CN110135326A - A kind of identity identifying method, electronic equipment and computer readable storage medium - Google Patents

A kind of identity identifying method, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN110135326A
CN110135326A CN201910390192.4A CN201910390192A CN110135326A CN 110135326 A CN110135326 A CN 110135326A CN 201910390192 A CN201910390192 A CN 201910390192A CN 110135326 A CN110135326 A CN 110135326A
Authority
CN
China
Prior art keywords
user
authentication
identity
image
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910390192.4A
Other languages
Chinese (zh)
Other versions
CN110135326B (en
Inventor
钏助斌
李伊潇
杨浩
邬桐
叶胜国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Department Of Information Technology (shanghai) Co Ltd
Original Assignee
Department Of Information Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Department Of Information Technology (shanghai) Co Ltd filed Critical Department Of Information Technology (shanghai) Co Ltd
Priority to CN201910390192.4A priority Critical patent/CN110135326B/en
Publication of CN110135326A publication Critical patent/CN110135326A/en
Application granted granted Critical
Publication of CN110135326B publication Critical patent/CN110135326B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the invention discloses a kind of identity identifying methods, electronic equipment and computer readable storage medium, the similarity of the image of the user in image and local image library by obtaining the user of acquisition, and determine that the user passes through authentication when the similarity is greater than first threshold, wherein, the first threshold is adjusted by the authentication state of user, so that improving certification thresholding in the ID authentication request exception of user, certification thresholding is reduced when the history authentication record of user is good, thus, the authentication error rate of system can be reduced, the safety and reliability of raising system.

Description

A kind of identity identifying method, electronic equipment and computer readable storage medium
Technical field
The present invention relates to field of computer technology, more particularly, to a kind of identity identifying method, electronic equipment and calculating Machine readable storage medium storing program for executing.
Background technique
With the development that financial technology is swift and violent, increasingly prominent security risk also proposes Internet application higher and higher Requirement.Authentication is first of security perimeter of Internet application, and the authentication mode security intensity based on password is low, easy It is by dictionary attack and unfriendly to user, and there is also not readily portable and make for the two-factor authentications such as traditional UKEY mode The problems such as using.How using authentications such as emerging bio-identification, Activity recognitions, found between safety and convenience One better equalization point has become the hot spot of every profession and trade research and application.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of identity identifying method, electronic equipment and computer-readable storage medium Matter improves the safety and reliability of system to reduce the authentication error rate of system.
In a first aspect, the present embodiment provides a kind of identity identifying methods, which comprises
In response to the ID authentication request of user, acquisition obtains the image and identity information of the user;
ID authentication request in response to the user is not to authenticate for the first time, calculates the described image and local image of acquisition The similarity of the image of the user in library;
It is greater than first threshold in response to the similarity, determines the user identity authentication success, the first threshold root It is adjusted according to the authentication state of the user, the authentication state of the user includes certification request address and/or certification request frequency;
Wherein, determine that the identity of the user is recognized there are when the identity information of the user in local identity information library Card request is not to authenticate for the first time.
Further, the method also includes:
ID authentication request in response to the user is to authenticate for the first time, by the described image of acquisition and the identity information It is sent to the certification of Identity Management departmental terminals;
In response to the user by the certification of the Identity Management departmental terminals, by the described image of acquisition and the body Part information is bound, and the described image of acquisition is stored to local image library, and the identity information is stored to local body Part information bank.
Further, the method also includes:
According to preset rules white list or blacklist is added in the user by the authentication state based on the user.
Further, the method also includes:
It is in the white list in response to the user, adjusting the first threshold is the first value;
It is in the blacklist in response to the user, adjusting the first threshold is second value;
Wherein, the second value is greater than first value.
Further, the method also includes:
The ID authentication request address of continuous ID authentication request and/or the user in response to the user is strange Address increases the first threshold.
Further, the method also includes:
In response to user identity authentication success, the described image of acquisition is stored into the local image library.
Further, the local image library includes the multiple images of the user, the method also includes:
ID authentication request in response to the user is not to authenticate for the first time, calculates the image difference of the user of acquisition With the similarity of the image of multiple users in the local image library;
It is greater than the first threshold in response to similarity described at least one, determines the user identity authentication success.
Further, the method also includes:
In response to local image authentication engine failure, the described image of acquisition and identity information are sent to Identity Management portion Door terminal is authenticated;
Pass through in response to Identity Management departmental terminals certification, determines the user identity authentication success.
Second aspect, the embodiment of the present invention provide a kind of electronic equipment, including memory and processor, wherein described to deposit Reservoir is executed for storing one or more computer instruction, one or more computer instruction by the processor with reality Now method as described above.
The third aspect, the embodiment of the present invention provide a kind of computer readable storage medium, store computer program thereon and refer to It enables, the computer program instructions realize method as described above when being executed by processor.
The embodiment of the invention discloses a kind of identity identifying method, electronic equipment and computer readable storage mediums, pass through The similarity of the image of the user in the image and local image library of the user of acquisition is obtained, and is greater than first in the similarity Determine that the user passes through authentication when threshold value, wherein the first threshold is adjusted by the authentication state of user, so that Certification thresholding is improved in the certification request exception of user, and certification thresholding is reduced when the history authentication record of user is good, by This, can reduce the authentication error rate of system, improve the safety and reliability of system.
Detailed description of the invention
By referring to the drawings to the description of the embodiment of the present invention, the above and other purposes of the present invention, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 is the flow chart of the identity identifying method of first embodiment of the invention;
Fig. 2 is the flow chart of the identity identifying method of second embodiment of the invention;
Fig. 3 is the schematic diagram of the identification authentication system of the embodiment of the present invention;
Fig. 4 is the schematic diagram of the electronic equipment of the embodiment of the present invention.
Specific embodiment
Below based on embodiment, present invention is described, but the present invention is not restricted to these embodiments.Under Text is detailed to describe some specific detail sections in datail description of the invention.Do not have for a person skilled in the art The present invention can also be understood completely in the description of these detail sections.In order to avoid obscuring essence of the invention, well known method, mistake There is no narrations in detail for journey, process, element and circuit.
In addition, it should be understood by one skilled in the art that provided herein attached drawing be provided to explanation purpose, and What attached drawing was not necessarily drawn to scale.
Unless the context clearly requires otherwise, "include", "comprise" otherwise throughout the specification and claims etc. are similar Word should be construed as the meaning for including rather than exclusive or exhaustive meaning;That is, be " including but not limited to " contains Justice.
In the description of the present invention, it is to be understood that, term " first ", " second " etc. are used for description purposes only, without It can be interpreted as indication or suggestion relative importance.In addition, in the description of the present invention, unless otherwise indicated, the meaning of " multiple " It is two or more.
Fig. 1 is the flow chart of the identity identifying method of first embodiment of the invention.As shown in Figure 1, the identity of the present embodiment Authentication method the following steps are included:
Step S110, in response to the ID authentication request of user, acquisition obtains the image and identity information of user.In one kind In optional implementation, portrait photo and the identity card picture of user are acquired by acquisition equipment (such as camera), is passed through The text information (name, gender, date of birth etc.) on identity card picture is parsed to obtain identity information.
Step S120, the ID authentication request in response to user are not to authenticate for the first time, calculate the image and this map of acquisition As the similarity of the image of the user in library.Wherein, sentence in local identity information library there are when the identity information of the user The fixed user is not to authenticate for the first time.
Step S130 is greater than first threshold in response to similarity, determines user identity authentication success.Wherein, the first threshold Value is adjusted according to the authentication state of user, and the authentication state of user includes certification request address and/or certification request frequency.
The similarity of the image of the user in image and local image library of the present embodiment by obtaining the user of acquisition, and Determine that the user passes through authentication when the similarity is greater than first threshold, wherein pass through the authentication state tune of user The first threshold is saved, so that certification thresholding is improved in the certification request exception of user, in the history authentication record of user Certification thresholding is reduced when good improves the safety and reliability of system thus, it is possible to reduce the authentication error rate of system.
Fig. 2 is the flow chart of the identity identifying method of second embodiment of the invention.As shown in Fig. 2, the identity of the present embodiment Authentication method the following steps are included:
Step S210, in response to the ID authentication request of user, acquisition obtains the image and identity information of user.In one kind In optional implementation, portrait photo and the identity card picture of user are acquired by acquisition equipment (such as camera), is passed through The text information (name, gender, date of birth etc.) on identity card picture is parsed to obtain identity information.
Step S220 judges whether the ID authentication request of the user is to initiate certification request for the first time.A kind of optional In implementation, the matched information of identity information for having with the user is searched whether in local identity information library, if not depositing With the matched information of the identity information of the user, then determine that the user is to initiate certification request for the first time, execute step S230.If There is the matched information of identity information with the user in local identity information library, then determining the user not is to initiate certification for the first time Request executes step S260.
Step S230 sends the image of acquisition and the identity information of the user when user initiates certification request for the first time It is authenticated to Identity Management departmental terminals.In an optional implementation manner, the portrait photo of the user based on acquisition is generated The image for the size for meeting Identity Management agencies dictate and the identity information of the user be sent to Identity Management departmental terminals It is authenticated.
Step S240 obtains the authentication result of Identity Management departmental terminals.Specifically, Identity Management departmental terminals are according to this The image information and identity information of user carries out authentication, and return authentication result to the user.Wherein, in Identity Management portion When door terminal authentication passes through, user identity authentication success is determined, when Identity Management departmental terminals are not verified, determining should User identity authentication failure.
Step S250 carries out the image of the user of acquisition and identity information in response to user identity authentication success Binding, and the image of the user of acquisition is stored to local image library, the identity information of the user is stored to local identity Information bank.
Step S260 calculates the image and local image of the user of acquisition when user is not to initiate certification request for the first time The similarity of the image stored in library.In an optional implementation manner, by the identity information of the user in local body Corresponding identity information is inquired in part information bank, and then bound therewith according to the identity information lookup in local identity image library Image in local image library.
Step S270 is greater than first threshold in response to similarity, determines user identity authentication success.Wherein, the first threshold Value is adjusted according to the authentication state of user, and the authentication state of user includes certification request address and/or certification request frequency.By This, certification thresholding can be improved in the ID authentication request exception of user, is reduced when the history authentication record of user is good It authenticates thresholding and improves the safety and reliability of system thus, it is possible to reduce the authentication error rate of system.
Optionally, in user's authentication for the first time, the identity information of user includes on the identity card picture by parsing Text information (name, gender, date of birth, household register etc.) and the information such as user name, contact method, be not body for the first time in user When part certification, the identity information of user can only include text information, user name and correspondent party on the identity card picture of parsing Formula etc. one therein.
In an optional implementation manner, the identity identifying method of the present embodiment further comprises the steps of:
White list or blacklist is added in the user according to preset rules based on the authentication state of user.For example, will go through Authentication history records good user (such as each authentication once just authenticates successfully substantially) and white list is added, by certification request Frequency is very high or continuous several times are really requested or certification request address is in user's addition blacklist of strange address.
Further, the identity identifying method of the present embodiment further comprises the steps of:
It is in white list in response to the user, adjusting first threshold is the first value.Blacklist is in response to the user In, adjusting the first threshold is second value.Wherein, second value is greater than first value.Thus, it is possible to which the identity in user is recognized Card request improves certification thresholding when abnormal, reduce certification thresholding, when the history authentication record of user is good to reduce system Authentication error rate improves the safety and reliability of system.
In another optional implementation, the identity identifying method of the present embodiment is further comprised the steps of:
The certification request address of continuous certification request and/or user in response to the user is strange address, increases first Threshold value.In the present embodiment, it can be applicable according to the authentication state dynamic regulation first threshold of user with further increasing system Property.For example, adjusting first threshold is third value when user carries out certification request using strange address for the first time.It is more in user When the strange address frequent progress certification request of secondary use, adjusting first threshold is the 4th value.Wherein, third value is greater than the first value, Third value is less than the 4th value.
In an optional implementation manner, the identity identifying method of the present embodiment further comprises the steps of:
In response to user identity authentication success, the image of the user of acquisition is stored into local image library.As a result, originally Ground image library includes the multiple images of user.
Further, the identity identifying method of the present embodiment further comprises the steps of:
When the ID authentication request of user is not to authenticate for the first time, calculate the image of the user of acquisition respectively with this map As the similarity of the image of multiple users in library.Optionally, predetermined of the user in local image library is randomly selected Image.
It is greater than first threshold in response at least one similarity, determines user identity authentication success.It is adopted that is, comparing The image similarity and first threshold with the image of multiple users in local image library respectively of the user of collection, as long as adopting The similarity of the image of the user of collection and the image of the user in local image library is greater than first threshold, then determining should User identity authentication success.Thus, it is possible to avoid image angle problem or sharpness problems due to this acquisition and cause body The problem of part authentification failure, false rejection rate is further reduced, avoids user from being repeated as many times and acquire image, improve system Dependable with function.Wherein, False Rejects should actually authenticate successfully and system display authentification failure for characterizing.
In an optional implementation manner, the identity identifying method of the present embodiment further comprises the steps of:
In response to local image authentication engine failure, the image of the user of acquisition and identity information are sent to Identity Management Departmental terminals are authenticated.The authentication result for receiving Identity Management departmental terminals authenticates logical in response to Identity Management departmental terminals It crosses, determines user identity authentication success.The present embodiment carries out authentication using two kinds of engines as a result, further improves The dependable with function of system.
It in an optional implementation manner, is originally the identity identifying method of embodiment further include:
Local image authentication engine and administrative department's authentication engine are periodically checked to ensure that mutually local image authentication engine With the certification accuracy of administrative department authentication engine.Wherein, local image authentication engine is used for according to local image library and local Identity information library carries out authentication.Administrative department's authentication engine is connect with Identity Management departmental terminals, for sending acquisition Image information and identity information, and receive the authentication result of Identity Management department.Specifically, multiple positive samples and multiple negative are obtained Sample.Wherein, positive sample is the user images information being mutually matched and identity information, and negative sample is mutually unmatched user's figure As information and identity information.Local image authentication engine and administrative department's engine is respectively adopted, body is carried out to positive sample and negative sample Part certification, if the identity authentication result of two authentication engines is identical, and meets with actual conditions, then two authentication engines are currently located In serviceable condition.If the identity authentication result of two authentication engines is not identical, or with actual conditions mismatch, then at least one There are failures for authentication engine.As a result, by inspecting periodically authentication engine, guarantees the certification accuracy of authentication engine, further mention The high reliability of system.
Fig. 3 is the schematic diagram of the identification authentication system of the embodiment of the present invention.As shown in figure 3, the authentication of the present embodiment Device 3 includes local image authentication engine 31 and administrative department's authentication engine 32.Wherein, local image authentication engine 31 is configured To carry out authentication according to local image library and local identity information library.Administrative department's authentication engine 32 and Identity Management department Terminal 2 connects, and is configured as the image information of user and identity information being sent to Identity Management departmental terminals 2, so that body Part administrative department terminal 2 completes the authentication for the first time of user, and receives authentication result.
Local image authentication engine 31 include information acquisition unit 311, judging unit 312, similarity calculated 313 with And judging unit 316.Wherein, information acquisition unit 311 is configured as the image and identity information that acquisition obtains user.Judgement is single Member 312 is configured as judging whether the ID authentication request of user is to authenticate for the first time.In the present embodiment, in local identity information It there are the ID authentication request for when identity information of user, determining user is not to authenticate for the first time in library.
The ID authentication request that similarity calculated 313 is configured to respond to user is not to authenticate for the first time, and calculating is adopted The similarity of the image of collection and the image of the user in local image library.It is big that judging unit 316 is configured to respond to similarity In first threshold, user identity authentication success is determined.Wherein, first threshold is adjusted according to the authentication state of user, and user's recognizes Card state includes certification request address and/or certification request frequency.
The similarity of the image of the user in image and local image library of the present embodiment by obtaining the user of acquisition, and Determine that the user passes through authentication when the similarity is greater than first threshold, wherein pass through the authentication state tune of user The first threshold is saved, so that certification thresholding is improved in the certification request exception of user, in the history authentication record of user Certification thresholding is reduced when good improves the safety and reliability of system thus, it is possible to reduce the authentication error rate of system.
Optionally, local image authentication engine 31 further includes black and white lists confirmation unit 314, is configured as based on user's According to preset rules white list or blacklist is added in the user by authentication state.
Optionally, local image authentication engine 31 further includes that threshold value adjusts unit 315, is configured to respond to user and is in In white list, adjusting first threshold is the first value, is in blacklist in response to user, and adjusting first threshold is second value.Its In, second value is greater than first value.Thus, it is possible to certification thresholding be improved in the certification request exception of user, user's Certification thresholding is reduced when history authentication record is good, to reduce the authentication error rate of system, improves the safety of system and reliable Property.
Optionally, threshold value adjusts unit 315 and is additionally configured in response to the continuous certification request of user and/or recognizing for user Card request address is strange address, increases first threshold.In the present embodiment, threshold value adjusting unit 315 can be according to user's Authentication state dynamic regulation first threshold, to further increase system suitability.For example, using strange address for the first time in user When carrying out certification request, it is third value that threshold value, which adjusts unit 315 and adjusts first threshold,.It is frequent that strange address is employed many times in user When carrying out certification request, it is the 4th value that threshold value, which adjusts unit 315 and adjusts first threshold,.Wherein, third value is greater than the first value, third Value is less than the 4th value.
Optionally, local image authentication engine 31 further includes the first storage unit 317, is configured to respond to the user Authentication success stores the image of acquisition into the local image library.Local image library includes the more of the user as a result, A image.Further, similarity calculated 313 is additionally configured to not be to recognize for the first time in response to the ID authentication request of user Card calculates the image of the user of the acquisition similarity with the image of multiple users in local image library respectively.Determine single Member 316 is additionally configured to be greater than first threshold in response at least one similarity, determines user identity authentication success.Namely It says, in the present embodiment, as long as the image of the user of acquisition is similar to the image of the user in local image library Degree is greater than first threshold, then determines user identity authentication success.Thus, it is possible to which the image angle due to this acquisition is avoided to ask Topic or sharpness problems and the problem of cause authentication to fail, further reduce false rejection rate, avoid user from repeating more Secondary acquisition image, improves the dependable with function of system.Wherein, False Rejects should actually authenticate success for characterizing And system shows authentification failure.
Administrative department's authentication engine 32 includes that information transmitting unit 321, authentication result receiving unit 322 and the second storage are single Member 323.
The ID authentication request that information transmitting unit 321 is configured to respond to user is to authenticate for the first time, by the use of acquisition The image and identity information at family are sent to the certification of Identity Management departmental terminals 2, so that Identity Management departmental terminals 2 are to the user Carry out authentication.Authentication result receiving unit 322 is configured as receiving the corresponding authentication result of the user.Second storage unit 323 are configured to respond to the certification that the user passes through Identity Management departmental terminals, and the user images of acquisition and identity are believed Breath is bound, and the image of the user of acquisition and identity information are stored to local identity information library and local image library 1.
Optionally, the identification authentication system 3 of the present embodiment further includes mutual inspection unit 33, is configured such that local image is recognized Card engine 31 and administrative department's authentication engine 32 are periodically checked to ensure that mutually local image authentication engine 31 and administrative department are recognized Demonstrate,prove the certification accuracy of engine 32.
Fig. 4 is the schematic diagram of the electronic equipment of the embodiment of the present invention.Electronic equipment shown in Fig. 4 is general data processing dress It sets comprising general computer hardware structure includes at least processor 41 and memory 42.Processor 41 and memory 42 It is connected by bus 43.Memory 42 is suitable for the instruction or program that storage processor 41 can be performed.Processor 41 can be independence Microprocessor, be also possible to one or more microprocessor set.Processor 41 is deposited by executing memory 42 as a result, The instruction of storage is realized thereby executing the method flow of the embodiment of the present application as described above for the processing of data and for other The control of device.Bus 43 links together above-mentioned multiple components, while said modules are connected to 44 He of display controller Display device and input/output (I/O) device 45.Input/output (I/O) device 45 can be mouse, keyboard, modulation /demodulation Device, network interface, touch-control input device, body-sensing input unit, printer and other devices well known in the art.Typically, Input/output device 45 is connected by input/output (I/O) controller 46 with system.
It will be understood by those skilled in the art that embodiments herein can provide as method or computer program product.This Application can be used one or more wherein include computer usable program code computer readable storage medium (including but Be not limited to magnetic disk storage, CD-ROM, optical memory etc.) on the computer program product implemented.
The application is that reference is described according to the flow chart of the method for the embodiment of the present application and computer program product. It should be understood that each process in flow chart can be realized by computer program instructions.
These computer program instructions, which can store, is being able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, The manufacture of device is enabled, the function of specifying in one process of the command device implementation flow chart or multiple processes.
The embodiment of the present invention further relates to a kind of non-volatile memory medium, for storing computer-readable program, the meter Calculation machine readable program is used to execute above-mentioned all or part of embodiment of the method for computer.That is, those skilled in the art can be with Understand, implementing the method for the above embodiments is that can instruct relevant hardware come complete by program At the program is stored in a storage medium, including some instructions are used so that an equipment (can be single-chip microcontroller, chip Deng) or processor (processor) execute each embodiment the method for the application all or part of the steps.And storage above-mentioned Medium include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnlB MemorB), random access memory (RAM, Random Access MemorB), the various media that can store program code such as magnetic or disk.
The above description is only a preferred embodiment of the present invention, is not intended to restrict the invention, for those skilled in the art For, the invention can have various changes and changes.All any modifications made within the spirit and principles of the present invention are equal Replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of identity identifying method, which is characterized in that the described method includes:
In response to the ID authentication request of user, acquisition obtains the image and identity information of the user;
ID authentication request in response to the user is not to authenticate for the first time, is calculated in the described image and local image library of acquisition The user image similarity;
It is greater than first threshold in response to the similarity, determines the user identity authentication success, the first threshold is according to institute The authentication state for stating user is adjusted, and the authentication state of the user includes certification request address and/or certification request frequency;
Wherein, determine that the authentication of the user is asked there are when the identity information of the user in local identity information library Ask is not to authenticate for the first time.
2. the method according to claim 1, wherein the method also includes:
ID authentication request in response to the user is to authenticate for the first time, and the described image of acquisition and the identity information are sent It is authenticated to Identity Management departmental terminals;
In response to the user by the certification of the Identity Management departmental terminals, the described image of acquisition and the identity are believed Breath is bound, and the described image of acquisition is stored to local image library, and the identity information is stored to local identity and is believed Cease library.
3. the method according to claim 1, wherein the method also includes:
According to preset rules white list or blacklist is added in the user by the authentication state based on the user.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
It is in the white list in response to the user, adjusting the first threshold is the first value;
It is in the blacklist in response to the user, adjusting the first threshold is second value;
Wherein, the second value is greater than first value.
5. the method according to claim 1, wherein the method also includes:
The ID authentication request address of continuous ID authentication request and/or the user in response to the user is fremdly Location increases the first threshold.
6. the method according to claim 1, wherein the method also includes:
In response to user identity authentication success, the described image of acquisition is stored into the local image library.
7. according to the method described in claim 6, it is characterized in that, the local image library includes multiple figures of the user Picture, the method also includes:
ID authentication request in response to the user is not to authenticate for the first time, calculate the image of the user of acquisition respectively with institute State the similarity of the image of multiple users in local image library;
It is greater than the first threshold in response to similarity described at least one, determines the user identity authentication success.
8. the method according to claim 1, wherein the method also includes:
In response to local image authentication engine failure, the described image of acquisition and identity information are sent to Identity Management department end End is authenticated;
Pass through in response to Identity Management departmental terminals certification, determines the user identity authentication success.
9. a kind of electronic equipment, which is characterized in that including memory and processor, wherein the memory is for storing one Or a plurality of computer instruction, one or more computer instruction are executed by the processor to realize in claim 1-8 Described in any item methods.
10. a kind of computer readable storage medium, stores computer program instructions thereon, which is characterized in that the computer journey Such as method of any of claims 1-8 is realized in sequence instruction when being executed by processor.
CN201910390192.4A 2019-05-10 2019-05-10 Identity authentication method, electronic equipment and computer readable storage medium Active CN110135326B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910390192.4A CN110135326B (en) 2019-05-10 2019-05-10 Identity authentication method, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910390192.4A CN110135326B (en) 2019-05-10 2019-05-10 Identity authentication method, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110135326A true CN110135326A (en) 2019-08-16
CN110135326B CN110135326B (en) 2021-10-29

Family

ID=67573490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910390192.4A Active CN110135326B (en) 2019-05-10 2019-05-10 Identity authentication method, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110135326B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199655A (en) * 2020-09-30 2021-01-08 联想(北京)有限公司 Application control method and device and electronic equipment
CN113129525A (en) * 2020-01-13 2021-07-16 德国邮政股份公司 Method and apparatus for authenticating a user of a storage compartment device
CN113469015A (en) * 2021-06-29 2021-10-01 浙江大华技术股份有限公司 Face recognition method and device, electronic equipment and computer storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226653A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Rapid go-aboard system and method based on id card and biological characteristic recognition technique
CN101770613A (en) * 2010-01-19 2010-07-07 北京智慧眼科技发展有限公司 Social insurance identity authentication method based on face recognition and living body detection
CN102663443A (en) * 2012-03-27 2012-09-12 中国科学院自动化研究所 Biological characteristic identification method based on image disturbance and correlation filtering
US20140079299A1 (en) * 2012-09-20 2014-03-20 Kabushiki Kaisha Toshiba Person recognition apparatus and method thereof
CN105468955A (en) * 2015-12-28 2016-04-06 深圳市亚略特生物识别科技有限公司 Mobile terminal and electronic system based on biological recognition
CN105654048A (en) * 2015-12-30 2016-06-08 四川川大智胜软件股份有限公司 Multi-visual-angle face comparison method
CN108280332A (en) * 2017-12-15 2018-07-13 阿里巴巴集团控股有限公司 The biological characteristic authentication recognition detection method, apparatus and equipment of mobile terminal
CN108471400A (en) * 2018-02-07 2018-08-31 阿里巴巴集团控股有限公司 Method for authenticating, apparatus and system
CN108573203A (en) * 2017-03-17 2018-09-25 北京旷视科技有限公司 Identity identifying method and device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226653A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Rapid go-aboard system and method based on id card and biological characteristic recognition technique
CN101770613A (en) * 2010-01-19 2010-07-07 北京智慧眼科技发展有限公司 Social insurance identity authentication method based on face recognition and living body detection
CN102663443A (en) * 2012-03-27 2012-09-12 中国科学院自动化研究所 Biological characteristic identification method based on image disturbance and correlation filtering
US20140079299A1 (en) * 2012-09-20 2014-03-20 Kabushiki Kaisha Toshiba Person recognition apparatus and method thereof
CN105468955A (en) * 2015-12-28 2016-04-06 深圳市亚略特生物识别科技有限公司 Mobile terminal and electronic system based on biological recognition
CN105654048A (en) * 2015-12-30 2016-06-08 四川川大智胜软件股份有限公司 Multi-visual-angle face comparison method
CN108573203A (en) * 2017-03-17 2018-09-25 北京旷视科技有限公司 Identity identifying method and device and storage medium
CN108280332A (en) * 2017-12-15 2018-07-13 阿里巴巴集团控股有限公司 The biological characteristic authentication recognition detection method, apparatus and equipment of mobile terminal
CN108471400A (en) * 2018-02-07 2018-08-31 阿里巴巴集团控股有限公司 Method for authenticating, apparatus and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113129525A (en) * 2020-01-13 2021-07-16 德国邮政股份公司 Method and apparatus for authenticating a user of a storage compartment device
CN113129525B (en) * 2020-01-13 2024-07-23 德国邮政股份公司 Method and apparatus for authenticating a user of a storage compartment device
CN112199655A (en) * 2020-09-30 2021-01-08 联想(北京)有限公司 Application control method and device and electronic equipment
CN113469015A (en) * 2021-06-29 2021-10-01 浙江大华技术股份有限公司 Face recognition method and device, electronic equipment and computer storage medium

Also Published As

Publication number Publication date
CN110135326B (en) 2021-10-29

Similar Documents

Publication Publication Date Title
JP7279973B2 (en) Identification method, device and server in designated point authorization
KR102098441B1 (en) Identity authentication by using human biological characteristics
US10812479B2 (en) Authenticating a user via multiple biometric inputs
US20160269411A1 (en) System and Method for Anonymous Biometric Access Control
CN108011863B (en) Method and device for identifying brute force cracking
US8607319B2 (en) Methods and systems for determining biometric data for use in authentication transactions
EP0953183B1 (en) Security apparatus and method
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
US11824851B2 (en) Identification document database
EP3482545A1 (en) Step-up authentication
CN110135326A (en) A kind of identity identifying method, electronic equipment and computer readable storage medium
CN109285234A (en) Human face identification work-attendance checking method, device, computer installation and storage medium
CN110288755A (en) The invoice method of inspection, server and storage medium based on text identification
US11698956B2 (en) Open data biometric identity validation
US20180063128A1 (en) Method for automatically deleting a user password upon successful use of a multi-factor authentication modality
CN106846623A (en) A kind of bank card business dealing for self-service device processes method and self-service device
CN109766678B (en) Fingerprint identification authentication method, system, medium and equipment for mobile terminal equipment
US12021896B2 (en) Method for detecting webpage spoofing attacks
CN105099700A (en) Authentication method, authentication server, and system
CN113239333A (en) Browser user identity authentication method and system based on cross-domain resource access
KR101056307B1 (en) Multiline Reliability Support Hybrid Online Signature Verification System and Its Method for Various Applications
EP4209941A1 (en) Method and system of predictive document verification and machine learning therefor
CN111460422B (en) Method and device for generating verification code
CN117742626B (en) Multi-factor authentication cloud printer access control method and related device
CN113986956B (en) Data exception query analysis method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant