CN111539752A - Identity authentication method and device, storage medium and electronic equipment - Google Patents
Identity authentication method and device, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN111539752A CN111539752A CN202010354990.4A CN202010354990A CN111539752A CN 111539752 A CN111539752 A CN 111539752A CN 202010354990 A CN202010354990 A CN 202010354990A CN 111539752 A CN111539752 A CN 111539752A
- Authority
- CN
- China
- Prior art keywords
- identity authentication
- authentication
- identity
- authenticated
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 230000006855 networking Effects 0.000 claims abstract description 34
- 230000000052 comparative effect Effects 0.000 claims abstract description 4
- 238000005516 engineering process Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 9
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
Abstract
The application provides an identity authentication method, an identity authentication device, a storage medium and electronic equipment, and relates to the technical field of information security. The identity authentication method comprises the following steps: acquiring information to be authenticated of an identity authentication requester; determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network; and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester. By using the method, high availability and high stability can be achieved during identity authentication.
Description
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and an apparatus for identity authentication, a storage medium, and an electronic device.
Background
At present, when commercial banks perform identity authentication online, supplementary face recognition is mostly performed by using a human public security networking check mode and an online or outsourcing face recognition technology, so that authentication of people and certificates in one is achieved. Wherein, the networking of people's public security is checked and is referred to: the public security department provides an identity authentication interface for each commercial bank through a Chinese people bank (hereinafter referred to as a bank), and the commercial bank can compare names and identity card numbers through the identity authentication interface and obtain face photos retained by the public security department.
However, once the networking inspection channel of the public security of the people goes down/fails, the identity authentication cannot be performed at all, and the people have a certain service time and cannot perform the identity authentication by using the interface at night, so that the availability and the stability of the authentication method are low.
Disclosure of Invention
In order to solve the technical problems in the prior art, the present application provides an identity authentication method, an identity authentication device, a storage medium, and an electronic device, which can achieve high availability and high stability during identity authentication.
The embodiment of the application provides an identity authentication method, which comprises the following steps:
acquiring information to be authenticated of an identity authentication requester;
determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network;
and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester.
Optionally, before the currently usable identity authentication manner is selected, the method further includes:
and when the identity authentication requester performs identity authentication within a preset time, acquiring an authentication result of the identity authentication performed by the identity authentication requester last time and feeding back the authentication result to the identity authentication requester.
Optionally, the information to be authenticated includes the identity information of the identity authentication requester and a face photo to be authenticated.
Optionally, when it is determined that the currently usable identity authentication method is the CTID authentication method, the authenticating the information to be authenticated by using the currently usable identity authentication method specifically includes:
and acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode.
Optionally, when it is determined that the currently usable identity authentication manner is the manway public security networking verification authentication manner, the authenticating the information to be authenticated by using the currently usable identity authentication manner specifically includes:
and acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the to-be-authenticated face photo to acquire an authentication result.
Optionally, the comparing the human face picture with the to-be-authenticated human face picture specifically includes:
and comparing the pedestrian face photo with the to-be-authenticated face photo by using a face recognition technology in a bank.
The present application further provides an identity authentication apparatus, the apparatus comprising: an acquisition unit, a determination unit and an authentication unit;
the acquiring unit is used for acquiring information to be authenticated of the identity authentication requester;
the determining unit is used for determining the currently available identity authentication mode, wherein the identity authentication mode comprises an identity card online function certificate CTID authentication mode and a pedestrian public security networking check authentication mode;
and the authentication unit is used for authenticating the information to be authenticated by using the currently available identity authentication mode and feeding back an authentication result to the identity authentication requester.
Optionally, the apparatus further comprises: a cache unit:
the cache unit is used for acquiring the authentication result of the identity authentication performed by the identity authentication requester at the last time and feeding the authentication result back to the identity authentication requester when the identity authentication requester performs the identity authentication within the preset time.
Optionally, the authentication unit is specifically configured to:
when the currently usable identity authentication mode is determined to be the CTID authentication mode, acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode;
and when the currently usable identity authentication mode is determined to be the pedestrian public security networking check authentication mode, acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the face photo to be authenticated to acquire an authentication result.
Optionally, the authentication unit may compare the human face picture with the to-be-authenticated human face picture by using a human face recognition technology inside a bank.
Embodiments of the present application further provide a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for identity authentication as described above is implemented.
The embodiment of the application also provides electronic equipment, wherein the electronic equipment is used for running the program, and the identity authentication method is executed when the program runs.
The technical scheme provided by the application has the following advantages at least:
the method provided by the embodiment of the application obtains the information to be authenticated of the identity authentication requester, and then determines the currently usable identity authentication mode, wherein the identity authentication mode comprises an identity card online function certificate CTID authentication mode and a pedestrian public security networking check authentication mode. And authenticating the information to be authenticated by using the currently available identity authentication mode, and feeding back an authentication result to the identity authentication requester. Because the method can select the current available identity authentication mode, the CTID authentication mode can be used for providing the identity authentication service when the pedestrian public security networking check channel cannot provide the identity authentication service, and high availability and high stability are further achieved during identity authentication.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an identity authentication apparatus according to an embodiment of the present application;
fig. 3 is a schematic diagram of another identity authentication apparatus provided in an embodiment of the present application;
fig. 4 is a schematic diagram of an identity authentication process provided in an embodiment of the present application;
fig. 5 is a schematic view of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The High Availability (High Availability) described in the embodiments of the present application specifically refers to: a system is described that is specially designed to reduce downtime while maintaining a high degree of availability of its services. In short, when some part or all of the system stops working due to failure, a method is adopted to enable the system to recover working as soon as possible.
The first embodiment is as follows:
the embodiment of the present application provides an Identity authentication method, which uses a CTID (Cyber Trusted Identity, an online function certificate of an Identity card) technology as a candidate, and is used in cooperation with a public security networking check to implement Identity authentication, and the CTID technology is first described below.
CTID: commonly called as network certificate, and is called as Identity card online function certificate (CTID, Cyber Trusted Identity). The method is simple in terms of 'virtual version of the identity card', and based on identity card making data by means of the internet modern technology and the biological characteristic identification technology, an electronic mapping file uniquely corresponding to an entity identity card chip is issued through an 'internet + credible identity authentication platform' supported by the national issuing and modifying committee. The data source of the network certificate CTID is authoritative, the signing platform is authoritative, and the data transmission is safe.
The method provided by the embodiment of the application is specifically described below with reference to the accompanying drawings.
Referring to fig. 1, the figure is a flowchart of a method for identity authentication provided in an embodiment of the present application.
The method comprises the following steps:
s101: and acquiring to-be-authenticated information of the identity authentication requester.
And acquiring to-be-authenticated information of the identity authentication requester through an identity authentication system of the bank.
In the application scenario of the embodiment of the application, the identity authentication means that the authenticity of the information to be authenticated of the identity authentication requester is authenticated. In some embodiments, the information to be authenticated includes identity information of an identity authentication requester and a picture of a face to be authenticated. At this time, the identity authentication specifically means that whether the actual object corresponding to the identity information is the identity authentication requester is authenticated, that is, whether the identity authentication requester uses the identity information of another person is identified.
Further, when the identity authentication requester performs identity authentication within a preset time, an authentication result of the identity authentication performed by the identity authentication requester at the previous time is obtained and fed back to the identity authentication requester.
The preset time may be a recent period of time, and in some embodiments, the preset time may be set to a last day, a last week, and the like, and the embodiment of the present application is not particularly limited.
Namely, after the identity authentication requester performs identity authentication, the record of the result of the identity authentication is stored, and when the identity authentication requester determines to perform identity authentication again through the identity information, the last authentication result stored in the preset time can be directly obtained, so that the fast and efficient identity authentication is realized.
It can be understood that, when the last authentication result does not exist, the identity authentication requester is characterized to perform identity authentication for the first time or not perform identity authentication in a short period, and at this time, the identity authentication is performed by adopting an identity authentication mode.
S102: and determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (computer telephony integration) authentication mode of an online function certificate of the identity card and a pedestrian public security networking verification authentication mode.
The method provided by the embodiment of the application can realize selection between two identity authentication modes. And when one identity authentication mode can not provide the service, selecting another identity authentication mode to complete the service.
In some embodiments, the CTID authentication mode may be used as a supplementary mode to the manway public security networking verification authentication mode, and when both the identity authentication modes are available, the manway public security networking verification authentication mode is preferentially used; and when the authentication mode of the pedestrian public security networking check is unavailable, selecting to use the CTID authentication mode.
In other embodiments, because the result feedback of the manway public security networking verification authentication mode is relatively slow, in order to improve the efficiency of identity authentication, when both the two identity authentication modes are available, the CTID authentication mode can be preferentially used; and when the CTID authentication mode is unavailable, selecting to use a public security networking verification authentication mode.
S103: and authenticating the information to be authenticated by using the currently available identity authentication mode, and feeding back an authentication result to the identity authentication requester.
When the currently usable identity authentication mode is determined to be the CTID authentication mode, the face photo to be verified and the identity information can be sent to the CTID authentication service, the CTID authentication mode is further utilized to obtain a checking result of the identity information and a comparison result of the face photo to be authenticated, and then an identity authentication result is fed back.
When the currently usable identity authentication mode is determined to be a pedestrian public security networking check authentication mode, acquiring a pedestrian face photo corresponding to identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the face photo to be authenticated to acquire an authentication result.
In some embodiments, when the human face photo is compared with the human face photo to be authenticated, the human face photo and the human face photo to be authenticated may be compared by using a human face recognition technology inside a bank. The embodiment of the present application does not specifically limit the face recognition technology used in the bank.
The method provided by the embodiment of the application is utilized to firstly obtain the information to be authenticated of the identity authentication requester, then determine the currently usable identity authentication mode, authenticate the information to be authenticated by utilizing the currently usable identity authentication mode, and feed back the authentication result to the identity authentication requester. Because the method can select the current available identity authentication mode, the identity authentication service can be provided by using the CTID authentication mode when the pedestrian public security networking check channel cannot provide the identity authentication service, and high availability and high stability are further achieved during identity authentication.
Example two:
based on the method for identity authentication provided by the above embodiment, the embodiment of the present application further provides a method for identity authentication, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 2, this figure is a schematic diagram of an identity authentication apparatus according to an embodiment of the present application.
The device of the embodiment of the application comprises: an acquisition unit 201, a determination unit 202, and an authentication unit 203.
The obtaining unit 201 is configured to obtain information to be authenticated of an identity authentication requester.
In some embodiments, the information to be authenticated includes identity information of an identity authentication requester and a picture of a face to be authenticated.
The determining unit 202 is configured to determine currently available identity authentication manners, where the identity authentication manners include an identity card online function certificate CTID authentication manner and a pedestrian public security networking verification authentication manner.
The authentication unit 203 is configured to authenticate information to be authenticated by using a currently available identity authentication method, and feed back an authentication result to the identity authentication requester.
Further, the authentication unit 203 is specifically configured to:
when the currently usable identity authentication mode is determined to be the CTID authentication mode, acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode;
and when the currently usable identity authentication mode is determined to be the pedestrian public security networking check authentication mode, acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the face photo to be authenticated to acquire an authentication result.
Optionally, the authentication unit 203 may compare the human face picture with the to-be-authenticated human face picture by using a human face recognition technology inside a bank.
Referring to fig. 3, this figure is a schematic view of another identity authentication apparatus provided in this embodiment of the present application.
This authentication apparatus differs from the authentication apparatus shown in fig. 2 in that: a cache unit 204 is also included.
The cache unit 204 is configured to, when the identity authentication requester performs identity authentication within a preset time, obtain an authentication result of the identity authentication performed by the identity authentication requester last time and feed the authentication result back to the identity authentication requester.
Referring to fig. 4, this figure is a schematic diagram of an identity authentication process provided in an embodiment of the present application.
The acquiring unit 201 acquires identity information of an identity authentication requester and a picture of a face to be authenticated.
When determining that the authentication result of the identity authentication performed by the identity authentication requester at the previous time is stored in the cache unit 204, the determining unit 202 directly obtains the authentication result and feeds the authentication result back to the identity authentication requester.
When the cache unit 204 has no previous authentication result, the determination unit determines the currently available identity authentication mode.
The authentication unit 203 may specifically include a CTID authentication unit 203a and a human networking check unit 203b, which are respectively configured to provide two different identity authentication manners.
By using the device provided by the embodiment of the application, the information to be authenticated of the identity authentication requester is acquired through the acquisition unit, then the currently usable identity authentication mode is determined through the determination unit, then the authentication unit authenticates the information to be authenticated by using the currently usable identity authentication mode, and the authentication result is fed back to the identity authentication requester. Because the device can select the current available identity authentication mode, the CTID authentication mode can be used for providing the identity authentication service when the pedestrian public security networking check channel cannot provide the identity authentication service, and high availability and high stability are further achieved during identity authentication.
The identity authentication device comprises a processor and a memory, wherein the acquisition unit, the determination unit, the authentication unit and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and the above identity authentication method is realized by adjusting kernel parameters.
The embodiment of the invention also provides a storage medium, wherein a program is stored on the storage medium, and the program realizes the identity authentication method when being executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the identity authentication method is executed when the program runs.
The embodiment of the invention also provides electronic equipment which is specifically described below by combining the attached drawings.
Referring to fig. 5, the figure is a schematic view of an electronic device provided in an embodiment of the present application.
The electronic device 50 comprises at least one processor 501, and at least one memory 502, a bus 503 connected to the processor 501; the processor 501 and the memory 502 complete communication with each other through the bus 503; the processor 501 is used to call program instructions in the memory 502 to perform the above-described method of identity authentication. The electronic device 50 in the present application may be a server, a PC, a PAD, a mobile phone, and the like, which is not particularly limited in this embodiment.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
acquiring information to be authenticated of an identity authentication requester;
determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network;
and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester.
Optionally, the method further includes:
and when the identity authentication requester performs identity authentication within a preset time, acquiring an authentication result of the identity authentication performed by the identity authentication requester last time and feeding back the authentication result to the identity authentication requester.
Optionally, the information to be authenticated includes the identity information of the identity authentication requester and a face photo to be authenticated.
Optionally, when it is determined that the currently usable identity authentication method is the CTID authentication method, the authenticating the information to be authenticated by using the currently usable identity authentication method specifically includes:
and acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode.
Optionally, when it is determined that the currently usable identity authentication manner is the manway public security networking verification authentication manner, the authenticating the information to be authenticated by using the currently usable identity authentication manner specifically includes:
and acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the to-be-authenticated face photo to acquire an authentication result.
Optionally, the comparing the human face picture with the to-be-authenticated human face picture specifically includes:
and comparing the pedestrian face photo with the to-be-authenticated face photo by using a face recognition technology in a bank.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a device includes one or more processors (CPUs), memory, and a bus. The device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A method of identity authentication, the method comprising:
acquiring information to be authenticated of an identity authentication requester;
determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network;
and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester.
2. The method of claim 1, wherein prior to selecting the currently available authentication mode, the method further comprises:
and when the identity authentication requester performs identity authentication within a preset time, acquiring an authentication result of the identity authentication performed by the identity authentication requester last time and feeding back the authentication result to the identity authentication requester.
3. The method according to claim 1, wherein the information to be authenticated comprises identity information of the identity authentication requester and a picture of a face to be authenticated.
4. The method according to claim 3, wherein when it is determined that the currently available identity authentication method is the CTID authentication method, the authenticating the information to be authenticated by using the currently available identity authentication method specifically includes:
and acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode.
5. The method according to claim 3, wherein when it is determined that the currently available identity authentication method is the manway public security networking verification authentication method, the authenticating the information to be authenticated by using the currently available identity authentication method specifically includes:
and acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the to-be-authenticated face photo to acquire an authentication result.
6. The method according to claim 5, wherein the comparing the human face picture with the human face picture to be authenticated specifically comprises:
and comparing the pedestrian face photo with the to-be-authenticated face photo by using a face recognition technology in a bank.
7. An apparatus for identity authentication, the apparatus comprising: an acquisition unit, a determination unit and an authentication unit;
the acquiring unit is used for acquiring information to be authenticated of the identity authentication requester;
the determining unit is used for determining the currently available identity authentication mode, wherein the identity authentication mode comprises an identity card online function certificate CTID authentication mode and a pedestrian public security networking check authentication mode;
and the authentication unit is used for authenticating the information to be authenticated by using the currently available identity authentication mode and feeding back an authentication result to the identity authentication requester.
8. The apparatus of claim 7, further comprising: a cache unit:
the cache unit is used for acquiring the authentication result of the identity authentication performed by the identity authentication requester at the last time and feeding the authentication result back to the identity authentication requester when the identity authentication requester performs the identity authentication within the preset time.
9. A storage medium, having stored thereon a computer program which, when executed by a processor, carries out the method of identity authentication of any one of claims 1-6.
10. An electronic device, wherein the electronic device is configured to run a program, and wherein the program is configured to execute the method for authenticating according to any one of claims 1 to 6 when running.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010354990.4A CN111539752A (en) | 2020-04-29 | 2020-04-29 | Identity authentication method and device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010354990.4A CN111539752A (en) | 2020-04-29 | 2020-04-29 | Identity authentication method and device, storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111539752A true CN111539752A (en) | 2020-08-14 |
Family
ID=71975988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010354990.4A Pending CN111539752A (en) | 2020-04-29 | 2020-04-29 | Identity authentication method and device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111539752A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105046562A (en) * | 2015-09-10 | 2015-11-11 | 腾讯科技(深圳)有限公司 | Risk control system and risk control data acquisition method |
CN108173870A (en) * | 2018-01-15 | 2018-06-15 | 广州大白互联网科技有限公司 | A kind of net for authentication demonstrate,proves generation method and system |
CN110334489A (en) * | 2019-07-12 | 2019-10-15 | 广州大白互联网科技有限公司 | A kind of unified single sign-on system and method |
CN110557366A (en) * | 2019-07-15 | 2019-12-10 | 安徽继远软件有限公司 | Identity authentication system and method based on cross-network transmission and CTID (computer telephony integration) network card authentication |
WO2020024929A1 (en) * | 2018-08-03 | 2020-02-06 | 华为技术有限公司 | Method for upgrading service application range of electronic identity card, and terminal device |
-
2020
- 2020-04-29 CN CN202010354990.4A patent/CN111539752A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105046562A (en) * | 2015-09-10 | 2015-11-11 | 腾讯科技(深圳)有限公司 | Risk control system and risk control data acquisition method |
CN108173870A (en) * | 2018-01-15 | 2018-06-15 | 广州大白互联网科技有限公司 | A kind of net for authentication demonstrate,proves generation method and system |
WO2020024929A1 (en) * | 2018-08-03 | 2020-02-06 | 华为技术有限公司 | Method for upgrading service application range of electronic identity card, and terminal device |
CN110334489A (en) * | 2019-07-12 | 2019-10-15 | 广州大白互联网科技有限公司 | A kind of unified single sign-on system and method |
CN110557366A (en) * | 2019-07-15 | 2019-12-10 | 安徽继远软件有限公司 | Identity authentication system and method based on cross-network transmission and CTID (computer telephony integration) network card authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI682651B (en) | Authentication method, authentication data processing method and device based on blockchain | |
CN108665946B (en) | Service data access method and device | |
US20210328992A1 (en) | Computer readable storage media for tiered connection pooling and methods and systems for utilizing same | |
CA3020059C (en) | Method and device for registering biometric identity and authenticating biometric identity | |
US10812477B2 (en) | Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device | |
US11838425B2 (en) | Systems and methods for maintaining decentralized digital identities | |
CN105553919B (en) | A kind of identity identifying method and device | |
CN105207996B (en) | Account merging method and device | |
US8719911B2 (en) | Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques | |
CN105592011B (en) | Account login method and device | |
AU2018323233A1 (en) | Resource transfer method, fund payment method and apparatus, and electronic device | |
EP3413255A1 (en) | Electronic payment service processing method and device, and electronic payment method and device | |
CN107040560B (en) | Service processing method and device based on service platform | |
CN109086596B (en) | Authentication method, device and system for application program | |
CN108964925A (en) | A kind of document authentication device, method, device, equipment and readable medium | |
CN111881483B (en) | Resource account binding method, device, equipment and medium based on blockchain | |
CN110032846B (en) | Identity data anti-misuse method and device and electronic equipment | |
CN109409110A (en) | A kind of electronic document signature method, device, equipment and readable medium | |
US20220067036A1 (en) | Systems and methods for a federated directory service | |
US10778673B2 (en) | Methods for randomized multi-factor authentication with biometrics and devices thereof | |
US20230222243A1 (en) | Method and system for managing access to entity identity data | |
CN112052434A (en) | Electronic file verification method and device, electronic equipment and readable storage medium | |
CN111539752A (en) | Identity authentication method and device, storage medium and electronic equipment | |
CN113836331A (en) | Image query method, device and storage medium | |
CN109561123B (en) | Token caching method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200814 |
|
RJ01 | Rejection of invention patent application after publication |