WO2019104930A1 - Procédé d'authentification d'identité, dispositif électronique et support d'enregistrement lisible par ordinateur - Google Patents

Procédé d'authentification d'identité, dispositif électronique et support d'enregistrement lisible par ordinateur Download PDF

Info

Publication number
WO2019104930A1
WO2019104930A1 PCT/CN2018/083075 CN2018083075W WO2019104930A1 WO 2019104930 A1 WO2019104930 A1 WO 2019104930A1 CN 2018083075 W CN2018083075 W CN 2018083075W WO 2019104930 A1 WO2019104930 A1 WO 2019104930A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
face
terminal
user
voiceprint
Prior art date
Application number
PCT/CN2018/083075
Other languages
English (en)
Chinese (zh)
Inventor
牛华
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019104930A1 publication Critical patent/WO2019104930A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation

Definitions

  • the present application relates to an authentication method, and in particular, to an identity authentication method, an electronic device, and a computer readable storage medium.
  • the purpose of the present application is to provide an identification method, an electronic device, and a computer readable storage medium, thereby further overcoming the problems existing in the prior art to some extent.
  • the application provides an identification method comprising the following steps:
  • Step 01 The second terminal acquires identity card information collected and sent by the first terminal.
  • Step 02 The second terminal verifies the validity of the identity card information, and if the verification passes, proceeds to step 03, and if the verification fails, the reminder returns to the first terminal to re-acquire;
  • Step 03 The second terminal performs face recognition verification on the user, and the face recognition verification performs the comparison verification by collecting the face image of the user and the photo of the ID card avatar. If the verification is passed, the operation proceeds to the next step. By reminding the user to re-create face recognition.
  • an electronic device including a memory and a processor for storing an identity authentication system executed by a processor, the identity authentication system comprising:
  • the ID card information collection module is used to collect the ID card information of the user, including the photo of the ID card and the ID card number, and perform de-texturing processing on the photo of the avatar.
  • the ID card verification module is used to verify the validity of the collected ID card, including whether the ID card validity period is verified and whether the ID card photo is consistent with the photo of the third party identity verification network.
  • the face recognition module includes a face collection sub-module, a face feature positioning sub-module, a face feature extraction sub-module, and a face feature similarity comparison sub-module, and the face collection sub-module is used to collect a photo of the living face of the user.
  • the face feature locating sub-module is used for locating the user's face feature part located in the acquisition frame, and the face feature extraction sub-module is used for feature extraction of the locating feature, and the face feature similarity comparison is used for the extracted person.
  • the face features are compared with the photos of the third-party verification network for similarity.
  • the present application also discloses a computer readable storage medium having an identity authentication system stored therein, the identity authentication system being executable by at least one processor to implement the following steps :
  • Step 01 The second terminal acquires identity card information collected and sent by the first terminal.
  • Step 02 The second terminal verifies the validity of the identity card information, and if the verification passes, proceeds to step 03, and if the verification fails, the reminder returns to the first terminal to re-acquire;
  • Step 03 The second terminal performs face recognition verification on the user, and the face recognition verification performs the comparison verification by collecting the face image of the user and the photo of the ID card avatar. If the verification is passed, the operation proceeds to the next step. By reminding the user to re-create face recognition.
  • the identification method provided by the present application avoids the use of the prior art by combining the third-party identity verification, the face recognition technology, and the voiceprint recognition multiple identification verification methods after collecting the user identification information.
  • the identity card of someone else or the counterfeiting of the customer to handle the business improves the accuracy and security of the user identity verification.
  • FIG. 1 shows a flow chart of an embodiment of the identity authentication method of the present application.
  • FIG. 2 shows a flow chart of still another embodiment of the identity authentication method of the present application.
  • FIG. 3 is a schematic diagram showing the program modules of an embodiment of the identity authentication system of the present application.
  • FIG. 4 is a schematic diagram showing a program module of still another embodiment of the identity authentication system of the present application.
  • FIG. 5 is a schematic diagram of a program module of still another embodiment of the identity authentication system of the present application.
  • FIG. 6 is a schematic diagram of a program module of still another embodiment of the identity authentication system of the present application.
  • FIG. 7 is a schematic diagram showing the hardware architecture of an embodiment of an electronic device of the present application.
  • an identification method including the following steps:
  • Step 01 The second terminal acquires the identity card information collected and sent by the first terminal.
  • the user sends a service request to the second terminal by using the first terminal, and after receiving the request, the second terminal sends an identity verification command to the first terminal, and after receiving the instruction, the first terminal starts the ID card identifier located at the first terminal.
  • the identification device scans the ID card to extract the avatar located on the ID card Photo, ID number information, and de-texturing the avatar photo, sending the processed photo and ID number information to the file server of the first terminal and forming an identification ID code for extracting the photo and information
  • the first terminal sends the identification ID code to the second terminal.
  • the first terminal is a client
  • the second terminal is a client.
  • step 02 the second terminal verifies the validity of the identity card information. If the verification succeeds, the process proceeds to step 03. If the verification fails, the first terminal re-acquires.
  • the second terminal obtains the user information corresponding to the ID card from the verification network through the interface connected with the third-party identity verification network, and obtains the ID information of the user site from the first terminal by using the ID code, and checks the online information through the third party.
  • the user identity information determines whether the user's ID card is within the validity period, and compares the photo of the user on the online check with the photo of the collected ID card avatar. If the similarity of the two photos exceeds the first threshold, the verification passes, if low At the first threshold, the verification fails, wherein the first threshold may be 70, and the first threshold may be obtained by statistical analysis of historical similarity values, wherein the third-party identity verification network may be public security network or authenticated by the Ministry of Public Security. Third-party identity information network.
  • Step 03 The second terminal performs face recognition verification on the user, and the face recognition verification performs the comparison verification by collecting the user face image and the ID card avatar photo. If the verification is passed, the next operation is performed, and if the verification is not performed, By reminding the user to re-create face recognition.
  • the second terminal After the ID card is verified, the second terminal starts the face recognition module to perform face recognition verification on the user, and the second terminal sends an instruction to start the Gao Paiyi to the first terminal. After receiving the instruction, the first terminal turns on the Gao Paiyi. And the user is prompted to perform text and voice operations on the first terminal interface, and the user performs the shooting of the live face image at the prompt. After the shooting is completed, the photo is transmitted back to the second terminal, and the face recognition module of the second terminal will The face image is compared with the third-party verification network user avatar. If the similarity between the two comparison results exceeds the second threshold, the verification is passed. If the similarity is lower than the second threshold, the verification fails. The second terminal reminds the user to perform the second face recognition verification. If the two terminals do not pass, the user is reminded to hold the valid ID to go to the counter for face-to-face check.
  • the second threshold may be obtained by statistical analysis of historical data. Preferably, the second threshold is 60.
  • the image acquisition of the face image includes: the second terminal sends an image acquisition instruction to the first terminal through the sip server, and the first terminal starts the high-speed image to perform image acquisition, and the high-speed device connects to the first terminal through the USB interface, and the agent sends the detection through the USB interface.
  • the device detects the sub-module to the user end, and the device detection sub-module detects the performance of the high-shooter in various states, including the high-shooter capable of starting the shooting control, whether the angle adjustment of the camera is flexible, and whether the picture transmission channel is turned on or the like. Adjust the shooting mode and shooting parameters of the Gao Paiyi, and display the above modes and parameters on the display interface of the agent.
  • the seat can set the above parameters as needed.
  • the seat can remotely control the Gao Paiyi to shoot in the night or day mode, as well as adjust the shooting angle of the camera of the Gao Paiyi, shooting pixels and other parameters.
  • the captured image is processed, the captured image is sent to the image processing module, the image is named and compressed, and the brightness, resolution, contrast and other parameters of the captured image are adjusted, and according to the preset
  • the compression ratio compresses the original image into a thumbnail.
  • the processed image is sent to the second terminal, and the client stores the original image taken by the Gao Paiyi and the compressed thumbnail image on the middle storage module, and sends it to the agent terminal in a circular queue through the communication module.
  • the second terminal After receiving the image data, the second terminal converts the image data into a displayable format according to the data conversion protocol, and classifies and integrates the converted image by category, groups the same type of images and selects an image satisfying the condition, if the image is If the pixel, the definition, the brightness, the shooting angle, etc. satisfy the requirement, the completion command is sent to the first terminal. If one of the above parameters does not meet the requirement, the re-acquisition command is sent to the first terminal, and the first terminal starts to shoot again. .
  • the face recognition comparison includes face acquisition, face feature location, face feature extraction and face feature similarity comparison.
  • the face collection includes marking the face coordinates and detecting whether there is a human face, evaluating the shooting quality, and screenshotting the face image. Specifically, including marking the face coordinates after opening the camera and detecting whether there is a face, evaluating the shooting quality, and screening the face. image. It is detected whether a human face can judge whether it has a positive facial features and has a complete facial contour based on the coordinates of the hit and the pre-existing facial features.
  • Evaluating the photographing quality may include a head angle evaluation, a brightness evaluation, and a motion blur evaluation
  • the head angle evaluation includes determining whether the head is up and down, for example, within 15 degrees, the left and right declination is within, for example, 15 degrees, and the rotational declination is, for example, Within 20°, if it is consistent, it is considered to meet the head angle assessment
  • the brightness evaluation includes determining whether the brightness is within, for example, [80,200], if it is met, it is considered to meet the brightness evaluation
  • the dynamic fuzzy evaluation includes judging the fuzzy value. Whether it is less than 0.2, for example, if it is met, it is considered to be in compliance with the dynamic fuzzy assessment.
  • evaluating the quality of the shot may also include determining whether the user wears thick-rimmed glasses, sunglasses, or whether the hair blocks the ears or other facial features.
  • the facial feature localization includes positioning a plurality of features of the human face including the organ, including positioning a plurality of features of the human face including the eyebrows, the eyes, the nose, the mouth, and the like.
  • the facial feature extraction includes extracting a plurality of feature information of each feature according to a preset extraction rule.
  • the face feature similarity comparison includes comparing the extracted feature information with the feature information of the ID card avatar photo and obtaining a second comparison threshold, wherein the face feature may include a length and a slope.
  • the parameters such as the gradation difference represent the three-dimensional size, the oblique direction, the distance from other parts, and the like, and the face feature may be a set of feature information.
  • the facial feature similarity comparison may be to compare the two sets of feature information one by one, and define each feature information to have a certain weight, for example, the weight of the important feature information, and the weight of the secondary feature information is relatively small, and may also be defined. Some feature information is a necessary condition for judging that it must be consistent.
  • an identification method including the following steps:
  • Step 01 The second terminal acquires the identity card information collected and sent by the first terminal.
  • the user sends a service request to the second terminal by using the first terminal, and after receiving the request, the second terminal sends an identity verification command to the first terminal, and after receiving the instruction, the first terminal starts the ID card identifier located at the first terminal.
  • the identification device scans the ID card to extract the avatar located on the ID card Photo, ID number information, and de-texturing the avatar photo, sending the processed photo and ID number information to the file server of the first terminal and forming an identification ID code for extracting the photo and information
  • the first terminal sends the identification ID code to the second terminal.
  • the first terminal is a client
  • the second terminal is a client.
  • step 02 the second terminal verifies the validity of the identity card information. If the verification succeeds, the process proceeds to step 03. If the verification fails, the first terminal re-acquires.
  • the second terminal obtains the user information corresponding to the ID card from the verification network through the interface connected with the third-party identity verification network, and obtains the ID information of the user site from the first terminal by using the ID code, and checks the online information through the third party.
  • the user identity information determines whether the user's ID card is within the validity period, and compares the photo of the user on the online check with the photo of the collected ID card avatar. If the similarity of the two photos exceeds the first threshold, the verification passes, if low At the first threshold, the verification fails, wherein the first threshold may be 70, and the first threshold may be obtained by statistical analysis of historical similarity values, wherein the third-party identity verification network may be public security network or authenticated by the Ministry of Public Security. Third-party identity information network.
  • Step 03 The second terminal performs face recognition verification on the user, and the face recognition verification performs the comparison verification by collecting the user face image and the ID card avatar photo. If the verification is passed, the next operation is performed, and if the verification is not performed, By reminding the user to re-create face recognition.
  • the second terminal After the ID card is verified, the second terminal starts the face recognition module to perform face recognition verification on the user, and the second terminal sends an instruction to start the Gao Paiyi to the first terminal. After receiving the instruction, the first terminal turns on the Gao Paiyi. And the user is prompted to perform text and voice operations on the first terminal interface, and the user performs the shooting of the live face image at the prompt. After the shooting is completed, the photo is transmitted back to the second terminal, and the face recognition module of the second terminal will The face image is compared with the third-party verification network user avatar. If the similarity between the two comparison results exceeds the second threshold, the verification is passed. If the similarity is lower than the second threshold, the verification fails. The second terminal reminds the user to perform the second face recognition verification. If the two terminals do not pass, the user is reminded to hold the valid ID to go to the counter for face-to-face check.
  • the second threshold may be obtained by statistical analysis of historical data. Preferably, the second threshold is 60.
  • the image acquisition of the face image includes: the second terminal sends an image acquisition instruction to the first terminal through the sip server, and the first terminal starts the high-speed image to perform image acquisition, and the high-speed device connects to the first terminal through the USB interface, and the agent sends the detection through the USB interface.
  • the device detects the sub-module to the user end, and the device detection sub-module detects the performance of the high-shooter in various states, including the high-shooter capable of starting the shooting control, whether the angle adjustment of the camera is flexible, and whether the picture transmission channel is turned on or the like. Adjust the shooting mode and shooting parameters of the Gao Paiyi, and display the above modes and parameters on the display interface of the agent.
  • the seat can set the above parameters as needed.
  • the seat can remotely control the Gao Paiyi to shoot in the night or day mode, as well as adjust the shooting angle of the camera of the Gao Paiyi, shooting pixels and other parameters.
  • the captured image is processed, the captured image is sent to the image processing module, the image is named and compressed, and the brightness, resolution, contrast and other parameters of the captured image are adjusted, and according to the preset
  • the compression ratio compresses the original image into a thumbnail.
  • the processed image is sent to the second terminal, and the client stores the original image taken by the Gao Paiyi and the compressed thumbnail image on the middle storage module, and sends it to the agent terminal in a circular queue through the communication module.
  • the second terminal After receiving the image data, the second terminal converts the image data into a displayable format according to the data conversion protocol, and classifies and integrates the converted image by category, groups the same type of images and selects an image satisfying the condition, if the image is If the pixel, the definition, the brightness, the shooting angle, etc. satisfy the requirement, the completion command is sent to the first terminal. If one of the above parameters does not meet the requirement, the re-acquisition command is sent to the first terminal, and the first terminal starts to shoot again. .
  • the face recognition comparison includes face acquisition, face feature location, face feature extraction and face feature similarity comparison.
  • the face collection includes marking the face coordinates and detecting whether there is a human face, evaluating the shooting quality, and screenshotting the face image. Specifically, including marking the face coordinates after opening the camera and detecting whether there is a face, evaluating the shooting quality, and screening the face. image. It is detected whether a human face can judge whether it has a positive facial features and has a complete facial contour according to the coordinates of the hit and the pre-existing range of facial features.
  • Evaluating the photographing quality may include a head angle evaluation, a brightness evaluation, and a motion blur evaluation
  • the head angle evaluation includes determining whether the head is up and down, for example, within 15 degrees, the left and right declination is within, for example, 15 degrees, and the rotational declination is, for example, Within 20°, if it is consistent, it is considered to meet the head angle assessment
  • the brightness evaluation includes determining whether the brightness is within, for example, [80,200], if it is met, it is considered to meet the brightness evaluation
  • the dynamic fuzzy evaluation includes judging the fuzzy value. Whether it is less than 0.2, for example, if it is met, it is considered to be in compliance with the dynamic fuzzy assessment.
  • evaluating the quality of the shot may also include determining whether the user wears thick-rimmed glasses, sunglasses, or whether the hair blocks the ears or other facial features.
  • the facial feature localization includes positioning a plurality of features of the human face including the organ, including positioning a plurality of features of the human face including the eyebrows, the eyes, the nose, the mouth, and the like.
  • the facial feature extraction includes extracting a plurality of feature information of each feature according to a preset extraction rule.
  • the face feature similarity comparison includes comparing the extracted feature information with the feature information of the ID card avatar photo and obtaining a second comparison threshold, wherein the face feature may include a length and a slope.
  • the parameters such as the gradation difference represent the three-dimensional size, the oblique direction, the distance from other parts, and the like, and the face feature may be a set of feature information.
  • the facial feature similarity comparison may be to compare the two sets of feature information one by one, and define each feature information to have a certain weight, for example, the weight of the important feature information, and the weight of the secondary feature information is relatively small, and may also be defined. Some feature information is a necessary condition for judging that it must be consistent.
  • Step 04 The second terminal performs voiceprint identification verification on the user, and if the verification passes, proceeds to the next operation, and if the verification fails, the user is reminded to try again.
  • the second terminal starts the voiceprint recognition module to perform voiceprint recognition verification on the user, and the second terminal sends an instruction for collecting the user audio to the audio collection module of the first terminal, and the first terminal prompts the user to issue a specified voice through voice, and the audio collection module pairs
  • the collected audio is processed and sent to the voiceprint recognition module of the second terminal to extract and compare the voiceprint features, and the second terminal extracts the voiceprint information recorded when the user first performs the business and performs the voiceprint information collected with the collected voiceprint information.
  • the similarity comparison if the similarity is greater than the third threshold, the verification is passed, and if the similarity is less than the third threshold, the verification fails.
  • the second threshold can be obtained by statistical analysis of historical data.
  • an authentication system 20 is illustrated.
  • the identity authentication system 20 is partitioned into one or more program modules, one or more program modules are stored in a storage medium, and Executed by one or more processors to complete the application.
  • a program module as used herein refers to a series of computer program instructions that are capable of performing a particular function. The following description will specifically describe the functions of each program module of this embodiment:
  • the ID card information collection module 201 is configured to collect the ID information of the user, including the photo of the ID card and the ID card number, and perform de-texturing processing on the photo of the avatar.
  • the ID card verification module 202 is configured to verify the validity of the collected ID card, including whether the ID card validity period is verified and whether the ID card photo is consistent with the photo of the third party identity verification network.
  • the face recognition module 203 includes a face collection sub-module 2031, a face feature locating sub-module 2032, a face feature extraction sub-module 2033, and a face feature similarity comparison sub-module 2034.
  • the face collection sub-module is used to collect users. The photograph of the living face, the face feature locating sub-module is used for locating the user's face feature part located in the collection frame, and the face feature extraction sub-module is used for feature extraction of the locating feature, and the face feature similarity comparison is used. The similarity comparison is performed on the extracted face features and the photos of the third party verification network.
  • the identity authentication system further includes a voiceprint recognition module 204, including an audio collection sub-module 2041, a voiceprint feature extraction sub-module 2042, and a voiceprint comparison sub-module 2043.
  • the audio collection sub-module is used to collect and denoise the user's voice
  • the voiceprint feature extraction sub-module is used to extract the voiceprint feature of the collected audio
  • the voiceprint comparison sub-module is used to collect the sound.
  • the voiceprint feature is compared with the user's archived voiceprint features for similarity verification.
  • the embodiment provides an electronic device. It is a schematic diagram of the hardware architecture of an embodiment of the electronic device of the present application.
  • the electronic device 2 is an apparatus capable of automatically performing numerical calculation and/or information processing in accordance with an instruction set or stored in advance.
  • it can be a smartphone, a tablet, a laptop, a desktop computer, a rack server, a blade server, a tower server, or a rack server (including a stand-alone server, or a server cluster composed of multiple servers).
  • the electronic device 2 includes at least, but not limited to, a memory 21, a processor 22, a network interface 23, an ID card identifier 24, a Gao Paiometer 25, and an identification system 20 that are communicably coupled to each other through a system bus. . among them:
  • the memory 21 includes at least one type of computer readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (eg, SD or DX memory, etc.), a random access memory (RAM), Static Random Access Memory (SRAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, and the like.
  • the memory 21 may be an internal storage module of the electronic device 2, such as a hard disk or a memory of the electronic device 2.
  • the memory 21 may also be an external storage device of the electronic device 2, such as a plug-in hard disk equipped on the electronic device 2, a smart memory card (SMC), and a secure digital device. (Secure Digital, SD) card, flash card, etc.
  • the memory 21 can also include both the internal storage module of the electronic device 2 and its external storage device.
  • the memory 21 is generally used to store an operating system installed in the electronic device 2 and various types of application software, such as program codes of the identity authentication system 20. Further, the memory 21 can also be used to temporarily store various types of data that have been output or are to be output.
  • the processor 22 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments.
  • the processor 22 is typically used to control the overall operation of the electronic device 2, such as performing control and processing associated with data interaction or communication with the electronic device 2.
  • the processor 22 is configured to run program code or process data stored in the memory 21, such as running the identity authentication system 20 or the like.
  • the network interface 23 may comprise a wireless network interface or a wired network interface, which is typically used to establish a communication connection between the electronic device 2 and other electronic devices.
  • the network interface 23 is configured to connect the electronic device 2 to an external terminal through a network, establish a data transmission channel, a communication connection, and the like between the electronic device 2 and an external terminal.
  • the network may be an intranet, an Internet, a Global System of Mobile communication (GSM), a Wideband Code Division Multiple Access (WCDMA), a 4G network, or a 5G network.
  • Wireless or wired networks such as network, Bluetooth, Wi-Fi, etc.
  • Figure 7 only shows the electronic device with components 20-25, but it should be understood that not all illustrated components may be implemented and that more or fewer components may be implemented instead.
  • the identity authentication system 20 stored in the memory 21 can also be divided into one or more program modules, the one or more program modules being stored in the memory 21 and composed of one or more
  • the processor this embodiment is processor 22
  • FIG. 3 shows a schematic diagram of a program module of the first embodiment of the identity authentication system 20.
  • the identity-based authentication system 20 can be divided into an identity card information collection module 201 and an identity card verification module 202.
  • the program module referred to in the present application refers to a series of computer program instruction segments capable of performing a specific function. The specific functions of the program modules 201-203 are described in detail in the third embodiment, and details are not described herein again.
  • the ID card identification device 24 is configured to be connected to the identity information collection module 201, and collects ID information stored by the user, such as pre-stored information in the chip of the second generation ID card.
  • the high beater 25 is configured to be activated and deactivated by the authentication module 202 to collect a face image of the operating terminal device.
  • the Gao Paiyi 25 can be connected to the electronic device 2 of the user terminal through the USB interface.
  • the user adjusts the shooting angle of the two cameras of the Gao Paiyi according to the actual shooting angle or the control module that sends the command to the user terminal through the command port to control the Gao Paiyi. Different operations enable remote control of the Gao Paiyi.
  • the Gao Paiyi takes a good photo and sends it back to the seat.
  • the seat selects whether to re-adjust the shooting parameters of the Gao Paiyi according to the shooting effect of the photo to obtain the photo that meets the requirements.
  • a flash 26 is also included that is configured to be activated and deactivated by the shooting adjustment subroutine and adjusted in brightness.
  • the embodiment provides a computer readable storage medium on which the identity authentication system 20 is stored, and the identity authentication system 20 is implemented by one or more processors to implement the above identity authentication method or electronic device. Operation.

Abstract

L'invention concerne un procédé d'authentification d'identité, un dispositif électronique et un support d'enregistrement lisible par ordinateur. Le procédé comprend les étapes suivantes : étape 01, un second terminal acquiert des informations de carte d'identité collectées et envoyées par un premier terminal; étape 02, le second terminal vérifie la validité des informations de carte d'identité, si la vérification réussit, il passe à l'étape 03 et si la vérification échoue, il envoie un rappel concernant le renvoi à un premier terminal pour effectuer une nouvelle collecte; et étape 03, le second terminal effectue une vérification de reconnaissance faciale sur un utilisateur, la vérification de reconnaissance faciale étant effectuée au moyen de la collecte d'une image de visage de l'utilisateur et de la comparaison de celle-ci avec une image de portrait sur une carte d'identité pour la vérification, si la vérification réussit, il passe à l'opération suivante et, si la vérification échoue, il rappelle à l'utilisateur d'effectuer une nouvelle reconnaissance faciale. Au moyen du procédé décrit dans la présente invention, la précision de l'authentification d'identité d'utilisateur est améliorée au moyen d'une technologie d'authentification à facteurs multiples.
PCT/CN2018/083075 2017-12-01 2018-04-13 Procédé d'authentification d'identité, dispositif électronique et support d'enregistrement lisible par ordinateur WO2019104930A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711258376.2 2017-12-01
CN201711258376.2A CN108171032A (zh) 2017-12-01 2017-12-01 一种身份鉴定方法、电子装置及计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2019104930A1 true WO2019104930A1 (fr) 2019-06-06

Family

ID=62524292

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/083075 WO2019104930A1 (fr) 2017-12-01 2018-04-13 Procédé d'authentification d'identité, dispositif électronique et support d'enregistrement lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN108171032A (fr)
WO (1) WO2019104930A1 (fr)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443621A (zh) * 2019-08-07 2019-11-12 深圳前海微众银行股份有限公司 视频核身方法、装置、设备及计算机存储介质
CN110751129A (zh) * 2019-10-30 2020-02-04 深圳市丰巢科技有限公司 一种快递业务的身份验证方法、装置、设备和存储介质
CN111311174A (zh) * 2020-01-19 2020-06-19 厦门快商通科技股份有限公司 一种身份证的期限管理方法和装置以及设备
CN111312379A (zh) * 2020-02-19 2020-06-19 望海康信(北京)科技股份公司 数据处理的方法、装置、设备及计算机可读存储介质
CN111476148A (zh) * 2020-04-03 2020-07-31 北京金沙江科技有限公司 一种基于移动端的学历证件照采集系统和方法
CN111753271A (zh) * 2020-06-28 2020-10-09 深圳壹账通智能科技有限公司 基于ai识别的开户身份验证方法、装置、设备及介质
CN111767840A (zh) * 2020-06-29 2020-10-13 北京百度网讯科技有限公司 用于验证图像的方法、装置、电子设备及计算机可读存储介质
CN112084811A (zh) * 2019-06-12 2020-12-15 杭州海康威视数字技术股份有限公司 身份信息的确定方法、装置及存储介质
CN112348483A (zh) * 2020-11-23 2021-02-09 恒瑞通(福建)信息技术有限公司 一种远程行政业务咨询导办的方法及系统
CN112836701A (zh) * 2019-11-25 2021-05-25 中国移动通信集团浙江有限公司 人脸识别方法、装置及计算设备
CN112906474A (zh) * 2019-08-01 2021-06-04 北京旷视科技有限公司 提示信息生成方法、装置、电子设备及存储介质
CN113012089A (zh) * 2019-12-19 2021-06-22 北京金山云网络技术有限公司 一种图像质量评价方法及装置
CN113160473A (zh) * 2021-01-21 2021-07-23 中广核工程有限公司 一种核电厂的通行验证方法、系统、介质及电子设备
CN113688362A (zh) * 2021-08-25 2021-11-23 中国工商银行股份有限公司 身份证信息安全处理方法及装置
CN113780228A (zh) * 2021-09-18 2021-12-10 中科海微(北京)科技有限公司 人证比对方法、系统、终端及介质
CN114024672A (zh) * 2021-11-14 2022-02-08 广东电网有限责任公司电力调度控制中心 一种低压电力线载波通信系统安全防护方法及系统
CN114444940A (zh) * 2022-01-27 2022-05-06 黑龙江邮政易通信息网络有限责任公司 一种基于大数据的企业数据采集分析系统
CN117240607A (zh) * 2023-11-10 2023-12-15 北京云尚汇信息技术有限责任公司 一种基于安全计算机的安全认证方法

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830066A (zh) * 2018-06-20 2018-11-16 平安科技(深圳)有限公司 终端中的应用控制方法和装置及计算机可读存储介质
CN110647729A (zh) * 2018-06-27 2020-01-03 深圳联友科技有限公司 一种登录验证方法及系统
CN108908377B (zh) * 2018-07-06 2020-06-23 达闼科技(北京)有限公司 说话人识别方法、装置和机器人
CN108682424A (zh) * 2018-07-13 2018-10-19 广州势必可赢网络科技有限公司 一种音频采集设备及方法
CN109063664A (zh) * 2018-08-10 2018-12-21 长沙舍同智能科技有限责任公司 用户身份确认方法、装置、计算机设备和存储介质
CN109326058B (zh) * 2018-08-29 2021-07-20 中国建设银行股份有限公司 基于智慧柜员机的身份核查方法、装置、终端及可读介质
CN109067767B (zh) * 2018-08-31 2021-02-19 上海艾融软件股份有限公司 一种人脸识别认证方法及系统
CN109446772A (zh) * 2018-09-03 2019-03-08 平安国际融资租赁有限公司 授信额度计算方法、装置、计算机设备和存储介质
CN108920928A (zh) * 2018-09-14 2018-11-30 算丰科技(北京)有限公司 身份识别方法、装置、电子设备及计算机可读存储介质
CN109325332A (zh) * 2018-09-17 2019-02-12 北京旷视科技有限公司 人证核验方法、服务器、后台及系统
CN109409060A (zh) * 2018-09-26 2019-03-01 中国平安人寿保险股份有限公司 身份验证方法、系统和计算机可读存储介质
CN109543507A (zh) * 2018-09-29 2019-03-29 深圳壹账通智能科技有限公司 身份认证方法、装置、终端设备及存储介质
CN110969555A (zh) * 2018-09-30 2020-04-07 上海柠睿企业服务合伙企业(有限合伙) 多层次信息审核方法、装置、系统、终端、服务器和介质
CN109409245A (zh) * 2018-09-30 2019-03-01 江苏满运软件科技有限公司 身份核验方法、系统、电子设备和存储介质
CN109446778A (zh) * 2018-10-30 2019-03-08 珠海市时杰信息科技有限公司 基于人脸识别的不动产登记信息获取方法、计算机装置及计算机可读存储介质
CN109598251A (zh) * 2018-12-11 2019-04-09 北京旷视科技有限公司 人证核验方法、装置、设备和系统及存储介质
CN109670481B (zh) * 2018-12-29 2021-07-13 河北三川科技有限公司 基于年龄和性别的人证比对动态阈值设置方法
CN109871755A (zh) * 2019-01-09 2019-06-11 中国平安人寿保险股份有限公司 一种基于人脸识别的身份验证方法
CN109815669A (zh) * 2019-01-14 2019-05-28 平安科技(深圳)有限公司 基于人脸识别的认证方法及服务器
CN110135250A (zh) * 2019-04-08 2019-08-16 一脉通(深圳)智能科技有限公司 一种基于生物识别的身份验证方法、装置、设备及可读介质
CN110222107B (zh) * 2019-05-20 2023-08-22 平安科技(深圳)有限公司 一种数据发送方法及相关设备
CN112906741A (zh) * 2019-05-21 2021-06-04 北京嘀嘀无限科技发展有限公司 图像处理方法、装置、电子设备及存储介质
CN110765830B (zh) * 2019-06-12 2022-11-04 天津新泰基业电子股份有限公司 一种人脸全自助注册方法、系统、介质及设备
CN110569707A (zh) * 2019-06-25 2019-12-13 深圳和而泰家居在线网络科技有限公司 一种身份识别方法和电子设备
CN112446252A (zh) * 2019-08-30 2021-03-05 华为技术有限公司 图像识别方法及电子设备
CN110704823A (zh) * 2019-09-10 2020-01-17 平安科技(深圳)有限公司 数据请求方法、装置、存储介质及电子设备
CN110795714A (zh) * 2019-09-10 2020-02-14 中国平安财产保险股份有限公司 一种身份验证方法、装置、计算机设备及存储介质
CN110795715A (zh) * 2019-09-11 2020-02-14 中国平安财产保险股份有限公司 一种数据录入方法、装置、系统及存储介质
CN110533568A (zh) * 2019-10-09 2019-12-03 重庆特斯联智慧科技股份有限公司 一种基于双重身份认证的公安服务方法及其系统
CN113436427A (zh) * 2020-03-06 2021-09-24 华为技术有限公司 一种信息传输方法、支持无线传输的测温装置和服务器
CN111599115A (zh) * 2020-05-27 2020-08-28 江苏苏宁银行股份有限公司 一种银行服务系统和方法
CN111866544B (zh) * 2020-07-23 2022-12-02 京东科技控股股份有限公司 数据处理方法、装置、设备及计算机可读存储介质
CN111813987B (zh) * 2020-07-24 2024-03-08 台州市公安局黄岩分局 一种基于警务大数据的人像比对方法
CN111967876A (zh) * 2020-08-18 2020-11-20 中国银行股份有限公司 身份验证处理方法、智能柜台、后台服务器及系统
CN113188639B (zh) * 2021-04-02 2022-10-04 首钢京唐钢铁联合有限责任公司 一种计量系统
CN113364749B (zh) * 2021-05-25 2023-03-24 广州瀚信通信科技股份有限公司 基于北斗卫星导航定位的数据采集方法及系统
CN113469012B (zh) * 2021-06-28 2024-05-03 广州云从鼎望科技有限公司 用户刷脸验证的方法、系统、介质及装置
CN113705506B (zh) * 2021-09-02 2024-02-13 中国联合网络通信集团有限公司 核酸检测方法、装置、设备和计算机可读存储介质
CN114360085A (zh) * 2021-11-25 2022-04-15 中国人民人寿保险股份有限公司 一种识别出勤作弊行为的方法及其服务系统、终端设备
CN114792451B (zh) * 2022-06-22 2022-11-25 深圳市海清视讯科技有限公司 信息处理方法、设备、及存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663657A (zh) * 2012-03-16 2012-09-12 曾理 一种远程教育、考试中采用人脸识别技术防止作弊的方法
CN105681316A (zh) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 身份验证方法和装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104834849B (zh) * 2015-04-14 2018-09-18 北京远鉴科技有限公司 基于声纹识别和人脸识别的双因素身份认证方法及系统

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663657A (zh) * 2012-03-16 2012-09-12 曾理 一种远程教育、考试中采用人脸识别技术防止作弊的方法
CN105681316A (zh) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 身份验证方法和装置

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084811B (zh) * 2019-06-12 2023-08-11 杭州海康威视数字技术股份有限公司 身份信息的确定方法、装置及存储介质
CN112084811A (zh) * 2019-06-12 2020-12-15 杭州海康威视数字技术股份有限公司 身份信息的确定方法、装置及存储介质
CN112906474A (zh) * 2019-08-01 2021-06-04 北京旷视科技有限公司 提示信息生成方法、装置、电子设备及存储介质
CN112906474B (zh) * 2019-08-01 2022-12-16 北京旷视科技有限公司 提示信息生成方法、装置、电子设备及存储介质
CN110443621A (zh) * 2019-08-07 2019-11-12 深圳前海微众银行股份有限公司 视频核身方法、装置、设备及计算机存储介质
CN110751129A (zh) * 2019-10-30 2020-02-04 深圳市丰巢科技有限公司 一种快递业务的身份验证方法、装置、设备和存储介质
CN112836701A (zh) * 2019-11-25 2021-05-25 中国移动通信集团浙江有限公司 人脸识别方法、装置及计算设备
CN113012089A (zh) * 2019-12-19 2021-06-22 北京金山云网络技术有限公司 一种图像质量评价方法及装置
CN111311174A (zh) * 2020-01-19 2020-06-19 厦门快商通科技股份有限公司 一种身份证的期限管理方法和装置以及设备
CN111312379B (zh) * 2020-02-19 2023-11-03 望海康信(北京)科技股份公司 数据处理的方法、装置、设备及计算机可读存储介质
CN111312379A (zh) * 2020-02-19 2020-06-19 望海康信(北京)科技股份公司 数据处理的方法、装置、设备及计算机可读存储介质
CN111476148A (zh) * 2020-04-03 2020-07-31 北京金沙江科技有限公司 一种基于移动端的学历证件照采集系统和方法
CN111476148B (zh) * 2020-04-03 2023-04-07 北京金沙江科技有限公司 一种基于移动端的学历证件照采集系统和方法
CN111753271A (zh) * 2020-06-28 2020-10-09 深圳壹账通智能科技有限公司 基于ai识别的开户身份验证方法、装置、设备及介质
CN111767840A (zh) * 2020-06-29 2020-10-13 北京百度网讯科技有限公司 用于验证图像的方法、装置、电子设备及计算机可读存储介质
CN112348483A (zh) * 2020-11-23 2021-02-09 恒瑞通(福建)信息技术有限公司 一种远程行政业务咨询导办的方法及系统
CN113160473A (zh) * 2021-01-21 2021-07-23 中广核工程有限公司 一种核电厂的通行验证方法、系统、介质及电子设备
CN113688362A (zh) * 2021-08-25 2021-11-23 中国工商银行股份有限公司 身份证信息安全处理方法及装置
CN113780228A (zh) * 2021-09-18 2021-12-10 中科海微(北京)科技有限公司 人证比对方法、系统、终端及介质
CN113780228B (zh) * 2021-09-18 2023-07-11 中科海微(北京)科技有限公司 人证比对方法、系统、终端及介质
CN114024672A (zh) * 2021-11-14 2022-02-08 广东电网有限责任公司电力调度控制中心 一种低压电力线载波通信系统安全防护方法及系统
CN114024672B (zh) * 2021-11-14 2024-03-26 广东电网有限责任公司电力调度控制中心 一种低压电力线载波通信系统安全防护方法及系统
CN114444940A (zh) * 2022-01-27 2022-05-06 黑龙江邮政易通信息网络有限责任公司 一种基于大数据的企业数据采集分析系统
CN114444940B (zh) * 2022-01-27 2023-12-26 黑龙江邮政易通信息网络有限责任公司 一种基于大数据的企业数据采集分析系统
CN117240607A (zh) * 2023-11-10 2023-12-15 北京云尚汇信息技术有限责任公司 一种基于安全计算机的安全认证方法
CN117240607B (zh) * 2023-11-10 2024-02-13 北京云尚汇信息技术有限责任公司 一种基于安全计算机的安全认证方法

Also Published As

Publication number Publication date
CN108171032A (zh) 2018-06-15

Similar Documents

Publication Publication Date Title
WO2019104930A1 (fr) Procédé d'authentification d'identité, dispositif électronique et support d'enregistrement lisible par ordinateur
WO2019085403A1 (fr) Procédé de comparaison intelligente de reconnaissance faciale, dispositif électronique et support d'informations lisible par ordinateur
WO2019104887A1 (fr) Procédé d'entretien à distance, dispositif électronique et support d'informations lisible par ordinateur
CN104834849B (zh) 基于声纹识别和人脸识别的双因素身份认证方法及系统
US11263441B1 (en) Systems and methods for passive-subject liveness verification in digital media
US10943095B2 (en) Methods and systems for matching extracted feature descriptors for enhanced face recognition
CN106850648B (zh) 身份验证方法、客户端和服务平台
AU2017201463B2 (en) Methods and systems for authenticating users
TW201911130A (zh) 一種翻拍影像識別方法及裝置
WO2021027537A1 (fr) Procédé et appareil pour prendre une photo d'identification, dispositif et support de stockage
WO2020034733A1 (fr) Procédé et appareil d'authentification d'identité, dispositif électronique, et support de stockage
WO2019047481A1 (fr) Procédé de demande d'informations de biens immobiliers, système, dispositif terminal et support de stockage
US20190286798A1 (en) User authentication method using face recognition and device therefor
US11373449B1 (en) Systems and methods for passive-subject liveness verification in digital media
US20170103397A1 (en) Video identification method and computer program product thereof
CA3112331A1 (fr) Verification a distance d'une identite d'une personne
WO2019200872A1 (fr) Procédé et appareil d'authentification, dispositif électronique, programme informatique et support de données
TWI731503B (zh) 活體臉部辨識系統與方法
CN114511915B (zh) 一种基于移动客户端的可信任证件照采集系统及方法
CN106980818B (zh) 一种用于人脸图像的个性化预处理方法、系统及其终端
JP2019074938A (ja) 通信中継装置、システム、方法及びプログラム
WO2022222957A1 (fr) Procédé et système d'identification de cible
CN111767845B (zh) 证件识别方法及装置
US20230005301A1 (en) Control apparatus, control method, and non-transitory computer readable medium
US20140111431A1 (en) Optimizing photos

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18884418

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/09/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18884418

Country of ref document: EP

Kind code of ref document: A1