CN108288080A - Identity information checking method, device, medium and computing device - Google Patents
Identity information checking method, device, medium and computing device Download PDFInfo
- Publication number
- CN108288080A CN108288080A CN201711252486.8A CN201711252486A CN108288080A CN 108288080 A CN108288080 A CN 108288080A CN 201711252486 A CN201711252486 A CN 201711252486A CN 108288080 A CN108288080 A CN 108288080A
- Authority
- CN
- China
- Prior art keywords
- information
- identity
- target user
- biological
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
A kind of identity information checking method of present invention offer, device, medium and computing device.Wherein, the method includes:The ID card information of target user is obtained, and obtains the biological information of the target user;Legitimacy inspection is carried out to the ID card information of the target user, obtain identity card checking as a result, and legitimacy inspection is carried out to the biological information of the target user, obtain biological characteristic and veritify result;It is veritified according to the identity card checking result and the biological characteristic as a result, determining that the identity of the target user veritifies result.The present invention, pass through the legitimacy inspection to ID card information, it can ensure the legitimacy of the held identity card of user, and pass through the legitimate verification to biological information, it can ensure the consistency of target user and identity card, target user's identity comprehensively, is accurately veritified to realizing on the whole, client is effectively avoided to use the possibility of other people identity cards or forged identity card transacting business.
Description
Technical field
The present invention relates to field of information security technology, and in particular to a kind of identity information checking method, device, medium and meter
Calculate equipment.
Background technology
Identity veritifies also known as " verification ", " authentication ", refers to completing the confirmation to user identity by certain means.Body
The purpose of part verification is to confirm the user currently claimed as certain identity, the user strictly claimed.In daily life,
Identity veritification is not uncommon for;For example, bank etc. needs the client of transacting business to carry out identity veritification, in this way, on the one hand can be with
Criminal is defrauded of and opens the huge deterrence of assumed name account generation and prevention effect, is on the other hand advantageously reduced because of account vacation
Economic dispute caused by name or anonymity, containment financial fraud protect the public especially for the financial swindling of ordinary people
Fund security and banking institution legitimate rights and interests, safeguard the fundamental interests of the public conscientiously.
Existing identity is veritified, and mainly relying on the People's Bank can be the same as the online checking citizenship information that the Ministry of Public Security builds up
System (abbreviation network verification system), the basic skills of online checking are:Banking institution is when for client's transacting business, to networking
Checking system submits the name and ID card No. of the client, citizenship Information Number of the network verification system in Ministry of Public Security's typing
According to above-mentioned two item data is inquired in library, if there is name and ID card No. phase with the client in citizenship information database
Consistent citizen's information then feeds back the identity card picture for checking consistent prompt and the client;When citizenship number exists
But in the absence of name mismatch or citizenship number, system is prompted accordingly.
As described above, existing identification check technology, the identity information of identity card and the Ministry of Public Security primarily directed to user
It is verified;And for the consistency of identity card and user, mainly by staff according to the photo or connection on identity card
The photo of net checking system feedback is by visually being screened, since the update cycle of identity card is longer, and with age,
The appearance of people can change therewith, in addition, by make up, the factors such as accessories, hair style are influenced, staff often can not accurately sentence
Whether the photo and user on disconnected identity card are consistent, this uses other people identity cards or forged identity card transacting business for client
Situation can not accomplish effectively to screen.
To sum up, existing identity, which veritifies technology, can not effectively screen the authenticity of user identity.
Invention content
In view of the above problems, the purpose of the present invention is pass through a kind of identity information checking method of offer, device, medium and meter
Equipment is calculated, the authenticity of user identity can not be effectively screened to solve current identity veritification technology, improve identity information core
The accuracy tested.
First aspect present invention provides a kind of identity information checking method, including:
The ID card information of target user is obtained, and obtains the biological information of the target user;
Legitimacy inspection is carried out to the ID card information of the target user, obtains identity card checking as a result, and to institute
The biological information for stating target user carries out legitimacy inspection, obtains biological characteristic and veritifies result;
It is veritified according to the identity card checking result and the biological characteristic as a result, determining the identity core of the target user
Test result.
In one of first aspect present invention change embodiment, the ID card information to the target user into
Row legitimacy is examined, including:
The identification card number of the target user described according to the ID card information, from subscriber identity information database
It is middle to inquire the corresponding archive identity information of the identification card number;
The ID card information of the target user is compared with the archive identity information, is judged according to comparison result
Whether the ID card information of the target user is legal.
In another change embodiment of first aspect present invention, the ID card information includes name, identity card
Number, gender, nationality, the date of birth, address, issuing authority, term of validity and identity card picture.
In another change embodiment of first aspect present invention, the biological characteristic to the target user is believed
Breath carries out legitimacy inspection, including:
The identification card number of the target user described according to the ID card information, from user biological property data base
It is middle to inquire the corresponding archived biological characteristic information of the identification card number;
The biological information of the target user is compared with the archived biological characteristic information, is tied according to comparing
Fruit judges whether the biological information of the target user is legal.
In another change embodiment of first aspect present invention, the biological information includes:Face characteristic,
At least one of fingerprint characteristic, iris feature or vocal print feature.
First aspect present invention another change embodiment in, the biological information include face characteristic,
It is a variety of in fingerprint characteristic, iris feature and vocal print feature;
The biological information by the target user is compared with the archived biological characteristic information, according to than
Whether the biological information of the target user is legal to be judged to result, including:
Each biological information is compared with the archive identity information of corresponding type respectively, it is special to obtain each biology
The similarity of reference breath;
The Similarity-Weighted of each biological information is averaged, total similarity is obtained;
Whether meet preset legal threshold condition according to total similarity, judges the biological characteristic of the target user
Whether information is legal.
In another change embodiment of first aspect present invention, the biological information includes face characteristic;
The biological information for obtaining the target user, including:
Obtain the facial image of target user;
Feature extraction is carried out to the facial image, obtains the face characteristic of the target user.
In another change embodiment of first aspect present invention, the facial image includes three-dimensional face images,
The face characteristic includes face depth characteristic;
The facial image for obtaining target user, including:
Obtain the three-dimensional face images of the target object shot using three-dimensional image pickup device.
In another change embodiment of first aspect present invention, looked into the property data base from user biological
After asking the corresponding archived biological characteristic information of the identification card number, further include:
If not finding the corresponding archived biological characteristic information of the identification card number, returns and indicate that the identification card number corresponds to
Prompt message of the biological information without archive, and the target user complete by other means identity information veritify
Afterwards, the biological information of the target user is uploaded in the user biological property data base and is achieved.
Second aspect of the present invention provides a kind of identity information veritification device, including:
ID card information acquisition module, the ID card information for obtaining target user;
Biological information acquisition module, the biological information for obtaining the target user;
ID card information veritifies module, carries out legitimacy inspection for the ID card information to the target user, obtains
Identity card checking result;
Biological characteristic veritifies module, carries out legitimacy inspection for the biological information to the target user, obtains
Biological characteristic veritifies result;
Identity veritifies module, for being veritified according to the identity card checking result and the biological characteristic as a result, determining institute
The identity for stating target user veritifies result.
In a change embodiment of second aspect of the present invention, the ID card information veritifies module, including:
Identity information query unit is achieved, the identity for the target user described according to the ID card information
Card number, inquires the corresponding archive identity information of the identification card number from subscriber identity information database;
ID card information comparing unit, for by the ID card information of the target user and the archive identity information into
Row compares, and judges whether the ID card information of the target user is legal according to comparison result.
In another change embodiment of second aspect of the present invention, the ID card information includes name, identity card
Number, gender, nationality, the date of birth, address, issuing authority, term of validity and identity card picture.
In a change embodiment of second aspect of the present invention, the biological information includes:Face characteristic refers to
At least one of line feature, iris feature or vocal print feature.
In another change embodiment of second aspect of the present invention, the biological characteristic veritifies module, including:
Archived biological characteristic information query unit, for the target user's described according to the ID card information
Identification card number inquires the corresponding archived biological characteristic information of the identification card number from user biological property data base;
Biological information comparing unit, for the biological information of the target user and the archived biological is special
Reference breath is compared, and judges whether the biological information of the target user is legal according to comparison result.
Second aspect of the present invention another change embodiment in, the biological information include face characteristic,
It is a variety of in fingerprint characteristic, iris feature and vocal print feature;
The biological information comparing unit, including:
Point type comparison subunit, for by each biological information respectively with the archive identity information of corresponding type
It is compared, obtains the similarity of each biological information;
Weighted average subelement obtains total similarity for the Similarity-Weighted of each biological information to be averaged;
Threshold value comparison subelement judges institute for whether meeting preset legal threshold condition according to total similarity
Whether the biological information for stating target user is legal.
In another change embodiment of second aspect of the present invention, the biological characteristic veritifies module, further includes:
Without archive information processing unit, if for not finding the corresponding archived biological characteristic information of the identification card number,
It returns and indicates corresponding prompt message of the biological information without archive of the identification card number, and pass through it in the target user
After his mode completes identity information veritification, the biological information of the target user is uploaded to the user biological characteristic
According to being achieved in library.
In another change embodiment of second aspect of the present invention, the biological information includes face characteristic;
The biological information acquisition module, including:
Facial image acquiring unit, the facial image for obtaining target user;
Face characteristic extraction unit obtains the people of the target user for carrying out feature extraction to the facial image
Face feature.
In another change embodiment of second aspect of the present invention, the facial image includes three-dimensional face images,
The face characteristic includes face depth characteristic;
The facial image acquiring unit, including:
Three-dimensional image acquisition subelement, the three-dimensional people for obtaining the target object for using three-dimensional image pickup device to shoot
Face image.
Third aspect present invention provides a kind of computer readable storage medium, is stored in the computer readable storage medium
There are computer program, the computer program to execute identity information checking method provided by the invention when being run by processor.
Fourth aspect present invention provides a kind of computing device, including:It memory, processor and is stored on the memory
And the computer program that can be run on the processor, the present invention is executed when the processor runs the computer program to be carried
The identity information checking method of confession.
The identity information checking method that first aspect present invention provides, to the ID card information and biological characteristic of target user
Information carries out legitimacy inspection respectively, wherein passes through the legitimacy inspection to ID card information, it is ensured that the held identity of user
The legitimacy of card, and pass through the legitimate verification to biological information, it is ensured that the consistency of target user and identity card,
Target user's identity comprehensively, is accurately veritified to realizing on the whole, client is effectively avoided to use other people identity cards or puppet
Make the possibility of identity card transacting business.
The computer readable storage medium that the identity information that second aspect of the present invention provides veritifies device, the third aspect provides
The computing device provided with fourth aspect, the identity information checking method provided with above-mentioned first aspect is for identical invention structure
Think, advantageous effect having the same.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are common for this field
Technical staff will become clear.Attached drawing only for the purpose of illustrating preferred embodiments, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of flow chart for identity information checking method that embodiment of the present invention is provided;
Fig. 2 shows the schematic diagrames that a kind of identity information that embodiment of the present invention is provided veritifies device;
Fig. 3 shows a kind of schematic diagram for computer readable storage medium that embodiment of the present invention is provided;
Fig. 4 shows a kind of schematic diagram for computing device that embodiment of the present invention is provided.
Specific implementation mode
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing this public affairs in attached drawing
The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure without the reality that should be illustrated here
The mode of applying is limited.It is to be able to be best understood from the disclosure on the contrary, providing these embodiments, and can be by this public affairs
The range opened completely is communicated to those skilled in the art.
It should be noted that unless otherwise indicated, the technical term or scientific terminology that the present invention uses should be this hair
The ordinary meaning that bright one of ordinary skill in the art are understood.
A kind of identity information checking method of present invention offer, device, medium and computing device.Below in conjunction with the accompanying drawings to this hair
Bright embodiment illustrates.
Referring to FIG. 1, a kind of flow chart of the identity information checking method provided it illustrates embodiment of the present invention,
The identity information checking method includes the following steps:
Step S101:The ID card information of target user is obtained, and obtains the biological information of the target user.
Wherein, the ID card information for obtaining target user can identify target user using identity card reader
The identity card of offer and the ID card information for obtaining target user.The biological information for obtaining the target user, can
To be the biological information for acquiring target user using physical characteristics collecting equipment, for example, face characteristic acquisition may be used
Device acquires the face characteristic information of target user, for another example, the finger print information of fingerprint capturer acquisition target user may be used;Deng
Deng.
The ID card information refers to the information that can be obtained according to resident identification card, for example, being occupied according to the Chinese second generation
People's identity card can obtain name, identification card number, gender, nationality, date of birth, address, issuing authority, term of validity and identity
The ID card informations such as license piece.In the embodiment of the present invention, above-mentioned all ID card informations can be obtained and carry out legitimacy inspection,
The part identity card information that can only obtain among the above carries out legitimacy inspection, with the legal of the identity card of test-target user
Property.
The biological information is the characteristic for referring to uniqueness characterization user's physiological characteristic, for example, fingerprint is special
Sign, face characteristic, iris feature and vocal print feature etc., the embodiment of the present invention can select a use, can also select a variety of biologies
Characteristic information carries out identity information veritification to target user jointly.
Step S102:Legitimacy inspection is carried out to the ID card information of the target user, obtain identity card checking as a result,
And legitimacy inspection is carried out to the biological information of the target user, it obtains biological characteristic and veritifies result.
Wherein, in an embodiment of the embodiment of the present invention, the ID card information to the target user into
The method that row legitimacy is examined, can specifically include:The identity of the target user described according to the ID card information
Card number, inquires the corresponding archive identity information of the identification card number from subscriber identity information database;
The ID card information of the target user is compared with the archive identity information, is judged according to comparison result
Whether the ID card information of the target user is legal.
The subscriber identity information database refers to achieving the database for having the identity information of user, is stored in the database
User identity information be properly termed as achieve identity information, the archive identity information may include the name of user, identity
The ID card informations such as card number, gender, nationality, date of birth, address, issuing authority, term of validity and identity card picture.Wherein,
The subscriber identity information database can be the database for being built and being safeguarded by enterprises and institutions, can also be to be recorded by the Ministry of Public Security
The citizenship information database for entering and safeguarding.
In an embodiment of the embodiment of the present invention, the biological information to the target user closes
Method is examined, and may include:
The identification card number of the target user described according to the ID card information, from user biological property data base
It is middle to inquire the corresponding archived biological characteristic information of the identification card number;
The biological information of the target user is compared with the archived biological characteristic information, is tied according to comparing
Fruit judges whether the biological information of the target user is legal.
Specifically, user biological property data base can be pre-established, and it is pre- in the user biological property data base
At least one biological information such as face characteristic, fingerprint characteristic, iris feature, vocal print feature of first typing user is deposited
Shelves, and established and indexed according to the identification card number of user, the biological information of archive can be denoted as archived biological characteristic information,
When needing to carry out identity information veritification to target user, you can transfer the target user from the user biological property data base
Archived biological characteristic information, and it is compared with the biological information of the target user acquired in real time, according to
Comparison result judges the legitimacy of the biological information of the target user of acquisition.
It should be noted that the embodiment of the present invention can be special only with face characteristic, fingerprint characteristic, iris feature, vocal print
A kind of biological information in sign carries out identity information veritification to target user, and what be may also be used in which is a variety of to target user
Identity information veritification is carried out, when being veritified using a variety of biological informations, can be believed previously according to various biological characteristics
Corresponding weight is arranged for it in the reliability of breath, correspondingly, the biological information by the target user is deposited with described
Shelves biological information is compared, and judges whether the biological information of the target user is legal according to comparison result, wraps
It includes:
Each biological information is compared with the archive identity information of corresponding type respectively, it is special to obtain each biology
The similarity of reference breath;
The Similarity-Weighted of each biological information is averaged, total similarity is obtained;
Whether meet preset legal threshold condition according to total similarity, judges the biological characteristic of the target user
Whether information is legal.
It is veritified by a variety of biological informations of synthesis, can compare error to avoid single creature characteristic information causes
Erroneous judgement, on the whole improve biological information veritify accuracy.
For example, it is changed in embodiment at one provided in an embodiment of the present invention, the biological information includes
The algorithm based on phase code may be used in the extraction of iris feature, the iris feature, since 2DLog-Gabor filters exist
Extracting iris texture phase property has good recognition performance, therefore, the phase based on 2D Log-Gabor filtering can be used
Encryption algorithm extracts iris feature, specifically, the iris image of photographic device acquisition target user is used first, then to iris
Image is pre-processed, and positioning, normalization, contrast enhancing and the noise shielding template generation of outer edge and eyelid are included
Deng when extracting phase information using 2DLog-Gabor filters, using the method for section technique and coding, pretreatment
Iris image is divided into the identical sub-block of m size afterwards, and the phase information of sub-block is extracted using filter template, each sub-block
Two binary coding representations of phase information, final to generate the iris feature code that size is 2m, which is
Iris feature.
It further, can be by between the iris feature in the calculating iris feature and archived biological characteristic information
Hamming distances carry out legitimate verification to the iris feature of acquisition, and the algorithm of corresponding Hamming distances is:
In formula, dHIndicate Hamming distances;A indicates that the iris feature of extraction, B indicate the iris in archived biological characteristic information
Feature;AMIndicate the noise shielding code of the iris feature of extraction, BMIndicate the noise of the iris feature in archived biological characteristic information
Mask off code;Indicate XOR operation;∩ is indicated and operation.
The value range of above-mentioned Hamming distances is [0.1,0.7], which can be mapped to similarity value model
After enclosing [100%, 0%], Hamming distances are scaled to the similarity of iris feature, then by the similarity of iris feature with it is default
Judgment threshold be compared, for example similarity is more than 90%, that is, judges that the iris feature is legal, and the biology of the iris feature is special
Sign veritifies result, and to may be used 1 expression legal, and 0 indicates illegal.
For another example, in another change embodiment provided in an embodiment of the present invention, the biological information includes people
Face feature;The biological information for obtaining the target user, including:
Obtain the facial image of target user;
Feature extraction is carried out to the facial image, obtains the face characteristic of the target user.
Wherein, feature extraction is carried out to the facial image, following method may be used:
The facial image detected is pre-processed first, to reach position correction, scale invariability and gray scale normalizing
The purpose of change.Then, Laplacianfaces is generated using training sample, concrete methods of realizing is:First use principal component analysis
(PCA) normalized image is mapped in the subspaces PCA, then uses LPP method dimensionality reductions, the mapping finally obtained in subspace
Matrix is represented by:
W=WPCAWLPP
Each column vector in mapping matrix W just constitutes Laplacianfaces, transforms into two dimensional form, by what is detected
It is projected on the subspace that facial image is turned into Laplacianfaces, using obtained coefficient vector as the facial image
Feature vector, that is, face characteristic.
It further, can be by between the face characteristic in the calculating face characteristic and archived biological characteristic information
Euclidean distance carries out legitimate verification to the face characteristic of acquisition, and the algorithm of corresponding Euclidean distance is:
In formula, dE(x, y) indicates that Euclidean distance, x indicate that the feature vector of the face of extraction, y indicate archived biological feature
The feature vector of face in information, k indicate the dimension of feature vector.
The value range of above-mentioned Euclidean distance is [100,1000], which can be mapped to similarity value model
After enclosing [100%, 0%], Euclidean distance is scaled to the similarity of face characteristic, then by the similarity of face characteristic with it is default
Judgment threshold be compared, for example similarity is more than 85%, that is, judges that the face characteristic is legal, and the biology of the face characteristic is special
Sign veritifies result, and to may be used 1 expression legal, and 0 indicates illegal.
It should be noted that being flat image similar to the photo on resident identification card, the nasal height in face can not be embodied
Even depth information, correspondingly, the faces characteristic such as nasal height can not be extracted according to flat image, and by the faces such as nasal height depth
Feature is spent, the accuracy of face alignment is can effectively improve, therefore, in one embodiment provided by the invention, the face
Image includes three-dimensional face images, and the face characteristic includes face depth characteristic;
The facial image for obtaining target user, including:
Obtain the three-dimensional face images of the target object shot using three-dimensional image pickup device.
By acquiring the three-dimensional face images of target user, and it is special to extract the face comprising face depth characteristic accordingly
Sign, can more accurately be compared with the face characteristic achieved in user biological property data base, obtain more accurately
Comparison result is veritified to obtain more accurately arriving biological characteristic as a result, the accuracy that raising identity information is veritified, specific side
Method can refer to the comparison or recognition methods of the three-dimensional face images provided in the prior art, and details are not described herein again.
It is easily understood that the foundation of user biological property data base and improving and needing very long time, used to target
When family carries out identity information veritification, in the user biological property data base may the not yet typing target user biological characteristic
The biological information of information or only typing Partial Species is without comprehensive, therefore, in one embodiment provided by the invention
In, it is inquired in the property data base from user biological after the corresponding archived biological characteristic information of the identification card number, also
Including:
If not finding the corresponding archived biological characteristic information of the identification card number, returns and indicate that the identification card number corresponds to
Prompt message of the biological information without archive, and the target user complete by other means identity information veritify
Afterwards, the biological information of the target user is uploaded in the user biological property data base and is achieved.
Wherein, other modes can be the mode manually veritified, and veritified but used using a variety of biological informations
In the case that archived biological characteristic information in the biological attribute data library of family is not complete, existing archived biological feature can also be used
Information is completed to veritify, for example, predetermined carry out core using three kinds of face characteristic, fingerprint characteristic and iris feature biological informations
It tests, but only has the fingerprint characteristic data achieved in user biological property data base for target user, lack face characteristic data
And fingerprint characteristic data passes through at this point it is possible to which the fingerprint characteristic data only with archive veritifies target user in veritification
Afterwards, then by the face characteristic data of the target user of acquisition and fingerprint characteristic data user biological property data base is uploaded to
Middle archive, in order to be called when identity information is veritified next time.
By the above embodiment, user biological property data base can more convenient, be efficiently improved, in order to follow-up
Identity information veritification is carried out to target user using more comprehensive biological information, improves the accurate of identity information veritification
Property.
Step S103:It is veritified according to the identity card checking result and the biological characteristic as a result, determining that the target is used
The identity at family veritifies result.
After obtaining identity card checking result and biological characteristic and veritifying result, you can according to the identity card checking result and
The biological characteristic veritifies result and determines that the identity of the target user is veritified as a result, specifically, can be by the identity card core
It tests result and the biological characteristic is veritified result and is normalized, be then compared with preset decision threshold condition, to
It is to pass through or do not pass through to determine that the identity of target user veritifies result;Or identity card checking result and biological characteristic are veritified
As a result be set separately corresponding qualification determination condition, only identity card checking result and biological characteristic veritify result it is qualified when,
Just judge that the identity of target user veritifies result to pass through, otherwise not pass through;Those skilled in the art can be main in the present invention
Under the enlightenment of purport, flexibly it is arranged in conjunction with the present embodiment and actual demand, it should all be within protection scope of the present invention.
More than, for a kind of embodiment explanation of identity information checking method provided by the invention, the embodiment of the present invention provides
Identity information checking method, ID card information and biological information to target user carry out legitimacy inspection respectively,
In, pass through the legitimacy inspection to ID card information, it is ensured that the legitimacy of the held identity card of user, and by biological special
The legitimate verification of reference breath, it is ensured that the consistency of target user and identity card, to be realized on the whole to target user
Identity comprehensively, is accurately veritified, and client is effectively avoided to use the possibility of other people identity cards or forged identity card transacting business.
In the above-described embodiment, a kind of identity information checking method is provided, it is corresponding, the present invention also provides
A kind of identity information veritification device.Referring to FIG. 2, it veritifies device by a kind of identity information that embodiment of the present invention provides
Schematic diagram.Since device embodiment is substantially similar to embodiment of the method, so describing fairly simple, related place is referring to side
The part of method embodiment illustrates.Device embodiment described below is only schematical.
As shown in Fig. 2, a kind of identity information provided in an embodiment of the present invention veritifies device 2, including:
ID card information acquisition module 21, the ID card information for obtaining target user;
Biological information acquisition module 22, the biological information for obtaining the target user;
ID card information veritifies module 23, carries out legitimacy inspection for the ID card information to the target user, obtains
To identity card checking result;
Biological characteristic veritifies module 24, carries out legitimacy inspection for the biological information to the target user, obtains
Result is veritified to biological characteristic;
Identity veritifies module 25, for being veritified according to the identity card checking result and the biological characteristic as a result, determining
The identity of the target user veritifies result.
In a change embodiment of the embodiment of the present invention, the ID card information veritifies module 23, including:
Identity information query unit is achieved, the identity for the target user described according to the ID card information
Card number, inquires the corresponding archive identity information of the identification card number from subscriber identity information database;
ID card information comparing unit, for by the ID card information of the target user and the archive identity information into
Row compares, and judges whether the ID card information of the target user is legal according to comparison result.
The embodiment of the present invention another change embodiment in, the ID card information include name, identification card number,
Gender, nationality, date of birth, address, issuing authority, term of validity and identity card picture.
In a change embodiment of the embodiment of the present invention, the biological information includes:Face characteristic, fingerprint
At least one of feature, iris feature or vocal print feature.
In another change embodiment of the embodiment of the present invention, the biological characteristic veritifies module 24, including:
Archived biological characteristic information query unit, for the target user's described according to the ID card information
Identification card number inquires the corresponding archived biological characteristic information of the identification card number from user biological property data base;
Biological information comparing unit, for the biological information of the target user and the archived biological is special
Reference breath is compared, and judges whether the biological information of the target user is legal according to comparison result.
In another change embodiment of the embodiment of the present invention, the biological information includes face characteristic, refers to
It is a variety of in line feature, iris feature and vocal print feature;
The biological information comparing unit, including:
Point type comparison subunit, for by each biological information respectively with the archive identity information of corresponding type
It is compared, obtains the similarity of each biological information;
Weighted average subelement obtains total similarity for the Similarity-Weighted of each biological information to be averaged;
Threshold value comparison subelement judges institute for whether meeting preset legal threshold condition according to total similarity
Whether the biological information for stating target user is legal.
In another change embodiment of the embodiment of the present invention, the biological characteristic veritifies module 24, further includes:
Without archive information processing unit, if for not finding the corresponding archived biological characteristic information of the identification card number,
It returns and indicates corresponding prompt message of the biological information without archive of the identification card number, and pass through it in the target user
After his mode completes identity information veritification, the biological information of the target user is uploaded to the user biological characteristic
According to being achieved in library.
In another change embodiment of the embodiment of the present invention, the biological information includes face characteristic;Institute
Biological information acquisition module 22 is stated, including:
Facial image acquiring unit, the facial image for obtaining target user;
Face characteristic extraction unit obtains the people of the target user for carrying out feature extraction to the facial image
Face feature.
In another change embodiment of the embodiment of the present invention, the facial image includes three-dimensional face images, institute
It includes face depth characteristic to state face characteristic;
The facial image acquiring unit, including:
Three-dimensional image acquisition subelement, the three-dimensional people for obtaining the target object for using three-dimensional image pickup device to shoot
Face image.
Identity information provided in an embodiment of the present invention veritifies device, the identity information core provided with present invention
Proved recipe method is for identical inventive concept, advantageous effect having the same.
Fig. 3 is a kind of schematic diagram of computer readable storage medium provided in an embodiment of the present invention.As shown in figure 3, described
Computer program is stored in computer readable storage medium 3, the computer program may be implemented when being run by processor
The identity information checking method provided by the invention.
Wherein, the computer readable storage medium 3 includes permanent and non-permanent, removable and non-removable media
It can be accomplished by any method or technique information storage.Information can be computer-readable instruction, data structure, program mould
Block or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static random-access is deposited
Reservoir (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), fast flash memory bank or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or
Other magnetic storage apparatus or any other non-transmission medium can be used for storage and can be accessed by a computing device information.
Computer readable storage medium provided in an embodiment of the present invention is veritified with identity information provided in an embodiment of the present invention
Method is for identical inventive concept, advantageous effect having the same.
Fig. 4 is a kind of schematic diagram of computing device provided in an embodiment of the present invention.As shown in figure 4, the computing device 4 wraps
It includes:Processor 40, memory 41, bus 42 and communication interface 43, the processor 40, communication interface 43 and memory 41 pass through
Bus 42 connects;The computer program that can be run on the processor 40, the processor are stored in the memory 41
Identity information checking method provided by the invention is executed when the 40 operation computer program.
Wherein, memory 41 may include high-speed random access memory (RAM:Random Access Memory),
May further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.By extremely
A few communication interface 43 (can be wired or wireless) is realized logical between the system network element and at least one other network element
Letter connection can use internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 42 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data
Bus, controlling bus etc..Wherein, memory 41 is for storing program, and the processor 40 executes after receiving and executing instruction
Described program, the identity information checking method that aforementioned any embodiment of the embodiment of the present invention discloses can be applied to handle
In device 40, or realized by processor 40.
Processor 40 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side
Each step of method can be completed by the integrated logic circuit of the hardware in processor 40 or the instruction of software form.Above-mentioned
Processor 40 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network
Processor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (DSP), application-specific integrated circuit
(ASIC), ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
The step of memory 41, processor 40 reads the information in memory 41, the above method is completed in conjunction with its hardware.
Computing device provided in an embodiment of the present invention is with identity information checking method provided in an embodiment of the present invention for phase
Same inventive concept, advantageous effect having the same.
It should be noted that the flow chart and block diagram in attached drawing show multiple embodiments according to the present invention system,
The architecture, function and operation in the cards of method and computer program product.In this regard, in flowchart or block diagram
Each box can represent a part for a module, section or code, the part packet of the module, section or code
Containing one or more executable instructions for implementing the specified logical function.It should also be noted that at some as the reality replaced
In existing, the function of being marked in box can also occur in a different order than that indicated in the drawings.For example, two continuous sides
Frame can essentially be basically executed in parallel, they can also be executed in the opposite order sometimes, this according to involved function and
It is fixed.It is also noted that the group of each box in block diagram and or flow chart and the box in block diagram and or flow chart
It closes, the dedicated hardware based system of function or action as defined in execution is realized, or can use specialized hardware
Combination with computer instruction is realized.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of division of logic function, formula that in actual implementation, there may be another division manner, in another example, multiple units or component can combine
Or it is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed phase
Coupling, direct-coupling or communication connection between mutually can be by some communication interfaces, the INDIRECT COUPLING of device or unit or
Communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to
So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into
Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme should all cover in the claim of the present invention and the range of specification.
Claims (10)
1. a kind of identity information checking method, which is characterized in that including:
The ID card information of target user is obtained, and obtains the biological information of the target user;
Legitimacy inspection is carried out to the ID card information of the target user, obtains identity card checking as a result, and to the mesh
The biological information for marking user carries out legitimacy inspection, obtains biological characteristic and veritifies result;
It is veritified according to the identity card checking result and the biological characteristic as a result, determining that the identity of the target user veritifies knot
Fruit.
2. identity information checking method according to claim 1, which is characterized in that the identity to the target user
It demonstrate,proves information and carries out legitimacy inspection, including:
The identification card number of the target user described according to the ID card information, is looked into from subscriber identity information database
Ask the corresponding archive identity information of the identification card number;
The ID card information of the target user is compared with the archive identity information, judged according to comparison result described in
Whether the ID card information of target user is legal.
3. identity information checking method according to claim 2, which is characterized in that the ID card information include name,
Identification card number, gender, nationality, date of birth, address, issuing authority, term of validity and identity card picture.
4. identity information checking method according to claim 1, which is characterized in that the biological information includes:People
At least one of face feature, fingerprint characteristic, iris feature or vocal print feature.
5. identity information checking method according to claim 1, which is characterized in that the biology to the target user
Characteristic information carries out legitimacy inspection, including:
The identification card number of the target user described according to the ID card information, is looked into from user biological property data base
Ask the corresponding archived biological characteristic information of the identification card number;
The biological information of the target user is compared with the archived biological characteristic information, is sentenced according to comparison result
Whether the biological information of the disconnected target user is legal.
6. identity information checking method according to claim 5, which is characterized in that the biological information includes face
It is a variety of in feature, fingerprint characteristic, iris feature and vocal print feature;
The biological information by the target user is compared with the archived biological characteristic information, is tied according to comparing
Fruit judges whether the biological information of the target user is legal, including:
Each biological information is compared with the archive identity information of corresponding type respectively, obtains each biological characteristic letter
The similarity of breath;
The Similarity-Weighted of each biological information is averaged, total similarity is obtained;
Whether meet preset legal threshold condition according to total similarity, judges the biological information of the target user
It is whether legal.
7. identity information checking method according to claim 5, which is characterized in that described from user biological characteristic
It is inquired in library after the corresponding archived biological characteristic information of the identification card number, further includes:
If not finding the corresponding archived biological characteristic information of the identification card number, returns and indicate the corresponding life of the identification card number
Prompt message of the object characteristic information without archive, and after the target user completes identity information veritification by other means, it will
The biological information of the target user is uploaded in the user biological property data base and achieves.
8. a kind of identity information veritifies device, which is characterized in that including:
ID card information acquisition module, the ID card information for obtaining target user;
Biological information acquisition module, the biological information for obtaining the target user;
ID card information veritifies module, carries out legitimacy inspection for the ID card information to the target user, obtains identity
Card veritifies result;
Biological characteristic veritifies module, carries out legitimacy inspection for the biological information to the target user, obtains biology
Feature veritifies result;
Identity veritifies module, for being veritified according to the identity card checking result and the biological characteristic as a result, determining the mesh
The identity for marking user veritifies result.
9. a kind of computer readable storage medium, computer program, feature are stored in the computer readable storage medium
It is, computer program perform claim when being run by processor requires 1-7 any one of them identity informations veritification side
Method.
10. a kind of computing device, including:It memory, processor and is stored on the memory and can be on the processor
The computer program of operation, which is characterized in that perform claim requires 1-7 any when the processor runs the computer program
Identity information checking method described in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711252486.8A CN108288080A (en) | 2017-12-01 | 2017-12-01 | Identity information checking method, device, medium and computing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711252486.8A CN108288080A (en) | 2017-12-01 | 2017-12-01 | Identity information checking method, device, medium and computing device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108288080A true CN108288080A (en) | 2018-07-17 |
Family
ID=62831730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711252486.8A Pending CN108288080A (en) | 2017-12-01 | 2017-12-01 | Identity information checking method, device, medium and computing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108288080A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109509476A (en) * | 2018-08-08 | 2019-03-22 | 广州势必可赢网络科技有限公司 | A kind of method and system identifying suspect |
CN109508705A (en) * | 2018-12-29 | 2019-03-22 | 河北三川科技有限公司 | The dynamic threshold face alignment setting method of identity-based card validity period |
CN109598251A (en) * | 2018-12-11 | 2019-04-09 | 北京旷视科技有限公司 | Testimony of a witness checking method, device, equipment and system and storage medium |
CN109670394A (en) * | 2018-10-25 | 2019-04-23 | 平安科技(深圳)有限公司 | A kind of video conference based on biological characteristic similarity is registered method and relevant device |
CN110175624A (en) * | 2019-04-11 | 2019-08-27 | 阿里巴巴集团控股有限公司 | Project access checking method and device |
CN111523569A (en) * | 2018-09-04 | 2020-08-11 | 阿里巴巴集团控股有限公司 | User identity determination method and device and electronic equipment |
CN111639956A (en) * | 2018-11-16 | 2020-09-08 | 阿里巴巴集团控股有限公司 | Method and device for providing and acquiring security identity information |
CN112184183A (en) * | 2020-10-26 | 2021-01-05 | 财拓云计算(上海)有限公司 | Self-service certificate returning method and device and electronic equipment |
CN112288385A (en) * | 2020-09-28 | 2021-01-29 | 珠海大横琴科技发展有限公司 | Electronic certificate processing method and device |
CN113592626A (en) * | 2021-07-29 | 2021-11-02 | 中国工商银行股份有限公司 | Method and device for checking application information of anti-fraud credit card |
WO2022126964A1 (en) * | 2020-12-15 | 2022-06-23 | 平安科技(深圳)有限公司 | Service data verification method and apparatus, device and storage medium |
CN117113199A (en) * | 2023-10-23 | 2023-11-24 | 浙江星汉信息技术股份有限公司 | File security management system and method based on artificial intelligence |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553947A (en) * | 2015-12-08 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Methods and devices for finding account back, protecting account security and preventing account theft |
CN106407646A (en) * | 2016-08-25 | 2017-02-15 | 长沙华宇信息科技有限公司 | Physical examination systems, and communication method and device for physical examination systems |
CN106503519A (en) * | 2016-10-14 | 2017-03-15 | 国政通科技股份有限公司 | A kind of method of identification check |
-
2017
- 2017-12-01 CN CN201711252486.8A patent/CN108288080A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553947A (en) * | 2015-12-08 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Methods and devices for finding account back, protecting account security and preventing account theft |
CN106407646A (en) * | 2016-08-25 | 2017-02-15 | 长沙华宇信息科技有限公司 | Physical examination systems, and communication method and device for physical examination systems |
CN106503519A (en) * | 2016-10-14 | 2017-03-15 | 国政通科技股份有限公司 | A kind of method of identification check |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109509476A (en) * | 2018-08-08 | 2019-03-22 | 广州势必可赢网络科技有限公司 | A kind of method and system identifying suspect |
CN109509476B (en) * | 2018-08-08 | 2022-03-15 | 广州势必可赢网络科技有限公司 | Method and system for identifying criminal suspects |
CN111523569B (en) * | 2018-09-04 | 2023-08-04 | 创新先进技术有限公司 | User identity determination method and device and electronic equipment |
CN111523569A (en) * | 2018-09-04 | 2020-08-11 | 阿里巴巴集团控股有限公司 | User identity determination method and device and electronic equipment |
CN109670394A (en) * | 2018-10-25 | 2019-04-23 | 平安科技(深圳)有限公司 | A kind of video conference based on biological characteristic similarity is registered method and relevant device |
CN109670394B (en) * | 2018-10-25 | 2024-03-01 | 平安科技(深圳)有限公司 | Video conference sign-in method based on biological feature similarity and related equipment |
CN111639956A (en) * | 2018-11-16 | 2020-09-08 | 阿里巴巴集团控股有限公司 | Method and device for providing and acquiring security identity information |
CN111639956B (en) * | 2018-11-16 | 2023-04-28 | 创新先进技术有限公司 | Method and device for providing and acquiring safety identity information |
CN109598251A (en) * | 2018-12-11 | 2019-04-09 | 北京旷视科技有限公司 | Testimony of a witness checking method, device, equipment and system and storage medium |
CN109508705B (en) * | 2018-12-29 | 2020-09-08 | 河北三川科技有限公司 | Dynamic threshold face comparison setting method based on validity period of identity card |
CN109508705A (en) * | 2018-12-29 | 2019-03-22 | 河北三川科技有限公司 | The dynamic threshold face alignment setting method of identity-based card validity period |
CN110175624A (en) * | 2019-04-11 | 2019-08-27 | 阿里巴巴集团控股有限公司 | Project access checking method and device |
CN110175624B (en) * | 2019-04-11 | 2023-01-10 | 创新先进技术有限公司 | Project admission auditing method and device |
CN112288385A (en) * | 2020-09-28 | 2021-01-29 | 珠海大横琴科技发展有限公司 | Electronic certificate processing method and device |
CN112184183A (en) * | 2020-10-26 | 2021-01-05 | 财拓云计算(上海)有限公司 | Self-service certificate returning method and device and electronic equipment |
WO2022126964A1 (en) * | 2020-12-15 | 2022-06-23 | 平安科技(深圳)有限公司 | Service data verification method and apparatus, device and storage medium |
CN113592626A (en) * | 2021-07-29 | 2021-11-02 | 中国工商银行股份有限公司 | Method and device for checking application information of anti-fraud credit card |
CN117113199A (en) * | 2023-10-23 | 2023-11-24 | 浙江星汉信息技术股份有限公司 | File security management system and method based on artificial intelligence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108288080A (en) | Identity information checking method, device, medium and computing device | |
US20210124919A1 (en) | System and Methods for Authentication of Documents | |
US10650379B2 (en) | Method and system for validating personalized account identifiers using biometric authentication and self-learning algorithms | |
US20180189561A1 (en) | Identity document validation using biometric image data | |
CN109472918A (en) | Invoice validation method, financing checking method, device, equipment and medium | |
US10403076B2 (en) | Method for securing and verifying a document | |
CN108922074A (en) | Without card withdrawal method, apparatus, computer equipment and storage medium | |
CN104036254A (en) | Face recognition method | |
CN107977559A (en) | A kind of identity identifying method, device, equipment and computer-readable recording medium | |
CN109376717A (en) | Personal identification method, device, electronic equipment and the storage medium of face comparison | |
Wandzik et al. | CNNs under attack: on the vulnerability of deep neural networks based face recognition to image morphing | |
US11875259B1 (en) | Generative system and method for enhancing readability of barcodes using frequency guided computer vision | |
CN105335630B (en) | Personal identification method and identity recognition device | |
US10504117B2 (en) | Methods, systems, and articles of manufacture for fingerprinting signatures and enhanced signature capturing for charge card transactions on mobile communication devices | |
CN110490149A (en) | A kind of face identification method and device based on svm classifier | |
US20190087824A1 (en) | System and method for mitigating effects of identity theft | |
Shenoy et al. | Online digital cheque signature verification using deep learning approach | |
CN113283359A (en) | Authentication method and system for handheld certificate photo and electronic equipment | |
Beukes | Hand vein-based biometric authentication with limited training samples | |
Markham et al. | Open-Set: ID Card Presentation Attack Detection Using Neural Style Transfer | |
Mohammad | Multi-Modal Ocular Recognition in Presence of Occlusion in Mobile Devices | |
Hanušniak | Impact of digitization of banking services on international exporters. | |
US20240348603A1 (en) | Method and apparatus for creating encoded data and use of same for identity verification | |
Rao | Multi-Modal Biometric Age Prediction Through Deep Learning Framework | |
US20240346852A1 (en) | Method and apparatus for creating encoded data and use of same for identity verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180717 |
|
RJ01 | Rejection of invention patent application after publication |