Method and system for real-name authentication based on face recognition

A technology of real-name authentication and face recognition, which is applied in the transmission system, digital data authentication, user identity/authority verification, etc., can solve the problem that the security of off-site real-name authentication cannot be guaranteed, and achieve reliable sources, prevent fraudulent use, and reduce workload effect

Inactive Publication Date: 2014-03-12
上海市数字证书认证中心有限公司
View PDF6 Cites 78 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a real-name authentication method and s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for real-name authentication based on face recognition
  • Method and system for real-name authentication based on face recognition
  • Method and system for real-name authentication based on face recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 1 , 2 , the present invention provides a real-name authentication method based on face recognition. The authentication method performs real-name authentication by remotely acquiring face images, and effectively prevents the occurrence of impersonation. The authentication method is mainly performed by an authentication system, wherein the authentication system is software installed on a server, the server can communicate with the user's personal terminal through the network, and can push part of the calculation process to the personal terminal. The terminal is processed by the personal terminal, so as to reduce the system load of the server. The server includes, but is not limited to: servers, cloud-based server groups, clustered servers, and the like. The personal terminal has a built-in or external camera device. The personal terminals include but are not limited to: personal computers, mobile phones, tablet computers, and the like.

[0031] In step S1,...

Embodiment 2

[0044] Such as image 3 As shown, the difference from the first embodiment is that, in order to prevent people with ulterior motives from using videos such as video recordings to impersonate, the step S2 further includes: steps S21, S22, and S23.

[0045] In step S21, when the authentication system detects that the personal terminal used by the user has turned on the camera device, it sends a random action instruction to the user, and extracts the action trajectory of the user according to the action instruction. Wherein, the action instructions include, but are not limited to: actions such as blinking eyes, opening mouth, turning head, etc., and combined action instructions.

[0046] Specifically, the authentication system randomly selects one or a group of action instructions from the pre-stored action instructions, and sends it to the personal terminal where the user is located through a web page, so as to prompt the user to follow the action instruction to perform an actio...

Embodiment 3

[0054] Such as Figure 4 As shown, the present invention also provides a real-name authentication system based on face recognition. The authentication system is software installed on the server. The server can communicate with the user's personal terminal through the network, and can push part of the calculation process to the personal terminal for processing by the personal terminal, so as to reduce service costs. End system burden. The server includes, but is not limited to: servers, cloud-based server groups, clustered servers, and the like. The personal terminal has a built-in or external camera device. The personal terminal includes, but is not limited to: personal computer, mobile phone, tablet computer, etc.

[0055] The authentication system 1 includes: a personal information acquisition module 11 , an image behavior extraction module 12 , a remote call module 13 , and an authentication module 14 . Wherein, the personal information obtaining module 11, the remote c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for real-name authentication based on face recognition. According to the method, personal information of a user including identity card information is acquired by the system, the condition that a personal terminal used by the user starts a camera device is detected, the information of a facial image from video information picked up by the camera device is selected according to a preset face posture rule, the identification photo information of a corresponding identity card is retrieved from the national citizen identity information database according to the identity card information, the selected information of the facial image is matched with the retrieved identification photo information, and real-name authentication of the personal information is performed according the matching degree. According to the method and the system disclosed by the invention, the difficult problem of non-face-to-face personal network identity identification is solved to ensure that a user can quickly finish real-time authentication anytime and anywhere, and meanwhile, because the user dose not need to provide an electronic identity card, the phenomena of falsely use and embezzlement of identity cards can be effectively prevented.

Description

technical field [0001] The invention relates to a real-name authentication method, in particular to a face recognition-based real-name authentication method and system. Background technique [0002] With the rapid development of information technology, various applications of the Internet have gradually penetrated into all aspects of our lives. While the Internet has brought huge economic benefits and convenience to the society, it has also brought many difficulties to the management of the network. Network security incidents such as information leakage, network rumors, and garbage dissemination have brought serious threats to social stability and economic development. , the fundamental reason is that people exist as virtual identities in the online world, and there is no authoritative third party to provide credible and unified personal network identity authentication services. [0003] At present, the basic process of personal network identity authentication is based on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/32
Inventor 李国崔久强徐祺杜守国陈荦祺刘承冯晔
Owner 上海市数字证书认证中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products