KR20170001924A - System and method for verifying validity of digital image taken by mobile terminal - Google Patents

System and method for verifying validity of digital image taken by mobile terminal Download PDF

Info

Publication number
KR20170001924A
KR20170001924A KR1020150098882A KR20150098882A KR20170001924A KR 20170001924 A KR20170001924 A KR 20170001924A KR 1020150098882 A KR1020150098882 A KR 1020150098882A KR 20150098882 A KR20150098882 A KR 20150098882A KR 20170001924 A KR20170001924 A KR 20170001924A
Authority
KR
South Korea
Prior art keywords
digital image
portable terminal
verification information
photographed
image
Prior art date
Application number
KR1020150098882A
Other languages
Korean (ko)
Inventor
김동진
박경자
이진원
Original Assignee
주식회사 씽크풀
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 씽크풀 filed Critical 주식회사 씽크풀
Publication of KR20170001924A publication Critical patent/KR20170001924A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Abstract

Disclosed are a system and method for verifying validity of a digital image, which verify whether a digital image received from a portable terminal is photographed via the portable terminal. According to an aspect of the present invention, provided is a system for verifying validity of a digital image, the system comprising: an image reception module which receives a digital image from a portable terminal; an extraction module which extracts first verification information which is at least part of meta-data included in the received digital image; an acquisition module which acquires second verification information matching the first verification information and corresponding to the portable terminal; and a verification module which verifies validity of the digital image by comparing the first verification information with the second verification information.

Description

Technical Field [0001] The present invention relates to a system and method for verifying validity of a digital image captured by a mobile terminal,

BACKGROUND OF THE INVENTION 1. Field of the Invention [0001] The present invention relates to a system and method for verifying the validity of a digital image photographed by a mobile terminal, and more particularly, to a system and method for verifying validity of a digital image for verifying whether or not a digital image is an image photographed by a mobile terminal .

Recently, wired / wireless communication networks have been developed and various online services such as online commerce, internet banking, and online certificate issuance have been provided as computers and the Internet have become popular in homes. Because of the nature of these services, it is very important that they authenticate themselves to ensure that the user has the right to use the service.

It is the most obvious method of self-certification, but it is very difficult for the user to visit the bank or the certificate issuing institution. However, since the visit is very cumbersome, the facial photograph or his / her identification card or other authentication means is scanned or photographed, Non-face authentication technologies are emerging in institutions that perform identity verification via transmitted pictures. However, when the present non-face authentication technology is used, there may be a problem that an image of the ID image of the other person or an image of the authentication means of the other person is collected and abused by a hacker.

In addition, there are cases where an insurer of a car inspects the mileage or the installation of a black box and provides a service for discounting insurance premiums. In such a case, there is a case in which forged pictures are transmitted, Even if you do not have the possession of the other person as if you are holding a photo of the person is pretending to be increasing.

As the number of counterfeiting and theft cases of online pictures is increasing, a method for preventing such counterfeiting is widely required.

SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a system and method for verifying that a digital image transmitted from a user's portable terminal is captured by the portable terminal, Method.

According to an aspect of the present invention, there is provided an image processing apparatus including an image receiving module for receiving a digital image photographed by a portable terminal, an extraction module for extracting first verification information included in the received digital image, A validation system for a digital image comprising an acquisition module for acquiring second verification information corresponding to a portable terminal and a verification module for verifying the validity of the digital image by comparing the first verification information and the second verification information / RTI >

In one embodiment, the extraction module may extract at least a part of the metadata included in the digital image as the first verification information.

In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, When the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the identification The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image is captured, the second verification information is transmitted from the portable terminal to the digital And may include time information of receiving the image.

In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the acquiring module acquires location information of the portable terminal from the portable terminal or a mobile communication terminal System, and when the first verification information includes identification information of a device that has photographed the digital image, identification information of the portable terminal can be received from the portable terminal or a mobile communication company system subscribed to by the portable terminal have.

In one embodiment, if the first verification information includes location information of a place where the digital image is photographed, the verification module may determine that the location of the digital image is photographed, If the first verification information includes the identification information of the device that photographed the digital image, it is determined whether or not the identification information of the photographed device and the identification information of the portable terminal match And judges whether or not the time at which the digital image was photographed and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the first verification information includes time information of the digital image photographed can do.

In one embodiment, the digital image may be one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.

In one embodiment, the digital image validation system may further comprise a personal authentication module that performs non-face-to-face authentication based on the digital image.

In one embodiment, the digital image may be an image of two or more images of the face of the user of the portable terminal, the identification card, or a unique authentication object of the user in the portable terminal.

In one embodiment, the digital image may be an image of the face of the user of the portable terminal, the identification card, or an image of a unique authentication object and an object to be occupied by the portable terminal.

In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the validity verification system of the digital image includes a step of encrypting the metadata The extraction module may extract the first verification information from the decrypted metadata.

According to another aspect of the present invention, there is provided an image processing method including: an image receiving step of receiving a digital image photographed by a portable terminal; an extracting step of extracting first verification information which is at least a part of metadata included in the received digital image; And a verification step of verifying the validity of the digital image by comparing the first verification information and the second verification information, wherein the obtaining step obtains second verification information corresponding to the portable terminal, A method of validating an image is provided.

In one embodiment, the extracting step may include extracting at least a part of the metadata included in the digital image as the first verification information.

In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, When the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the identification The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image is captured, the second verification information is transmitted from the portable terminal to the digital And may include time information of receiving the image.

In one embodiment, the acquiring step may include acquiring location information of the portable terminal when the first verification information includes location information of a place where the digital image is photographed, Wherein the first verification information includes identification information of a device that has photographed the digital image, the identification information of the portable terminal may be transmitted to the portable terminal or the mobile communication terminal From the base station.

In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the verification step may include a step of determining whether the position of the place where the digital image was photographed, Determining whether the condition is satisfied;

Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image, And judging whether the time at which the digital image was photographed and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the verification information includes time information of the digital image taken .

In one embodiment, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, an image of a unique authentication object, or an object to be occupied by the user.

In one embodiment, the method for validating the digital image may further include a step of authenticating the user who performs non-face-to-face authentication based on the digital image.

In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the method for verifying the validity of the digital image is a method of encrypting the metadata using the decryption method corresponding to the encryption method. And the extracting step may include extracting the first verification information from the decrypted metadata.

According to another aspect of the present invention, there is provided a computer program installed in a data processing apparatus and stored in a recording medium for performing the above-described method.

According to another aspect of the present invention there is provided a system for validating a digital image, the system comprising a processor and a memory storing a program, wherein the program, when executed by the processor, There is provided a digital image validation system for performing the above-described method.

According to an embodiment of the present invention, it is possible to provide a system and method for verifying that a digital image transmitted from a portable terminal of a user who intends to perform non-face-to-face authentication is photographed by the portable terminal.

A system and method for validating a digital image according to an embodiment of the present invention may be used for non-face-to-face authentication. That is, the system for verifying the validity of the digital image verifies that the ID card to be used for the non-face-to-face authentication is taken by the user's own mobile terminal to be authenticated by the ID card, thereby verifying that the corresponding ID card is occupied by the user .

According to an embodiment of the present invention, the metadata used for validity verification of a digital image is encrypted and inserted into a digital image, and the metadata is extracted by decoding the digital image, thereby preventing forgery and alteration of the metadata.

According to the system and method for validating a digital image according to an exemplary embodiment of the present invention, the authentication of the user using two or more images of the face, ID, It is possible to obtain an effect of further strengthening the authentication of the user and to further enhance the reliability of the object to be occupied when the image of the object to be occupied by the authentication means and the image of the object to be occupied are taken together Can be obtained.

BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG.
2 is a flowchart illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.
3 is a block diagram illustrating a schematic configuration of a digital image validation system according to an exemplary embodiment of the present invention.
FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.

BRIEF DESCRIPTION OF THE DRAWINGS The present invention is capable of various modifications and various embodiments, and specific embodiments are illustrated in the drawings and described in detail in the detailed description. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.

The terms first, second, etc. may be used to describe various elements, but the elements should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.

The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise.

In this specification, the terms "comprises" or "having" and the like refer to the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, But do not preclude the presence or addition of features, numbers, steps, operations, components, parts, or combinations thereof.

Also, in this specification, when any one element 'transmits' data to another element, the element may transmit the data directly to the other element, or may be transmitted through at least one other element And may transmit the data to the other component. Conversely, when one element 'directly transmits' data to another element, it means that the data is transmitted to the other element without passing through another element in the element.

Hereinafter, the present invention will be described in detail with reference to the embodiments of the present invention with reference to the accompanying drawings. Like reference symbols in the drawings denote like elements.

FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG. Referring to FIG. 1, a digital image validation system 100 may be provided to implement a method for validating a digital image according to an exemplary embodiment of the present invention.

The digital image validation system 100 receives the digital image photographed by the portable terminal 200 and verifies the validity of the digital image. Here, the fact that the digital image is valid may mean that the digital image is an image photographed by the portable terminal that transmitted the digital image.

The validity verification system 100 may receive the digital image directly from the portable terminal 200 that captured the digital image. Alternatively, if the portable terminal 200 uploads the digital image to a predetermined external system (for example, a social network system, an image publishing service providing system, or the like), the validity verification system may receive the digital image from the external system It is possible.

It will be appreciated that the validation system 100 may be embodied in the external system.

Meanwhile, in the present invention, the digital image does not only mean a single image taken by a digital camera but also includes an image (for example, an image frame included in a moving image) that can be provided by a moving image or other method do.

For this, the digital image validation system 100 and the portable terminal 200 may be connected to each other through a wired / wireless network to transmit / receive various information and / or data necessary for the technical idea of the present invention.

Meanwhile, the digital image validation system 100 can extract first verification information included in the received digital image.

The first verification information may be embedded in the digital image in various ways to write information to the image. For example, the first verification information may be written in the digital image by a technique such as watermarking or steganography.

In one embodiment, the first verification information may be included in the digital image in the form of metadata. That is, the first verification information may be a part of the metadata included in the digital image. Metadata is structured data about data, and it is data that explains other data. In particular, the metadata of a digital image includes photograph information such as exposure, flash use, resolution, and photo size, information (device manufacturer, device identification, model name, etc.) of the device that captured the digital image, And geographical location information of the photographed place, as meta data.

A representative format for storing metadata of a digital image is, but not limited to, an EXchangeable Image File format (Exif).

In one embodiment, the digital image validation system 100 may include validation information of meta data included in the digital image, including location information of a place where the digital image was captured, identification information of a device that photographed the digital image, Or at least one of the time information in which the digital image was captured, as the first verification information.

Meanwhile, the digital image validation system 100 may acquire the second verification information.

The second verification information is information corresponding to the first verification information, and may be information corresponding to the portable terminal.

The fact that the second verification information corresponds to the first verification information may mean that the second verification information is the same kind of information as the first verification information. Or that the second verification information includes the same kind of information as the information included in the first verification information. For example, if the first verification information is location information, the second verification information may be at least location information, and if the first verification information includes location information, device identification information, and time information, The verification information may include at least location information, device identification information, and time information.

Meanwhile, the digital image validation system 100 may receive at least a part of the second verification information from the portable terminal 200, and in some cases, 300). For example, the digital image validation system 100 may directly receive the location information of the mobile terminal 200 from the mobile terminal 200, and in some cases, And may receive the location information of the portable terminal 200 from the mobile communication company system 300. [

The method for the mobile communication company system 300 to grasp the location information of the mobile terminal 200 may be various methods such as a method using GPS or a method using LBS (Location Based Service).

The validation system 100 of the digital image receives information from the mobile communication company system 300 when the digital image validation system 100 receives information directly from the mobile communication company system 300 It may mean something, or it may mean receiving information indirectly through other intermediaries. For example, in the latter case, the digital image validation system 100 may request information from a predetermined relay system (not shown). In this case, the relay system receives information from the mobile communication company system 300 And transmit the information to the validation system 100 of the digital image.

The mobile communication company to which the portable terminal 200 subscribes may mean a communication company that provides a voice communication network / data communication network so that the portable terminal 200 can perform voice or data communication. The system 100 and the mobile communication company system 300 may be connected to each other through a wire / wireless network to transmit / receive various information and / or data necessary for the technical idea of the present invention.

The portable terminal 200 may be a computing device including a smart phone having a camera function, a tablet PC, a PDA (Personal Digital Assistant), a handheld device having a wireless connection function, or a processing device connected to another wireless modem Lt; / RTI >

2 is a flowchart briefly illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.

Referring to FIG. 2, the portable terminal 200 captures a digital image (S100) and transmits it to the digital image validation system 100 (S110).

Then, the digital image validation system 100 may extract the first verification information from the metadata included in the digital image (S120).

Meanwhile, the digital image validation system 100 may correspond to the first verification information, and may acquire second verification information corresponding to the portable terminal 200. The digital image validation system 100 may acquire at least a part of the second verification information from the portable terminal 200 or the mobile communication company system 300 to which the portable terminal 200 subscribes.

The digital image validation system 100 may then verify the validity of the digital image by comparing the first validation information and the second validation information.

The digital image validation system and method as described above can be used for non-face-to-face authentication. In this case, the digital image transmitted by the portable terminal 200 may be a facial image or an ID image of the user of the portable terminal photographed by the portable terminal, other authentication means (for example, a financial transaction account, a transaction account screen, a financial card Card, cash card, etc.), or a security device such as a security card or OTP, etc.), and the digital image can be used for non-face-to-face authentication. That is, the digital image validation system 100 verifies that the ID card image or the like to be used for non-face-to-face authentication is taken by the user's own portable terminal to be authenticated by the ID authentication means such as an ID card, It is possible to provide a technical idea that the identification card or the like can be proved to be occupied by the person himself / herself.

FIG. 3 is a block diagram illustrating a schematic configuration of a digital image validation system 100 according to an exemplary embodiment of the present invention. Referring to FIG. 3, the digital image validation system 100 includes an image receiving module 110, an extraction module 120, an acquisition module 130, a verification module 140, a personal authentication module 150, And a decryption module 160, as shown in FIG. According to an embodiment of the present invention, some of the above-mentioned components may not correspond to components necessary for implementation of the present invention, and in addition, the digital image validation system 100 Of course, may include more components. For example, the digital image validation system 100 may include other configurations (e.g., image receiving module 110, extraction module 120, (Not shown) that can control the functions and / or resources of the module 130, the verification module 140, the authentication module 150 and / or the decryption module 160, etc.) .

The digital image validation system 100 may include hardware resources and / or software necessary to implement the technical idea of the present invention, and it may mean one physical component or one device It does not mean anything. That is, the digital image validation system 100 may mean a logical combination of hardware and / or software provided to implement the technical idea of the present invention. If necessary, The present invention may be embodied as a set of logical structures for realizing the technical idea of the present invention. In addition, the digital image validation system 100 may mean a set of configurations separately implemented for each function or role for implementing the technical idea of the present invention. For example, the image receiving module 110, the extraction module 120, the acquisition module 130, the verification module 140, the authentication module 150 and / or the decryption module 160 may be connected to different physical devices Or may be located in the same physical device. According to an embodiment of the present invention, the image receiving module 110, the extraction module 120, the acquisition module 130, the verification module 140, the authentication module 150 and / The combination of software and / or hardware may also be located in different physical devices, and configurations located in different physical devices may be organically coupled to implement each of the modules.

In this specification, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may refer to a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware But can be easily deduced to the average expert in the field of the present invention.

The image receiving module 110 may receive a digital image from the portable terminal 200.

The portable terminal 200 and the digital image validation system 100 may be connected through a wired / wireless network (e.g., the Internet).

The extraction module 120 may extract first verification information included in the received digital image.

As described above, the first verification information may be embedded in the digital image in various ways (for example, watermark or steganography) for writing information into an image, and the extraction module 120 The first verification information can be extracted from the digital image by a predetermined extraction method corresponding to the manner in which the first verification information is written in the digital image.

In one embodiment, the first verification information may be included in the digital image in the form of metadata. That is, the first verification information may be a part of the metadata included in the digital image.

The metadata may be included in the digital image and may be data regarding the digital image itself. As described above, the metadata of the digital image may be in Exif format, but is not limited thereto.

The extraction module 120 may extract only a part of the metadata of the digital image as the first verification data.

According to an embodiment, the first verification information may include at least one of position information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed .

The location information may be Global Positioning System (GPS) information.

The identification information of the device may be unique identification information given to the device, and may be unique information that can specify the device, such as the serial number of the device.

The validation system 100 of the digital image verifies both the location information of the place where the digital image is photographed, the identification information of the photographed device or the time information of the photographed digital image, However, in some cases, only a part of them may be used for validation of a digital image.

Meanwhile, in one embodiment, the metadata included in the digital image may be data encrypted with a predetermined encryption method for preventing forgery and falsification.

In this case, the portable terminal 200 that has photographed the digital image may include a predetermined encryption device or encryption software for encrypting the metadata, and the digital image validation system 100 may correspond to the encryption method The extraction module 120 may extract the first verification information from the decrypted metadata. The extraction module 120 may extract the first verification information from the decrypted metadata.

The encryption / decryption method used in the digital image validation system 100 according to an exemplary embodiment of the present invention may be a scheme based on a public key infrastructure (PKI), but the present invention is not limited thereto. An encryption / decryption method can be used.

Meanwhile, the acquisition module 130 may correspond to the first verification information, and may acquire second verification information corresponding to the portable terminal.

The information corresponding to the portable terminal means information about the portable terminal which is collected by the portable terminal, received from the portable terminal, or collected or grasped by a predetermined system (for example, a portable communication system) interlocked with the portable terminal It can mean. Meanwhile, since the information included in the second verification information includes information corresponding to the first verification information, when the first verification information includes the location information of the place where the digital image is photographed, The second verification information may include identification information of the portable terminal when the first verification information includes identification information of a device that has photographed the digital image, If the first verification information includes time information on the digital image, the second verification information may include time information indicating that the digital image was received from the portable terminal.

According to an embodiment, the acquisition module 130 can specify a portable terminal that has transmitted the digital image or a portable terminal previously designated by the user, as a portable terminal corresponding to the second verification information.

When the first verification information includes the location information of the place where the digital image is photographed, the acquisition module 120 acquires the location information of the portable terminal 200 from the portable terminal 200 or the portable terminal From the mobile communication company system 300. In the former case, the mobile terminal 200 may include a predetermined GPS module capable of acquiring its own position information, and acquires GPS information indicating its own position using the GPS module, and transmits the GPS information to the validity verification system (100). In the latter case, the mobile communication company system 300 may include a predetermined system for tracking and collecting the location of the portable terminal 200 such as the LBS.

When the first verification information includes the time information of the digital image, the acquisition module 120 determines that the digital image is a digital image because the transmission time is very short when the digital image is transmitted through the network. The time transmitted to the validation system 100 can be regarded as the time when the digital image is received from the portable terminal 200. [

If the first verification information includes the identification information of the device that photographed the digital image, the identification information of the portable terminal may be transmitted to the portable terminal 200 or the mobile communication company system 300).

The verification module 140 may verify the validity of the digital image by comparing the first verification information and the second verification information.

More specifically, when the first verification information includes the location information of the place where the digital image is photographed, the verification module 140 determines whether the location of the location where the digital image was photographed and the location of the portable terminal Is satisfied.

The fact that two positions satisfy a predetermined position condition may mean that the two positions correspond to a predefined positional relationship. For example, if the distance between the position of the place where the digital image is photographed and the position of the portable terminal is within a predetermined limit distance, the verification module 140 determines the position of the place where the digital image is photographed, It can be determined that the position satisfies the positional condition.

If the first verification information includes the identification information of the device that captured the digital image, the verification module 140 determines whether the identification information of the photographed device and the identification information of the portable terminal match the digital image It can be judged.

If the first verification information includes the time information on the digital image taken, the verification module 140 determines that the time when the digital image was photographed and the time when the digital image was received from the portable terminal is a predetermined time condition It can be judged whether or not it is satisfied.

The satisfaction of a predetermined time condition between two times can mean that the two positions correspond to a predefined time relationship. For example, when the difference between the time at which the digital image is photographed and the time at which the digital image is received from the portable terminal is within a predefined limit time, the verification module 140 determines the time at which the digital image was photographed, It can be determined that the time when the digital image was received from the terminal satisfies the time condition.

When the position of the place where the digital image is photographed and the position of the portable terminal satisfy a predetermined positional condition, the verification module 140 determines whether the digital image is the identification information of the photographed device and the identification information of the portable terminal And judges that the digital image is valid when the digital image is photographed and / or the time when the digital image is photographed and the time when the digital image is received from the portable terminal satisfies a predetermined time condition.

Meanwhile, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, a unique authentication object, or an image of an object to be occupied by the portable terminal, Images can be used for non-confidential self-certification.

Here, the unique authentication object may refer to various objects or devices that can be used for authentication of the owner, and may include, for example, a financial transaction account, a financial transaction confirmation, a financial transaction account screen, Card, debit card, etc.), an OTP device, a security card, and the like.

According to an embodiment, the digital image validation system 100 can perform non-face-to-face authentication, and for this purpose, the digital image validation system 100 performs non-face-to-face authentication based on the digital image The authentication module 150 may further include an authentication module 150 for authenticating the user.

When the digital image is an ID image, the identity authentication module 150 acquires information (e.g., a resident registration number, an address, a name, and a sex) necessary for authentication from the ID image through optical character recognition (OCR) Etc.), and in some cases, the identification photograph included in the ID image may be extracted. Then, the identity authentication module 150 can perform non-face-to-face authentication by comparing the read information and / or the identity photograph with the previously stored identity information.

When the digital image is an image of a unique authentication object, the digital image includes predetermined information (for example, a unique serial number of a credit card, a card number, an expiration date, etc., unique serial number of the OTP device A unique serial number of the secure card, etc.) may be included in the digital image, and the identity authentication module 150 may acquire information necessary for authentication of the user (for example, a credit card Unique serial number or card number, expiration date, etc., the unique serial number of the OTP device, the unique serial number of the secure card, etc.).

On the other hand, in one embodiment, the digital image may be an image of two or more images of the user's face, an identification card, or a unique identity authentication object. For example, a financial account or a credit card may be photographed in a single image together with the face of the user of the mobile terminal or an identification card. According to the present embodiment, the digital image validation system 100 includes two or more means for authenticating the digital image received by the digital image validation system 100, so that stronger identity authentication can be performed by using such a digital image There is an effect to be.

Meanwhile, in the present embodiment, the authentication module 150 authenticates two or more authentication means (for example, face, ID, or unique authentication object) included in the digital image through image processing on the digital image, And can perform non-face-to-face authentication based on each identified authentication means. In this case, the principal authentication module 150 can determine that non-face-to-face authentication is successful only when all the identified principal authentication means authenticates the principal.

Alternatively, the identity authentication module 150 may determine whether the identity authenticated by each identified identity authentication means is the same person. If the identity authenticated by the two or more identified authentication means is not the same person, the identity authentication module 150 may determine that the authentication of the identity has failed, and if the identified two or more identity authentication means are the same person The identity authentication module 150 can perform non-face-to-face authentication based on at least one of the two or more identity authentication means identified.

In another embodiment, the digital image may be an image of a user's face, an identification card, or an image of a unique authenticating object and an occupancy checking object taken together.

Here, the object to be occupied confirmation may mean various objects or devices that need to be confirmed that the user of the portable terminal is occupied (i.e., possessed). For example, when the user of the portable terminal desires to sell a used article, it is necessary to confirm that the user of the portable terminal occupies a used article. Therefore, in this case, the used goods may be an object to be occupied. For example, the digital image may be a financial transaction book or financial account confirmation and a single image of the object to be verified. According to the present embodiment, since the digital image may be an image obtained by photographing both the means for authenticating the user and the object to be occupied, the reliability of the possession of the owner of the portable terminal is strengthened.

FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.

Referring to FIG. 4, the portable terminal 200 captures an ID image P (S200) and transmits it to the validity verification system 100 of the digital image (S210).

Then, the digital image validation system 100 may extract the first verification information, which is at least a part of the metadata included in the received ID image (S220).

The first verification information may include location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, and / or time information when the digital image was photographed.

Accordingly, the digital image validation system 100 may extract positional information VP1 of a place where the digital image is photographed, identification information VI1 of a device that photographed the digital image from metadata included in the received ID image, , And / or time information (VT1) from which the digital image was photographed.

Meanwhile, the digital image validation system 100 may correspond to the first verification information, and may acquire second verification information corresponding to the portable terminal.

More specifically, the digital image validation system 100 may obtain the time information VT2 of the portable terminal 200 transmitting the ID picture (S230). The digital image validation system 100 may receive the location information of the portable terminal from the portable terminal 200 or the mobile communication company 300 to which the portable terminal 200 has subscribed in step S231, The identification information of the portable terminal can be received from the portable terminal 200 or the mobile communication company system 300 to which the portable terminal 200 has subscribed in step S232.

Then, the digital image validation system 100 determines whether the location VP1 of the location where the digital image was captured and the location VP2 of the portable terminal satisfy a predetermined location condition, (VT1) at which the digital image is photographed and a time (VT2) at which the digital image was received from the portable terminal, the method comprising: determining whether the photographed apparatus identification information (VI1) (Step S240). In step S240, the validity of the ID picture is verified.

If the digital image validation system 100 determines that the ID image is valid, the digital image validation system 100 may perform the non-face-to-face authentication based on the ID image (S250).

Meanwhile, the digital image validity verification system 100 according to the technical idea of the present invention is not limited to the non-face-person self-certification, and the digital image validity verification system 100 according to the technical idea of the present invention is not limited thereto. And can be employed in various services or systems that need to prevent counterfeiting or forgery. For example, a system of an automobile insurance company that provides a service that checks the mileage or black box installation and provides discounts on insurance premiums, or even if you do not have the goods to be sold at the time of sale of the used goods, A digital image validation system 100 according to the technical idea of the present invention can be applied to a used goods trading system for preventing a case in which the user himself pretends to possess the object.

Meanwhile, according to an embodiment, the digital image validation system 100 may include a processor and a memory for storing a program executed by the processor. The processor may include a single-core CPU or a multi-core CPU. The memory may include high speed random access memory and may include non-volatile memory such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state memory devices. Access to the memory by the processor and other components can be controlled by the memory controller. Here, when the program is executed by a processor, the program may cause the digital image validation system 100 according to the present embodiment to perform the above-described digital image validity verification method.

Meanwhile, the authentication method according to the embodiment of the present invention can be implemented in a computer-readable program command form and stored in a computer-readable recording medium. The control program and the target program according to the embodiment of the present invention And can be stored in a computer-readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.

Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of software.

Examples of the computer-readable recording medium include magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as CD-ROM and DVD, a floptical disk, And hardware devices that are specially configured to store and execute program instructions such as magneto-optical media and ROM, RAM, flash memory, and the like. The above-mentioned medium may also be a transmission medium such as a light or metal wire, wave guide, etc., including a carrier wave for transmitting a signal designating a program command, a data structure and the like. The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner.

Examples of program instructions include machine language code such as those produced by a compiler, as well as devices for processing information electronically using an interpreter or the like, for example, a high-level language code that can be executed by a computer.

The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.

It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.

It is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. .

Claims (22)

An image receiving module for receiving a digital image photographed by a portable terminal;
An extraction module for extracting first verification information included in the received digital image;
An acquiring module corresponding to the first verification information and acquiring second verification information corresponding to the portable terminal; And
And a verification module for comparing the first verification information and the second verification information to verify the validity of the digital image.
The method according to claim 1,
Wherein the extraction module comprises:
And extracting at least a part of the metadata included in the digital image as the first verification information.
The method according to claim 1,
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
Wherein when the first verification information includes location information of a place where the digital image is photographed, the second verification information includes location information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information indicating that the digital image was received from the portable terminal when the first verification information includes time information on the digital image.
The method of claim 3,
The acquisition module,
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes the location information of the place where the digital image is photographed,
Wherein the first verification information includes identification information of a device that has photographed the digital image, a validity verification system for digital image that receives the identification information of the portable terminal from the mobile terminal or the mobile communication company subscription system of the portable terminal .
The method of claim 3,
Wherein the verification module comprises:
Determining whether a position of the place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed,
Determining whether the identification information of the device that has photographed the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image,
Wherein the first verification information includes time information on the time when the digital image is captured and a digital value that determines whether a time when the digital image was captured and a time when the digital image was received from the portable terminal satisfies a predetermined time condition, Image validation system.
The method according to claim 1,
Wherein the digital image is any one of a facial image of the user of the portable terminal photographed by the portable terminal, an ID image, an image of a unique authenticated object, or an image of an object to be occupied, Validation system.
The method according to claim 6,
Wherein the digital image validation system comprises:
And a personal authentication module for performing non-face-to-face authentication based on the digital image.
The method according to claim 1,
Wherein the digital image is an image obtained by photographing at least two of face, ID, and unique authentication objects of the user of the portable terminal in the portable terminal.
The method according to claim 1,
Wherein the digital image is an image obtained by taking a face, an identification card or a unique authentication object of the user of the mobile terminal together with an object to be occupied by the portable terminal.
The method according to claim 1,
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
Wherein the digital image validation system comprises:
And a decryption module for decrypting the metadata using a decryption method corresponding to the encryption method,
Wherein the extraction module comprises:
And extracting the first verification information from the decrypted metadata.
An image receiving step of receiving a digital image photographed by a portable terminal;
An extraction step of extracting first verification information which is at least a part of metadata received from the received digital image;
An acquiring step of acquiring second verification information corresponding to the first verification information and corresponding to the portable terminal; And
And verifying the validity of the digital image by comparing the first verification information and the second verification information.
12. The method of claim 11,
Wherein the extracting step comprises:
And extracting at least a part of the metadata included in the digital image as the first verification information.
12. The method of claim 11,
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
Wherein when the first verification information includes location information of a place where the digital image is photographed, the second verification information includes location information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information of receiving the digital image from the portable terminal when the first verification information includes time information on the digital image taken.
14. The method of claim 13,
The acquiring step includes:
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes location information of a place where the digital image is photographed,
And receiving the identification information of the portable terminal from a mobile communication company system subscribed to by the portable terminal or the portable terminal when the first verification information includes identification information of the device that photographed the digital image, .
14. The method of claim 13,
Wherein the verifying step comprises:
Determining whether a position of a place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed;
Determining whether the identification information of the device that captured the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image; And
Determining whether the time at which the digital image was captured and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the first verification information includes time information of the digital image taken; The method comprising the steps of:
12. The method of claim 11,
Wherein the digital image is any one of a facial image of the user of the portable terminal photographed by the portable terminal, an ID image, an image of a unique authenticating object, or an image of an object to be occupied, Validation system.
17. The method of claim 16,
A method of validating a digital image,
And authenticating the non-face person based on the digital image.
12. The method of claim 11,
Wherein the digital image is an image obtained by photographing at least two of face, ID, and unique authentication objects of the user of the portable terminal in the portable terminal.
12. The method of claim 11,
Wherein the digital image is an image obtained by photographing the face of the user of the portable terminal, the identification card, or a unique authentication object and an object to be occupied, together in the portable terminal.
12. The method of claim 11,
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
A method of validating a digital image,
Further comprising a decoding step of decoding the metadata by a decoding method corresponding to the encryption method,
Wherein the extracting step comprises:
And extracting the first verification information from the decrypted metadata.
A computer program installed in a data processing apparatus and stored in a recording medium for performing the method according to any one of claims 11 to 20.
A digital image validation system comprising:
A processor;
A memory storing a program,
Wherein the program, when executed by the processor, causes the validation system of the digital image to perform the method of any one of claims 11 to 20. < Desc / Clms Page number 18 >
KR1020150098882A 2015-06-26 2015-07-13 System and method for verifying validity of digital image taken by mobile terminal KR20170001924A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020150091172 2015-06-26
KR20150091172 2015-06-26

Publications (1)

Publication Number Publication Date
KR20170001924A true KR20170001924A (en) 2017-01-05

Family

ID=57541967

Family Applications (8)

Application Number Title Priority Date Filing Date
KR1020150098881A KR101703712B1 (en) 2015-06-26 2015-07-13 System and method for verifying validity of digital image taken by mobile terminal
KR1020150098882A KR20170001924A (en) 2015-06-26 2015-07-13 System and method for verifying validity of digital image taken by mobile terminal
KR1020150103231A KR20170001925A (en) 2015-06-26 2015-07-21 System and method for certification using image
KR1020150103230A KR101674950B1 (en) 2015-06-26 2015-07-21 System and method for certification using digital image
KR1020150110548A KR101703713B1 (en) 2015-06-26 2015-08-05 Method for certification using digital image, application system, and authentication system thereof
KR1020150110549A KR20170001927A (en) 2015-06-26 2015-08-05 Method for certification using digital image, application system, and authentication system thereof
KR1020150125089A KR20170001928A (en) 2015-06-26 2015-09-03 Method for certification using digital image, application system, and authentication system thereof
KR1020150128535A KR101703714B1 (en) 2015-06-26 2015-09-10 Method for certification using digital image, application system, and authentication system thereof

Family Applications Before (1)

Application Number Title Priority Date Filing Date
KR1020150098881A KR101703712B1 (en) 2015-06-26 2015-07-13 System and method for verifying validity of digital image taken by mobile terminal

Family Applications After (6)

Application Number Title Priority Date Filing Date
KR1020150103231A KR20170001925A (en) 2015-06-26 2015-07-21 System and method for certification using image
KR1020150103230A KR101674950B1 (en) 2015-06-26 2015-07-21 System and method for certification using digital image
KR1020150110548A KR101703713B1 (en) 2015-06-26 2015-08-05 Method for certification using digital image, application system, and authentication system thereof
KR1020150110549A KR20170001927A (en) 2015-06-26 2015-08-05 Method for certification using digital image, application system, and authentication system thereof
KR1020150125089A KR20170001928A (en) 2015-06-26 2015-09-03 Method for certification using digital image, application system, and authentication system thereof
KR1020150128535A KR101703714B1 (en) 2015-06-26 2015-09-10 Method for certification using digital image, application system, and authentication system thereof

Country Status (1)

Country Link
KR (8) KR101703712B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20220036660A (en) 2020-09-16 2022-03-23 중소기업은행 Service providing apparatus and method for verification of identification card image

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038589B (en) * 2016-12-14 2019-02-22 阿里巴巴集团控股有限公司 A kind of entity information verification method and device
WO2019107578A1 (en) * 2017-11-28 2019-06-06 조민환 Relay device, terminal device, and remote control method for relay device and terminal device
KR102126652B1 (en) * 2018-01-29 2020-06-25 박길주 Image certificating system for anti-hacking and method of the same
KR101930361B1 (en) * 2018-08-27 2019-03-11 황규리 A method for delivering goods using a mobile application and a computer readable recording medium on which the program is recorded
KR102565422B1 (en) * 2018-10-19 2023-08-09 라인 가부시키가이샤 Method, computer apparatus, and computer program for providing authentication data
KR102221673B1 (en) 2018-10-31 2021-03-02 순천향대학교 산학협력단 Self-authenication service using abstaction image based on user experience and operating method thereof
WO2021022204A1 (en) * 2019-07-31 2021-02-04 Iigc, Inc. Image-based authorization and transmission of stored value or sim cards
KR20210036039A (en) * 2019-09-25 2021-04-02 삼성전자주식회사 Electronic device and image processing method thereof
CN111079573A (en) * 2019-11-29 2020-04-28 童勤业 Anti-counterfeiting encryption method based on image random scrambling technology
KR102430793B1 (en) * 2020-07-23 2022-08-09 인비즈넷 주식회사 Method and system for adult authenticating
KR102566403B1 (en) * 2020-11-05 2023-08-11 주식회사 리얼셀러 System and method for seccondhand product dealing and computer program for the same
KR102447110B1 (en) * 2020-12-09 2022-09-26 주식회사 이엠엘 System for after-service brokerage service and method for providing after-service brokerage service
KR102623067B1 (en) * 2022-09-15 2024-01-10 주식회사 페이히어 Method for providing non-face-to-face card merchant subscription service and system therefor

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100517441B1 (en) 2003-07-16 2005-09-27 양기철 Method for portrait mutual certification and computer readable record medium on which program therefor is recorded
KR20120037330A (en) * 2010-10-11 2012-04-19 (주) 나무인터넷 Log-in method and system using image objects
KR20140020337A (en) * 2014-01-10 2014-02-18 주식회사 씽크풀 Method for authentication using user apparatus, digital system, and authentication system thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20220036660A (en) 2020-09-16 2022-03-23 중소기업은행 Service providing apparatus and method for verification of identification card image

Also Published As

Publication number Publication date
KR20170001926A (en) 2017-01-05
KR20170001927A (en) 2017-01-05
KR20170001928A (en) 2017-01-05
KR101703714B1 (en) 2017-02-08
KR101703712B1 (en) 2017-02-08
KR101703713B1 (en) 2017-02-08
KR20170001925A (en) 2017-01-05
KR20170001923A (en) 2017-01-05
KR20170001929A (en) 2017-01-05
KR101674950B1 (en) 2016-11-23

Similar Documents

Publication Publication Date Title
KR101703712B1 (en) System and method for verifying validity of digital image taken by mobile terminal
US11562363B2 (en) Hardware and token based user authentication
JP7240030B2 (en) Identity authentication method, device and server
US10320807B2 (en) Systems and methods relating to the authenticity and verification of photographic identity documents
US20220417739A1 (en) Secure data communication
ES2811249T3 (en) Systems and methods for sharing verified identity documents
JP2023062065A (en) Using contactless card to securely share personal data stored in blockchain
US10990776B2 (en) Methods and devices for biometric verification
KR20170001864A (en) System and method for verifying validity of digital image
US20160196509A1 (en) Ticket authorisation
KR101748136B1 (en) Method for certification using digital image, application system, and authentication system thereof
JP2005063077A (en) Method and device for personal authentication and connector
US20200005306A1 (en) Method for carrying out a transaction, corresponding terminal, server and computer program
JP2008103949A (en) Signature authentication terminal, signature authentication system, signature confirmation system, signature authentication program, signature confirmation program, signature authentication method, and signature confirmation method
KR20170018127A (en) Method for certification using digital image, application system, and authentication system thereof
WO2010140191A1 (en) Information communication network
JP7190081B1 (en) Authentication system, authentication method, and program
KR20170121737A (en) Method for Providing Non-Facing Certification by using Camera
WO2023038734A1 (en) Image authentication
JP2022143810A (en) Information processing program, information processing method, and information processing apparatus
TWM592132U (en) Online registration system