KR101748136B1 - Method for certification using digital image, application system, and authentication system thereof - Google Patents
Method for certification using digital image, application system, and authentication system thereof Download PDFInfo
- Publication number
- KR101748136B1 KR101748136B1 KR1020150131135A KR20150131135A KR101748136B1 KR 101748136 B1 KR101748136 B1 KR 101748136B1 KR 1020150131135 A KR1020150131135 A KR 1020150131135A KR 20150131135 A KR20150131135 A KR 20150131135A KR 101748136 B1 KR101748136 B1 KR 101748136B1
- Authority
- KR
- South Korea
- Prior art keywords
- image
- digital image
- information
- authentication
- digital
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G06K9/00221—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Collating Specific Patterns (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
Abstract
An application system installed in a portable terminal is disclosed. The application system comprising: an image acquisition module for acquiring at least one digital image directed to an object through an image capturing means of a portable terminal; a transmitter for transmitting the at least one digital image acquired by the image acquisition module to an authentication system Wherein when the at least one digital image is received by the authentication system, based on the received at least one digital image, whether the digital image has captured a three-dimensional physical object or a two-dimensional image Is authenticated, authentication is performed to authenticate a user corresponding to the object or whether the object is actually photographed, and the image acquisition module is configured to acquire at least one of the at least one digital image To an active light image And said object characterized in that for obtaining a plurality of images taken from different angles.
Description
The present invention relates to a system and method for authenticating a user using a digital image, and more particularly, to a system and method for authenticating a user using verification information that can be obtained by a digital image.
Recently, various online services such as online commerce, internet banking, online certificate issuance and the like have been provided. Because of the nature of these services, it is very important that they authenticate themselves to ensure that the user has the right to use the service.
The most obvious authentication method is to visit a bank or a certificate issuing organization directly. However, since the visit is very cumbersome, the facial photograph, own identification card or other authentication means are scanned or photographed and transmitted to the certification body online. Non-face authentication technology is emerging that performs identity verification through transmitted pictures.
However, when the current non-face authentication technology is used, there is a problem that a problem that the photo is stolen, forged or exploited by a hacker or the like can not be prevented.
In addition, there are cases where a car insurance company provides a service for checking mileage or black box installation and discounting insurance premiums. At this time, there are cases where forged pictures are transmitted, Even if you do not have the possession of the other person as if you are holding a photo of the person is pretending to be increasing.
As the number of cases of counterfeiting or theft of digital images such as online photographs is increasing, a method for confirming the validity of digital images is widely required.
SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and it is an object of the present invention to provide a digital image authentication method, a digital image authentication method, a digital image authentication method, And to provide a system and method that can be used.
It is another object of the present invention to provide a system and method for judging whether or not a digital image has taken a real object.
An application system installed in a portable terminal for realizing the technical idea of the present invention includes an image acquisition module for acquiring at least one digital image targeted at an object through image shooting means of a portable terminal, And a communication module for sending the at least one digital image from the at least one digital image to the authentication system, wherein, when the at least one digital image is received, It is determined whether a three-dimensional object or a two-dimensional image is captured, and an authentication process for authenticating a user corresponding to the object or whether the object is photographed is performed. The image acquisition module may include an image acquisition module Obtaining at least one of the images for lighting the active images, and the object is characterized in that each pickup a plurality of images taken from a different angle.
When the illumination active image is received by the authentication system, it is determined whether or not the image characteristic that appears when the two-dimensional image is photographed with the illumination device activated is displayed in the illumination active image, and the authentication process is performed .
The authentication system is configured to receive a plurality of images in which a three-dimensional object is photographed and a plurality of images in which a two-dimensional image is photographed while the lighting apparatus is activated, and learn the image characteristics through machine learning or deep learning .
Wherein the image acquisition module obtains a lighting inactive image of the object with the lighting active image and the lighting device of the portable terminal deactivated and generates an illumination inactive image based on the lighting active image and the lighting inactive image difference And the authentication process is performed.
Wherein the image acquisition module controls the portable terminal to photograph a plurality of the objects at different angles, captures the object at a predetermined angle, and displays the captured angle of the portable terminal through a sensor included in the portable terminal It is determined whether the angle is changed to a specific angle, and if it is determined that the angle is changed to the specific angle, the object can be photographed.
Wherein the specific angle is selected by the image acquisition module or the authentication system and the authentication process performed by the authentication system determines whether or not the degree of change of the shooting angle of the received plurality of digital images corresponds to the specific angle And a process for generating the image data is included.
Wherein at least one digital image transmitted to the authentication system is obtained by the image acquisition module and is based on a first image based on a user's first face image displayed on the object and a second face image on which a user's real face is captured And a second image.
Wherein at least one of the first image or the second image is an illumination active image.
The application system may further include an editing module for arranging the first image and the second image in a first area and a second area of a predetermined UI and comparing the first image and the second image.
The application system determines respective positions indicating a specific region from the first face image and the second face image, and arranges the first face image and the second face image so as to overlap each other based on the respective positions The editing module may further include an editing module.
Wherein the editing module uses the first face image itself or the first face image as an image obtained by image processing based on an image attribute of the second face image as the first image, And using the 2-faced image as the second image, the image processed by image processing based on the image attribute of the first facial image.
The image acquisition module may acquire the first image and the second image simultaneously or within a predetermined time difference through each of a plurality of image acquisition means provided in the portable terminal.
An application system installed in a mobile terminal for achieving the technical idea of the present invention includes an image acquisition module for acquiring at least one digital image for an object through an image shooting means of the portable terminal, And a determination module that determines whether the digital image is an image of a three-dimensional object or a two-dimensional image, based on the at least one digital image obtained when at least one digital image is acquired, Wherein the image acquisition module obtains at least one of the at least one digital image as a light active image or obtains a plurality of images of the object photographed at different angles.
According to an aspect of the present invention, there is provided a digital image determination system including an acquisition module for acquiring at least one digital image that is intended for a predetermined object, and an acquisition module for acquiring at least one digital image based on at least one digital image acquired by the acquisition module. A determination module for determining whether the image is a three-dimensional object or a two-dimensional image, wherein the determination module is based on at least one lighting active image included in the at least one digital image, And determining whether the digital image is a three-dimensional object image or a two-dimensional image image, based on a plurality of images captured at different angles from the object included in the at least one digital image, So that the digital image captures a three-dimensional object Whether the captured image of a two-dimensional recognition is characterized in that to determine whether.
The determination module may determine whether an image characteristic that appears when the two-dimensional image is photographed while the illumination device is activated appears in the illumination active image.
Wherein the determination module receives a plurality of images in which a three-dimensional object is photographed and a plurality of images in which a two-dimensional image is photographed while the illumination device is activated, and learns the image characteristic through machine learning or deep learning .
Wherein the acquisition module acquires the illumination active image and the illumination inactive image photographed with the illumination device of the portable terminal inactive, and the determination module performs the determination based on the illumination active image and the illumination inactive image . ≪ / RTI >
An authentication system for achieving the technical idea of the present invention includes an image receiving module for acquiring at least one digital image directed to an object from a portable terminal, and an image receiving module for receiving the digital image, It is judged whether the image is a three-dimensional object image or a two-dimensional image image, and an authentication process is performed to authenticate a user corresponding to the object or whether the object is photographed Wherein the determination module determines whether the digital image is a three-dimensional object image or a two-dimensional image image based on at least one lighting active image included in the at least one digital image, The method of
A method for achieving the technical idea of the present invention includes the steps of acquiring at least one digital image that is intended for a predetermined object by a digital image determination system, Wherein the step of determining whether the digital image has taken a three-dimensional object or a two-dimensional image includes the steps of: determining whether the digital object has taken a physical object or a two-dimensional image; , The digital image determination system determines whether the digital image has taken a three-dimensional object or a two-dimensional image based on at least one lighting active image included in the at least one digital image Or the object contained in the at least one digital image And determining whether the digital image is a three-dimensional object or a two-dimensional image based on a plurality of images taken at different angles.
Wherein the step of determining whether the digital image has taken a three-dimensional object or a two-dimensional image based on at least one lighting active image included in the at least one digital image comprises: And determining whether an image characteristic that appears when the illumination device is activated is displayed in the illumination active image.
The digital image determination method may include receiving the plurality of images in which the three-dimensional object is photographed and the plurality of images in which the two-dimensional image is photographed, and performing machine learning or deep learning The method may further include learning the image characteristic through the image processing unit.
Wherein the at least one digital image comprises the lighting active image and a lighting inactive image photographed with the lighting device of the portable terminal deactivated, wherein the at least one digital image comprises at least one lighting active image included in the at least one digital image The step of determining whether the digital image has taken a three-dimensional object or a two-dimensional image may comprise performing the determination based on the lighting active image and the lighting inactive image have.
According to an embodiment of the present invention, it is possible to use a digital image to perform powerful and simple non-face authentication or validity of the digital image (that is, a digital image is photographed by a legitimate user or an object Quot ;, which means that the user is occupied) can be determined.
Further, a primary authentication is performed through a target system (e.g., a mobile communication company system, a credit card company system, or a payment mediation system, an identification card authentication system, etc.) Since the authentication is performed, stronger authentication can be performed.
According to an embodiment of the present invention, when the verification information used for validity verification of a digital image is inserted into metadata, the metadata is encrypted and inserted into a digital image and decrypted to extract metadata. Can be prevented.
According to an embodiment of the present invention, the verification information may include auto information (e.g., photographing time, photographing position, etc.) of a digital image to be automatically inserted by the photographing means. There is an effect that it is possible to prevent the verification information from being manipulated by the user by inserting insertion information in place of the auto information.
Further, among the pieces of verification information, the insertion information inserted by the application system is inserted into the meta data or the image itself (e.g., steganography technique, watermark, stamp, etc.) .
Also, according to an embodiment of the present invention, two or more of the facial, ID, and unique authenticated objects of the user of the portable terminal may be authenticated using a plurality of digital images photographed together or individually Therefore, it is possible to obtain an effect of further enhancing the authenticity of the object to be occupied when the image of the object to be authenticated is acquired .
Particularly, in the case where an image in which a user's face is photographed and an image in which a user's face is displayed (for example, ID card, employee ID, etc.) is transmitted to the authentication system, the reliability of the user authentication is increased by comparing the user's face images It is possible to prevent an unauthorized user from attempting to be falsely authenticated by the photographing action alone. If the face is different, it may be burdensome for an unauthorized user to photograph his / her face, and his or her face may be stored in the authentication system and used as evidence for future illegal use.
In addition, when the user's face and the object are simultaneously photographed (for example, the front and rear cameras of the portable terminal are used to simultaneously photograph the object and the user's face, or the user's face and the object are photographed together) Or if the authentication is to be taken within a certain time, this effect can be increased.
Further, it is possible to prevent an unauthorized authentication attempt by verifying whether the digital image used at the time of authentication is an image obtained by photographing a real object or an image obtained by photographing an image.
According to an embodiment of the present invention, one of the user's face and the object may be photographed first, and the other one may be photographed while the application stores the image, so that the user's face and the object are placed in one digital image Or the second image is taken while the first digital image is inserted so that the user's face and the object are made to coexist in one digital image so that the comparison authentication of the legitimate user can be made easier, It is possible to prevent an attempt to obtain a false authentication and also to improve the efficiency of digital image storage.
According to an embodiment of the present invention, when the object to be photographed is an ID card having a face image, the face of the object image is extracted and the screen of the digital image is arranged so as to correspond to the face image of the user, There is an effect that can be done.
Further, the application system according to the embodiment of the present invention permits the digital image to be transmitted within a predetermined time after the digital image is acquired, and the authentication system also permits authentication only when the digital image is received within a predetermined time, It is difficult to perform artificial manipulation or change of the insertion information on the side of the user.
According to the embodiment of the present invention, the photographing time of the digital image and the time when the authentication system receives the digital image satisfy a predetermined condition, or the photographing position of the digital image and the photographing position of the portable terminal Face authentication or the validity of the digital image when the position satisfies a predetermined condition or when the identification information of the portable terminal and the identification information of the portable terminal confirmed by the authentication system correspond to each other, There is an effect that it is difficult to manipulate or change the image.
Also, when authentication is performed using a plurality of digital images, the insertion information is divided into a plurality of digital images and inserted, thereby enhancing security.
Further, when the insertion information inserted in the digital image for authentication includes the one-time information received from the authentication system, the insertion information itself can have a one-time effect, so that there is an effect that excellent security can be obtained. There is an effect that the image can be prevented from being reused in authentication.
BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
1 is a conceptual illustration of an authentication system using a digital image according to an embodiment of the present invention.
2 is a flowchart illustrating an authentication method using a digital image according to an exemplary embodiment of the present invention.
3 is a block diagram showing a schematic configuration of an authentication system using a digital image according to an embodiment of the present invention.
4 is a flowchart illustrating an example of an authentication method using a digital image according to an embodiment of the present invention.
5 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention.
6 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention.
7 shows an example of an application system according to an embodiment of the present invention.
8 is a flowchart illustrating an operation process of an application system according to an embodiment of the present invention.
9 is a flowchart illustrating an operation procedure of an application system according to another embodiment of the present invention.
FIG. 10 is a diagram for explaining a process of authenticating a user using a plurality of images according to the technical idea of the present invention.
11 is a view for explaining a concept of judging an image taken image and a real image according to the technical idea of the present invention.
Fig. 12 shows a schematic configuration of a digital image judgment system according to the technical idea of the present invention.
BRIEF DESCRIPTION OF THE DRAWINGS The present invention is capable of various modifications and various embodiments, and specific embodiments are illustrated in the drawings and described in detail in the detailed description. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.
The terms first, second, etc. may be used to describe various elements, but the elements should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise.
In this specification, terms such as "comprise," "comprising," and the like are intended to specify that there are stated features, numbers, steps, operations, elements, parts or combinations thereof, But do not preclude the presence or addition of one or more other features, steps, operations, elements, components, or combinations thereof.
Also, in this specification, when any one element 'transmits' data to another element, the element may transmit the data directly to the other element, or may be transmitted through at least one other element And may transmit the data to the other component. Conversely, when one element 'directly transmits' data to another element, it means that the data is transmitted to the other element without passing through another element in the element.
Hereinafter, the present invention will be described in detail with reference to the embodiments of the present invention with reference to the accompanying drawings. Like reference symbols in the drawings denote like elements.
1 is a conceptual illustration of an authentication system using a digital image according to an embodiment of the present invention. 1, an authentication system (hereinafter referred to as an 'authentication system') 100 using a digital image is used to implement an authentication method using a digital image according to an embodiment of the present invention .
The
The
According to an embodiment, the
The
In this specification, the mobile communication company system refers to a system of a mobile communication network provider providing mobile communication services to the
When the
The
According to the technical idea of the present invention, an authentication method with enhanced security is provided by using a predetermined authentication method that can be performed by the
In the present invention, a digital image does not only mean a single image but also includes an image (for example, an image frame included in a moving image) that can be provided by a moving image or other method.
The
Meanwhile, the
The first verification information may be embedded in the digital image in various ways to write information such as watermark, steganography, stamp, etc. to the image.
According to an embodiment, the first verification information may include information (e.g., name, date of birth, resident number, card information, etc.) displayed on an object (e.g., ID card, card, etc.) of the digital image.
In one embodiment, the first verification information may be included in the digital image in the form of metadata. The first verification information may be a part of the metadata included in the digital image. Metadata is structured data about data and is data that describes other data. In particular, the metadata of a digital image includes photograph information such as exposure, flash usage, resolution, and photo size, information (device manufacturer, device identification, model name, etc.) of the device that captured the digital image, Time information, geographical position information of the photographed place, and the like as metadata.
The first verification information may include information inserted into the digital image by the
According to the embodiment of the present invention, since the auto information is written in plain text which can be easily changed or manipulated by the user, the
A representative format for storing metadata of a digital image is, but not limited to, an EXchangeable Image File format (Exif).
The digital image may also be an identification card, a user's card, or other object expected to be occupied by the user. The object of the digital image may be designated by the
In one embodiment, the
Meanwhile, the
The second verification information is information corresponding to the first verification information, and may be information corresponding to the portable terminal.
The fact that the second verification information corresponds to the first verification information may mean that the second verification information is the same kind of information as the first verification information. Or that the second verification information includes the same kind of information as the information included in the first verification information. For example, if the first verification information is location information, the second verification information may be at least location information, and if the first verification information includes location information, device identification information, and time information, The verification information may include at least location information, device identification information, and time information.
Meanwhile, the
The method for the mobile
The fact that the
The mobile communication company to which the
The
Of course, according to an embodiment, the
2 is a flowchart briefly illustrating an authentication method using a digital image according to an embodiment of the present invention.
2, the
The
In addition, the first verification information may include insertion information artificially inserted by the
An example of the insertion information may be a photographing position of a digital image, a photographing time, identification information of the
Meanwhile, the
The
The
FIG. 3 is a block diagram illustrating a schematic configuration of an
The
In this specification, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may refer to a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware But can be easily deduced to the average expert in the field of the present invention.
The
The
In one embodiment, the first verification information may be embedded in the digital image in the form of metadata. The first verification information may be a part of the metadata included in the digital image. The metadata may be included in the digital image and may be data regarding the digital image itself. As described above, the metadata of the digital image may be in Exif format, but is not limited thereto.
The
According to an embodiment, the first verification information may include at least one of position information of a place where the digital image is photographed, identification information of the
The location information may be Global Positioning System (GPS) information.
The identification information of the
The
Meanwhile, in one embodiment, the metadata included in the digital image may be data encrypted with a predetermined encryption method for preventing forgery and falsification. In this case, the
The encryption / decryption method used in the
Meanwhile, the
The information corresponding to the portable terminal means information about the portable terminal which is collected by the portable terminal, received from the portable terminal, or collected or grasped by a predetermined system (for example, a portable communication system) interlocked with the portable terminal It can mean. Meanwhile, since the information included in the second verification information includes information corresponding to the first verification information, when the first verification information includes the location information of the place where the digital image is photographed, The second verification information may include identification information of the portable terminal when the first verification information includes identification information of a device that has photographed the digital image, If the first verification information includes time information on the digital image, the second verification information may include time information indicating that the digital image was received from the portable terminal.
According to an embodiment, the
When the first verification information includes the location information of the place where the digital image is photographed, the acquiring
When the digital image is transmitted through the network, the
If the first verification information includes identification information of the
The
More specifically, when the first verification information includes the location information of the place where the digital image is photographed, the
The fact that two positions satisfy a predetermined position condition may mean that the two positions correspond to a predefined positional relationship. For example, if the distance between the position of the place where the digital image is photographed and the position of the portable terminal is within a predetermined limit distance, the
If the first verification information includes the identification information of the device that captured the digital image, the
If the first verification information includes the time information on the digital image taken, the
The satisfaction of a predetermined time condition between two times may mean that the two times correspond to a predefined time relationship. For example, when the difference between the time at which the digital image is photographed and the time at which the digital image is received from the portable terminal is within a predefined limit time, the
When the position of the digital image and the position of the portable terminal satisfy a predetermined positional condition, the
Meanwhile, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, a unique authentication object, or an image of an object to be occupied by the portable terminal, Images can be used for non-confidential self-certification.
Here, the inherent identity authentication object refers to, for example, a variety of authentication objects such as a financial transaction account, a financial transaction confirmation, a financial transaction account screen, a financial card (credit card, debit card, etc.) Object.
According to an embodiment, the
The identification
Therefore, the legitimacy of the identification information may refer to a case where the identification information corresponds to information registered in advance (for example, information registered in the target system 300). Or when card information (for example, card number or the like) is included in the identification information as described later, it means that the card corresponding to the card information is a card capable of authenticating the user himself or a card capable of actual payment It is possible.
The identification information does not necessarily have to be completely input by the user. The user can input only a part of the identification information by using the
According to an embodiment, identification information may not be input by the user. For example, the identification information may be a combination of the information displayed on the object and the verification information included in the digital image. Alternatively, the identification information may be information displayed on the object and the identification information (e.g., telephone number, device identification information, O / S ID, etc.) of the portable terminal identified by the
For example, the identification information may be changed according to the
For example, the identification information may include information necessary for a personal authentication (for example, authentication of the cellular phone itself) conventionally provided by the mobile communication company system. That is, the phone number of the
The identification information may include information necessary for authentication (e.g., credit card authentication) conventionally provided by a credit card company system. Card information and user's personal information may be included in the identification information, and the object of the digital image may be an object (e.g., a card) corresponding to the card information.
When the identification information includes the identification information of the
On the other hand, when the identification information includes card information and personal information, the
The digital image may further include verification information (e.g., a photographing position, a photographing time, identification information of the portable terminal 200) for verifying the validity of the digital image, as described above. In this case, The authentication of the user can be succeeded.
When the digital image is an ID image, the
When the digital image is an image of a unique authentication object, the digital image may include predetermined information (e.g., a unique serial number of the credit card, a card number, an expiration date, a financial account number, etc., (E.g., a unique serial number of the device, a unique serial number of the secure card, etc.) may be included in the digital image, and the
In the case where the information displayed on the object of the digital image is used as the verification information, the information input by the user may be input as the identification information. For example, when the user inputs his or her own mobile phone and personal information as the identification information, the identification
When the user inputs the card information and the personal information as the identification information, the identification
Verification information (e.g., personal information or card information) acquired by the
In some implementations, all of the identification information (e.g., card information and personal information) may be obtained by the
In one embodiment, the digital image may be an image of two or more of the user's face, identification, or unique identity-authenticated object together. For example, a financial account or a credit card may be photographed in a single image together with the face of the user of the mobile terminal or an identification card. Alternatively, the
When the digital image received by the
The
Alternatively, the
In some implementations, the
In any case, the
According to an embodiment of the present invention, when an image transmitted to the
According to the technical idea of the present invention, the user authenticates the first object (e.g., ID card) on which his / her face is displayed and the image (or the first object image and the second object image) To the
In this case, an effect similar to offline face-to-face authentication (for example, a process of presenting an ID card off-line and comparing the face of the user face and the ID card with the naked eye by the authentication side) can be obtained. Depending on the implementation, the
According to an embodiment of the present invention, when the first object is an ID card having a facial image, the
As a result, it is possible to prevent an unauthorized user from altering the facial image on the ID card so that false authentication of the user is performed by discriminating the authenticity of the ID card in cooperation with the target system.
Meanwhile, according to the technical idea of the present invention, at least one of the
The image processing may include, for example, scaling one of the first face image (the image included in the identification card) or the second face image (the face image taken by the portable terminal) to the same or similar size as the other one . According to an embodiment of the present invention, an image adjustment process may be included in which an image is changed or an image is filtered so as to have the same or similar color, roughness, or brightness as the other image. In any case, the image processing may be performed in such a way that the image attributes of the first face image and / or the second face image are compared with a relative image (e.g., a second face image in the case of a first face image, Based on the image attributes (e.g., size, color, illuminance, and / or brightness, etc.) of the first face image (which means first face image).
After this image processing process is performed, the
The image arrangement process may include arranging the first face image and the second face image after the image processing is performed in a first area and a second area, respectively, which are predefined on a predetermined UI. The first face image and the second face image can be confirmed at the same time through the image arrangement process, thereby increasing the efficiency of the comparison process. This image processing and image placement process may be performed, for example, by an editing module (not shown) included in the
Depending on the implementation, only the image placement process may be performed without the image processing process. In this case, the first face image and the second face image may be arranged in the first region and the second region as described above, so that a predetermined solution or a user can easily compare the first face image and the second face image.
If the second face image is a plurality of photographs, the arrangement area can be appropriately adjusted according to the number of photographs. For example, an ID photo may be arranged first, a plurality of face photographs may be simply arranged, or a plurality of photographs may be arranged side by side with the ID photo up or down. Or you could put a photo of your ID at the center and put a lot of photos around it. It will be appreciated by those of ordinary skill in the art that the manner of placement may vary.
An example of an image placement process is shown in Fig.
FIG. 10 is a diagram for explaining a process of authenticating a user using a plurality of images according to the technical idea of the present invention.
10A shows an example of a first digital image 10 for a first object (e.g., an ID card) on which a face 11 of the user is displayed, FIG. 10B shows an example of a face of the user, And the second digital image 20 captured by the second digital camera 20 is shown.
The
In any case, the image processing may refer to a process in which the image attributes (e.g., size, color, brightness, and / or illumination) are changed to facilitate comparison of the two
The
The image placement process includes a process of placing an image so that two face
For example, from each of the first face image and the second face image, the editing module can determine each position indicating a specific region. Then, based on the respective positions, the first face image (or the first face image subjected to the image processing) and the second face image (or the second face image processed with the image) can be arranged to overlap with each other. Of course, any one of the face images can be displayed as transparent or translucent. In such a case, the comparison between the facial images can be easily performed depending on whether or not the specific region is displayed overlapping and how much the remaining regions overlap the same or similarly.
In any case, the first area and the second area can be arranged so that the first face image and the second face image can be easily compared with each other.
A comparison image (i.e., as shown in FIG. 10C) obtained as a result of performing the image placement process may then be transmitted by the
According to an embodiment, the
On the other hand, the image processing and / or image placement process may be performed by the
The
On the other hand, when a user attempts to authenticate a user by using a first digital image that is an object of a user's face (for example, an ID) and a second digital image that a user's face is photographed, (For example, enlargement) of a face image displayed on the object (for example, an ID card) instead of photographing the face image. In this case, the
Therefore, the technical idea of the present invention provides a technical idea that can distinguish whether a predetermined digital image is an image of a real object or a photograph (or image) of the object, that is, a two-dimensional image.
According to an example, authentication can be determined to be successful only when the object (for example, ID card) and the face of the user are simultaneously captured by the front camera and the rear camera of the
Alternatively, the
Or whether the
According to an embodiment, when the second digital image is captured, the
Of course, in order that the reflection characteristic of the light may well appear in the image, the
For example, when a photograph is photographed with a fresh light, a relatively large amount of light is reflected on the photographed photograph, or the light emission effect itself by the fresh light appears on the photograph. On the other hand, There may be no phenomenon or it may be relatively small. Therefore, the predetermined solution or staff provided in the
Depending on the implementation, this problem may be solved by shooting the user's face at a plurality of angles. For example, since the face image displayed on the ID card is an image whose face is normally directed to the front, the
In some cases, an unauthorized user can take images photographed at different angles with respect to a specific object (e.g., a face), and when each of the fraudulent users photographs the respective images, the real object of the specific object is photographed (Or even if the particular object is not part of the user's body) authentication may be successful.
In order to solve such a problem, the
As a result, the
Through the above-described technical idea, it is verified that a malicious user shoots a photograph or an image (e.g., a face image displayed on an ID card) without shooting the real object (his / her face) And the
The technical idea that can distinguish whether a predetermined digital image of the present invention is an image obtained by photographing a physical object or an image obtained by photographing a photograph (or an image) from which the physical object is photographed is not limited to user authentication, It can also be widely used to authenticate whether or not it is authenticated.
For example, when a user performs a commercial transaction such as a transaction for a used article, there is a case where an image of an article not owned by the seller is uploaded to a predetermined service page to conduct a fraudulent transaction.
In this case, the
For example, the
The
The
At this time, the digital image obtained and transmitted by the
Then, the authentication image includes an image (hereinafter referred to as an " image ") in which the object (e.g., the article held by the user or the face of the user) is photographed , &Quot; illumination active image "). To this end, the
According to another embodiment, the authentication image may include a plurality of images obtained by photographing the object at different angles as described above. At least one of the plurality of images may be a light-activated image, and all of the plurality of images may be an image (hereinafter, referred to as a 'light-inactive image') in a state in which the illumination device is not activated.
According to the technical idea of the present invention, in order to judge whether at least one digital image photographed with respect to the object (for example, an article carried by a user or a user's face, etc.) is a real image or an image photographed image, The
When the illumination active image is used, the
The image characteristics that appear in the image capture image in the active illumination state may be, for example, an image feature associated with the reflection of the illumination.
For example, in the case of a live image in the active illumination state, the degree of reflection of the illumination may be small or absent, and in the case of the image taken image in the active illumination state, the degree of reflection of the illumination may be large. Or at least the actual image in the illumination active state is different between the degree of reflection of the light of the real object part and the degree of reflection of the background part, The degree of reflection of the portion of the illumination may be substantially the same. The
In order to understand such image characteristics, the
The learning module may then derive image features that appear in the image capture image in the active illumination state through various types of learning algorithms. For example, the image shown in Fig. 11A is an image pickup image in an active illumination state for a specific object (for example, a remote controller), and the image shown in Fig. 11B is a light for a specific object It shows the real image in the active state.
11, the image pickup image in the active illumination state has the same or similar reflected characteristics of the illumination of the object portion (e.g., the remote control portion) and the background portion, while the real image of the illumination active state is the object portion For example, the remote control portion) and the reflected characteristics of the illumination of the background portion may be dissimilar. Therefore, the reflection characteristics of the illumination of the object portion and the background portion may be learned as the image characteristics of the image capture image in the illumination active state. Of course, in the case where learning is performed by inputting a plurality of images in addition to these characteristics, various image characteristics can be learned by the learning module.
After the learning is performed, the
The learning algorithm used by the learning module may be various types of machine learning or deep learning using a neural network. However, the learning algorithm is not limited to this, and may be a learning operation Any such possible algorithm can be used.
On the other hand, when the image characteristic is derived through the learning as described above, the
For example, the
Also, as described above, the authentication image may include a plurality of images in which the object (e.g., an article held by a user or a user's face) is photographed a plurality of times at different angles. The
According to an example of determining whether the authentication image is a real image or an image-captured image based on the plurality of images, the
In addition, as described above, both the image (real image) in which the user's face is photographed for user authentication and the image in which the user's face is displayed (for example, ID) 100), the image of either one of the two images may be a light-activated image.
As a result, according to the technical idea of the present invention, regardless of whether or not the verification information is used, the
According to another embodiment of the present invention, whether or not the predetermined digital image determined by the
According to an exemplary embodiment of the present invention, the determination process performed by the determination module 170 (i.e., determining whether a predetermined digital image is a real image or an image captured image) may be performed by the
In this case, when the
Also, as described above, the
The
The technical idea for determining whether the digital image photographed for a predetermined object is a real image or an image photographed image as described above according to the present invention is an
That is, any system having data processing capability (hereinafter, referred to as a 'digital image determination system') for realizing the technical idea of the present invention can implement the above technical idea.
A schematic configuration of the digital image judgment system is shown in Fig.
12 shows a schematic configuration of a digital
Referring to FIG. 12, the digital
The digital
The
Then, the
The determination process performed by the
As a result, the technical idea of the present invention to determine whether a digital image is a real image or an image taken image can be implemented by various data processing systems (i.e., the digital image determination system 500) in various environments.
On the other hand, the
In particular, when a first digital image that is the object of the first object and a second digital image that is the object of the second object are used for authentication, the
When the user's face is photographed and transmitted, there is an effect that an attempt by an unauthorized user to actually authenticate the user with false information can be reduced.
In another embodiment, the digital image may be a face of the user, an identification card, or an image taken together with a unique identity verification object and an occupancy verification object.
Here, the object to be occupied confirmation may refer to various articles or devices that need to be confirmed that the user of the portable terminal has occupied or possessed. For example, when the user of the portable terminal desires to sell a used article, it is necessary to confirm that the user of the portable terminal occupies a used article. Therefore, in this case, the used goods may be an object to be occupied. For example, the digital image may be a financial transaction book or financial account confirmation and a single image of the object to be verified at a time. Since the digital image may be an image obtained by photographing the means for authenticating the user and the object to be occupied together, there is an effect that the reliability of the possession of the owner of the portable terminal is strengthened.
4 is a flowchart specifically illustrating an authentication method using a digital image according to an exemplary embodiment of the present invention.
Referring to FIG. 4, the
Then, the
The first verification information may include location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, and / or time information when the digital image was photographed. This information can be used to validate the digital image. Also, as described above, the first verification information may include information displayed on an object of the digital image, and such information may be used for authentication of a user as described above.
Therefore, the
Meanwhile, the
More specifically, the
The
If it is determined that the ID photo is valid, the
5 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention. It will be readily apparent to one of ordinary skill in the art that the order of execution of the processes shown in FIG. 5 may be easily changed as needed.
Referring to FIG. 5, the user may transmit identification information for identity authentication to the
Also, the
Also, the
Then, the
6 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention. It will be readily appreciated by those of ordinary skill in the art that the order of execution of the processes illustrated in FIG. 6 may also be readily modified as needed.
6, the user may transmit only the first partial identification information to the
Then, the
Then, the
If the validity of the identification information is confirmed, the
7 shows an example of an application system according to an embodiment of the present invention.
Referring to FIG. 7, the
The
The
The
According to the technical idea of the present invention, when the insertion information is inserted into the digital image and the digital image in which the insertion information is inserted is transmitted to the
As described above, the
When the insertion information is embedded in the metadata, the metadata may be data that can be easily accessed and manipulated by general users as compared with the case where the insertion information is inserted into the image information. Therefore, the
Meanwhile, the metadata may include information on the auto information (for example, the photographing position and the photographing time of the digital image), and the auto information may be the verification information to be verified. In this case, there is a risk that the auto information can be easily manipulated by the user as described above.
Therefore, the inserting
According to an embodiment, the auto information may be inserted into the metadata separately (encrypted or encoded) corresponding to the auto information while being stored in the metadata. In this case, the validity of the digital image or the user can be authenticated using the insertion information instead of the auto information, so that even if the user operates the auto information, the authentication mechanism can operate effectively.
According to one embodiment, the inserting
For example, the
The
According to an exemplary embodiment of the present invention, the
For example, when the
According to the embodiment, the
In this case, since authentication of the
On the other hand, identification information may be required for the authentication of the subject provided by the
When the user's personal information is displayed on the object, at least some of the user's personal information to be included in the identification information can be automatically recognized and used without the user having to input the information displayed on the object. For example, the user can perform the act of photographing the object without inputting the user's personal information using the
The identification information (e.g., hardware identification information, OS identification information, and / or telephone number) of the
According to an embodiment, an application system for implementing the technical idea of the present invention, which can be implemented as an independent application or an application included in another application (e.g., an application such as a financial institution) The identification information of the
When the identification information of the
Similarly, the
Meanwhile, the
The
The
According to an example, the
When the user selects the image transmission request, the image photographing means can be activated. Then, the user can shoot a predetermined object, and the digital image from which the object is captured can be acquired by the
According to an embodiment, the
Meanwhile, the
The one-time information is received from the
Alternatively, the insertion information may be generated based on one-time information and other information. At this time, the insertion information is extracted by the
When the insertion information based on the one-time information is inserted into the digital image, the insertion information becomes information that can not be reused, thereby enhancing security. Accordingly, there is an effect that the user can not use the image once captured by the user for authentication again. This has the effect of preventing the user from succeeding in authentication even when the user acquires the user's portable terminal or illegally acquires the image.
The
In addition, when the user is authenticated using the digital image as described above, a digital image on which a plurality of objects are captured may be used. In this case, the information displayed on the plurality of objects corresponds to each other, Can be authenticated.
On the other hand, when a plurality of objects are included in each of the plurality of digital images, that is, one of the first digital images is included in the first object and the second object is included in the second digital image.
At this time, if the insertion information to be inserted is specified, the
The first digital image and the second digital image may then be transmitted to the
In this case, even if the insertion information inserted in one of the digital images is forged, authentication can not be successfully performed by the
8 is a flowchart illustrating an operation process of an application system according to an embodiment of the present invention.
Referring to FIG. 8, the
When the image transmission request is received, the user can activate the application system 400 (S510). The
9 is a flowchart illustrating an operation procedure of an application system according to another embodiment of the present invention.
Referring to FIG. 9, the
The
The
According to another embodiment of the present invention, the
The
In some embodiments, the
The
On the other hand, according to an embodiment, the
Meanwhile, the authentication method according to the embodiment of the present invention may be implemented in the form of a program-readable program command and stored in a computer-readable recording medium. Also, the control program and the target program according to the embodiment of the present invention may be stored in a computer- And the like. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.
Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of software.
Examples of the computer-readable recording medium include magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as CD-ROM and DVD, a floptical disk, And hardware devices that are specially configured to store and execute program instructions such as magneto-optical media and ROM, RAM, flash memory, and the like. The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner.
Examples of program instructions include machine language code such as those produced by a compiler, as well as devices for processing information electronically using an interpreter or the like, for example, a high-level language code that can be executed by a computer.
The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
It is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. .
Claims (22)
An image acquiring module for acquiring at least one digital image targeted at an object through an image photographing means of the portable terminal;
And a communication module for transmitting the at least one digital image acquired by the image acquisition module to an authentication system,
Wherein, when the at least one digital image is received by the authentication system, it is judged whether the digital image is a three-dimensional object image or a two-dimensional image image based on the received at least one digital image And an authentication process of authenticating a user corresponding to the object or authenticating whether the object is photographed is performed,
Wherein the image acquisition module comprises:
Obtain at least one of the at least one digital image as a light active image,
A system in which a plurality of images in which a three-dimensional object is photographed and a plurality of images in which a two-dimensional image is photographed are received in a state in which the illumination device is activated, and the image characteristics of the light active image are learned through machine learning or deep learning Wherein the authentication system determines whether the digital image is a three-dimensional object image or a two-dimensional image image, according to a learning result.
An image acquiring module for acquiring at least one digital image targeted at an object through an image photographing means of the portable terminal;
And a communication module for transmitting the at least one digital image acquired by the image acquisition module to an authentication system,
Wherein, when the at least one digital image is received by the authentication system, it is judged whether the digital image is a three-dimensional object image or a two-dimensional image image based on the received at least one digital image And an authentication process of authenticating a user corresponding to the object or authenticating whether the object is photographed is performed,
Wherein the at least one digital image transmitted to the authentication system comprises:
A first image based on a user's first face image displayed on the object and a second image based on a second face image on which the user's real face is captured,
Wherein the image acquisition module comprises:
And acquires the first image and the second image simultaneously or within a predetermined time difference through each of a plurality of image acquiring means provided in the portable terminal.
And an editing module for arranging and comparing the first image and the second image in a first area and a second area of a predetermined UI.
An image acquiring module for acquiring at least one digital image targeted at an object through an image photographing means of the portable terminal;
And a communication module for transmitting the at least one digital image acquired by the image acquisition module to an authentication system,
Wherein, when the at least one digital image is received by the authentication system, it is judged whether the digital image is a three-dimensional object image or a two-dimensional image image based on the received at least one digital image And an authentication process of authenticating a user corresponding to the object or authenticating whether the object is photographed is performed,
Wherein the at least one digital image transmitted to the authentication system comprises:
A first image based on a user's first face image displayed on the object and a second image based on a second face image on which the user's real face is captured,
Wherein the application system or the authentication system comprises:
An editing module for determining respective positions indicating a specific region from the first face image and the second face image and arranging the first face image and the second face image so as to overlap and to make a comparison based on the respective positions, Lt; RTI ID = 0.0 > 1, < / RTI >
The first face image itself; or
Using the first face image as the first image with the image processed based on the image attribute of the second face image,
Wherein the second image is an image obtained by processing the second face image itself or the second face image based on an image attribute of the first face image as the second image.
An image acquiring module for acquiring at least one digital image targeted at an object through an image photographing means of the portable terminal; And
When the at least one digital image is acquired through the image acquisition module, determines whether the digital image is a three-dimensional object image or a two-dimensional image image, based on the acquired at least one digital image And a determination module,
Wherein the image acquisition module comprises:
Obtain at least one of the at least one digital image as a light active image,
Wherein the determination module comprises:
A plurality of images in which a three-dimensional object is photographed and a plurality of images in which a two-dimensional image is photographed are received in a state in which the illumination device is activated, and the image characteristics of the illumination active image are learned through machine learning or deep learning, And determines whether the digital image is a three-dimensional real object or a two-dimensional image according to the result.
A determination module for determining whether the digital image is a three-dimensional object image or a two-dimensional image image based on the at least one digital image acquired by the acquisition module,
Wherein the determination module comprises:
Determining whether the digital image has taken a three-dimensional object or a two-dimensional image based on at least one lighting active image included in the at least one digital image,
Wherein the determination module comprises:
A plurality of images in which a three-dimensional object is photographed and a plurality of images in which a two-dimensional image is photographed are received in a state in which the illumination device is activated, and the image characteristics of the illumination active image are learned through machine learning or deep learning, And determining whether the digital image is a three-dimensional object or a two-dimensional image according to a result of the determination.
An image receiving module for acquiring at least one digital image of an object from a portable terminal; And
It is determined whether the digital image is a three-dimensional object or a two-dimensional image, based on at least one digital image received by the image receiving module, And a determination module that performs an authentication process of authenticating whether or not the object is photographed,
Wherein the determination module comprises:
Determining whether the digital image has taken a three-dimensional object or a two-dimensional image based on at least one lighting active image included in the at least one digital image,
Wherein the determination module comprises:
A plurality of images in which a three-dimensional object is photographed and a plurality of images in which a two-dimensional image is photographed are received in a state in which the illumination device is activated, and the image characteristics of the illumination active image are learned through machine learning or deep learning, And determines whether the digital image is a three-dimensional real object or a two-dimensional image.
Determining whether the digital image has taken a three-dimensional object or a two-dimensional image based on the acquired at least one digital image,
Wherein the step of determining whether the digital image captures a three-dimensional object or a two-
Wherein the digital image determination system comprises at least one illumination active image included in the at least one digital image, a plurality of images in which a three-dimensional object is photographed and a plurality of photographed images Judges whether the digital image is a three-dimensional object image or a two-dimensional image image based on the learning result of the image characteristic of the illumination active image learned through machine learning or deep learning Wherein the digital image determination method comprises the steps of:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/KR2016/006780 WO2016209032A1 (en) | 2015-06-26 | 2016-06-24 | Digital image determination method and system, application system for same, and authentication system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150091172 | 2015-06-26 | ||
KR20150091172 | 2015-06-26 | ||
KR20150125090 | 2015-09-03 | ||
KR1020150125090 | 2015-09-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170001930A KR20170001930A (en) | 2017-01-05 |
KR101748136B1 true KR101748136B1 (en) | 2017-06-28 |
Family
ID=57835639
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150131136A KR20170001931A (en) | 2015-06-26 | 2015-09-16 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150131135A KR101748136B1 (en) | 2015-06-26 | 2015-09-16 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150136451A KR20170001932A (en) | 2015-06-26 | 2015-09-25 | Method for digital image judging and system tereof, application system, and authentication system thereof |
KR1020150136552A KR101725219B1 (en) | 2015-06-26 | 2015-09-25 | Method for digital image judging and system tereof, application system, and authentication system thereof |
KR1020150136452A KR20170001933A (en) | 2015-06-26 | 2015-09-25 | Method for digital image judging and system tereof, application system, and authentication system thereof |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150131136A KR20170001931A (en) | 2015-06-26 | 2015-09-16 | Method for certification using digital image, application system, and authentication system thereof |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150136451A KR20170001932A (en) | 2015-06-26 | 2015-09-25 | Method for digital image judging and system tereof, application system, and authentication system thereof |
KR1020150136552A KR101725219B1 (en) | 2015-06-26 | 2015-09-25 | Method for digital image judging and system tereof, application system, and authentication system thereof |
KR1020150136452A KR20170001933A (en) | 2015-06-26 | 2015-09-25 | Method for digital image judging and system tereof, application system, and authentication system thereof |
Country Status (1)
Country | Link |
---|---|
KR (5) | KR20170001931A (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190068266A (en) | 2017-12-08 | 2019-06-18 | 김정구 | System for measuring weight of livestocks using image analysis and method using the same |
KR102114997B1 (en) * | 2018-07-30 | 2020-05-26 | 주식회사 로드시스템 | Passport recognition terminal and method for passport recognition using the same |
KR102324779B1 (en) * | 2021-06-17 | 2021-11-11 | 주식회사 큐버모티브 | User authentication system |
WO2023172668A1 (en) * | 2022-03-09 | 2023-09-14 | Saras-3D, Inc. | Authentication and security protocols for on-line instructional system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007122400A (en) * | 2005-10-27 | 2007-05-17 | Digital Electronics Corp | Authentication device, program, and recording medium |
KR101175174B1 (en) * | 2010-08-20 | 2012-08-23 | 주식회사에어플러그 | Method and Apparatus for deliverying information using images taken from real things as an information agent |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100517441B1 (en) | 2003-07-16 | 2005-09-27 | 양기철 | Method for portrait mutual certification and computer readable record medium on which program therefor is recorded |
-
2015
- 2015-09-16 KR KR1020150131136A patent/KR20170001931A/en unknown
- 2015-09-16 KR KR1020150131135A patent/KR101748136B1/en active IP Right Grant
- 2015-09-25 KR KR1020150136451A patent/KR20170001932A/en active Application Filing
- 2015-09-25 KR KR1020150136552A patent/KR101725219B1/en active IP Right Grant
- 2015-09-25 KR KR1020150136452A patent/KR20170001933A/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007122400A (en) * | 2005-10-27 | 2007-05-17 | Digital Electronics Corp | Authentication device, program, and recording medium |
KR101175174B1 (en) * | 2010-08-20 | 2012-08-23 | 주식회사에어플러그 | Method and Apparatus for deliverying information using images taken from real things as an information agent |
Also Published As
Publication number | Publication date |
---|---|
KR20170001931A (en) | 2017-01-05 |
KR20170001932A (en) | 2017-01-05 |
KR20170001933A (en) | 2017-01-05 |
KR20170001934A (en) | 2017-01-05 |
KR20170001930A (en) | 2017-01-05 |
KR101725219B1 (en) | 2017-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101703714B1 (en) | Method for certification using digital image, application system, and authentication system thereof | |
ES2811249T3 (en) | Systems and methods for sharing verified identity documents | |
US11431704B2 (en) | Method of authentication, server and electronic identity device | |
US11228587B2 (en) | Method, system, device and software programme product for the remote authorization of a user of digital services | |
EP3647977A1 (en) | Secure data communication | |
US20030012374A1 (en) | Electronic signing of documents | |
CN105765595B (en) | System and method for verifying an identification token | |
US10990776B2 (en) | Methods and devices for biometric verification | |
KR101748136B1 (en) | Method for certification using digital image, application system, and authentication system thereof | |
US20160196509A1 (en) | Ticket authorisation | |
KR20170001864A (en) | System and method for verifying validity of digital image | |
EP1280098A1 (en) | Electronic signing of documents | |
KR20170018127A (en) | Method for certification using digital image, application system, and authentication system thereof | |
JP2009086890A (en) | Application reception system and application reception method | |
JP6690686B2 (en) | Account opening system, account opening method, and program | |
KR20170121737A (en) | Method for Providing Non-Facing Certification by using Camera | |
GB2610439A (en) | Image authentication | |
JP2003060879A (en) | Electronic signature for document | |
AU5443901A (en) | Electronic signing of documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
A302 | Request for accelerated examination | ||
E902 | Notification of reason for refusal | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |