Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method and identity verification device

An identity verification method and identity verification technology, which are applied in the field of identity verification methods and devices, can solve problems such as low security, and achieve the effect of high security and simple method

Active Publication Date: 2017-08-18
TENCENT TECH SHANGHAI
View PDF10 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an identity verification method and device to solve the technical problem of low security of existing identity verification methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0031] This embodiment will be described from the perspective of an identity verification device. Specifically, the identity verification device may be implemented as an independent entity, or may be integrated into a network device, such as a terminal or a server.

[0032] An identity verification method, comprising: providing action prompt information to an object to be verified, and obtaining video stream data of the object to be verified, where the video stream data is continuous data collected when the object to be verified makes a corresponding action according to the action prompt information Frame face image, after that, determine the target face image according to the video stream data, and determine the credibility of the object to be verified as a living body according to the target face image, and then, according to the credibility and the target face image The object to be authenticated is authenticated.

[0033] Such as figure 1 As shown, the specific process of...

no. 2 example

[0101] According to the method described in Embodiment 1, an example will be given below for further detailed description.

[0102] In this embodiment, it will be described in detail by taking the identity verification device integrated in the network device as an example.

[0103] Such as Figure 2a As shown, an authentication method, the specific process can be as follows:

[0104] S201. The network device obtains a user registration request, and the user registration request carries a user identifier to be registered and a face image to be registered.

[0105] For example, when a user registers an application system (such as a conference sign-in system) for the first time, the user may be required to provide an account number to be registered and a face image to be registered. The face image to be registered may be collected on-site or taken by the user in advance After uploading, when the user clicks the "Finish" button, the user registration request can be generated.

...

no. 3 example

[0136] According to the methods described in Embodiment 1 and Embodiment 2, this embodiment will be further described from the perspective of an identity verification device, and the identity verification device may be integrated in a network device.

[0137] see Figure 3a , Figure 3a The identity verification device provided by the third embodiment of the present invention is specifically described, which may include: a providing module 10, an obtaining module 20, a first determining module 30, a second determining module 40, and a verification module 50, wherein:

[0138] (1) Provide module 10

[0139] The providing module 10 is used for providing action prompt information to the object to be verified.

[0140] In this embodiment, the action prompt information is mainly used to prompt the user to perform some specified actions, such as shaking the head or blinking, etc., which can be displayed in the form of a prompt box or a prompt interface. When the user clicks a cer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method and an identity verification device. The identity verification method comprises steps: action prompt information is provided for a to-be-verified object; video stream data of the to-be-verified object are acquired, wherein the video stream data are acquired continuous frames of human face images when the to-be-verified object makes a corresponding action according to the action prompt information; a target human face image is determined according to the video stream data; according to the target human face image, the reliability of the to-be-verified object to be a live body is determined; and according to the reliability and the target human face image, identity verification is carried out on the to-be-verified object. The above identity verification method can effectively block attacks from multiple types such as a picture, a video and a head model during a human face recognition process, the method is simple, and the safety is high.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an identity verification method and device. Background technique [0002] With the continuous development and popularization of terminal technology, the number of applications in the terminal is also increasing, and because some applications involve a lot of privacy of users, in order to ensure information security, login operations are required during use to confirm user identities. [0003] At present, the common user login method is mainly account and password login. This login method requires the user to manually enter the account and password every time they log in. The operation is cumbersome. To solve this problem, the industry has proposed face login based on face recognition technology. method, wherein the face recognition technology is a biometric technology for identity recognition based on the facial feature information of a person, the face login method mainly uses...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00
CPCG06V40/161G06V40/45
Inventor 梁晓晴梁亦聪丁守鸿刘畅陶芝伟周可菁
Owner TENCENT TECH SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products