CN110135326A - A kind of identity identifying method, electronic equipment and computer readable storage medium - Google Patents
A kind of identity identifying method, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110135326A CN110135326A CN201910390192.4A CN201910390192A CN110135326A CN 110135326 A CN110135326 A CN 110135326A CN 201910390192 A CN201910390192 A CN 201910390192A CN 110135326 A CN110135326 A CN 110135326A
- Authority
- CN
- China
- Prior art keywords
- user
- authentication
- identity
- image
- response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Health & Medical Sciences (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the invention discloses a kind of identity identifying methods, electronic equipment and computer readable storage medium, the similarity of the image of the user in image and local image library by obtaining the user of acquisition, and determine that the user passes through authentication when the similarity is greater than first threshold, wherein, the first threshold is adjusted by the authentication state of user, so that improving certification thresholding in the ID authentication request exception of user, certification thresholding is reduced when the history authentication record of user is good, thus, the authentication error rate of system can be reduced, the safety and reliability of raising system.
Description
Technical field
The present invention relates to field of computer technology, more particularly, to a kind of identity identifying method, electronic equipment and calculating
Machine readable storage medium storing program for executing.
Background technique
With the development that financial technology is swift and violent, increasingly prominent security risk also proposes Internet application higher and higher
Requirement.Authentication is first of security perimeter of Internet application, and the authentication mode security intensity based on password is low, easy
It is by dictionary attack and unfriendly to user, and there is also not readily portable and make for the two-factor authentications such as traditional UKEY mode
The problems such as using.How using authentications such as emerging bio-identification, Activity recognitions, found between safety and convenience
One better equalization point has become the hot spot of every profession and trade research and application.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of identity identifying method, electronic equipment and computer-readable storage medium
Matter improves the safety and reliability of system to reduce the authentication error rate of system.
In a first aspect, the present embodiment provides a kind of identity identifying methods, which comprises
In response to the ID authentication request of user, acquisition obtains the image and identity information of the user;
ID authentication request in response to the user is not to authenticate for the first time, calculates the described image and local image of acquisition
The similarity of the image of the user in library;
It is greater than first threshold in response to the similarity, determines the user identity authentication success, the first threshold root
It is adjusted according to the authentication state of the user, the authentication state of the user includes certification request address and/or certification request frequency;
Wherein, determine that the identity of the user is recognized there are when the identity information of the user in local identity information library
Card request is not to authenticate for the first time.
Further, the method also includes:
ID authentication request in response to the user is to authenticate for the first time, by the described image of acquisition and the identity information
It is sent to the certification of Identity Management departmental terminals;
In response to the user by the certification of the Identity Management departmental terminals, by the described image of acquisition and the body
Part information is bound, and the described image of acquisition is stored to local image library, and the identity information is stored to local body
Part information bank.
Further, the method also includes:
According to preset rules white list or blacklist is added in the user by the authentication state based on the user.
Further, the method also includes:
It is in the white list in response to the user, adjusting the first threshold is the first value;
It is in the blacklist in response to the user, adjusting the first threshold is second value;
Wherein, the second value is greater than first value.
Further, the method also includes:
The ID authentication request address of continuous ID authentication request and/or the user in response to the user is strange
Address increases the first threshold.
Further, the method also includes:
In response to user identity authentication success, the described image of acquisition is stored into the local image library.
Further, the local image library includes the multiple images of the user, the method also includes:
ID authentication request in response to the user is not to authenticate for the first time, calculates the image difference of the user of acquisition
With the similarity of the image of multiple users in the local image library;
It is greater than the first threshold in response to similarity described at least one, determines the user identity authentication success.
Further, the method also includes:
In response to local image authentication engine failure, the described image of acquisition and identity information are sent to Identity Management portion
Door terminal is authenticated;
Pass through in response to Identity Management departmental terminals certification, determines the user identity authentication success.
Second aspect, the embodiment of the present invention provide a kind of electronic equipment, including memory and processor, wherein described to deposit
Reservoir is executed for storing one or more computer instruction, one or more computer instruction by the processor with reality
Now method as described above.
The third aspect, the embodiment of the present invention provide a kind of computer readable storage medium, store computer program thereon and refer to
It enables, the computer program instructions realize method as described above when being executed by processor.
The embodiment of the invention discloses a kind of identity identifying method, electronic equipment and computer readable storage mediums, pass through
The similarity of the image of the user in the image and local image library of the user of acquisition is obtained, and is greater than first in the similarity
Determine that the user passes through authentication when threshold value, wherein the first threshold is adjusted by the authentication state of user, so that
Certification thresholding is improved in the certification request exception of user, and certification thresholding is reduced when the history authentication record of user is good, by
This, can reduce the authentication error rate of system, improve the safety and reliability of system.
Detailed description of the invention
By referring to the drawings to the description of the embodiment of the present invention, the above and other purposes of the present invention, feature and
Advantage will be apparent from, in the accompanying drawings:
Fig. 1 is the flow chart of the identity identifying method of first embodiment of the invention;
Fig. 2 is the flow chart of the identity identifying method of second embodiment of the invention;
Fig. 3 is the schematic diagram of the identification authentication system of the embodiment of the present invention;
Fig. 4 is the schematic diagram of the electronic equipment of the embodiment of the present invention.
Specific embodiment
Below based on embodiment, present invention is described, but the present invention is not restricted to these embodiments.Under
Text is detailed to describe some specific detail sections in datail description of the invention.Do not have for a person skilled in the art
The present invention can also be understood completely in the description of these detail sections.In order to avoid obscuring essence of the invention, well known method, mistake
There is no narrations in detail for journey, process, element and circuit.
In addition, it should be understood by one skilled in the art that provided herein attached drawing be provided to explanation purpose, and
What attached drawing was not necessarily drawn to scale.
Unless the context clearly requires otherwise, "include", "comprise" otherwise throughout the specification and claims etc. are similar
Word should be construed as the meaning for including rather than exclusive or exhaustive meaning;That is, be " including but not limited to " contains
Justice.
In the description of the present invention, it is to be understood that, term " first ", " second " etc. are used for description purposes only, without
It can be interpreted as indication or suggestion relative importance.In addition, in the description of the present invention, unless otherwise indicated, the meaning of " multiple "
It is two or more.
Fig. 1 is the flow chart of the identity identifying method of first embodiment of the invention.As shown in Figure 1, the identity of the present embodiment
Authentication method the following steps are included:
Step S110, in response to the ID authentication request of user, acquisition obtains the image and identity information of user.In one kind
In optional implementation, portrait photo and the identity card picture of user are acquired by acquisition equipment (such as camera), is passed through
The text information (name, gender, date of birth etc.) on identity card picture is parsed to obtain identity information.
Step S120, the ID authentication request in response to user are not to authenticate for the first time, calculate the image and this map of acquisition
As the similarity of the image of the user in library.Wherein, sentence in local identity information library there are when the identity information of the user
The fixed user is not to authenticate for the first time.
Step S130 is greater than first threshold in response to similarity, determines user identity authentication success.Wherein, the first threshold
Value is adjusted according to the authentication state of user, and the authentication state of user includes certification request address and/or certification request frequency.
The similarity of the image of the user in image and local image library of the present embodiment by obtaining the user of acquisition, and
Determine that the user passes through authentication when the similarity is greater than first threshold, wherein pass through the authentication state tune of user
The first threshold is saved, so that certification thresholding is improved in the certification request exception of user, in the history authentication record of user
Certification thresholding is reduced when good improves the safety and reliability of system thus, it is possible to reduce the authentication error rate of system.
