CN112597988A - System suitable for detecting identity card, and device and authentication method associated with system - Google Patents

System suitable for detecting identity card, and device and authentication method associated with system Download PDF

Info

Publication number
CN112597988A
CN112597988A CN202011421687.8A CN202011421687A CN112597988A CN 112597988 A CN112597988 A CN 112597988A CN 202011421687 A CN202011421687 A CN 202011421687A CN 112597988 A CN112597988 A CN 112597988A
Authority
CN
China
Prior art keywords
detection points
identification card
detection
display
detection point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011421687.8A
Other languages
Chinese (zh)
Inventor
徐炎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Labs Singapore Pte Ltd
Original Assignee
Alipay Labs Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Labs Singapore Pte Ltd filed Critical Alipay Labs Singapore Pte Ltd
Publication of CN112597988A publication Critical patent/CN112597988A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Telephone Function (AREA)

Abstract

A system adapted to detect an identity card, an apparatus associated therewith and an authentication method are provided. The authentication method may comprise providing a set of detection points. The set of detection points may include a plurality of detection points. The detection point may be visually perceived, for example, on the device (e.g., by a customer/client). The authentication method may further comprise taking a plurality of images of an identification card (belonging to the customer/client) using the device. The plurality of images are captured so as to be able to coincide with the plurality of detection points (in position/location). Authentication/verification may be considered successful if the captured image coincides with the detection point (in position/location).

Description

System suitable for detecting identity card, and device and authentication method associated with system
Technical Field
This document relates generally, but not exclusively, to a system suitable for detecting an identification card. The present document also relates to devices and/or authentication methods associated with the system.
Background
In the "electronically know your customer/client (eKYC)" scenario, authentication may be done, for example, by verifying an identification card belonging to the customer/client.
Traditionally, this may be done, for example, by prompting the customer/client to scan/take an image of an identification card belonging to or associated with the customer/client for authentication.
One conventional solution/technique is to use an electronic device (e.g., a smartphone) to take an image of an identification card belonging to or associated with a customer/client. After verifying that the captured image does correspond to the customer/client identification card, authentication may be completed.
It is contemplated herein that conventional solutions/techniques may be circumvented (e.g., authenticated by a non-authentic owner of the identification card) by one or more unauthorized parties/individuals. For example, an unauthorized individual may display a screenshot of a captured image of an identification card on a high resolution monitor (e.g., possibly obtained through fraudulent means), and such high resolution screenshot may be used for verification and subsequent successful completion of authentication. Thus, the reliability/integrity of the authentication may be a concern/problem.
Further, conventional solutions/techniques may rely on moire (moire pattern) based analysis of the captured images and/or border-based inspection of the captured images to verify the identity card's screenshot and/or the reliability of the captured image. It is contemplated herein that such validation techniques may require large amounts of data and large-scale training samples to train the classifier model, and thus may be inefficient.
It is contemplated herein that there is a need to improve the manner in which authentication can be performed in a reliable and/or efficient manner.
Disclosure of Invention
To improve the manner in which authentication/verification may be performed (i.e., in a reliable and/or secure manner), route-based detection is contemplated herein. The route-based detection may be based on a set of detection points generated in a predetermined-based manner and/or in a random-based manner.
In general, route-based detection may be associated with a set of detection points, which may be displayed on a display of a device (e.g., a portable electronic device such as a smartphone or a non-portable electronic device such as a kiosk). Each detection point in the set of detection points may be associated with a position/location (i.e., as displayed on the display). As will be discussed in more detail later, the detection points may be displayed in a sequential manner or synchronously.
When authentication is initiated, the user may be prompted to take an image of his identity card so that the taken image coincides with the position/location of the detection point displayed on the display. For example, the set of detection points may be displayed on a display of a smartphone (having an image capture device such as a camera) used by the user. A user holding the smartphone may place the smartphone so that an image of the identification card is taken coincident with the displayed detection point (i.e., as displayed on the display). This shooting process (i.e., the process of shooting an image of the identification card) may be repeated in the same manner for each detection point in the set of detection points. After the image of the identification card is taken in some way to coincide with each displayed detection point of the set of detection points, the authentication may be successfully completed.
According to an embodiment of the present disclosure, an apparatus is provided.
The apparatus may comprise: at least one display and at least one camera. The apparatus may also include at least one processor coupled to at least one of the at least one display and the at least one capture device.
The apparatus may also include at least one storage device coupled to the processor. The storage device may carry a set of instructions that, when executed:
causing the at least one display to display a set of detection points, each detection point of the set of detection points being associated with a location on the display;
causing the at least one capture device to capture data associated with an identification card associated with a customer, the captured data associated with at least one image of the identification card; and
causing the at least one processor to process the captured data to determine a location of each corner of the identification card and/or a center of the identification card.
The image of the identification card can be shot to be consistent with the corresponding detection point.
According to another embodiment of the present disclosure, an apparatus is provided.
According to an embodiment of the present disclosure, the apparatus may include a photographing device (e.g., a camera), a processor (e.g., a microprocessor), and a display (e.g., a screen). In one embodiment, a capture device and a display may be coupled to the processor.
The photographing apparatus may photograph data associated with an identification card. The identification card may be associated with a customer. Furthermore, the captured data may be associated with at least one image of the identification card (i.e., at least one captured image of the identification card).
The processor may process the captured data in a manner to determine the location of each corner of the identification card and/or the center of the identification card (i.e., the location of each corner of the identification card and/or the center of the identification card).
The display may display a set of detection points. Each detection point of the set of detection points may be associated with a position/location on the display.
Furthermore, the apparatus may be controlled (e.g. by a customer) such that the capturing device may capture an image of the identification card in line with the corresponding detection point (e.g. at a location/position). For example, it may be determined that the authentication is successful after it is determined that all the photographed images of the identification card (i.e., the photographed images of the identification card) coincide with the corresponding detection points.
According to another embodiment of the present disclosure, an authentication method is provided.
The authentication method may comprise providing a set of detection points. The set of detection points may include a plurality of detection points. The detection point may be visually perceived, for example, on the device.
The authentication method may further comprise taking a plurality of images of an identification card (belonging to the customer/client) using the device. The plurality of images can be captured in correspondence with the plurality of detection points.
Authentication/verification may be considered successful if the captured image coincides with the detection point.
Drawings
Embodiments of the present disclosure will be described hereinafter with reference to the following drawings, in which:
fig. 1 illustrates an example of a system that may include at least one apparatus that may display a set of detection points and at least one host device, according to an embodiment of the disclosure;
FIG. 2 illustrates an example of the apparatus of FIG. 1 in more detail, according to an embodiment of the present disclosure;
FIG. 3 illustrates an exemplary implementation associated with the set of detection points of FIG. 1, in accordance with an embodiment of the disclosure;
FIG. 4 illustrates an example of a computer device that may correspond to or be associated with the device of FIG. 1 and/or the host device of FIG. 1, in accordance with embodiments of the present disclosure;
FIG. 5a illustrates an example of an authentication method associated with the system of FIG. 1, in accordance with embodiments of the present disclosure;
FIG. 5b illustrates an exemplary authentication/verification process embodiment associated with the authentication method of FIG. 5a, in accordance with embodiments of the present disclosure; and
fig. 6 shows a diagram illustrating an example of modules of an apparatus according to an embodiment of the present disclosure, which may for example correspond to the apparatus of fig. 2.
Detailed Description
Route-based detection strategies are contemplated herein for reliable and/or efficient authentication/verification, as will be discussed in further detail with reference to fig. 1-6.
Embodiments will now be described, by way of example only, with reference to the accompanying drawings. Like reference numbers and characters in the drawings indicate like elements or equivalents.
Some portions of the following description are presented in terms of algorithms and functional or symbolic representations of operations on data within a computer memory. These algorithmic descriptions and functional or symbolic representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, considered to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities such as electrical, magnetic or optical signals capable of being stored, transferred, combined, compared, and otherwise manipulated.
Unless specifically stated otherwise, and as will be apparent from the following, it is appreciated that throughout the present document, discussions utilizing terms such as "receiving," "scanning," "computing," "determining," "replacing," "generating," "initializing," "outputting," or the like, refer to the action and processes of a computer system, or similar electronic device, that manipulates and transforms data represented as physical quantities within the computer system into other data similarly represented as physical quantities within the computer system or other information storage, transmission or display devices.
Also disclosed herein are one or more apparatuses for performing the operations of one or more methods. Such apparatus may be specially constructed for the required purposes, or may comprise a computer or other device selectively activated or reconfigured by a computer program stored in the computer. The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various machines may be used with programs in accordance with the teachings herein. Alternatively, the construction of a more specialized apparatus for carrying out the required method steps may be appropriate. The structure of a computer adapted to perform the various methods/processes described herein will appear from the description below.
Further, a computer program is implicitly disclosed herein, since it is clear to a person skilled in the art that the individual steps of the methods described herein can be implemented by computer code. The computer program is not intended to be limited to any particular programming language and implementation thereof. It will be appreciated that a variety of programming languages and code therefor may be used to implement the teachings of the disclosure contained herein. Moreover, the computer program is not intended to be limited to any particular control flow. There are many other variations of computer programs that may use different control flows without departing from the spirit or scope of the present disclosure.
Furthermore, one or more steps of a computer program may be executed in parallel rather than sequentially. Such a computer program may be stored on any computer readable medium. The computer-readable medium may include a storage device such as a magnetic or optical disk, a memory chip, or other storage device suitable for interfacing with a computer. The computer readable media may also include hardwired media such as those exemplified in the internet systems, or wireless media such as those exemplified in the global system for mobile communications (GSM) mobile phone system, as well as other wireless systems such as bluetooth, ZigBee, Wi-Fi. When loaded and executed on such a computer, effectively creates means for implementing the steps of the preferred method.
The foregoing will be discussed in more detail below with reference to fig. 1-6.
Referring to fig. 1, a system 100 is shown in accordance with an embodiment of the present disclosure. The system 100 may be associated with route-based detection policies for applications/purposes such as authentication/verification.
For example, in the context of authentication/verification, the system 100 may be adapted to detect at least one identification card (i.e. also referred to as at least one user) that may belong to or be associated with at least one customer/client. The identification card may carry (carry) or be associated with information/data associated with the customer/client and may be used for authentication/verification purposes.
The system 100 may include one or more devices 102, one or more databases 104, and a communication network 106.
The device 102 may be coupled to a database 104. In particular, the device 102 may be coupled to a database 104, for example, via a communication network 106.
In one embodiment, the device 102 may be coupled to a communication network 106 and the database 104 may be coupled to the communication network 106. The coupling may be by way of a wired coupling and/or a wireless coupling. In general, the apparatus 102 may be configured to communicate with the database 104 via a communication network 106.
The apparatus 102 may, for example, correspond to one or more computers (e.g., laptop computers, desktop computers, and/or electronic mobile devices with computing capabilities, such as smartphones and electronic tablets).
In general, the device 102 may be configured to capture information/data associated with a customer/client. Based on the captured information/data (i.e., information data associated with the customer/client), the apparatus 102 may be configured to generate and transmit one or more input signals. For example, the apparatus 102 may be configured to take at least one image associated with an identification card that carries information/data associated with a customer/client. The output signal may for example be associated with at least one captured image. In this regard, according to embodiments of the present disclosure, an apparatus may include one or more capturing components (e.g., an image capturing device such as a camera). Additionally, in accordance with embodiments of the present disclosure, the apparatus 102 may, for example, include one or more display components (e.g., a display such as a screen).
Further, in general, the apparatus 102 may be configured to receive one or more input signals from the host device 104. The input signal may be associated with a set of detection points. As will be discussed in more detail below.
The host device 104 may, for example, correspond to one or more computers (e.g., laptop computers, desktop computers, and/or electronic mobile devices with computing capabilities, such as smart phones and electronic tablets).
In general, the host device 104 may be configured to generate one or more input signals that may be communicated to the apparatus 102. As previously mentioned, the input signal may be associated with a set of detection points. For example, the input signals may be processed to generate a Graphical User Interface (GUI) that may be displayed on a display of the apparatus 102. The set of detection points may comprise a plurality of detection points.
According to embodiments of the present disclosure, an input signal may be communicated from the host device 104 to the apparatus 102 such that the GUI may be processed in a manner that is visually perceived on a display of the apparatus 102. The GUI may, for example, correspond to a graphical display of a set of detection points on a display of the apparatus 102, and each detection point may be associated with a position/location on the display of the apparatus 102.
In general, the set of detection points may be displayed in a graphical manner that is visually perceptible to the customer/client (e.g., via a display of the device 102).
Based on the received input signal, the patron/customer carrying the device 102 may be prompted (e.g., audibly and/or visually perceptible) to take one or more images of the patron/customer's identification card based on the corresponding one or more detection points. Specifically, for each detection point displayed, an image of the customer/client's identification card may be taken in response to the customer/client. In this case, the detection points in the set of detection points may be associated with corresponding captured images (i.e., captured images of the identification card that have been captured in response to the displayed detection points).
As previously described, each detection point in the set of detection points may be associated with a position/location displayed on the display of the device 102.
For example, the aforementioned prompting may be by way of a graphical display of one or more detection points on the display of the device 102, such that the customer/client may attempt to take a corresponding at least one image of their identification card in response. The image may be substantially coincident in position/location with the displayed detection point. Specifically, a customer/client carrying device 102 may be prompted to use device 102 to take one or more images of his identification card such that the taken images coincide in position/location with a collection of detection points as displayed on the display of device 102. Thus, it can be appreciated that the captured image (of the identification card) can be associated with a corresponding detection point.
The aforementioned output signals may be generated by the device 102 based on the captured image. Further, for example, the output signal may be communicated from the apparatus 102 to the host device 104 for processing.
In particular, according to embodiments of the present disclosure, the host device 104 may be configured to receive and process the output signals in a manner so as to determine whether the captured image substantially coincides in position/location with a corresponding set of detection points (e.g., a set of detection points as displayed on a display of the apparatus 102). According to embodiments of the present disclosure, the processing may be performed, for example, by way of comparison-based processing of the input signal and the output signal.
In the event that it can be determined (e.g., by way of comparison-based processing) that the captured image can be deemed to be substantially coincident with the detection point in location/position, host device 104 can be configured to determine that authentication/verification can be successfully completed. Otherwise, in the event that it is determined (e.g., by way of a comparison-based process) that at least one captured image does not coincide in position/location with a corresponding detection point, the host device may be configured to determine that the authentication/verification failed (i.e., that the authentication/verification could not be successfully completed). This will be discussed in further detail with reference to fig. 2, in accordance with an embodiment of the present disclosure.
The communication network 106 may, for example, correspond to an internet communication network and/or a dedicated device-to-device type (e.g., near field communication type, bluetooth type, direct wiring type, and/or infrared type) communication network. Communication via the communication network 106 (i.e., communication between the apparatus 102 and the host device 104) may be by way of wired communication and/or wireless communication.
As previously mentioned, route-based detection strategies are contemplated herein. The route-based detection may be based on the aforementioned set of detection points. Further, according to embodiments of the present disclosure, the set of detection points may be generated according to a predetermined-based manner and/or a random-based manner. Further, according to embodiments of the present disclosure, the detection points may be displayed in a sequential manner or synchronously.
In one embodiment, with respect to the aforementioned predetermined-based approach, the host device 104 may be configured to generate the input signal such that a detection point of the set of detection points may be visually perceived (e.g., by a customer/client) as being positioned on the display (of the apparatus 102) based on one or more predetermined patterns (determined by the host device 104). Examples of the predetermined pattern may include, for example, a straight line pattern, a zigzag-based pattern, and one or more patterns based on one or more geometric shapes. Typically, for such predetermined route-based detection, the location/position associated with the detection point may be considered unique (i.e., no two detection points in the set of detection points share the same location/position).
In one embodiment, with respect to the aforementioned random-based approach, the host device 104 may be configured to generate the input signal such that the detection points in the set of detection points may be visually perceived (e.g., by a customer/client) as random (i.e., without a perceptible fixed pattern-e.g., a flower body). Typically, for such random route-based detection, there is a possibility that a detection point may be associated with the same position/location with which another detection point is associated (i.e. in a set of detection points, there is a possibility that two or more detection points may share the same position/location). This is possible according to embodiments of the present disclosure if the detection points are displayed in a sequential manner, as will be discussed later.
In one embodiment, with respect to the simultaneous display of the set of detection points, the customer/client may visually perceive all of the detection points in the set of detection points at the same time.
In one embodiment, with respect to displaying the set of detection points in a sequential manner, only a portion of the set of detection points is displayed at any time. In one example, only one detection point is displayed at a time, and subsequent detection points (i.e., the currently displayed detection points) are displayed only after it is determined that the corresponding captured image(s) are (substantially) coincident with the displayed detection points (i.e., in position/location). In another example, at least two detection points may be initially displayed, and the subsequent one or more detection points are only displayed after determining that the corresponding captured image(s) are (substantially) coincident with the initially displayed at least two detection points (i.e., in position/location).
Now, in accordance with an embodiment of the present disclosure, the apparatus 102 may be discussed in more detail below with reference to fig. 2.
Referring to fig. 2, the apparatus 102 is shown in greater detail in the context of an example embodiment 200, in accordance with an embodiment of the present disclosure.
In an example embodiment 200, the apparatus 102 may include one or more cameras 202 and one or more processors 204. The capture device 202 may be coupled to a processor 204. The coupling may be by way of a wired coupling and/or a wireless coupling. The apparatus 102 may, for example, further include one or more displays 206. The apparatus 102 may, for example, further include one or more transceivers 208. The apparatus 102 may, for example, further include one or more storage devices (not shown).
Each of the capture device 202, the display 206, the transceiver 208, the storage device, or any combination thereof may be coupled to the processor 204. The coupling may be by way of a wired coupling and/or a wireless coupling.
The capture device 202 may be configured to capture information/data associated with a customer/client. In one example, capture device 202 may correspond to an image capture device (e.g., a camera) that may be configured to capture at least one image associated with an identification card associated with a customer/client.
Based on the captured information/data (i.e., information/data associated with the customer/customer), the capture device 202 may be configured to generate and transmit one or more capture signals that may be associated with one or more captured images of the identification card. The photographing signal may be transmitted from the photographing apparatus 202 to the processor 204. The processor 204 may be configured to receive and process the photographic signals to generate one or more output signals. According to embodiments of the present disclosure, the output signal may be transmitted from the apparatus 102 to the host device 104 via the transceiver 208, for example. Further, in accordance with embodiments of the present disclosure, the apparatus 102 may receive an input signal from the host device 104 via the transceiver 208.
According to embodiments of the present disclosure, the processor 204 may be configured to perform one or more processing tasks on the captured signals and/or the input signals to generate output signals.
In one embodiment, the processor 204 may be configured to perform detection-based processing (e.g., linear regression-based processing) in conjunction with the captured signals. For example, with respect to a linear regression-based process, the location of each corner (e.g., four corners) of the identity card may be predicted, and based on the predicted location of each corner of the identity card, the center of the identity card may be derived/determined.
In one embodiment, the processor 204 may be configured to perform image-based processing in conjunction with the input signal to present (e.g., in the form of a GUI) the set of detection points in a graphical manner in which the detection points are visually perceptible via the display 206.
In one embodiment, the storage device may carry a set of instructions that, when executed (e.g., by processor 204):
causing at least one display 206 to display a set of detection points, each detection point in the set of detection points being associated with a location on the display 206;
causing at least one capture device 202 to capture data associated with an identification card associated with the customer, the captured data associated with at least one image of the identification card; and
causing the at least one processor 204 to process the captured data to determine the location of each corner of the identification card and/or the center of the identification card.
In general, in accordance with one embodiment, a device 102 (e.g., a smartphone) that may be associated with an authentication/verification process is contemplated herein. According to embodiments of the present disclosure, the authentication/verification process may be associated with an authentication method, which will be discussed in more detail later with reference to fig. 5a and 5 b.
According to an embodiment of the disclosure, the apparatus 102 may include a capture device 202 (e.g., a camera), a processor 204 (e.g., a microprocessor), and a display 206 (e.g., a screen).
In one embodiment, the capture device 202 and the display 206 may be coupled to the processor 204.
The capture device 202 may capture data associated with the identification card. The identification card may be associated with the customer. Further, the captured data may be associated with at least one image of the identification card (i.e., at least one captured image of the identification card).
The processor 204 may process the captured data in some manner to determine the location of each corner of the identification card and/or the center of the identification card.
The display 206 may display a set of detection points. Each detection point in the set of detection points may be associated with a position/location on the display 206.
Further, the device 102 may be controlled (e.g., by the customer by positioning the device 102 relative to the identification card and/or the device 102) such that the capture device 202 may capture an image of the identification card consistent with a corresponding detection point (e.g., at a location/position). For example, it may be determined that the authentication is successful after it is determined that all the photographed images of the identification card (i.e., the photographed images of the identification card) coincide with the corresponding detection points.
In one embodiment, the set of detection points may include at least one initial detection point and at least one subsequent detection point. The set of detection points may be displayed on the display 206 in a sequential manner such that an initial detection point is displayed first, followed by at least one subsequent detection point. In one example, the at least one subsequent detection point is displayed only after it is determined (e.g., by the aforementioned host device 104) that an image of the identification card taken in response to the displayed initial detection point coincides with the initial detection point. Further, the authentication process may be aborted, for example, by failure to display at least one subsequent detection point after a predetermined period of time from the time the initial detection point was displayed.
In another embodiment, the set of detection points may include a plurality of detection points. Multiple detection points may be displayed simultaneously on the display 206 so that the multiple detection points may be visually perceived at the same time (simultaneously). The authentication process may be suspended, for example, due to a failure in matching the captured image (i.e., captured image) with the corresponding detection point after a predetermined period of time.
According to another embodiment, a device 102 (e.g., a smartphone) that may be associated with an authentication/verification process is contemplated herein. According to embodiments of the present disclosure, the authentication/verification process may be associated with an authentication method, which will be discussed in more detail later with reference to fig. 5a and 5 b.
The apparatus 102 may include at least one display 206 and at least one camera 202. Device 102 may also include at least one processor 204 coupled to at least one display 206 and/or at least one camera 202.
The apparatus 102 may also include at least one storage device (not shown) coupled to the processor. The storage device may carry a set of instructions that, when executed (e.g., by processor 204):
causing at least one display 206 to display a set of detection points, each detection point in the set of detection points being associable with a location on the display 206;
causing at least one capture device 202 to capture data associated with an identification card associated with the customer, the captured data associated with at least one image of the identification card; and
causing the at least one processor 204 to process the captured data to determine the location of each corner of the identification card and/or the center of the identification card.
The image of the identification card can be taken coincident with the corresponding detection point.
In accordance with the embodiments disclosed hereinafter, a set of detection points will be discussed in the context of exemplary embodiments.
Referring to fig. 3, an example implementation 300 associated with a set of detection points 302 is shown, according to an embodiment of the present disclosure.
As shown, the set of detection points 302 may include a plurality of detection points (e.g., a first detection point 302a, a second detection point 302b, a third detection point 302c, and a fourth detection point 302 d).
In one embodiment, with respect to the manner of the order-based display of the set of detection points, the first detection point 302a may correspond to the aforementioned initial detection point, and the second to fourth detection points 302b/302c/302d may correspond to the aforementioned at least one subsequent detection point.
