CN112367314A - Identity authentication method, device, computing equipment and medium - Google Patents

Identity authentication method, device, computing equipment and medium Download PDF

Info

Publication number
CN112367314A
CN112367314A CN202011200317.1A CN202011200317A CN112367314A CN 112367314 A CN112367314 A CN 112367314A CN 202011200317 A CN202011200317 A CN 202011200317A CN 112367314 A CN112367314 A CN 112367314A
Authority
CN
China
Prior art keywords
picture
identifier
identity authentication
intercepted
authentication result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011200317.1A
Other languages
Chinese (zh)
Other versions
CN112367314B (en
Inventor
王国锋
石宝滨
江心洲
李玉奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202011200317.1A priority Critical patent/CN112367314B/en
Publication of CN112367314A publication Critical patent/CN112367314A/en
Application granted granted Critical
Publication of CN112367314B publication Critical patent/CN112367314B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present disclosure provides a method for identity authentication, which can be used in the financial field or other fields. The method comprises the following steps: the application server sends a target instruction to the terminal equipment to acquire user video data acquired by the terminal equipment and an intercepted picture determined according to the video data; the electronic image platform stores the video data and generates an image identifier according to the video data; the application server sends the image identification to a client system of the legal person; the application server converts the captured picture and the reference picture of the user into a data stream in a preset format and sends the data stream to a face comparison system; the face comparison system converts the data stream into a screenshot picture and a reference picture, and determines an identity authentication result and a comparison identifier according to the screenshot picture and the reference picture; and the legal client system verifies the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier. The present disclosure also provides a system, computing device, and medium for identity authentication.

Description

Identity authentication method, device, computing equipment and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and a system for identity authentication, a computing device, and a computer storage medium.
Background
The prior banking business is mainly offline, and when a user transacts banking business, the user needs to go to an offline website of a bank for transaction, which wastes time and labor for the user. For example, for an enterprise user, when the enterprise user handles an account opening service, a bank needs to perform identity identification authentication on a legal representative of the enterprise when the enterprise reserves an account opening, so that the legal representative of the enterprise needs to go offline of the bank to perform identity identification authentication, and the steps are relatively complex, which causes great inconvenience to the user.
Disclosure of Invention
One aspect of the present disclosure provides a method of identity authentication, comprising: the method comprises the steps that an application server sends a target instruction to a terminal device to obtain video data of a user collected by the terminal device and an intercepted picture determined according to the video data; the application server sends the video data to an electronic image platform; the electronic image platform stores the video data, generates an image identifier according to the video data, and sends the image identifier to the application server; the application server sends the image identification to a client system of a legal person; the application server converts the intercepted picture and the reference picture of the user into a data stream with a preset format and sends the data stream to a face comparison system; the face comparison system converts the data stream into a screenshot picture and a reference picture, determines an identity authentication result and a comparison identifier according to the screenshot picture and the reference picture, and sends the identity authentication result and the comparison identifier to the application server; the application server sends the identity authentication result and the comparison identification to a client system of a legal person; and the client system of the legal person verifies the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier.
Optionally, the method further comprises: the application server acquires the identity document information of the user; and acquiring the reference photo of the user from a third-party system according to the identity document information of the user.
Optionally, determining an identity authentication result according to the captured picture and the reference picture, including: determining whether the intercepted picture and the reference picture contain image information of a human face or not; under the condition that the intercepted image and the reference image contain image information of a human face, carrying out anti-attack detection on the intercepted image; and comparing the intercepted picture with the reference picture to obtain the identity authentication result under the condition that the anti-attack detection is passed
Optionally, the performing attack prevention detection on the intercepted image includes: determining Moire, light information and/or pixel information of the intercepted picture; and determining whether the intercepted picture is intercepted from a real video or not according to the Moire patterns, the light information and/or the pixel information.
Optionally, the comparing the captured picture with the reference picture to obtain the identity authentication result includes: adjusting the intercepted picture and the reference picture to preset sizes; respectively extracting key features in the intercepted picture and the reference picture; and determining the identity authentication result by comparing the key features in the intercepted picture with the key features in the reference picture.
Optionally, the key features comprise at least one of the following features: the distance between the eyes, the size of the nose wing, the size of the mouth, the size of the eyebrows, and the facial contour.
Optionally, the method further comprises: the face comparison system sends the intercepted picture and the reference picture to the electronic image platform; the electronic image platform stores the intercepted picture and the reference picture, and sends a first picture identifier and a second picture identifier generated according to the intercepted picture and the reference picture to the comparison system respectively; wherein, the determining a comparison identifier according to the captured picture and the reference picture includes: and generating the comparison identifier according to the identity authentication result, the first picture identifier and the second picture identifier.
Optionally, the verifying the identity authentication result according to the image identifier, the identity authentication result, and the comparison identifier includes: acquiring video data, an intercepted picture and a reference picture from an electronic image platform according to the image identifier and the comparison identifier; and displaying the identity authentication result, the video data, the intercepted picture and the reference picture to a worker, so that the worker verifies the identity authentication result according to the video data, the intercepted picture and the reference picture.
Another aspect of the present disclosure provides a system for identity authentication, including: the application server is used for sending a target instruction to the terminal equipment so as to instruct the terminal equipment to collect video data of a user and determine an intercepted picture according to the video data; receiving the video data and the intercepted picture from the terminal equipment; sending the video data to an electronic image platform so that the electronic image platform stores the video data; receiving the image identification from the electronic image platform and sending the image identification to a client system of a legal person; converting the intercepted picture and the reference picture of the user into a data stream in a preset format, and sending the data stream to a face comparison system so that the face comparison system determines an identity authentication result according to the intercepted picture and the reference picture; receiving an identity authentication result and a comparison identifier from the face comparison system, and sending the image identifier, the comparison identifier and the identity authentication result to a legal customer system so as to verify the identity authentication result through the legal customer system; the electronic image platform is used for storing the video data and sending the image identification to the application server according to the image identification generated by the video data; the face comparison system is used for receiving a data stream from the application server; converting the data stream into a screenshot picture and a reference picture; determining an identity authentication result and a comparison identifier according to the intercepted picture and the reference picture; sending the identity authentication result and the comparison identifier to the application server; the legal client system is used for receiving the image identifier and the comparison identifier from the application server; and verifying the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier.
Optionally, the face comparison system is further configured to send the captured picture and the reference picture to the electronic image platform; receiving a first picture identifier and a second picture identifier from the electronic image platform, and generating the comparison identifier according to the identity authentication result, the first picture identifier and the second picture identifier; the electronic image platform is also used for receiving the intercepted picture and the reference picture from the human face comparison system; storing the intercepted picture and the reference picture, and respectively generating a first picture identifier and a second picture identifier according to the intercepted picture and the reference picture; and sending the first picture identification and the second picture identification to the comparison system.
Another aspect of the disclosure provides a computing device comprising: one or more processors; storage means for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, after a user records a video by using the terminal equipment, the terminal equipment uploads the video and the picture intercepted from the video, and the intercepted picture is compared with the reference picture to obtain an identity authentication result for a worker to refer to, so that the user does not need to be tired to go off the line and go off the counter to handle authentication service, the time of the user is saved, and the safety and accuracy of authentication are ensured. In addition, the application server, the electronic image platform, the human face comparison system and the legal client system are mutually independent and are mutually matched in the process of identity recognition, so that service decoupling and data decoupling are realized.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically shows a schematic diagram of an application scenario in which a method of identity authentication may be applied, according to an embodiment of the present disclosure;
fig. 2 schematically shows a flow diagram of a method of identity authentication according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a method of identity authentication according to another embodiment of the present disclosure;
FIG. 4 schematically illustrates a block diagram of a system of identity authentication, in accordance with an embodiment of the present disclosure; and
FIG. 5 schematically illustrates a block diagram of a computer system suitable for implementing the methods of embodiments of the present disclosure, in accordance with embodiments of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides an identity authentication method. The method comprises the steps that an application server sends a target instruction to a terminal device to obtain video data of a user, collected by the terminal device, and an intercepted picture determined according to the video data; the application server sends the video data to the electronic image platform; the electronic image platform stores the video data, generates an image identifier according to the video data and sends the image identifier to the application server; the application server sends the image identification to a client system of the legal person; the application server converts the captured picture and the reference picture of the user into a data stream in a preset format and sends the data stream to a face comparison system; the face comparison system converts the data stream into a screenshot picture and a reference picture, determines an identity authentication result and a comparison identifier according to the screenshot picture and the reference picture, and sends the identity authentication result and the comparison identifier to the application server; the application server sends the identity authentication result and the comparison identification to the client system of the legal person; and the legal client system verifies the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier.
It should be noted that the method and system for identity authentication according to the embodiments of the present disclosure may be used in the financial field, and may also be used in any field other than the financial field.
Fig. 1 schematically shows a schematic diagram of an application scenario in which a method of identity authentication may be applied according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the application scenario 100 according to this embodiment may include a terminal device 101, an application server 102, a third-party system 103, a face comparison system 104, an electronic image platform 105, a corporate client system 106, and a network 107.
The network 107 serves, among other things, to provide a medium for communication links between the terminal devices 101 and the application server 102. The network 107 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may use the terminal device 101 to interact with the application server 102 via the network 107 to receive or send messages or the like. Various communication client applications, such as a mobile banking application, a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, etc. (by way of example only) may be installed on the terminal device 101.
The terminal device 101 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like. The terminal apparatus 101 has therein an image capturing module, such as a camera module, for capturing an image outside the apparatus, such as an image of a user.
The application server 102 may be a background management server providing support for client applications used by users with the terminal device 101. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
The third party system 103 may be used to provide a reference picture of the user that is used to verify the identity of the user. The third party system 103 may be, for example, a people banking system.
The face comparison system 104 may be configured to receive a plurality of pictures containing faces, and perform operations such as living body detection, attack prevention detection, face recognition comparison, and the like on the plurality of pictures to verify the identities of the persons in the pictures.
The electronic video platform 105 may be used to archive video data or picture data for each user.
The corporate staff may use the corporate client system 106 to retrieve information about the user's video data, image data, and authentication results, and then verify the information, and if the user's identity is suspect, may initiate a re-authentication request until there is no problem with the user's identity authentication.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically shows a flow chart of a method of identity authentication performed by an application server according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S280.
In operation S210, the application server sends a target instruction to the terminal device to obtain video data of the user collected by the terminal device and an intercepted picture determined according to the video data.
According to the embodiment of the disclosure, the target instruction may be used to instruct the terminal device to acquire video data of a user, and determine to capture a picture according to the video data.
According to the embodiment of the disclosure, the terminal device can randomly intercept one frame of picture from the collected video of the user as the intercepted picture.
In operation S220, the application server transmits the video data to the electronic image platform.
In operation S230, the electronic image platform stores the video data, generates an image identifier according to the video data, and sends the image identifier to the application server.
According to the embodiment of the disclosure, after receiving video data, the electronic image platform stores and archives the video data, and generates an image identifier according to the video data, wherein the image identifier is used for representing the video data stored by the electronic image platform. The image identifier may include, for example, an image number.
In operation S240, the application server transmits the image identifier to the corporate client system.
In operation S250, the application server converts the captured picture and the reference picture of the user into a data stream in a preset format, and sends the data stream to the face comparison system.
According to an embodiment of the present disclosure, the preset format may include, for example, a base64 format. That is, the cut picture and the reference picture of the user are converted into a base64 stream in operation S250, and then the base64 stream is transmitted to the face contrast system.
According to the embodiment of the disclosure, the identity document information of the user can be acquired, and then the reference photo of the user is acquired from the third-party system according to the identity document information of the user. The third party system may be, for example, a system such as a people bank system or a public security system that can provide an authority of the user's real photos. Illustratively, the identity document information may include, for example, an identification number. It should be noted that the identity document information may also be other document information capable of representing the identity of the user, and this disclosure is not limited in this respect.
In operation S260, the face comparison system converts the data stream into a screenshot picture and a reference picture, determines an identity authentication result and a comparison identifier according to the screenshot picture and the reference picture, and sends the identity authentication result and the comparison identifier to the application server.
According to the embodiment of the disclosure, the data stream in the base64 format can be converted into the corresponding picture file, so that the screenshot picture and the reference picture are obtained.
According to an embodiment of the present disclosure, the identity authentication result may be determined by: determining whether the intercepted picture and the reference picture contain image information of the face, carrying out anti-attack detection on the intercepted picture under the condition that the intercepted picture and the reference picture contain the image information of the face, and comparing the intercepted picture with the reference picture under the condition that the anti-attack detection is passed so as to obtain an identity authentication result.
The anti-attack detection on the intercepted image may include, for example: detecting whether Moire characteristics exist in the intercepted picture, if the Moire characteristics exist in the intercepted picture, indicating that the intercepted image is not a living body image, namely is not intercepted from a real video, and determining that the intercepted picture is invalid. Or, information such as light information and/or pixel information in the captured picture can be extracted, and then whether the captured picture is captured from the real video or not can be determined according to the light information and/or the pixel information in the captured picture.
According to the embodiment of the present disclosure, comparing the captured image with the reference image to obtain an identity authentication result, includes: and adjusting the intercepted picture and the reference picture to preset sizes, then respectively extracting key features in the intercepted picture and the reference picture, and determining an identity authentication result by comparing the key features in the intercepted picture with the key features in the reference picture. And if the key features in the intercepted picture are consistent with the corresponding key features in the reference picture, the identity authentication result is that the comparison is passed.
According to embodiments of the present disclosure, the key features may for example comprise at least one of the following features: the distance between the eyes, the size of the nose wing, the size of the mouth, the size of the eyebrows, and the facial contour. It should be noted that the above features are only examples, and in the process of practical application, the process of comparison may also be based on other facial features.
According to the embodiment of the disclosure, the comparison is not limited to the comparison of absolute values of the features, and the comparison can be performed according to the proportion between different features.
According to an embodiment of the present disclosure, the alignment identifier may be determined by: and the face comparison system sends the captured picture and the reference picture to the electronic image platform. After the intercepted picture and the reference picture are received, the electronic image platform stores and files the intercepted picture and the reference picture, and generates a first picture identifier and a second picture identifier according to the intercepted picture and the reference picture respectively. The picture identifier is used for representing pictures stored in the electronic image platform. The picture identification may comprise, for example, a picture number. Then, the face comparison system receives the first picture identification and the second picture identification from the electronic image platform, and generates a comparison identification according to the identity authentication result, the first picture identification and the second picture identification.
According to the embodiment of the disclosure, a string of numbers can be generated as the comparison identifier according to the identity authentication result, the first picture identifier and the second picture identifier.
In operation S270, the application server sends the identity authentication result and the comparison identifier to the client system of the legal person.
In operation S280, the client system of the legal person verifies the authentication result according to the image identifier, the authentication result and the comparison identifier.
According to an embodiment of the present disclosure, operation S280 may include, for example: and acquiring video data, an intercepted picture and a reference picture from the electronic image platform according to the image identifier and the comparison identifier, and displaying the identity authentication result, the video data, the intercepted picture and the reference picture to a worker so that the worker verifies the identity authentication result according to the video data, the intercepted picture and the reference picture.
According to the embodiment of the disclosure, a worker can use the legal client system to inquire the related information of the identity authentication operation of the user, and according to the inquiry instruction input by the worker, the legal client system can call and display the video data, the captured picture, the reference picture and the identity authentication result of the corresponding user, so that the worker can conveniently perform manual audit. If the staff has doubt about the identity of the user, the staff can initiate a re-authentication request until the identity authentication is not problematic.
According to the embodiment of the disclosure, after a user records a video by using the terminal equipment, the terminal equipment uploads the video and the picture intercepted from the video, and the intercepted picture is compared with the reference picture to obtain an identity authentication result for a worker to refer to, so that the user does not need to be tired to go off the line and go off the counter to handle authentication service, the time of the user is saved, and the safety and accuracy of authentication are ensured.
In addition, the application server, the electronic image platform, the human face comparison system and the legal client system are mutually independent and are mutually matched in the process of identity recognition, so that service decoupling and data decoupling are realized.
The method of fig. 2 is further described with reference to fig. 3 in conjunction with specific embodiments.
Those skilled in the art will appreciate that the following example embodiments are only for the understanding of the present disclosure, and the present disclosure is not limited thereto.
Fig. 3 schematically illustrates a method of identity authentication according to another embodiment of the present disclosure.
As shown in fig. 3, a certain enterprise needs to handle account opening services and upload reservation application information in advance. In order to ensure safety, the legal representatives (i.e., users or clients) of the enterprise are also authenticated. Based on the method, an application server (such as an enterprise mobile phone server) enters a video supplementary recording function, a camera of the terminal device is started through a mobile phone client App (such as an enterprise mobile phone App) installed on the terminal device so as to acquire a video image of a legal representative of an enterprise, obtain a video file, and intercept pictures from the video file. The terminal equipment sends the video file and the intercepted picture to the application server, and the application server receives the video file and the intercepted picture from the terminal equipment and stores the video file to the electronic image platform.
The electronic image platform receives and stores the video file from the application server, archives the video file, generates an image identifier (such as an image number) corresponding to the video file, and then feeds the image number back to the application server.
The application server receives the image number sent by the electronic image platform and records the image number to the client system of the legal person.
The application server obtains the reference photo of the user from a people bank system (called a pedestrian system for short) according to the user identification (such as an identity card number) in the appointment-making application information. And converting the reference picture and the intercepted picture into a base64 stream and sending the base64 stream to a face comparison system.
The face comparison system receives a reference picture and an intercepted picture from the application server and respectively detects whether the reference picture and the intercepted picture contain image information of a face. And if the image information of the face cannot be detected in any one of the reference picture and the intercepted picture, feeding back the identification failure to the application server, and prompting the user that the operation fails through the client App after the application server receives the feedback of the identification failure. If the image information of the human face is detected in both the reference picture and the intercepted picture, determining whether the intercepted picture is intercepted when a real person records a video according to the information of moire fringes, light, pixels and the like in the intercepted picture. And if the intercepted picture cannot be intercepted when the real person records the video, the identification failure is fed back to the application server, and the application server receives the identification failure feedback and prompts the user of the operation failure through the client App. If the captured image is determined to be captured when the video is recorded by a real person, the captured image is further compared with the reference image to determine an identity authentication result, and the identity authentication result is used for indicating whether the faces in the two images are the same person or not. And if the human faces in the two pictures are the same person, storing the two pictures to the electronic image platform. The electronic image platform files the captured picture and the reference picture to generate a comparison number (i.e. a comparison identifier). The comparison mark comprises image number information of two filed images.
And the application server receives the identity authentication result and the comparison number, records the identity authentication result, the image number and the comparison number in a client system of the legal person, and prompts the user to operate successfully through the client App.
And the staff logs in the client system of the legal person to obtain the application information of the appointment making, and obtains the video file, the captured picture and the reference picture from the electronic image platform according to the image number and the comparison number. And then, referring to the identity authentication result by the staff, judging whether the video file and the intercepted picture are consistent with the reference picture, if not, indicating the application server to perform video authentication again, and if so, performing the subsequent flow of opening the account.
Fig. 4 schematically shows a block diagram of a system of identity authentication according to an embodiment of the present disclosure.
As shown in fig. 4, the system 400 for identity authentication includes an application server 410, an electronic image platform 420, a face comparison system 430, and a legal client system 440. The apparatus 400 may perform the methods described above with reference to fig. 2-3.
Specifically, the application server 410 may be configured to send a target instruction to the terminal device to instruct the terminal device to acquire video data of a user, and determine to capture a picture according to the video data; receiving video data and an intercepted picture from terminal equipment; sending the video data to an electronic image platform so that the electronic image platform stores the video data; receiving an image identifier from an electronic image platform, and sending the image identifier to a client system of a legal person; converting the intercepted picture and a reference picture of a user into a data stream with a preset format, and sending the data stream to a face comparison system so that the face comparison system determines an identity authentication result according to the intercepted picture and the reference picture; and receiving the identity authentication result and the comparison identification from the face comparison system, and sending the image identification, the comparison identification and the identity authentication result to the client system of the legal person so as to verify the identity authentication result through the client system of the legal person.
The electronic image platform 420 may be configured to store video data, and send an image identifier generated according to the video data to the application server.
A face comparison system 430, which may be configured to receive a data stream from an application server; converting the data stream into a screenshot picture and a reference picture; determining an identity authentication result and a comparison identifier according to the intercepted picture and the reference picture; and sending the identity authentication result and the comparison identifier to the application server.
The legal client system 440 may be configured to receive the image identifier and the comparison identifier from the application server; and verifying the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier.
According to the embodiment of the disclosure, the face comparison system can also be used for sending the captured picture and the reference picture to the electronic image platform; and receiving a first picture identifier and a second picture identifier from the electronic image platform, and generating a comparison identifier according to the identity authentication result, the first picture identifier and the second picture identifier.
According to an embodiment of the present disclosure, the electronic imaging platform may be further configured to receive an intercepted picture and a reference picture from the face comparison system; storing the intercepted picture and the reference picture, and respectively generating a first picture identifier and a second picture identifier according to the intercepted picture and the reference picture; and sending the first picture identification and the second picture identification to a comparison system.
According to the embodiment of the disclosure, after a user records a video by using the terminal equipment, the terminal equipment uploads the video and the picture intercepted from the video, and the intercepted picture is compared with the reference picture to obtain an identity authentication result for a worker to refer to, so that the user does not need to be tired to go off the line and go off the counter to handle authentication service, the time of the user is saved, and the safety and accuracy of authentication are ensured.
In addition, the application server, the electronic image platform, the human face comparison system and the legal client system are mutually independent and are mutually matched in the process of identity recognition, so that service decoupling and data decoupling are realized.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any of the application server 410, the electronic image platform 420, the face comparison system 430, and the legal client system 440 may be combined and implemented in one module, or any one of the modules may be split into multiple modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the application server 410, the electronic image platform 420, the face comparison system 430, and the legal client system 440 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or may be implemented in any one of three implementations of software, hardware, and firmware, or in any suitable combination of any of them. Alternatively, at least one of the application server 410, the electronic image platform 420, the face comparison system 430 and the legal client system 440 may be at least partially implemented as computer program modules that, when executed, perform corresponding functions.
FIG. 5 schematically illustrates a block diagram of a computer system suitable for implementing the above-described method according to an embodiment of the present disclosure. The computer system illustrated in FIG. 5 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 5, computer system 500 includes a processor 510 and a computer-readable storage medium 520. The computer system 500 may perform a method according to an embodiment of the disclosure.
In particular, processor 510 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 510 may also include on-board memory for caching purposes. Processor 510 may be a single processing unit or a plurality of processing units for performing different actions of a method flow according to embodiments of the disclosure.
Computer-readable storage media 520, for example, may be non-volatile computer-readable storage media, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 520 may include a computer program 521, which computer program 521 may include code/computer-executable instructions that, when executed by the processor 510, cause the processor 510 to perform a method according to an embodiment of the disclosure, or any variation thereof.
The computer program 521 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 521 may include one or more program modules, including for example 521A, modules 521B, … …. It should be noted that the division and number of modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, and when these program modules are executed by the processor 510, the processor 510 may execute the method according to the embodiment of the present disclosure or any variation thereof.
According to an embodiment of the present invention, at least one of the application server 410, the electronic image platform 420, the face comparison system 430 and the legal client system 440 may be implemented as computer program modules as described with reference to fig. 5, which when executed by the processor 510, may perform the corresponding operations described above.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (12)

1. A method of identity authentication, comprising:
the method comprises the steps that an application server sends a target instruction to a terminal device to obtain video data of a user collected by the terminal device and an intercepted picture determined according to the video data;
the application server sends the video data to an electronic image platform;
the electronic image platform stores the video data, generates an image identifier according to the video data, and sends the image identifier to the application server;
the application server sends the image identification to a client system of a legal person;
the application server converts the intercepted picture and the reference picture of the user into a data stream with a preset format and sends the data stream to a face comparison system;
the face comparison system converts the data stream into a screenshot picture and a reference picture, determines an identity authentication result and a comparison identifier according to the screenshot picture and the reference picture, and sends the identity authentication result and the comparison identifier to the application server;
the application server sends the identity authentication result and the comparison identification to a client system of a legal person; and
and the client system of the legal person verifies the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier.
2. The method of claim 1, further comprising:
the application server acquires the identity document information of the user; and
and acquiring the reference photo of the user from a third-party system according to the identity document information of the user.
3. The method of claim 1, wherein the determining an identity authentication result from the captured picture and the reference picture comprises:
determining whether the intercepted picture and the reference picture contain image information of a human face or not;
under the condition that the intercepted image and the reference image contain image information of a human face, carrying out anti-attack detection on the intercepted image; and
and comparing the intercepted picture with the reference picture under the condition that the anti-attack detection is passed so as to obtain the identity authentication result.
4. The method of claim 3, wherein the anti-attack detection of the truncated image comprises:
determining Moire, light information and/or pixel information of the intercepted picture; and
and determining whether the intercepted picture is intercepted from a real video or not according to the Moire patterns, the light information and/or the pixel information.
5. The method of claim 3, wherein the comparing the captured picture with the reference picture to obtain the identity authentication result comprises:
adjusting the intercepted picture and the reference picture to preset sizes;
respectively extracting key features in the intercepted picture and the reference picture; and
and determining the identity authentication result by comparing the key features in the intercepted picture with the key features in the reference picture.
6. The method of claim 5, wherein the key features comprise at least one of: the distance between the eyes, the size of the nose wing, the size of the mouth, the size of the eyebrows, and the facial contour.
7. The method of claim 1, further comprising:
the face comparison system sends the intercepted picture and the reference picture to the electronic image platform;
the electronic image platform stores the intercepted picture and the reference picture, and sends a first picture identifier and a second picture identifier generated according to the intercepted picture and the reference picture to the comparison system respectively;
wherein, the determining a comparison identifier according to the captured picture and the reference picture includes:
and generating the comparison identifier according to the identity authentication result, the first picture identifier and the second picture identifier.
8. The method of claim 1, wherein verifying the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier comprises:
acquiring video data, an intercepted picture and a reference picture from an electronic image platform according to the image identifier and the comparison identifier; and
and displaying the identity authentication result, the video data, the intercepted picture and the reference picture to a worker, so that the worker verifies the identity authentication result according to the video data, the intercepted picture and the reference picture.
9. A system of identity authentication, comprising:
the application server is used for sending a target instruction to the terminal equipment so as to instruct the terminal equipment to collect video data of a user and determine an intercepted picture according to the video data; receiving the video data and the intercepted picture from the terminal equipment; sending the video data to an electronic image platform so that the electronic image platform stores the video data; receiving the image identification from the electronic image platform and sending the image identification to a client system of a legal person; converting the intercepted picture and the reference picture of the user into a data stream in a preset format, and sending the data stream to a face comparison system so that the face comparison system determines an identity authentication result according to the intercepted picture and the reference picture; receiving an identity authentication result and a comparison identifier from the face comparison system, and sending the image identifier, the comparison identifier and the identity authentication result to a legal customer system so as to verify the identity authentication result through the legal customer system;
the electronic image platform is used for storing the video data and sending the image identification to the application server according to the image identification generated by the video data;
the face comparison system is used for receiving a data stream from the application server; converting the data stream into a screenshot picture and a reference picture; determining an identity authentication result and a comparison identifier according to the intercepted picture and the reference picture; sending the identity authentication result and the comparison identifier to the application server; and
the legal client system is used for receiving the image identifier and the comparison identifier from the application server; and verifying the identity authentication result according to the image identifier, the identity authentication result and the comparison identifier.
10. The system of claim 9, wherein,
the human face comparison system is also used for sending the intercepted picture and the reference picture to the electronic image platform; receiving a first picture identifier and a second picture identifier from the electronic image platform, and generating the comparison identifier according to the identity authentication result, the first picture identifier and the second picture identifier; and
the electronic image platform is also used for receiving the intercepted picture and the reference picture from the human face comparison system; storing the intercepted picture and the reference picture, and respectively generating a first picture identifier and a second picture identifier according to the intercepted picture and the reference picture; and sending the first picture identification and the second picture identification to the comparison system.
11. A computing device, comprising:
one or more processors;
a memory for storing one or more computer programs,
wherein the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 8.
12. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to carry out the method of any one of claims 1 to 8.
CN202011200317.1A 2020-10-30 2020-10-30 Identity authentication method, device, computing equipment and medium Active CN112367314B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011200317.1A CN112367314B (en) 2020-10-30 2020-10-30 Identity authentication method, device, computing equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011200317.1A CN112367314B (en) 2020-10-30 2020-10-30 Identity authentication method, device, computing equipment and medium

Publications (2)

Publication Number Publication Date
CN112367314A true CN112367314A (en) 2021-02-12
CN112367314B CN112367314B (en) 2022-10-28

Family

ID=74512477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011200317.1A Active CN112367314B (en) 2020-10-30 2020-10-30 Identity authentication method, device, computing equipment and medium

Country Status (1)

Country Link
CN (1) CN112367314B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113627387A (en) * 2021-08-30 2021-11-09 平安国际融资租赁有限公司 Parallel identity authentication method, device, equipment and medium based on face recognition

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141615A (en) * 2015-09-07 2015-12-09 天地融科技股份有限公司 Method and system for opening account remotely, authentication method and system
CN108596814A (en) * 2018-04-20 2018-09-28 聊城农村商业银行股份有限公司 Social security Verification System based on recognition of face
CN109672710A (en) * 2017-10-17 2019-04-23 阿里巴巴集团控股有限公司 File uploading method, system and equipment
CN109840494A (en) * 2019-01-28 2019-06-04 北京得意音通技术有限责任公司 Identity identifying method, device, computer program, storage medium and electronic equipment
WO2019134245A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Number arrangement method, server, and storage medium based on human face recognition
CN111754234A (en) * 2020-07-07 2020-10-09 中国银行股份有限公司 Air banking business processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141615A (en) * 2015-09-07 2015-12-09 天地融科技股份有限公司 Method and system for opening account remotely, authentication method and system
CN109672710A (en) * 2017-10-17 2019-04-23 阿里巴巴集团控股有限公司 File uploading method, system and equipment
WO2019134245A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Number arrangement method, server, and storage medium based on human face recognition
CN108596814A (en) * 2018-04-20 2018-09-28 聊城农村商业银行股份有限公司 Social security Verification System based on recognition of face
CN109840494A (en) * 2019-01-28 2019-06-04 北京得意音通技术有限责任公司 Identity identifying method, device, computer program, storage medium and electronic equipment
CN111754234A (en) * 2020-07-07 2020-10-09 中国银行股份有限公司 Air banking business processing method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴珊等: "一种基于监控视频中人脸检索解决方案", 《电子设计工程》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113627387A (en) * 2021-08-30 2021-11-09 平安国际融资租赁有限公司 Parallel identity authentication method, device, equipment and medium based on face recognition

Also Published As

Publication number Publication date
CN112367314B (en) 2022-10-28

Similar Documents

Publication Publication Date Title
US10701069B2 (en) Online identity verification platform and process
US20240143842A1 (en) System and method for validating authorship of an electronic signature session
US9059858B1 (en) User characteristic based digital signature of documents
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
US20160248765A1 (en) Document distribution and interaction
CN111542824A (en) System and method for automatic online notarization conference recovery
US20180026790A1 (en) Evidence system and method to determine whether digital file is forged or falsified by using smart phone and smart phone having certification function of smart phone screen capture image and method thereof
KR102042129B1 (en) Method and apparatus for authenticating user
US20180218339A1 (en) System and method for synchronizing notary meeting interactions between multiple software clients
JP7236042B2 (en) Face Recognition Application Using Homomorphic Encryption
US20200136818A1 (en) System for generating personalized service content
US11922749B2 (en) Providing virtual and physical access to secure storage container
US11763547B2 (en) Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources
CN114422144B (en) Method, system, equipment and storage medium for improving scene certificate blockchain certification credibility
CN112367314B (en) Identity authentication method, device, computing equipment and medium
CN113162770A (en) Online signature method and system
US20220051357A1 (en) System and method for attorney-client privileged digital evidence capture, analysis and collaboration
RU2772345C2 (en) System and method for synchronizing interactions between several software clients in meeting with notary
CN115373515A (en) Login method and device of head-mounted device, electronic device and medium
CN117494087A (en) Information verification method, device, equipment and storage medium
FR3101990A1 (en) Provision of virtual machines for centralized integration with peripherals including biometric devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant