Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, the present application provides an identity authentication method, apparatus, electronic device and storage medium.
In a first aspect, the present application provides an identity authentication method, applied to a server, the method including:
receiving a certificate image uploaded by a user and a verification video file shot by the user, which are sent by the user through a client when the user requests identity authentication;
verifying the identity of the user according to the character string in the certificate image;
if the user is successfully authenticated according to the character string in the certificate image, extracting authentication content for authentication from the authentication video file;
and if the verification content is matched with preset verification information, determining that the identity authentication of the user passes.
Optionally, the identity verification of the user according to the character string in the certificate image includes:
performing line segmentation on the certificate image according to a preset character string distribution rule in the certificate image to obtain a line block image containing character strings;
performing character segmentation on the character strings in the row block images to obtain a plurality of character block images;
performing character recognition on each character block image to obtain a character string in the certificate image;
sending the character string in the certificate image to a public security verification system so that the public security verification system verifies the character string;
and if a verification success notice returned by the public security verification system is received, determining that the identity of the user is successfully verified according to the character string in the certificate image.
Optionally, performing character recognition on each character block image to obtain a character string in the certificate image, including:
for each character block image, matching the character block image with a character template in a preset character template set;
if the character block image is successfully matched with any character template, determining that characters in the character block image are characters in the preset character template;
combining the long characters of the character block images to obtain a combined character string;
verifying the combined character string according to a preset certificate character arrangement rule;
if the verification is successful, determining to obtain the combined character string as the character string in the certificate image;
and if the verification fails, re-executing the step of matching the character block image with the character template in the preset character template set aiming at each character block image.
Optionally, extracting verification content for performing identity verification from the verification video file includes:
carrying out voice recognition on the verification video file to obtain voice content;
selecting a target image frame meeting preset conditions from the verification video file;
and carrying out face detection on the target image frame to obtain a first face image.
Optionally, the method further includes:
comparing the voice content in the verification video file with a random verification code which is sent to a client in advance so that a user can read the random verification code;
if the voice content is the same as the random verification code, determining whether a first face image in the verification video file is matched with a second face image in the certificate image;
and if the first face image in the verification video file is matched with the second face image in the certificate image, determining that the verification content is matched with preset verification information.
Optionally, the method further includes:
sending a protocol file for signature confirmation of a user to a client;
if signature information sent by a client is received, identifying signature content in the signature information;
acquiring pre-stored name information of the user;
matching the signature content with the name information of the user;
and if the signature content is matched with the name information, determining that the protocol signature passes the confirmation.
Optionally, the method further includes:
the field information corresponding to the preset certificate storage field is recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms the protocol signature;
and storing the preset certificate storage field and the field information corresponding to the preset certificate storage field, which are recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms the protocol signature, into a block chain.
In a second aspect, the present application provides an identity authentication apparatus, which is applied to a server, and the apparatus includes:
the receiving module is used for receiving a certificate image uploaded by a user and a verification video file shot by the user, which are sent by the user through a client when the user requests identity authentication;
the first determination module is used for verifying the identity of the user according to the character string in the certificate image;
the extraction module is used for extracting verification content for identity verification in the verification video file if the identity verification of the user is successful according to the character string in the certificate image;
and the second determining module is used for determining that the identity authentication of the user passes if the verification content is matched with preset verification information.
Optionally, the first determining module includes:
the line segmentation unit is used for performing line segmentation on the certificate image according to a preset character string distribution rule in the certificate image to obtain a line block image containing character strings;
the character segmentation unit is used for carrying out character segmentation on the character strings in the row block images to obtain a plurality of character block images;
the character recognition unit is used for carrying out character recognition on each character block image to obtain character strings in the certificate image;
the sending unit is used for sending the character string in the certificate image to a public security verification system so that the public security verification system verifies the character string;
and the determining unit is used for determining that the identity of the user is successfully verified according to the character string in the certificate image if a verification success notice returned by the public security verification system is received.
Optionally, the character recognition unit is further configured to:
for each character block image, matching the character block image with a character template in a preset character template set;
if the character block image is successfully matched with any character template, determining that characters in the character block image are characters in the preset character template;
combining the long characters of the character block images to obtain a combined character string;
verifying the combined character string according to a preset certificate character arrangement rule;
if the verification is successful, determining to obtain the combined character string as the character string in the certificate image;
and if the verification fails, re-executing the step of matching the character block image with the character template in the preset character template set aiming at each character block image.
Optionally, the extracting module includes:
the voice recognition unit is used for carrying out voice recognition on the verification video file to obtain voice content;
the image frame selection unit is used for selecting a target image frame meeting preset conditions in the verification video file;
and the face detection unit is used for carrying out face detection on the target image frame to obtain a first face image.
Optionally, the apparatus further comprises:
the first sending module is used for comparing the voice content in the verification video file with a random verification code which is sent to a client in advance so that a user can read the random verification code;
a third determining module, configured to determine whether a first face image in the verification video file matches a second face image in the certificate image if the voice content is the same as the random verification code;
and the fourth determining module is used for determining that the verification content is matched with preset verification information if the first face image in the verification video file is matched with the second face image in the certificate image.
Optionally, the apparatus further comprises:
the second sending module is used for sending a protocol file for signature confirmation of the user to the client;
the content identification module is used for identifying the signature content in the signature information if the signature information sent by the client is received;
the information acquisition module is used for acquiring the pre-stored name information of the user;
the matching module is used for matching the signature content with the name information of the user;
and the fifth determining module is used for determining that the protocol signature passes the confirmation if the signature content is matched with the name information.
Optionally, the apparatus further comprises:
the acquisition module is used for acquiring field information corresponding to a preset certificate storage field, which is recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms a protocol signature;
and the storage module is used for storing the preset certificate storage field and the field information corresponding to the preset certificate storage field into the block chain, wherein the preset certificate storage field is recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms a protocol signature.
In a third aspect, the present application provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete mutual communication through the communication bus;
a memory for storing a computer program;
a processor, configured to implement the identity authentication method according to any one of the first aspect when executing a program stored in a memory.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon a program of an identity authentication method, which when executed by a processor, performs the steps of the identity authentication method according to any one of the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
the method and the device for authenticating the identity of the user can verify the identity of the user according to the character string in the certificate image by receiving the certificate image uploaded by the user and the verification video file shot by the user, which are sent by the user through the client when the user requests the identity authentication, extract verification content for identity verification in the verification video file if the user is successfully verified according to the character string in the certificate image, and determine that the identity of the user passes authentication if the verification content is matched with preset verification information.
The embodiment of the invention can automatically verify the identity of the user certificate image sent by the client through the server, verify the verification video file, convert the original manual processing flow into the photographing of the client terminal, reduce the redundant expenses between the client and a special person of a bank and enable the client to finish the surface signing items of the credit card at any time and place independently.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As the inventor finds that the credit card applicant needs to hold the valid certificate to the offline entity bank branch for face signing in the process of implementing the invention, the time cost of the client is increased; the bank must have a special person to perform face-to-face processing, and perform electronic scanning, storage and the like on the valid certificate to form an electronic evidence. Therefore, the labor cost is consumed, the personnel flow is increased, and the further spreading risk of the epidemic situation can be caused under the control of some epidemic situation prevention. The manual scanning of the electronic evidence of the certificate is lack of the process regularization. There will be missed scans, missed records, etc. resulting in secondary surface labels. To this end, an embodiment of the present invention provides an identity authentication method, an identity authentication device, an electronic device, and a storage medium, where the identity authentication method may be applied to a server, the server may interact with a client installed in a user terminal, and the server may also interact with a blockchain system, as shown in fig. 1, the identity authentication method includes:
step S101, receiving a certificate image uploaded by a user and a verification video file shot by the user, which are sent by the user through a client when the user requests identity authentication;
in practical application, after a user applies for and acquires a card, the card needs to be activated, and when the user activates the card, the user can upload a certificate image of the user through a client, such as: and recording and verifying video files according to the guidance of the client, wherein the images of the front side and the back side of the identity card are the same, and the video files comprise: the client prompts a user to read designated random verification codes and the like in the process of shooting the verification video file.
Step S102, the identity of the user is verified according to the character string in the certificate image;
in the embodiment of the present invention, for example, the character string in the certificate image may be sent to a public security verification system for verification, and after the public security verification system completes verification, a verification result may be returned to the server.
Step S103, if the user is successfully authenticated according to the character string in the certificate image, extracting authentication content for authentication from the authentication video file;
in this step, if the received authentication result is that the verification is successful, the authentication content may be extracted from the authentication video file, and for example, the authentication content may include a face image of the user, a voice content when the user reads the specified random authentication code, and the like.
And step S104, if the verification content is matched with preset verification information, determining that the identity authentication of the user passes.
The embodiment of the invention mainly relates to a certificate information public security networking real-time core body, which is characterized in that a client shoots the front side and the back side of an identity card through a mobile terminal and uploads the shot to a server side, the server side identifies the identity card through an OCR technology, then networking a public security department for verification, pedestrian face identification and video recording are carried out after the verification is passed, the approach to a cabinet is maximized, the authenticity of real-name authentication is ensured, and the unity of the identity card is ensured.
The method and the device for authenticating the identity of the user can verify the identity of the user according to the character string in the certificate image by receiving the certificate image uploaded by the user and the verification video file shot by the user, which are sent by the user through the client when the user requests the identity authentication, extract verification content for identity verification in the verification video file if the user is successfully verified according to the character string in the certificate image, and determine that the identity of the user passes authentication if the verification content is matched with preset verification information.
The embodiment of the invention can automatically verify the identity of the user certificate image sent by the client through the server, verify the verification video file, convert the original manual processing flow into the photographing of the client terminal, reduce the redundant expenses between the client and a special person of a bank and enable the client to finish the surface signing items of the credit card at any time and place independently.
In another embodiment of the present invention, as shown in fig. 2, the step S102 may include the steps of:
step S201, performing line segmentation on the certificate image according to a preset character string distribution rule in the certificate image to obtain a line block image containing character strings;
correspondingly, in the embodiment of the invention, the distribution rule of the Character strings in the certificate image can be set according to the actual format requirement of the certificate, and the image segmentation is carried out by adopting a horizontal projection method according to the gaps and the positions among all lines in the certificate image through Optical Character Recognition (OCR).
Step S202, performing character segmentation on the character strings in the row block images to obtain a plurality of character block images;
in the embodiment of the invention, a horizontal and vertical projection method can be realized based on FPGA to carry out character segmentation, the projection of the image in the corresponding direction is that a straight line is taken in the direction, the number of black points of pixels on the image vertical to the straight line (axis) is counted, and the accumulated sum is used as the value of the position of the axis; the cutting based on image projection is to map an image to such a feature, determine a cutting position (coordinate) of the image based on the feature, and cut the original image with the coordinate to obtain a target image.
Step S203, performing character recognition on each character block image to obtain character strings in the certificate image;
for example, the character block image may be recognized using a template matching method, an artificial neural network character recognition algorithm, or the like.
Step S204, sending the character string in the certificate image to a public security verification system so that the public security verification system verifies the character string;
step S205, if a verification success notification returned by the public security verification system is received, determining that the identity of the user is successfully verified according to the character string in the certificate image.
According to the embodiment of the invention, the certificate image can be segmented and the characters can be segmented by setting the character string distribution rule in the certificate image according to the actual certificate, the image block of the character to be recognized can be accurately obtained, then the character recognition is carried out on the character block image, and finally the character string is sent to a public security verification system for verification, so that the identity of the user is verified according to the character string in the certificate image, and the accuracy of the identity verification process is ensured.
In still another embodiment of the present invention, as shown in fig. 3, step S203 may include the steps of:
step S301, aiming at each character block image, matching the character block image with a character template in a preset character template set;
in the embodiment of the present invention, a standard template may be established in advance for each preset character, so that the character block image and the character template are then subjected to pattern matching, stroke matching, geometric feature matching, or the like.
Step S302, if the character block image is successfully matched with any character template, determining that characters in the character block image are characters in the preset character template;
step S303, combining the characters with the long character block images to obtain a combined character string;
step S304, verifying the combined character string according to a preset certificate character arrangement rule;
in practical application, different bits of the identification card represent different meanings, so that different bits of the combined character string can be verified respectively, such as: bits 1-2 represent provincial administrative region codes; the 3 rd to 4 th bits represent a ground level administrative region division code; third, 5 th to 6 th represent administrative division codes of county and district; the 7 th to 14 th represent the birth year, month and day; the 15 th to 17 th position represents a sequence code, the same area is the same year, month and day of the same birth of the same person, the odd number is male, the even number is female; sixthly, the 18 th bit represents a check code, and if the check code is 0 to 9, the check code is represented by 0 to 9, and if the check code is 10, the check code is represented by X (Roman numeral 10).
The validity period of the identity card can also be verified, for example, the validity period of the identity card at present is verified, such as 5 years, 10 years, 20 years or a long period.
If the verification is successful, step S305, determining that the obtained combined character string is a character string in the certificate image;
if the verification fails, step S306, re-execute the step of matching the character block image with the character template in the preset character template set for each character block image.
The embodiment of the invention can perform character recognition on each character block image, and can automatically perform character recognition again when the verification of the combined character string obtained by recognition fails, thereby ensuring that the recognized character string is an accurate character string and ensuring the accuracy of the identity authentication process.
In still another embodiment of the present invention, as shown in fig. 4, step S103 may include the steps of:
step S401, carrying out voice recognition on the verification video file to obtain voice content;
in practical application, after a client uses a client and verifies the identity of a user according to a character string in a certificate image, the next operation is that a section of characters approved by the user and a random verification code processed at this time appear below a software interface of the client, the user is required to face a camera and read the approved characters and the verification code, the client records a start video and uploads a verification video file obtained by recording to a server, the server identifies voice, the voice identification process mainly comprises the step of converting audio into characters, the homophone of Chinese is considered here, the identified characters need to be subjected to pinyin processing, and therefore pinyin of the characters generated by the server and the random verification code can be compared.
Step S402, selecting a target image frame meeting preset conditions from the verification video file;
after the comparison is passed, for example, 10 frames of verification video files can be randomly extracted to detect the portrait and separate the portrait from the background, and the portrait can be automatically stored in the face learning library; one image frame with the highest definition may also be selected as the target image frame among the plurality of image frames of the verification video file.
Step S403, performing face detection on the target image frame to obtain a first face image.
The face image preprocessing is based on the face detection result, processes the image and finally serves the process of feature extraction. The original image acquired by the system is limited by various conditions and random interference, so that the original image cannot be directly used, and the original image needs to be subjected to image preprocessing such as gray scale correction, noise filtering and the like in the early stage of image processing. For the face image, the preprocessing process mainly includes light compensation, gray level transformation, histogram equalization, normalization, geometric correction, filtering, sharpening, and the like of the face image.
The method comprises the steps of extracting the features of a human face image, and generally dividing the features which can be used by a human face recognition system into visual features, pixel statistical features, human face image transformation coefficient features, human face image algebraic features and the like. The face feature extraction is performed on some features of the face. Face feature extraction, also known as face characterization, is a process of feature modeling for a face. The methods for extracting human face features are classified into two main categories: one is a knowledge-based characterization method; the other is a characterization method based on algebraic features or statistical learning.
According to the embodiment of the invention, the verification content matched with the preset verification information is obtained by carrying out voice recognition and face detection on the verification video file, and the verification is carried out by extracting the voice content and the first face image, so that the verification accuracy can be ensured, and the accuracy of the whole identity authentication process is further improved.
In yet another embodiment of the present invention, as shown in fig. 5, the method further comprises:
step S501, comparing the voice content in the verification video file with a random verification code which is sent to a client in advance so that a user can read the random verification code;
step S502, if the voice content is the same as the random verification code, determining whether a first face image in the verification video file is matched with a second face image in the certificate image;
step S503, if the first face image in the verification video file is matched with the second face image in the certificate image, determining that the verification content is matched with preset verification information.
According to the embodiment of the invention, the verification content in the verification video file is verified in two dimensions by comparing the voice content with the random verification code and matching the first face image with the second face image in the certificate image, so that the verification accuracy is ensured, and the accuracy of the whole identity authentication process is further improved.
In yet another embodiment of the present invention, as shown in fig. 6, the method further includes:
step S601, sending a protocol file for signature confirmation of a user to a client;
the client can display the protocol file and display the character/graphic input area for the user to confirm the signature.
Step S602, if signature information sent by a client is received, identifying signature content in the signature information;
in this step, font recognition may be performed by the OCR recognition system to recognize the signature content in the signature information input by the user.
Step S603, pre-stored name information of the user is obtained;
in this step, the name information may be included in the personal information that is stored locally at the server and submitted when the user applies for the card.
Step S604, matching the signature content with the name information of the user;
step S605, if the signature content is matched with the name information, determining that the protocol signature passes the confirmation.
In the embodiment of the invention, the digital certificate issuing system can cooperate with a contract storage management and a third-party electronic certification authority approved by the state, and when the match is passed, the digital certificate meeting the national requirements is issued, and the certificate meets the requirements of industry associations such as the central bank, payment institutions, non-funds, loan and the like.
The embodiment of the invention can automatically authenticate the signature content of the user, ensure that the identity authentication process is automatically carried out, and the user does not need to run to a business hall, thereby saving the manpower and material resources of the user and saving the expenses in the related aspects of the business hall.
In yet another embodiment of the present invention, the method further comprises:
the field information corresponding to the preset certificate storage field is recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms the protocol signature;
and storing the preset certificate storage field and the field information corresponding to the preset certificate storage field, which are recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms the protocol signature, into a block chain.
In the embodiment of the invention, when the user successfully applies for the card, the core field of the card, such as information of IP, application timestamp, coordinate position, mobile phone number, mobile phone verification code, identity card and card number, can be stored in the block chain, and the index field is type and card number.
When the card is successfully activated, core fields of the card, such as information of IP, timestamp, coordinate position, mobile phone number, mobile phone verification code, card number and the like, can be stored in the block chain, and the index fields are type, card number and mobile phone number.
When the identity authentication is successful, card core fields such as IP, time stamp, coordinate position, card number, front and back sides of the identity card, OCR (optical character recognition) information of the identity card, face information, face video recording information and the like can be stored in the block chain, wherein the index fields are type, card number and the like
When the protocol signature is successfully confirmed, a type of block chain certificate is generated, core fields such as IP, time stamp, coordinate position, card number, protocol information, electronic signature graph, electronic signature OCR recognition text information and the like can be stored in the block chain, and the index field is the type and the card number.
The embodiment of the invention carries out block chain evidence storage on the transaction data generated in each step in the process through a block chain technology, and inquires the stored data through the index field. And finally, after the whole business transaction of the client is finished, acquiring block chain transaction data transaction through the evidence storage index field, summarizing the data of each link and the uplink data transaction ID to form a whole chain evidence chain, and reporting the evidence. The online evidence examination and the evidence pushing local examination are provided, and judicial evidence obtaining is supported. According to the embodiment of the invention, the operation behavior record is recorded by a block chain distributed decentralized scheme, so that the problems of distrustment, easy content tampering and the like are solved.
In another embodiment of the present invention, there is also provided an identity authentication apparatus applied to a server, as shown in fig. 7, the apparatus including:
the receiving module 11 is configured to receive a certificate image uploaded by a user and a verification video file shot by the user, which are sent by the user through a client when the user requests identity authentication;
a first determining module 12, configured to perform identity verification on the user according to a character string in the certificate image;
an extraction module 13, configured to extract, if identity verification of the user is successful according to the character string in the certificate image, verification content for performing identity verification from the verification video file;
and a second determining module 14, configured to determine that the identity authentication of the user passes if the verification content matches preset verification information.
Optionally, the first determining module includes:
the line segmentation unit is used for performing line segmentation on the certificate image according to a preset character string distribution rule in the certificate image to obtain a line block image containing character strings;
the character segmentation unit is used for carrying out character segmentation on the character strings in the row block images to obtain a plurality of character block images;
the character recognition unit is used for carrying out character recognition on each character block image to obtain character strings in the certificate image;
the sending unit is used for sending the character string in the certificate image to a public security verification system so that the public security verification system verifies the character string;
and the determining unit is used for determining that the identity of the user is successfully verified according to the character string in the certificate image if a verification success notice returned by the public security verification system is received.
Optionally, the character recognition unit is further configured to:
for each character block image, matching the character block image with a character template in a preset character template set;
if the character block image is successfully matched with any character template, determining that characters in the character block image are characters in the preset character template;
combining the long characters of the character block images to obtain a combined character string;
verifying the combined character string according to a preset certificate character arrangement rule;
if the verification is successful, determining to obtain the combined character string as the character string in the certificate image;
and if the verification fails, re-executing the step of matching the character block image with the character template in the preset character template set aiming at each character block image.
Optionally, the extracting module includes:
the voice recognition unit is used for carrying out voice recognition on the verification video file to obtain voice content;
the image frame selection unit is used for selecting a target image frame meeting preset conditions in the verification video file;
and the face detection unit is used for carrying out face detection on the target image frame to obtain a first face image.
Optionally, the apparatus further comprises:
the first sending module is used for comparing the voice content in the verification video file with a random verification code which is sent to a client in advance so that a user can read the random verification code;
a third determining module, configured to determine whether a first face image in the verification video file matches a second face image in the certificate image if the voice content is the same as the random verification code;
and the fourth determining module is used for determining that the verification content is matched with preset verification information if the first face image in the verification video file is matched with the second face image in the certificate image.
Optionally, the apparatus further comprises:
the second sending module is used for sending a protocol file for signature confirmation of the user to the client;
the content identification module is used for identifying the signature content in the signature information if the signature information sent by the client is received;
the information acquisition module is used for acquiring the pre-stored name information of the user;
the matching module is used for matching the signature content with the name information of the user;
and the fifth determining module is used for determining that the protocol signature passes the confirmation if the signature content is matched with the name information.
Optionally, the apparatus further comprises:
the acquisition module is used for acquiring field information corresponding to a preset certificate storage field, which is recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms a protocol signature;
and the storage module is used for storing the preset certificate storage field and the field information corresponding to the preset certificate storage field into the block chain, wherein the preset certificate storage field is recorded when a user applies for a card, activates the card, authenticates the identity and/or confirms a protocol signature.
In another embodiment of the present invention, an electronic device is further provided, which includes a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing the identity authentication method in the embodiment of the method when executing the program stored in the memory.
In the electronic device provided by the embodiment of the invention, the processor executes the program stored in the memory to realize that the identity authentication of the user is passed by receiving the certificate image uploaded by the user and the authentication video file shot by the user, which are sent by the client when the user requests the identity authentication, and verifying the identity of the user according to the character string in the certificate image, if the identity verification of the user is successful according to the character string in the certificate image, the authentication content for performing the identity authentication is extracted from the authentication video file, and if the authentication content is matched with the preset authentication information, the identity authentication of the user can be determined to be passed. The identity of the user certificate image sent by the client can be automatically verified through the server, the verification video file is verified, the original manual processing flow is converted into the client terminal for taking a picture, the redundant expenses between the client and a special person in a bank are reduced, and the client can finish the credit card surface signing items at any time and place.
The communication bus 1140 mentioned in the above electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus 1140 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 8, but this is not intended to represent only one bus or type of bus.
The communication interface 1120 is used for communication between the electronic device and other devices.
The memory 1130 may include a Random Access Memory (RAM), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The processor 1110 may be a general-purpose processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the integrated circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components.
In yet another embodiment of the present invention, a computer-readable storage medium is further provided, on which a program of an identity authentication method is stored, which when executed by a processor implements the steps of the identity authentication method described in the foregoing method embodiment.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.