Method and system for authenticating remote user based on camera

An identity verification and remote user technology, applied in the field of computer identity verification, can solve problems such as inability to judge whether the surface information of the ID card image is consistent with the information in the chip, poor customer experience, and inability to distinguish the authenticity of the customer ID card.

Active Publication Date: 2015-04-08
湖北微模式科技发展有限公司
View PDF3 Cites 73 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are certain defects in the above approach: (1) The front and back images of the customer’s ID card and the face image can be taken independently by the customer or someone else, and the background auditors cannot confirm whether it is because they cannot see the shooting site. The customer himself took and uploaded it; (2) When the customer took the front and back images of the ID card and the face image, due to the shooting environment, improper operation and other reasons, the pictures were often not very clear. After uploading, if the background review personnel cannot see clearly , will allow custome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating remote user based on camera
  • Method and system for authenticating remote user based on camera
  • Method and system for authenticating remote user based on camera

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] figure 2 It is a schematic flowchart of a method for realizing remote user identity verification based on a terminal device camera proposed by the present invention. Combine now figure 2 , an example of a method for realizing remote user identity verification based on a terminal device camera proposed by the present invention is given.

[0056] A method for implementing remote user identity verification based on a terminal device camera proposed in Embodiment 1 includes the following steps:

[0057] Step 100: Turn on the camera;

[0058] Turn on the camera of the device used by the remote authentication user, such as a mobile phone camera. The camera can be various commonly used cameras, such as a USB camera, a built-in camera of a notebook computer, a built-in camera of a mobile phone, and the like.

[0059] Step 101: Randomly generate a prompt action series;

[0060] Some actions are pre-designed, including but not limited to: requiring the remote verification ...

Embodiment 2

[0083] image 3 It is a block diagram of a system for realizing remote user identity verification based on a terminal device camera proposed by the present invention. Combine now image 3 , an example of a system for realizing remote user identity verification based on a terminal device camera proposed by the present invention is given.

[0084] A system for realizing remote user identity verification based on a terminal device camera proposed by the present invention includes:

[0085] Subsystem 200: video capture subsystem

[0086] Capture user operation video by calling the camera. The camera may be various commonly used cameras, such as a USB camera, a built-in camera of a notebook computer, a built-in camera of a mobile phone, and the like.

[0087] Subsystem 201: Real-time video viewing subsystem

[0088] It allows the review staff to view the user's operation video in real time. Real-time video supports common transmission network transmission, such as wired broad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for authenticating remote user based on a camera. According to the method, an identity card surface image and a customer face image can be simultaneously snapshot, the shooting process can be recorded and uploaded to a background auditor in real time during shooting, so that others can be effectively prevented from stealing the identity card image and a head portrait of a customer and deceiving. The customer needs to randomly do action by coordinating with prompt in the shooting process, the risk of deceiving by modes such as prerecorded videos can be effectively prevented, identity card surface information is automatically recognized, basic information and a face photo are inspected through networking of ministry of public security according to the information, effectiveness of an identity card is finally determined by comparison, consistency of an on-site shot face image, the identity card surface face image and a networked inspection face image is verified through face recognition technology to ensure that the customer does business with the personal identity card of the customer, and the risk of others' deception is effectively prevented.

Description

technical field [0001] The invention relates to the technical field of computer identity verification, in particular to a method and system for realizing remote user identity verification based on a terminal device camera. Background technique [0002] With the popularization of the Internet and the development of technology, many businesses in some industries (such as securities, banking, insurance, etc.) can gradually be handled remotely on the Internet or remote terminal devices (such as VTM, mobile phones, etc.), which is currently the most common online banking, mobile banking, etc. Some other traditional businesses are gradually moving to the Internet or remote terminal equipment, such as securities account opening, bank card opening, etc. According to regulations, these businesses require "the customer himself to hold his own valid certificate" to handle. If it is handled at the counter of the business outlet in the traditional way, the customer needs to go to the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06K9/64
CPCG06F21/32G06F2221/2141G06V10/75
Inventor 王先基陈友斌
Owner 湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products