CN112184237A - Data processing method and device and computer readable storage medium - Google Patents

Data processing method and device and computer readable storage medium Download PDF

Info

Publication number
CN112184237A
CN112184237A CN202010966199.9A CN202010966199A CN112184237A CN 112184237 A CN112184237 A CN 112184237A CN 202010966199 A CN202010966199 A CN 202010966199A CN 112184237 A CN112184237 A CN 112184237A
Authority
CN
China
Prior art keywords
information
user
result
image
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010966199.9A
Other languages
Chinese (zh)
Inventor
王唐方
单长胜
罗佳
郭宇航
潘陈钰
倪德中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN202010966199.9A priority Critical patent/CN112184237A/en
Publication of CN112184237A publication Critical patent/CN112184237A/en
Priority to PCT/CN2021/116933 priority patent/WO2022057682A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/197Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition

Abstract

The invention provides a data processing method, a data processing device and a computer readable storage medium, wherein the method comprises the following steps: acquiring an account opening request of a user, wherein the account opening request comprises basic information, identity image information and biological information submitted by the user; performing image recognition matching on the identity image information according to the basic information to obtain an image recognition result; performing biological identification matching on the biological information according to the image identification result to obtain a biological identification result; performing identity authentication according to the image recognition result, the biological recognition result and the basic information to obtain an identity authentication result; and creating an account according to the image recognition result, the biological recognition result and the identity authentication result, and determining the operation authority of the account. By the method, the safety of data processing can be guaranteed when the account is opened online.

Description

Data processing method and device and computer readable storage medium
Technical Field
The invention belongs to the technical field of finance, and particularly relates to a data processing method and device and a computer readable storage medium.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
With the increasing development of the internet, various high-tech means can be well applied to different industries, and particularly, the wide popularization of smart phones enables users to generally have the foundation and capability of developing services through high and new technologies. In some special scenes, when a user cannot perform field operation due to time, location, capability and the like, a service of opening an account needs to be performed by relying on the internet.
However, in the prior art, risk control is difficult to perform on-line account opening service, and account security is difficult to guarantee.
Disclosure of Invention
In view of the above problems in the prior art, a data processing method, an apparatus and a computer-readable storage medium are provided, by which the above problems can be solved.
The present invention provides the following.
In a first aspect, a data processing method is provided, including: acquiring an account opening request of a user, wherein the account opening request comprises basic information, identity image information and biological information submitted by the user; performing image recognition matching on the identity image information according to the basic information to obtain an image recognition result; performing biological identification matching on the biological information according to the image identification result to obtain a biological identification result; performing identity authentication according to the image recognition result, the biological recognition result and the basic information to obtain an identity authentication result; and creating an account according to the image recognition result, the biological recognition result and the identity authentication result, and determining the operation authority of the account.
In a possible implementation, performing image recognition matching on the identity image information according to the basic information includes: performing the image recognition on the identity image information by using an OCR technology to obtain character information and photo information on the identity image information; and matching the character information on the identity image information according to the basic information to obtain the image recognition result.
In one possible embodiment, the biometric information of the user includes: iris information, fingerprint information and facial feature information, and performing biometric identification matching on the biometric information according to the image identification result, wherein the biometric identification matching comprises the following steps: performing living body detection and identification according to the iris information, the fingerprint information and the facial feature information; and carrying out face matching on the iris information and the facial feature information according to the photo information on the identity image information.
In one possible embodiment, the identity authentication according to the image recognition result, the biometric recognition result and the basic information includes: acquiring authentication information of the user from a third-party system, wherein the authentication information comprises a photo authentication information and a character authentication information; and matching the basic information, the biological information, the character information on the identity image information and the photo information according to the authentication message.
In one possible embodiment, creating an account according to the image recognition result, the biometric recognition result, and the identity authentication result includes: determining the reliability value of the user according to the image recognition result, the biological recognition result and the identity authentication result; and if the reliability value of the user meets a preset condition, creating an account according to the basic information, the identity image information and the biological information submitted by the user.
In one possible embodiment, determining the operation authority of the account includes: acquiring preset risk values of multiple types of limited operations, and determining a first operation authority of the account by comparing the reliability value of the user with the preset risk value of each type of limited operation, wherein the first operation authority is used for indicating the operation type range of the account; and/or determining a second operation authority of the account according to the reliability value of the user, wherein the second operation authority is used for indicating the operation limit range of the account.
In one possible embodiment, determining the reliability value of the user according to the image recognition result, the biometric recognition result and the identity authentication result includes: if any one of the multiple types of identification results does not meet the corresponding preset condition, subtracting a safety factor corresponding to the any one identification result from the initial value of the reliability of the user to obtain the reliability of the user; wherein an initial value of the reliability value of the user is a sum of the security factors corresponding to the multiple types of recognition results, and the multiple types of recognition results at least include the image recognition result, the biometric recognition result, and the identity authentication result.
In a possible implementation manner, the initial value of the reliability value of the user is the sum of a first security factor a corresponding to the image recognition result, a second security factor B corresponding to the biometric recognition result, a third security factor C corresponding to the identity authentication result, and a fourth security factor D corresponding to other recognition results; and the safety factor corresponding to any one identification result is correspondingly adjusted along with the change of the accuracy degree of any one identification result.
In a possible embodiment, the ratio of the sum of the first safety factor a, the second safety factor B and the third safety factor C to the initial value of the reliability value is greater than 90%; and the proportion of the first safety factor A relative to the sum of the first safety factor A and the second safety factor A is 20-25%; the proportion of the second safety factor B relative to the sum of the three is 30-35 percent; the third safety factor C accounts for 40 to 45 percent of the total of the three.
In one possible embodiment, the method further comprises: and carrying out blacklist matching according to the basic information of the user, and rejecting the account opening request if the blacklist matching is matched.
In a second aspect, a data processing apparatus is provided, including: the system comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring an account opening request of a user, and the account opening request comprises basic information, identity image information and biological information submitted by the user; the first identification unit is used for carrying out image identification matching on the identity image information according to the basic information to obtain an image identification result; the second identification unit is used for carrying out biological identification matching on the biological information according to the image identification result to obtain a biological identification result; the third identification unit is used for carrying out identity authentication according to the image identification result, the biological identification result and the basic information to obtain an identity authentication result; and the creating unit is used for creating an account according to the image recognition result, the biological recognition result and the identity authentication result and determining the operation authority of the account.
In a possible implementation, the first identification unit is further configured to: performing the image recognition on the identity image information by using an OCR technology to obtain character information and photo information on the identity image information; and matching the character information on the identity image information according to the basic information to obtain the image recognition result.
In one possible embodiment, the biometric information of the user includes: iris information, fingerprint information, and facial feature information, the second identification unit further configured to: performing living body detection and identification according to the iris information, the fingerprint information and the facial feature information; and carrying out face matching on the iris information and the facial feature information according to the photo information on the identity image information.
In a possible embodiment, the third identification unit is further configured to: acquiring authentication information of the user from a third-party system, wherein the authentication information comprises a photo authentication information and a character authentication information; and matching the basic information, the biological information, the character information on the identity image information and the photo information according to the authentication message.
In a possible implementation, the creating unit is further configured to: determining the reliability value of the user according to the image recognition result, the biological recognition result and the identity authentication result; and if the reliability value of the user meets a preset condition, creating an account according to the basic information, the identity image information and the biological information submitted by the user.
In a possible implementation, the creating unit is further configured to: acquiring preset risk values of multiple types of limited operations, and determining a first operation authority of the account by comparing the reliability value of the user with the preset risk value of each type of limited operation, wherein the first operation authority is used for indicating the operation type range of the account; and/or determining a second operation authority of the account according to the reliability value of the user, wherein the second operation authority is used for indicating the operation limit range of the account.
In a possible implementation, the creating unit is further configured to: if any one of the multiple types of identification results does not meet the corresponding preset condition, subtracting a safety factor corresponding to the any one identification result from the initial value of the reliability of the user to obtain the reliability of the user; wherein an initial value of the reliability value of the user is a sum of the security factors corresponding to the multiple types of recognition results, and the multiple types of recognition results at least include the image recognition result, the biometric recognition result, and the identity authentication result.
In a possible implementation manner, the initial value of the reliability value of the user is the sum of a first security factor a corresponding to the image recognition result, a second security factor B corresponding to the biometric recognition result, a third security factor C corresponding to the identity authentication result, and a fourth security factor D corresponding to other recognition results; and the safety factor corresponding to any one identification result is correspondingly adjusted along with the change of the accuracy degree of any one identification result.
In a possible embodiment, the ratio of the sum of the first safety factor a, the second safety factor B and the third safety factor C to the initial value of the reliability value is greater than 90%; and the proportion of the first safety factor A relative to the sum of the first safety factor A and the second safety factor A is 20-25%; the proportion of the second safety factor B relative to the sum of the three is 30-35 percent; the third safety factor C accounts for 40 to 45 percent of the total of the three.
In a possible implementation, the apparatus further includes a blacklist matching unit configured to: and carrying out blacklist matching according to the basic information of the user, and rejecting the account opening request if the blacklist matching is matched.
In a third aspect, a data processing apparatus is provided, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform: the method of the first aspect.
In a fourth aspect, there is provided a computer readable storage medium storing a program which, when executed by a multi-core processor, causes the multi-core processor to perform the method of the first aspect.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects: when an account is opened for a user on line, in order to meet the characteristic risk control requirement, image recognition, biological recognition and identity authentication are carried out according to basic information, identity image information and biological information submitted by the user to determine the reliability degree of the user, accounts with different operation limits are set according to the reliability degree of the user, and the safety of data processing is ensured.
It should be understood that the above description is only an overview of the technical solutions of the present invention, so as to clearly understand the technical means of the present invention, and thus can be implemented according to the content of the description. In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
The advantages and benefits described herein, as well as other advantages and benefits, will be apparent to those of ordinary skill in the art upon reading the following detailed description of the exemplary embodiments. The drawings are only for purposes of illustrating exemplary embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like elements throughout. In the drawings:
FIG. 1 is a flow chart illustrating a data processing method according to an embodiment of the invention;
FIG. 2 is a block diagram of a data processing apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data processing apparatus according to another embodiment of the present invention.
In the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In the present invention, it is to be understood that terms such as "including" or "having," or the like, are intended to indicate the presence of the disclosed features, numbers, steps, behaviors, components, parts, or combinations thereof, and are not intended to preclude the possibility of the presence of one or more other features, numbers, steps, behaviors, components, parts, or combinations thereof.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict. The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
Those skilled in the art will appreciate that the described application scenario is only one example in which an embodiment of the present invention may be implemented. The scope of applicability of the embodiments of the present invention is not limited in any way. Having described the general principles of the invention, various non-limiting embodiments of the invention are described in detail below.
Fig. 1 is a schematic flowchart of a data processing method 100 according to an embodiment of the present application, for implementing remote secure account opening, in which, from a device perspective, an execution subject may be one or more electronic devices; from the program perspective, the execution main body may accordingly be a program loaded on these electronic devices.
As shown in fig. 1, the method 100 may include:
step 101, obtaining an account opening request of a user, wherein the account opening request comprises basic information, identity image information and biological information submitted by the user;
the basic information submitted by the user may include the nationality, sex, name, certificate type, certificate number, mobile phone number and other basic information entered on the page. The identity image information submitted by the user may include a user uploaded certificate photograph, such as an identity card image, passport image, driver's license image, and the like. The biological information submitted by the user comprises iris information, fingerprint information, facial feature information and the like of the user, which are acquired in real time based on a camera or an induction device of the intelligent terminal.
102, carrying out image recognition matching on the identity image information according to the basic information to obtain an image recognition result;
in one possible implementation, step 102 may further include: performing the image recognition on the identity image information by using an OCR technology to obtain character information and photo information on the identity image information; and matching the character information on the identity image information according to the basic information to obtain the image recognition result.
The OCR (Optical Character Recognition) technology can directly convert the text content on the picture into an editable text, so that the identity information can be recognized from the identity image information (such as an identity card image, a passport image and a driver license image) submitted by the user, and further, the identity information recognized by the OCR and the basic information input by the user can be matched to judge whether the identity information is consistent with the basic information.
In one example, after performing OCR recognition on the user's identification card photo, character information such as identification number, name, age, address, etc. on the identification card image can be obtained, and the identification card photo on the identification card image can also be obtained. Based on the method, the basic information submitted by the user and the character information obtained by OCR can be correspondingly matched, for example, the identity card number identified by the OCR and the identity card number input by the user are subjected to consistency matching, so that whether the user correctly fills the real basic information can be judged, and meanwhile, errors can be timely fed back to the user when the basic information submitted by the user is wrong.
Other image recognition techniques may be used to perform image recognition on the identification image information, which is not limited in this embodiment,
step 103, performing biometric identification matching on the biometric information according to the image identification result to obtain a biometric identification result;
as can be seen from the foregoing embodiments, OCR recognition may also obtain photo information in the identity image information, for example, obtain a certificate photo on an identity card image, so that biometric recognition may be performed based on the image recognition result and the biometric information of the user, and whether the identity image information and the user himself are the same person may be determined.
In a possible implementation, step 103 may further include: performing living body detection and identification according to the iris information, the fingerprint information and the facial feature information; and performing face matching according to the iris information, the facial feature information and the photo information obtained by OCR recognition.
In one example, first, the living body detection can be performed according to the iris information, the fingerprint information and the face feature information acquired in real time, so that the condition that the account is verified by masquerading as a real person through a photo is avoided. Furthermore, after the certificate photo on the identity card image is acquired through OCR recognition, the characteristic comparison is carried out on the certificate photo and biological information extracted by a user through a face recognition technology, and specifically, iris characteristic comparison and face characteristic comparison can be carried out, so that the risk of opening an account by maliciously falsely using other certificate information is avoided.
104, performing identity authentication according to the image recognition result, the biological recognition result and the basic information of the user to obtain an identity authentication result;
in one possible implementation, step 104 may further include: acquiring authentication information of the user from a third-party system, wherein the authentication information comprises a photo authentication information and a character authentication information; and matching the biological information of the user, the photo information and the character information obtained by the OCR recognition with the authentication message.
In one example, the third-party system may be an organization with authentication qualification and capability, in which the required authentication information, such as photo authentication information of a face photo and a fingerprint photo, such as a real identity number, a national character authentication message, is pre-stored. On the basis of the comprehensive consistency comparison of the information extracted by the user, the information obtained through OCR authentication and the information obtained through biological recognition, people avoid the risk of opening an account by maliciously counterfeiting the certificate.
And 105, creating an account according to the image recognition result, the biological recognition result and the identity authentication result, and determining the operation authority of the account.
In one possible implementation, the creating an account in step 105 may further include: determining the reliability value of the user according to the image recognition result, the biological recognition result and the identity authentication result; if the reliability value of the user meets a preset condition, an account is created according to the basic information, the identity image information and the biological information submitted by the user;
in one example, it can be understood that the more matching the image recognition result of the user shows the identity image information submitted by the user and the basic information, the higher the reliability of the user is. Accordingly, if the biometric result of the user shows that the identity image information submitted by the user matches the biometric information submitted by the user (such as iris information, facial feature information, and fingerprint information), this indicates that the user is more reliable. In addition, if the identity authentication result of the user shows that part or all of the identity image information, the biological information and the basic information submitted by the user can be matched with the backup information which is authenticated by the third-party system, the higher the matching degree is, the higher the reliability of the user is. Thereby, the reliability value of the user can be determined according to the three or more recognition results.
If the reliability value of the user meets the preset condition, an account can be established for the user, otherwise, the account opening request of the user is refused. The preset condition may be, for example, that the reliability value of the user does not reach the target value, or that the reliability value of the user is not 0.
In one possible embodiment, the determining the reliability value of the user according to the image recognition result, the biometric recognition result, and the identity authentication result includes: if any one of the multiple types of identification results does not meet the corresponding preset condition, subtracting a safety factor corresponding to the any one identification result from the initial value of the reliability of the user to obtain the reliability of the user; wherein an initial value of the reliability value of the user is a sum of the security factors corresponding to the multiple types of recognition results, and the multiple types of recognition results at least include the image recognition result, the biometric recognition result, and the identity authentication result.
In one example, assume that the security factor corresponding to the image recognition result is a, the security factor corresponding to the biometric recognition result is B, the security factor corresponding to the identity authentication result is C, and the security factor corresponding to the other recognition results is D. If the result of any recognition does not meet the preset condition, the corresponding safety factor is subtracted from the initial value of the reliability value, and if the image recognition result shows that the OCR recognition is unsuccessful and the other recognition results are successfully matched, the reliability value of the user is N-A.
In a possible implementation manner, the determining the operation right of the account in step 105 may further include: acquiring preset risk values of multiple types of limited operations, and determining a first operation authority of the account by comparing the reliability value of the user with the preset risk value of each type of limited operation, wherein the first operation authority is used for indicating the operation type range of the account; and/or determining a second operation authority of the account according to the reliability value of the user, wherein the second operation authority is used for indicating the operation limit range of the account.
In one example, assume that the security factor corresponding to the image recognition result is a, the security factor corresponding to the biometric recognition result is B, the security factor corresponding to the identity authentication result is C, and the security factor corresponding to the other recognition results is D. The initial value of the reliability value of the user is N ═ a + B + C + D, assuming that N is 100. And after an account is created for the user, if the risk value of one operation is higher than the calculated reliability value, the user is not allowed to open the authority of the operation. For example, if the reliability value of the created account is 75 points and the risk value of the cross-border transaction operation is 80 points, the account is not allowed to perform the cross-border transaction operation.
The operation limit range refers to the account scope which can be controlled, when the account is created for the user, the supported limit is the highest limit reliability value/100, if the supported limit is 0, the account is not supported, otherwise, the account is opened according to the obtained limit.
In a possible implementation manner, the initial value N of the reliability value of the user is the sum of a first security factor a corresponding to the image recognition result, a second security factor B corresponding to the biometric recognition result, a third security factor C corresponding to the identity authentication result, and a fourth security factor D corresponding to other recognition results; and the safety factor corresponding to any one identification result is correspondingly adjusted along with the change of the accuracy degree of any one identification result.
For example, if the reliability of the OCR technology, the biometric technology, and the identity authentication technology is changed, the value A, B, C should be adjusted, for example, when the recognition capability of the biometric technology for different countries and races is enhanced, the value B should be increased appropriately, and the values of other security factors should be adjusted accordingly, so that the value of the initial value N is not changed.
In a possible embodiment, the ratio of the sum of the first safety factor a, the second safety factor B and the third safety factor C to the initial value of the reliability value is greater than 90%; and the proportion of the first safety factor A relative to the sum of the first safety factor A and the second safety factor A is 20-25%; the proportion of the second safety factor B relative to the sum of the three is 30-35 percent; the third safety factor C accounts for 40 to 45 percent of the total of the three.
For example, assuming that N is 100, by performing big data analysis on the monitoring result of the risk transaction, a may be set to (100-D) × 24.5%, B may be set to (100-D) × 32.1%, C may be set to (100-D) × 43.4%, and the value of D is usually not greater than 10, which can only be used as an auxiliary judgment at present, so that the risk level is low, the risk requirement can be met, and the occurrence of situations such as fraud and brush stealing can be effectively controlled.
In one possible embodiment, after acquiring the opening account request of the user, the method further includes: and carrying out blacklist matching according to the basic information of the user, and if the blacklist is matched with the basic information of the user, rejecting an account opening request of the user.
According to various aspects of the embodiment, a user is allowed to flexibly submit an account opening request in an online mode, the reliability of the user is comprehensively verified by means of technologies such as biological identification, third-party authentication and picture identification of a terminal, and accounts with different permissions are configured according to risk conditions. Therefore, the account management safety is effectively improved, the efficiency of the financial institution for managing the user is favorably improved, and the actual expenditure cost is reduced.
In a possible implementation manner, based on the same technical concept, an embodiment of the present invention further provides a data processing apparatus, configured to execute the data processing method provided in any of the above embodiments. Fig. 2 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention.
As shown in fig. 2, the apparatus 200 includes:
an obtaining unit 201, configured to obtain an account opening request of a user, where the account opening request includes basic information, identity image information, and biological information submitted by the user;
the first identification unit 202 is configured to perform image identification matching on the identity image information according to the basic information to obtain an image identification result;
the second identification unit 203 is used for carrying out biological identification matching on the biological information according to the image identification result to obtain a biological identification result;
a third identification unit 304, configured to perform identity authentication according to the image identification result, the biometric identification result, and the basic information to obtain an identity authentication result;
a creating unit 205, configured to create an account according to the image recognition result, the biometric recognition result, and the identity authentication result, and determine an operation authority of the account.
In a possible implementation, the first identifying unit 202 is further configured to: performing the image recognition on the identity image information by using an OCR technology to obtain character information and photo information on the identity image information; and matching the character information on the identity image information according to the basic information to obtain the image recognition result.
In one possible embodiment, the biometric information of the user includes: iris information, fingerprint information, and facial feature information, the second identification unit 203 is further configured to: performing living body detection and identification according to the iris information, the fingerprint information and the facial feature information; and carrying out face matching on the iris information and the facial feature information according to the photo information on the identity image information.
In a possible implementation, the third identifying unit 204 is further configured to: acquiring authentication information of the user from a third-party system, wherein the authentication information comprises a photo authentication information and a character authentication information; and matching the basic information, the biological information, the character information on the identity image information and the photo information according to the authentication message.
In a possible implementation, the creating unit 205 is further configured to: determining the reliability value of the user according to the image recognition result, the biological recognition result and the identity authentication result; and if the reliability value of the user meets a preset condition, creating an account according to the basic information, the identity image information and the biological information submitted by the user.
In a possible implementation, the creating unit 205 is further configured to: acquiring preset risk values of multiple types of limited operations, and determining a first operation authority of the account by comparing the reliability value of the user with the preset risk value of each type of limited operation, wherein the first operation authority is used for indicating the operation type range of the account; and/or determining a second operation authority of the account according to the reliability value of the user, wherein the second operation authority is used for indicating the operation limit range of the account.
In a possible implementation, the creating unit 205 is further configured to: if any one of the multiple types of identification results does not meet the corresponding preset condition, subtracting a safety factor corresponding to the any one identification result from the initial value of the reliability of the user to obtain the reliability of the user; wherein an initial value of the reliability value of the user is a sum of the security factors corresponding to the multiple types of recognition results, and the multiple types of recognition results at least include the image recognition result, the biometric recognition result, and the identity authentication result.
In a possible implementation manner, the initial value of the reliability value of the user is the sum of a first security factor a corresponding to the image recognition result, a second security factor B corresponding to the biometric recognition result, a third security factor C corresponding to the identity authentication result, and a fourth security factor D corresponding to other recognition results; and the safety factor corresponding to any one identification result is correspondingly adjusted along with the change of the accuracy degree of any one identification result.
In a possible embodiment, the ratio of the sum of the first safety factor a, the second safety factor B and the third safety factor C to the initial value of the reliability value is greater than 90%; and the proportion of the first safety factor A relative to the sum of the first safety factor A and the second safety factor A is 20-25%; the proportion of the second safety factor B relative to the sum of the three is 30-35 percent; the third safety factor C accounts for 40 to 45 percent of the total of the three.
In a possible implementation, the apparatus further includes a blacklist matching unit configured to: and carrying out blacklist matching according to the basic information of the user, and rejecting the account opening request if the blacklist matching is matched.
Fig. 3 is a data processing apparatus according to an embodiment of the present application, configured to execute the data processing method shown in fig. 1, where the apparatus includes: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the data processing method shown in the above embodiments.
According to some embodiments of the present application, there is provided a non-volatile computer storage medium of a data processing method having stored thereon computer-executable instructions configured to, when executed by a processor, perform the data processing method illustrated in the embodiments described above
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus, device, and computer-readable storage medium embodiments, the description is simplified because they are substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for their relevance.
The apparatus, the device, and the computer-readable storage medium provided in the embodiment of the present application correspond to the method one to one, and therefore, the apparatus, the device, and the computer-readable storage medium also have advantageous technical effects similar to those of the corresponding method.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

Claims (22)

1. A data processing method, comprising:
acquiring an account opening request of a user, wherein the account opening request comprises basic information, identity image information and biological information submitted by the user;
performing image recognition matching on the identity image information according to the basic information to obtain an image recognition result;
performing biological identification matching on the biological information according to the image identification result to obtain a biological identification result;
performing identity authentication according to the image recognition result, the biological recognition result and the basic information to obtain an identity authentication result;
and creating an account according to the image recognition result, the biological recognition result and the identity authentication result, and determining the operation authority of the account.
2. The method of claim 1, wherein performing image recognition matching on the identity image information according to the basic information comprises:
performing the image recognition on the identity image information by using an OCR technology to obtain character information and photo information on the identity image information;
and matching the character information on the identity image information according to the basic information to obtain the image recognition result.
3. The method of claim 2, wherein the biometric information of the user comprises: iris information, fingerprint information and facial feature information, and performing biometric identification matching on the biometric information according to the image identification result, wherein the biometric identification matching comprises the following steps:
performing living body detection and identification according to the iris information, the fingerprint information and the facial feature information;
and carrying out face matching on the iris information and the facial feature information according to the photo information on the identity image information.
4. The method of claim 1, wherein performing identity authentication based on the image recognition result, the biometric recognition result, and the basic information comprises:
acquiring authentication information of the user from a third-party system, wherein the authentication information comprises a photo authentication information and a character authentication information;
and matching the basic information, the biological information, the character information on the identity image information and the photo information according to the authentication message.
5. The method of claim 1, wherein creating an account based on the image recognition result, the biometric recognition result, and the identity authentication result comprises:
determining the reliability value of the user according to the image recognition result, the biological recognition result and the identity authentication result;
and if the reliability value of the user meets a preset condition, creating an account according to the basic information, the identity image information and the biological information submitted by the user.
6. The method of claim 5, wherein determining the operational rights of the account comprises:
acquiring preset risk values of multiple types of limited operations, and determining a first operation authority of the account by comparing the reliability value of the user with the preset risk value of each type of limited operation, wherein the first operation authority is used for indicating the operation type range of the account; and/or
And determining a second operation authority of the account according to the reliability value of the user, wherein the second operation authority is used for indicating the operation limit range of the account.
7. The method of claim 5, wherein determining the reliability value of the user according to the image recognition result, the biometric recognition result, and the identity authentication result comprises:
if any one of the multiple types of identification results does not meet the corresponding preset condition, subtracting a safety factor corresponding to the any one identification result from the initial value of the reliability of the user to obtain the reliability of the user;
wherein an initial value of the reliability value of the user is a sum of the security factors corresponding to the multiple types of recognition results, and the multiple types of recognition results at least include the image recognition result, the biometric recognition result, and the identity authentication result.
8. The method according to claim 7, wherein the initial value of the reliability value of the user is the sum of a first security factor A corresponding to the image recognition result, a second security factor B corresponding to the biometric recognition result, a third security factor C corresponding to the identity authentication result, and a fourth security factor D corresponding to other recognition results;
and the safety factor corresponding to any one identification result is correspondingly adjusted along with the change of the accuracy degree of any one identification result.
9. The method according to claim 8, wherein the ratio of the sum of the first safety factor a, the second safety factor B and the third safety factor C to the initial value of the reliability value is greater than 90%;
and the proportion of the first safety factor A relative to the sum of the three is 20-25%; the second safety factor B is 30 to 35% of the sum of the three; the third safety factor C is 40% to 45% relative to the sum of the three.
10. The method of claim 1, further comprising:
and carrying out blacklist matching according to the basic information of the user, and rejecting the account opening request if the blacklist matching is matched.
11. A data processing apparatus, comprising:
the system comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring an account opening request of a user, and the account opening request comprises basic information, identity image information and biological information submitted by the user;
the first identification unit is used for carrying out image identification matching on the identity image information according to the basic information to obtain an image identification result;
the second identification unit is used for carrying out biological identification matching on the biological information according to the image identification result to obtain a biological identification result;
the third identification unit is used for carrying out identity authentication according to the image identification result, the biological identification result and the basic information to obtain an identity authentication result;
and the creating unit is used for creating an account according to the image recognition result, the biological recognition result and the identity authentication result and determining the operation authority of the account.
12. The apparatus of claim 11, wherein the first identifying unit is further configured to:
performing the image recognition on the identity image information by using an OCR technology to obtain character information and photo information on the identity image information;
and matching the character information on the identity image information according to the basic information to obtain the image recognition result.
13. The apparatus of claim 12, wherein the biometric information of the user comprises: iris information, fingerprint information, and facial feature information, the second identification unit further configured to:
performing living body detection and identification according to the iris information, the fingerprint information and the facial feature information;
and carrying out face matching on the iris information and the facial feature information according to the photo information on the identity image information.
14. The apparatus of claim 11, wherein the third identifying unit is further configured to:
acquiring authentication information of the user from a third-party system, wherein the authentication information comprises a photo authentication information and a character authentication information;
and matching the basic information, the biological information, the character information on the identity image information and the photo information according to the authentication message.
15. The apparatus of claim 11, wherein the creating unit is further configured to:
determining the reliability value of the user according to the image recognition result, the biological recognition result and the identity authentication result;
and if the reliability value of the user meets a preset condition, creating an account according to the basic information, the identity image information and the biological information submitted by the user.
16. The apparatus of claim 15, wherein the creating unit is further configured to:
acquiring preset risk values of multiple types of limited operations, and determining a first operation authority of the account by comparing the reliability value of the user with the preset risk value of each type of limited operation, wherein the first operation authority is used for indicating the operation type range of the account; and/or
And determining a second operation authority of the account according to the reliability value of the user, wherein the second operation authority is used for indicating the operation limit range of the account.
17. The apparatus of claim 15, wherein the creating unit is further configured to:
if any one of the multiple types of identification results does not meet the corresponding preset condition, subtracting a safety factor corresponding to the any one identification result from the initial value of the reliability of the user to obtain the reliability of the user;
wherein an initial value of the reliability value of the user is a sum of the security factors corresponding to the multiple types of recognition results, and the multiple types of recognition results at least include the image recognition result, the biometric recognition result, and the identity authentication result.
18. The apparatus according to claim 17, wherein the initial value of the reliability value of the user is a sum of a first security factor a corresponding to the image recognition result, a second security factor B corresponding to the biometric recognition result, a third security factor C corresponding to the identity authentication result, and a fourth security factor D corresponding to other recognition results;
and the safety factor corresponding to any one identification result is correspondingly adjusted along with the change of the accuracy degree of any one identification result.
19. The apparatus of claim 18, wherein a ratio of a sum of the first safety factor a, the second safety factor B, and the third safety factor C to an initial value of the reliability value is greater than 90%;
and the proportion of the first safety factor A relative to the sum of the three is 20-25%; the second safety factor B is 30 to 35% of the sum of the three; the third safety factor C is 40% to 45% relative to the sum of the three.
20. The apparatus of claim 11, further comprising a blacklist matching unit configured to:
and carrying out blacklist matching according to the basic information of the user, and rejecting the account opening request if the blacklist matching is matched.
21. A data processing apparatus, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform: the method of any one of claims 1-10.
22. A computer-readable storage medium storing a program that, when executed by a multi-core processor, causes the multi-core processor to perform the method of any one of claims 1-10.
CN202010966199.9A 2020-09-15 2020-09-15 Data processing method and device and computer readable storage medium Pending CN112184237A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010966199.9A CN112184237A (en) 2020-09-15 2020-09-15 Data processing method and device and computer readable storage medium
PCT/CN2021/116933 WO2022057682A1 (en) 2020-09-15 2021-09-07 Data processing method and device, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010966199.9A CN112184237A (en) 2020-09-15 2020-09-15 Data processing method and device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN112184237A true CN112184237A (en) 2021-01-05

Family

ID=73921124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010966199.9A Pending CN112184237A (en) 2020-09-15 2020-09-15 Data processing method and device and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN112184237A (en)
WO (1) WO2022057682A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022057682A1 (en) * 2020-09-15 2022-03-24 中国银联股份有限公司 Data processing method and device, and computer-readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN105790951A (en) * 2016-02-26 2016-07-20 浙江维尔科技股份有限公司 Identity authentication device and intelligent terminal
CN111199032A (en) * 2019-12-31 2020-05-26 华为技术有限公司 Identity authentication method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844206A (en) * 2015-01-15 2016-08-10 北京市商汤科技开发有限公司 Identity authentication method and identity authentication device
AU2017277538B2 (en) * 2016-06-06 2019-11-14 Financial & Risk Organisation Limited Systems and methods for providing identity scores
US20190065874A1 (en) * 2017-08-30 2019-02-28 Mastercard International Incorporated System and method of authentication using image of a user
CN109214924A (en) * 2018-08-08 2019-01-15 深圳市富途网络科技有限公司 A kind of online activating method of securities account of identity-based identification
CN111553785A (en) * 2020-04-02 2020-08-18 上海浦东发展银行股份有限公司 Interactive service triggered bank account opening verification method and system
CN112184237A (en) * 2020-09-15 2021-01-05 中国银联股份有限公司 Data processing method and device and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN105790951A (en) * 2016-02-26 2016-07-20 浙江维尔科技股份有限公司 Identity authentication device and intelligent terminal
CN111199032A (en) * 2019-12-31 2020-05-26 华为技术有限公司 Identity authentication method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022057682A1 (en) * 2020-09-15 2022-03-24 中国银联股份有限公司 Data processing method and device, and computer-readable storage medium

Also Published As

Publication number Publication date
WO2022057682A1 (en) 2022-03-24

Similar Documents

Publication Publication Date Title
CN109326058B (en) Identity verification method and device based on intelligent teller machine, terminal and readable medium
US9946865B2 (en) Document authentication based on expected wear
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
CN110489415B (en) Data updating method and related equipment
US20210089635A1 (en) Biometric identity verification and protection software solution
US11824851B2 (en) Identification document database
CN110796054B (en) Certificate verification method and device
JP2006504167A (en) Method for performing secure electronic transactions using portable data storage media
CN110392041B (en) Electronic authorization method, device, storage equipment and storage medium
US20200143377A1 (en) Systems and methods for user identity authentication
CN111553312A (en) Business handling method and device
KR102139257B1 (en) System for providing non face to face authentication service
CN109523266A (en) A kind of payment authentication method, method of payment, system and electronic equipment
CN109635625B (en) Intelligent identity verification method, equipment, storage medium and device
CN112487982A (en) Merchant information auditing method, system and storage medium
CN111160920A (en) Method and device for preventing bank card from being embezzled
CN112184237A (en) Data processing method and device and computer readable storage medium
CN106600845A (en) Method and device for retrieving captured card in self-service manner
CN113591603A (en) Certificate verification method and device, electronic equipment and storage medium
CN112699811A (en) Living body detection method, apparatus, device, storage medium, and program product
CN113170021A (en) Method and system for remote interaction between at least one user and at least one operator of automatic and manual type
JP2001005836A (en) Iris registration system
CN106645409A (en) Document authenticity identifying method and device
CN114936848A (en) Contract flow management method and storage medium
CN108876386B (en) Object authentication method and device, and transaction method and device based on object authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination