Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method, device and system

An identity verification method and identity verification technology, applied in the field of identity verification methods, devices and systems, can solve problems such as hidden dangers, lack of interactive linkage, legal user personal privacy or property security threats, etc.

Active Publication Date: 2020-07-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing identity verification technology based on face recognition has certain security risks. The background server unilaterally receives the face recognition results of the terminal device, and lacks interaction with the front-end face recognition software. Against the limitations of cheating, malicious users can use various unconventional means to break through or bypass face recognition software, and will use a variety of illegal means (such as: obtaining static photos through social networks, video interception, candid shots, etc.) The face image of the legal user obtained is directly sent to the server to complete the identity verification, which in turn poses a threat to the personal privacy or property security of the legal user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and system
  • Identity verification method, device and system
  • Identity verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0047] Figure 4 It is a flow chart of the identity verification method provided by the first embodiment of the present invention. The identity verification method provided by this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Figure 4 As shown, the method includes:

[0048] Step S11, when receiving the service processing request sent by the terminal device, sending at least one first shooting parameter to the terminal device, so that the terminal device controls the shooting device to collect the user's information for identity verification according to the first shooting parameter. face image;

[0049] The server 200 receives the service processing request sent by the terminal device 100 , and the service processing request may include: a service identifier of a service to be processed and an account number of the terminal device 100 . Wherein, the account of terminal device 100 is preferably the u...

no. 2 example

[0063] Figure 5 It is a flow chart of the identity verification method provided by the second embodiment of the present invention. The identity verification method provided by this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Figure 5 As shown, the method includes:

[0064] Step S21, when receiving the business processing request sent by the terminal device, at least one shooting parameter is randomly determined from the candidate shooting parameters, and sent to the terminal device as the first shooting parameter, so that the terminal device controls the shooting device to follow the first shooting parameter. A shooting parameter collects a user's face image for identity verification;

[0065] The service processing request may include: the service identifier of the service to be processed and the account number of the terminal device 100 . Wherein, the account of terminal device 100 is preferably...

no. 3 example

[0096] Figure 6 It is a flow chart of the identity verification method provided by the third embodiment of the present invention. The identity verification method provided by this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Figure 6 As shown, the method includes:

[0097] Step S31, when receiving the service processing request sent by the terminal device, obtain the model of the terminal device, obtain at least one shooting parameter corresponding to the model, and send it to the terminal device as the first shooting parameter, so that the terminal device controls The photographing device collects the user's face image for identity verification according to the first photographing parameter;

[0098] The service processing request sent by the terminal device 100 may include: the service identifier of the service to be processed and the account number of the terminal device 100 . Wherein, the accou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication method comprises the following steps of transmitting at least one first shooting parameter to a terminal device when a service processing request sent from the terminal device is received, and controlling a shooting device to acquire a face image for an authentication user by the terminal device according to the first shooting parameter; receiving the face image sent from the terminal device, matching a second shooting parameter of the face image with the first shooting parameter, and simultaneously matching the face image with a preset face image; and determining whether the authentication of the user is passed or not according to a matching result. Further, the invention also provides an authentication device and system. With the above authentication method, device and system, the safety of the authentication based on face recognition can be improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an identity verification method, device and system. Background technique [0002] Face recognition is a biometric technology for identification based on human facial feature information. A series of related technologies that use a video camera or camera to collect images or video streams containing human faces, automatically detect and track human faces in the images, and then perform facial recognition on the detected faces, usually also called portrait recognition and facial recognition. As a method of identity verification, face recognition has been widely used in government, military, banking, social welfare reporting, e-commerce, security defense, mobile payment and other fields. [0003] However, the existing identity verification technology based on face recognition has certain security risks. The background server unilaterally receives the face recognition resu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32H04L9/32
Inventor 廖晨王进张东蕊许灿冲张杰
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products