CN106645409A - Document authenticity identifying method and device - Google Patents
Document authenticity identifying method and device Download PDFInfo
- Publication number
- CN106645409A CN106645409A CN201611246247.7A CN201611246247A CN106645409A CN 106645409 A CN106645409 A CN 106645409A CN 201611246247 A CN201611246247 A CN 201611246247A CN 106645409 A CN106645409 A CN 106645409A
- Authority
- CN
- China
- Prior art keywords
- certificate
- attack
- user
- vocal print
- video
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
- G01N29/00—Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic waves; Visualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object
- G01N29/04—Analysing solids
- G01N29/045—Analysing solids by imparting shocks to the workpiece and detecting the vibrations or the acoustic waves caused by the shocks
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
- G01N2291/00—Indexing codes associated with group G01N29/00
- G01N2291/02—Indexing codes associated with the analysed material
- G01N2291/023—Solids
Landscapes
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Chemical & Material Sciences (AREA)
- Analytical Chemistry (AREA)
- Biochemistry (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Immunology (AREA)
- Pathology (AREA)
- Storage Device Security (AREA)
Abstract
An embodiment of the invention provides a document authenticity identifying method. The method comprises the following steps: a video including document flicking by a user is acquired; a voiceprint produced by the user for flicking the document in the video is compared with a preset voiceprint; whether the document is real is judged according to a comparison result. According to the embodiment of the invention, the document authenticity can be determined on the basis of the voiceprint produced by the user for flicking the document in the video, so that loss caused by the fact that an attacker uses an illegal document can be avoided.
Description
Technical field
The present invention relates to field of image recognition, relates more specifically to a kind of method and device for distinguishing certificate authenticity.
Background technology
There is substantial amounts of remote validation status need in reality, such as apply for new cell-phone card on the net, open security account on the net
Family etc. is required for remote validation identity card.A kind of conventional verification method requires that user uploads certificate image, and Jing is manual or automatic
Distinguish and complete after the true and false authentication.
This verification process first has to guarantee the validity of the certificate image that user is uploaded, and mainly prevents attacker's profit
Image is forged with various instruments, such as with photo-editing software synthesis, usurps other people certificate images, reproduction other people certificate images etc.
Deng.Therefore, a kind of method that can distinguish certificate authenticity is needed badly.
The content of the invention
The present invention is proposed in view of the problems referred to above.The invention provides a kind of method for distinguishing certificate authenticity, energy
Enough determine whether certificate is true, so as to prevent attacker from using illegal certificate.
According to the first aspect of the invention, there is provided a kind of method for distinguishing certificate authenticity, including:
Acquisition includes the video of user's attack certificate;
The vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring;And
According to the comparison result, judge whether the certificate is true.
Exemplarily, in the vocal print for producing in certificate described in user's attack described in the video and the vocal print for prestoring
Before comparing, also include:
According to the video, the type of credential of the certificate and the attack mode of the user are determined;
According to the type of credential and the attack mode, the corresponding vocal print for prestoring is obtained.
Exemplarily, the type of credential includes:In identity card, driver's license, passport, social security card, residence permit one
Kind.
Exemplarily, the attack mode includes:The fixed form of the certificate and/or the attack position of the user.
Exemplarily, it is described to enter the vocal print that certificate described in user's attack described in the video is produced with the vocal print for prestoring
Row is compared, including:
By neutral net, the vocal print that certificate described in user's attack described in the video is produced is entered with the vocal print for prestoring
Row is compared.
Exemplarily, it is described to enter the vocal print that certificate described in user's attack described in the video is produced with the vocal print for prestoring
Row is compared, including:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
Exemplarily, it is described to obtain the video for including user's attack certificate, including:Being obtained by client includes the use
The video of certificate described in the attack of family.
Exemplarily, it is described according to the comparison result, judge whether the certificate is true, including:
If the comparison result be more than or equal to default threshold value, it is determined that the certificate be it is true,
Wherein, the comparison result is between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced
The goodness of fit.
According to the second aspect of the invention, there is provided a kind of device for distinguishing certificate authenticity, including:
Acquisition module, for obtaining the video for including user's attack certificate;
Comparing module, produces for certificate described in user's attack described in the video that obtains the acquisition module
Vocal print is compared with the vocal print for prestoring;And
Judge module, for according to the comparison result of the comparing module, judging whether the certificate is true.
Exemplarily, also including determining module:
The determining module, for according to the video, determining the type of credential of the certificate and the bullet of the user
Hit mode;
The acquisition module, is additionally operable to, according to the type of credential and the attack mode, obtain the corresponding sound for prestoring
Line.
Exemplarily, the type of credential includes:In identity card, driver's license, passport, social security card, residence permit one
Kind.
Exemplarily, the attack mode includes:The fixed form of the certificate and/or the attack position of the user.
Exemplarily, the comparing module, is used for:By neutral net, by described in user's attack described in the video
The vocal print that certificate is produced is compared with the vocal print for prestoring.
Exemplarily, the comparing module, is used for:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
Exemplarily, the acquisition module, is used for:Being obtained by client includes the institute of certificate described in user's attack
State video.
Exemplarily, the judge module, is used for:If the comparison result is more than or equal to default threshold value, really
The fixed certificate be it is true,
Wherein, the comparison result is between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced
The goodness of fit.
The device described in second aspect is implemented for the method for distinguishing certificate authenticity of aforementioned first aspect.
According to the third aspect of the invention we, there is provided a kind of computer chip, the computer chip includes processor and deposits
Reservoir.The memory storage has instruction code, and the processor is used to perform the instruction code, and when the processor is held
During row instruction code, the method for distinguishing certificate authenticity described in aforementioned first aspect can be realized.
According to the fourth aspect of the invention, there is provided a kind of system for distinguishing certificate authenticity, including:
Client;And
The described device of any implementation of second aspect or second aspect,
Wherein, the client is used to send to described device including the video of user's attack certificate.
Described device can realize the method for distinguishing certificate authenticity described in aforementioned first aspect.
The embodiment of the present invention can be based on the vocal print of the user's attack certificate in video, to determine the authenticity of certificate, this
Sample can avoid the loss that attacker is caused using illegal certificate.
Description of the drawings
The embodiment of the present invention is described in more detail by combining accompanying drawing, above-mentioned and other purposes of the present invention,
Feature and advantage will be apparent from.Accompanying drawing is used for providing further understanding the embodiment of the present invention, and constitutes explanation
A part for book, is used to explain the present invention together with the embodiment of the present invention, is not construed as limiting the invention.In the accompanying drawings,
Identical reference number typically represents same parts or step.
Fig. 1 is a schematic block diagram of the electronic equipment of the embodiment of the present invention;
Fig. 2 is an indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 3 is another indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 4 is another indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 5 is a schematic block diagram of the device for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 6 is another schematic block diagram of the device for distinguishing certificate authenticity of the embodiment of the present invention;
Fig. 7 is a schematic block diagram of the system for distinguishing certificate authenticity of the embodiment of the present invention.
Specific embodiment
In order that the object, technical solutions and advantages of the present invention become apparent from, root is described in detail below with reference to accompanying drawings
According to the example embodiment of the present invention.Obviously, described embodiment is only a part of embodiment of the present invention, rather than this
Bright whole embodiments, it should be appreciated that the present invention is not limited by example embodiment described herein.Described in the present invention
The embodiment of the present invention, those skilled in the art's all other embodiment resulting in the case where creative work is not paid
All should fall under the scope of the present invention.
The embodiment of the present invention can apply to electronic equipment, and Fig. 1 show of the electronic equipment of the embodiment of the present invention
Schematic block diagram.Electronic equipment 10 shown in Fig. 1 include one or more processors 102, one or more storage devices 104,
Input unit 106, output device 108, imageing sensor 110 and one or more non-image sensors 114, these components lead to
Cross bus system 112 and/or other forms interconnection.It should be noted that the component and structure of the electronic equipment 10 shown in Fig. 1 simply show
Example property, and it is nonrestrictive, and as needed, the electronic equipment can also have other assemblies and structure.
The processor 102 can include CPU 1021 and GPU 1022 or with data-handling capacity and/or instruction
The processing unit of the other forms of executive capability, and other components in the electronic equipment 10 can be controlled to perform expectation
Function.
The storage device 104 can include one or more computer programs, and the computer program can
With including various forms of computer-readable recording mediums, such as volatile memory 1041 and/or nonvolatile memory
1042.The volatile memory 1041 can for example include random access memory (Random Access Memory, RAM)
And/or cache memory (cache) etc..The nonvolatile memory 1042 can for example include read-only storage
(Read-Only Memory, ROM), hard disk, flash memory etc..One or many can be stored on the computer-readable recording medium
Individual computer program instructions, processor 102 can run described program instruction, to realize various desired functions.In the meter
Various application programs and various data can also be stored in calculation machine readable storage medium storing program for executing, such as application program use and/or
Various data for producing etc..
The input unit 106 can be device of the user for input instruction, and can include keyboard, mouse, wheat
One or more in gram wind and touch-screen etc..
The output device 108 can export various information (such as image or sound) to outside (such as user), and
One or more in display, loudspeaker etc. can be included.
Described image sensor 110 can shoot the desired image of user (such as photo, video etc.), and will be captured
Image be stored in the storage device 104 so that other components are used.
Work as attention, the component and structure of the electronic equipment 10 shown in Fig. 1 are exemplary, although the electronics shown in Fig. 1
Equipment 10 includes multiple different devices, but as needed, some of which device can not be necessary, some of which
The quantity of device can be of the invention that this is not limited with more etc..
Identity document can be referred to as certificate, can be used to prove the identity of individual in various occasions.Conventional certificate has
Identity card, driver's license, passport, social security card, residence permit etc..Open an account in such as Web bank, Internet securities account is opened an account
Etc. in situation, user can enter certification on line by the mode such as application program (application, APP) or webpage.Typically
Ground, needs the hand-held identity card of user to show identity.However, the possible forged identity certificate of some attackers, such as by voluntarily
The false identity document of printing and making is opened an account on the net, is so easily caused damage for real holder, it is therefore necessary to
The authenticity of identity document is determined on line during certification.
Fig. 2 is an indicative flowchart of the method for distinguishing certificate authenticity of the embodiment of the present invention.Side shown in Fig. 2
Method can be performed by the server end being authenticated.Method shown in Fig. 2 includes:
S101, acquisition includes the video of user's attack certificate.
Specifically, during user is authenticated, user can be pointed out to carry out the video of user's attack certificate
Pass.
Exemplarily, the video for including user's attack certificate can be obtained by client.Wherein, client can be
APP or webpage, for example, can be specific credible APP or credible webpages.Alternatively, before S101, client can be pointed out
User is authenticated preparing operation, and points out user attack certificate.
Exemplarily, as shown in figure 3, certification end 202 obtains the video from client 201.Wherein, client 201 can be with
Positioned at the mobile terminal with image capture device, mobile terminal for example can be smart mobile phone, panel computer, PC
Deng video is the video data containing dynamic image data and voice data.
For example, user can carry out video acquisition by the APP or webpage etc. positioned at mobile terminal, wherein, APP or
Webpage is specific credible APP or credible webpages, and credible APP or credible webpages are used to ensure the reliability that video data is originated,
The video data for avoiding lawless person from processing using Jing.Before S101, certification end 202 or client 201 can be pointed out to use
Shooting (or the referred to as recording a video) function of mobile terminal is opened at family, and points out user attack certificate.Subsequently user can carry according to this
Show the corresponding operation of execution, such as user can be sent video to certification end 202 by client 201 according to prompting.
Alternatively, client 201 can gather the video of user's attack certificate, and the video is uploaded to into certification end 202.
Or, alternatively, certification end 202 directly can be obtained by the picture pick-up device (or referred to as image capture device) of mobile terminal should
The video of user's attack certificate.The present invention is not limited this.
Exemplarily, the two field picture in the video can be intercepted, and obtains the thermodynamic chart of a two field picture
(heatmap).Further determined according to the thermodynamic chart and whether there is in the video certificate.
For example, if the value in the thermodynamic chart is more than or equal to default heating power threshold value, show to be deposited in the video
In certificate.S102 can then be continued executing with.
If it is understood that determining there is no certificate according to the thermodynamic chart of the two field picture, intercepted again another in the video
One two field picture is judged.If after n times two field picture is intercepted, determining there is no certificate, S101 can be re-executed.Its
Middle N is predefined positive integer, and such as N=5 or N=10, the present invention is not limited this.
This step S101 carries out data acquisition by being provided with the user side 101 of particular clients, ensure that video counts
According to the reliability in source;Certification end 202 is authenticated to video data rather than static image data common at present is recognized
Card, considerably increasing lawless person carries out the difficulty of data fabrication, improves the accuracy and authenticity of certification.
S102, the vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring.
Vocal print corresponding with the certificate can be previously stored with the database of certification end 202, and (or referred to as sound refers to
Line).Wherein, before the method shown in Fig. 2, the sound that the fitting of the methods such as experiment and/or numerical simulation obtains prestoring can be passed through
Line, or can also other modes obtain the vocal print that prestores, the present invention is not limited this.
For example, can only be using a kind of this perfect instrument of identity card if opening bank account on the net, then recognized
The certification end 202 of card can be previously stored with the vocal print of identity card.That is, vocal print of the vocal print for prestoring for identity card.
So, S102 can include:The vocal print that user's attack certificate is produced is obtained from video, and the attack certificate is produced
Raw vocal print is compared with the vocal print for prestoring.
Exemplarily, can include:By neutral net, certificate described in user's attack described in the video is produced
Vocal print is compared with the vocal print for prestoring.For example, the goodness of fit between the two can be obtained by the algorithm of neutral net.Its
In, neutral net herein is referred to as certificate detection neutral net.
Exemplarily, the vocal print of user's attack certificate generation can be obtained from video, the sound produced to the attack certificate
Line carries out feature extraction, and the result of the feature extraction is compared with the vocal print for prestoring.Wherein, feature extraction
As a result it is properly termed as feature extraction sub-network.
Alternatively, as a kind of implementation, if can select one from various perfect instruments during certification used, for example may be used
With using any one in identity card or passport.Due to differences such as the materials that different certificates is used, for example, identity card compared with
It is hard thicker, and driver's license is softer relatively thin, its corresponding vocal print is also different.After S101 and before S102, can also include:
According to the video, the type of credential of the certificate is determined;According to the type of credential, the corresponding vocal print for prestoring is obtained.
For example, certificate can be determined by optical character identification (Optical Character Recognition, OCR)
Type, and further database inquired about obtaining the corresponding vocal print for prestoring according to type of credential.
Wherein, type of credential can include:Identity card, driver's license, passport, social security card, residence permit etc..Here, may be used
To determine the one kind of type of credential as identity card, in driver's license, passport, social security card, residence permit according to video.
That is, the vocal print of various different certificates can be prestored in the database of certification end 202.For example, may be used
It is as shown in table 1 below with the corresponding relation between the vocal print that prestores type of credential and prestore.It is understood that described in above-mentioned basis
Type of credential, obtains the corresponding vocal print for prestoring, and refers to:Obtain the vocal print for prestoring corresponding with type of credential.
Table 1
Type of credential | The vocal print for prestoring |
Identity card | The vocal print 1 for prestoring |
Driver's license | The vocal print 2 for prestoring |
… | … |
If the certificate in S101 is identity card, the vocal print for prestoring in S102 is the sound for prestoring corresponding with identity card
Line 1.If the certificate in S101 is driver's license, the vocal print for prestoring in S102 is the vocal print 2 for prestoring corresponding with driver's license.
By this step S102, certification end 202 carries out vocal print on the basis of video image certification and compares certification, due to sound
Line feature determines that, with its particularity, this is just further increased by many kinds of parameters such as material, thickness, size of certificate
The data fabrication difficulty of lawless person, lifts the reliability of remote authentication result.
Alternatively, as another kind of implementation, because different attack modes can also produce different vocal prints.In S101
Afterwards and before S102, as shown in figure 4, can also include:
S1011, according to the video, determines the type of credential of the certificate and the attack mode of the user;
S1012, according to the type of credential and the attack mode, obtains and the type of credential and the attack mode
The corresponding vocal print for prestoring.
That is, various different certificates can be prestored in the database of certification end 202 in different attack sides
Vocal print under formula.For example, the corresponding relation between type of credential, attack mode and the vocal print that prestores can be prestored, it is as follows
Shown in table 2:
Table 2
Wherein, the attack mode can include:The fixed form of the certificate and/or the attack position of the user.
For example, can be so that attack mode 1 to be defined as:One hand of user fixes two of certificate diagonally, in another hand attack certificate
Heart position.Can be so that attack mode 2 to be defined as:One hand of user pinches an angle of certificate, in another hand attack certificate
Heart position.Can be so that attack mode 3 to be defined as:One hand of user pinches an angle of certificate, another hand attack certificate it is right
Angle.Etc..It should be noted that attack mode here is only illustrative, the present invention is not limited this.
Alternatively, before step S101, also including step S100:Prompting carries out certificate attack using the first attack mode
Operation;Wherein, the first attack mode is the one kind randomly selected in the attack mode that all vocal prints for prestoring are adopted;Further
Alternatively, between step S1011 and step S1012, also including step S1013:Judge attack mode and the institute of the user
State whether the first attack mode matches, if matching, execution step S1012, otherwise, return to step S100;
Because the vocal print feature that different attack modes is produced has certain otherness, by such scheme, certification end
202 can at random point out user to choose different attack modes, then by the voice print database for obtaining and the specific attack mode of storage
Corresponding voiceprint is compared, and lawless person is difficult to obtain the corresponding voice print database of all of attack mode, so as to enter one
Step increased the difficulty of bogus authentication, effectively lift reliability of the certification end 202 to voiceprint result.
S103, according to the comparison result, judges whether the certificate is true.
Exemplarily, if the comparison result be more than or equal to default threshold value, it is determined that the certificate be it is true, its
In, comparison result is the goodness of fit between the vocal print that user's attack certificate is produced and the vocal print for prestoring.
Specifically, can by neural computing draw from video obtain user's attack certificate produce vocal print with
The goodness of fit between the vocal print for prestoring, the scope of the goodness of fit is between 0 to 1.The goodness of fit is that 1 expression fits like a glove, the goodness of fit
Represent for 0 and misfit completely.
If the goodness of fit is more than or equal to default threshold value, it is determined that the certificate is true, that is to say, that the certification
Process passes through.If the goodness of fit is less than default threshold value, it is determined that the certificate is false, that is to say, that the verification process loses
Lose.
Exemplarily, as shown in figure 3, after S103, can also include:
S104, will determine that result is returned.
Specifically, can will determine that result returns to client 201.If it is determined that certificate is true, can return "true" or
" True " or " T " or " certification passes through " etc..If it is determined that certificate is false, "false" or " False " or " F " can be returned or " recognized
Card failure " etc..Here, the embodiment of the present invention is not construed as limiting to the concrete presentation for returning.
As can be seen here, the embodiment of the present invention can be based on the vocal print of the user's attack certificate in video, to determine certificate
Authenticity, the loss that can so avoid attacker from causing using illegal certificate.
Fig. 5 is a schematic block diagram of the device for distinguishing certificate authenticity of the embodiment of the present invention.Device shown in Fig. 5
50 include:Acquisition module 501, comparing module 502 and judge module 503.
Acquisition module 501, for obtaining the video for including user's attack certificate;
Comparing module 502, for certificate described in user's attack described in the video that obtains the acquisition module 501
The vocal print of generation is compared with the vocal print for prestoring;And
Judge module 503, for according to the comparison result of the comparing module 502, judging whether the certificate is true
It is real.
Exemplarily, as shown in fig. 6, also including determining module 504.The determining module 504 can be used for according to described
Video, determines the type of credential of the certificate and the attack mode of the user.Acquisition module 501 can be also used for according to really
The type of credential and the attack mode that cover half block 504 determines, obtain the corresponding vocal print for prestoring.
Exemplarily, the type of credential can include:In identity card, driver's license, passport, social security card, residence permit
One kind.
Exemplarily, the attack mode can include:The fixed form of the certificate and/or the attack position of the user
Put.
Exemplarily, comparing module 502 can be used for:By neutral net, by user's attack institute described in the video
The vocal print for stating certificate generation is compared with the vocal print for prestoring.
Exemplarily, comparing module 502 can be used for:The sound that certificate described in user's attack described in the video is produced
Line carries out feature extraction;The result of the feature extraction is compared with the vocal print for prestoring.
Exemplarily, acquisition module 501 can be specifically for:Being obtained by client includes being demonstrate,proved described in user's attack
The video of part.
Exemplarily, judge module 503 can be used for:If the comparison result is more than or equal to default threshold value,
Determine that the certificate is true, wherein, the comparison result is that the vocal print that certificate described in user's attack is produced prestores with described
Vocal print between the goodness of fit.
Device 50 shown in Fig. 5 or Fig. 6 is implemented for the side for distinguishing certificate authenticity shown in aforementioned Fig. 2 to Fig. 4
Method.Exemplarily, certification end illustrated in fig. 3 202 may be located in the device 50.
In addition, the embodiment of the present invention additionally provides the device that another kind distinguishes certificate authenticity, the device can include place
Reason device and memory, wherein, memory is used for store instruction code, during the computing device instruction code, it is possible to achieve aforementioned
The methods that distinguish certificate authenticity of the Fig. 2 to Fig. 4 shown in any one.
In addition, the embodiment of the present invention additionally provides a kind of electronic equipment, the electronic equipment can be included shown in Fig. 5 or Fig. 6
Device 50.The electronic equipment can realize the methods that distinguish certificate authenticity of the aforementioned Fig. 2 to Fig. 4 shown in any one, the electricity
Sub- equipment can be the equipment for being located at server end.
In addition, as shown in fig. 7, the embodiment of the present invention additionally provides a kind of system for distinguishing certificate authenticity, the system 70
Including client 701 and device 702, the device 702 can be used for for the device 501 shown in Fig. 5 or Fig. 6, and the client 701
To send to device 702 including the video of user's attack certificate.
A kind of optional specific embodiment is that client 701 is located at independently of device 702 with image capture device
Terminal in, terminal can be smart mobile phone, panel computer, PC, security protection control end etc., and client 701 is independently of dress
Putting 702 can make the system that the present embodiment is provided meet plurality of application scenes according to demand, meanwhile, device 702 can be located simultaneously
The video that reason multiple terminal is uploaded, the operating efficiency of effective lifting device 702.
Optional another kind specific embodiment is that client 701 is structure as a whole with device 702, prevents client 701
The video of acquisition is trapped in upload procedure to be distorted, while avoiding the video caused because of factors such as network, power supply, natural environments
Upload failure, the reliability of lift system.
Exemplarily, client 701 can be used for pointing out user to be authenticated preparing operation, and point out user's attack to demonstrate,prove
Part.For example, the prompting that certification prepares to operate can be including order and required material the step of the verification process etc..Example
Such as, user can prepare certificate, press video recording key etc. according to the prompting of client 701.
To send to device 702 including the video of user's attack certificate in client 701, device 702 can be used for
Judge whether the certificate is true, generates judged result and outgoing according to the video.For example, device 702 can sentence this
Disconnected result is sent to the first client 701.Further it is understood that client 701 can be also used for the transmission of reception device 702
The judged result.
The embodiment of the present invention can be based on the vocal print of the user's attack certificate in video, to determine the authenticity of certificate, this
Sample can avoid the loss that attacker is caused using illegal certificate.
Although the example embodiment by reference to Description of Drawings here, it should be understood that above-mentioned example embodiment is merely exemplary
, and be not intended to limit the scope of the invention to this.Those of ordinary skill in the art can wherein carry out various changes
And modification, it is made without departing from the scope of the present invention and spirit.All such changes and modifications are intended to be included in claims
Within required the scope of the present invention.
Those of ordinary skill in the art are it is to be appreciated that the list of each example with reference to the embodiments described herein description
Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually
Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel
Each specific application can be used different methods to realize described function, but this realization it is not considered that exceeding
The scope of the present invention.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can be passed through
Its mode is realized.For example, apparatus embodiments described above are only schematic, for example, the division of the unit, and only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied
Close or be desirably integrated into another equipment, or some features can be ignored, or do not perform.
In specification mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the present invention and help understand one or more in each inventive aspect, exist
To the present invention exemplary embodiment description in, the present invention each feature be grouped together into sometimes single embodiment, figure,
Or in descriptions thereof.However, the method for the present invention should be construed to reflect following intention:It is i.e. required for protection
The more features of feature that application claims ratio is expressly recited in each claim.More precisely, such as corresponding power
As sharp claim reflects, its inventive point is can be with the spy of all features less than certain disclosed single embodiment
Levy to solve corresponding technical problem.Therefore, it then follows it is concrete that thus claims of specific embodiment are expressly incorporated in this
Separate embodiments of the embodiment, wherein each claim as the present invention itself.
It will be understood to those skilled in the art that in addition to mutually exclusive between feature, any combinations pair can be adopted
All features and so disclosed any method disclosed in this specification (including adjoint claim, summary and accompanying drawing)
Or all processes or unit of equipment are combined.Unless expressly stated otherwise, this specification (will including adjoint right
Ask, make a summary and accompanying drawing) disclosed in each feature can, equivalent identical by offer or similar purpose alternative features replacing.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment required for protection one of arbitrarily
Can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation
Software module realize, or with combinations thereof realization.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) to realize article analytical equipment according to embodiments of the present invention in some moulds
The some or all functions of block.The present invention is also implemented as the part for performing method as described herein or complete
The program of device (for example, computer program and computer program) in portion.Such program for realizing the present invention can be stored
On a computer-readable medium, or can have one or more signal form.Such signal can be from internet
Download on website and obtain, or provide on carrier signal, or provide in any other form.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability
Field technique personnel can design without departing from the scope of the appended claims alternative embodiment.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer
It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame
Claim.
The above, the only specific embodiment of the present invention or the explanation to specific embodiment, the protection of the present invention
Scope is not limited thereto, any those familiar with the art the invention discloses technical scope in, can be easily
Expect change or replacement, all should be included within the scope of the present invention.Protection scope of the present invention should be with claim
Protection domain is defined.
Claims (17)
1. a kind of method for distinguishing certificate authenticity, it is characterised in that include:
Acquisition includes the video of user's attack certificate;
The vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring;And
According to the comparison result, judge whether the certificate is true.
2. the method for claim 1, it is characterised in that described by certificate described in user's attack described in the video
Before the vocal print of generation is compared with the vocal print for prestoring, also include:
According to the video, the type of credential of the certificate and the attack mode of the user are determined;
According to the type of credential and the attack mode, the corresponding vocal print for prestoring is obtained.
3. method as claimed in claim 2, it is characterised in that the type of credential includes:Identity card, driver's license, passport, society
The one kind in card, residence permit can be ensured.
4. method as claimed in claim 2, it is characterised in that the attack mode includes:The fixed form of the certificate and/
Or the attack position of the user.
5. the method for claim 1, it is characterised in that described to produce in certificate described in user's attack described in the video
Raw vocal print is compared with the vocal print for prestoring, including:
By neutral net, the vocal print that certificate described in user's attack described in the video is produced is entered with the vocal print for prestoring
Row is compared.
6. the method for claim 1, it is characterised in that described to produce in certificate described in user's attack described in the video
Raw vocal print is compared with the vocal print for prestoring, including:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
7. the method for claim 1, it is characterised in that the acquisition includes the video of user's attack certificate, including:
Being obtained by client includes the video of certificate described in user's attack.
8. the method as described in any one of claim 1 to 7, it is characterised in that described according to the comparison result, judges described
Whether certificate is true, including:
If the comparison result determines is more than or equal to default threshold value, it is determined that the certificate be it is true,
Wherein, the comparison result is the kiss between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced
It is right.
9. a kind of device for distinguishing certificate authenticity, it is characterised in that include:
Acquisition module, for obtaining the video for including user's attack certificate;
Comparing module, for the vocal print that certificate described in user's attack described in the video that obtains the acquisition module is produced
Compare with the vocal print for prestoring;And
Judge module, for according to the comparison result of the comparing module, judging whether the certificate is true.
10. device as claimed in claim 9, it is characterised in that also including determining module:
The determining module, for according to the video, determining the type of credential of the certificate and the attack side of the user
Formula;
The acquisition module, is additionally operable to, according to the type of credential and the attack mode, obtain the corresponding vocal print for prestoring.
11. devices as claimed in claim 10, it is characterised in that the type of credential includes:Identity card, driver's license, passport,
One kind in social security card, residence permit.
12. devices as claimed in claim 10, it is characterised in that the attack mode includes:The fixed form of the certificate
And/or the attack position of the user.
13. devices as claimed in claim 9, it is characterised in that the comparing module, are used for:
By neutral net, the vocal print that certificate described in user's attack described in the video is produced is compared with the vocal print for prestoring
It is right.
14. devices as claimed in claim 9, it is characterised in that the comparing module, are used for:
Feature extraction is carried out to the vocal print that certificate described in user's attack described in the video is produced;
The result of the feature extraction is compared with the vocal print for prestoring.
15. devices as claimed in claim 9, it is characterised in that the acquisition module, are used for:
Being obtained by client includes the video of certificate described in user's attack.
16. devices as described in any one of claim 9 to 15, it is characterised in that the judge module, are used for:
If the comparison result be more than or equal to default threshold value, it is determined that the certificate be it is true,
Wherein, the comparison result is the kiss between the vocal print and the vocal print for prestoring that certificate described in user's attack is produced
It is right.
17. a kind of systems for distinguishing certificate authenticity, it is characterised in that include:
Client;And
Device described in any one of claim 9 to 16,
Wherein, the client is used to send to described device including the video of user's attack certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611246247.7A CN106645409A (en) | 2016-12-29 | 2016-12-29 | Document authenticity identifying method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611246247.7A CN106645409A (en) | 2016-12-29 | 2016-12-29 | Document authenticity identifying method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106645409A true CN106645409A (en) | 2017-05-10 |
Family
ID=58836278
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611246247.7A Pending CN106645409A (en) | 2016-12-29 | 2016-12-29 | Document authenticity identifying method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106645409A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110598710A (en) * | 2019-08-21 | 2019-12-20 | 阿里巴巴集团控股有限公司 | Certificate identification method and device |
US11003957B2 (en) | 2019-08-21 | 2021-05-11 | Advanced New Technologies Co., Ltd. | Method and apparatus for certificate identification |
CN113269123A (en) * | 2020-07-01 | 2021-08-17 | 支付宝实验室(新加坡)有限公司 | Certificate identification method and system |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1246943A (en) * | 1997-12-10 | 2000-03-08 | 斯特凡·许布纳 | Authenticity attribute |
JP2000251108A (en) * | 1999-02-26 | 2000-09-14 | Makoto Katsube | Method and device for identifying coin, security or the like |
CN1790407A (en) * | 2004-12-14 | 2006-06-21 | 国际商业机器公司 | Business method for credit card verification |
CN101154297A (en) * | 2006-09-28 | 2008-04-02 | 王冠男 | Multifunctional color-screen personal identification terminal machine |
CN101587607A (en) * | 2008-05-23 | 2009-11-25 | 上海科识通信息科技有限公司 | Opening type radio frequency automatic identification gate control system |
CN101751548A (en) * | 2008-12-01 | 2010-06-23 | 中兴通讯股份有限公司 | Identity identification managing method and device thereof |
CN102123873A (en) * | 2008-04-01 | 2011-07-13 | 爱克发-格法特公司 | Security laminate having a security feature |
CN202383766U (en) * | 2011-12-31 | 2012-08-15 | 北京中科金财科技股份有限公司 | Mechanical vibration excited material characteristic-based bill authenticity identification equipment |
CN104504321A (en) * | 2015-01-05 | 2015-04-08 | 湖北微模式科技发展有限公司 | Method and system for authenticating remote user based on camera |
CN204375000U (en) * | 2014-12-31 | 2015-06-03 | 成都理工大学 | A kind of answer sheet counter based on sound groove recognition technology in e |
CN105825553A (en) * | 2016-05-31 | 2016-08-03 | 广州势必可赢网络科技有限公司 | Voice print verifying method and system |
CN106023046A (en) * | 2016-04-29 | 2016-10-12 | 中国联合网络通信有限公司济南市分公司 | Operator business asynchronous acceptance method based on Bluetooth identity card and system based on Bluetooth identity card |
-
2016
- 2016-12-29 CN CN201611246247.7A patent/CN106645409A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1246943A (en) * | 1997-12-10 | 2000-03-08 | 斯特凡·许布纳 | Authenticity attribute |
JP2000251108A (en) * | 1999-02-26 | 2000-09-14 | Makoto Katsube | Method and device for identifying coin, security or the like |
CN1790407A (en) * | 2004-12-14 | 2006-06-21 | 国际商业机器公司 | Business method for credit card verification |
CN101154297A (en) * | 2006-09-28 | 2008-04-02 | 王冠男 | Multifunctional color-screen personal identification terminal machine |
CN102123873A (en) * | 2008-04-01 | 2011-07-13 | 爱克发-格法特公司 | Security laminate having a security feature |
CN101587607A (en) * | 2008-05-23 | 2009-11-25 | 上海科识通信息科技有限公司 | Opening type radio frequency automatic identification gate control system |
CN101751548A (en) * | 2008-12-01 | 2010-06-23 | 中兴通讯股份有限公司 | Identity identification managing method and device thereof |
CN202383766U (en) * | 2011-12-31 | 2012-08-15 | 北京中科金财科技股份有限公司 | Mechanical vibration excited material characteristic-based bill authenticity identification equipment |
CN204375000U (en) * | 2014-12-31 | 2015-06-03 | 成都理工大学 | A kind of answer sheet counter based on sound groove recognition technology in e |
CN104504321A (en) * | 2015-01-05 | 2015-04-08 | 湖北微模式科技发展有限公司 | Method and system for authenticating remote user based on camera |
CN106023046A (en) * | 2016-04-29 | 2016-10-12 | 中国联合网络通信有限公司济南市分公司 | Operator business asynchronous acceptance method based on Bluetooth identity card and system based on Bluetooth identity card |
CN105825553A (en) * | 2016-05-31 | 2016-08-03 | 广州势必可赢网络科技有限公司 | Voice print verifying method and system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110598710A (en) * | 2019-08-21 | 2019-12-20 | 阿里巴巴集团控股有限公司 | Certificate identification method and device |
US11003957B2 (en) | 2019-08-21 | 2021-05-11 | Advanced New Technologies Co., Ltd. | Method and apparatus for certificate identification |
CN113269123A (en) * | 2020-07-01 | 2021-08-17 | 支付宝实验室(新加坡)有限公司 | Certificate identification method and system |
US11295122B2 (en) | 2020-07-01 | 2022-04-05 | Alipay Labs (singapore) Pte. Ltd. | Document identification method and system |
CN113269123B (en) * | 2020-07-01 | 2022-07-29 | 支付宝实验室(新加坡)有限公司 | Certificate identification method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106803086A (en) | Distinguish method, the apparatus and system of certificate authenticity | |
US9946865B2 (en) | Document authentication based on expected wear | |
Kraetzer et al. | Modeling attacks on photo-ID documents and applying media forensics for the detection of facial morphing | |
US9396383B2 (en) | System, method and computer program for verifying a signatory of a document | |
CN111886842B (en) | Remote user authentication using threshold-based matching | |
US10692167B2 (en) | System and method for digitally watermarking digital facial portraits | |
US9619697B2 (en) | Identity authentication platform | |
US20230030792A1 (en) | Document authenticity identification method and apparatus, computer-readable medium, and electronic device | |
US20170236355A1 (en) | Method for securing and verifying a document | |
US20090328142A1 (en) | Systems and Methods for Webpage Verification Using Data-Hiding Technology | |
CN106645409A (en) | Document authenticity identifying method and device | |
Cross | Using artificial intelligence (AI) and deepfakes to deceive victims: the need to rethink current romance fraud prevention messaging | |
KR101841928B1 (en) | Method for issuing document offline, method for validating issued offline document, and server using the same | |
US20210217024A1 (en) | System and Method of Consolidating Identity Services | |
CN105117920A (en) | Anti-counterfeiting method and apparatus for picture electronic certificates | |
KR20190061377A (en) | System for preventing forgery and falsification of data | |
US20150063656A1 (en) | System and Method for Digitally Watermarking Digital Facial Portraits | |
GB2585172A (en) | Systems and methods for verifying and authenticating the remote signing | |
US11798305B1 (en) | Methods and systems for determining the authenticity of an identity document | |
US20240217255A1 (en) | Document Boundary Analysis | |
US12026932B2 (en) | Method to determine authenticity of security hologram | |
EP4390820A1 (en) | Funding central bank digital currency (cbdc) wallet accounts | |
US20240221406A1 (en) | Signature merger during upload process | |
US11755757B1 (en) | Methods and systems for determining the authenticity of an identity document | |
US11893587B2 (en) | System for enhanced authentication using non-fungible tokens (NFTs) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100190 Beijing, Haidian District Academy of Sciences, South Road, No. 2, block A, No. 313 Applicant after: MEGVII INC. Applicant after: Beijing maigewei Technology Co., Ltd. Address before: 100190 Beijing, Haidian District Academy of Sciences, South Road, No. 2, block A, No. 313 Applicant before: MEGVII INC. Applicant before: Beijing aperture Science and Technology Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |