A kind of certificate verification, auth method and device
Technical field
The application is related to Internet technical field, more particularly to a kind of certificate verification, auth method and device.
Background technology
Internet era, many things are all more and more convenient, and user, which only need to carry out operation on the terminal device, to handle
Required business.But because partial service is required very high safe class, it is necessary to the information filled in user and offer
Authenticity, integrality, the compliance of documentary evidence are conscientiously examined, to avoid being multiplied by criminal.Therefore, it is necessary under line
System, which is handled, by specific transactions handles related service.
At present, user identity usually is verified by the way of contrast face and card face, although can be to a certain extent
Solve the problems, such as certificate forgery, reproduction, but can not still meet the needs of related service is handled on line, therefore, it is necessary to more may be used
The scheme leaned on.
The content of the invention
This specification embodiment provides a kind of certificate verification, auth method and device, is carried for solving prior art
The problem of can not meeting to handle safe class needed for related service on line for ground authentication scheme.
This specification embodiment provides a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Optionally, it is described checking is carried out to the certificate image to include:
Based on predetermined special characteristic, feature detection is carried out to the certificate region in the certificate image and/or frame;
Wherein, the certificate region is the region shared by certificate to be verified described in certificate image.
Optionally, the predetermined special characteristic includes:It is at least one during screen moire fringes, certificate watermark, printing are reflective.
This specification embodiment also provides a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Optionally, carrying out checking to the certificate image includes:
Based on Pixel-level feature corresponding to black and white copying part and/or colored photocopy, to the picture number of the certificate image
According to progress feature detection.
This specification embodiment also provides a kind of certificate verification method, including:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from
The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested
Demonstrate,prove the result of certificate.
Optionally, it is described to be obtained based on the certificate image from the probability of screen reproduction and from the probability of copy
Taking the result of the certificate to be verified includes:
Based on the certificate image from certificate described in the probability of screen reproduction and the determine the probability from copy
Image sources are in the probability of entity certificate;
The result of the certificate to be verified is obtained from the probability of entity certificate according to the certificate image.
This specification embodiment also provides a kind of auth method, including:
Obtain an at least identity document image for object to be verified;
The first the result of identity document corresponding to the identity document image is obtained based on above-mentioned steps;To the body
The true and false of identity information in part certificate image is verified, obtains the second the result;
The authentication knot of the object to be verified is determined based on first the result and second the result
Fruit.
Optionally, at least identity document image for obtaining object to be verified includes:
An at least identity document image for collection in worksite object to be verified.
Optionally, at least identity document image for obtaining object to be verified includes:
Obtain an at least identity document image for the object to be verified formerly gathered.
Optionally, the true and false of the identity information in the identity document image is verified, obtains the second checking
As a result include:
Online checking is carried out to the identity information in the identity document image, and according to the result verification institute of online checking
The true and false of identity information is stated, as the second the result.
Optionally, the identity information in the identity document image, which carries out online checking, includes:
Online checking is carried out to the text information in the identity information and card face image respectively.
Optionally, before carrying out online checking to the card face image in the identity information, in addition to:
The facial image of collection in worksite holder;
Wherein, online checking is carried out to the card face image in the identity information, including:
The facial image that the card face image, the facial image of the holder and online checking obtain is carried out into intersection to test
Card.
Optionally, it is determined that before the true and false of the identity information, in addition to:
Facial image based on the holder carries out In vivo detection, obtains In vivo detection result;
Wherein it is determined that the true and false of the identity information includes:
Result and the In vivo detection result based on the online checking determine the true and false of the identity information.
Optionally, the identity of the object to be verified is determined based on first the result and second the result
The result includes:
If second the result is not pass through, it is determined that the authentication result is not pass through;
Or
If second the result is by determining that the authentication result is based on first the result
No is to pass through.
Optionally, the identity of the object to be verified is determined based on first the result and second the result
The result includes:
If second the result is by determining the authentication result based on the first the result to pass through
Probability.
This specification embodiment also provides a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine that the certificate image derives from screen
The probability of reproduction;The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Optionally, first authentication unit, for based on predetermined special characteristic, to the certificate area in the certificate image
Domain and/or frame carry out feature detection;Wherein, the certificate region is the area shared by certificate to be verified described in certificate image
Domain.
Optionally, the predetermined special characteristic includes:It is at least one during screen moire fringes, certificate watermark, printing are reflective.
This specification embodiment also provides a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine the certificate image from duplicating
The probability of part;The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Optionally, first authentication unit, for based on Pixel-level corresponding to black and white copying part and/or colored photocopy
Feature, feature detection is carried out to the view data of the certificate image.
This specification embodiment also provides a kind of certificate verifying device, including:
Acquiring unit, for obtaining an at least certificate image for certificate to be verified;
First authentication unit, for being verified to the certificate image, to determine that the certificate image derives from screen
The probability of reproduction and the probability from copy;Based on the certificate image from the probability of screen reproduction and from multiple
The probability of printed document obtains the result of the certificate to be verified.
Optionally, first authentication unit, for from the probability of screen reproduction and being come based on the certificate image
Come from the probability that certificate image described in the determine the probability of copy derives from entity certificate;According to the certificate image from real
The probability of body certificate obtains the result of the certificate to be verified.
This specification embodiment also provides a kind of authentication means, including:
Acquiring unit, for obtaining an at least identity document image for object to be verified;
First authentication unit, for whether being verified to the identity document image from entity certificate, obtain the
One the result;
Second authentication unit, for being verified to the true and false of the identity information in the identity document image, obtain the
Two the results;
Determining unit, for determining the object to be verified based on first the result and second the result
Authentication result.
Optionally, the acquiring unit, at least identity document image for object to be verified described in collection in worksite.
Optionally, the acquiring unit, for obtaining an at least identity card for the object to be verified formerly gathered
Part image.
Optionally, second authentication unit, for carrying out networking core to the identity information in the identity document image
Look into, and according to the result verification of online checking identity information the true and false, as the second the result.
Optionally, second authentication unit, for respectively to the text information in the identity information and card face image
Carry out online checking.
Optionally, in addition to:Collecting unit;
The collecting unit, the facial image for collection in worksite holder;
Second authentication unit, for the card face image, the facial image of the holder and online checking to be obtained
The facial image taken carries out cross validation.
Optionally, second authentication unit, it is additionally operable to the facial image based on the holder and carries out In vivo detection, obtain
Take In vivo detection result;Result and the In vivo detection result based on the online checking determine the true of the identity information
It is pseudo-.
Optionally, the determining unit, if being not pass through for second the result, it is determined that the authentication
As a result it is not pass through;Or if second the result is by determining the authentication based on the first the result
As a result the probability to pass through;Or if second the result is by based on described in first the result determination
Whether authentication result is to pass through.
Optionally, the determining unit, if being by true based on the first the result for second the result
The fixed authentication result is the probability passed through.
This specification embodiment also provides a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Manage device and perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
This specification embodiment also provides a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Manage device and perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
This specification embodiment also provides a kind of certificate verifying device, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Manage device and perform following operate:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from
The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested
Demonstrate,prove the result of certificate.
This specification embodiment also provides a kind of authentication means, including:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Manage device and perform following operate:
Obtain an at least identity document image for object to be verified;
Whether the identity document image is verified from entity certificate, obtains the first the result;
The true and false of identity information in the identity document image is verified, obtains the second the result;
The authentication knot of the object to be verified is determined based on first the result and second the result
Fruit.
Above-mentioned at least one technical scheme that this specification embodiment uses can reach following beneficial effect:
This specification embodiment by the source to identity document image and identity document image identity information it is true
Puppet is verified, can be without using specialty compared with realizing the scheme of authentication using professional authorized machine in the prior art
Effectively solve situations such as forgery of certificate content, reproduction certificate on the premise of authorized machine, and then carried to handle related service on line
For the authentication ability of safe class needed for satisfaction.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen
Schematic description and description please is used to explain the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the application scenario diagram of this specification embodiment;
Fig. 2 is the schematic flow sheet for the auth method that this specification embodiment 1 provides;
Fig. 3 is the schematic flow sheet for the auth method that this specification embodiment 2 provides;
Fig. 4 is the structural representation for the authentication means that this specification embodiment 3 provides;
Fig. 5 is the structural representation for the authentication means that this specification embodiment 4 provides;
Fig. 6 is the structural representation for the electronic equipment that this specification embodiment 5 provides.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one
Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out under the premise of creative work the every other embodiment obtained, belong to the scope of the application protection.
Referring to Fig. 1, the figure shows a kind of exemplary application scene of this specification embodiment.In the scene, Yong Hu
When handling related service, relevant information can be filled in by the application program (Application, app) in terminal device 13, and
When meeting preparatory condition, captured identity certificate image, and the equipment 12 and/or equipment 11 of service authorization system are uploaded to, by
Equipment 12 and/or equipment 11 are verified for identity document image, and the business handled based on the result response user.This
In related service can be the various business handled on line, such as, remotely open an account.Corresponding, identity document image can be
The image of user identity card.
Another exemplary application scene of this specification embodiment can be:
User shows identity document image by terminal device to the client of authoring system, or, user is to mandate
The client displaying identity document of system, by the image of client captured identity certificate.Then, client is by identity document image
The server of authoring system is reached, is verified by server, and the result is returned to client, checking is based on by client
As a result authorized user is determined whether.
Wherein, during this process can occur to cross safety check in user, log in and need to authorize platform etc..In addition, transacting business
Whether user user corresponding with identity document needs consistent specific depending on the regulation of business handling side.
The application scenarios of this specification embodiment can also be various other scenes in addition to above-mentioned two kinds exemplified,
This is not specially limited, and can be used as long as being technically applicable to the scheme that this specification provides.With reference to attached
Figure, describe the technical scheme that each embodiment of the application provides in detail.
Embodiment 1
Fig. 2 is the schematic flow sheet for the auth method that this specification embodiment 1 provides, and referring to Fig. 2, this method can be with
Specifically comprise the following steps:
Step 220, the identity document image for obtaining object to be verified;
Wherein, identity document image can be the image that shooting identity document obtains, and identity document can be:Identity card,
Interim identity card, academic card, driving license etc. can prove the certificate of object identity to be verified, still to be tested right described in identity document
The identity information of elephant, such as:Name, identification card number, student status number etc..
It should be noted that a kind of implementation of step 220 can be:The identity card of collection in worksite object to be verified
Part image." scene " herein be need verify identity " scene ", its can be checking identity transacting business scene, example
Such as:Handle open an account business when, gather the scene of the image of the identity card of object to be verified;It may not be showing for transacting business
, such as:When crossing safety check, the scene of the image of the related certificate of object to be verified is gathered.
Understandable to be with reference to Fig. 1, the mode of " collection in worksite identity document image " can be specially:
User independently opens shooting interface, or, the operation based on user, authoring system calls the camera of terminal device
Interface is shot to open, then, the identity document for shooting object to be verified obtains identity document image.
Another implementation of step 220 can be:Obtain the identity document image of the object to be verified formerly gathered.
" first " " scene " for being used to distinguish in a kind of upper implementation of step 220 herein, this implementation can be exemplified as:By it
The identity document image of preceding shooting is stored in precalculated position, when needing to carry out authentication, is obtained based on storage address corresponding
Identity document image.
Step 240, the anti-counterfeiting mark in the source of the identity document image and/or the identity document image is carried out
Checking, obtain the first the result;
The source of identity document image in this step can be a variety of sources, such as, shoot the identity document in entity,
After ps/non-ps certificate photograph, the copy of certificate, screen reproduction, predetermined shooting field etc..It is to glue that anti-counterfeiting mark, which is,
Patch, printing, heat transfer are on subject matter surface, or in subject matter packaging, or subject matter adjunct (such as commodity are listed, business card and
Antifake certificate card) on, the mark with anti-fake effect.Such as:Anti-counterfeiting mark on identity card includes:National emblem, certificate title, Great Wall
Pattern, the issuing authority of certificate and the term of validity and chromatic pattern etc..
It should be noted that for different business, because its required safe class is different, it is legal optionally to set
Source and the integrity degree of anti-counterfeiting mark.For the business that safe class requires higher, such as:Remotely open an account.Need to meet
Condition:The source of identity document image is the identity document of entity and possesses complete anti-counterfeiting mark, or meets the condition
Probability reaches certain threshold value.And for safe class requirement is than relatively low business, the condition of satisfaction can suitably relax.
It is illustrative to realizing for step 240 by taking " remotely opening an account " as an example below:First, to being tested in step 240
The implementation for demonstrate,proving the source of identity document image is illustrated, including:Verify identity document image whether from real
Body certificate, checking identity document image whether with the image sources of collection in worksite in same shooting environmental;Then, based on checking body
The implementation in the source of part certificate image, enumerates five kinds of implementations herein.Those skilled in the art on this basis can be with
Other implementations are expanded, these modes are within the protection domain of the application:
The first implementation:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to identity document image
Possess complete anti-counterfeiting mark, or meet that the probability of the condition reaches certain threshold value.It is specifically as follows:
It is determined that the anti-counterfeiting mark in identity document corresponding with the type of the identity document image;Based on the false proof of determination
Anti-counterfeiting mark in identity document image described in identity verification, and the first the result is determined according to the result, described first
The result is used to represent the probability that the identity document image passes through checking.Wherein, anti-counterfeiting mark includes:It is watermark word, micro-
It is at least one in contracting word, shading lines, intaglio printing, colour cast, false proof secret mark, font.
It should be noted that different types of identity document is corresponding with different anti-counterfeiting marks, such as:Identity card, passport,
Driver's license has corresponding anti-fake mark.Correspondingly, can be based on the certificate class that user selects during transacting business
Type determines the type of the identity document image of collection, or, image recognition processing is carried out to the identity document image of collection, with true
Determine the type of identity document image.
In addition, understandable be, can be by way of train classification models, by the anti-counterfeiting mark in identity document image
As the input of disaggregated model, or, the input using identity document image as disaggregated model, disaggregated model output identity document
The probability that image is verified by anti-counterfeiting mark.Wherein, scanning identity document image can be exemplified as in a manner of obtaining anti-counterfeiting mark:
Using printing opacity inspection identification watermark word etc..
Second of implementation can be:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to it is identity document figure
The source of picture is entity identities certificate, or meets that the probability of the condition reaches certain threshold value.Specifically can be by following two
Scheme is realized:
The first scheme (identity document image is at least one):
First, first time checking is carried out to the identity document image, to determine the identity document image sources in screen
The probability of curtain reproduction;Secondly, carry out second to the identity document image to verify, to determine the identity document image sources
In the probability of copy;Finally, based on the identity document image sources in the probability of screen reproduction and from copy
Identity document image sources are in the probability of entity certificate described in determine the probability.Wherein, checking for the first time is verified suitable with second
Sequence does not limit herein, can also serializable parallel.
In the first scheme, checking for the first time can specifically be carried out as follows:
Based on predetermined special characteristic, the certificate provincial characteristics in the identity document image is detected, to be rubbed with reference to screen
The difference of the normal identity document image of that line disaggregated model contrast and the identity document image of screen reproduction between certificate region
Property;Wherein, special characteristic can be exemplified as:Screen moire fringes, certificate watermark, print the feature such as reflective.And based on predetermined specific
Feature, feature detection is carried out to the frame of the identity document image, and normal identity is contrasted to combine screen frame disaggregated model
Otherness between the frame of certificate image and the identity document image of screen reproduction, such as:The identity document figure of screen reproduction
As by there is black surround frame.Wherein, special characteristic can be exemplified as:Screen moire fringes, certificate watermark, print the feature such as reflective.It is described
Certificate region is the region of identity document corresponding to the identity document image.
In the first scheme, second of checking can specifically be carried out as follows:
Based on Pixel-level feature corresponding to black and white copying part and/or colored photocopy, to the figure of the identity document image
As data carry out feature detection.Specific implementation can be based on identity card described in black and white copying part classification DNN model inspections
Corresponding Pixel-level feature in part image, determine the probability that the identity document image is black and white copying part.Based on color photocopying
Corresponding Pixel-level feature in identity document image described in part classification DNN model inspections, determines the identity document image for coloured silk
The probability of color copy.
By the checking of above-mentioned first time and second of checking and then based on screen moire fringes disaggregated model, screen frame point
At least one determination in the result of class model, black and white copying part classification DNN models and colored photocopy classification DNN model outputs
The source of identity document image is the probability of real entity identities certificate.
Second scheme:
The view data of the identity document image is analyzed, determines the first the result, the first checking knot
Fruit is used to represent the identity document image sources in the probability of entity certificate.It is specifically as follows:
Image recognition processing is carried out to the view data of the single-frame images in the identity document image, verifies identity document
It whether there is the special characteristic of pixel scale in image, then, the presence situation of special characteristic is true in identity-based certificate image
Fixed first the result.Input that can also be using view data as disaggregated model, obtain the first checking of disaggregated model output
As a result.Special characteristic can be exemplified as:Screen moire fringes, certificate watermark, printing are reflective etc..
Or
At least two identity document images, the view data progress at least two class images in identity document image are poor
Value processing, obtains image difference;Input using described image difference as pre-established disaggregated model, the disaggregated model are used for base
The first the result is exported in the image difference of input;Wherein, at least two class images can be to be adopted under different shooting conditions
Two class images of collection, such as:A kind of image gathered under a kind of image and flash lamp that are gathered under natural conditions, or, it is different
The image gathered under exposure.Further, the object of difference processing can be the image and flash lamp gathered under natural conditions
The image of lower collection.
The third implementation can be:
This implementation goes for requiring very high occasion to safe class, such as, it is desirable to it is identity document
The source of image is that real entity identities certificate and possess complete anti-counterfeiting mark, or, meet that the probability of the condition reaches
Certain threshold value.
Its implementation process is similar to the first and second of implementation, therefore, here is omitted for similarity.In addition,
The third implementation also includes:Based on probability of the identity document image by checking and the probability from entity certificate
The first the result is determined, that is, determines the confidence level of the identity document of object to be verified corresponding to identity document image.
4th kind of implementation can be:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to it is identity document figure
As deriving from same photographed scene with the first background image, or, meet that the probability of the condition reaches certain threshold value.Wherein,
Safe class requirement is related to the identity document image for needing to shoot, such as, it is desirable to it is higher, it is necessary to the identity document image of shooting
More and needs are also more from the identity document image of same photographed scene with the first background image.It is specifically as follows:
Before step 220 is performed, one or more background image (following referred to as the first background images) is gathered in advance,
Then, identity document image and the first background image are contrasted, it is determined that degree of overlapping between the two.
It is understandable to be, if degree of overlapping between the two is more than certain threshold value, it is determined that both are in same shooting field
Completed under scape;Moreover, contrast mode can be between identity document image and individual background image contrast, or
It will be contrasted after the long background image of background image combination with identity document image.
Wherein it is determined that both whether the scheme under same photographed scene can include:By the image of the background area
In background area contrasted with the first background image, obtain between the identity document image and first background image
Degree of overlapping;First the result is determined according to the degree of overlapping, first the result is used to represent the identity
Certificate image derives from the probability of same photographed scene with first background image.The background area is the identity document
Region in image outside region shared by identity document.
Further to improve the verification the verifying results and efficiency of the 4th kind of implementation, can be based on gathering the identity document image
When gyroscope first position information and gather first background image when gyroscope second place information, to both
Angle be adjusted, to contrast the background image of background area first under same gyroscope position information, obtain degree of overlapping, and
Determine that both are shot in the probability of same photographed scene based on degree of overlapping.
It is exemplified below:Before the image of captured identity certificate is started, shot when gyroscope is in second place information
First background image, such as:Desk and its image on periphery.Then, in the case where gyroscope is in first position information, captured identity
The image of certificate.Then, the certificate region and background area in identity document image, and the positional information based on gyroscope are separated
Background area and the first background image are contrasted, obtains degree of overlapping.Wherein, certificate region is shared by identity document in part certificate image
Region.
5th kind of implementation can be:
This implementation goes for requiring higher occasion to safe class, such as, it is desirable to the material of certificate is
Really it is the material of certificate, or, meet that the probability of the condition reaches certain threshold value.It is specifically as follows:
Image difference based at least image data acquisition of two class images determines the material of certificate, and then contrasts the certificate
Material and corresponding types real docu-ment material, and based on comparing result determine the certificate be real docu-ment probability, make
For the first the result.
Understandable to be, different types of certificate may be made by different materials, and certificate material is different, meeting
Occurs larger otherness under different shooting conditions.Thus, the image difference of two class images can be inputted to point trained
In class model, the first the result of disaggregated model output is obtained.
Understandable to be, above-mentioned several feasible implementations can be based on the safety for treating transacting business and its corresponding requirement
Grade and reasonable selection, or, rationally arranged in a crossed manner, here is omitted.
Step 260, the true and false to the identity information in the identity document image are verified, obtain the second checking knot
Fruit;
It should be noted that a kind of implementation of step 260 can be:
Online checking is carried out to the identity information in the identity document image, and institute is determined according to the result of online checking
State the true and false of identity information.
Wherein, the concrete mode of online checking can be:The citizenship information system of online checking is showed with the People's Bank
Based on some Intranets and internetworking platform, forward the People's Bank user to the information sharing system of the Ministry of Public Security and pass through account
The verification request that family system, credit investigation system, the respective front-end system of anti money washing system are sent;Receive and forward business bank user
And the verification sent by its comprehensive business system by its front-end system is asked;Receive and forward information sharing system of the Ministry of Public Security
The verification result of system.
In addition, the object of online checking can include:Text information and card face image in identity information.Text information can
Think certificate ID, the name obtained based on optical character identification (Optical Character Recognition, OCR) identification
Etc. information, card face image is the head portrait identified.
Step 280, the body for determining based on first the result and second the result object to be verified
Part the result.
It should be noted that the first the result and the second the result that are obtained based on step 240 and step 260, this
A kind of implementation of step can be:
If the second the result is not pass through, it is determined that the authentication result is not pass through;
Or
If the second the result be by, based on first the result determine the authentication result whether be
Pass through.It is specifically as follows:When the probability passed through corresponding to the first the result is less than predetermined threshold, it is determined that the identity is tested
Card result is not pass through;The authentication knot is determined when the probability passed through corresponding to the first the result is higher than predetermined threshold
Fruit is to pass through.
Another implementation of this step can be:
If second the result is by determining that the authentication result is logical based on the first the result
Cross/unsanctioned probability.
For two kinds of implementations of step 280, because each above-mentioned step there may be image taking angle, bat
The problems such as taking the photograph quality, it is not the process that an order performs to cause whole flow process, and therefore, the present embodiment provides a decision-making and drawn
Hold up, the result entirely verified is assessed with certain rule.It is exemplified below:
Because the influence factor of the first the result may include:Probability that identity document image is verified by anti-counterfeiting mark,
Identity document image sources are derived from one in the probability of Same Scene in the probability, ID Card Image and image scene of entity certificate
It is individual or multiple, therefore, it is determined that during probability corresponding to the first the result, the conditions such as demand, experience can be based on, to participating in determining
Weight corresponding to the influence factor setting of first the result, and it is corresponding based on respective weights and the result of determine the probability first
Probability.Such as:Participate in determine the first the result influence factor identity document image verified by anti-counterfeiting mark probability,
Identity document image sources are distinguished in the probability, ID Card Image and image scene of entity certificate from the probability of Same Scene
For 60%, 70%, 80%, the weight of setting corresponds to 30%, 30%, 40% respectively, then the first checking knot finally calculated
Probability corresponding to fruit is 71%.
In addition, in order to lift the speed and efficiency of the detection of certificate authenticity, the above-mentioned source to the identity document image
Verified, the anti-counterfeiting mark in the identity document image is verified, and in the checking identity document image
The true and false of identity information can be Parallel Implementation.
Understandable to be, the embodiment of the present invention optionally only performs step 220- steps 240, is tested with completing certificate
The process of card, such as:
Obtain the certificate image of certificate to be verified;
The anti-counterfeiting mark in source and/or the certificate image to the certificate image is verified, is obtained first and is tested
Demonstrate,prove result;
The result of the certificate to be verified is determined based on first the result.
Or
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Or
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Or
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from
The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested
Demonstrate,prove the result of certificate.
Or
Obtain the certificate image of certificate to be verified;
Verify whether the certificate image and the first background image of live pre-acquired derive from same photographed scene, obtain
The result of the certificate to be verified.
Due to, the process of certificate verification is similar to the associated description in above-mentioned steps 220 and step 240, therefore, herein no longer
Repeat.In addition, based on being actually needed, above-mentioned each certificate verification scheme arranged side by side can intersect combination, such as:It is " false proof
The combination of mark "+" whether from same photographed scene ".
It can be seen that the embodiment of the present invention is by testing the source of identity document image, anti-counterfeiting mark and identity information
Card, can effectively solve situations such as forgery of certificate content, reproduction certificate on the premise of without using professional authorized machine, and then be line
On handle related service provide meet needed for safe class authentication ability.
Embodiment 2
Fig. 3 is the schematic flow sheet for the auth method that this specification embodiment 2 provides, and referring to Fig. 3, the present embodiment exists
On the basis of embodiment 1, it can also specifically comprise the following steps:
The facial image of step 320, collection in worksite holder;
It should be noted that a kind of implementation of step 320 can be:
While putting camera " collection in worksite identity document image " after use or afterwards, gathered using front camera
" facial image of holder ".
Another implementation can be:
In the first the result when reaching predetermined threshold by the probability of checking, camera is called to gather " holder
Facial image ".
Another implementation can be:
Text information in identity document image is being subjected to online checking and is drawing text information really to verify result
Afterwards, camera collection " facial image of holder " is called.
Step 340, the facial image based on the holder carry out In vivo detection, obtain In vivo detection result;
It should be noted that the single-frame images or multiple image that are gathered based on step 320 carry out In vivo detection, to determine
Whether holder is live body.In vivo detection can be exemplified as:Blink differentiation, mouth opening and closing differentiation, Disparity Analysis method etc..Due to work
Body is detected as more ripe technology, therefore, here is omitted.
Step 360, by it is described card face image, the holder facial image and online checking obtain facial image enter
Row cross validation, obtain the result of card face image online checking;
A kind of implementation of step 360 can be:
The facial image that card face image in identity document image obtains with online checking is verified, the 3rd is obtained and tests
Demonstrate,prove result;The facial image for demonstrate,proving face image and collection in worksite is contrasted, obtains the 4th the result;Based on the 3rd checking knot
Fruit and the 4th the result determine the result of online checking.
Step 380, the result based on the card face image online checking and the In vivo detection result, with reference to text information
Online checking result determine the true and false of the identity information, obtain the second the result.
It is understandable to be, based on the decision engine in embodiment, according to text information, the knot of card face image online checking
Fruit and the In vivo detection result, with reference to the verification result of certain whole online checking of rule evaluation.Rule herein can lift
Example be:For the result of verification, the result of In vivo detection, weight etc. is set.
In addition, in the present embodiment, while step 320 is using front camera collection facial image, rear camera
Collection one or more (referred to as the second background image) will be continued.Correspondingly, identity document figure is verified further to improve
Precision as whether deriving from same photographed scene with background image, it can be based on gathering the identity document image, described first
Positional information corresponding to gyroscope when background image and second background image, contrast the identity document image, described
One background image and second background image, determine the first the result;Wherein, first the result is used to represent institute
State the probability that identity document image, first background image and second background image derive from same photographed scene.
It should be noted that this specification embodiment on the basis of embodiment 1, introduces the people of the holder of collection in worksite
Face image, and In vivo detection is carried out to facial image;Then, based on card face image, the facial image of holder and online checking
The facial image of acquisition is verified, and then the result based on In vivo detection and online checking determines the true and false of identity information.Energy
Avoid the identity of holder and identity that identity document proves it is inconsistent caused by identity the problem of being falsely used, carrying further
High authentication ability.
It should be noted that the executive agent that Examples 1 and 2 provide each step of method may each be same equipment,
Or this method is also by distinct device as executive agent.For example the executive agent of step 220 and step 240 can be equipment
1, the executive agent of step 260 can be equipment 2;Again for example, the executive agent of step 220 can be equipment 1, step 240 with
The executive agent of step 260 can be equipment 2;Etc..
In addition, for above method embodiment, in order to be briefly described, therefore it is all expressed as to a series of action group
Close, but those skilled in the art should know, embodiment of the present invention is not limited by described sequence of movement, because
According to embodiment of the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art
It should know, embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily originally
Necessary to invention embodiment.
Embodiment 3
Fig. 4 is the structural representation for the authentication means that this specification embodiment 3 provides, and device includes:Acquiring unit
41st, the first authentication unit 42, the second authentication unit 43 and determining unit 44, wherein:
Acquiring unit 41, for obtaining the identity document image of object to be verified;
First authentication unit 42, in the source to the identity document image and/or the identity document image
Anti-counterfeiting mark is verified, obtains the first the result;
Second authentication unit 43, for being verified to the true and false of the identity information in the identity document image, obtain
Second the result;
Determining unit 44 is described to be verified right for being determined based on first the result and second the result
The authentication result of elephant.
Exemplary explanation is carried out to the operation principle of each functional module in the present embodiment below:
The implementation of the function of acquiring unit 41 can be:
The identity document image of collection in worksite object to be verified.
Or
Obtain the identity document image of the object to be verified formerly gathered.
The implementation of the function of first authentication unit 42 can be:
It is determined that the anti-counterfeiting mark in identity document corresponding with the type of the identity document image;Based on the false proof of determination
Anti-counterfeiting mark in identity document image described in identity verification, and the first the result is determined according to the result, described first
The result is used to represent the probability that the identity document image passes through checking.
Wherein, anti-counterfeiting mark includes:Watermark word, micro text, shading lines, intaglio printing, colour cast, false proof secret mark,
It is at least one in font.
First time checking is carried out to the identity document image, to determine the identity document image sources in screen reproduction
Probability;
Second is carried out to the identity document image to verify, to determine the identity document image sources in copy
Probability;
Based on the identity document image sources in described in the probability of screen reproduction and the determine the probability from copy
Identity document image sources are in the probability of entity certificate.
Wherein, checking includes for the first time:
Based on predetermined special characteristic, feature detection is carried out to the certificate region in the identity document image and/or frame;
Wherein, the certificate region is the region of identity document corresponding to the identity document image.
Second of checking includes:
Based on Pixel-level feature corresponding to black and white copying part and/or colored photocopy, to the figure of the identity document image
As data carry out feature detection.
The view data of the identity document image is analyzed, determines the first the result, the first checking knot
Fruit is used to represent the identity document image sources in the probability of entity certificate.
Image recognition processing is carried out to the view data of the single-frame images in the identity document image;Or to described
The view data of at least two class images in identity document image carries out difference processing, obtains image difference;Described image is poor
It is worth the input as pre-established disaggregated model;Wherein, at least two class images can be two gathered under different shooting conditions
Class image, such as:A kind of image for being gathered under a kind of image and flash lamp that are gathered under natural conditions or, different exposures
The image of lower collection.
It is determined that the anti-counterfeiting mark in identity document corresponding with the type of the identity document image;Based on the false proof of determination
Anti-counterfeiting mark in identity document image described in identity verification, and determine the identity document image by testing according to the result
The probability of card;The view data of the identity document image is analyzed, determines the identity document image sources in entity
The probability of certificate;Tested based on probability of the identity document image by checking and the determine the probability from entity certificate first
Demonstrate,prove result.
Verify whether the identity document image and the first background image of live pre-acquired derive from same photographed scene,
Obtain the first the result.It can specifically include:
Background area in the image of the background area and the first background image of live pre-acquired are contrasted, obtained
Take the degree of overlapping between the identity document image and first background image;
First the result is determined according to the degree of overlapping, first the result is used to represent the identity card
Part image derives from the probability of same photographed scene with first background image;
Wherein, the background area is the region outside region shared by identity document in the identity document image.
Wherein, the first background image of background area and live pre-acquired is carried out into contrast includes:
Based on the first position information of gyroscope when gathering the identity document image and gather first background image
The second place information of Shi Suoshu gyroscopes, contrast the background area and first background image.
In addition, when gathering the facial image of holder at the scene, the second background image is gathered;
Wherein, whether the checking identity document image and the first background image of live pre-acquired derive from same
Photographed scene, obtaining the first the result includes:
Based on gyroscope pair when gathering the identity document image, first background image and second background image
The positional information answered, the identity document image, first background image and second background image are contrasted, determines first
The result;
Wherein, first the result is used to represent the identity document image, first background image and described
Second background image derives from the probability of same photographed scene.
The implementation of the function of second authentication unit 43 can be:
Online checking is carried out to the identity information in the identity document image, and institute is determined according to the result of online checking
State the true and false of identity information.Wherein, online checking can be carried out to the text information in the identity information and card face image respectively.
The implementation of the function of determining unit 44 can be:
If second the result is not pass through, it is determined that the authentication result is not pass through;It is or if described
Second the result is by the probability for then determining the authentication result based on the first the result to pass through;Or if
Second the result is by then determining whether the authentication result passes through based on first the result.
It can be seen that the embodiment of the present invention is by testing the source of identity document image, anti-counterfeiting mark and identity information
Card, can effectively solve situations such as forgery of certificate content, reproduction certificate on the premise of without using professional authorized machine, and then be line
On handle related service provide meet needed for safe class authentication ability.
Embodiment 4
Fig. 5 is the structural representation for the authentication means that this specification embodiment 4 provides, and referring to Fig. 5, device includes:
Acquiring unit 51, collecting unit 52, the first authentication unit 53, the second authentication unit 54 and determining unit 55, wherein:
The authentication unit 53 of acquiring unit 51 and first respectively with the authentication unit 42 of acquiring unit 41 and first in embodiment 3
It is corresponding similar, therefore, no longer it is repeated herein.
In addition, on the basis of embodiment 3, in the present embodiment:
Collecting unit 52, the facial image for collection in worksite holder;
Second authentication unit 54, for the card face image, the facial image of the holder and online checking to be obtained
Facial image carry out cross validation.
Second authentication unit 54, it is additionally operable to the facial image based on the holder and carries out In vivo detection, obtains live body inspection
Survey result;Result and the In vivo detection result based on the online checking determine the true and false of the identity information.
It can be seen that this specification embodiment on the basis of embodiment 3, introduces the facial image of the holder of collection in worksite,
And In vivo detection is carried out to facial image;Then, the people obtained based on card face image, the facial image of holder and online checking
Face image is verified, and then the result based on In vivo detection and online checking determines the true and false of identity information.It is avoided that accredited
The problem of identity that the identity and identity document of people proves is inconsistent, raising authentication ability further.
For said apparatus embodiment, because it is substantially similar to method embodiment, so the comparison of description
Simply, related part illustrates referring to the part of method embodiment.
It should be noted that in all parts of the device of the present invention, according to the function that it to be realized to therein
Part has carried out logical partitioning, and still, the present invention is not only restricted to this, all parts can be repartitioned as needed or
Person combines.
Embodiment 5
Fig. 6 is the structural representation for a kind of electronic equipment that this specification embodiment 5 provides, referring to Fig. 6, the electronic equipment
Including processor, internal bus, network interface, internal memory and nonvolatile memory, other business institutes are also possible that certainly
The hardware needed.Processor read from nonvolatile memory corresponding to computer program into internal memory then run, patrolling
Authentication means are formed in the aspect of collecting.Certainly, in addition to software realization mode, this specification is not precluded from other realization sides
Formula, such as mode of logical device or software and hardware combining etc., that is to say, that the executive agent of following handling process is simultaneously unlimited
Due to each logic unit or hardware or logical device.
Network interface, processor and memory can be connected with each other by bus system.Bus can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..For ease of representing, only represented in Fig. 6 with a four-headed arrow, it is not intended that an only bus or a type of
Bus.
Memory is used to deposit program.Specifically, program can include program code, and described program code includes computer
Operational order.Memory can include read-only storage and random access memory, and provide instruction and data to processor.Deposit
Reservoir may include high-speed random access memory (Random-Access Memory, RAM), it is also possible to also including non-volatile
Memory (non-volatile memory), for example, at least 1 magnetic disk storage.
Processor, for performing the program of the memory storage, and specifically perform:
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of screen reproduction;
The result of the certificate to be verified is obtained from the probability of screen reproduction according to the certificate image.
Or
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine that the certificate image derives from the probability of copy;
The result of the certificate to be verified is obtained from the probability of copy according to the certificate image.
Or
Obtain an at least certificate image for certificate to be verified;
The certificate image is verified, to determine the certificate image from the probability of screen reproduction and derive from
The probability of copy;
Obtained based on probability of the certificate image from screen reproduction and the probability from copy described to be tested
Demonstrate,prove the result of certificate.
Or
Obtain the certificate image of certificate to be verified;
Verify whether the certificate image and the first background image of live pre-acquired derive from same photographed scene, obtain
The result of the certificate to be verified.
Or
Obtain the certificate image of certificate to be verified;
The anti-counterfeiting mark in source and/or the certificate image to the certificate image is verified, is obtained first and is tested
Demonstrate,prove result;
The result of the certificate to be verified is determined based on first the result.
Or
On the basis of above-mentioned several proof validation schemes, the true and false of the identity information in the identity document image is entered
Row checking, obtains the second the result;
The result and second the result based on certificate to be verified determine to be verified corresponding to certificate to be verified
The authentication result of object.
Authentication means or manager (Master) node disclosed in above-mentioned Fig. 2-5 illustrated embodiments such as this specification are held
Capable method can apply in processor, or be realized by processor.Processor is probably a kind of IC chip, is had
The disposal ability of signal.In implementation process, each step of the above method can pass through the integration logic of the hardware in processor
The instruction of circuit or software form is completed.Above-mentioned processor can be general processor, including central processing unit
(Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be numeral
Signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific
Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array,
FPGA) either other PLDs, discrete gate or transistor logic, discrete hardware components.Can realize or
Person performs disclosed each method, step and logic diagram in this specification embodiment.General processor can be microprocessor
Or the processor can also be any conventional processor etc..The step of method with reference to disclosed in this specification embodiment, can
Completion is performed to be embodied directly in hardware decoding processor, or is performed with the hardware in decoding processor and software module combination
Complete.Software module can be located at random access memory, flash memory, read-only storage, programmable read only memory or electrically-erasable
In the ripe storage medium in this areas such as programmable storage, register.The storage medium is located at memory, and processor reads and deposited
Information in reservoir, with reference to the step of its hardware completion above method.
Authentication means can also carry out Fig. 2 or Fig. 3 method, and realize the method that manager's node performs.
Embodiment 6
Based on identical innovation and creation, this specification embodiment additionally provides a kind of computer-readable recording medium, described
Computer-readable recording medium storage one or more program, one or more of programs, which are worked as, is included multiple application programs
When electronic equipment performs so that the electronic equipment performs certificate verification, the auth method that Examples 1 and 2 provide.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the action recorded in detail in the claims or step can be come according to different from the order in embodiment
Perform and still can realize desired result.In addition, the process described in the accompanying drawings not necessarily require show it is specific suitable
Sequence or consecutive order could realize desired result.In some embodiments, multitasking and parallel processing be also can
With or be probably favourable.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping
Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Other identical element also be present in the process of element, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
Embodiments herein is the foregoing is only, is not limited to the application.For those skilled in the art
For, the application can have various modifications and variations.All any modifications made within spirit herein and principle, it is equal
Replace, improve etc., it should be included within the scope of claims hereof.