Fig. 2 is the flow chart of the identity identifying method of second embodiment of the invention.As shown in Fig. 2, the identity of the present embodiment
Authentication method the following steps are included:
Step S210, in response to the ID authentication request of user, acquisition obtains the image and identity information of user.In one kind
In optional implementation, portrait photo and the identity card picture of user are acquired by acquisition equipment (such as camera), is passed through
The text information (name, gender, date of birth etc.) on identity card picture is parsed to obtain identity information.
Step S220 judges whether the ID authentication request of the user is to initiate certification request for the first time.A kind of optional
In implementation, the matched information of identity information for having with the user is searched whether in local identity information library, if not depositing
With the matched information of the identity information of the user, then determine that the user is to initiate certification request for the first time, execute step S230.If
There is the matched information of identity information with the user in local identity information library, then determining the user not is to initiate certification for the first time
Request executes step S260.
Step S230 sends the image of acquisition and the identity information of the user when user initiates certification request for the first time
It is authenticated to Identity Management departmental terminals.In an optional implementation manner, the portrait photo of the user based on acquisition is generated
The image for the size for meeting Identity Management agencies dictate and the identity information of the user be sent to Identity Management departmental terminals
It is authenticated.
Step S240 obtains the authentication result of Identity Management departmental terminals.Specifically, Identity Management departmental terminals are according to this
The image information and identity information of user carries out authentication, and return authentication result to the user.Wherein, in Identity Management portion
When door terminal authentication passes through, user identity authentication success is determined, when Identity Management departmental terminals are not verified, determining should
User identity authentication failure.
Step S250 carries out the image of the user of acquisition and identity information in response to user identity authentication success
Binding, and the image of the user of acquisition is stored to local image library, the identity information of the user is stored to local identity
Information bank.
Step S260 calculates the image and local image of the user of acquisition when user is not to initiate certification request for the first time
The similarity of the image stored in library.In an optional implementation manner, by the identity information of the user in local body
Corresponding identity information is inquired in part information bank, and then bound therewith according to the identity information lookup in local identity image library
Image in local image library.
Step S270 is greater than first threshold in response to similarity, determines user identity authentication success.Wherein, the first threshold
Value is adjusted according to the authentication state of user, and the authentication state of user includes certification request address and/or certification request frequency.By
This, certification thresholding can be improved in the ID authentication request exception of user, is reduced when the history authentication record of user is good
It authenticates thresholding and improves the safety and reliability of system thus, it is possible to reduce the authentication error rate of system.
Optionally, in user's authentication for the first time, the identity information of user includes on the identity card picture by parsing
Text information (name, gender, date of birth, household register etc.) and the information such as user name, contact method, be not body for the first time in user
When part certification, the identity information of user can only include text information, user name and correspondent party on the identity card picture of parsing
Formula etc. one therein.
In an optional implementation manner, the identity identifying method of the present embodiment further comprises the steps of:
White list or blacklist is added in the user according to preset rules based on the authentication state of user.For example, will go through
Authentication history records good user (such as each authentication once just authenticates successfully substantially) and white list is added, by certification request
Frequency is very high or continuous several times are really requested or certification request address is in user's addition blacklist of strange address.
Further, the identity identifying method of the present embodiment further comprises the steps of:
It is in white list in response to the user, adjusting first threshold is the first value.Blacklist is in response to the user
In, adjusting the first threshold is second value.Wherein, second value is greater than first value.Thus, it is possible to which the identity in user is recognized
Card request improves certification thresholding when abnormal, reduce certification thresholding, when the history authentication record of user is good to reduce system
Authentication error rate improves the safety and reliability of system.
In another optional implementation, the identity identifying method of the present embodiment is further comprised the steps of:
The certification request address of continuous certification request and/or user in response to the user is strange address, increases first
Threshold value.In the present embodiment, it can be applicable according to the authentication state dynamic regulation first threshold of user with further increasing system
Property.For example, adjusting first threshold is third value when user carries out certification request using strange address for the first time.It is more in user
When the strange address frequent progress certification request of secondary use, adjusting first threshold is the 4th value.Wherein, third value is greater than the first value,
Third value is less than the 4th value.
In an optional implementation manner, the identity identifying method of the present embodiment further comprises the steps of:
In response to user identity authentication success, the image of the user of acquisition is stored into local image library.As a result, originally
Ground image library includes the multiple images of user.
Further, the identity identifying method of the present embodiment further comprises the steps of:
When the ID authentication request of user is not to authenticate for the first time, calculate the image of the user of acquisition respectively with this map
As the similarity of the image of multiple users in library.Optionally, predetermined of the user in local image library is randomly selected
Image.
It is greater than first threshold in response at least one similarity, determines user identity authentication success.It is adopted that is, comparing
The image similarity and first threshold with the image of multiple users in local image library respectively of the user of collection, as long as adopting
The similarity of the image of the user of collection and the image of the user in local image library is greater than first threshold, then determining should
User identity authentication success.Thus, it is possible to avoid image angle problem or sharpness problems due to this acquisition and cause body
The problem of part authentification failure, false rejection rate is further reduced, avoids user from being repeated as many times and acquire image, improve system
Dependable with function.Wherein, False Rejects should actually authenticate successfully and system display authentification failure for characterizing.
In an optional implementation manner, the identity identifying method of the present embodiment further comprises the steps of:
In response to local image authentication engine failure, the image of the user of acquisition and identity information are sent to Identity Management
Departmental terminals are authenticated.The authentication result for receiving Identity Management departmental terminals authenticates logical in response to Identity Management departmental terminals
It crosses, determines user identity authentication success.The present embodiment carries out authentication using two kinds of engines as a result, further improves
The dependable with function of system.
It in an optional implementation manner, is originally the identity identifying method of embodiment further include:
Local image authentication engine and administrative department's authentication engine are periodically checked to ensure that mutually local image authentication engine
With the certification accuracy of administrative department authentication engine.Wherein, local image authentication engine is used for according to local image library and local
Identity information library carries out authentication.Administrative department's authentication engine is connect with Identity Management departmental terminals, for sending acquisition
Image information and identity information, and receive the authentication result of Identity Management department.Specifically, multiple positive samples and multiple negative are obtained
Sample.Wherein, positive sample is the user images information being mutually matched and identity information, and negative sample is mutually unmatched user's figure
As information and identity information.Local image authentication engine and administrative department's engine is respectively adopted, body is carried out to positive sample and negative sample
Part certification, if the identity authentication result of two authentication engines is identical, and meets with actual conditions, then two authentication engines are currently located
In serviceable condition.If the identity authentication result of two authentication engines is not identical, or with actual conditions mismatch, then at least one
There are failures for authentication engine.As a result, by inspecting periodically authentication engine, guarantees the certification accuracy of authentication engine, further mention
The high reliability of system.
Fig. 3 is the schematic diagram of the identification authentication system of the embodiment of the present invention.As shown in figure 3, the authentication of the present embodiment
Device 3 includes local image authentication engine 31 and administrative department's authentication engine 32.Wherein, local image authentication engine 31 is configured
To carry out authentication according to local image library and local identity information library.Administrative department's authentication engine 32 and Identity Management department
Terminal 2 connects, and is configured as the image information of user and identity information being sent to Identity Management departmental terminals 2, so that body
Part administrative department terminal 2 completes the authentication for the first time of user, and receives authentication result.
Local image authentication engine 31 include information acquisition unit 311, judging unit 312, similarity calculated 313 with
And judging unit 316.Wherein, information acquisition unit 311 is configured as the image and identity information that acquisition obtains user.Judgement is single
Member 312 is configured as judging whether the ID authentication request of user is to authenticate for the first time.In the present embodiment, in local identity information
It there are the ID authentication request for when identity information of user, determining user is not to authenticate for the first time in library.
The ID authentication request that similarity calculated 313 is configured to respond to user is not to authenticate for the first time, and calculating is adopted
The similarity of the image of collection and the image of the user in local image library.It is big that judging unit 316 is configured to respond to similarity
In first threshold, user identity authentication success is determined.Wherein, first threshold is adjusted according to the authentication state of user, and user's recognizes
Card state includes certification request address and/or certification request frequency.
The similarity of the image of the user in image and local image library of the present embodiment by obtaining the user of acquisition, and
Determine that the user passes through authentication when the similarity is greater than first threshold, wherein pass through the authentication state tune of user
The first threshold is saved, so that certification thresholding is improved in the certification request exception of user, in the history authentication record of user
Certification thresholding is reduced when good improves the safety and reliability of system thus, it is possible to reduce the authentication error rate of system.
Optionally, local image authentication engine 31 further includes black and white lists confirmation unit 314, is configured as based on user's
According to preset rules white list or blacklist is added in the user by authentication state.
Optionally, local image authentication engine 31 further includes that threshold value adjusts unit 315, is configured to respond to user and is in
In white list, adjusting first threshold is the first value, is in blacklist in response to user, and adjusting first threshold is second value.Its
In, second value is greater than first value.Thus, it is possible to certification thresholding be improved in the certification request exception of user, user's
Certification thresholding is reduced when history authentication record is good, to reduce the authentication error rate of system, improves the safety of system and reliable
Property.
Optionally, threshold value adjusts unit 315 and is additionally configured in response to the continuous certification request of user and/or recognizing for user
Card request address is strange address, increases first threshold.In the present embodiment, threshold value adjusting unit 315 can be according to user's
Authentication state dynamic regulation first threshold, to further increase system suitability.For example, using strange address for the first time in user
When carrying out certification request, it is third value that threshold value, which adjusts unit 315 and adjusts first threshold,.It is frequent that strange address is employed many times in user
When carrying out certification request, it is the 4th value that threshold value, which adjusts unit 315 and adjusts first threshold,.Wherein, third value is greater than the first value, third
Value is less than the 4th value.
Optionally, local image authentication engine 31 further includes the first storage unit 317, is configured to respond to the user
Authentication success stores the image of acquisition into the local image library.Local image library includes the more of the user as a result,
A image.Further, similarity calculated 313 is additionally configured to not be to recognize for the first time in response to the ID authentication request of user
Card calculates the image of the user of the acquisition similarity with the image of multiple users in local image library respectively.Determine single
Member 316 is additionally configured to be greater than first threshold in response at least one similarity, determines user identity authentication success.Namely
It says, in the present embodiment, as long as the image of the user of acquisition is similar to the image of the user in local image library
Degree is greater than first threshold, then determines user identity authentication success.Thus, it is possible to which the image angle due to this acquisition is avoided to ask
Topic or sharpness problems and the problem of cause authentication to fail, further reduce false rejection rate, avoid user from repeating more
Secondary acquisition image, improves the dependable with function of system.Wherein, False Rejects should actually authenticate success for characterizing
And system shows authentification failure.
Administrative department's authentication engine 32 includes that information transmitting unit 321, authentication result receiving unit 322 and the second storage are single
Member 323.
The ID authentication request that information transmitting unit 321 is configured to respond to user is to authenticate for the first time, by the use of acquisition
The image and identity information at family are sent to the certification of Identity Management departmental terminals 2, so that Identity Management departmental terminals 2 are to the user
Carry out authentication.Authentication result receiving unit 322 is configured as receiving the corresponding authentication result of the user.Second storage unit
323 are configured to respond to the certification that the user passes through Identity Management departmental terminals, and the user images of acquisition and identity are believed
Breath is bound, and the image of the user of acquisition and identity information are stored to local identity information library and local image library 1.
Optionally, the identification authentication system 3 of the present embodiment further includes mutual inspection unit 33, is configured such that local image is recognized
Card engine 31 and administrative department's authentication engine 32 are periodically checked to ensure that mutually local image authentication engine 31 and administrative department are recognized
Demonstrate,prove the certification accuracy of engine 32.
Fig. 4 is the schematic diagram of the electronic equipment of the embodiment of the present invention.Electronic equipment shown in Fig. 4 is general data processing dress
It sets comprising general computer hardware structure includes at least processor 41 and memory 42.Processor 41 and memory 42
It is connected by bus 43.Memory 42 is suitable for the instruction or program that storage processor 41 can be performed.Processor 41 can be independence
Microprocessor, be also possible to one or more microprocessor set.Processor 41 is deposited by executing memory 42 as a result,
The instruction of storage is realized thereby executing the method flow of the embodiment of the present application as described above for the processing of data and for other
The control of device.Bus 43 links together above-mentioned multiple components, while said modules are connected to 44 He of display controller
Display device and input/output (I/O) device 45.Input/output (I/O) device 45 can be mouse, keyboard, modulation /demodulation
Device, network interface, touch-control input device, body-sensing input unit, printer and other devices well known in the art.Typically,
Input/output device 45 is connected by input/output (I/O) controller 46 with system.
It will be understood by those skilled in the art that embodiments herein can provide as method or computer program product.This
Application can be used one or more wherein include computer usable program code computer readable storage medium (including but
Be not limited to magnetic disk storage, CD-ROM, optical memory etc.) on the computer program product implemented.
The application is that reference is described according to the flow chart of the method for the embodiment of the present application and computer program product.
It should be understood that each process in flow chart can be realized by computer program instructions.
These computer program instructions, which can store, is being able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
The manufacture of device is enabled, the function of specifying in one process of the command device implementation flow chart or multiple processes.
The embodiment of the present invention further relates to a kind of non-volatile memory medium, for storing computer-readable program, the meter
Calculation machine readable program is used to execute above-mentioned all or part of embodiment of the method for computer.That is, those skilled in the art can be with
Understand, implementing the method for the above embodiments is that can instruct relevant hardware come complete by program
At the program is stored in a storage medium, including some instructions are used so that an equipment (can be single-chip microcontroller, chip
Deng) or processor (processor) execute each embodiment the method for the application all or part of the steps.And storage above-mentioned
Medium include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnlB MemorB), random access memory (RAM,
Random Access MemorB), the various media that can store program code such as magnetic or disk.
The above description is only a preferred embodiment of the present invention, is not intended to restrict the invention, for those skilled in the art
For, the invention can have various changes and changes.All any modifications made within the spirit and principles of the present invention are equal
Replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of identity identifying method, which is characterized in that the described method includes:
In response to the ID authentication request of user, acquisition obtains the image and identity information of the user;
ID authentication request in response to the user is not to authenticate for the first time, is calculated in the described image and local image library of acquisition
The user image similarity;
It is greater than first threshold in response to the similarity, determines the user identity authentication success, the first threshold is according to institute
The authentication state for stating user is adjusted, and the authentication state of the user includes certification request address and/or certification request frequency;
Wherein, determine that the authentication of the user is asked there are when the identity information of the user in local identity information library
Ask is not to authenticate for the first time.
2. the method according to claim 1, wherein the method also includes:
ID authentication request in response to the user is to authenticate for the first time, and the described image of acquisition and the identity information are sent
It is authenticated to Identity Management departmental terminals;
In response to the user by the certification of the Identity Management departmental terminals, the described image of acquisition and the identity are believed
Breath is bound, and the described image of acquisition is stored to local image library, and the identity information is stored to local identity and is believed
Cease library.
3. the method according to claim 1, wherein the method also includes:
According to preset rules white list or blacklist is added in the user by the authentication state based on the user.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
It is in the white list in response to the user, adjusting the first threshold is the first value;
It is in the blacklist in response to the user, adjusting the first threshold is second value;
Wherein, the second value is greater than first value.
5. the method according to claim 1, wherein the method also includes:
The ID authentication request address of continuous ID authentication request and/or the user in response to the user is fremdly
Location increases the first threshold.
6. the method according to claim 1, wherein the method also includes:
In response to user identity authentication success, the described image of acquisition is stored into the local image library.
7. according to the method described in claim 6, it is characterized in that, the local image library includes multiple figures of the user
Picture, the method also includes:
ID authentication request in response to the user is not to authenticate for the first time, calculate the image of the user of acquisition respectively with institute
State the similarity of the image of multiple users in local image library;
It is greater than the first threshold in response to similarity described at least one, determines the user identity authentication success.
8. the method according to claim 1, wherein the method also includes:
In response to local image authentication engine failure, the described image of acquisition and identity information are sent to Identity Management department end
End is authenticated;
Pass through in response to Identity Management departmental terminals certification, determines the user identity authentication success.
9. a kind of electronic equipment, which is characterized in that including memory and processor, wherein the memory is for storing one
Or a plurality of computer instruction, one or more computer instruction are executed by the processor to realize in claim 1-8
Described in any item methods.
10. a kind of computer readable storage medium, stores computer program instructions thereon, which is characterized in that the computer journey
Such as method of any of claims 1-8 is realized in sequence instruction when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910390192.4A CN110135326B (en) | 2019-05-10 | 2019-05-10 | Identity authentication method, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910390192.4A CN110135326B (en) | 2019-05-10 | 2019-05-10 | Identity authentication method, electronic equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110135326A true CN110135326A (en) | 2019-08-16 |
CN110135326B CN110135326B (en) | 2021-10-29 |
Family
ID=67573490
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910390192.4A Active CN110135326B (en) | 2019-05-10 | 2019-05-10 | Identity authentication method, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110135326B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199655A (en) * | 2020-09-30 | 2021-01-08 | 联想(北京)有限公司 | Application control method and device and electronic equipment |
CN113129525A (en) * | 2020-01-13 | 2021-07-16 | 德国邮政股份公司 | Method and apparatus for authenticating a user of a storage compartment device |
CN113469015A (en) * | 2021-06-29 | 2021-10-01 | 浙江大华技术股份有限公司 | Face recognition method and device, electronic equipment and computer storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101226653A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Rapid go-aboard system and method based on id card and biological characteristic recognition technique |
CN101770613A (en) * | 2010-01-19 | 2010-07-07 | 北京智慧眼科技发展有限公司 | Social insurance identity authentication method based on face recognition and living body detection |
CN102663443A (en) * | 2012-03-27 | 2012-09-12 | 中国科学院自动化研究所 | Biological characteristic identification method based on image disturbance and correlation filtering |
US20140079299A1 (en) * | 2012-09-20 | 2014-03-20 | Kabushiki Kaisha Toshiba | Person recognition apparatus and method thereof |
CN105468955A (en) * | 2015-12-28 | 2016-04-06 | 深圳市亚略特生物识别科技有限公司 | Mobile terminal and electronic system based on biological recognition |
CN105654048A (en) * | 2015-12-30 | 2016-06-08 | 四川川大智胜软件股份有限公司 | Multi-visual-angle face comparison method |
CN108280332A (en) * | 2017-12-15 | 2018-07-13 | 阿里巴巴集团控股有限公司 | The biological characteristic authentication recognition detection method, apparatus and equipment of mobile terminal |
CN108471400A (en) * | 2018-02-07 | 2018-08-31 | 阿里巴巴集团控股有限公司 | Method for authenticating, apparatus and system |
CN108573203A (en) * | 2017-03-17 | 2018-09-25 | 北京旷视科技有限公司 | Identity identifying method and device and storage medium |
-
2019
- 2019-05-10 CN CN201910390192.4A patent/CN110135326B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101226653A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Rapid go-aboard system and method based on id card and biological characteristic recognition technique |
CN101770613A (en) * | 2010-01-19 | 2010-07-07 | 北京智慧眼科技发展有限公司 | Social insurance identity authentication method based on face recognition and living body detection |
CN102663443A (en) * | 2012-03-27 | 2012-09-12 | 中国科学院自动化研究所 | Biological characteristic identification method based on image disturbance and correlation filtering |
US20140079299A1 (en) * | 2012-09-20 | 2014-03-20 | Kabushiki Kaisha Toshiba | Person recognition apparatus and method thereof |
CN105468955A (en) * | 2015-12-28 | 2016-04-06 | 深圳市亚略特生物识别科技有限公司 | Mobile terminal and electronic system based on biological recognition |
CN105654048A (en) * | 2015-12-30 | 2016-06-08 | 四川川大智胜软件股份有限公司 | Multi-visual-angle face comparison method |
CN108573203A (en) * | 2017-03-17 | 2018-09-25 | 北京旷视科技有限公司 | Identity identifying method and device and storage medium |
CN108280332A (en) * | 2017-12-15 | 2018-07-13 | 阿里巴巴集团控股有限公司 | The biological characteristic authentication recognition detection method, apparatus and equipment of mobile terminal |
CN108471400A (en) * | 2018-02-07 | 2018-08-31 | 阿里巴巴集团控股有限公司 | Method for authenticating, apparatus and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113129525A (en) * | 2020-01-13 | 2021-07-16 | 德国邮政股份公司 | Method and apparatus for authenticating a user of a storage compartment device |
CN113129525B (en) * | 2020-01-13 | 2024-07-23 | 德国邮政股份公司 | Method and apparatus for authenticating a user of a storage compartment device |
CN112199655A (en) * | 2020-09-30 | 2021-01-08 | 联想(北京)有限公司 | Application control method and device and electronic equipment |
CN113469015A (en) * | 2021-06-29 | 2021-10-01 | 浙江大华技术股份有限公司 | Face recognition method and device, electronic equipment and computer storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110135326B (en) | 2021-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7279973B2 (en) | Identification method, device and server in designated point authorization | |
KR102098441B1 (en) | Identity authentication by using human biological characteristics | |
US10812479B2 (en) | Authenticating a user via multiple biometric inputs | |
US20160269411A1 (en) | System and Method for Anonymous Biometric Access Control | |
CN108011863B (en) | Method and device for identifying brute force cracking | |
US8607319B2 (en) | Methods and systems for determining biometric data for use in authentication transactions | |
EP0953183B1 (en) | Security apparatus and method | |
CN105100108B (en) | A kind of login authentication method based on recognition of face, apparatus and system | |
US11824851B2 (en) | Identification document database | |
EP3482545A1 (en) | Step-up authentication | |
CN110135326A (en) | A kind of identity identifying method, electronic equipment and computer readable storage medium | |
CN109285234A (en) | Human face identification work-attendance checking method, device, computer installation and storage medium | |
CN110288755A (en) | The invoice method of inspection, server and storage medium based on text identification | |
US11698956B2 (en) | Open data biometric identity validation | |
US20180063128A1 (en) | Method for automatically deleting a user password upon successful use of a multi-factor authentication modality | |
CN106846623A (en) | A kind of bank card business dealing for self-service device processes method and self-service device | |
CN109766678B (en) | Fingerprint identification authentication method, system, medium and equipment for mobile terminal equipment | |
US12021896B2 (en) | Method for detecting webpage spoofing attacks | |
CN105099700A (en) | Authentication method, authentication server, and system | |
CN113239333A (en) | Browser user identity authentication method and system based on cross-domain resource access | |
KR101056307B1 (en) | Multiline Reliability Support Hybrid Online Signature Verification System and Its Method for Various Applications | |
EP4209941A1 (en) | Method and system of predictive document verification and machine learning therefor | |
CN111460422B (en) | Method and device for generating verification code | |
CN117742626B (en) | Multi-factor authentication cloud printer access control method and related device | |
CN113986956B (en) | Data exception query analysis method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |