CN117615375A - Real name authentication method, device, equipment and storage medium - Google Patents

Real name authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN117615375A
CN117615375A CN202311541450.7A CN202311541450A CN117615375A CN 117615375 A CN117615375 A CN 117615375A CN 202311541450 A CN202311541450 A CN 202311541450A CN 117615375 A CN117615375 A CN 117615375A
Authority
CN
China
Prior art keywords
real
information
name authentication
user
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311541450.7A
Other languages
Chinese (zh)
Inventor
莫忠婷
韦文俊
石胜明
伍家胜
唐绯彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongfeng Liuzhou Motor Co Ltd
Original Assignee
Dongfeng Liuzhou Motor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongfeng Liuzhou Motor Co Ltd filed Critical Dongfeng Liuzhou Motor Co Ltd
Priority to CN202311541450.7A priority Critical patent/CN117615375A/en
Publication of CN117615375A publication Critical patent/CN117615375A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to the technical field of real-name authentication of Internet of vehicles, and discloses a real-name authentication method, device, equipment and storage medium, wherein the method comprises the following steps: collecting real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living body face information; verifying the true and false authentication information based on the target database to obtain a verification result; and determining whether the real-name authentication is successful or not based on the verification result. According to the real-name authentication method and device, the real-name authentication information is subjected to true-false verification based on the target database, whether the real-name authentication is successful or not is determined according to the verification result, the problems that the real-name authentication is fake, the operation difficulty and the environment influence the real-name authentication precision, the user waiting time is long, the user experience is influenced are solved, the real-name authentication safety is improved, the operation difficulty and the environment influence on the real-name authentication are reduced, and the user waiting time is shortened.

Description

Real name authentication method, device, equipment and storage medium
Technical Field
The invention relates to the technical field of real-name authentication of the internet of vehicles, in particular to a real-name authentication method, device, equipment and storage medium.
Background
With the continuous development of the internet, nowadays, an era of everything interconnection has been entered. In such an era of internet of things, vehicles all have devices capable of being networked, and an internet of things card built in the devices needs to be authenticated at an operator for real names of owners. The real name authentication (identity verification) is a verification and audit on the authenticity of the user data, and is helpful for establishing a perfect and reliable internet credit basis.
In the prior art, when the real-name authentication of the vehicle is carried out, more real-name authentication technologies are currently applied in a mode of holding an identity card or a video and lip language verification code, and the face diagram of the hand-held identity card has a fake risk and cannot resist 3D modeling attack. The video and lip verification code mode is high in safety, requirements on user operation and environment are high, a user is easy to cause real-name authentication failure due to nonstandard operation and noisy environment, background real-name authentication is carried out by adopting a video method, a certain matching threshold exists for a terminal user, a certain requirement on action standard degree is met, recorded high-definition videos are large, transmission is slow, real-name authentication is completed by an operator, and then a vehicle enterprise system is informed, so that waiting time of the user is long, and user experience is affected. By using public numbers or short messages as real-name authentication entrances, fraud risks exist, and authority is poor.
Disclosure of Invention
The invention mainly aims to provide a real-name authentication method, device, equipment and storage medium, and aims to solve the technical problems that in the prior art, real-name authentication has counterfeiting risks, operation difficulty and environment influence on real-name authentication precision, so that waiting time of a user is long, and user experience is influenced.
In order to achieve the above object, the present invention provides a real name authentication method, which includes the following steps:
collecting real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living body face information;
verifying the true and false authentication information based on a target database to obtain a verification result;
and determining whether the real-name authentication is successful or not based on the verification result.
Optionally, the collecting real-name authentication information of the user includes:
acquiring an identity document picture of a user, and acquiring identity information based on the identity document picture;
acquiring videos of corresponding preset actions executed by a user when the screen flashes light with different colors, and determining facial image characteristics of the user based on the videos;
determining whether a user is a living body or not and whether a preset action of the user meets requirements or not based on the facial image characteristics;
when the user is determined to be living and the preset action of the user meets the requirement, acquiring living face information of the user based on the video;
and taking the identity information and the living body face information as real-name authentication information.
Optionally, the obtaining the identity document picture of the user and obtaining the identity information based on the identity document picture includes:
performing quality detection on the identity document picture;
identifying the category of the corresponding identity document based on the identity document picture when the identity document picture quality is qualified;
and when the category of the identity document is a preset category, extracting key information in the identity document picture to obtain identity information.
Optionally, the acquiring the living face information of the user based on the video includes:
tracking and extracting features of face images in the video to obtain a target face photo;
acquiring living body information of a user, and detecting the living body information;
and outputting the target face photo when the living body information detection passes, and taking the target face photo as living body face information of the user.
Optionally, the verifying the true name authentication information based on the target database to obtain a verification result includes:
inquiring a target database based on the identity information to obtain a data source face image;
comparing the living body face information with the data source face image to obtain comparison scores;
and determining a verification result based on the comparison score.
Optionally, the determining whether the real-name authentication is successful based on the verification result includes:
when the result of the verification is that it is passed, judging that the real name authentication is successful;
acquiring vehicle information, and activating an SIM card based on the vehicle information;
and when the verification result is that the user fails to pass, judging that the real-name authentication fails, and re-executing the step of collecting the real-name authentication information of the user.
Optionally, before the collecting the real-name authentication information of the user, the method further includes:
responding to an operation instruction of a user, and acquiring user information;
determining corresponding vehicle information based on the user information;
performing information confirmation based on the vehicle information;
and when the vehicle information is determined to be free of errors, executing the step of collecting real-name authentication information of the user.
In addition, in order to achieve the above object, the present invention also provides a real-name authentication device, including:
the acquisition module is used for acquiring real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living body face information;
the verification module is used for verifying the true and false of the real-name authentication information based on the target database to obtain a verification result;
and the determining module is used for determining whether the real-name authentication is successful or not based on the checking result.
In addition, to achieve the above object, the present invention also proposes a real-name authentication apparatus including: a memory, a processor, and a real-name authentication program stored on the memory and executable on the processor, the real-name authentication program configured to implement the steps of the real-name authentication method as described above.
In addition, in order to achieve the above object, the present invention also proposes a storage medium having stored thereon a real-name authentication program which, when executed by a processor, implements the steps of the real-name authentication method as described above.
The method comprises the steps of collecting real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living human face information; verifying the true and false authentication information based on the target database to obtain a verification result; and determining whether the real-name authentication is successful or not based on the verification result. Through the mode, the real-name authentication information is subjected to true-false verification based on the target database, whether the real-name authentication is successful or not is determined according to the verification result, the problem that the real-name authentication has fake risks, operation difficulty and environment influence the real-name authentication precision, so that the user waiting time is long and user experience is influenced is solved, the real-name authentication safety is improved, the influence of the operation difficulty and the environment on the real-name authentication is reduced, and the user waiting time is reduced.
Drawings
FIG. 1 is a schematic diagram of a real-name authentication device of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart of a real-name authentication method according to a first embodiment of the present invention;
FIG. 3 is a frame diagram of a real-name authentication SDK according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating an embodiment of a real-name authentication method according to the present invention;
FIG. 5 is a schematic diagram illustrating user data collection and reporting according to an embodiment of the real-name authentication method of the present invention;
FIG. 6 is a flowchart of a real-name authentication method according to a second embodiment of the present invention;
fig. 7 is a block diagram of a first embodiment of a real-name authentication device according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a real-name authentication device of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the real-name authentication device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (Wi-Fi) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the structure shown in fig. 1 is not limiting of a real-name authentication device and may include more or fewer components than shown, or may combine certain components, or may be a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a real-name authentication program may be included in the memory 1005 as one type of storage medium.
In the real-name authentication device shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the real-name authentication apparatus of the present invention may be provided in the real-name authentication apparatus, which invokes the real-name authentication program stored in the memory 1005 through the processor 1001 and executes the real-name authentication method provided by the embodiment of the present invention.
The embodiment of the invention provides a real-name authentication method, referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the real-name authentication method of the invention.
In this embodiment, the real name authentication method includes the following steps:
step S10: and collecting real-name authentication information of the user, wherein the real-name authentication information at least comprises identity information and living body face information.
It should be noted that, the execution body of the embodiment is a real-name authentication system, and the real-name authentication system includes an internet of vehicles service APP, a real-name authentication SDK, a real-name authentication module, and an internet of vehicles TSP platform.
The communication terminal of the internet of vehicles service APP integrated with the real-name authentication SDK performs real-name authentication information acquisition, wherein the real-name authentication information acquisition comprises identity information acquisition and living human face information acquisition, so that the real-name authentication information at least comprises identity information and living human face information.
It is worth to say that, the internet of vehicles service APP integrates the real-name authentication SDK, obtains the real-name authentication entry through the applet or the short message, is easy to be disregarded by users as fraud information, and is also easy to be stolen by lawbreakers. In order to ensure the safety of real-name authentication, the real-name authentication SDK is integrated into a mobile phone APP or a car machine, a file processing module of the real-name authentication SDK acquires identity card information, a face image processing module is used for identifying and comparing the image information, a communication module informs a corresponding system of the result, and a safety protection module ensures the safety of data access and transmission.
As shown in fig. 3, fig. 3 is a frame diagram of a real-name authentication SDK, where the real-name authentication SDK includes a file information processing module, a face image processing module, a communication module, a security protection module, and a buried point module, and uploads data to the file information processing module through file reading, and uploads data to the file information processing module and the face image processing module through image collection, where the file information processing module is used for identity document information collection and ORC information extraction, and the face image processing module is used for face detection, feature extraction, and feature comparison.
Further, before the collecting the real-name authentication information of the user, the method further includes: responding to an operation instruction of a user, and acquiring user information; determining corresponding vehicle information based on the user information; performing information confirmation based on the vehicle information; and when the vehicle information is determined to be free of errors, executing the step of collecting real-name authentication information of the user.
When the user does not perform real-name authentication to open the related service of the SIM card, the user logs in the internet of vehicles service APP to obtain vehicle information and user information from the TSP platform communication, and enters the real-name authentication flow of the vehicle.
It can be appreciated that the internet of vehicles service APP is mainly used to provide vehicle related services, and is generally carried on a mobile phone or a vehicle. The vehicle networking TSP platform acquires vehicle information and user information, wherein the vehicle information comprises: vehicle VIN number, brand, model, year, TBOX part number, SIM card ICCID, etc., and the user information includes: the user ID, user type, user name, user phone number, and the like, which are not particularly limited in this embodiment. After the user logs in the internet of vehicles service APP, clicking to enter real-name authentication, calling TSP to acquire the vehicle information bound by the account, confirming the information by the user, and clicking to enter real-name authentication information acquisition flow.
Step S20: and verifying the true and false authentication information based on the target database to obtain a verification result.
The target database is a public security database. And comparing the calling authority data source face image of the calling public security database with the living body face information to obtain a verification result.
Further, the verifying the real-name authentication information based on the target database to obtain a verification result includes: inquiring a target database based on the identity information to obtain a data source face image; comparing the living body face information with the data source face image to obtain comparison scores; and determining a verification result based on the comparison score.
The public security database is called, and the authoritative data source face image is called based on the certificate type and the certificate number, namely, the public security database is in butt joint with a GA1400 gallery standard protocol, and the public security database is in butt joint with a GA1400 public security video image information application system, so that the face data is standardized and normalized. The GA1400 public security video image information application system aims at maintaining public security, and the system can automatically acquire the concerned video image information through an online video image information acquisition device/system or a public security video image analysis device/system or acquire the concerned video image information through a man-machine interaction mode and provide service functions such as storage, inquiry, analysis, distribution control, networking sharing and the like. The public security video image information application system comprises public security video image analysis equipment/system, online video image information acquisition equipment/system, public security video image information application platform and public security video image information database, wherein the public security video image information application system is connected with the video monitoring sharing platform and other information systems and resource libraries.
In the specific implementation, the authentication information is subjected to true-false verification to obtain an authentication result, the obtained face picture is compared with the face picture of the public security data source to obtain a comparison score, and whether the face picture is consistent with the face picture of the public security data source is judged according to the comparison score to obtain a verification result.
Step S30: and determining whether the real-name authentication is successful or not based on the verification result.
It should be noted that, the service APP displays the verification result and the real-name authentication retry entry to the user, if successful, the user is prompted that the real-name authentication is successful, the internet of vehicles service will be opened for your, if failed, a reauthentication button is provided, and the user clicks reauthentication to reenter the living body information acquisition flow.
Further, the determining whether the real-name authentication is successful based on the verification result includes: when the result of the verification is that it is passed, judging that the real name authentication is successful; acquiring vehicle information, and activating an SIM card based on the vehicle information; and when the verification result is that the user fails to pass, judging that the real-name authentication fails, and re-executing the step of collecting the real-name authentication information of the user.
After the real-name authentication is successful, the service APP synchronizes the real-name authentication result to the TSP platform, and the TSP platform synchronizes the vehicle information of the internet of vehicles with the real-name authentication to the operator for SIM card activation. The real-name authentication SDK safety protection component provides safety protection for data transmission, and the TSP platform stores and analyzes and supports the real-name authentication result.
It can be understood that the internet of vehicles needs to be activated by the SIM card, the internet of vehicles ICCID and real-name authentication success information are transmitted to the operator system according to the requirement by the TSP platform docking the operator system, the operator system returns the SIM card activation result, and finally the TSP system informs the user of the activation of the SIM card, and the corresponding internet of vehicles service is opened.
As shown in fig. 4, fig. 4 is a workflow diagram of a real-name authentication system, a user logs in to a car networking service APP, performs living body information acquisition through the car networking service APP, performs high-quality image extraction through a real-name authentication SDK to obtain a face image, invokes data of a public security part database, performs face image matching on the data of the public security part database, returns a matching result to the real-name authentication SDK to obtain a real-name authentication result, pushes the real-name authentication result to a car networking TSP platform, and pushes the real-name authentication result to a communication operator system through the car networking TSP platform.
It is worth to say that the real-name authentication process is buried, the obtained abnormal information is pushed to the server for storage, real-name authentication monitoring is carried out, and related abnormal problems are actively found and solved.
It can be understood that, as shown in fig. 5, fig. 5 is a schematic diagram of user data collection and reporting, in which the authentication process is mainly divided into two parts, namely, client embedded point and server embedded point, the embedded point is performed on APP and TSP platforms, the interface operation is performed on abnormal data failing real-name authentication, the user operation includes page jump, button click, interface stay, etc., the abnormal data includes camera call abnormality, identity document identification abnormality, living body detection identification abnormality, information comparison abnormality, data uploading abnormality, etc., and the abnormality statistical analysis is performed by using the uploaded embedded point data, so that relevant personnel can find and examine problems conveniently. And carrying out statistical analysis on the user behaviors to know the operation habit of the user.
It is worth to say that the embedded point technology is used for monitoring the real-name authentication flow, so that the problem is easy to find, and data support is provided for subsequent system optimization and authentication efficiency improvement. The method can be used for comprehensively knowing the service condition of the real-name authentication system, solving the problems of lack of detection technology, abnormality investigation and difficult solution in the real-name authentication process, evaluating and improving the real-name authentication process and the system according to the analysis result, and improving the stability and the user experience of the product.
The embodiment collects real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living body face information; verifying the true and false authentication information based on the target database to obtain a verification result; and determining whether the real-name authentication is successful or not based on the verification result. Through the mode, the real-name authentication information is subjected to true-false verification based on the target database, whether the real-name authentication is successful or not is determined according to the verification result, the problem that the real-name authentication has fake risks, operation difficulty and environment influence the real-name authentication precision, so that the user waiting time is long and user experience is influenced is solved, the real-name authentication safety is improved, the influence of the operation difficulty and the environment on the real-name authentication is reduced, and the user waiting time is reduced.
Referring to fig. 6, fig. 6 is a flowchart illustrating a real-name authentication method according to a second embodiment of the present invention.
Based on the first embodiment, the step S10 in the real-name authentication method of the present embodiment includes:
step S101: and acquiring an identity document picture of the user, and acquiring identity information based on the identity document picture.
The real-name authentication information collection comprises two parts, namely identity information collection and living human face information collection. The identity information collection refers to information collection of identity documents, wherein the identity documents comprise identity cards, passports and other document types authenticated by public security systems, and the embodiment specifically limits the steps.
In a specific implementation, a user selects an identity document which can be used for authentication, then the user selects to upload an identity document picture from the album or take the identity document picture, and identity recognition is carried out according to the identity document picture to obtain identity information.
Further, the obtaining the identity document picture of the user and obtaining the identity information based on the identity document picture includes: performing quality detection on the identity document picture; identifying the category of the corresponding identity document based on the identity document picture when the identity document picture quality is qualified; and when the category of the identity document is a preset category, extracting key information in the identity document picture to obtain identity information.
The identification uses ORC technology to perform quality detection, document classification judgment, and content identification.
It can be understood that the automatic verification shooting condition is identified, the quality of the identity card picture to be identified is ensured to be qualified, the definition of the identity card is judged, and the prompt is carried out on the pictures with light reflection, excessive inclination, non-identity card, incorrect positive and negative positions, abnormal distance of the lens and the like, and the quality of the pictures is judged to be unqualified.
It should be noted that, the normal, copy, temporary, screen-flip, PS documents are identified, the normal and temporary identity documents are screened out, security is ensured, and the key information of the documents, such as name and identity number, is extracted from the pictures of the normal and temporary identity documents, which is not particularly limited in this embodiment.
Step S102: and acquiring videos of corresponding preset actions executed by a user when the screen flashes light with different colors, and determining facial image characteristics of the user based on the videos.
It should be noted that, the living face collection modes adopted by different living body real name authentication technologies are different, and the pupil living body technology can collect facial image characteristics when the screen twinks different colors of light, and identify whether living body is through facial reflex identification and pupil reflex identification; the face image with the specified matched actions, which is acquired by the action matched living body, comprises blinks, zhang Bizui, head shaking, head lifting or head lowering and the like, and detects whether the actions are used as required; the silence living body detection is to directly collect the human face, so that the safety is low; the video living body is a plurality of living bodies supporting voice, action and the like and is not real-time through shooting a face video and uploading the face video to a cloud for verification. The pupil living body technology and the action-matched living body detection are used, so that the safety is high, the real-time performance is high, the pupil living body technology is not easily affected by environmental noise, and the occupied memory is small.
It can be understood that in this embodiment, the face information is acquired by using a mode of combining pupil-dazzling living technology with motion-matched living detection, using screen flicker and requiring a user to match motion, acquiring living videos, generating a living video stream file based on the living videos, and determining facial image features of the user according to the living video stream file.
Step S103: and determining whether the user is a living body or not and whether the preset action of the user meets the requirement or not based on the facial image characteristics.
The living body information is obtained by identifying whether the user is living or not based on the face reflection identification and the pupil reflection in the face image features.
It is to be understood that the preset actions of the user may be blinking, zhang Bizui, shaking, raising or lowering, etc., which is not particularly limited in this embodiment, and the detection actions are performed as required according to the facial actions of the user in the facial image features.
Step S104: and when the user is determined to be living and the preset action of the user meets the requirement, acquiring living face information of the user based on the video.
When the user is a living body and the preset action of the user meets the requirement, living body information is extracted to obtain living body face information.
Further, the acquiring the living face information of the user based on the video includes: tracking and extracting features of face images in the video to obtain a target face photo; acquiring living body information of a user, and detecting the living body information; and outputting the target face photo when the living body information detection passes, and taking the target face photo as living body face information of the user.
The living body information extraction includes face quality detection and living body information detection. Face quality detection refers to the generation of a living video stream file based on living videos, continuous tracking of face images in the video stream, feature extraction, contour and five sense organs positioning, high-quality face photo extraction, and the acquisition of video with excessive low-quality pictures, so as to prompt a user to acquire again.
It can be understood that the living body information detection means that whether AI is synthesized or not is judged by breaking the acquired living body information, and the living body detection conforming to the standard is passed, so that high-quality face detection information is output.
Step S105: and taking the identity information and the living body face information as real-name authentication information.
According to the embodiment, identity information is obtained by obtaining an identity document picture of a user and based on the identity document picture; acquiring videos of corresponding preset actions executed by a user when the screen flashes light with different colors, and determining facial image characteristics of the user based on the videos; determining whether a user is a living body or not and whether a preset action of the user meets requirements or not based on the facial image characteristics; when the user is determined to be living and the preset action of the user meets the requirement, acquiring living face information of the user based on the video; and taking the identity information and the living body face information as real-name authentication information. By the mode, the identity information and the living body face information are collected to serve as real-name authentication information, so that verification is carried out, a real-name authentication result is obtained, the technical identity forging of the handheld certificate is avoided, and the real-name authentication safety is improved.
Referring to fig. 7, fig. 7 is a block diagram showing the structure of a first embodiment of the real name authentication apparatus according to the present invention.
As shown in fig. 7, the real-name authentication device provided by the embodiment of the present invention includes:
the acquisition module 10 is configured to acquire real-name authentication information of a user, where the real-name authentication information includes at least identity information and living face information.
And the verification module 20 is used for verifying the true and false of the real-name authentication information based on the target database to obtain a verification result.
A determining module 30, configured to determine whether the real-name authentication is successful based on the verification result.
The embodiment collects real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living body face information; verifying the true and false authentication information based on the target database to obtain a verification result; and determining whether the real-name authentication is successful or not based on the verification result. Through the mode, the real-name authentication information is subjected to true-false verification based on the target database, whether the real-name authentication is successful or not is determined according to the verification result, the problem that the real-name authentication has fake risks, operation difficulty and environment influence the real-name authentication precision, so that the user waiting time is long and user experience is influenced is solved, the real-name authentication safety is improved, the influence of the operation difficulty and the environment on the real-name authentication is reduced, and the user waiting time is reduced.
In an embodiment, the collecting module 10 is further configured to obtain an identity document picture of the user, and obtain identity information based on the identity document picture; acquiring videos of corresponding preset actions executed by a user when the screen flashes light with different colors, and determining facial image characteristics of the user based on the videos; determining whether a user is a living body or not and whether a preset action of the user meets requirements or not based on the facial image characteristics; when the user is determined to be living and the preset action of the user meets the requirement, acquiring living face information of the user based on the video; and taking the identity information and the living body face information as real-name authentication information.
In an embodiment, the collecting module 10 is further configured to perform quality detection on the identity document picture; identifying the category of the corresponding identity document based on the identity document picture when the identity document picture quality is qualified; and when the category of the identity document is a preset category, extracting key information in the identity document picture to obtain identity information.
In an embodiment, the acquisition module 10 is further configured to track and extract features of a face image in the video to obtain a target face photo; acquiring living body information of a user, and detecting the living body information; and outputting the target face photo when the living body information detection passes, and taking the target face photo as living body face information of the user.
In an embodiment, the verification module 20 is further configured to query a target database based on the identity information to obtain a data source face map; comparing the living body face information with the data source face image to obtain comparison scores; and determining a verification result based on the comparison score.
In an embodiment, the determining module 30 is further configured to determine that the real-name authentication is successful when the verification result is passed; acquiring vehicle information, and activating an SIM card based on the vehicle information; and when the verification result is that the user fails to pass, judging that the real-name authentication fails, and re-executing the step of collecting the real-name authentication information of the user.
In an embodiment, the collecting module 10 is further configured to obtain user information in response to an operation instruction of a user; determining corresponding vehicle information based on the user information; performing information confirmation based on the vehicle information; and when the vehicle information is determined to be free of errors, executing the step of collecting real-name authentication information of the user.
In addition, to achieve the above object, the present invention also proposes a real-name authentication apparatus including: a memory, a processor, and a real-name authentication program stored on the memory and executable on the processor, the real-name authentication program configured to implement the steps of the real-name authentication method as described above.
The authentication device for real names adopts all the technical schemes of all the embodiments, so that the authentication device at least has all the beneficial effects brought by the technical schemes of the embodiments, and the technical schemes are not repeated herein.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium stores a real-name authentication program, and the real-name authentication program realizes the steps of the real-name authentication method when being executed by a processor.
Because the storage medium adopts all the technical schemes of all the embodiments, the storage medium has at least all the beneficial effects brought by the technical schemes of the embodiments, and the description is omitted here.
It should be understood that the foregoing is illustrative only and is not limiting, and that in specific applications, those skilled in the art may set the invention as desired, and the invention is not limited thereto.
It should be noted that the above-described working procedure is merely illustrative, and does not limit the scope of the present invention, and in practical application, a person skilled in the art may select part or all of them according to actual needs to achieve the purpose of the embodiment, which is not limited herein.
In addition, technical details that are not described in detail in this embodiment may refer to the real-name authentication method provided in any embodiment of the present invention, and are not described herein.
Furthermore, it should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. Read Only Memory)/RAM, magnetic disk, optical disk) and including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. A real name authentication method, the method comprising:
collecting real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living body face information;
verifying the true and false authentication information based on a target database to obtain a verification result;
and determining whether the real-name authentication is successful or not based on the verification result.
2. The method of claim 1, wherein the collecting real-name authentication information of the user comprises:
acquiring an identity document picture of a user, and acquiring identity information based on the identity document picture;
acquiring videos of corresponding preset actions executed by a user when the screen flashes light with different colors, and determining facial image characteristics of the user based on the videos;
determining whether a user is a living body or not and whether a preset action of the user meets requirements or not based on the facial image characteristics;
when the user is determined to be living and the preset action of the user meets the requirement, acquiring living face information of the user based on the video;
and taking the identity information and the living body face information as real-name authentication information.
3. The method of claim 2, wherein the obtaining an identity document picture of the user and obtaining identity information based on the identity document picture comprises:
performing quality detection on the identity document picture;
identifying the category of the corresponding identity document based on the identity document picture when the identity document picture quality is qualified;
and when the category of the identity document is a preset category, extracting key information in the identity document picture to obtain identity information.
4. The method of claim 2, wherein the acquiring live face information of the user based on the video comprises:
tracking and extracting features of face images in the video to obtain a target face photo;
acquiring living body information of a user, and detecting the living body information;
and outputting the target face photo when the living body information detection passes, and taking the target face photo as living body face information of the user.
5. The method of claim 1, wherein verifying the real-name authentication information based on the target database to obtain a verification result comprises:
inquiring a target database based on the identity information to obtain a data source face image;
comparing the living body face information with the data source face image to obtain comparison scores;
and determining a verification result based on the comparison score.
6. The method of claim 1, wherein the determining whether real name authentication is successful is based on the verification result;
when the result of the verification is that it is passed, judging that the real name authentication is successful;
acquiring vehicle information, and activating an SIM card based on the vehicle information;
and when the verification result is that the user fails to pass, judging that the real-name authentication fails, and re-executing the step of collecting the real-name authentication information of the user.
7. The method according to any one of claims 1 to 6, further comprising, before the collecting real-name authentication information of the user:
responding to an operation instruction of a user, and acquiring user information;
determining corresponding vehicle information based on the user information;
performing information confirmation based on the vehicle information;
and when the vehicle information is determined to be free of errors, executing the step of collecting real-name authentication information of the user.
8. A real name authentication apparatus, characterized in that the real name authentication apparatus comprises:
the acquisition module is used for acquiring real-name authentication information of a user, wherein the real-name authentication information at least comprises identity information and living body face information;
the verification module is used for verifying the true and false of the real-name authentication information based on the target database to obtain a verification result;
and the determining module is used for determining whether the real-name authentication is successful or not based on the checking result.
9. A real name authentication apparatus, characterized in that the real name authentication apparatus comprises: a memory, a processor, and a real-name authentication program stored on the memory and executable on the processor, the real-name authentication program configured to implement the real-name authentication method of any one of claims 1 to 7.
10. A storage medium having stored thereon a real-name authentication program which, when executed by a processor, implements the real-name authentication method according to any one of claims 1 to 7.
CN202311541450.7A 2023-11-17 2023-11-17 Real name authentication method, device, equipment and storage medium Pending CN117615375A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311541450.7A CN117615375A (en) 2023-11-17 2023-11-17 Real name authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311541450.7A CN117615375A (en) 2023-11-17 2023-11-17 Real name authentication method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117615375A true CN117615375A (en) 2024-02-27

Family

ID=89957206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311541450.7A Pending CN117615375A (en) 2023-11-17 2023-11-17 Real name authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117615375A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118229491A (en) * 2024-05-23 2024-06-21 广东联想懂的通信有限公司 National real name crossing method for new energy vehicles

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118229491A (en) * 2024-05-23 2024-06-21 广东联想懂的通信有限公司 National real name crossing method for new energy vehicles

Similar Documents

Publication Publication Date Title
US20210152550A1 (en) Machine learning for document authentication
CN106599772B (en) Living body verification method and device and identity authentication method and device
US8284985B2 (en) Interactive device for processing documents
CN117615375A (en) Real name authentication method, device, equipment and storage medium
CN110321792A (en) Without card enchashment method, apparatus, equipment and computer readable storage medium
CN110363222B (en) Picture labeling method and device for model training, computer equipment and storage medium
CN112686156A (en) Emotion monitoring method and device, computer equipment and readable storage medium
CN112183408A (en) Case image-based customer portrait system and method
CN111738199A (en) Image information verification method, image information verification device, image information verification computing device and medium
CN113128357B (en) Vehicle fault processing method and system
CN110912978A (en) Sign-in information generation method and system
CN110795980A (en) Network video-based evasion identification method, equipment, storage medium and device
CN114821845B (en) Card punching method and device
Pawade et al. Blockchain based secure traffic police assistant system
CN115906028A (en) User identity verification method and device and self-service terminal
CN114240315A (en) Cloud inspection law enforcement evidence obtaining method and device
CN102075329B (en) Method for identifying user images
CN110738122A (en) data checking method and device
BRPI0712433A2 (en) system and apparatus for transfer and management of biometric and demographic data.
CN112632308B (en) User first visit identification method and device, electronic equipment and storage medium
CN114553684B (en) Method, device, computer equipment and storage medium for network point operation and maintenance
CN111694796B (en) Method, apparatus, computer device and storage medium for identifying scanned file information
US20230281407A1 (en) Crowd-sourced fake identification reporting
CN116664081B (en) Case data fixed certificate processing method, device and equipment based on quick-handling identification
CN112600846B (en) Attendance management method and system based on Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination