Identity verification method and identity verification device
An identity verification method and identity verification technology, which are applied in the field of identity verification methods and devices, can solve problems such as low security, and achieve the effect of high security and simple method
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0031] This embodiment will be described from the perspective of an identity verification device. Specifically, the identity verification device may be implemented as an independent entity, or may be integrated into a network device, such as a terminal or a server.
[0032] An identity verification method, comprising: providing action prompt information to an object to be verified, and obtaining video stream data of the object to be verified, where the video stream data is continuous data collected when the object to be verified makes a corresponding action according to the action prompt information Frame face image, after that, determine the target face image according to the video stream data, and determine the credibility of the object to be verified as a living body according to the target face image, and then, according to the credibility and the target face image The object to be authenticated is authenticated.
[0033] Such as figure 1 As shown, the specific process of...
no. 2 example
[0101] According to the method described in Embodiment 1, an example will be given below for further detailed description.
[0102] In this embodiment, it will be described in detail by taking the identity verification device integrated in the network device as an example.
[0103] Such as Figure 2a As shown, an authentication method, the specific process can be as follows:
[0104] S201. The network device obtains a user registration request, and the user registration request carries a user identifier to be registered and a face image to be registered.
[0105] For example, when a user registers an application system (such as a conference sign-in system) for the first time, the user may be required to provide an account number to be registered and a face image to be registered. The face image to be registered may be collected on-site or taken by the user in advance After uploading, when the user clicks the "Finish" button, the user registration request can be generated.
...
no. 3 example
[0136] According to the methods described in Embodiment 1 and Embodiment 2, this embodiment will be further described from the perspective of an identity verification device, and the identity verification device may be integrated in a network device.
[0137] see Figure 3a , Figure 3a The identity verification device provided by the third embodiment of the present invention is specifically described, which may include: a providing module 10, an obtaining module 20, a first determining module 30, a second determining module 40, and a verification module 50, wherein:
[0138] (1) Provide module 10
[0139] The providing module 10 is used for providing action prompt information to the object to be verified.
[0140] In this embodiment, the action prompt information is mainly used to prompt the user to perform some specified actions, such as shaking the head or blinking, etc., which can be displayed in the form of a prompt box or a prompt interface. When the user clicks a cer...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com