WO2018233487A1 - Procédé d'authentification d'identité, terminal et support de stockage - Google Patents

Procédé d'authentification d'identité, terminal et support de stockage Download PDF

Info

Publication number
WO2018233487A1
WO2018233487A1 PCT/CN2018/090082 CN2018090082W WO2018233487A1 WO 2018233487 A1 WO2018233487 A1 WO 2018233487A1 CN 2018090082 W CN2018090082 W CN 2018090082W WO 2018233487 A1 WO2018233487 A1 WO 2018233487A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
verification
video
verification information
image
Prior art date
Application number
PCT/CN2018/090082
Other languages
English (en)
Chinese (zh)
Inventor
潘福霞
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018233487A1 publication Critical patent/WO2018233487A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition

Definitions

  • the present application belongs to the field of information processing technologies, and in particular, to an identity authentication method, a terminal, and a storage medium.
  • online authentication can be implemented through an APP (application) provided by an enterprise or a public institution.
  • APP application
  • the method of authenticating through the APP requires an APP to be installed, which reduces the convenience of the user operation, and the APP Increased costs when promoting.
  • the embodiment of the present application provides an identity authentication method, a terminal, and a storage medium, which are designed to solve the problem that the authentication accuracy of the live authentication technology is easily solved by the online authentication method, and the cost increase caused by the APP authentication. .
  • the identity of the user is verified based on the image data.
  • a terminal provided by an embodiment of the present application includes a processor and a memory, where the memory stores instructions executable by the processor, and when the instruction is executed, the processor is configured to:
  • the identity of the user is verified based on the image data.
  • the embodiment of the present application further provides a computer readable storage medium storing computer readable instructions, which can cause at least one processor to perform the method as described above.
  • 1a is a schematic structural diagram of an identity authentication system according to an embodiment of the present application.
  • FIG. 1b is a schematic flowchart of an identity authentication method according to a first embodiment of the present application
  • FIG. 2 is a schematic diagram of a prompt interface for recording a video in an embodiment of the present application
  • FIG. 3 is a schematic flowchart of an identity authentication method according to a second embodiment of the present application.
  • FIG. 4 is a schematic diagram of an interface for a user to take a front photo of an identity document and prepare for uploading in the embodiment of the present application;
  • FIG. 5 is a schematic diagram of an interface for successfully uploading both the front photo and the reverse photo of the identity card in the embodiment of the present application;
  • FIG. 6 is a schematic diagram of a recording interface when a user reads a verification message in an embodiment of the present application
  • FIG. 7 is a schematic structural diagram of an identity authentication apparatus according to a third embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of an identity authentication apparatus according to a fourth embodiment of the present disclosure
  • FIG. 9 is a structural diagram of a terminal hardware for performing an identity authentication method in the present application.
  • the living body verification technology used requires a simple action of fixing the human body, and the action set is single and limited in number, and is easy to be solved by means of portrait modeling, thereby reducing the accuracy of living body detection, thereby reducing the identity.
  • the accuracy of the certification is a simple action of fixing the human body, and the action set is single and limited in number, and is easy to be solved by means of portrait modeling, thereby reducing the accuracy of living body detection, thereby reducing the identity. The accuracy of the certification.
  • FIG. 1 is a schematic structural diagram of an identity authentication system according to an embodiment of the present application.
  • the identity authentication system 100 includes a server 110, a terminal 120, and a user 130.
  • the server 110 includes a database 111 for storing authentication photos, a database 112 for storing verification information, a live verification engine 113, and an image comparison engine 114.
  • the user 130 uploads the ID card photo in the page of the public service platform displayed by the terminal 120, and identifies the identity information in the ID card photo. After the identity information is identified, the user identity is verified from the storage identity according to the identity information.
  • the photo database 111 such as the Public Security Bureau's document library, extracts the user's authentication photo.
  • the terminal 120 obtains a randomly generated verification code from the database 112 storing the verification information, and prompts the user to record a video that reads the verification code on the page, uploads the video to the living body verification engine 113, and performs in-vivo verification on the user.
  • the user image in the video is compared with the user's authentication photo uploading image comparison engine 114 extracted from the public security bureau document library to identify the user image. Whether the person in the identity and the person in the identity photo of the user are the same person, if the same person receives the notification message confirming the identity of the user from the image matching engine 114, thereby completing the online real-name authentication of the user.
  • FIG. 1b is a schematic flowchart of an identity authentication method according to a first embodiment of the present application.
  • the identity authentication method may be applied to a terminal, where the terminal includes a mobile phone, a tablet computer, an intelligent authentication terminal, and the like, and has a video recording function.
  • a terminal for network communication functions. The method includes:
  • S101 Receive verification information required for recording a video from a server, and output verification information on a client page.
  • the identity authentication of the user is performed on the client page.
  • the client page is a page of a public service platform, such as an authentication page of a WeChat public number, and the WeChat public number is an enterprise that requires the user to perform identity verification. Public number opened by business, state agencies, etc.
  • the client page is the authentication page of the bank's WeChat public account.
  • the client page is built using HTML5 (Hypertext Markup Language Fifth Edition, h5 for short) technology. With h5 technology, simple information collection can be done at the front end, and other complex authentication processes can be completed by calling other modules in the background. Compared with the authentication, it is necessary to download the APP developed by each certification department, which is easy to operate and low in cost.
  • the verification information is output.
  • the verification information can be randomly generated by the background server, and the client immediately pulls it to the local and outputs the information.
  • the verification information can also be extracted from the background server and stored in the terminal locally, and then output by the client.
  • the verification information is unique, and the specific form may be a verification code composed of a plurality of digits, for example, 5869; or a verification block composed of a plurality of Chinese characters, for example, Teng Shenheng. Since the verification information is randomly generated, non-repetitive, and unique, it is not easy to crack the verification information in a modeling or traversing manner, and the security is strong.
  • the recording method is prompted on the client page, as shown in FIG. 2, which is a client that registers the entire electronic system of the enterprise, and displays “Please use the front camera to record on the client page.
  • the video recording rule can be output on the client page at the same time.
  • the video recording rule may be displayed when the user clicks the button that triggers the recording; or the button that triggers the display of the video recording rule is set on the client page, and the video recording rule is displayed when the user clicks the button.
  • the video recording rules include: the specification of the facial motion when the user records the video, the specification of the facial image of the user, the regulation of the recording environment, the speech rate, the intonation, and the language of the user to read the verification information.
  • the facial motion includes an eye movement that blinks when the verification information is read, and a clear lip motion is made.
  • the apparent lip motion refers to the visibility of the lip motion, which enables the living body to be verified. It is accurately determined that the user is a living body, and the lip shape read from the reading can recognize the verification information read by the user.
  • the specification of the user's face image includes: the face image is complete, and the proportion of the face occupied by the face, for example, the face occupies 3/4 of the screen.
  • the requirements for the recording environment include: the light is appropriate, avoiding too strong or too weak; the environment is quiet, avoiding lens shake.
  • the rules for the speed, intonation, and language of the user's reading of the verification information include: uniform speed, reading aloud, reading in Mandarin, and the like.
  • Outputting the video recording rule while outputting the verification information on the client page can help the user to record the qualified video as soon as possible, and improve the speed and accuracy of the authenticated user identity.
  • the client After the user uploads the video, the client obtains a video recorded by the user on the client page to read the verification information, and the video includes image data of the facial action specified by the video recording rule that the user performs when reading the verification information.
  • the video contains facial actions that are specified by the user, such as blinking, lip movements, and the like.
  • the video also includes audio data that the user reads the verification information, and the audio data can be used to detect whether the verification information read by the user is the same as the verification information output on the client page and required to be read by the user, and is used to detect the Whether the image in the video is alive.
  • In-vivo verification refers to the technique of verifying whether the user image in the video is an objective living entity (real person). To prevent the user image in the video as a static photo, or a 3D modeled character model, usually used to confirm the identity of the target person.
  • a facial motion that conforms to the video recording rule is identified from the image data; and the user image in the video is verified in vivo according to the facial motion. That is, according to the user's facial motion in the video recorded by the user, specifically blinking or lip motion, to verify whether the user image in the video is a living body.
  • the user identity authentication is successful, that is, the user real name authentication is successful.
  • the video recorded by the user is obtained on the client page, and the user in the video is verified in vivo, and after the verification by the living body, the identity of the user is verified according to the image data in the video, and after the identity verification, Confirm that the user identity authentication is successful, which has the following technical effects:
  • identity authentication is performed on the client webpage, which is easy to operate and low in cost.
  • a dual verification scheme based on video recognition for live verification and image recognition based authentication is proposed, which solves the problem that the user does not carry an ID card or carry an ID card in a service that needs to be authenticated.
  • ID card photo files and user self-portrait video files accumulated in various services provide traceable clues in security scenarios such as combating illegal identity fraud.
  • FIG. 3 is a method for authenticating an identity according to a second embodiment of the present application, which may be applied to a terminal, where the method includes:
  • S201 Collect, in the client page, the identity information of the identity file uploaded by the user, and after determining that the identity information is recognized, the identity verification photo corresponding to the identity information is retrieved from the server;
  • the identity authentication of the user is completed on the client page, and the page is produced by using HTML5 technology.
  • the client page may be an authentication page of a WeChat public number, and the WeChat public number is a public number opened by an enterprise or a state agency that requires the user to perform identity verification.
  • the client page is the authentication page of the bank's WeChat public account.
  • the user is prompted to upload a photo of the identity document, and identify the name, the ID number, the issuing authority, and the textual information of the validity period of the ID file uploaded by the user, specifically, optical character recognition (OCR) (Optical Character Recognition) technology, directly convert the text of the scanned copy of the user's ID or the text on the photo into text, thereby obtaining the text information such as the name, ID number, issuing authority and validity period of the ID card.
  • OCR optical character recognition
  • the consistency check is performed according to the name and the ID number, that is, whether the verification name and the ID number correspond to each other; according to the legality verification by the issuing authority, that is, whether the issuing authority is a legal authority;
  • the validity period of the certificate is verified, that is, after the consistency check, the legality check, and the validity check are passed, the authentication photo corresponding to the ID number is retrieved from the server (such as the designated platform).
  • the authentication photo is a photo provided by the department with identification authority to verify the identity of the user.
  • the authentication photo is a personal photo uploaded by the natural person when the identity document is processed, and the photo is the same as the photo of the identity document.
  • the designated platform may specifically be a server or database for storing the authentication photos collected by the public security organ. Further, if the consistency check, the legality check, and one or both of the validity check fail the verification, the identification failure is prompted.
  • the user is prompted to upload a positive photo of the ID card, and the user takes a picture of the front side of the ID card and uploads it, as shown in FIG. 4 .
  • the user is prompted to upload the reverse photo of the ID card, and the certificate of the reverse photo is recognized by the OCR module.
  • the user is prompted to upload the ID card photo successfully, and the identified information is displayed, prompting the user to confirm whether the information is correct. If not, re-uploading the front photo of the ID card corresponding to the error message and/or The reverse photo, or, manually enter the above ID information.
  • the specific display interface is shown in Figure 5.
  • S202 Receive verification information required for recording a video from a server, and output verification information on a client page.
  • the verification information is obtained, and the verification information is output.
  • the verification information can be randomly generated by the background server, and the client immediately pulls it to the local and outputs the information.
  • the verification information can also be extracted from the background server and stored in the terminal locally, and directly output by the client.
  • the verification information is unique, and the specific form may be a verification code composed of a plurality of digits; or may be a verification block composed of a plurality of Chinese characters. Since the verification information is randomly generated, non-repetitive, and unique, it is not easy to crack the verification information in a modeling or traversing manner, and the security is strong.
  • the video recording rule is simultaneously output on the client page.
  • the video recording rules include: the specification of the facial motion when the user records the video, the specification of the facial image of the user, the regulation of the recording environment, the speech rate, the intonation, and the language of the user to read the verification information. Output video recording rules to help users record qualified videos as quickly as possible, improving the speed and accuracy of authenticating users.
  • the facial motion includes blinking and making a clear lip motion when reading the verification information.
  • the obvious lip motion means that the lip movement is so obvious that the user can accurately determine the user during the verification of the living body. It is a living body, and the lip shape that is read aloud can recognize the verification information read by the user.
  • the specification of the user's face image includes: the face image is complete, and the proportion of the face occupied by the face, for example, the face occupies 3/4 of the screen.
  • the requirements for the recording environment include: the light is appropriate, avoiding too strong or too weak; the environment is quiet, avoiding lens shake.
  • the rules for the speed, intonation, and language of the user's reading of the verification information include: uniform speed, reading aloud, reading in Mandarin, and the like.
  • FIG. 6 is a schematic diagram of a recording interface when a user reads a verification message in an embodiment of the present application. As shown in FIG. 6, during the video recording process, the camera of the terminal is called to record, and the time required for recording and the recording progress time are prompted.
  • the video recording rule is used to detect whether the video recorded by the user meets the specifications. If not, the user is prompted to record the video that has not passed the review, and the video recording rule is output again for the user to view and record the video again. The probability of a user recording a qualified video can be further improved.
  • the client After the video recorded by the user passes the audit, the client obtains a video recorded by the user on the client page to read the verification information, and the video includes the facial action specified by the video recording rule when the user reads the verification information.
  • Image data After the video recorded by the user passes the audit, the client obtains a video recorded by the user on the client page to read the verification information, and the video includes the facial action specified by the video recording rule when the user reads the verification information.
  • the length of the video is the duration specified by the system, for example, 3-6 seconds.
  • the specified duration can further improve the accuracy of the user's biometric verification.
  • the video contains facial actions that are specified by the user, such as blinking, lip movements, and the like.
  • the video includes audio data that the user reads the verification information, and the audio data can be used to detect whether the verification information read by the user is the same as the verification information that is output on the client page and requires the user to read aloud.
  • the living body verification engine in the background is called, and the lip action and the eye action of the face are acquired according to the facial action, and further, the facial features of the face can be acquired.
  • the lip action it is determined whether the verification information read by the user and the output verification information are consistent, that is, whether the verification information read by the user image in the video is correct. More specifically, determining a lip shape change feature when the user reads a plurality of characters in the verification information, and matching the lip shape change feature with the preset lip shape feature, for example, when the matching degree reaches a preset value, for example, reaching 70%, Then, it is confirmed that the verification information read by the user is consistent with the verification information output.
  • the characters may include one or more of a number, a foreign language letter, and a Chinese character.
  • the output verification information is selected from a living body verification database corresponding to the living body verification engine, and the characters in the lip verification action are read in the living body verification database, so that the set verification information includes a plurality of characters.
  • the lip feature distinguishing degree of each character reaches a preset standard, and the preset standard means that the characters that are read aloud can be accurately distinguished according to the lip shape, so as to complete the living body verification.
  • the preset lip features are also stored in the biometric verification database corresponding to the biometric verification engine.
  • the lip feature is stored in the biometric verification database in the form of an image.
  • the lip matching is performed, the lip image of each character is captured in the video of the reading verification information recorded by the user, and each lip is respectively The shape image is matched with the image of the corresponding lip feature in the living body verification database, the matching degree of each lip image is calculated, and the matching degree of each lip image is weighted and summed to obtain a user's reading.
  • the matching degree of the verification information and the output verification information is consistent.
  • the eye motion of the facial is acquired; according to the eye motion, whether the user makes an eye motion that meets the requirements of the video recording rule; if the user makes an eye that meets the requirements of the video recording rule For the part action, confirm the verification by the living body.
  • the change feature of the pupil is matched with the pupil change feature included in the preset blink action, and when the matching degree reaches the preset value, the user is confirmed to comply with the video recording rule. Blinking action.
  • the preset value is generally 70%, and may be other values, which are not limited herein.
  • the image of the eye that is obtained is an image without a pupil
  • the moment of opening the eye is an image with a pupil
  • the pupil change features included in the blink action are matched to confirm whether the user has made a blink action that meets the video recording rules.
  • the preset living body feature information is stored in the living body verification database as standard information for confirming that the image in the video is a living body. If the verification information read by the user is consistent with the output verification information, and the user makes a blinking action that complies with the video recording rule, the confirmation is confirmed by the living body. Further, it is also possible to confirm the verification by the living body when the acquired facial features, eye movements, and lip movements are all consistent with the preset living body characteristic information.
  • the audio data of the reading verification information in the video may be combined, and the lip action is used to jointly determine whether the verification information read by the user and the output verification information are consistent, that is, the user is judged to read aloud according to the audio data. Whether the verification information and the output verification information are consistent, and whether the verification information read by the user and the output verification information are consistent according to the lip action, and the determination results are the same, then the verification of the user's reading is confirmed. The information and the output verification information are consistent, and the accuracy of determining the consistency is further increased.
  • the living body verification in this embodiment is simpler than the prior art, such as fixing a limited nod, shaking head, looking left, and looking to the right, resulting in a single and limited number of actions, which is easy to be modeled by portrait.
  • the living body verification method in this embodiment can effectively improve the verification accuracy, and at the same time ensure that the user image in the video is the verification pass rate when the real person is recorded, and the labor cost is greatly reduced.
  • the authentication subject is an elderly person, a minor, a patient, or other group that is not suitable for strong interactive recording of video.
  • the embodiment of the present application adopts only voice, blinking, and lip-moving methods. It is simple and convenient to verify the recording of the video. Users can complete the video recording in one time and with the help of other family members, which is convenient for the identity authentication of the above groups.
  • the image that the user reaches the preset definition is obtained from the image data, that is, a sufficiently clear image is captured in the video file, and the image is compared by calling the background image comparison engine.
  • the image of the preset definition is compared with the authentication photo retrieved from the specified platform, that is, the image taken from the video and the authentication photo are compared with a 1 to 1 picture.
  • a preset threshold it is determined that the person in the image is the same person as the person in the authentication photo. For example, when the degree of similarity reaches 70%, it is confirmed that the person in the image is the same person as the person in the authentication photo, that is, authenticated. Confirming the identity of the user based on the authentication photo provided by the official department with identity authority can further improve the accuracy of the user identity authentication.
  • step S201 After the user's identity is verified according to the image data, it is confirmed that the user identity authentication is successful, that is, the user real name authentication is successful. If the authentication fails, the user returns to the home page of the client page, and prompts the user to perform identity authentication again, that is, step S201 is performed.
  • the user identity authentication result is output on the client page to inform the user that the identity authentication succeeds or fails. It can improve the convenience of user operations and improve the user experience.
  • the system can be deployed in the cloud of the service provider, can be deployed on the client-side machine, or part of the system can be deployed in the cloud of the service provider, and another part can be deployed on the customer side, for example, a positive photo that will identify the user's identity document and
  • the OCR module of the reverse photo, the recording module for recording video, the biometric verification module for in-vivo verification of the video in the video are deployed in the cloud of the service provider, and the module for authenticating the photo to the designated platform, and 1 ratio 1
  • the picture matching module is deployed to the client side, and the client side may be the machine of the public security department.
  • the identity information collection can be completed at the front end, and the living body verification of the video in the video is completed by calling the live verification module in the background, and the photo is realized by calling a module that can obtain the identity verification photo.
  • Calling, by calling the 1 to 1 picture comparison module to achieve user authentication, can avoid the cost of developing and promoting the APP, the user can pay attention to the public number to complete the identity authentication on the public number page, and the operation is simple and cost-effective.
  • the video recorded by the user is obtained on the client page, and the user in the video is verified in vivo according to the facial action made by the user according to the rule, and after the verification by the living body, according to the video
  • the image data verifies the identity of the user, and after confirming the identity, the user identity authentication is successful, and the identity authentication is performed on the client webpage compared to various APPs specifically used for identity authentication, the operation is simple and the cost is low, and the living body is Verification requires the user to make the specified facial movements. Compared with the existing simple head movements, the accuracy of the living body verification can be effectively improved, and the user image in the video is verified as the verification pass rate of the real person recording, which greatly reduces the manual cost.
  • FIG. 7 is an identity authentication apparatus according to a third embodiment of the present application.
  • the device 300 can be built in a terminal.
  • the device 300 includes an output module 301, an acquisition video module 302, a biometric verification module 303, and an identity verification module 304.
  • the output module 301 is configured to receive verification information required for recording a video from a server, and output verification information on the client page;
  • the verification information can be randomly generated by the background server, and the client immediately pulls it to the local and outputs the information.
  • the verification information can also be extracted from the background server and stored in the terminal locally, and then output by the client.
  • the verification information is unique, and the specific form may be a verification code composed of a plurality of digits, or a verification block composed of a plurality of Chinese characters. Since the verification information is randomly generated, non-repetitive, and unique, it is not easy to crack the verification information in a modeling or traversing manner, and the security is strong.
  • the obtaining video module 302 is configured to obtain a video recorded by the user on the client page, where the video includes image data of the user reading the verification information;
  • the biometric verification module 303 is configured to perform biometric verification on the user image in the video according to the image data acquired by the acquisition video module 302.
  • the identity verification module 304 is configured to verify the identity of the user according to the image data acquired by the acquisition video module 302 after the biometric verification module 303 passes the biometric verification.
  • the device in the embodiment of the present application is used to perform the foregoing method in the embodiment of FIG. 1b, and the technical details not described are the same as those in the foregoing embodiment shown in FIG. 1b, and details are not described herein again.
  • FIG. 8 is an identity authentication apparatus according to a fourth embodiment of the present application.
  • the device 400 can be built in the terminal, and the device 400 shown in this embodiment is different from the device 300 shown in FIG. 7 in that:
  • the output module 301 is further configured to output a video recording rule on the client page
  • the biometric verification module 303 is further configured to: identify, from the image data, a facial motion that conforms to the video recording rule output by the output module 301; and perform a living verification on the user image in the video according to the facial motion.
  • the biometric verification module 303 may further include:
  • a first obtaining submodule 3031 configured to acquire a lip motion of the facial according to the facial motion
  • the determining sub-module 3032 is configured to determine, according to the lip action, whether the verification information read by the user and the output verification information are consistent;
  • the first confirmation sub-module 3033 is configured to confirm the verification by the living body if the determination sub-module 3032 determines that the verification information read by the user and the output verification information are identical.
  • the output verification information is a plurality of characters whose lip shape distinguishing degree reaches a preset standard when reading aloud
  • the determining sub-module 3032 is specifically configured to determine a lip shape change feature when the user reads a plurality of characters in the verification information; The lip shape change feature is matched with the preset lip shape feature; when the matching degree reaches the preset value, it is confirmed that the verification information read by the user is consistent with the output verification information.
  • the determining sub-module 3032 is specifically configured to: intercept a lip image of each character from the image data; respectively match each lip image with an image of the preset lip feature, and calculate each lip image.
  • the degree of matching is obtained by weighting and matching the matching degrees of the respective lip images, and obtaining the matching degree for determining the verification information of the user reading and the output verification information.
  • biometric verification module 303 can further include:
  • the first obtaining sub-module 3031 is configured to acquire an eye motion of the face according to the facial motion
  • the determining sub-module 3032 is configured to determine, according to the eye movement, whether the user makes an eye movement that meets the requirements of the video recording rule;
  • the first confirmation sub-module 3033 is configured to confirm the verification by the living body if the user makes an eye movement that meets the requirements of the video recording rule.
  • the determining sub-module 3032 is specifically configured to match the change feature of the pupil when the user reads the verification information, and match the pupil change feature included in the preset blink action, and when the matching degree reaches the preset value, confirm the The user makes a blinking action that complies with the video recording rules.
  • the video further includes the audio data of the user reading the verification information
  • the determining sub-module 3032 is further configured to determine, according to the audio data, whether the verification information read by the user and the output verification information are consistent, in the video.
  • User image for live verification is further configured to determine, according to the audio data, whether the verification information read by the user and the output verification information are consistent, in the video.
  • apparatus 400 further includes:
  • the collecting module 401 is configured to collect identity information of the identity file uploaded by the user in the client page, and determine that the identity information is identified.
  • apparatus 400 further includes:
  • the retrieving module 402 is configured to retrieve, from the server, an authentication photo corresponding to the identity information collected by the collection module 401.
  • the identity verification module 304 further includes:
  • the second obtaining sub-module 3041 is configured to obtain, from the image data, an image that the user reaches the preset definition.
  • the comparison sub-module 3042 is configured to compare the image that reaches the preset resolution with the identity verification photo obtained by the retrieval module 402;
  • the second confirmation sub-module 3043 is configured to confirm the identity verification when the similarity between the image reaching the preset resolution and the identity verification photo reaches a preset threshold.
  • the collecting module 401 is specifically configured to: in the client page, identify the name, the ID number, the issuing authority, and the text information of the validity period of the ID file uploaded by the user.
  • the apparatus 400 can further include:
  • the identity information verification module 403 is configured to perform consistency check according to the name and the ID number collected by the collection module 401, perform legality verification according to the issuing authority, and perform validity verification according to the validity period of the certificate;
  • the retrieving module 402 is further configured to: after the identity verification module 403 passes the consistency check, the validity check, and the validity check, retrieve the identity verification photo corresponding to the ID number from the server.
  • the video recorded by the user is obtained on the client page, and the user in the video is verified in vivo according to the facial action made by the user according to the rule, and after the verification by the living body, according to the video
  • the image data verifies the identity of the user, and after confirming the identity, the user identity authentication is successful, and the identity authentication is performed on the client webpage compared to various APPs specifically used for identity authentication, the operation is simple and the cost is low, and the living body is Verification requires the user to make the specified facial movements. Compared with the existing simple head movements, the accuracy of the living body verification can be effectively improved, and the user image in the video is verified as the verification pass rate of the real person recording, which greatly reduces the manual cost.
  • FIG. 9 is a schematic structural diagram of a terminal for performing identity authentication according to an embodiment of the present disclosure.
  • the input device 51, the output device 52, the processor 53, and the memory 54 are connected via a bus 55.
  • the input device 51 can be specifically a camera, a touch panel, a physical button or a mouse, and the like.
  • the output device 52 can specifically be a display screen.
  • the memory 54 may be a high speed random access memory (RAM) memory or a non-volatile memory such as a magnetic disk memory.
  • the memory 54 is for storing a set of executable program code
  • the processor 53 is coupled to the memory 54, and the input device 51, the output device 52, and the processor 53 are configured to perform the following operations through the executable program code stored in the memory 54:
  • the code is executed by the processor 53 to execute the identity authentication method as described in the foregoing embodiments shown in Figs. 1b and 3.
  • the disclosed methods and apparatus may be implemented in other manners.
  • the embodiment of the device described above is merely illustrative.
  • the division of the module is only a logical function division.
  • there may be another division manner for example, multiple modules or components may be combined. Or it can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication link shown or discussed may be an indirect coupling or communication link through some interface, device or module, and may be in an electrical, mechanical or other form.
  • each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist physically separately, or two or more modules may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules if implemented in the form of software functional modules and sold or used as separate products, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like.
  • the embodiment of the present application also discloses a storage medium in which a data processing program for executing any of the above embodiments of the present invention is stored.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Social Psychology (AREA)
  • Psychiatry (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Collating Specific Patterns (AREA)

Abstract

L'invention concerne un procédé d'authentification d'identité, un terminal et un support de stockage. Le procédé consiste à : recevoir, d'un serveur, les informations de vérification requises lors de l'enregistrement d'une vidéo, puis générer les informations de vérification sur une page de client ; acquérir la vidéo enregistrée par un utilisateur sur la page du client, la vidéo contenant les données d'image de l'utilisateur lisant les informations de vérification ; en fonction des données d'image, procéder à une vérification en direct sur une image d'utilisateur dans la vidéo ; et après que la vérification en direct a réussi, vérifier l'identité de l'utilisateur en fonction des données d'image.
PCT/CN2018/090082 2017-06-22 2018-06-06 Procédé d'authentification d'identité, terminal et support de stockage WO2018233487A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710479266.2A CN109117688A (zh) 2017-06-22 2017-06-22 身份认证方法、装置及移动终端
CN201710479266.2 2017-06-22

Publications (1)

Publication Number Publication Date
WO2018233487A1 true WO2018233487A1 (fr) 2018-12-27

Family

ID=64732728

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/090082 WO2018233487A1 (fr) 2017-06-22 2018-06-06 Procédé d'authentification d'identité, terminal et support de stockage

Country Status (2)

Country Link
CN (1) CN109117688A (fr)
WO (1) WO2018233487A1 (fr)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797807A (zh) * 2020-07-17 2020-10-20 熵基科技股份有限公司 一种兼顾体温测量和身份认证的融合识别方法和装置
EP3742699A1 (fr) * 2019-05-24 2020-11-25 Idemia Identity & Security France Procédé d'authentification forte d'un individu
CN112491840A (zh) * 2020-11-17 2021-03-12 平安养老保险股份有限公司 信息修改方法、装置、计算机设备及存储介质
CN113129024A (zh) * 2021-05-19 2021-07-16 中国银行股份有限公司 一种基于区块链的5g消息的智能理财方法及系统
CN113242551A (zh) * 2021-06-08 2021-08-10 中国银行股份有限公司 手机银行登录验证方法及装置
CN113256288A (zh) * 2021-06-08 2021-08-13 中国银行股份有限公司 银行卡解挂方法及装置
CN113449673A (zh) * 2021-07-09 2021-09-28 中国银行股份有限公司 一种证件识别核实方法和装置
CN113781050A (zh) * 2021-09-03 2021-12-10 中国银行股份有限公司 生物密码校验方法、装置、电子设备和存储介质
CN113780266A (zh) * 2021-09-18 2021-12-10 武汉众邦银行股份有限公司 一种h5实现身份证扫描识别ocr的方法、装置及存储介质
CN116938594A (zh) * 2023-09-08 2023-10-24 北京数盾信息科技有限公司 一种基于高速加密技术的多层次身份验证系统

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905401A (zh) * 2019-03-22 2019-06-18 深圳市元征科技股份有限公司 实名认证方法及终端、服务器
CN110223710A (zh) * 2019-04-18 2019-09-10 深圳壹账通智能科技有限公司 多重联合认证方法、装置、计算机装置及存储介质
CN112507889A (zh) * 2019-04-29 2021-03-16 众安信息技术服务有限公司 一种校验证件与持证人的方法及系统
CN110321791A (zh) * 2019-05-22 2019-10-11 深圳壹账通智能科技有限公司 基于人脸识别的人像数据设置方法、装置及存储介质
CN110213522B (zh) * 2019-05-27 2021-07-27 腾讯科技(深圳)有限公司 一种视频数据处理方法、装置以及相关设备
CN110472589A (zh) * 2019-08-19 2019-11-19 中国银行股份有限公司 一种行为认证的方法、装置及系统
CN110728244B (zh) * 2019-10-16 2022-06-14 蚂蚁胜信(上海)信息技术有限公司 豢养物身份信息采集的引导方法以及装置
CN112861094B (zh) * 2019-11-27 2024-09-20 北京京东振世信息技术有限公司 人机识别方法和装置
CN111784498A (zh) * 2020-06-22 2020-10-16 北京海益同展信息科技有限公司 身份认证方法、装置、电子设备及存储介质
CN111814732B (zh) * 2020-07-23 2024-02-09 度小满科技(北京)有限公司 一种身份验证方法及装置
CN111861456B (zh) * 2020-08-06 2023-08-22 中国银行股份有限公司 基于区块链的5g消息转账交易验证方法、系统及装置
CN111984951A (zh) * 2020-09-02 2020-11-24 深圳壹账通智能科技有限公司 页面可配置化管理方法、装置、计算机设备及存储介质
CN112288398A (zh) * 2020-10-29 2021-01-29 平安信托有限责任公司 面签验证方法、装置、计算机设备及存储介质
CN115037488B (zh) * 2021-02-23 2024-05-31 北京金山云网络技术有限公司 一种帐号的身份验证方法和装置
CN113792279A (zh) * 2021-09-15 2021-12-14 北京市商汤科技开发有限公司 一种身份验证方法、装置、系统、设备及存储介质
CN114389893A (zh) * 2022-01-22 2022-04-22 重庆长安汽车股份有限公司 一种活体视频处理的车辆实名认证系统、认证方法及汽车

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150199502A1 (en) * 2014-01-15 2015-07-16 Steve Y. Chen Image Authenticity Verification Using Speech
CN106529379A (zh) * 2015-09-15 2017-03-22 阿里巴巴集团控股有限公司 一种活体识别方法及设备
CN106557732A (zh) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 一种身份认证方法及系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040091136A1 (en) * 2002-11-13 2004-05-13 Dombrowski James Douglas Real-time biometric data extraction and comparison for self identification
CN105681316B (zh) * 2016-02-02 2019-12-17 腾讯科技(深圳)有限公司 身份验证方法和装置
CN106096519A (zh) * 2016-06-01 2016-11-09 腾讯科技(深圳)有限公司 活体鉴别方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150199502A1 (en) * 2014-01-15 2015-07-16 Steve Y. Chen Image Authenticity Verification Using Speech
CN106529379A (zh) * 2015-09-15 2017-03-22 阿里巴巴集团控股有限公司 一种活体识别方法及设备
CN106557732A (zh) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 一种身份认证方法及系统

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3742699A1 (fr) * 2019-05-24 2020-11-25 Idemia Identity & Security France Procédé d'authentification forte d'un individu
FR3096480A1 (fr) * 2019-05-24 2020-11-27 Idemia Identity & Security France Procédé d’authentification forte d’un individu
US11722306B2 (en) 2019-05-24 2023-08-08 Idemia Identity & Security France Method for strong authentication of an individual
CN111797807A (zh) * 2020-07-17 2020-10-20 熵基科技股份有限公司 一种兼顾体温测量和身份认证的融合识别方法和装置
CN112491840B (zh) * 2020-11-17 2023-07-07 平安养老保险股份有限公司 信息修改方法、装置、计算机设备及存储介质
CN112491840A (zh) * 2020-11-17 2021-03-12 平安养老保险股份有限公司 信息修改方法、装置、计算机设备及存储介质
CN113129024A (zh) * 2021-05-19 2021-07-16 中国银行股份有限公司 一种基于区块链的5g消息的智能理财方法及系统
CN113256288A (zh) * 2021-06-08 2021-08-13 中国银行股份有限公司 银行卡解挂方法及装置
CN113242551A (zh) * 2021-06-08 2021-08-10 中国银行股份有限公司 手机银行登录验证方法及装置
CN113256288B (zh) * 2021-06-08 2024-02-27 中国银行股份有限公司 银行卡解挂方法及装置
CN113449673A (zh) * 2021-07-09 2021-09-28 中国银行股份有限公司 一种证件识别核实方法和装置
CN113781050A (zh) * 2021-09-03 2021-12-10 中国银行股份有限公司 生物密码校验方法、装置、电子设备和存储介质
CN113780266A (zh) * 2021-09-18 2021-12-10 武汉众邦银行股份有限公司 一种h5实现身份证扫描识别ocr的方法、装置及存储介质
CN116938594A (zh) * 2023-09-08 2023-10-24 北京数盾信息科技有限公司 一种基于高速加密技术的多层次身份验证系统
CN116938594B (zh) * 2023-09-08 2024-03-22 数盾信息科技股份有限公司 一种基于高速加密技术的多层次身份验证系统

Also Published As

Publication number Publication date
CN109117688A (zh) 2019-01-01

Similar Documents

Publication Publication Date Title
WO2018233487A1 (fr) Procédé d'authentification d'identité, terminal et support de stockage
US10992666B2 (en) Identity verification method, terminal, and server
CN109359548B (zh) 多人脸识别监控方法及装置、电子设备及存储介质
CN112328999B (zh) 双录质检方法、装置、服务器及存储介质
CN106599772B (zh) 活体验证方法和装置及身份认证方法和装置
CN106850648B (zh) 身份验证方法、客户端和服务平台
US10839238B2 (en) Remote user identity validation with threshold-based matching
CN108804884B (zh) 身份认证的方法、装置及计算机存储介质
CN105681316B (zh) 身份验证方法和装置
WO2020019591A1 (fr) Procédé et dispositif utilisés pour la génération d'informations
CN108549848B (zh) 用于输出信息的方法和装置
CN108537030A (zh) 基于身份识别的管理方法、装置及电子设备
CN105117633B (zh) 人脸识别Windows系统登录验证系统
CN108229375B (zh) 用于检测人脸图像的方法和装置
CN110348193A (zh) 验证方法、装置、设备和存储介质
US20200218772A1 (en) Method and apparatus for dynamically identifying a user of an account for posting images
CN110322317A (zh) 一种交易数据处理方法、装置、电子设备及介质
US20240096051A1 (en) Determining whether a questionable video of a prominent individual is real or fake
WO2024178751A1 (fr) Procédé et appareil d'enregistrement de mariage, machine tout-en-un d'enregistrement autonome de mariage et support de stockage
US20230116291A1 (en) Image data processing method and apparatus, device, storage medium, and product
CN114240315A (zh) 一种基于云上稽查执法取证的方法及装置
CN113792279A (zh) 一种身份验证方法、装置、系统、设备及存储介质
JP2022117025A (ja) 本人確認方法、プログラム、及び情報システム
CN112949363A (zh) 一种人脸活体识别方法及装置
WO2023073838A1 (fr) Dispositif d'authentification, système d'authentification, procédé d'authentification et support non transitoire lisible par ordinateur

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18820789

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18820789

Country of ref document: EP

Kind code of ref document: A1