CN107832679A - A kind of certificate verification, auth method and device - Google Patents

A kind of certificate verification, auth method and device Download PDF

Info

Publication number
CN107832679A
CN107832679A CN201710984690.2A CN201710984690A CN107832679A CN 107832679 A CN107832679 A CN 107832679A CN 201710984690 A CN201710984690 A CN 201710984690A CN 107832679 A CN107832679 A CN 107832679A
Authority
CN
China
Prior art keywords
certificate
image
result
verified
probability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710984690.2A
Other languages
Chinese (zh)
Other versions
CN107832679B (en
Inventor
郑丹丹
徐崴
李亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710984690.2A priority Critical patent/CN107832679B/en
Publication of CN107832679A publication Critical patent/CN107832679A/en
Application granted granted Critical
Publication of CN107832679B publication Critical patent/CN107832679B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/22Character recognition characterised by the type of writing
    • G06V30/224Character recognition characterised by the type of writing of printed characters having additional code marks or containing code marks

Abstract

This application discloses a kind of certificate verification, auth method and device.Method includes:First, the identity document image of object to be verified is obtained;Then, verify whether the identity document image derives from entity certificate, obtain the first the result;Synchronously, the true and false of the identity information in the identity document image is verified, obtains the second the result;Finally, the authentication result of the object to be verified is determined based on first the result and second the result.

Description

A kind of certificate verification, auth method and device
Technical field
The application is related to Internet technical field, more particularly to a kind of certificate verification, auth method and device.
Background technology
Internet era, many things are all more and more convenient, and user, which only need to carry out operation on the terminal device, to handle Required business.But because partial service is required very high safe class, it is necessary to the information filled in user and offer Authenticity, integrality, the compliance of documentary evidence are conscientiously examined, to avoid being multiplied by criminal.Therefore, it is necessary under line System, which is handled, by specific transactions handles related service.
At present, user identity usually is verified by the way of contrast face and card face, although can be to a certain extent Solve the problems, such as certificate forgery, reproduction, but can not still meet the needs of related service is handled on line, therefore, it is necessary to more may be used The scheme leaned on.
The content of the invention
This specification embodiment provides a kind of certificate verification, auth method and device, is carried for solving prior art The problem of can not meeting to handle safe class needed for related service on line for ground authentication scheme.
This specification embodiment provides a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Optionally, it is described checking is carried out to the certificate image to include:
Based on predetermined special characteristic, feature detection is carried out to the certificate region in the certificate image and/or frame;
Wherein, the certificate region is the region shared by certificate to be verified described in certificate image.
Optionally, the predetermined special characteristic includes:It is at least one during screen moire fringes, certificate watermark, printing are reflective.
This specification embodiment also provides a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Optionally, carrying out checking to the certificate image includes:
Based on Pixel-level feature corresponding to black and white copying part and/or colored photocopy, to the picture number of the certificate image According to progress feature detection.
This specification embodiment also provides a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested Demonstrate,prove the result of certificate.
Optionally, it is described to be obtained based on the certificate image from the probability of screen reproduction and from the probability of copy Taking the result of the certificate to be verified includes:
Based on the certificate image from certificate described in the probability of screen reproduction and the determine the probability from copy Image sources are in the probability of entity certificate;
The result of the certificate to be verified is obtained from the probability of entity certificate according to the certificate image.
This specification embodiment also provides a kind of auth method, including:
Obtain an at least identity document image for object to be verified;
The first the result of identity document corresponding to the identity document image is obtained based on above-mentioned steps;To the body The true and false of identity information in part certificate image is verified, obtains the second the result;
The authentication knot of the object to be verified is determined based on first the result and second the result Fruit.
Optionally, at least identity document image for obtaining object to be verified includes:
An at least identity document image for collection in worksite object to be verified.
Optionally, at least identity document image for obtaining object to be verified includes:
Obtain an at least identity document image for the object to be verified formerly gathered.
Optionally, the true and false of the identity information in the identity document image is verified, obtains the second checking As a result include:
Online checking is carried out to the identity information in the identity document image, and according to the result verification institute of online checking The true and false of identity information is stated, as the second the result.
Optionally, the identity information in the identity document image, which carries out online checking, includes:
Online checking is carried out to the text information in the identity information and card face image respectively.
Optionally, before carrying out online checking to the card face image in the identity information, in addition to:
The facial image of collection in worksite holder;
Wherein, online checking is carried out to the card face image in the identity information, including:
The facial image that the card face image, the facial image of the holder and online checking obtain is carried out into intersection to test Card.
Optionally, it is determined that before the true and false of the identity information, in addition to:
Facial image based on the holder carries out In vivo detection, obtains In vivo detection result;
Wherein it is determined that the true and false of the identity information includes:
Result and the In vivo detection result based on the online checking determine the true and false of the identity information.
Optionally, the identity of the object to be verified is determined based on first the result and second the result The result includes:
If second the result is not pass through, it is determined that the authentication result is not pass through;
Or
If second the result is by determining that the authentication result is based on first the result No is to pass through.
Optionally, the identity of the object to be verified is determined based on first the result and second the result The result includes:
If second the result is by determining the authentication result based on the first the result to pass through Probability.
This specification embodiment also provides a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine that the certificate image derives from screen The probability of reproduction;The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Optionally, first authentication unit, for based on predetermined special characteristic, to the certificate area in the certificate image Domain and/or frame carry out feature detection;Wherein, the certificate region is the area shared by certificate to be verified described in certificate image Domain.
Optionally, the predetermined special characteristic includes:It is at least one during screen moire fringes, certificate watermark, printing are reflective.
This specification embodiment also provides a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine the certificate image from duplicating The probability of part;The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Optionally, first authentication unit, for based on Pixel-level corresponding to black and white copying part and/or colored photocopy Feature, feature detection is carried out to the view data of the certificate image.
This specification embodiment also provides a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine that the certificate image derives from screen The probability of reproduction and the probability from copy;Based on the certificate image from the probability of screen reproduction and from multiple The probability of printed document obtains the result of the certificate to be verified.
Optionally, first authentication unit, for from the probability of screen reproduction and being come based on the certificate image Come from the probability that certificate image described in the determine the probability of copy derives from entity certificate;According to the certificate image from real The probability of body certificate obtains the result of the certificate to be verified.
This specification embodiment also provides a kind of authentication means, including:
Acquiring unit, for obtaining an at least identity document image for object to be verified;
First authentication unit, for whether being verified to the identity document image from entity certificate, obtain the One the result;
Second authentication unit, for being verified to the true and false of the identity information in the identity document image, obtain the Two the results;
Determining unit, for determining the object to be verified based on first the result and second the result Authentication result.
Optionally, the acquiring unit, at least identity document image for object to be verified described in collection in worksite.
Optionally, the acquiring unit, for obtaining an at least identity card for the object to be verified formerly gathered Part image.
Optionally, second authentication unit, for carrying out networking core to the identity information in the identity document image Look into, and according to the result verification of online checking identity information the true and false, as the second the result.
Optionally, second authentication unit, for respectively to the text information in the identity information and card face image Carry out online checking.
Optionally, in addition to:Collecting unit;
The collecting unit, the facial image for collection in worksite holder;
Second authentication unit, for the card face image, the facial image of the holder and online checking to be obtained The facial image taken carries out cross validation.
Optionally, second authentication unit, it is additionally operable to the facial image based on the holder and carries out In vivo detection, obtain Take In vivo detection result;Result and the In vivo detection result based on the online checking determine the true of the identity information It is pseudo-.
Optionally, the determining unit, if being not pass through for second the result, it is determined that the authentication As a result it is not pass through;Or if second the result is by determining the authentication based on the first the result As a result the probability to pass through;Or if second the result is by based on described in first the result determination Whether authentication result is to pass through.
Optionally, the determining unit, if being by true based on the first the result for second the result The fixed authentication result is the probability passed through.
This specification embodiment also provides a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Manage device and perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
This specification embodiment also provides a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Manage device and perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
This specification embodiment also provides a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Manage device and perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested Demonstrate,prove the result of certificate.
This specification embodiment also provides a kind of authentication means, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Manage device and perform following operate:
Obtain an at least identity document image for object to be verified;
Whether the identity document image is verified from entity certificate, obtains the first the result;
The true and false of identity information in the identity document image is verified, obtains the second the result;
The authentication knot of the object to be verified is determined based on first the result and second the result Fruit.
Above-mentioned at least one technical scheme that this specification embodiment uses can reach following beneficial effect:
This specification embodiment by the source to identity document image and identity document image identity information it is true Puppet is verified, can be without using specialty compared with realizing the scheme of authentication using professional authorized machine in the prior art Effectively solve situations such as forgery of certificate content, reproduction certificate on the premise of authorized machine, and then carried to handle related service on line For the authentication ability of safe class needed for satisfaction.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Schematic description and description please is used to explain the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the application scenario diagram of this specification embodiment;
Fig. 2 is the schematic flow sheet for the auth method that this specification embodiment 1 provides;
Fig. 3 is the schematic flow sheet for the auth method that this specification embodiment 2 provides;
Fig. 4 is the structural representation for the authentication means that this specification embodiment 3 provides;
Fig. 5 is the structural representation for the authentication means that this specification embodiment 4 provides;
Fig. 6 is the structural representation for the electronic equipment that this specification embodiment 5 provides.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out under the premise of creative work the every other embodiment obtained, belong to the scope of the application protection.
Referring to Fig. 1, the figure shows a kind of exemplary application scene of this specification embodiment.In the scene, Yong Hu When handling related service, relevant information can be filled in by the application program (Application, app) in terminal device 13, and When meeting preparatory condition, captured identity certificate image, and the equipment 12 and/or equipment 11 of service authorization system are uploaded to, by Equipment 12 and/or equipment 11 are verified for identity document image, and the business handled based on the result response user.This In related service can be the various business handled on line, such as, remotely open an account.Corresponding, identity document image can be The image of user identity card.
Another exemplary application scene of this specification embodiment can be:
User shows identity document image by terminal device to the client of authoring system, or, user is to mandate The client displaying identity document of system, by the image of client captured identity certificate.Then, client is by identity document image The server of authoring system is reached, is verified by server, and the result is returned to client, checking is based on by client As a result authorized user is determined whether.
Wherein, during this process can occur to cross safety check in user, log in and need to authorize platform etc..In addition, transacting business Whether user user corresponding with identity document needs consistent specific depending on the regulation of business handling side.
The application scenarios of this specification embodiment can also be various other scenes in addition to above-mentioned two kinds exemplified, This is not specially limited, and can be used as long as being technically applicable to the scheme that this specification provides.With reference to attached Figure, describe the technical scheme that each embodiment of the application provides in detail.
Embodiment 1
Fig. 2 is the schematic flow sheet for the auth method that this specification embodiment 1 provides, and referring to Fig. 2, this method can be with Specifically comprise the following steps:
Step 220, the identity document image for obtaining object to be verified;
Wherein, identity document image can be the image that shooting identity document obtains, and identity document can be:Identity card, Interim identity card, academic card, driving license etc. can prove the certificate of object identity to be verified, still to be tested right described in identity document The identity information of elephant, such as:Name, identification card number, student status number etc..
It should be noted that a kind of implementation of step 220 can be:The identity card of collection in worksite object to be verified Part image." scene " herein be need verify identity " scene ", its can be checking identity transacting business scene, example Such as:Handle open an account business when, gather the scene of the image of the identity card of object to be verified;It may not be showing for transacting business , such as:When crossing safety check, the scene of the image of the related certificate of object to be verified is gathered.
Understandable to be with reference to Fig. 1, the mode of " collection in worksite identity document image " can be specially:
User independently opens shooting interface, or, the operation based on user, authoring system calls the camera of terminal device Interface is shot to open, then, the identity document for shooting object to be verified obtains identity document image.
Another implementation of step 220 can be:Obtain the identity document image of the object to be verified formerly gathered. " first " " scene " for being used to distinguish in a kind of upper implementation of step 220 herein, this implementation can be exemplified as:By it The identity document image of preceding shooting is stored in precalculated position, when needing to carry out authentication, is obtained based on storage address corresponding Identity document image.
Step 240, the anti-counterfeiting mark in the source of the identity document image and/or the identity document image is carried out Checking, obtain the first the result;
The source of identity document image in this step can be a variety of sources, such as, shoot the identity document in entity, After ps/non-ps certificate photograph, the copy of certificate, screen reproduction, predetermined shooting field etc..It is to glue that anti-counterfeiting mark, which is, Patch, printing, heat transfer are on subject matter surface, or in subject matter packaging, or subject matter adjunct (such as commodity are listed, business card and Antifake certificate card) on, the mark with anti-fake effect.Such as:Anti-counterfeiting mark on identity card includes:National emblem, certificate title, Great Wall Pattern, the issuing authority of certificate and the term of validity and chromatic pattern etc..
It should be noted that for different business, because its required safe class is different, it is legal optionally to set Source and the integrity degree of anti-counterfeiting mark.For the business that safe class requires higher, such as:Remotely open an account.Need to meet Condition:The source of identity document image is the identity document of entity and possesses complete anti-counterfeiting mark, or meets the condition Probability reaches certain threshold value.And for safe class requirement is than relatively low business, the condition of satisfaction can suitably relax.
It is illustrative to realizing for step 240 by taking " remotely opening an account " as an example below:First, to being tested in step 240 The implementation for demonstrate,proving the source of identity document image is illustrated, including:Verify identity document image whether from real Body certificate, checking identity document image whether with the image sources of collection in worksite in same shooting environmental;Then, based on checking body The implementation in the source of part certificate image, enumerates five kinds of implementations herein.Those skilled in the art on this basis can be with Other implementations are expanded, these modes are within the protection domain of the application:
The first implementation:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to identity document image Possess complete anti-counterfeiting mark, or meet that the probability of the condition reaches certain threshold value.It is specifically as follows:
It is determined that the anti-counterfeiting mark in identity document corresponding with the type of the identity document image;Based on the false proof of determination Anti-counterfeiting mark in identity document image described in identity verification, and the first the result is determined according to the result, described first The result is used to represent the probability that the identity document image passes through checking.Wherein, anti-counterfeiting mark includes:It is watermark word, micro- It is at least one in contracting word, shading lines, intaglio printing, colour cast, false proof secret mark, font.
It should be noted that different types of identity document is corresponding with different anti-counterfeiting marks, such as:Identity card, passport, Driver's license has corresponding anti-fake mark.Correspondingly, can be based on the certificate class that user selects during transacting business Type determines the type of the identity document image of collection, or, image recognition processing is carried out to the identity document image of collection, with true Determine the type of identity document image.
In addition, understandable be, can be by way of train classification models, by the anti-counterfeiting mark in identity document image As the input of disaggregated model, or, the input using identity document image as disaggregated model, disaggregated model output identity document The probability that image is verified by anti-counterfeiting mark.Wherein, scanning identity document image can be exemplified as in a manner of obtaining anti-counterfeiting mark: Using printing opacity inspection identification watermark word etc..
Second of implementation can be:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to it is identity document figure The source of picture is entity identities certificate, or meets that the probability of the condition reaches certain threshold value.Specifically can be by following two Scheme is realized:
The first scheme (identity document image is at least one):
First, first time checking is carried out to the identity document image, to determine the identity document image sources in screen The probability of curtain reproduction;Secondly, carry out second to the identity document image to verify, to determine the identity document image sources In the probability of copy;Finally, based on the identity document image sources in the probability of screen reproduction and from copy Identity document image sources are in the probability of entity certificate described in determine the probability.Wherein, checking for the first time is verified suitable with second Sequence does not limit herein, can also serializable parallel.
In the first scheme, checking for the first time can specifically be carried out as follows:
Based on predetermined special characteristic, the certificate provincial characteristics in the identity document image is detected, to be rubbed with reference to screen The difference of the normal identity document image of that line disaggregated model contrast and the identity document image of screen reproduction between certificate region Property;Wherein, special characteristic can be exemplified as:Screen moire fringes, certificate watermark, print the feature such as reflective.And based on predetermined specific Feature, feature detection is carried out to the frame of the identity document image, and normal identity is contrasted to combine screen frame disaggregated model Otherness between the frame of certificate image and the identity document image of screen reproduction, such as:The identity document figure of screen reproduction As by there is black surround frame.Wherein, special characteristic can be exemplified as:Screen moire fringes, certificate watermark, print the feature such as reflective.It is described Certificate region is the region of identity document corresponding to the identity document image.
In the first scheme, second of checking can specifically be carried out as follows:
Based on Pixel-level feature corresponding to black and white copying part and/or colored photocopy, to the figure of the identity document image As data carry out feature detection.Specific implementation can be based on identity card described in black and white copying part classification DNN model inspections Corresponding Pixel-level feature in part image, determine the probability that the identity document image is black and white copying part.Based on color photocopying Corresponding Pixel-level feature in identity document image described in part classification DNN model inspections, determines the identity document image for coloured silk The probability of color copy.
By the checking of above-mentioned first time and second of checking and then based on screen moire fringes disaggregated model, screen frame point At least one determination in the result of class model, black and white copying part classification DNN models and colored photocopy classification DNN model outputs The source of identity document image is the probability of real entity identities certificate.
Second scheme:
The view data of the identity document image is analyzed, determines the first the result, the first checking knot Fruit is used to represent the identity document image sources in the probability of entity certificate.It is specifically as follows:
Image recognition processing is carried out to the view data of the single-frame images in the identity document image, verifies identity document It whether there is the special characteristic of pixel scale in image, then, the presence situation of special characteristic is true in identity-based certificate image Fixed first the result.Input that can also be using view data as disaggregated model, obtain the first checking of disaggregated model output As a result.Special characteristic can be exemplified as:Screen moire fringes, certificate watermark, printing are reflective etc..
Or
At least two identity document images, the view data progress at least two class images in identity document image are poor Value processing, obtains image difference;Input using described image difference as pre-established disaggregated model, the disaggregated model are used for base The first the result is exported in the image difference of input;Wherein, at least two class images can be to be adopted under different shooting conditions Two class images of collection, such as:A kind of image gathered under a kind of image and flash lamp that are gathered under natural conditions, or, it is different The image gathered under exposure.Further, the object of difference processing can be the image and flash lamp gathered under natural conditions The image of lower collection.
The third implementation can be:
This implementation goes for requiring very high occasion to safe class, such as, it is desirable to it is identity document The source of image is that real entity identities certificate and possess complete anti-counterfeiting mark, or, meet that the probability of the condition reaches Certain threshold value.
Its implementation process is similar to the first and second of implementation, therefore, here is omitted for similarity.In addition, The third implementation also includes:Based on probability of the identity document image by checking and the probability from entity certificate The first the result is determined, that is, determines the confidence level of the identity document of object to be verified corresponding to identity document image.
4th kind of implementation can be:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to it is identity document figure As deriving from same photographed scene with the first background image, or, meet that the probability of the condition reaches certain threshold value.Wherein, Safe class requirement is related to the identity document image for needing to shoot, such as, it is desirable to it is higher, it is necessary to the identity document image of shooting More and needs are also more from the identity document image of same photographed scene with the first background image.It is specifically as follows:
Before step 220 is performed, one or more background image (following referred to as the first background images) is gathered in advance, Then, identity document image and the first background image are contrasted, it is determined that degree of overlapping between the two.
It is understandable to be, if degree of overlapping between the two is more than certain threshold value, it is determined that both are in same shooting field Completed under scape;Moreover, contrast mode can be between identity document image and individual background image contrast, or It will be contrasted after the long background image of background image combination with identity document image.
Wherein it is determined that both whether the scheme under same photographed scene can include:By the image of the background area In background area contrasted with the first background image, obtain between the identity document image and first background image Degree of overlapping;First the result is determined according to the degree of overlapping, first the result is used to represent the identity Certificate image derives from the probability of same photographed scene with first background image.The background area is the identity document Region in image outside region shared by identity document.
Further to improve the verification the verifying results and efficiency of the 4th kind of implementation, can be based on gathering the identity document image When gyroscope first position information and gather first background image when gyroscope second place information, to both Angle be adjusted, to contrast the background image of background area first under same gyroscope position information, obtain degree of overlapping, and Determine that both are shot in the probability of same photographed scene based on degree of overlapping.
It is exemplified below:Before the image of captured identity certificate is started, shot when gyroscope is in second place information First background image, such as:Desk and its image on periphery.Then, in the case where gyroscope is in first position information, captured identity The image of certificate.Then, the certificate region and background area in identity document image, and the positional information based on gyroscope are separated Background area and the first background image are contrasted, obtains degree of overlapping.Wherein, certificate region is shared by identity document in part certificate image Region.
5th kind of implementation can be:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to the material of certificate is Really it is the material of certificate, or, meet that the probability of the condition reaches certain threshold value.It is specifically as follows:
Image difference based at least image data acquisition of two class images determines the material of certificate, and then contrasts the certificate Material and corresponding types real docu-ment material, and based on comparing result determine the certificate be real docu-ment probability, make For the first the result.
Understandable to be, different types of certificate may be made by different materials, and certificate material is different, meeting Occurs larger otherness under different shooting conditions.Thus, the image difference of two class images can be inputted to point trained In class model, the first the result of disaggregated model output is obtained.
Understandable to be, above-mentioned several feasible implementations can be based on the safety for treating transacting business and its corresponding requirement Grade and reasonable selection, or, rationally arranged in a crossed manner, here is omitted.
Step 260, the true and false to the identity information in the identity document image are verified, obtain the second checking knot Fruit;
It should be noted that a kind of implementation of step 260 can be:
Online checking is carried out to the identity information in the identity document image, and institute is determined according to the result of online checking State the true and false of identity information.
Wherein, the concrete mode of online checking can be:The citizenship information system of online checking is showed with the People's Bank Based on some Intranets and internetworking platform, forward the People's Bank user to the information sharing system of the Ministry of Public Security and pass through account The verification request that family system, credit investigation system, the respective front-end system of anti money washing system are sent;Receive and forward business bank user And the verification sent by its comprehensive business system by its front-end system is asked;Receive and forward information sharing system of the Ministry of Public Security The verification result of system.
In addition, the object of online checking can include:Text information and card face image in identity information.Text information can Think certificate ID, the name obtained based on optical character identification (Optical Character Recognition, OCR) identification Etc. information, card face image is the head portrait identified.
Step 280, the body for determining based on first the result and second the result object to be verified Part the result.
It should be noted that the first the result and the second the result that are obtained based on step 240 and step 260, this A kind of implementation of step can be:
If the second the result is not pass through, it is determined that the authentication result is not pass through;
Or
If the second the result be by, based on first the result determine the authentication result whether be Pass through.It is specifically as follows:When the probability passed through corresponding to the first the result is less than predetermined threshold, it is determined that the identity is tested Card result is not pass through;The authentication knot is determined when the probability passed through corresponding to the first the result is higher than predetermined threshold Fruit is to pass through.
Another implementation of this step can be:
If second the result is by determining that the authentication result is logical based on the first the result Cross/unsanctioned probability.
For two kinds of implementations of step 280, because each above-mentioned step there may be image taking angle, bat The problems such as taking the photograph quality, it is not the process that an order performs to cause whole flow process, and therefore, the present embodiment provides a decision-making and drawn Hold up, the result entirely verified is assessed with certain rule.It is exemplified below:
Because the influence factor of the first the result may include:Probability that identity document image is verified by anti-counterfeiting mark, Identity document image sources are derived from one in the probability of Same Scene in the probability, ID Card Image and image scene of entity certificate It is individual or multiple, therefore, it is determined that during probability corresponding to the first the result, the conditions such as demand, experience can be based on, to participating in determining Weight corresponding to the influence factor setting of first the result, and it is corresponding based on respective weights and the result of determine the probability first Probability.Such as:Participate in determine the first the result influence factor identity document image verified by anti-counterfeiting mark probability, Identity document image sources are distinguished in the probability, ID Card Image and image scene of entity certificate from the probability of Same Scene For 60%, 70%, 80%, the weight of setting corresponds to 30%, 30%, 40% respectively, then the first checking knot finally calculated Probability corresponding to fruit is 71%.
In addition, in order to lift the speed and efficiency of the detection of certificate authenticity, the above-mentioned source to the identity document image Verified, the anti-counterfeiting mark in the identity document image is verified, and in the checking identity document image The true and false of identity information can be Parallel Implementation.
Understandable to be, the embodiment of the present invention optionally only performs step 220- steps 240, is tested with completing certificate The process of card, such as:
Obtain the certificate image of certificate to be verified;
The anti-counterfeiting mark in source and/or the certificate image to the certificate image is verified, is obtained first and is tested Demonstrate,prove result;
The result of the certificate to be verified is determined based on first the result.
Or
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Or
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Or
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested Demonstrate,prove the result of certificate.
Or
Obtain the certificate image of certificate to be verified;
Verify whether the certificate image and the first background image of live pre-acquired derive from same photographed scene, obtain The result of the certificate to be verified.
Due to, the process of certificate verification is similar to the associated description in above-mentioned steps 220 and step 240, therefore, herein no longer Repeat.In addition, based on being actually needed, above-mentioned each certificate verification scheme arranged side by side can intersect combination, such as:It is " false proof The combination of mark "+" whether from same photographed scene ".
It can be seen that the embodiment of the present invention is by testing the source of identity document image, anti-counterfeiting mark and identity information Card, can effectively solve situations such as forgery of certificate content, reproduction certificate on the premise of without using professional authorized machine, and then be line On handle related service provide meet needed for safe class authentication ability.
Embodiment 2
Fig. 3 is the schematic flow sheet for the auth method that this specification embodiment 2 provides, and referring to Fig. 3, the present embodiment exists On the basis of embodiment 1, it can also specifically comprise the following steps:
The facial image of step 320, collection in worksite holder;
It should be noted that a kind of implementation of step 320 can be:
While putting camera " collection in worksite identity document image " after use or afterwards, gathered using front camera " facial image of holder ".
Another implementation can be:
In the first the result when reaching predetermined threshold by the probability of checking, camera is called to gather " holder Facial image ".
Another implementation can be:
Text information in identity document image is being subjected to online checking and is drawing text information really to verify result Afterwards, camera collection " facial image of holder " is called.
Step 340, the facial image based on the holder carry out In vivo detection, obtain In vivo detection result;
It should be noted that the single-frame images or multiple image that are gathered based on step 320 carry out In vivo detection, to determine Whether holder is live body.In vivo detection can be exemplified as:Blink differentiation, mouth opening and closing differentiation, Disparity Analysis method etc..Due to work Body is detected as more ripe technology, therefore, here is omitted.
Step 360, by it is described card face image, the holder facial image and online checking obtain facial image enter Row cross validation, obtain the result of card face image online checking;
A kind of implementation of step 360 can be:
The facial image that card face image in identity document image obtains with online checking is verified, the 3rd is obtained and tests Demonstrate,prove result;The facial image for demonstrate,proving face image and collection in worksite is contrasted, obtains the 4th the result;Based on the 3rd checking knot Fruit and the 4th the result determine the result of online checking.
Step 380, the result based on the card face image online checking and the In vivo detection result, with reference to text information Online checking result determine the true and false of the identity information, obtain the second the result.
It is understandable to be, based on the decision engine in embodiment, according to text information, the knot of card face image online checking Fruit and the In vivo detection result, with reference to the verification result of certain whole online checking of rule evaluation.Rule herein can lift Example be:For the result of verification, the result of In vivo detection, weight etc. is set.
In addition, in the present embodiment, while step 320 is using front camera collection facial image, rear camera Collection one or more (referred to as the second background image) will be continued.Correspondingly, identity document figure is verified further to improve Precision as whether deriving from same photographed scene with background image, it can be based on gathering the identity document image, described first Positional information corresponding to gyroscope when background image and second background image, contrast the identity document image, described One background image and second background image, determine the first the result;Wherein, first the result is used to represent institute State the probability that identity document image, first background image and second background image derive from same photographed scene.
It should be noted that this specification embodiment on the basis of embodiment 1, introduces the people of the holder of collection in worksite Face image, and In vivo detection is carried out to facial image;Then, based on card face image, the facial image of holder and online checking The facial image of acquisition is verified, and then the result based on In vivo detection and online checking determines the true and false of identity information.Energy Avoid the identity of holder and identity that identity document proves it is inconsistent caused by identity the problem of being falsely used, carrying further High authentication ability.
It should be noted that the executive agent that Examples 1 and 2 provide each step of method may each be same equipment, Or this method is also by distinct device as executive agent.For example the executive agent of step 220 and step 240 can be equipment 1, the executive agent of step 260 can be equipment 2;Again for example, the executive agent of step 220 can be equipment 1, step 240 with The executive agent of step 260 can be equipment 2;Etc..
In addition, for above method embodiment, in order to be briefly described, therefore it is all expressed as to a series of action group Close, but those skilled in the art should know, embodiment of the present invention is not limited by described sequence of movement, because According to embodiment of the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art It should know, embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily originally Necessary to invention embodiment.
Embodiment 3
Fig. 4 is the structural representation for the authentication means that this specification embodiment 3 provides, and device includes:Acquiring unit 41st, the first authentication unit 42, the second authentication unit 43 and determining unit 44, wherein:
Acquiring unit 41, for obtaining the identity document image of object to be verified;
First authentication unit 42, in the source to the identity document image and/or the identity document image Anti-counterfeiting mark is verified, obtains the first the result;
Second authentication unit 43, for being verified to the true and false of the identity information in the identity document image, obtain Second the result;
Determining unit 44 is described to be verified right for being determined based on first the result and second the result The authentication result of elephant.
Exemplary explanation is carried out to the operation principle of each functional module in the present embodiment below:
The implementation of the function of acquiring unit 41 can be:
The identity document image of collection in worksite object to be verified.
Or
Obtain the identity document image of the object to be verified formerly gathered.
The implementation of the function of first authentication unit 42 can be:
It is determined that the anti-counterfeiting mark in identity document corresponding with the type of the identity document image;Based on the false proof of determination Anti-counterfeiting mark in identity document image described in identity verification, and the first the result is determined according to the result, described first The result is used to represent the probability that the identity document image passes through checking.
Wherein, anti-counterfeiting mark includes:Watermark word, micro text, shading lines, intaglio printing, colour cast, false proof secret mark, It is at least one in font.
First time checking is carried out to the identity document image, to determine the identity document image sources in screen reproduction Probability;
Second is carried out to the identity document image to verify, to determine the identity document image sources in copy Probability;
Based on the identity document image sources in described in the probability of screen reproduction and the determine the probability from copy Identity document image sources are in the probability of entity certificate.
Wherein, checking includes for the first time:
Based on predetermined special characteristic, feature detection is carried out to the certificate region in the identity document image and/or frame;
Wherein, the certificate region is the region of identity document corresponding to the identity document image.
Second of checking includes:
Based on Pixel-level feature corresponding to black and white copying part and/or colored photocopy, to the figure of the identity document image As data carry out feature detection.
The view data of the identity document image is analyzed, determines the first the result, the first checking knot Fruit is used to represent the identity document image sources in the probability of entity certificate.
Image recognition processing is carried out to the view data of the single-frame images in the identity document image;Or to described The view data of at least two class images in identity document image carries out difference processing, obtains image difference;Described image is poor It is worth the input as pre-established disaggregated model;Wherein, at least two class images can be two gathered under different shooting conditions Class image, such as:A kind of image for being gathered under a kind of image and flash lamp that are gathered under natural conditions or, different exposures The image of lower collection.
It is determined that the anti-counterfeiting mark in identity document corresponding with the type of the identity document image;Based on the false proof of determination Anti-counterfeiting mark in identity document image described in identity verification, and determine the identity document image by testing according to the result The probability of card;The view data of the identity document image is analyzed, determines the identity document image sources in entity The probability of certificate;Tested based on probability of the identity document image by checking and the determine the probability from entity certificate first Demonstrate,prove result.
Verify whether the identity document image and the first background image of live pre-acquired derive from same photographed scene, Obtain the first the result.It can specifically include:
Background area in the image of the background area and the first background image of live pre-acquired are contrasted, obtained Take the degree of overlapping between the identity document image and first background image;
First the result is determined according to the degree of overlapping, first the result is used to represent the identity card Part image derives from the probability of same photographed scene with first background image;
Wherein, the background area is the region outside region shared by identity document in the identity document image.
Wherein, the first background image of background area and live pre-acquired is carried out into contrast includes:
Based on the first position information of gyroscope when gathering the identity document image and gather first background image The second place information of Shi Suoshu gyroscopes, contrast the background area and first background image.
In addition, when gathering the facial image of holder at the scene, the second background image is gathered;
Wherein, whether the checking identity document image and the first background image of live pre-acquired derive from same Photographed scene, obtaining the first the result includes:
Based on gyroscope pair when gathering the identity document image, first background image and second background image The positional information answered, the identity document image, first background image and second background image are contrasted, determines first The result;
Wherein, first the result is used to represent the identity document image, first background image and described Second background image derives from the probability of same photographed scene.
The implementation of the function of second authentication unit 43 can be:
Online checking is carried out to the identity information in the identity document image, and institute is determined according to the result of online checking State the true and false of identity information.Wherein, online checking can be carried out to the text information in the identity information and card face image respectively.
The implementation of the function of determining unit 44 can be:
If second the result is not pass through, it is determined that the authentication result is not pass through;It is or if described Second the result is by the probability for then determining the authentication result based on the first the result to pass through;Or if Second the result is by then determining whether the authentication result passes through based on first the result.
It can be seen that the embodiment of the present invention is by testing the source of identity document image, anti-counterfeiting mark and identity information Card, can effectively solve situations such as forgery of certificate content, reproduction certificate on the premise of without using professional authorized machine, and then be line On handle related service provide meet needed for safe class authentication ability.
Embodiment 4
Fig. 5 is the structural representation for the authentication means that this specification embodiment 4 provides, and referring to Fig. 5, device includes: Acquiring unit 51, collecting unit 52, the first authentication unit 53, the second authentication unit 54 and determining unit 55, wherein:
The authentication unit 53 of acquiring unit 51 and first respectively with the authentication unit 42 of acquiring unit 41 and first in embodiment 3 It is corresponding similar, therefore, no longer it is repeated herein.
In addition, on the basis of embodiment 3, in the present embodiment:
Collecting unit 52, the facial image for collection in worksite holder;
Second authentication unit 54, for the card face image, the facial image of the holder and online checking to be obtained Facial image carry out cross validation.
Second authentication unit 54, it is additionally operable to the facial image based on the holder and carries out In vivo detection, obtains live body inspection Survey result;Result and the In vivo detection result based on the online checking determine the true and false of the identity information.
It can be seen that this specification embodiment on the basis of embodiment 3, introduces the facial image of the holder of collection in worksite, And In vivo detection is carried out to facial image;Then, the people obtained based on card face image, the facial image of holder and online checking Face image is verified, and then the result based on In vivo detection and online checking determines the true and false of identity information.It is avoided that accredited The problem of identity that the identity and identity document of people proves is inconsistent, raising authentication ability further.
For said apparatus embodiment, because it is substantially similar to method embodiment, so the comparison of description Simply, related part illustrates referring to the part of method embodiment.
It should be noted that in all parts of the device of the present invention, according to the function that it to be realized to therein Part has carried out logical partitioning, and still, the present invention is not only restricted to this, all parts can be repartitioned as needed or Person combines.
Embodiment 5
Fig. 6 is the structural representation for a kind of electronic equipment that this specification embodiment 5 provides, referring to Fig. 6, the electronic equipment Including processor, internal bus, network interface, internal memory and nonvolatile memory, other business institutes are also possible that certainly The hardware needed.Processor read from nonvolatile memory corresponding to computer program into internal memory then run, patrolling Authentication means are formed in the aspect of collecting.Certainly, in addition to software realization mode, this specification is not precluded from other realization sides Formula, such as mode of logical device or software and hardware combining etc., that is to say, that the executive agent of following handling process is simultaneously unlimited Due to each logic unit or hardware or logical device.
Network interface, processor and memory can be connected with each other by bus system.Bus can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..For ease of representing, only represented in Fig. 6 with a four-headed arrow, it is not intended that an only bus or a type of Bus.
Memory is used to deposit program.Specifically, program can include program code, and described program code includes computer Operational order.Memory can include read-only storage and random access memory, and provide instruction and data to processor.Deposit Reservoir may include high-speed random access memory (Random-Access Memory, RAM), it is also possible to also including non-volatile Memory (non-volatile memory), for example, at least 1 magnetic disk storage.
Processor, for performing the program of the memory storage, and specifically perform:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Or
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Or
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested Demonstrate,prove the result of certificate.
Or
Obtain the certificate image of certificate to be verified;
Verify whether the certificate image and the first background image of live pre-acquired derive from same photographed scene, obtain The result of the certificate to be verified.
Or
Obtain the certificate image of certificate to be verified;
The anti-counterfeiting mark in source and/or the certificate image to the certificate image is verified, is obtained first and is tested Demonstrate,prove result;
The result of the certificate to be verified is determined based on first the result.
Or
On the basis of above-mentioned several proof validation schemes, the true and false of the identity information in the identity document image is entered Row checking, obtains the second the result;
The result and second the result based on certificate to be verified determine to be verified corresponding to certificate to be verified The authentication result of object.
Authentication means or manager (Master) node disclosed in above-mentioned Fig. 2-5 illustrated embodiments such as this specification are held Capable method can apply in processor, or be realized by processor.Processor is probably a kind of IC chip, is had The disposal ability of signal.In implementation process, each step of the above method can pass through the integration logic of the hardware in processor The instruction of circuit or software form is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be numeral Signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, discrete hardware components.Can realize or Person performs disclosed each method, step and logic diagram in this specification embodiment.General processor can be microprocessor Or the processor can also be any conventional processor etc..The step of method with reference to disclosed in this specification embodiment, can Completion is performed to be embodied directly in hardware decoding processor, or is performed with the hardware in decoding processor and software module combination Complete.Software module can be located at random access memory, flash memory, read-only storage, programmable read only memory or electrically-erasable In the ripe storage medium in this areas such as programmable storage, register.The storage medium is located at memory, and processor reads and deposited Information in reservoir, with reference to the step of its hardware completion above method.
Authentication means can also carry out Fig. 2 or Fig. 3 method, and realize the method that manager's node performs.
Embodiment 6
Based on identical innovation and creation, this specification embodiment additionally provides a kind of computer-readable recording medium, described Computer-readable recording medium storage one or more program, one or more of programs, which are worked as, is included multiple application programs When electronic equipment performs so that the electronic equipment performs certificate verification, the auth method that Examples 1 and 2 provide.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the action recorded in detail in the claims or step can be come according to different from the order in embodiment Perform and still can realize desired result.In addition, the process described in the accompanying drawings not necessarily require show it is specific suitable Sequence or consecutive order could realize desired result.In some embodiments, multitasking and parallel processing be also can With or be probably favourable.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Other identical element also be present in the process of element, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
Embodiments herein is the foregoing is only, is not limited to the application.For those skilled in the art For, the application can have various modifications and variations.All any modifications made within spirit herein and principle, it is equal Replace, improve etc., it should be included within the scope of claims hereof.

Claims (36)

1. a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
2. according to the method for claim 1, described carry out checking to the certificate image and include:
Based on predetermined special characteristic, feature detection is carried out to the certificate region in the certificate image and/or frame;
Wherein, the certificate region is the region shared by certificate to be verified described in certificate image.
3. according to the method for claim 2, the predetermined special characteristic includes:Screen moire fringes, certificate watermark, printing are anti- It is at least one in light.
4. a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
5. according to the method for claim 4, carrying out checking to the certificate image includes:
Based on Pixel-level feature corresponding to black and white copying part and/or colored photocopy, the view data of the certificate image is entered Row feature detection.
6. a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and from duplicating The probability of part;
The card to be verified is obtained based on probability of the certificate image from screen reproduction and the probability from copy The result of part.
It is 7. according to the method for claim 6, described based on probability of the certificate image from screen reproduction and source The result of the certificate to be verified is obtained in the probability of copy to be included:
Based on the certificate image from certificate image described in the probability of screen reproduction and the determine the probability from copy From the probability of entity certificate;
The result of the certificate to be verified is obtained from the probability of entity certificate according to the certificate image.
8. a kind of auth method, including:
Obtain an at least identity document image for object to be verified;
Based on any one of claim 1-7, the first the result of identity document corresponding to the identity document image is obtained;It is right The true and false of identity information in the identity document image is verified, obtains the second the result;
The authentication result of the object to be verified is determined based on first the result and second the result.
9. according to the method for claim 8, at least identity document image for obtaining object to be verified includes:
An at least identity document image for collection in worksite object to be verified.
10. according to the method for claim 8, at least identity document image for obtaining object to be verified includes:
Obtain an at least identity document image for the object to be verified formerly gathered.
11. according to the method for claim 8, the true and false of the identity information in the identity document image is tested Card, obtaining the second the result includes:
Online checking, and the body according to the result verification of online checking are carried out to the identity information in the identity document image The true and false of part information, as the second the result.
12. according to the method for claim 11, the identity information in the identity document image carries out networking core Look into including:
Online checking is carried out to the text information in the identity information and card face image respectively.
13. before according to the method for claim 12, carrying out online checking to the card face image in the identity information, also Including:
The facial image of collection in worksite holder;
Wherein, online checking is carried out to the card face image in the identity information, including:
The facial image that the card face image, the facial image of the holder and online checking obtain is subjected to cross validation.
14. according to the method for claim 13, it is determined that before the true and false of the identity information, in addition to:
Facial image based on the holder carries out In vivo detection, obtains In vivo detection result;
Wherein it is determined that the true and false of the identity information includes:
Result and the In vivo detection result based on the online checking determine the true and false of the identity information.
15. according to the method described in claim any one of 8-14, based on first the result and the second checking knot Fruit determines that the authentication result of the object to be verified includes:
If second the result is not pass through, it is determined that the authentication result is not pass through;
Or
If second the result be by, based on first the result determine the authentication result whether be Pass through.
16. according to the method described in claim any one of 8-14, based on first the result and the second checking knot Fruit determines that the authentication result of the object to be verified includes:
If second the result is by the way that it is general to pass through to determine the authentication result based on the first the result Rate.
17. a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine that the certificate image derives from screen reproduction Probability;The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
18. device according to claim 17, first authentication unit, for based on predetermined special characteristic, to described Certificate region and/or frame in certificate image carry out feature detection;Wherein, the certificate region is to be treated described in certificate image Verify the region shared by certificate.
19. device according to claim 18, the predetermined special characteristic includes:Screen moire fringes, certificate watermark, printing It is at least one in reflective.
20. a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine the certificate image from copy Probability;The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
21. device according to claim 20, first authentication unit, for based on black and white copying part and/or colour Pixel-level feature corresponding to copy, feature detection is carried out to the view data of the certificate image.
22. a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine that the certificate image derives from screen reproduction Probability and the probability from copy;Based on the certificate image from the probability of screen reproduction and from copy Probability obtain the result of the certificate to be verified.
23. device according to claim 22, first authentication unit, for deriving from screen based on the certificate image Certificate image derives from the probability of entity certificate described in the curtain probability of reproduction and the determine the probability from copy;According to described Certificate image obtains the result of the certificate to be verified from the probability of entity certificate.
24. a kind of authentication means, including:The first authentication unit described in claim any one of 17-23, and
Acquiring unit, for obtaining an at least identity document image for object to be verified;
Second authentication unit, for being verified to the true and false of the identity information in the identity document image, obtain second and test Demonstrate,prove result;
Determining unit, for identity document corresponding to the identity document image that is obtained based on first authentication unit One the result and second the result determine the authentication result of the object to be verified.
25. device according to claim 24, the acquiring unit, for object to be verified described in collection in worksite at least One identity document image.
26. device according to claim 24, the acquiring unit, for obtaining the object to be verified formerly gathered An at least identity document image.
27. device according to claim 24, second authentication unit, for the body in the identity document image Part information carries out online checking, and according to the result verification of online checking identity information the true and false, as the second checking knot Fruit.
28. device according to claim 27, second authentication unit, for respectively to the text in the identity information Word information and card face image carry out online checking.
29. device according to claim 28, in addition to:Collecting unit;
The collecting unit, the facial image for collection in worksite holder;
Second authentication unit, for obtain the card face image, the facial image of the holder and online checking Facial image carries out cross validation.
30. device according to claim 29, second authentication unit, it is additionally operable to the face figure based on the holder As carrying out In vivo detection, In vivo detection result is obtained;Result and the In vivo detection result based on the online checking determine The true and false of the identity information.
31. according to the device described in claim any one of 24-30, the determining unit, if for second the result Not pass through, it is determined that the authentication result is not pass through;Or if second the result is by being based on First the result determines that the authentication result is the probability passed through;Or if second the result be by, Determine whether the authentication result is to pass through based on first the result.
32. according to the device described in claim any one of 24-30, the determining unit, if for second the result To pass through the probability for then determining the authentication result based on the first the result to pass through.
33. a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the processor when executed Perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
34. a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the processor when executed Perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
35. a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the processor when executed Perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and from duplicating The probability of part;
The card to be verified is obtained based on probability of the certificate image from screen reproduction and the probability from copy The result of part.
36. a kind of authentication means, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the processor when executed Perform following operate:
Obtain an at least identity document image for object to be verified;
Whether the identity document image is verified from entity certificate, obtains the first the result;
The true and false of identity information in the identity document image is verified, obtains the second the result;
The authentication result of the object to be verified is determined based on first the result and second the result.
CN201710984690.2A 2017-10-20 2017-10-20 Certificate verification and identity verification method and device Active CN107832679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710984690.2A CN107832679B (en) 2017-10-20 2017-10-20 Certificate verification and identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710984690.2A CN107832679B (en) 2017-10-20 2017-10-20 Certificate verification and identity verification method and device

Publications (2)

Publication Number Publication Date
CN107832679A true CN107832679A (en) 2018-03-23
CN107832679B CN107832679B (en) 2021-07-30

Family

ID=61648736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710984690.2A Active CN107832679B (en) 2017-10-20 2017-10-20 Certificate verification and identity verification method and device

Country Status (1)

Country Link
CN (1) CN107832679B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108764033A (en) * 2018-04-18 2018-11-06 深圳市商汤科技有限公司 Auth method and device, electronic equipment, computer program and storage medium
WO2019076114A1 (en) * 2017-10-20 2019-04-25 阿里巴巴集团控股有限公司 Document verification and identity verification method and device
WO2019076115A1 (en) * 2017-10-20 2019-04-25 阿里巴巴集团控股有限公司 Method and apparatus for verifying documents and identity
CN110263805A (en) * 2019-05-07 2019-09-20 阿里巴巴集团控股有限公司 Certificate verification, auth method, device and equipment
CN110705350A (en) * 2019-08-27 2020-01-17 阿里巴巴集团控股有限公司 Certificate identification method and device
CN111079687A (en) * 2019-12-26 2020-04-28 京东数字科技控股有限公司 Certificate camouflage identification method, device, equipment and storage medium
CN111192059A (en) * 2019-01-27 2020-05-22 拍拍看(海南)人工智能有限公司 Product anti-counterfeiting verification method based on electronic insurance policy and electronic insurance policy claiming system
US10769263B1 (en) 2019-05-07 2020-09-08 Alibaba Group Holding Limited Certificate verification
US10974537B2 (en) 2019-08-27 2021-04-13 Advanced New Technologies Co., Ltd. Method and apparatus for certificate identification
US11367310B2 (en) 2018-04-16 2022-06-21 Shenzhen Sensetime Technology Co., Ltd. Method and apparatus for identity verification, electronic device, computer program, and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1426016A (en) * 2001-12-13 2003-06-25 欧姆龙株式会社 True and false identity identification device and method
US20140229458A1 (en) * 2011-06-06 2014-08-14 Nelson C. Glasper Proof ID - search engine
CN104573647A (en) * 2014-12-30 2015-04-29 福建三元达软件有限公司 Recognition method and device for illegal identity document
CN106778525A (en) * 2016-11-25 2017-05-31 北京旷视科技有限公司 Identity identifying method and device
CN106991451A (en) * 2017-04-14 2017-07-28 武汉神目信息技术有限公司 A kind of identifying system and method for certificate picture
CN107016608A (en) * 2017-03-30 2017-08-04 广东微模式软件股份有限公司 The long-range account-opening method and system of a kind of identity-based Information Authentication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1426016A (en) * 2001-12-13 2003-06-25 欧姆龙株式会社 True and false identity identification device and method
US20140229458A1 (en) * 2011-06-06 2014-08-14 Nelson C. Glasper Proof ID - search engine
CN104573647A (en) * 2014-12-30 2015-04-29 福建三元达软件有限公司 Recognition method and device for illegal identity document
CN106778525A (en) * 2016-11-25 2017-05-31 北京旷视科技有限公司 Identity identifying method and device
CN107016608A (en) * 2017-03-30 2017-08-04 广东微模式软件股份有限公司 The long-range account-opening method and system of a kind of identity-based Information Authentication
CN106991451A (en) * 2017-04-14 2017-07-28 武汉神目信息技术有限公司 A kind of identifying system and method for certificate picture

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10691929B2 (en) 2017-10-20 2020-06-23 Alibaba Group Holding Limited Method and apparatus for verifying certificates and identities
WO2019076114A1 (en) * 2017-10-20 2019-04-25 阿里巴巴集团控股有限公司 Document verification and identity verification method and device
WO2019076115A1 (en) * 2017-10-20 2019-04-25 阿里巴巴集团控股有限公司 Method and apparatus for verifying documents and identity
US10783369B2 (en) 2017-10-20 2020-09-22 Alibaba Group Holding Limited Document verification system, device, and method using a classification model
US11367310B2 (en) 2018-04-16 2022-06-21 Shenzhen Sensetime Technology Co., Ltd. Method and apparatus for identity verification, electronic device, computer program, and storage medium
CN108764033A (en) * 2018-04-18 2018-11-06 深圳市商汤科技有限公司 Auth method and device, electronic equipment, computer program and storage medium
CN113139819A (en) * 2019-01-27 2021-07-20 拍拍看(海南)人工智能有限公司 Product anti-counterfeiting verification method based on electronic insurance policy
CN111192059A (en) * 2019-01-27 2020-05-22 拍拍看(海南)人工智能有限公司 Product anti-counterfeiting verification method based on electronic insurance policy and electronic insurance policy claiming system
CN113508414A (en) * 2019-01-27 2021-10-15 拍拍看(海南)人工智能有限公司 Product anti-counterfeiting verification method based on electronic insurance policy and electronic insurance policy claiming system
US11086977B2 (en) 2019-05-07 2021-08-10 Advanced New Technologies Co., Ltd. Certificate verification
US11392679B2 (en) 2019-05-07 2022-07-19 Advanced New Technologies Co., Ltd. Certificate verification
US10769263B1 (en) 2019-05-07 2020-09-08 Alibaba Group Holding Limited Certificate verification
CN110263805A (en) * 2019-05-07 2019-09-20 阿里巴巴集团控股有限公司 Certificate verification, auth method, device and equipment
WO2020224296A1 (en) * 2019-05-07 2020-11-12 创新先进技术有限公司 Certificate verification and identity verification methods and apparatuses, and devices
US10909227B2 (en) 2019-05-07 2021-02-02 Advanced New Technologies Co., Ltd. Certificate verification
WO2021036185A1 (en) * 2019-08-27 2021-03-04 创新先进技术有限公司 Certificate identification method and device
CN110705350A (en) * 2019-08-27 2020-01-17 阿里巴巴集团控股有限公司 Certificate identification method and device
US10974537B2 (en) 2019-08-27 2021-04-13 Advanced New Technologies Co., Ltd. Method and apparatus for certificate identification
CN110705350B (en) * 2019-08-27 2020-08-25 阿里巴巴集团控股有限公司 Certificate identification method and device
CN111079687A (en) * 2019-12-26 2020-04-28 京东数字科技控股有限公司 Certificate camouflage identification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN107832679B (en) 2021-07-30

Similar Documents

Publication Publication Date Title
CN107729847A (en) A kind of certificate verification, auth method and device
CN107944339A (en) A kind of certificate verification, auth method and device
CN107832679A (en) A kind of certificate verification, auth method and device
Ferrara et al. Face demorphing
Raghavendra et al. Face morphing versus face averaging: Vulnerability and detection
US8540158B2 (en) Document verification using dynamic document identification framework
US8194933B2 (en) Identification and verification of an unknown document according to an eigen image process
JP2019534526A (en) How to detect falsification of ID
US11049350B2 (en) Method for authenticating and/or checking the integrity of a subject
CN117237974A (en) Certificate verification method and device and electronic equipment
CN110008664A (en) Authentication information acquisition, account-opening method, device and electronic equipment
CN109426759A (en) The method, apparatus and electronic equipment of the visualization archive of article
US11012613B2 (en) Flat surface detection in photographs
CN112597810A (en) Identity document authentication method and system
Ma et al. Totems: Physical objects for verifying visual integrity
Patil et al. Digital image alteration detection using advance processing
Jumnake et al. An overview of picture imitation detection (types and methods)
CN114782853A (en) Video data processing method, device, computer equipment and storage medium
CN113792701A (en) Living body detection method and device, computer equipment and storage medium
Smith Should edited photos be admissible in court?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1249788

Country of ref document: HK

TA01 Transfer of patent application right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant