Identity authentication method, device and system

An identity authentication and pending authentication technology, applied in the field of identity authentication, can solve the problems of low recognition efficiency of face recognition technology, damage to legitimate user rights and interests, damage to user rights and interests, etc., to ensure uniqueness and security, and avoid personal information from being leaked. , the effect of ensuring uniqueness

Active Publication Date: 2017-01-11
SHANGHAI PEOPLENET SECURITY TECH
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing field of identity authentication, two-dimensional codes are generally used for identity authentication. The emphasis is on the efficiency and convenience of two-dimensional codes, while security is easily overlooked. Then criminals can use the two-dimensional codes as long as they obtain the two-dimensional codes. The two-dimensional code is forged to become a legitimate user, which damages the rights and interests of the legitimate user
Simple face recognition technology can also be u

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0066] In order to make the drawing concise, each drawing only schematically shows the parts related to the present invention, and they do not represent the actual structure of the product. In addition, to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. Herein, "a" not only means "only one", but also means "more than one".

[0067] refer to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, device and system. The method includes the steps that legal authentication two-dimensional codes of authentication users are generated, face information of the authentication users is collected to generate legal face feature data of the users, legal personal mask codes of the authentication users are generated according to the legal face feature data, and the legal authentication two-dimensional codes and the legal personal mask codes are subjected to reversible operation to obtain encrypted two-dimensional codes; when the users are subjected to identity authentication, face information of the users is collected again to generate current face feature data, current personal mask codes are generated according to the current face feature data, the current personal mask codes and the encrypted two-dimensional codes are subjected to reversible operation to obtain two-dimensional codes to be authenticated, and whether the two-dimensional codes to be authenticated are consistent with the legal authentication two-dimensional codes is judged. The problem of user information leakage caused by storage of face recognition images is avoided, and the intensity and safety of identity authentication are improved.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to an identity authentication method, device and system. Background technique [0002] Face recognition, specifically refers to the computer technology that uses the analysis and comparison of facial visual feature information for identity identification. Face recognition is a series of related technologies that use cameras or cameras to collect images or video streams containing faces, and automatically detect and track faces in the images, and then perform facial recognition on detected faces, usually also called portrait recognition. ,face recognition. Face recognition technology is based on human facial features. For the input face image or video stream, it is first judged whether there is a human face. If there is a human face, the position, size and each main The location information of facial organs, and based on this information, further extract the identity features...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L9/08G06F21/36G06K9/00G06K19/06
CPCH04L9/0866H04L9/3226H04L9/3231H04L63/08H04L63/0861G06F21/36G06K19/06037G06V40/16
Inventor 谈剑锋王稳姜立稳胡剑波谢勇钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products