Second-generation identity card-based authentication method and system

An identity verification and ID card technology, which is applied in the field of identity verification based on the second-generation ID card, can solve the problems that the reliability needs to be improved, the reliability of the second-generation ID card is reduced, and needs to be further improved, so as to improve the reliability. and high efficiency, the effect of removing interference

Inactive Publication Date: 2011-07-20
BEIJING SENSELOCK SOFTWARE TECH CO LTD
View PDF6 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the assistance of relevant staff is needed in the authenticity verification process of the second-generation ID card and the consistency verification process between the second-generation ID card and the cardholder, the reliability of the entire verification process depends on the experience and experience of the staff. The recognition ability is closely related, and the reliability of verification needs to be improved
In addition, some counterfeiters can further reduce the reliability of the second-generation ID card by falsifying the photos on the surface of the second-generation ID card and various anti-counterfeiting marks.
[0005] With th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Second-generation identity card-based authentication method and system
  • Second-generation identity card-based authentication method and system
  • Second-generation identity card-based authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] In order to make the objectives, technical solutions, and advantages of the present invention clearer and more comprehensible, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments.

[0041] figure 1 It is a flowchart of the method for performing identity verification based on the second-generation ID card of the present invention. Now combined figure 1 , The method for performing identity verification based on the second-generation ID card of the present invention will be described as follows:

[0042] Step 101: Obtain a first image and a third image;

[0043] In this step, the first image is obtained by reading the image stored in the anti-counterfeiting chip built in the second-generation ID card; the third image is obtained by image collection on the face of the holder.

[0044] Wherein, the first image and the third image can be acquired at the same time, or can be acquired according to the set sequence,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a second-generation identity card-based authentication method and a second-generation identity card-based authentication system. The method comprises the following steps of: A, reading an image stored in a built-in anti-counterfeiting chip of a second-generation identity card to obtain a first image, and performing image acquisition on the face of a card holder to obtain a third image; B, scanning a photo printed on the surface of the second-generation identity card to obtain a second image; C, judging whether similarity between the first and second images is more than or equal to a first preset threshold or not by utilizing a face recognition technology, executing a step D if the similarity between the first and second images is more than or equal to the first threshold, otherwise outputting authentication failure information; and D, judging whether the similarity between the second and third images is more than or equal to a second preset threshold or not by utilizing the face recognition technology, outputting authentication success information if the similarity between the second and third images is more than or equal to the second threshold, otherwise outputting the authentication failure information. By the method and the system provided by the invention, the reliability and efficiency of authentication can be improved.

Description

technical field [0001] The invention relates to image recognition technology, in particular to a method and system for identity verification based on a second-generation ID card. Background technique [0002] At present, my country's second-generation ID cards have been widely popularized. Since the second-generation ID card has a built-in anti-counterfeiting chip, the anti-counterfeiting chip can provide a certain amount of storage space for storing the photo of the cardholder, laying a good foundation for the electronic application of the second-generation ID card. [0003] As a special certificate, the second-generation ID card is mainly used to verify the identity of the holder, and this verification process includes two important links. The first link is the authenticity of the second-generation ID card itself. The second link is the consistency between the second-generation ID card and the holder; among them, the first link can be realized through anti-counterfeiting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/20G06K9/46
Inventor 孙吉平韩勇
Owner BEIJING SENSELOCK SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products