.
5. the method for claim 1, it is characterised in that described to produce in certificate described in user's attack described in the video Raw vocal print is compared with the vocal print for prestoring, including:
By neutral net, the vocal print that certificate described in user's attack described in the video is produced is entered with the vocal print for prestoring Row is compared.
6. the method for claim 1, it is characterised in that described to produce in certificate described in user's attack described in the video Raw vocal print is compared with the vocal print for prestoring, including:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
7. the method for claim 1, it is characterised in that the acquisition includes the video of user's attack certificate, including:
Being obtained by client includes the video of certificate described in user's attack.
8. the method as described in any one of claim 1 to 7, it is characterised in that described according to the comparison result, judges described Whether certificate is true, including:
If the comparison result determines is more than or equal to default threshold value, it is determined that the certificate be it is true,
Wherein, the comparison result is the kiss between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced It is right.
9. a kind of device for distinguishing certificate authenticity, it is characterised in that include:
Acquisition module, for obtaining the video for including user's attack certificate;
Comparing module, for the vocal print that certificate described in user's attack described in the video that obtains the acquisition module is produced Compare with the vocal print for prestoring;And
Judge module, for according to the comparison result of the comparing module, judging whether the certificate is true.
10. device as claimed in claim 9, it is characterised in that also including determining module:
The determining module, for according to the video, determining the type of credential of the certificate and the attack side of the user Formula;
The acquisition module, is additionally operable to, according to the type of credential and the attack mode, obtain the corresponding vocal print for prestoring.
11. devices as claimed in claim 10, it is characterised in that the type of credential includes:Identity card, driver's license, passport, One kind in social security card, residence permit.
12. devices as claimed in claim 10, it is characterised in that the attack mode includes:The fixed form of the certificate And/or the attack position of the user.
13. devices as claimed in claim 9, it is characterised in that the comparing module, are used for:
By neutral net, the vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring It is right.
14. devices as claimed in claim 9, it is characterised in that the comparing module, are used for:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
15. devices as claimed in claim 9, it is characterised in that the acquisition module, are used for:
Being obtained by client includes the video of certificate described in user's attack.
16. devices as described in any one of claim 9 to 15, it is characterised in that the judge module, are used for:
If the comparison result be more than or equal to default threshold value, it is determined that the certificate be it is true,
Wherein, the comparison result is the kiss between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced It is right.
17. a kind of systems for distinguishing certificate authenticity, it is characterised in that include:
Client;And
Device described in any one of claim 9 to 16,
Wherein, the client is used to send to described device including the video of user's attack certificate.
CN201611246247.7A 2016-12-29 2016-12-29 Document authenticity identifying method and device Pending CN106645409A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611246247.7A CN106645409A (en) 2016-12-29 2016-12-29 Document authenticity identifying method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611246247.7A CN106645409A (en) 2016-12-29 2016-12-29 Document authenticity identifying method and device

Publications (1)

Publication Number Publication Date
CN106645409A true CN106645409A (en) 2017-05-10

Family

ID=58836278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611246247.7A Pending CN106645409A (en) 2016-12-29 2016-12-29 Document authenticity identifying method and device

Country Status (1)

Country Link
CN (1) CN106645409A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598710A (en) * 2019-08-21 2019-12-20 阿里巴巴集团控股有限公司 Certificate identification method and device
US11003957B2 (en) 2019-08-21 2021-05-11 Advanced New Technologies Co., Ltd. Method and apparatus for certificate identification
CN113269123A (en) * 2020-07-01 2021-08-17 支付宝实验室(新加坡)有限公司 Certificate identification method and system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1246943A (en) * 1997-12-10 2000-03-08 斯特凡·许布纳 Authenticity attribute
JP2000251108A (en) * 1999-02-26 2000-09-14 Makoto Katsube Method and device for identifying coin, security or the like
CN1790407A (en) * 2004-12-14 2006-06-21 国际商业机器公司 Business method for credit card verification
CN101154297A (en) * 2006-09-28 2008-04-02 王冠男 Multifunctional color-screen personal identification terminal machine
CN101587607A (en) * 2008-05-23 2009-11-25 上海科识通信息科技有限公司 Opening type radio frequency automatic identification gate control system
CN101751548A (en) * 2008-12-01 2010-06-23 中兴通讯股份有限公司 Identity identification managing method and device thereof
CN102123873A (en) * 2008-04-01 2011-07-13 爱克发-格法特公司 Security laminate having a security feature
CN202383766U (en) * 2011-12-31 2012-08-15 北京中科金财科技股份有限公司 Mechanical vibration excited material characteristic-based bill authenticity identification equipment
CN104504321A (en) * 2015-01-05 2015-04-08 湖北微模式科技发展有限公司 Method and system for authenticating remote user based on camera
CN204375000U (en) * 2014-12-31 2015-06-03 成都理工大学 A kind of answer sheet counter based on sound groove recognition technology in e
CN105825553A (en) * 2016-05-31 2016-08-03 广州势必可赢网络科技有限公司 Voice print verifying method and system
CN106023046A (en) * 2016-04-29 2016-10-12 中国联合网络通信有限公司济南市分公司 Operator business asynchronous acceptance method based on Bluetooth identity card and system based on Bluetooth identity card

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1246943A (en) * 1997-12-10 2000-03-08 斯特凡·许布纳 Authenticity attribute
JP2000251108A (en) * 1999-02-26 2000-09-14 Makoto Katsube Method and device for identifying coin, security or the like
CN1790407A (en) * 2004-12-14 2006-06-21 国际商业机器公司 Business method for credit card verification
CN101154297A (en) * 2006-09-28 2008-04-02 王冠男 Multifunctional color-screen personal identification terminal machine
CN102123873A (en) * 2008-04-01 2011-07-13 爱克发-格法特公司 Security laminate having a security feature
CN101587607A (en) * 2008-05-23 2009-11-25 上海科识通信息科技有限公司 Opening type radio frequency automatic identification gate control system
CN101751548A (en) * 2008-12-01 2010-06-23 中兴通讯股份有限公司 Identity identification managing method and device thereof
CN202383766U (en) * 2011-12-31 2012-08-15 北京中科金财科技股份有限公司 Mechanical vibration excited material characteristic-based bill authenticity identification equipment
CN204375000U (en) * 2014-12-31 2015-06-03 成都理工大学 A kind of answer sheet counter based on sound groove recognition technology in e
CN104504321A (en) * 2015-01-05 2015-04-08 湖北微模式科技发展有限公司 Method and system for authenticating remote user based on camera
CN106023046A (en) * 2016-04-29 2016-10-12 中国联合网络通信有限公司济南市分公司 Operator business asynchronous acceptance method based on Bluetooth identity card and system based on Bluetooth identity card
CN105825553A (en) * 2016-05-31 2016-08-03 广州势必可赢网络科技有限公司 Voice print verifying method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598710A (en) * 2019-08-21 2019-12-20 阿里巴巴集团控股有限公司 Certificate identification method and device
US11003957B2 (en) 2019-08-21 2021-05-11 Advanced New Technologies Co., Ltd. Method and apparatus for certificate identification
CN113269123A (en) * 2020-07-01 2021-08-17 支付宝实验室(新加坡)有限公司 Certificate identification method and system
US11295122B2 (en) 2020-07-01 2022-04-05 Alipay Labs (singapore) Pte. Ltd. Document identification method and system
CN113269123B (en) * 2020-07-01 2022-07-29 支付宝实验室(新加坡)有限公司 Certificate identification method and system

Similar Documents

Publication Publication Date Title
CN106803086A (en) Distinguish method, the apparatus and system of certificate authenticity
US9946865B2 (en) Document authentication based on expected wear
Kraetzer et al. Modeling attacks on photo-ID documents and applying media forensics for the detection of facial morphing
US9396383B2 (en) System, method and computer program for verifying a signatory of a document
CN111886842B (en) Remote user authentication using threshold-based matching
US10692167B2 (en) System and method for digitally watermarking digital facial portraits
US9619697B2 (en) Identity authentication platform
US20230030792A1 (en) Document authenticity identification method and apparatus, computer-readable medium, and electronic device
US20170236355A1 (en) Method for securing and verifying a document
US20090328142A1 (en) Systems and Methods for Webpage Verification Using Data-Hiding Technology
CN106645409A (en) Document authenticity identifying method and device
Cross Using artificial intelligence (AI) and deepfakes to deceive victims: the need to rethink current romance fraud prevention messaging
KR101841928B1 (en) Method for issuing document offline, method for validating issued offline document, and server using the same
US20210217024A1 (en) System and Method of Consolidating Identity Services
CN105117920A (en) Anti-counterfeiting method and apparatus for picture electronic certificates
KR20190061377A (en) System for preventing forgery and falsification of data
US20150063656A1 (en) System and Method for Digitally Watermarking Digital Facial Portraits
GB2585172A (en) Systems and methods for verifying and authenticating the remote signing
US11798305B1 (en) Methods and systems for determining the authenticity of an identity document
US20240217255A1 (en) Document Boundary Analysis
US12026932B2 (en) Method to determine authenticity of security hologram
EP4390820A1 (en) Funding central bank digital currency (cbdc) wallet accounts
US20240221406A1 (en) Signature merger during upload process
US11755757B1 (en) Methods and systems for determining the authenticity of an identity document
US11893587B2 (en) System for enhanced authentication using non-fungible tokens (NFTs)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100190 Beijing, Haidian District Academy of Sciences, South Road, No. 2, block A, No. 313

Applicant after: MEGVII INC.

Applicant after: Beijing maigewei Technology Co., Ltd.

Address before: 100190 Beijing, Haidian District Academy of Sciences, South Road, No. 2, block A, No. 313

Applicant before: MEGVII INC.

Applicant before: Beijing aperture Science and Technology Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510