CN110119606A - Identity data verification method, system and computer readable storage medium - Google Patents

Identity data verification method, system and computer readable storage medium Download PDF

Info

Publication number
CN110119606A
CN110119606A CN201810120998.7A CN201810120998A CN110119606A CN 110119606 A CN110119606 A CN 110119606A CN 201810120998 A CN201810120998 A CN 201810120998A CN 110119606 A CN110119606 A CN 110119606A
Authority
CN
China
Prior art keywords
electronic equipment
server
identity information
verify data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810120998.7A
Other languages
Chinese (zh)
Inventor
张强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Uniview Technologies Co Ltd
Original Assignee
Zhejiang Uniview Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Uniview Technologies Co Ltd filed Critical Zhejiang Uniview Technologies Co Ltd
Priority to CN201810120998.7A priority Critical patent/CN110119606A/en
Publication of CN110119606A publication Critical patent/CN110119606A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A kind of identity data verification method, system and computer readable storage medium provided by the invention.Identity data verification method is applied to identity data and verifies system.Wherein, the above method includes: and collects facial characteristics when the electronic equipment gets the identity information of requests verification and receive the verify data of input;The identity information, verify data and the facial characteristics are sent to the server by the electronic equipment;The server is based on the identity information, the verify data and the facial characteristics and carries out authentication;If authentication success, the server sending permission information to the corresponding electronic equipment, so that the electronic equipment obtains permission corresponding with the identity information.It is, pass through the raising safety of facial characteristics and verify data double verification, meanwhile, facial characteristics ensures the reliability of the data of acquisition with obtaining while verify data.

Description

Identity data verification method, system and computer readable storage medium
Technical field
The present invention relates to field of information security technology, in particular to a kind of identity data verification method, system and meter Calculation machine readable storage medium storing program for executing.
Background technique
The development of the communication technology, makes people's lives step into the information age.Information age is to people's lives With convenience, for example, intelligentized attendance, gate inhibition and digitization transaction etc..But consequently also bring many security risks. Wherein, information security directly influences the vital interests of user, becomes and is concerned the most and the highest peace of danger coefficient Full hidden danger.It is a kind of method that can effectively improve information security coefficient using authentication, even if in this way, in the related technology Authentication there is also many deficiencies, safety need further to improve.
Summary of the invention
The purpose of the present invention is to provide a kind of identity data verification method, system and computer readable storage mediums, use To improve the above problem.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, being applied to identity data verifying system the embodiment of the invention provides a kind of identity data verification method System, the identity data verifying system include electronic equipment and the server with electronic equipment communication connection, the method It include: to collect facial characteristics when the electronic equipment gets the identity information of requests verification and receive testing for input Demonstrate,prove data;The identity information, verify data and the facial characteristics are sent to the server by the electronic equipment;It is described Server is based on the identity information, the verify data and the facial characteristics and carries out authentication;If authentication success, The server sending permission information is to the corresponding electronic equipment, so that the electronic equipment obtains and the identity information Corresponding permission.
Second aspect, the embodiment of the invention provides a kind of identity datas to verify system, and the identity data verifies system Server including electronic equipment and with electronic equipment communication connection;The electronic equipment is tested for that ought get request When the identity information of card, collects facial characteristics and receive the verify data of input;The electronic equipment, being also used to will be described Identity information, verify data and the facial characteristics are sent to the server;The server is also used to based on the identity Information, the verify data and the facial characteristics carry out authentication;The server, if being also used to authentication success, Sending permission information is to the corresponding electronic equipment, so that the electronic equipment obtains power corresponding with the identity information Limit.
The third aspect, the embodiment of the invention provides a kind of computer readable storage mediums, are stored thereon with computer and refer to The step of order, those computer instructions realize above-mentioned identity data verification method when being executed by processor.
Compared with prior art, the embodiment of the invention provides a kind of identity data verification methods.In electronics in this method When equipment gets the identity information of requests verification, collects facial characteristics and receive the verify data of input, and by servicing Device is based on the identity information, the verify data and the facial characteristics and carries out authentication, makes after authentication success, Sending permission information is to the corresponding electronic equipment, so that the electronic equipment obtains power corresponding with the identity information Limit.It is, pass through the raising safety of facial characteristics and verify data double verification, meanwhile, facial characteristics and verify data While obtain ensure acquisition data reliability.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the structural schematic diagram that a kind of identity data provided in an embodiment of the present invention verifies system.
Fig. 2 is a kind of schematic diagram of server provided in an embodiment of the present invention.
Fig. 3 is a kind of one of step flow chart of identity data verification method provided in an embodiment of the present invention.
Fig. 4 is the sub-step flow chart of step S101 in Fig. 3.
Fig. 5 is the two of a kind of step flow chart of identity data verification method provided in an embodiment of the present invention.
Fig. 6 is the three of a kind of step flow chart of identity data verification method provided in an embodiment of the present invention.
Icon: 100- server;200- electronic equipment;300- identity data verifies system;111- memory;112- processing Device;113- communication unit.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It in the related technology, is a kind of method that can effectively improve information security coefficient by authentication, it is most common Mode is to carry out permission to be encrypted.It needs to input password for example, bank withdraws cash, log in communication software and need to input password, logical It crosses the card that brush includes identity data and passes through gate inhibition etc..The mode of rights encryption is also various, for example, numerical ciphers encrypt, sound is close Code encryption, finger-print cipher encryption and recognition of face etc..Above-mentioned rights encryption can play a role, but single class rights encryption It is all easy to be decrypted.Therefore, the present invention provides a kind of identity data verification method, system and computer readable storage medium, For further increasing the safety of rights encryption.It should be noted that identity data authentication provided in an embodiment of the present invention Method, system and computer readable storage medium are applicable not only to access control system, banking system, can also be applied to system etc. of registering The field of permission is given after needing to confirm identity.
Referring to FIG. 1, identity data verifying system 300 provided in an embodiment of the present invention includes server 100 and at least one A electronic equipment 200.Server 100 is connect with electronic equipment 200.Preferably, server 100 and 200 communication link of electronic equipment It connects.
Above-mentioned electronic equipment 200 can be the terminal device with image collecting function.Electronic equipment 200100 can be Desktop computer, laptop, tablet computer, smart phone, personal digital assistant (personal digital Assistant, PDA), attendance record terminal, gate inhibition unlock terminal, ATM machine etc..
It referring to figure 2., is the block diagram of above-mentioned server 100.Server 100 includes memory 111, processor 112 and communication unit 113.
The memory 111, processor 112 and each element of communication unit 113 are directly or indirectly electrical between each other Connection, to realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus or letter between each other Number line, which is realized, to be electrically connected.The software for realizing identity data verification method includes that at least one can be with software or firmware (Firmware) form is stored in the memory 111 or is solidificated in the operating system (Operating of server 100 System, OS) in software function module.The processor 112 is for executing the executable mould stored in the memory 111 Block.
Wherein, the memory 111 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 111 is for storing program or data.The communication unit 113 is for passing through institute The communication connection that network is established between server 100 and other communication terminals is stated, and for passing through the network sending and receiving data.
It should be understood that structure shown in Fig. 2 is only the structural schematic diagram of server 100, server 100 may also include The more perhaps less component or with the configuration different from shown in Fig. 3 than shown in Fig. 2.Each component shown in Fig. 2 can To be realized using hardware, software, or its combination.
Referring to FIG. 3, Fig. 3 is a kind of flow chart for identity data verification method that present pre-ferred embodiments provide.It should Identity data verification method is applied to identity data and verifies system 300.Above-mentioned identity data verification method the following steps are included:
Step S101 collects facial characteristics and reception when electronic equipment 200 gets the identity information of requests verification To the verify data of input.
In embodiments of the present invention, the identity information of above-mentioned requests verification can be account information.Each account information with Each registered users uniquely correspond to.The identity information mode that above-mentioned electronic equipment 200 gets requests verification can be according to answering It is different with the difference of environment, for example, being applied to ATM system, then it can be the account information in ATM machine reading bank card.It answers It then can be the account information etc. stored in door lock terminal recognition to access card for access control system.
As a kind of possible embodiment, as shown in figure 4, above-mentioned steps S101 can also include following sub-step:
Sub-step S1011, when the verifying of 200 acquisition request of electronic equipment identity information and monitor the input of verify data When signal, starting facial characteristics acquisition.
Above-mentioned verify data can be the symbol combination inputted by the input-output unit of electronic equipment 200, fingerprint is known The voiceprint that finger print information that other unit identifies, acoustic recognition unit identify.Above-mentioned symbol may include number, letter Deng.
The input signal of above-mentioned verify data can be according to the letter generated when detecting user's starting validation information Breath.For example, generation when detecting first symbol input according to input-output unit, fingerprint identification unit collect finger print information Shi Shengcheng, generation or user, which pass through operation, when acoustic recognition unit collects voiceprint makes electronic equipment 200 enter verifying It is generated when data input screen.
For convenience of explanation, in the present embodiment using the symbol combination that is inputted by input-output unit as verify data into Row explanation.
Further, in the identity information of 200 acquisition request of electronic equipment verifying and when monitoring input signal, then start Image acquisition units carry out facial image acquisition, and facial feature extraction is carried out in face-image from collecting.
Sub-step S1012, the electronic equipment 200 receive the verify data of input.
In embodiments of the present invention, it is special to carry out face when detecting user and starting to input verify data for electronic equipment 200 Sign obtains, but electronic equipment 200 has received verify data completely and obtained and had no absolute sequencing between facial characteristics.It is excellent Selection of land, execution can be synchronized by obtaining verify data and obtaining facial characteristics.
The identity information, verify data and the facial characteristics are sent to institute by step S102, the electronic equipment 200 State server 100.
In embodiments of the present invention, electronic equipment 200 will be started obtain the identity information of verify data and facial characteristics, obtain The verify data and facial characteristics taken is sent to server 100, so that server 100 is handled.
Step S103, server 100 are based on the identity information, the verify data and the facial characteristics and carry out identity Verifying.
In embodiments of the present invention, it is verified according to identity information inquiry is pre-set with the matched decoding of the identity information Data and decoding characteristic.Verify data is compared with decoding verify data, and by the facial characteristics and the solution Code characteristic is compared.If the verify data and the decoding verify data compare successfully and the facial characteristics and institute It states decoding characteristic to compare successfully, then authentication success.If the verify data and the decoding verify data compare mistake It loses or the facial characteristics and the decoding characteristic compares failure, then authentication failure.
There are corresponding relationships for above-mentioned identity information and decoding verify data and decoding characteristic.Identity information is tested with decoding Corresponding relationship existing for card data and decoding characteristic can be pre-stored in server 100.Each decoding verify data Corresponding decoding characteristic.The mode of being stored in advance can be such that
After user's registration, corresponding unique identity information is obtained.Electronic equipment 200 shows that verify data configures boundary Face reminds user to be decoded verify data input.Judge whether decoding verify data is effective according to preset rule.Example Such as, it is more than 6 that preset rule, which is the number of characters of decoding verify data, then receives the decoding verify data of user's input Number of characters when being more than 6, then show effectively.When received decoding verify data is judged not yet in effect, user is prompted to carry out face Portion's Image Acquisition.After completing facial image acquisition, the face-image according to acquisition carries out facial feature extraction, and to extraction Facial characteristics carries out Effective judgement.It is effective then using the facial characteristics as decoding characteristic, then restart face in vain Image Acquisition.Decoding verify data and decoding characteristic binding will be obtained, then will decoding verify data and decoding characteristic The server 100 that is sent to corresponding with identity information is stored.
As a kind of possible embodiment, each identity information can decode multiple groups verify data and decoding feature Data.It is above-mentioned pre-set special with the matched decoding verify data of the identity information and decoding according to identity information inquiry Sign data, which may is that, inquires the corresponding decoding verify data according to the identity information.According to the decoding verify data Obtain corresponding decoding characteristic.
Step S104, if authentication success, the 100 sending permission information of server to the corresponding electronic equipment 200。
In embodiments of the present invention, above-mentioned authority information can be License Info.Electronic equipment 200 can be believed according to permission Breath obtains permission corresponding with the identity information.
As a kind of possible embodiment, the corresponding permission of identity information can be preset by user.User can be with Set the corresponding each group of decoding verify data of identity information permission corresponding with decoding characteristic.For example, being applied to ATM When system, it is inquiry into balance that user setting, which decodes verify data A permission corresponding with decoding characteristic A, decodes verify data B Permission corresponding with decoding characteristic B is inquiry into balance and withdrawal.If user passes through decoding verify data A and decoding feature Data A has carried out identity information verifying, then the corresponding authority information of inquiry into balance is sent to electronic equipment 200 by server 100, So that corresponding ATM machine obtains inquiry into balance permission, so that user carries out inquiry into balance operation using the ATM machine.
Further, as shown in figure 5, the identity data verification method can also include the following steps:
Step S201, if authentication fails, the server 100 sends re-examination and instructs to the electronic equipment 200.
In embodiments of the present invention, after authentication failure, the generation re-examination of server 100, which instructs and is sent to electronics, to be set Standby 200.Electronic equipment 200 restarts the prompt of verifying according to the instruction display of above-mentioned re-examination.Electronic equipment 200 is again introduced into etc. waiting Receive facial characteristics acquisition corresponding to the identity information and verify data.
Step S202, electronic equipment 200 repeat facial characteristics acquisition and receive the verify data of input again.
In embodiments of the present invention, repeat facial characteristics acquisition and receive the side of the verify data of input again Facial characteristics is collected in formula and step S101 and to receive the mode of verify data of input identical, is repeated no more secondary.
The identity information, the facial characteristics of newest acquisition and verify data are sent to the clothes by step S203 Business device 100.
Step S204, the server 100 repeat based on the identity information, newest acquisition the facial characteristics and test It demonstrate,proves data and carries out authentication, until authentication success.
In embodiments of the present invention, the mode of authentication and the mode phase that authentication is carried out in step S103 are carried out Together, it is repeated no more secondary.
Further, the influence for safety identity data verified in order to avoid repeated attempt, also for making to invade When power behavior, there is trackability.As shown in fig. 6, the method can also include:
Step S301, the server 100 count the read-around ratio of authentication failure corresponding with the identity information.
As an implementation, server 100 can be by counting the re-examination corresponding to the identity information continuously transmitted Instruction, to determine the read-around ratio of authentication real scene shooting.Above-mentioned read-around ratio can be to the continuous of same identity information progress Verifying number.
Step S302, if the read-around ratio is more than preset value, the server 100 starts alarm.
In embodiments of the present invention, the mode for starting alarm may is that server 100 will lose in the authentication each time It loses the corresponding facial characteristics and is sent to the terminal bound with the identity information.Server 100 sends warning message to electricity Sub- equipment 200 carries out locking mode to electronic equipment 200, is allowed to not operated.The electronic equipment 200 is according to the report Alert information carries out locking mode.And starts alert mode and can be and blown a whistle, flashed.
It should be noted that with the identity information binding terminal can be bound when user registers contact end End, for example, email address, mobile terminal etc..It can also be the storage server of default with the terminal of identity information binding 100。
The embodiment of the present invention also provides a kind of identity data verifying system 300 corresponded to the above method, in the system Detail schema be referred to the above method to realize, it is specific as follows:
The electronic equipment 200, for collecting facial characteristics and reception when getting the identity information of requests verification To the verify data of input;
The electronic equipment 200 is also used to for the identity information, verify data and the facial characteristics being sent to described Server 100;
The server 100 is also used to carry out body based on the identity information, the verify data and the facial characteristics Part verifying;
The server 100, if being also used to authentication success, sending permission information to the corresponding electronic equipment 200, so that the electronic equipment 200 obtains permission corresponding with the identity information.
The server 100 controls the display of electronic equipment 200 and restarts verifying if being also used to authentication failure Prompt;
The electronic equipment 200 is also used to repeat the facial characteristics acquisition and receives the described of input again test Demonstrate,prove data;
The electronic equipment 200 is also used to the identity information, the facial characteristics of newest acquisition and verify data It is sent to the server 100;
The server 100 is also used to repeat based on the identity information, the facial characteristics of newest acquisition and verifying Data carry out authentication, until authentication success.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description Specific work process, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
The embodiment of the present invention further discloses a kind of computer readable storage medium, is stored thereon with computer program, described The identity data verification method that present invention discloses is realized when computer program is executed by processor 112.
In conclusion a kind of identity data verification method, system and computer readable storage medium provided by the invention.Institute It states identity data verification method and verifies system applied to identity data.Identity data verifying system include electronic equipment and with The server of the electronic equipment communication connection, which comprises when the electronic equipment gets the identity of requests verification When information, collects facial characteristics and receive the verify data of input;The electronic equipment by the identity information, verifying number According to and the facial characteristics be sent to the server;The server is based on the identity information, the verify data and institute It states facial characteristics and carries out authentication;If authentication success, the server sending permission information to the corresponding electronics Equipment, so that the electronic equipment obtains permission corresponding with the identity information.It is, passing through facial characteristics and verifying number According to the raising safety of double verification, meanwhile, facial characteristics and obtain the data for ensuring acquisition while verify data can By property.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of identity data verification method, which is characterized in that be applied to identity data and verify system, the identity data verifying System includes electronic equipment and the server with electronic equipment communication connection, which comprises
When the electronic equipment gets the identity information of requests verification, collects facial characteristics and receive the verifying of input Data;
The identity information, verify data and the facial characteristics are sent to the server by the electronic equipment;
The server is based on the identity information, the verify data and the facial characteristics and carries out authentication;
If authentication success, the server sending permission information to the corresponding electronic equipment, so that the electronics is set It is standby to obtain permission corresponding with the identity information.
2. the method as described in claim 1, which is characterized in that the method also includes:
If authentication fails, the server sends re-examination and instructs to the electronic equipment, to be that the electronic equipment is shown Restart the prompt of verifying;
The electronic equipment repeats the facial characteristics acquisition and receives the verify data of input again;
The identity information, the facial characteristics of newest acquisition and verify data are sent to the server;
The server repeats to test based on the identity information, the facial characteristics of newest acquisition and verify data progress identity Card, until authentication success.
3. method according to claim 2, which is characterized in that after authentication failure, the method also includes:
The read-around ratio of server statistics authentication failure corresponding with the identity information;
If the read-around ratio is more than preset value, the server starts alarm.
4. method as claimed in claim 3, which is characterized in that the step of server starting alarm includes:
The server the corresponding facial characteristics of the authentication failure will be sent to and the identity information each time The terminal of binding.
5. method as claimed in claim 3, which is characterized in that the step of server starting alarm includes:
The server sends warning message to the electronic equipment;
The electronic equipment carries out locking mode according to the warning message, and starts alert mode.
6. the method as described in claim 1, which is characterized in that when the electronic equipment gets the identity information of requests verification When, it collects facial characteristics and includes: the step of receiving the verify data of input
When the identity information of electronic equipment acquisition request verifying and when monitoring the input signal of verify data, starting face Collection apparatus;
The electronic equipment receives the verify data of input.
7. the method as described in claim 1, which is characterized in that the server is based on the identity information, the verifying number According to and the facial characteristics carry out authentication the step of include:
The pre-set and matched decoding verify data of the identity information and decoding characteristic are inquired according to the identity information According to;
The verify data is compared with the decoding verify data, and by the facial characteristics and the decoding characteristic According to being compared;
If the verify data and the decoding verify data compare successfully and the facial characteristics and the decoding characteristic It compares successfully, then authentication success;
If the verify data and the decoding verify data compare failure or the facial characteristics and the decoding characteristic Failure is compared, then authentication fails.
8. the method for claim 7, which is characterized in that inquire the pre-set and identity according to the identity information The step of decoding verify datas of information matches and decoding characteristic includes:
The corresponding decoding verify data is inquired according to the identity information;
Corresponding decoding characteristic is obtained according to the decoding verify data.
9. a kind of identity data verifies system, which is characterized in that the identity data verifying system include electronic equipment and with institute State the server of electronic equipment communication connection;
The electronic equipment, for when getting the identity information of requests verification, collecting facial characteristics and receiving input Verify data;
The electronic equipment is also used to the identity information, verify data and the facial characteristics being sent to the server;
The server is also used to carry out authentication based on the identity information, the verify data and the facial characteristics;
The server, if being also used to authentication success, sending permission information is to the corresponding electronic equipment, so that described Electronic equipment obtains permission corresponding with the identity information.
10. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that those computer instructions The step of claim 1 to identity data verification method described in any one of claim 8 is realized when being executed by processor.
CN201810120998.7A 2018-02-07 2018-02-07 Identity data verification method, system and computer readable storage medium Pending CN110119606A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810120998.7A CN110119606A (en) 2018-02-07 2018-02-07 Identity data verification method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810120998.7A CN110119606A (en) 2018-02-07 2018-02-07 Identity data verification method, system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110119606A true CN110119606A (en) 2019-08-13

Family

ID=67519489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810120998.7A Pending CN110119606A (en) 2018-02-07 2018-02-07 Identity data verification method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110119606A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555930A (en) * 2019-08-30 2019-12-10 北京市商汤科技开发有限公司 Door lock control method and device, electronic equipment and storage medium
CN110753034A (en) * 2019-09-27 2020-02-04 万翼科技有限公司 Authority management method and related device
CN110933100A (en) * 2019-12-06 2020-03-27 广州国音智能科技有限公司 Authority verification method, system and computer readable storage medium
CN113017321A (en) * 2021-02-09 2021-06-25 辽宁工程技术大学 Triggering type rocking chair with learning function
CN113076859A (en) * 2021-03-31 2021-07-06 深圳供电局有限公司 Safety monitoring method and system for face recognition, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120140993A1 (en) * 2010-12-05 2012-06-07 Unisys Corp. Secure biometric authentication from an insecure device
CN103268549A (en) * 2013-04-24 2013-08-28 徐明亮 Mobile payment verification system based on facial features
CN105956451A (en) * 2016-05-05 2016-09-21 长沙海川自动化设备有限公司 Identity identification method and device for tower crane and construction hoist
CN106713370A (en) * 2016-05-11 2017-05-24 北京得意音通技术有限责任公司 Identity authentication method, server and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120140993A1 (en) * 2010-12-05 2012-06-07 Unisys Corp. Secure biometric authentication from an insecure device
CN103268549A (en) * 2013-04-24 2013-08-28 徐明亮 Mobile payment verification system based on facial features
CN105956451A (en) * 2016-05-05 2016-09-21 长沙海川自动化设备有限公司 Identity identification method and device for tower crane and construction hoist
CN106713370A (en) * 2016-05-11 2017-05-24 北京得意音通技术有限责任公司 Identity authentication method, server and mobile terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555930A (en) * 2019-08-30 2019-12-10 北京市商汤科技开发有限公司 Door lock control method and device, electronic equipment and storage medium
CN110753034A (en) * 2019-09-27 2020-02-04 万翼科技有限公司 Authority management method and related device
CN110753034B (en) * 2019-09-27 2021-10-15 万翼科技有限公司 Authority management method and related device
CN110933100A (en) * 2019-12-06 2020-03-27 广州国音智能科技有限公司 Authority verification method, system and computer readable storage medium
CN113017321A (en) * 2021-02-09 2021-06-25 辽宁工程技术大学 Triggering type rocking chair with learning function
CN113017321B (en) * 2021-02-09 2024-02-02 辽宁工程技术大学 Trigger formula rocking chair that possesses study function
CN113076859A (en) * 2021-03-31 2021-07-06 深圳供电局有限公司 Safety monitoring method and system for face recognition, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110119606A (en) Identity data verification method, system and computer readable storage medium
KR102004840B1 (en) Authentication in ubiquitous environment
US9589399B2 (en) Credential quality assessment engine systems and methods
US11140155B2 (en) Methods, computer readable media, and systems for authentication using a text file and a one-time password
CN106170793B (en) System, method and apparatus for secure log
CN107294721A (en) The method and apparatus of identity registration, certification based on biological characteristic
CN103907328A (en) Mobile device-based authentication
CN105894616A (en) Access Management System And Method
CN108171137B (en) Face recognition method and system
CN106796708B (en) Electronic voting system and method
US9626494B2 (en) Method and system for encryption and/or decryption
CN109067881A (en) Remote-authorization method and its device, equipment and storage medium
WO2021113022A1 (en) Transferring a customer from an atm transaction to a device-based transaction during an error state, and applications thereof
CN109617703B (en) Key management method and device, electronic equipment and storage medium
CN107294981B (en) Authentication method and equipment
WO2013054102A1 (en) Identity verification
US20160342996A1 (en) Two-factor authentication method
Abdurohman et al. Secure smart card reader for university presence system
WO2018226500A1 (en) Biometric identification system and associated methods
US10930139B1 (en) Information card silent coercion alarm
CN113395162A (en) System and method for counting votes in an electronic voting system
CN112862504A (en) Lawyer identity authentication method, device, equipment and storage medium
CN106534215A (en) Service installation method and device and service login method and device
TWI621074B (en) Patrol sign-in system and method thereof
Saad et al. A smart e-voting system using RFID authentication method for a campus electoral

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190813