In one embodiment, the first through fourth detection points 302a/302b/302c/302d may be visually perceived on the display 206 at the same time (i.e., simultaneously) with respect to the manner in which the sets of detection points are based on a synchronized display. Further, the first to fourth detection points 302a/302b/302c/302d may be visually perceived, for example, as being displayed based on a predetermined pattern (e.g., a zigzag-based pattern).
Moreover, it is contemplated herein that the set of detection points can include fewer or more detection points than the first through fourth detection points 302a/302b/302c/302d shown in fig. 3.
In view of the foregoing authentication/verification approach, it will be appreciated that the customer/client will be required to actually use the identification card and take an image of the identification card based on the set of detection points described above. It is expected that an unauthorized party/person attempting to use a high resolution screen shot of an identification card will have great difficulty at least in impersonating a real identification card with a high resolution screen shot of an identification card because the screen shot will not be considered to have been taken in the manner discussed earlier in connection with the collection of detection points. In this way, since circumvention can be prevented, the reliability of authentication/verification can be improved.
Furthermore, it is contemplated herein that by taking an image of the identification card based on the aforementioned set of detection points, no complex training and/or reliance on large data samples or the like will be required. Thus, validation techniques that require large amounts of data and/or large-scale training samples (e.g., moire-based analysis) would not be required. In this way, the efficiency of authentication/verification can potentially be improved.
It is contemplated herein that in one example, the apparatus 102 and/or the host device 104 can correspond to/be associated with a computing device. This will be discussed below in the context of the exemplary computing device of fig. 4.
FIG. 4 illustrates an exemplary computing device 400, hereinafter interchangeably referred to as computer system 400, according to embodiments of the disclosure, and the description of the computing device 400 is provided below by way of example only and is not intended to be limiting.
As shown in fig. 4, the exemplary computing device 400 includes a processor 404 for executing software routines. Although a single processor is shown for clarity, computing device 400 may also include a multi-processor system. The processor 404 is connected to a communication infrastructure 406 to communicate with other components of the computing device 400. The communication infrastructure 406 may include, for example, a communication bus, a crossbar, or a network.
Computing device 400 also includes a main memory 408, such as Random Access Memory (RAM), and a secondary memory 410. The secondary memory 410 may include, for example, a hard disk drive 412 and/or a removable storage drive 414, the removable storage drive 414 may comprise a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. The removable storage drive 414 reads from and/or writes to a removable storage unit 418 in a well known manner. Removable storage unit 418 may comprise a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 414. As will be appreciated by those skilled in the relevant art, the removable storage unit 418 includes a computer-readable storage medium having stored therein computer-executable program code instructions and/or data.
In alternative embodiments, secondary memory 410 may additionally or alternatively include other similar means for allowing computer programs or other instructions to be loaded into computing device 400. Such means may include, for example, a removable storage unit 422 and an interface 420. Examples of removable storage unit 422 and interface 420 include a program cartridge and cartridge interface (e.g., such as that found in video game console devices), a removable memory chip (e.g., an erasable programmable read-only memory (EPROM) or a programmable read-only memory (PROM)) and associated socket, and other removable storage units 422 and interfaces 420 that allow software and data to be transferred from removable storage unit 422 to computer system 400.
Computing device 400 also includes at least one communication interface 424. Communications interface 424 allows software and data to be transferred between computing device 400 and external devices via a communications path 426. In various embodiments of the present disclosure, communication interface 424 allows data to be transferred between computing device 400 and a data communication network, such as a public or private data communication network. The communication interface 424 may be used to exchange data between different computing devices 400, which computing devices 400 form part of an interconnected computer network. Examples of communication interface 424 may include a modem, a network interface (such as an ethernet card), a communication port, an antenna with associated circuitry, and the like. The communication interface 424 may be wired or may be wireless. Software and data transferred via communications interface 424 are in the form of signals which may be electrical, electromagnetic, optical or other signals capable of being received by communications interface 424. These signals are provided to communications interface via communications path 426.
As shown in fig. 4, computing device 400 further includes: a display interface 402 that performs operations for presenting images to an associated display 430; and an audio interface 432 that performs operations for playing audio content via associated speakers 434.
As used herein, the term "computer program product" may refer, in part, to removable storage unit 418, removable storage unit 422, a hard disk installed in hard disk drive 412, or a carrier wave carrying software to communication interface 424 through communication path 426 (wireless link or cable).
Computer-readable storage media refers to any non-transitory tangible storage medium that provides recorded instructions and/or data to computing device 400 for execution and/or processing. Examples of such storage media include floppy disks, magnetic tape, compact disc read-only memory (CD-ROM), versatile discs/Digital Video Discs (DVD), Blu-rayTM) An optical disk, a hard drive, a ROM or integrated circuit, Universal Serial Bus (USB) memory, a magneto-optical disk, or a computer readable card such as a Personal Computer Memory Card International Association (PCMCIA) card, whether or not such devices are internal or external to computing device 400. Examples of transitory or non-tangible computer-readable transmission media that may also participate in providing software, applications, instructions, and/or data to computing device 400 include radio or infrared transmission channels and network connections to another computer or networked device, as well as the internet or ethernet, etc., including information recorded on email transmissions and websites and the like.
Computer programs (also called computer program code) are stored in the main memory 408 and/or the secondary memory 410. Computer programs may also be received via communications interface 424. Such computer programs, when executed, enable computing device 400 to perform one or more features of embodiments discussed herein. In various embodiments, the computer programs, when executed, enable the processor 404 to perform the features of the embodiments described above. Accordingly, such computer programs represent controllers of the computer system 400.
The software may be stored in a computer program product and loaded into computing device 400 using removable storage drive 414, hard drive 412, or interface 420. Alternatively, the computer program product may be downloaded to computer system 400 over communications path 426. The software, when executed by the processor 404, causes the computing device 400 to perform the functions of the embodiments described herein.
It should be understood that the embodiment of fig. 4 is given by way of example only. Thus, in some embodiments, one or more features of computing device 400 may be omitted. Also, in some embodiments, one or more features of computing device 400 may be combined together. Additionally, in some embodiments, one or more features of computing device 400 may be separated into one or more components.
It should be understood that the elements shown in fig. 4 are used to provide means to perform the various functions and operations of the server as described in the above embodiments.
In an embodiment, a server may generally be described as a physical device including at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the physical device to perform the necessary operations.
Referring to fig. 5a, an authentication method 500 associated with system 100 is shown, in accordance with an embodiment of the present disclosure. The authentication method 500 may be useful for authentication/verification (e.g., by using an identification card belonging to a customer/client for authentication/verification associated with one or more customers/clients).
The authentication method 500 may include any one or any combination of an input step 502, an output step 504, and a processing (or "generating") step 506.
With respect to the input step 502, one or more input signals may be transmitted to the device 102. The input signal may be associated with a set of detection points, which may include a plurality of detection points.
With respect to the outputting step 504, the device 102 may generate one or more output signals. The output signal may for example be associated with one or more captured images of an identification card belonging to the customer/client.
With regard to the processing step 506, the output signal may be processed in some manner to determine whether the captured image coincides with the plurality of detection points. In one embodiment, the output signal may be processed by, for example, host device 104.
In general, an authentication method 500 is contemplated herein, which may include providing a set of detection points. The set of detection points may include a plurality of detection points (302a/302b/302c/302 d). The detection points (302a/302b/302c/302d) may be visually perceived (e.g., by a customer/client), for example, on the device 102 (e.g., via a display of the device 102).
The authentication method 500 may also include taking a plurality of images of an identification card (e.g., belonging to a customer/client) using the device 102. The plurality of images can be taken in correspondence with the plurality of detection points (302a/302b/302c/302d) (i.e., on positions/locations).
If the captured image coincides with the detection point (i.e., at the location/position), the authentication/verification may be considered successful.
It is contemplated herein that in one embodiment, the device 102 may be removably controlled (e.g., by a customer/client) when capturing multiple images. The apparatus 102 may be movably controlled such that the plurality of images taken may coincide with the set of detection points in terms of the positions/locations at which the plurality of detection points are displayed on the apparatus 102.
Referring to fig. 5b, a flowchart of an exemplary authentication/verification process embodiment 550 associated with the authentication method 500 is shown, in accordance with an embodiment of the present disclosure.
Exemplary authentication/verification process embodiment 550 may, for example, include a first step 550a, a second step 550b, a third step 550c, a fourth step 550d, a fifth step 550e, and a sixth step 550f, or any combination thereof.
In a first step 550a (i.e., "start"), a user (e.g., a customer/client) may hold the identification card with one hand and hold the device 102 with the other hand to take an image of the identification card.
In a second step 550b (i.e., "identify card at detection start"), the user may be prompted to place the identification card in line with the first detection point 302a (as displayed on the display screen of the device 102). Identification card detection methods (e.g., linear regression methods for predicting corners of an identification card and calculating a center of the identification card based on the predicted location of the corners) may be used to determine (e.g., predict) a location of the identification card. If it can be determined (i.e., "is identification card present. Otherwise (i.e., the location of the identification card does not match the first detection point 302 a), the authentication/verification may be considered to be a failure (i.e., a "no" indication) and, for example, terminated/aborted (e.g., by returning to the first step 550 a/preventing entry into the third step 550 c/remaining in the second step 550b, in which the user may, for example, be continually prompted to reposition the identification card relative to the first detection point 302 a. in one embodiment, if the identification card cannot be detected within a certain time period (e.g., a time period of 15 seconds or 30 seconds), the authentication/verification may be terminated/aborted (e.g., by returning to the first step 550 a/preventing entry into the third step 550 c/remaining in the second step 550 b).
In a third step 550c (i.e., "detect the identification card at point B"), the user may be prompted to place the identification card in line with the second detection point 302B (as displayed on the display screen of the device 102). The third step 550c may be similar to the second step 550 b. In this regard, the relevant portions of the previous discussion regarding the second step 550b similarly apply to the third step 550 c. If it can be determined (i.e., "is identification card present. Otherwise (i.e., the location of the identification card does not match the second detection point 302 b), the authentication/verification may be considered to be a failure (i.e., a "no" indication) and, for example, terminated/aborted (e.g., by returning to the first step 550a or the second step 550 b/preventing proceeding to the fourth step 550 d/remaining in the third step 550c, in which the user may, for example, be continually prompted to reposition the identification card relative to the second detection point 302 b). In one embodiment, if the identification card cannot be detected within a certain period of time (e.g., a period of 15 seconds or 30 seconds), the authentication/verification may be terminated/aborted (e.g., by returning to the first step 550a or the second step 550 b/preventing proceeding to the fourth step 550 d/remaining in step 550 c).
In a fourth step 550d (i.e., "detect identity card at point C"), the user may be prompted to place the identity card in line with third detection point 302C (as displayed on the display screen of device 102). The fourth step 550d may be similar to the second step 550 b. In this regard, the relevant portions of the previous discussion regarding the second step 550b similarly apply to the fourth step 550 d. If it can be determined (i.e., "is identification card present. Otherwise (i.e., the location of the identification card does not match the third detection point 302 c), the authentication/verification may be considered to be a failure (i.e., a "no" indication) and, for example, terminated/aborted (e.g., by returning to the first step 550a or the third step 550 c/preventing proceeding to the fifth step 550 e/remaining in the fourth step 550d, where, for example, the user may be continually prompted to reposition the identification card relative to the third detection point 302 c). In one embodiment, if the identification card cannot be detected within a certain period of time (e.g., a period of 15 seconds or 30 seconds), the authentication/verification may be terminated/aborted (e.g., by returning to the first step 550a or the third step 550 c/preventing proceeding to the fifth step 550 e/remaining in the fourth step 550 d).
In a fifth step 550e (i.e., "detect end point identification card"), the user may be prompted to place the identification card in correspondence with the fourth detection point 302d (as displayed on the display screen of the device 102). The fifth step 550e may be similar to the second step 550 b. In this regard, the relevant portions of the previous discussion regarding the second step 550b similarly apply to the fifth step 550 e. If it can be determined (i.e., "identification card present. Otherwise (i.e., the location of the identification card does not match the fourth detection point 302d), the authentication/verification may be considered to be a failure (i.e., a "no" indication) and, for example, terminated/aborted (e.g., by returning to the first step 550a or the fourth step 550 d/preventing proceeding to the sixth step 550 f/remaining in the fifth step 550e where, for example, the user may be continually prompted to reposition the identification card relative to the fourth detection point 302 d). In one embodiment, if the identification card cannot be detected within a certain period of time (e.g., a period of 15 seconds or 30 seconds), the authentication/verification may be terminated/aborted (e.g., by returning to the first step 550a or the fourth step 550 d/preventing proceeding to the sixth step 550 f/remaining in the fifth step 550 e).
In a sixth step 550f (i.e., "done"), the verification/authentication may be considered successful and complete.
It is understood that, based on the above-described steps (first to sixth steps 550a/550b/550c/550d/550e or any combination thereof), an attempt to circumvent authentication/verification by, for example, generating a high-definition screen may be prevented. In this regard, the integrity of the verification/authentication may be maintained. Understandably, robust verification/authentication processes/methods in accordance with the authentication method 500 (and the exemplary authentication/verification process embodiments 550 associated therewith) discussed earlier may be facilitated.
Referring to fig. 6, an example of the modules of an apparatus 600 according to an embodiment of the present disclosure is shown. The apparatus 600 may be an example of an embodiment of the apparatus 102 described previously.
As shown, the apparatus 600 may include a first module 602 and a second module 604. The first module 602 may be associated with the aforementioned capture device 202. The second module 604 may be associated with the processor 204 as previously described.
In particular, the apparatus 600 may include a first module 602 for acquiring/capturing data/information associated with a customer/client to generate and transmit one or more capture signals.
The apparatus 600 may also include a second module 602 that processes the capture signal and/or the aforementioned received input signals to generate one or more output signals.
For example, fig. 6 may be interpreted to illustrate internal functional modules and/or structures of a device (i.e., the aforementioned device 102) that may be associated with a route-based detection policy to implement in reliable and efficient authentication and/or verification in accordance with embodiments of the present disclosure.
Those skilled in the art will further appreciate that variations and combinations of the above-described features, which are not intended to be substituted or substituted, may be combined to form further embodiments.
In one example, while the foregoing discussion is generally in the context of one or more identity cards, it is contemplated herein that other forms of identification (for verification/authentication purposes) may be useful. One example is face-based recognition (i.e., face recognition).
In another example, it was discussed earlier that the host device 104 may be configured to receive and process the output signals in a manner so as to determine whether the captured image substantially coincides in position/location with the corresponding detection point. It is contemplated herein that, in accordance with embodiments of the present disclosure, a determination of whether a captured image substantially coincides with a corresponding detection point may be made/performed at the apparatus 102 (e.g., by way of comparison-based processing) (in which case, the transmission of the output signal to the host device 104 may be optional). Thus, it may be appreciated that, in accordance with embodiments of the present disclosure, the apparatus 102 and/or the host device 104 may be configured to determine (e.g., via comparison-based processing) whether the captured image substantially coincides in position/location with the corresponding detection point.
In another example, instead of movably controlling the device 102 to take one or more images of the identification card, the identification card may be movably controlled while the device 102 remains stationary.
In another example, the device 102 and the identification card may be movably controlled relative to one another (e.g., the device 102 and the identification card may move simultaneously relative to one another).
In the foregoing manner, various embodiments of the present disclosure are described to address at least one of the foregoing disadvantages. Such embodiments are intended to be covered by the following claims and are not limited to the specific forms or arrangements of parts so described and it will be apparent to those skilled in the art in light of this disclosure that many changes and/or modifications may be made which are also intended to be covered by the appended claims.

Claims (8)

1. An apparatus for detecting an identification card, comprising:
at least one display;
at least one photographing device;
at least one processor coupled to at least one of the at least one display and the at least one capture device; and
at least one storage device coupled to the processor and carrying a set of instructions that, when executed:
causing the at least one display to display a set of detection points, each detection point of the set of detection points being associated with a location on the display;
causing the at least one capture device to capture data associated with an identification card associated with a customer, the captured data associated with at least one image of the identification card; and
causing the at least one processor to process the captured data to determine a location of each corner of the identification card and/or a center of the identification card,
wherein the image of the identification card can be shot to be consistent with the corresponding detection point.
2. The apparatus of claim 1, wherein,
the set of detection points comprises at least one initial detection point and at least one subsequent detection point,
the set of detection points is displayed on the display in a sequential manner such that the initial detection point is displayed first and the at least one subsequent detection point is displayed subsequently.
3. The apparatus of claim 2, wherein,
displaying the at least one subsequent detection point only after determining that an image of the identification card taken in response to the displayed initial detection point coincides with the initial detection point.
4. The apparatus of claim 3, wherein,
the device is associated with an authentication process, and
and after all the shot images of the identity card are determined to be consistent with the corresponding detection points, determining that the authentication is successful.
5. The apparatus of claim 4, wherein,
the set of detection points comprises a plurality of detection points,
the authentication process is aborted due to a failure to display the at least one subsequent detection point after a predetermined period of time from the time the initial detection point was displayed.
6. The apparatus of claim 1, wherein,
the set of detection points comprises a plurality of detection points that are synchronously displayable on the display such that the plurality of detection points are simultaneously visually perceptible,
the device is associated with an authentication process, and determines that the authentication is successful after determining that all the shot images of the identity card are consistent with the corresponding detection points; and
the authentication process is suspended due to failure in matching a captured image with a corresponding detection point after a predetermined period of time.
7. An authentication method of an identity card, comprising:
providing a set of detection points comprising a plurality of detection points that are visually perceptible on a device;
capturing a plurality of images of the identification card using the device, the plurality of images captured so as to be able to coincide with the plurality of detection points,
wherein if the photographed image is consistent with the detection point, the authentication is successful.
8. The authentication method according to claim 7, wherein the apparatus is controlled movably at the time of capturing the plurality of images so that the captured plurality of images coincide with the set of detection points with respect to positions where the plurality of detection points are displayed on the apparatus.
CN202011421687.8A 2020-06-01 2020-12-08 System suitable for detecting identity card, and device and authentication method associated with system Pending CN112597988A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG10202005116R 2020-06-01
SG10202005116R 2020-06-01

Publications (1)

Publication Number Publication Date
CN112597988A true CN112597988A (en) 2021-04-02

Family

ID=75188749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011421687.8A Pending CN112597988A (en) 2020-06-01 2020-12-08 System suitable for detecting identity card, and device and authentication method associated with system

Country Status (1)

Country Link
CN (1) CN112597988A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
CN108985409A (en) * 2018-07-18 2018-12-11 金联汇通信息技术有限公司 ID card information read method, device and electronic equipment
WO2019024636A1 (en) * 2017-08-01 2019-02-07 广州广电运通金融电子股份有限公司 Identity authentication method, system and apparatus
CN110414454A (en) * 2019-07-31 2019-11-05 南充折衍智能光电科技有限公司 A kind of testimony of a witness unification identifying system based on machine vision

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
WO2019024636A1 (en) * 2017-08-01 2019-02-07 广州广电运通金融电子股份有限公司 Identity authentication method, system and apparatus
CN108985409A (en) * 2018-07-18 2018-12-11 金联汇通信息技术有限公司 ID card information read method, device and electronic equipment
CN110414454A (en) * 2019-07-31 2019-11-05 南充折衍智能光电科技有限公司 A kind of testimony of a witness unification identifying system based on machine vision

Similar Documents

Publication Publication Date Title
CN106599772B (en) Living body verification method and device and identity authentication method and device
US9576194B2 (en) Method and system for identity and age verification
JP2018533142A (en) System and method for authenticating authorship of an electronic signature session
EP3642776A1 (en) Facial biometrics card emulation for in-store payment authorization
WO2016203698A1 (en) Face detection device, face detection system, and face detection method
US20220262166A1 (en) Information processing apparatus and method and non-transitory computer readable medium storing information processing program
CN108805005A (en) Auth method and device, electronic equipment, computer program and storage medium
WO2018233110A1 (en) Payment data verification method and device
CN111242775A (en) Bank agent business processing method and device
US20190034605A1 (en) Authentication method of specified condition, authentication software of specified condition, device and server used for executing authentication of specified condition
KR101725219B1 (en) Method for digital image judging and system tereof, application system, and authentication system thereof
CN109325333B (en) Double-identification login and payment method and device
WO2021049234A1 (en) Image analysis device, control method, and program
CN112597988A (en) System suitable for detecting identity card, and device and authentication method associated with system
US20230005301A1 (en) Control apparatus, control method, and non-transitory computer readable medium
EP3196829A1 (en) Non-facing financial service system using user confirmation apparatus using parallel signature processing, and handwriting signature authentication technique
JP2014153896A (en) User detection system, method, portable terminal and server
WO2016095680A1 (en) Intrusion detection method and device for private data
JP6679291B2 (en) Applicant authentication device, authentication method, and security authentication system using the method
EP3837821B1 (en) Assessing condition of real-world objects
JP2020194296A (en) Information processor, and information processing program
CN114882577B (en) Health state identification method and device, electronic equipment and computer readable medium
CN112418158A (en) System suitable for detecting identity card and device and processing method associated with same
TW202044076A (en) Verifying method of specified condition, verifying software of specified condition, device and server for executing verification of specified condition
EP4113334A1 (en) Method and system for automatic proofing of a remote recording

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination