CN108288080A - Identity information checking method, device, medium and computing device - Google Patents

Identity information checking method, device, medium and computing device Download PDF

Info

Publication number
CN108288080A
CN108288080A CN201711252486.8A CN201711252486A CN108288080A CN 108288080 A CN108288080 A CN 108288080A CN 201711252486 A CN201711252486 A CN 201711252486A CN 108288080 A CN108288080 A CN 108288080A
Authority
CN
China
Prior art keywords
information
identity
target user
biological
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711252486.8A
Other languages
Chinese (zh)
Inventor
汪陆生
高红梅
李莉莉
孙立宏
陈放
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guozhengtong Polytron Technologies Inc
Original Assignee
Guozhengtong Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guozhengtong Polytron Technologies Inc filed Critical Guozhengtong Polytron Technologies Inc
Priority to CN201711252486.8A priority Critical patent/CN108288080A/en
Publication of CN108288080A publication Critical patent/CN108288080A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A kind of identity information checking method of present invention offer, device, medium and computing device.Wherein, the method includes:The ID card information of target user is obtained, and obtains the biological information of the target user;Legitimacy inspection is carried out to the ID card information of the target user, obtain identity card checking as a result, and legitimacy inspection is carried out to the biological information of the target user, obtain biological characteristic and veritify result;It is veritified according to the identity card checking result and the biological characteristic as a result, determining that the identity of the target user veritifies result.The present invention, pass through the legitimacy inspection to ID card information, it can ensure the legitimacy of the held identity card of user, and pass through the legitimate verification to biological information, it can ensure the consistency of target user and identity card, target user's identity comprehensively, is accurately veritified to realizing on the whole, client is effectively avoided to use the possibility of other people identity cards or forged identity card transacting business.

Description

Identity information checking method, device, medium and computing device
Technical field
The present invention relates to field of information security technology, and in particular to a kind of identity information checking method, device, medium and meter Calculate equipment.
Background technology
Identity veritifies also known as " verification ", " authentication ", refers to completing the confirmation to user identity by certain means.Body The purpose of part verification is to confirm the user currently claimed as certain identity, the user strictly claimed.In daily life, Identity veritification is not uncommon for;For example, bank etc. needs the client of transacting business to carry out identity veritification, in this way, on the one hand can be with Criminal is defrauded of and opens the huge deterrence of assumed name account generation and prevention effect, is on the other hand advantageously reduced because of account vacation Economic dispute caused by name or anonymity, containment financial fraud protect the public especially for the financial swindling of ordinary people Fund security and banking institution legitimate rights and interests, safeguard the fundamental interests of the public conscientiously.
Existing identity is veritified, and mainly relying on the People's Bank can be the same as the online checking citizenship information that the Ministry of Public Security builds up System (abbreviation network verification system), the basic skills of online checking are:Banking institution is when for client's transacting business, to networking Checking system submits the name and ID card No. of the client, citizenship Information Number of the network verification system in Ministry of Public Security's typing According to above-mentioned two item data is inquired in library, if there is name and ID card No. phase with the client in citizenship information database Consistent citizen's information then feeds back the identity card picture for checking consistent prompt and the client;When citizenship number exists But in the absence of name mismatch or citizenship number, system is prompted accordingly.
As described above, existing identification check technology, the identity information of identity card and the Ministry of Public Security primarily directed to user It is verified;And for the consistency of identity card and user, mainly by staff according to the photo or connection on identity card The photo of net checking system feedback is by visually being screened, since the update cycle of identity card is longer, and with age, The appearance of people can change therewith, in addition, by make up, the factors such as accessories, hair style are influenced, staff often can not accurately sentence Whether the photo and user on disconnected identity card are consistent, this uses other people identity cards or forged identity card transacting business for client Situation can not accomplish effectively to screen.
To sum up, existing identity, which veritifies technology, can not effectively screen the authenticity of user identity.
Invention content
In view of the above problems, the purpose of the present invention is pass through a kind of identity information checking method of offer, device, medium and meter Equipment is calculated, the authenticity of user identity can not be effectively screened to solve current identity veritification technology, improve identity information core The accuracy tested.
First aspect present invention provides a kind of identity information checking method, including:
The ID card information of target user is obtained, and obtains the biological information of the target user;
Legitimacy inspection is carried out to the ID card information of the target user, obtains identity card checking as a result, and to institute The biological information for stating target user carries out legitimacy inspection, obtains biological characteristic and veritifies result;
It is veritified according to the identity card checking result and the biological characteristic as a result, determining the identity core of the target user Test result.
In one of first aspect present invention change embodiment, the ID card information to the target user into Row legitimacy is examined, including:
The identification card number of the target user described according to the ID card information, from subscriber identity information database It is middle to inquire the corresponding archive identity information of the identification card number;
The ID card information of the target user is compared with the archive identity information, is judged according to comparison result Whether the ID card information of the target user is legal.
In another change embodiment of first aspect present invention, the ID card information includes name, identity card Number, gender, nationality, the date of birth, address, issuing authority, term of validity and identity card picture.
In another change embodiment of first aspect present invention, the biological characteristic to the target user is believed Breath carries out legitimacy inspection, including:
The identification card number of the target user described according to the ID card information, from user biological property data base It is middle to inquire the corresponding archived biological characteristic information of the identification card number;
The biological information of the target user is compared with the archived biological characteristic information, is tied according to comparing Fruit judges whether the biological information of the target user is legal.
In another change embodiment of first aspect present invention, the biological information includes:Face characteristic, At least one of fingerprint characteristic, iris feature or vocal print feature.
First aspect present invention another change embodiment in, the biological information include face characteristic, It is a variety of in fingerprint characteristic, iris feature and vocal print feature;
The biological information by the target user is compared with the archived biological characteristic information, according to than Whether the biological information of the target user is legal to be judged to result, including:
Each biological information is compared with the archive identity information of corresponding type respectively, it is special to obtain each biology The similarity of reference breath;
The Similarity-Weighted of each biological information is averaged, total similarity is obtained;
Whether meet preset legal threshold condition according to total similarity, judges the biological characteristic of the target user Whether information is legal.
In another change embodiment of first aspect present invention, the biological information includes face characteristic; The biological information for obtaining the target user, including:
Obtain the facial image of target user;
Feature extraction is carried out to the facial image, obtains the face characteristic of the target user.
In another change embodiment of first aspect present invention, the facial image includes three-dimensional face images, The face characteristic includes face depth characteristic;
The facial image for obtaining target user, including:
Obtain the three-dimensional face images of the target object shot using three-dimensional image pickup device.
In another change embodiment of first aspect present invention, looked into the property data base from user biological After asking the corresponding archived biological characteristic information of the identification card number, further include:
If not finding the corresponding archived biological characteristic information of the identification card number, returns and indicate that the identification card number corresponds to Prompt message of the biological information without archive, and the target user complete by other means identity information veritify Afterwards, the biological information of the target user is uploaded in the user biological property data base and is achieved.
Second aspect of the present invention provides a kind of identity information veritification device, including:
ID card information acquisition module, the ID card information for obtaining target user;
Biological information acquisition module, the biological information for obtaining the target user;
ID card information veritifies module, carries out legitimacy inspection for the ID card information to the target user, obtains Identity card checking result;
Biological characteristic veritifies module, carries out legitimacy inspection for the biological information to the target user, obtains Biological characteristic veritifies result;
Identity veritifies module, for being veritified according to the identity card checking result and the biological characteristic as a result, determining institute The identity for stating target user veritifies result.
In a change embodiment of second aspect of the present invention, the ID card information veritifies module, including:
Identity information query unit is achieved, the identity for the target user described according to the ID card information Card number, inquires the corresponding archive identity information of the identification card number from subscriber identity information database;
ID card information comparing unit, for by the ID card information of the target user and the archive identity information into Row compares, and judges whether the ID card information of the target user is legal according to comparison result.
In another change embodiment of second aspect of the present invention, the ID card information includes name, identity card Number, gender, nationality, the date of birth, address, issuing authority, term of validity and identity card picture.
In a change embodiment of second aspect of the present invention, the biological information includes:Face characteristic refers to At least one of line feature, iris feature or vocal print feature.
In another change embodiment of second aspect of the present invention, the biological characteristic veritifies module, including:
Archived biological characteristic information query unit, for the target user's described according to the ID card information Identification card number inquires the corresponding archived biological characteristic information of the identification card number from user biological property data base;
Biological information comparing unit, for the biological information of the target user and the archived biological is special Reference breath is compared, and judges whether the biological information of the target user is legal according to comparison result.
Second aspect of the present invention another change embodiment in, the biological information include face characteristic, It is a variety of in fingerprint characteristic, iris feature and vocal print feature;
The biological information comparing unit, including:
Point type comparison subunit, for by each biological information respectively with the archive identity information of corresponding type It is compared, obtains the similarity of each biological information;
Weighted average subelement obtains total similarity for the Similarity-Weighted of each biological information to be averaged;
Threshold value comparison subelement judges institute for whether meeting preset legal threshold condition according to total similarity Whether the biological information for stating target user is legal.
In another change embodiment of second aspect of the present invention, the biological characteristic veritifies module, further includes:
Without archive information processing unit, if for not finding the corresponding archived biological characteristic information of the identification card number, It returns and indicates corresponding prompt message of the biological information without archive of the identification card number, and pass through it in the target user After his mode completes identity information veritification, the biological information of the target user is uploaded to the user biological characteristic According to being achieved in library.
In another change embodiment of second aspect of the present invention, the biological information includes face characteristic; The biological information acquisition module, including:
Facial image acquiring unit, the facial image for obtaining target user;
Face characteristic extraction unit obtains the people of the target user for carrying out feature extraction to the facial image Face feature.
In another change embodiment of second aspect of the present invention, the facial image includes three-dimensional face images, The face characteristic includes face depth characteristic;
The facial image acquiring unit, including:
Three-dimensional image acquisition subelement, the three-dimensional people for obtaining the target object for using three-dimensional image pickup device to shoot Face image.
Third aspect present invention provides a kind of computer readable storage medium, is stored in the computer readable storage medium There are computer program, the computer program to execute identity information checking method provided by the invention when being run by processor.
Fourth aspect present invention provides a kind of computing device, including:It memory, processor and is stored on the memory And the computer program that can be run on the processor, the present invention is executed when the processor runs the computer program to be carried The identity information checking method of confession.
The identity information checking method that first aspect present invention provides, to the ID card information and biological characteristic of target user Information carries out legitimacy inspection respectively, wherein passes through the legitimacy inspection to ID card information, it is ensured that the held identity of user The legitimacy of card, and pass through the legitimate verification to biological information, it is ensured that the consistency of target user and identity card, Target user's identity comprehensively, is accurately veritified to realizing on the whole, client is effectively avoided to use other people identity cards or puppet Make the possibility of identity card transacting business.
The computer readable storage medium that the identity information that second aspect of the present invention provides veritifies device, the third aspect provides The computing device provided with fourth aspect, the identity information checking method provided with above-mentioned first aspect is for identical invention structure Think, advantageous effect having the same.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are common for this field Technical staff will become clear.Attached drawing only for the purpose of illustrating preferred embodiments, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of flow chart for identity information checking method that embodiment of the present invention is provided;
Fig. 2 shows the schematic diagrames that a kind of identity information that embodiment of the present invention is provided veritifies device;
Fig. 3 shows a kind of schematic diagram for computer readable storage medium that embodiment of the present invention is provided;
Fig. 4 shows a kind of schematic diagram for computing device that embodiment of the present invention is provided.
Specific implementation mode
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing this public affairs in attached drawing The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure without the reality that should be illustrated here The mode of applying is limited.It is to be able to be best understood from the disclosure on the contrary, providing these embodiments, and can be by this public affairs The range opened completely is communicated to those skilled in the art.
It should be noted that unless otherwise indicated, the technical term or scientific terminology that the present invention uses should be this hair The ordinary meaning that bright one of ordinary skill in the art are understood.
A kind of identity information checking method of present invention offer, device, medium and computing device.Below in conjunction with the accompanying drawings to this hair Bright embodiment illustrates.
Referring to FIG. 1, a kind of flow chart of the identity information checking method provided it illustrates embodiment of the present invention, The identity information checking method includes the following steps:
Step S101:The ID card information of target user is obtained, and obtains the biological information of the target user.
Wherein, the ID card information for obtaining target user can identify target user using identity card reader The identity card of offer and the ID card information for obtaining target user.The biological information for obtaining the target user, can To be the biological information for acquiring target user using physical characteristics collecting equipment, for example, face characteristic acquisition may be used Device acquires the face characteristic information of target user, for another example, the finger print information of fingerprint capturer acquisition target user may be used;Deng Deng.
The ID card information refers to the information that can be obtained according to resident identification card, for example, being occupied according to the Chinese second generation People's identity card can obtain name, identification card number, gender, nationality, date of birth, address, issuing authority, term of validity and identity The ID card informations such as license piece.In the embodiment of the present invention, above-mentioned all ID card informations can be obtained and carry out legitimacy inspection, The part identity card information that can only obtain among the above carries out legitimacy inspection, with the legal of the identity card of test-target user Property.
The biological information is the characteristic for referring to uniqueness characterization user's physiological characteristic, for example, fingerprint is special Sign, face characteristic, iris feature and vocal print feature etc., the embodiment of the present invention can select a use, can also select a variety of biologies Characteristic information carries out identity information veritification to target user jointly.
Step S102:Legitimacy inspection is carried out to the ID card information of the target user, obtain identity card checking as a result, And legitimacy inspection is carried out to the biological information of the target user, it obtains biological characteristic and veritifies result.
Wherein, in an embodiment of the embodiment of the present invention, the ID card information to the target user into The method that row legitimacy is examined, can specifically include:The identity of the target user described according to the ID card information Card number, inquires the corresponding archive identity information of the identification card number from subscriber identity information database;
The ID card information of the target user is compared with the archive identity information, is judged according to comparison result Whether the ID card information of the target user is legal.
The subscriber identity information database refers to achieving the database for having the identity information of user, is stored in the database User identity information be properly termed as achieve identity information, the archive identity information may include the name of user, identity The ID card informations such as card number, gender, nationality, date of birth, address, issuing authority, term of validity and identity card picture.Wherein, The subscriber identity information database can be the database for being built and being safeguarded by enterprises and institutions, can also be to be recorded by the Ministry of Public Security The citizenship information database for entering and safeguarding.
In an embodiment of the embodiment of the present invention, the biological information to the target user closes Method is examined, and may include:
The identification card number of the target user described according to the ID card information, from user biological property data base It is middle to inquire the corresponding archived biological characteristic information of the identification card number;
The biological information of the target user is compared with the archived biological characteristic information, is tied according to comparing Fruit judges whether the biological information of the target user is legal.
Specifically, user biological property data base can be pre-established, and it is pre- in the user biological property data base At least one biological information such as face characteristic, fingerprint characteristic, iris feature, vocal print feature of first typing user is deposited Shelves, and established and indexed according to the identification card number of user, the biological information of archive can be denoted as archived biological characteristic information, When needing to carry out identity information veritification to target user, you can transfer the target user from the user biological property data base Archived biological characteristic information, and it is compared with the biological information of the target user acquired in real time, according to Comparison result judges the legitimacy of the biological information of the target user of acquisition.
It should be noted that the embodiment of the present invention can be special only with face characteristic, fingerprint characteristic, iris feature, vocal print A kind of biological information in sign carries out identity information veritification to target user, and what be may also be used in which is a variety of to target user Identity information veritification is carried out, when being veritified using a variety of biological informations, can be believed previously according to various biological characteristics Corresponding weight is arranged for it in the reliability of breath, correspondingly, the biological information by the target user is deposited with described Shelves biological information is compared, and judges whether the biological information of the target user is legal according to comparison result, wraps It includes:
Each biological information is compared with the archive identity information of corresponding type respectively, it is special to obtain each biology The similarity of reference breath;
The Similarity-Weighted of each biological information is averaged, total similarity is obtained;
Whether meet preset legal threshold condition according to total similarity, judges the biological characteristic of the target user Whether information is legal.
It is veritified by a variety of biological informations of synthesis, can compare error to avoid single creature characteristic information causes Erroneous judgement, on the whole improve biological information veritify accuracy.
For example, it is changed in embodiment at one provided in an embodiment of the present invention, the biological information includes The algorithm based on phase code may be used in the extraction of iris feature, the iris feature, since 2DLog-Gabor filters exist Extracting iris texture phase property has good recognition performance, therefore, the phase based on 2D Log-Gabor filtering can be used Encryption algorithm extracts iris feature, specifically, the iris image of photographic device acquisition target user is used first, then to iris Image is pre-processed, and positioning, normalization, contrast enhancing and the noise shielding template generation of outer edge and eyelid are included Deng when extracting phase information using 2DLog-Gabor filters, using the method for section technique and coding, pretreatment Iris image is divided into the identical sub-block of m size afterwards, and the phase information of sub-block is extracted using filter template, each sub-block Two binary coding representations of phase information, final to generate the iris feature code that size is 2m, which is Iris feature.
It further, can be by between the iris feature in the calculating iris feature and archived biological characteristic information Hamming distances carry out legitimate verification to the iris feature of acquisition, and the algorithm of corresponding Hamming distances is:
In formula, dHIndicate Hamming distances;A indicates that the iris feature of extraction, B indicate the iris in archived biological characteristic information Feature;AMIndicate the noise shielding code of the iris feature of extraction, BMIndicate the noise of the iris feature in archived biological characteristic information Mask off code;Indicate XOR operation;∩ is indicated and operation.
The value range of above-mentioned Hamming distances is [0.1,0.7], which can be mapped to similarity value model After enclosing [100%, 0%], Hamming distances are scaled to the similarity of iris feature, then by the similarity of iris feature with it is default Judgment threshold be compared, for example similarity is more than 90%, that is, judges that the iris feature is legal, and the biology of the iris feature is special Sign veritifies result, and to may be used 1 expression legal, and 0 indicates illegal.
For another example, in another change embodiment provided in an embodiment of the present invention, the biological information includes people Face feature;The biological information for obtaining the target user, including:
Obtain the facial image of target user;
Feature extraction is carried out to the facial image, obtains the face characteristic of the target user.
Wherein, feature extraction is carried out to the facial image, following method may be used:
The facial image detected is pre-processed first, to reach position correction, scale invariability and gray scale normalizing The purpose of change.Then, Laplacianfaces is generated using training sample, concrete methods of realizing is:First use principal component analysis (PCA) normalized image is mapped in the subspaces PCA, then uses LPP method dimensionality reductions, the mapping finally obtained in subspace Matrix is represented by:
W=WPCAWLPP
Each column vector in mapping matrix W just constitutes Laplacianfaces, transforms into two dimensional form, by what is detected It is projected on the subspace that facial image is turned into Laplacianfaces, using obtained coefficient vector as the facial image Feature vector, that is, face characteristic.
It further, can be by between the face characteristic in the calculating face characteristic and archived biological characteristic information Euclidean distance carries out legitimate verification to the face characteristic of acquisition, and the algorithm of corresponding Euclidean distance is:
In formula, dE(x, y) indicates that Euclidean distance, x indicate that the feature vector of the face of extraction, y indicate archived biological feature The feature vector of face in information, k indicate the dimension of feature vector.
The value range of above-mentioned Euclidean distance is [100,1000], which can be mapped to similarity value model After enclosing [100%, 0%], Euclidean distance is scaled to the similarity of face characteristic, then by the similarity of face characteristic with it is default Judgment threshold be compared, for example similarity is more than 85%, that is, judges that the face characteristic is legal, and the biology of the face characteristic is special Sign veritifies result, and to may be used 1 expression legal, and 0 indicates illegal.
It should be noted that being flat image similar to the photo on resident identification card, the nasal height in face can not be embodied Even depth information, correspondingly, the faces characteristic such as nasal height can not be extracted according to flat image, and by the faces such as nasal height depth Feature is spent, the accuracy of face alignment is can effectively improve, therefore, in one embodiment provided by the invention, the face Image includes three-dimensional face images, and the face characteristic includes face depth characteristic;
The facial image for obtaining target user, including:
Obtain the three-dimensional face images of the target object shot using three-dimensional image pickup device.
By acquiring the three-dimensional face images of target user, and it is special to extract the face comprising face depth characteristic accordingly Sign, can more accurately be compared with the face characteristic achieved in user biological property data base, obtain more accurately Comparison result is veritified to obtain more accurately arriving biological characteristic as a result, the accuracy that raising identity information is veritified, specific side Method can refer to the comparison or recognition methods of the three-dimensional face images provided in the prior art, and details are not described herein again.
It is easily understood that the foundation of user biological property data base and improving and needing very long time, used to target When family carries out identity information veritification, in the user biological property data base may the not yet typing target user biological characteristic The biological information of information or only typing Partial Species is without comprehensive, therefore, in one embodiment provided by the invention In, it is inquired in the property data base from user biological after the corresponding archived biological characteristic information of the identification card number, also Including:
If not finding the corresponding archived biological characteristic information of the identification card number, returns and indicate that the identification card number corresponds to Prompt message of the biological information without archive, and the target user complete by other means identity information veritify Afterwards, the biological information of the target user is uploaded in the user biological property data base and is achieved.
Wherein, other modes can be the mode manually veritified, and veritified but used using a variety of biological informations In the case that archived biological characteristic information in the biological attribute data library of family is not complete, existing archived biological feature can also be used Information is completed to veritify, for example, predetermined carry out core using three kinds of face characteristic, fingerprint characteristic and iris feature biological informations It tests, but only has the fingerprint characteristic data achieved in user biological property data base for target user, lack face characteristic data And fingerprint characteristic data passes through at this point it is possible to which the fingerprint characteristic data only with archive veritifies target user in veritification Afterwards, then by the face characteristic data of the target user of acquisition and fingerprint characteristic data user biological property data base is uploaded to Middle archive, in order to be called when identity information is veritified next time.
By the above embodiment, user biological property data base can more convenient, be efficiently improved, in order to follow-up Identity information veritification is carried out to target user using more comprehensive biological information, improves the accurate of identity information veritification Property.
Step S103:It is veritified according to the identity card checking result and the biological characteristic as a result, determining that the target is used The identity at family veritifies result.
After obtaining identity card checking result and biological characteristic and veritifying result, you can according to the identity card checking result and The biological characteristic veritifies result and determines that the identity of the target user is veritified as a result, specifically, can be by the identity card core It tests result and the biological characteristic is veritified result and is normalized, be then compared with preset decision threshold condition, to It is to pass through or do not pass through to determine that the identity of target user veritifies result;Or identity card checking result and biological characteristic are veritified As a result be set separately corresponding qualification determination condition, only identity card checking result and biological characteristic veritify result it is qualified when, Just judge that the identity of target user veritifies result to pass through, otherwise not pass through;Those skilled in the art can be main in the present invention Under the enlightenment of purport, flexibly it is arranged in conjunction with the present embodiment and actual demand, it should all be within protection scope of the present invention.
More than, for a kind of embodiment explanation of identity information checking method provided by the invention, the embodiment of the present invention provides Identity information checking method, ID card information and biological information to target user carry out legitimacy inspection respectively, In, pass through the legitimacy inspection to ID card information, it is ensured that the legitimacy of the held identity card of user, and by biological special The legitimate verification of reference breath, it is ensured that the consistency of target user and identity card, to be realized on the whole to target user Identity comprehensively, is accurately veritified, and client is effectively avoided to use the possibility of other people identity cards or forged identity card transacting business.
In the above-described embodiment, a kind of identity information checking method is provided, it is corresponding, the present invention also provides A kind of identity information veritification device.Referring to FIG. 2, it veritifies device by a kind of identity information that embodiment of the present invention provides Schematic diagram.Since device embodiment is substantially similar to embodiment of the method, so describing fairly simple, related place is referring to side The part of method embodiment illustrates.Device embodiment described below is only schematical.
As shown in Fig. 2, a kind of identity information provided in an embodiment of the present invention veritifies device 2, including:
ID card information acquisition module 21, the ID card information for obtaining target user;
Biological information acquisition module 22, the biological information for obtaining the target user;
ID card information veritifies module 23, carries out legitimacy inspection for the ID card information to the target user, obtains To identity card checking result;
Biological characteristic veritifies module 24, carries out legitimacy inspection for the biological information to the target user, obtains Result is veritified to biological characteristic;
Identity veritifies module 25, for being veritified according to the identity card checking result and the biological characteristic as a result, determining The identity of the target user veritifies result.
In a change embodiment of the embodiment of the present invention, the ID card information veritifies module 23, including:
Identity information query unit is achieved, the identity for the target user described according to the ID card information Card number, inquires the corresponding archive identity information of the identification card number from subscriber identity information database;
ID card information comparing unit, for by the ID card information of the target user and the archive identity information into Row compares, and judges whether the ID card information of the target user is legal according to comparison result.
The embodiment of the present invention another change embodiment in, the ID card information include name, identification card number, Gender, nationality, date of birth, address, issuing authority, term of validity and identity card picture.
In a change embodiment of the embodiment of the present invention, the biological information includes:Face characteristic, fingerprint At least one of feature, iris feature or vocal print feature.
In another change embodiment of the embodiment of the present invention, the biological characteristic veritifies module 24, including:
Archived biological characteristic information query unit, for the target user's described according to the ID card information Identification card number inquires the corresponding archived biological characteristic information of the identification card number from user biological property data base;
Biological information comparing unit, for the biological information of the target user and the archived biological is special Reference breath is compared, and judges whether the biological information of the target user is legal according to comparison result.
In another change embodiment of the embodiment of the present invention, the biological information includes face characteristic, refers to It is a variety of in line feature, iris feature and vocal print feature;
The biological information comparing unit, including:
Point type comparison subunit, for by each biological information respectively with the archive identity information of corresponding type It is compared, obtains the similarity of each biological information;
Weighted average subelement obtains total similarity for the Similarity-Weighted of each biological information to be averaged;
Threshold value comparison subelement judges institute for whether meeting preset legal threshold condition according to total similarity Whether the biological information for stating target user is legal.
In another change embodiment of the embodiment of the present invention, the biological characteristic veritifies module 24, further includes:
Without archive information processing unit, if for not finding the corresponding archived biological characteristic information of the identification card number, It returns and indicates corresponding prompt message of the biological information without archive of the identification card number, and pass through it in the target user After his mode completes identity information veritification, the biological information of the target user is uploaded to the user biological characteristic According to being achieved in library.
In another change embodiment of the embodiment of the present invention, the biological information includes face characteristic;Institute Biological information acquisition module 22 is stated, including:
Facial image acquiring unit, the facial image for obtaining target user;
Face characteristic extraction unit obtains the people of the target user for carrying out feature extraction to the facial image Face feature.
In another change embodiment of the embodiment of the present invention, the facial image includes three-dimensional face images, institute It includes face depth characteristic to state face characteristic;
The facial image acquiring unit, including:
Three-dimensional image acquisition subelement, the three-dimensional people for obtaining the target object for using three-dimensional image pickup device to shoot Face image.
Identity information provided in an embodiment of the present invention veritifies device, the identity information core provided with present invention Proved recipe method is for identical inventive concept, advantageous effect having the same.
Fig. 3 is a kind of schematic diagram of computer readable storage medium provided in an embodiment of the present invention.As shown in figure 3, described Computer program is stored in computer readable storage medium 3, the computer program may be implemented when being run by processor The identity information checking method provided by the invention.
Wherein, the computer readable storage medium 3 includes permanent and non-permanent, removable and non-removable media It can be accomplished by any method or technique information storage.Information can be computer-readable instruction, data structure, program mould Block or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static random-access is deposited Reservoir (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), fast flash memory bank or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or Other magnetic storage apparatus or any other non-transmission medium can be used for storage and can be accessed by a computing device information.
Computer readable storage medium provided in an embodiment of the present invention is veritified with identity information provided in an embodiment of the present invention Method is for identical inventive concept, advantageous effect having the same.
Fig. 4 is a kind of schematic diagram of computing device provided in an embodiment of the present invention.As shown in figure 4, the computing device 4 wraps It includes:Processor 40, memory 41, bus 42 and communication interface 43, the processor 40, communication interface 43 and memory 41 pass through Bus 42 connects;The computer program that can be run on the processor 40, the processor are stored in the memory 41 Identity information checking method provided by the invention is executed when the 40 operation computer program.
Wherein, memory 41 may include high-speed random access memory (RAM:Random Access Memory), May further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.By extremely A few communication interface 43 (can be wired or wireless) is realized logical between the system network element and at least one other network element Letter connection can use internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 42 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data Bus, controlling bus etc..Wherein, memory 41 is for storing program, and the processor 40 executes after receiving and executing instruction Described program, the identity information checking method that aforementioned any embodiment of the embodiment of the present invention discloses can be applied to handle In device 40, or realized by processor 40.
Processor 40 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side Each step of method can be completed by the integrated logic circuit of the hardware in processor 40 or the instruction of software form.Above-mentioned Processor 40 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network Processor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (DSP), application-specific integrated circuit (ASIC), ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 41, processor 40 reads the information in memory 41, the above method is completed in conjunction with its hardware.
Computing device provided in an embodiment of the present invention is with identity information checking method provided in an embodiment of the present invention for phase Same inventive concept, advantageous effect having the same.
It should be noted that the flow chart and block diagram in attached drawing show multiple embodiments according to the present invention system, The architecture, function and operation in the cards of method and computer program product.In this regard, in flowchart or block diagram Each box can represent a part for a module, section or code, the part packet of the module, section or code Containing one or more executable instructions for implementing the specified logical function.It should also be noted that at some as the reality replaced In existing, the function of being marked in box can also occur in a different order than that indicated in the drawings.For example, two continuous sides Frame can essentially be basically executed in parallel, they can also be executed in the opposite order sometimes, this according to involved function and It is fixed.It is also noted that the group of each box in block diagram and or flow chart and the box in block diagram and or flow chart It closes, the dedicated hardware based system of function or action as defined in execution is realized, or can use specialized hardware Combination with computer instruction is realized.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it Its mode is realized.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of division of logic function, formula that in actual implementation, there may be another division manner, in another example, multiple units or component can combine Or it is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed phase Coupling, direct-coupling or communication connection between mutually can be by some communication interfaces, the INDIRECT COUPLING of device or unit or Communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover in the claim of the present invention and the range of specification.

Claims (10)

1. a kind of identity information checking method, which is characterized in that including:
The ID card information of target user is obtained, and obtains the biological information of the target user;
Legitimacy inspection is carried out to the ID card information of the target user, obtains identity card checking as a result, and to the mesh The biological information for marking user carries out legitimacy inspection, obtains biological characteristic and veritifies result;
It is veritified according to the identity card checking result and the biological characteristic as a result, determining that the identity of the target user veritifies knot Fruit.
2. identity information checking method according to claim 1, which is characterized in that the identity to the target user It demonstrate,proves information and carries out legitimacy inspection, including:
The identification card number of the target user described according to the ID card information, is looked into from subscriber identity information database Ask the corresponding archive identity information of the identification card number;
The ID card information of the target user is compared with the archive identity information, judged according to comparison result described in Whether the ID card information of target user is legal.
3. identity information checking method according to claim 2, which is characterized in that the ID card information include name, Identification card number, gender, nationality, date of birth, address, issuing authority, term of validity and identity card picture.
4. identity information checking method according to claim 1, which is characterized in that the biological information includes:People At least one of face feature, fingerprint characteristic, iris feature or vocal print feature.
5. identity information checking method according to claim 1, which is characterized in that the biology to the target user Characteristic information carries out legitimacy inspection, including:
The identification card number of the target user described according to the ID card information, is looked into from user biological property data base Ask the corresponding archived biological characteristic information of the identification card number;
The biological information of the target user is compared with the archived biological characteristic information, is sentenced according to comparison result Whether the biological information of the disconnected target user is legal.
6. identity information checking method according to claim 5, which is characterized in that the biological information includes face It is a variety of in feature, fingerprint characteristic, iris feature and vocal print feature;
The biological information by the target user is compared with the archived biological characteristic information, is tied according to comparing Fruit judges whether the biological information of the target user is legal, including:
Each biological information is compared with the archive identity information of corresponding type respectively, obtains each biological characteristic letter The similarity of breath;
The Similarity-Weighted of each biological information is averaged, total similarity is obtained;
Whether meet preset legal threshold condition according to total similarity, judges the biological information of the target user It is whether legal.
7. identity information checking method according to claim 5, which is characterized in that described from user biological characteristic It is inquired in library after the corresponding archived biological characteristic information of the identification card number, further includes:
If not finding the corresponding archived biological characteristic information of the identification card number, returns and indicate the corresponding life of the identification card number Prompt message of the object characteristic information without archive, and after the target user completes identity information veritification by other means, it will The biological information of the target user is uploaded in the user biological property data base and achieves.
8. a kind of identity information veritifies device, which is characterized in that including:
ID card information acquisition module, the ID card information for obtaining target user;
Biological information acquisition module, the biological information for obtaining the target user;
ID card information veritifies module, carries out legitimacy inspection for the ID card information to the target user, obtains identity Card veritifies result;
Biological characteristic veritifies module, carries out legitimacy inspection for the biological information to the target user, obtains biology Feature veritifies result;
Identity veritifies module, for being veritified according to the identity card checking result and the biological characteristic as a result, determining the mesh The identity for marking user veritifies result.
9. a kind of computer readable storage medium, computer program, feature are stored in the computer readable storage medium It is, computer program perform claim when being run by processor requires 1-7 any one of them identity informations veritification side Method.
10. a kind of computing device, including:It memory, processor and is stored on the memory and can be on the processor The computer program of operation, which is characterized in that perform claim requires 1-7 any when the processor runs the computer program Identity information checking method described in.
CN201711252486.8A 2017-12-01 2017-12-01 Identity information checking method, device, medium and computing device Pending CN108288080A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711252486.8A CN108288080A (en) 2017-12-01 2017-12-01 Identity information checking method, device, medium and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711252486.8A CN108288080A (en) 2017-12-01 2017-12-01 Identity information checking method, device, medium and computing device

Publications (1)

Publication Number Publication Date
CN108288080A true CN108288080A (en) 2018-07-17

Family

ID=62831730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711252486.8A Pending CN108288080A (en) 2017-12-01 2017-12-01 Identity information checking method, device, medium and computing device

Country Status (1)

Country Link
CN (1) CN108288080A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109509476A (en) * 2018-08-08 2019-03-22 广州势必可赢网络科技有限公司 A kind of method and system identifying suspect
CN109508705A (en) * 2018-12-29 2019-03-22 河北三川科技有限公司 The dynamic threshold face alignment setting method of identity-based card validity period
CN109598251A (en) * 2018-12-11 2019-04-09 北京旷视科技有限公司 Testimony of a witness checking method, device, equipment and system and storage medium
CN109670394A (en) * 2018-10-25 2019-04-23 平安科技(深圳)有限公司 A kind of video conference based on biological characteristic similarity is registered method and relevant device
CN110175624A (en) * 2019-04-11 2019-08-27 阿里巴巴集团控股有限公司 Project access checking method and device
CN111523569A (en) * 2018-09-04 2020-08-11 阿里巴巴集团控股有限公司 User identity determination method and device and electronic equipment
CN111639956A (en) * 2018-11-16 2020-09-08 阿里巴巴集团控股有限公司 Method and device for providing and acquiring security identity information
CN112184183A (en) * 2020-10-26 2021-01-05 财拓云计算(上海)有限公司 Self-service certificate returning method and device and electronic equipment
CN112288385A (en) * 2020-09-28 2021-01-29 珠海大横琴科技发展有限公司 Electronic certificate processing method and device
CN113592626A (en) * 2021-07-29 2021-11-02 中国工商银行股份有限公司 Method and device for checking application information of anti-fraud credit card
WO2022126964A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Service data verification method and apparatus, device and storage medium
CN117113199A (en) * 2023-10-23 2023-11-24 浙江星汉信息技术股份有限公司 File security management system and method based on artificial intelligence

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553947A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Methods and devices for finding account back, protecting account security and preventing account theft
CN106407646A (en) * 2016-08-25 2017-02-15 长沙华宇信息科技有限公司 Physical examination systems, and communication method and device for physical examination systems
CN106503519A (en) * 2016-10-14 2017-03-15 国政通科技股份有限公司 A kind of method of identification check

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553947A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Methods and devices for finding account back, protecting account security and preventing account theft
CN106407646A (en) * 2016-08-25 2017-02-15 长沙华宇信息科技有限公司 Physical examination systems, and communication method and device for physical examination systems
CN106503519A (en) * 2016-10-14 2017-03-15 国政通科技股份有限公司 A kind of method of identification check

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109509476A (en) * 2018-08-08 2019-03-22 广州势必可赢网络科技有限公司 A kind of method and system identifying suspect
CN109509476B (en) * 2018-08-08 2022-03-15 广州势必可赢网络科技有限公司 Method and system for identifying criminal suspects
CN111523569B (en) * 2018-09-04 2023-08-04 创新先进技术有限公司 User identity determination method and device and electronic equipment
CN111523569A (en) * 2018-09-04 2020-08-11 阿里巴巴集团控股有限公司 User identity determination method and device and electronic equipment
CN109670394A (en) * 2018-10-25 2019-04-23 平安科技(深圳)有限公司 A kind of video conference based on biological characteristic similarity is registered method and relevant device
CN109670394B (en) * 2018-10-25 2024-03-01 平安科技(深圳)有限公司 Video conference sign-in method based on biological feature similarity and related equipment
CN111639956A (en) * 2018-11-16 2020-09-08 阿里巴巴集团控股有限公司 Method and device for providing and acquiring security identity information
CN111639956B (en) * 2018-11-16 2023-04-28 创新先进技术有限公司 Method and device for providing and acquiring safety identity information
CN109598251A (en) * 2018-12-11 2019-04-09 北京旷视科技有限公司 Testimony of a witness checking method, device, equipment and system and storage medium
CN109508705B (en) * 2018-12-29 2020-09-08 河北三川科技有限公司 Dynamic threshold face comparison setting method based on validity period of identity card
CN109508705A (en) * 2018-12-29 2019-03-22 河北三川科技有限公司 The dynamic threshold face alignment setting method of identity-based card validity period
CN110175624A (en) * 2019-04-11 2019-08-27 阿里巴巴集团控股有限公司 Project access checking method and device
CN110175624B (en) * 2019-04-11 2023-01-10 创新先进技术有限公司 Project admission auditing method and device
CN112288385A (en) * 2020-09-28 2021-01-29 珠海大横琴科技发展有限公司 Electronic certificate processing method and device
CN112184183A (en) * 2020-10-26 2021-01-05 财拓云计算(上海)有限公司 Self-service certificate returning method and device and electronic equipment
WO2022126964A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Service data verification method and apparatus, device and storage medium
CN113592626A (en) * 2021-07-29 2021-11-02 中国工商银行股份有限公司 Method and device for checking application information of anti-fraud credit card
CN117113199A (en) * 2023-10-23 2023-11-24 浙江星汉信息技术股份有限公司 File security management system and method based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN108288080A (en) Identity information checking method, device, medium and computing device
US20210124919A1 (en) System and Methods for Authentication of Documents
US10650379B2 (en) Method and system for validating personalized account identifiers using biometric authentication and self-learning algorithms
US20180189561A1 (en) Identity document validation using biometric image data
CN109472918A (en) Invoice validation method, financing checking method, device, equipment and medium
US10403076B2 (en) Method for securing and verifying a document
CN108922074A (en) Without card withdrawal method, apparatus, computer equipment and storage medium
CN104036254A (en) Face recognition method
CN107977559A (en) A kind of identity identifying method, device, equipment and computer-readable recording medium
CN109376717A (en) Personal identification method, device, electronic equipment and the storage medium of face comparison
Wandzik et al. CNNs under attack: on the vulnerability of deep neural networks based face recognition to image morphing
US11875259B1 (en) Generative system and method for enhancing readability of barcodes using frequency guided computer vision
CN105335630B (en) Personal identification method and identity recognition device
US10504117B2 (en) Methods, systems, and articles of manufacture for fingerprinting signatures and enhanced signature capturing for charge card transactions on mobile communication devices
CN110490149A (en) A kind of face identification method and device based on svm classifier
US20190087824A1 (en) System and method for mitigating effects of identity theft
Shenoy et al. Online digital cheque signature verification using deep learning approach
CN113283359A (en) Authentication method and system for handheld certificate photo and electronic equipment
Beukes Hand vein-based biometric authentication with limited training samples
Markham et al. Open-Set: ID Card Presentation Attack Detection Using Neural Style Transfer
Mohammad Multi-Modal Ocular Recognition in Presence of Occlusion in Mobile Devices
Hanušniak Impact of digitization of banking services on international exporters.
US20240348603A1 (en) Method and apparatus for creating encoded data and use of same for identity verification
Rao Multi-Modal Biometric Age Prediction Through Deep Learning Framework
US20240346852A1 (en) Method and apparatus for creating encoded data and use of same for identity verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180717

RJ01 Rejection of invention patent application after publication