KR20170001924A - System and method for verifying validity of digital image taken by mobile terminal - Google Patents
System and method for verifying validity of digital image taken by mobile terminal Download PDFInfo
- Publication number
- KR20170001924A KR20170001924A KR1020150098882A KR20150098882A KR20170001924A KR 20170001924 A KR20170001924 A KR 20170001924A KR 1020150098882 A KR1020150098882 A KR 1020150098882A KR 20150098882 A KR20150098882 A KR 20150098882A KR 20170001924 A KR20170001924 A KR 20170001924A
- Authority
- KR
- South Korea
- Prior art keywords
- digital image
- portable terminal
- verification information
- photographed
- image
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Telephone Function (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collating Specific Patterns (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention [0001] The present invention relates to a system and method for verifying the validity of a digital image photographed by a mobile terminal, and more particularly, to a system and method for verifying validity of a digital image for verifying whether or not a digital image is an image photographed by a mobile terminal .
Recently, wired / wireless communication networks have been developed and various online services such as online commerce, internet banking, and online certificate issuance have been provided as computers and the Internet have become popular in homes. Because of the nature of these services, it is very important that they authenticate themselves to ensure that the user has the right to use the service.
It is the most obvious method of self-certification, but it is very difficult for the user to visit the bank or the certificate issuing institution. However, since the visit is very cumbersome, the facial photograph or his / her identification card or other authentication means is scanned or photographed, Non-face authentication technologies are emerging in institutions that perform identity verification via transmitted pictures. However, when the present non-face authentication technology is used, there may be a problem that an image of the ID image of the other person or an image of the authentication means of the other person is collected and abused by a hacker.
In addition, there are cases where an insurer of a car inspects the mileage or the installation of a black box and provides a service for discounting insurance premiums. In such a case, there is a case in which forged pictures are transmitted, Even if you do not have the possession of the other person as if you are holding a photo of the person is pretending to be increasing.
As the number of counterfeiting and theft cases of online pictures is increasing, a method for preventing such counterfeiting is widely required.
SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a system and method for verifying that a digital image transmitted from a user's portable terminal is captured by the portable terminal, Method.
According to an aspect of the present invention, there is provided an image processing apparatus including an image receiving module for receiving a digital image photographed by a portable terminal, an extraction module for extracting first verification information included in the received digital image, A validation system for a digital image comprising an acquisition module for acquiring second verification information corresponding to a portable terminal and a verification module for verifying the validity of the digital image by comparing the first verification information and the second verification information / RTI >
In one embodiment, the extraction module may extract at least a part of the metadata included in the digital image as the first verification information.
In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, When the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the identification The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image is captured, the second verification information is transmitted from the portable terminal to the digital And may include time information of receiving the image.
In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the acquiring module acquires location information of the portable terminal from the portable terminal or a mobile communication terminal System, and when the first verification information includes identification information of a device that has photographed the digital image, identification information of the portable terminal can be received from the portable terminal or a mobile communication company system subscribed to by the portable terminal have.
In one embodiment, if the first verification information includes location information of a place where the digital image is photographed, the verification module may determine that the location of the digital image is photographed, If the first verification information includes the identification information of the device that photographed the digital image, it is determined whether or not the identification information of the photographed device and the identification information of the portable terminal match And judges whether or not the time at which the digital image was photographed and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the first verification information includes time information of the digital image photographed can do.
In one embodiment, the digital image may be one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.
In one embodiment, the digital image validation system may further comprise a personal authentication module that performs non-face-to-face authentication based on the digital image.
In one embodiment, the digital image may be an image of two or more images of the face of the user of the portable terminal, the identification card, or a unique authentication object of the user in the portable terminal.
In one embodiment, the digital image may be an image of the face of the user of the portable terminal, the identification card, or an image of a unique authentication object and an object to be occupied by the portable terminal.
In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the validity verification system of the digital image includes a step of encrypting the metadata The extraction module may extract the first verification information from the decrypted metadata.
According to another aspect of the present invention, there is provided an image processing method including: an image receiving step of receiving a digital image photographed by a portable terminal; an extracting step of extracting first verification information which is at least a part of metadata included in the received digital image; And a verification step of verifying the validity of the digital image by comparing the first verification information and the second verification information, wherein the obtaining step obtains second verification information corresponding to the portable terminal, A method of validating an image is provided.
In one embodiment, the extracting step may include extracting at least a part of the metadata included in the digital image as the first verification information.
In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, When the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the identification The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image is captured, the second verification information is transmitted from the portable terminal to the digital And may include time information of receiving the image.
In one embodiment, the acquiring step may include acquiring location information of the portable terminal when the first verification information includes location information of a place where the digital image is photographed, Wherein the first verification information includes identification information of a device that has photographed the digital image, the identification information of the portable terminal may be transmitted to the portable terminal or the mobile communication terminal From the base station.
In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the verification step may include a step of determining whether the position of the place where the digital image was photographed, Determining whether the condition is satisfied;
Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image, And judging whether the time at which the digital image was photographed and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the verification information includes time information of the digital image taken .
In one embodiment, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, an image of a unique authentication object, or an object to be occupied by the user.
In one embodiment, the method for validating the digital image may further include a step of authenticating the user who performs non-face-to-face authentication based on the digital image.
In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the method for verifying the validity of the digital image is a method of encrypting the metadata using the decryption method corresponding to the encryption method. And the extracting step may include extracting the first verification information from the decrypted metadata.
According to another aspect of the present invention, there is provided a computer program installed in a data processing apparatus and stored in a recording medium for performing the above-described method.
According to another aspect of the present invention there is provided a system for validating a digital image, the system comprising a processor and a memory storing a program, wherein the program, when executed by the processor, There is provided a digital image validation system for performing the above-described method.
According to an embodiment of the present invention, it is possible to provide a system and method for verifying that a digital image transmitted from a portable terminal of a user who intends to perform non-face-to-face authentication is photographed by the portable terminal.
A system and method for validating a digital image according to an embodiment of the present invention may be used for non-face-to-face authentication. That is, the system for verifying the validity of the digital image verifies that the ID card to be used for the non-face-to-face authentication is taken by the user's own mobile terminal to be authenticated by the ID card, thereby verifying that the corresponding ID card is occupied by the user .
According to an embodiment of the present invention, the metadata used for validity verification of a digital image is encrypted and inserted into a digital image, and the metadata is extracted by decoding the digital image, thereby preventing forgery and alteration of the metadata.
According to the system and method for validating a digital image according to an exemplary embodiment of the present invention, the authentication of the user using two or more images of the face, ID, It is possible to obtain an effect of further strengthening the authentication of the user and to further enhance the reliability of the object to be occupied when the image of the object to be occupied by the authentication means and the image of the object to be occupied are taken together Can be obtained.
BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG.
2 is a flowchart illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.
3 is a block diagram illustrating a schematic configuration of a digital image validation system according to an exemplary embodiment of the present invention.
FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.
BRIEF DESCRIPTION OF THE DRAWINGS The present invention is capable of various modifications and various embodiments, and specific embodiments are illustrated in the drawings and described in detail in the detailed description. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.
The terms first, second, etc. may be used to describe various elements, but the elements should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise.
In this specification, the terms "comprises" or "having" and the like refer to the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, But do not preclude the presence or addition of features, numbers, steps, operations, components, parts, or combinations thereof.
Also, in this specification, when any one element 'transmits' data to another element, the element may transmit the data directly to the other element, or may be transmitted through at least one other element And may transmit the data to the other component. Conversely, when one element 'directly transmits' data to another element, it means that the data is transmitted to the other element without passing through another element in the element.
Hereinafter, the present invention will be described in detail with reference to the embodiments of the present invention with reference to the accompanying drawings. Like reference symbols in the drawings denote like elements.
FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG. Referring to FIG. 1, a digital
The digital
The
It will be appreciated that the
Meanwhile, in the present invention, the digital image does not only mean a single image taken by a digital camera but also includes an image (for example, an image frame included in a moving image) that can be provided by a moving image or other method do.
For this, the digital
Meanwhile, the digital
The first verification information may be embedded in the digital image in various ways to write information to the image. For example, the first verification information may be written in the digital image by a technique such as watermarking or steganography.
In one embodiment, the first verification information may be included in the digital image in the form of metadata. That is, the first verification information may be a part of the metadata included in the digital image. Metadata is structured data about data, and it is data that explains other data. In particular, the metadata of a digital image includes photograph information such as exposure, flash use, resolution, and photo size, information (device manufacturer, device identification, model name, etc.) of the device that captured the digital image, And geographical location information of the photographed place, as meta data.
A representative format for storing metadata of a digital image is, but not limited to, an EXchangeable Image File format (Exif).
In one embodiment, the digital
Meanwhile, the digital
The second verification information is information corresponding to the first verification information, and may be information corresponding to the portable terminal.
The fact that the second verification information corresponds to the first verification information may mean that the second verification information is the same kind of information as the first verification information. Or that the second verification information includes the same kind of information as the information included in the first verification information. For example, if the first verification information is location information, the second verification information may be at least location information, and if the first verification information includes location information, device identification information, and time information, The verification information may include at least location information, device identification information, and time information.
Meanwhile, the digital
The method for the mobile
The
The mobile communication company to which the
The
2 is a flowchart briefly illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.
Referring to FIG. 2, the
Then, the digital
Meanwhile, the digital
The digital
The digital image validation system and method as described above can be used for non-face-to-face authentication. In this case, the digital image transmitted by the
FIG. 3 is a block diagram illustrating a schematic configuration of a digital
The digital
In this specification, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may refer to a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware But can be easily deduced to the average expert in the field of the present invention.
The
The
The
As described above, the first verification information may be embedded in the digital image in various ways (for example, watermark or steganography) for writing information into an image, and the
In one embodiment, the first verification information may be included in the digital image in the form of metadata. That is, the first verification information may be a part of the metadata included in the digital image.
The metadata may be included in the digital image and may be data regarding the digital image itself. As described above, the metadata of the digital image may be in Exif format, but is not limited thereto.
The
According to an embodiment, the first verification information may include at least one of position information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed .
The location information may be Global Positioning System (GPS) information.
The identification information of the device may be unique identification information given to the device, and may be unique information that can specify the device, such as the serial number of the device.
The
Meanwhile, in one embodiment, the metadata included in the digital image may be data encrypted with a predetermined encryption method for preventing forgery and falsification.
In this case, the
The encryption / decryption method used in the digital
Meanwhile, the
The information corresponding to the portable terminal means information about the portable terminal which is collected by the portable terminal, received from the portable terminal, or collected or grasped by a predetermined system (for example, a portable communication system) interlocked with the portable terminal It can mean. Meanwhile, since the information included in the second verification information includes information corresponding to the first verification information, when the first verification information includes the location information of the place where the digital image is photographed, The second verification information may include identification information of the portable terminal when the first verification information includes identification information of a device that has photographed the digital image, If the first verification information includes time information on the digital image, the second verification information may include time information indicating that the digital image was received from the portable terminal.
According to an embodiment, the
When the first verification information includes the location information of the place where the digital image is photographed, the
When the first verification information includes the time information of the digital image, the
If the first verification information includes the identification information of the device that photographed the digital image, the identification information of the portable terminal may be transmitted to the
The
More specifically, when the first verification information includes the location information of the place where the digital image is photographed, the
The fact that two positions satisfy a predetermined position condition may mean that the two positions correspond to a predefined positional relationship. For example, if the distance between the position of the place where the digital image is photographed and the position of the portable terminal is within a predetermined limit distance, the
If the first verification information includes the identification information of the device that captured the digital image, the
If the first verification information includes the time information on the digital image taken, the
The satisfaction of a predetermined time condition between two times can mean that the two positions correspond to a predefined time relationship. For example, when the difference between the time at which the digital image is photographed and the time at which the digital image is received from the portable terminal is within a predefined limit time, the
When the position of the place where the digital image is photographed and the position of the portable terminal satisfy a predetermined positional condition, the
Meanwhile, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, a unique authentication object, or an image of an object to be occupied by the portable terminal, Images can be used for non-confidential self-certification.
Here, the unique authentication object may refer to various objects or devices that can be used for authentication of the owner, and may include, for example, a financial transaction account, a financial transaction confirmation, a financial transaction account screen, Card, debit card, etc.), an OTP device, a security card, and the like.
According to an embodiment, the digital
When the digital image is an ID image, the
When the digital image is an image of a unique authentication object, the digital image includes predetermined information (for example, a unique serial number of a credit card, a card number, an expiration date, etc., unique serial number of the OTP device A unique serial number of the secure card, etc.) may be included in the digital image, and the
On the other hand, in one embodiment, the digital image may be an image of two or more images of the user's face, an identification card, or a unique identity authentication object. For example, a financial account or a credit card may be photographed in a single image together with the face of the user of the mobile terminal or an identification card. According to the present embodiment, the digital
Meanwhile, in the present embodiment, the
Alternatively, the
In another embodiment, the digital image may be an image of a user's face, an identification card, or an image of a unique authenticating object and an occupancy checking object taken together.
Here, the object to be occupied confirmation may mean various objects or devices that need to be confirmed that the user of the portable terminal is occupied (i.e., possessed). For example, when the user of the portable terminal desires to sell a used article, it is necessary to confirm that the user of the portable terminal occupies a used article. Therefore, in this case, the used goods may be an object to be occupied. For example, the digital image may be a financial transaction book or financial account confirmation and a single image of the object to be verified. According to the present embodiment, since the digital image may be an image obtained by photographing both the means for authenticating the user and the object to be occupied, the reliability of the possession of the owner of the portable terminal is strengthened.
FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.
Referring to FIG. 4, the
Then, the digital
The first verification information may include location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, and / or time information when the digital image was photographed.
Accordingly, the digital
Meanwhile, the digital
More specifically, the digital
Then, the digital
If the digital
Meanwhile, the digital image
Meanwhile, according to an embodiment, the digital
Meanwhile, the authentication method according to the embodiment of the present invention can be implemented in a computer-readable program command form and stored in a computer-readable recording medium. The control program and the target program according to the embodiment of the present invention And can be stored in a computer-readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.
Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of software.
Examples of the computer-readable recording medium include magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as CD-ROM and DVD, a floptical disk, And hardware devices that are specially configured to store and execute program instructions such as magneto-optical media and ROM, RAM, flash memory, and the like. The above-mentioned medium may also be a transmission medium such as a light or metal wire, wave guide, etc., including a carrier wave for transmitting a signal designating a program command, a data structure and the like. The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner.
Examples of program instructions include machine language code such as those produced by a compiler, as well as devices for processing information electronically using an interpreter or the like, for example, a high-level language code that can be executed by a computer.
The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
It is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. .
Claims (22)
An extraction module for extracting first verification information included in the received digital image;
An acquiring module corresponding to the first verification information and acquiring second verification information corresponding to the portable terminal; And
And a verification module for comparing the first verification information and the second verification information to verify the validity of the digital image.
Wherein the extraction module comprises:
And extracting at least a part of the metadata included in the digital image as the first verification information.
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
Wherein when the first verification information includes location information of a place where the digital image is photographed, the second verification information includes location information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information indicating that the digital image was received from the portable terminal when the first verification information includes time information on the digital image.
The acquisition module,
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes the location information of the place where the digital image is photographed,
Wherein the first verification information includes identification information of a device that has photographed the digital image, a validity verification system for digital image that receives the identification information of the portable terminal from the mobile terminal or the mobile communication company subscription system of the portable terminal .
Wherein the verification module comprises:
Determining whether a position of the place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed,
Determining whether the identification information of the device that has photographed the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image,
Wherein the first verification information includes time information on the time when the digital image is captured and a digital value that determines whether a time when the digital image was captured and a time when the digital image was received from the portable terminal satisfies a predetermined time condition, Image validation system.
Wherein the digital image is any one of a facial image of the user of the portable terminal photographed by the portable terminal, an ID image, an image of a unique authenticated object, or an image of an object to be occupied, Validation system.
Wherein the digital image validation system comprises:
And a personal authentication module for performing non-face-to-face authentication based on the digital image.
Wherein the digital image is an image obtained by photographing at least two of face, ID, and unique authentication objects of the user of the portable terminal in the portable terminal.
Wherein the digital image is an image obtained by taking a face, an identification card or a unique authentication object of the user of the mobile terminal together with an object to be occupied by the portable terminal.
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
Wherein the digital image validation system comprises:
And a decryption module for decrypting the metadata using a decryption method corresponding to the encryption method,
Wherein the extraction module comprises:
And extracting the first verification information from the decrypted metadata.
An extraction step of extracting first verification information which is at least a part of metadata received from the received digital image;
An acquiring step of acquiring second verification information corresponding to the first verification information and corresponding to the portable terminal; And
And verifying the validity of the digital image by comparing the first verification information and the second verification information.
Wherein the extracting step comprises:
And extracting at least a part of the metadata included in the digital image as the first verification information.
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
Wherein when the first verification information includes location information of a place where the digital image is photographed, the second verification information includes location information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information of receiving the digital image from the portable terminal when the first verification information includes time information on the digital image taken.
The acquiring step includes:
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes location information of a place where the digital image is photographed,
And receiving the identification information of the portable terminal from a mobile communication company system subscribed to by the portable terminal or the portable terminal when the first verification information includes identification information of the device that photographed the digital image, .
Wherein the verifying step comprises:
Determining whether a position of a place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed;
Determining whether the identification information of the device that captured the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image; And
Determining whether the time at which the digital image was captured and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the first verification information includes time information of the digital image taken; The method comprising the steps of:
Wherein the digital image is any one of a facial image of the user of the portable terminal photographed by the portable terminal, an ID image, an image of a unique authenticating object, or an image of an object to be occupied, Validation system.
A method of validating a digital image,
And authenticating the non-face person based on the digital image.
Wherein the digital image is an image obtained by photographing at least two of face, ID, and unique authentication objects of the user of the portable terminal in the portable terminal.
Wherein the digital image is an image obtained by photographing the face of the user of the portable terminal, the identification card, or a unique authentication object and an object to be occupied, together in the portable terminal.
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
A method of validating a digital image,
Further comprising a decoding step of decoding the metadata by a decoding method corresponding to the encryption method,
Wherein the extracting step comprises:
And extracting the first verification information from the decrypted metadata.
A processor;
A memory storing a program,
Wherein the program, when executed by the processor, causes the validation system of the digital image to perform the method of any one of claims 11 to 20. < Desc / Clms Page number 18 >
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20150091172 | 2015-06-26 | ||
KR1020150091172 | 2015-06-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170001924A true KR20170001924A (en) | 2017-01-05 |
Family
ID=57541967
Family Applications (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150098881A KR101703712B1 (en) | 2015-06-26 | 2015-07-13 | System and method for verifying validity of digital image taken by mobile terminal |
KR1020150098882A KR20170001924A (en) | 2015-06-26 | 2015-07-13 | System and method for verifying validity of digital image taken by mobile terminal |
KR1020150103230A KR101674950B1 (en) | 2015-06-26 | 2015-07-21 | System and method for certification using digital image |
KR1020150103231A KR20170001925A (en) | 2015-06-26 | 2015-07-21 | System and method for certification using image |
KR1020150110549A KR20170001927A (en) | 2015-06-26 | 2015-08-05 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150110548A KR101703713B1 (en) | 2015-06-26 | 2015-08-05 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150125089A KR20170001928A (en) | 2015-06-26 | 2015-09-03 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150128535A KR101703714B1 (en) | 2015-06-26 | 2015-09-10 | Method for certification using digital image, application system, and authentication system thereof |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150098881A KR101703712B1 (en) | 2015-06-26 | 2015-07-13 | System and method for verifying validity of digital image taken by mobile terminal |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150103230A KR101674950B1 (en) | 2015-06-26 | 2015-07-21 | System and method for certification using digital image |
KR1020150103231A KR20170001925A (en) | 2015-06-26 | 2015-07-21 | System and method for certification using image |
KR1020150110549A KR20170001927A (en) | 2015-06-26 | 2015-08-05 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150110548A KR101703713B1 (en) | 2015-06-26 | 2015-08-05 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150125089A KR20170001928A (en) | 2015-06-26 | 2015-09-03 | Method for certification using digital image, application system, and authentication system thereof |
KR1020150128535A KR101703714B1 (en) | 2015-06-26 | 2015-09-10 | Method for certification using digital image, application system, and authentication system thereof |
Country Status (1)
Country | Link |
---|---|
KR (8) | KR101703712B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20220036660A (en) | 2020-09-16 | 2022-03-23 | 중소기업은행 | Service providing apparatus and method for verification of identification card image |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038589B (en) | 2016-12-14 | 2019-02-22 | 阿里巴巴集团控股有限公司 | A kind of entity information verification method and device |
WO2019107578A1 (en) * | 2017-11-28 | 2019-06-06 | 조민환 | Relay device, terminal device, and remote control method for relay device and terminal device |
KR102126652B1 (en) * | 2018-01-29 | 2020-06-25 | 박길주 | Image certificating system for anti-hacking and method of the same |
KR101930361B1 (en) * | 2018-08-27 | 2019-03-11 | 황규리 | A method for delivering goods using a mobile application and a computer readable recording medium on which the program is recorded |
KR102565422B1 (en) * | 2018-10-19 | 2023-08-09 | 라인 가부시키가이샤 | Method, computer apparatus, and computer program for providing authentication data |
KR102221673B1 (en) | 2018-10-31 | 2021-03-02 | 순천향대학교 산학협력단 | Self-authenication service using abstaction image based on user experience and operating method thereof |
WO2021022204A1 (en) * | 2019-07-31 | 2021-02-04 | Iigc, Inc. | Image-based authorization and transmission of stored value or sim cards |
KR20210036039A (en) * | 2019-09-25 | 2021-04-02 | 삼성전자주식회사 | Electronic device and image processing method thereof |
CN111079573A (en) * | 2019-11-29 | 2020-04-28 | 童勤业 | Anti-counterfeiting encryption method based on image random scrambling technology |
KR102430793B1 (en) * | 2020-07-23 | 2022-08-09 | 인비즈넷 주식회사 | Method and system for adult authenticating |
KR102566403B1 (en) * | 2020-11-05 | 2023-08-11 | 주식회사 리얼셀러 | System and method for seccondhand product dealing and computer program for the same |
KR102447110B1 (en) * | 2020-12-09 | 2022-09-26 | 주식회사 이엠엘 | System for after-service brokerage service and method for providing after-service brokerage service |
KR102714673B1 (en) * | 2021-08-27 | 2024-10-08 | 아인스비즈플랫 주식회사 | Transaction object verification method, transaction object verification device, and program stored in a recording medium |
KR102623067B1 (en) * | 2022-09-15 | 2024-01-10 | 주식회사 페이히어 | Method for providing non-face-to-face card merchant subscription service and system therefor |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100517441B1 (en) | 2003-07-16 | 2005-09-27 | 양기철 | Method for portrait mutual certification and computer readable record medium on which program therefor is recorded |
KR20120037330A (en) * | 2010-10-11 | 2012-04-19 | (주) 나무인터넷 | Log-in method and system using image objects |
KR20140020337A (en) * | 2014-01-10 | 2014-02-18 | 주식회사 씽크풀 | Method for authentication using user apparatus, digital system, and authentication system thereof |
-
2015
- 2015-07-13 KR KR1020150098881A patent/KR101703712B1/en active IP Right Grant
- 2015-07-13 KR KR1020150098882A patent/KR20170001924A/en unknown
- 2015-07-21 KR KR1020150103230A patent/KR101674950B1/en active IP Right Grant
- 2015-07-21 KR KR1020150103231A patent/KR20170001925A/en unknown
- 2015-08-05 KR KR1020150110549A patent/KR20170001927A/en unknown
- 2015-08-05 KR KR1020150110548A patent/KR101703713B1/en active IP Right Grant
- 2015-09-03 KR KR1020150125089A patent/KR20170001928A/en active Application Filing
- 2015-09-10 KR KR1020150128535A patent/KR101703714B1/en active IP Right Grant
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20220036660A (en) | 2020-09-16 | 2022-03-23 | 중소기업은행 | Service providing apparatus and method for verification of identification card image |
Also Published As
Publication number | Publication date |
---|---|
KR101674950B1 (en) | 2016-11-23 |
KR20170001926A (en) | 2017-01-05 |
KR101703713B1 (en) | 2017-02-08 |
KR20170001929A (en) | 2017-01-05 |
KR20170001923A (en) | 2017-01-05 |
KR101703712B1 (en) | 2017-02-08 |
KR101703714B1 (en) | 2017-02-08 |
KR20170001928A (en) | 2017-01-05 |
KR20170001925A (en) | 2017-01-05 |
KR20170001927A (en) | 2017-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101703712B1 (en) | System and method for verifying validity of digital image taken by mobile terminal | |
US11562363B2 (en) | Hardware and token based user authentication | |
JP7240030B2 (en) | Identity authentication method, device and server | |
US20220417739A1 (en) | Secure data communication | |
US10320807B2 (en) | Systems and methods relating to the authenticity and verification of photographic identity documents | |
ES2811249T3 (en) | Systems and methods for sharing verified identity documents | |
JP2023062065A (en) | Using contactless card to securely share personal data stored in blockchain | |
US10990776B2 (en) | Methods and devices for biometric verification | |
US20160196509A1 (en) | Ticket authorisation | |
KR20170001864A (en) | System and method for verifying validity of digital image | |
KR101748136B1 (en) | Method for certification using digital image, application system, and authentication system thereof | |
JP2005063077A (en) | Method and device for personal authentication and connector | |
KR20170018127A (en) | Method for certification using digital image, application system, and authentication system thereof | |
JP2008103949A (en) | Signature authentication terminal, signature authentication system, signature confirmation system, signature authentication program, signature confirmation program, signature authentication method, and signature confirmation method | |
WO2010140191A1 (en) | Information communication network | |
JP7190081B1 (en) | Authentication system, authentication method, and program | |
KR20170121737A (en) | Method for Providing Non-Facing Certification by using Camera | |
WO2023038734A1 (en) | Image authentication | |
JP2022143810A (en) | Information processing program, information processing method, and information processing apparatus | |
TWM592132U (en) | Online registration system | |
Reagan et al. | Identity Management for Large e-Government Populations. |