Identity recognition method, electronic device and computer readable storage medium

An identity recognition and ID card technology, applied in the field of identity verification, can solve the problems of impersonating a returning visitor, the insurance formula cannot verify the customer's identity, and the customer's identity cannot be verified accurately, so as to avoid impersonation or forged identity cards.

Inactive Publication Date: 2018-03-16
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet technology, business transactions in many industries such as securities, banking, and insurance can gradually be handled remotely on the Internet or remote terminal devices. In the insurance industry, after customers sign a new contract, the insurance company will Return visits to customers within a certain period of time to verify their identities. The traditional method of return visits is through telephone inquiries. In this way, malicious people may be impersonated as

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method, electronic device and computer readable storage medium
  • Identity recognition method, electronic device and computer readable storage medium
  • Identity recognition method, electronic device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] see figure 1 , the identification method of this embodiment includes the following steps:

[0032] Step 01, collect the ID card information of the user.

[0033] The ID card information includes the ID card number and the profile picture on the ID card. The verification control center sends an ID card information collection command to the information collection unit on the user end, and the information collection unit prompts the user to place the ID card in the designated area and turn on the camera on the user end to take pictures on the spot. The user's ID card photo, and collect the ID number and profile photo located in the ID card photo, the ID number and profile photo are used for matching verification with the identity information data on the identity information management network, and for pre-existing verification control center identity information for matching verification. Among them, it is preferable to identify the characteristics of the user through th...

Embodiment 2

[0046] refer to figure 2 , showing a method for electronic image identification, which specifically includes the following steps:

[0047] Step 01, collect the ID card information of the user.

[0048] Step 02, determine whether the ID card information is consistent with the identity information of the identity information management network, if so, execute step 03, otherwise prompt invalid.

[0049] Step 03, judge whether the ID card information is consistent with the user's pre-stored identity information, if so, execute step 04, otherwise prompt that the user does not exist.

[0050] Step 04: Collect photos of facial dynamic expressions of the user on site and perform face recognition verification. If the verification is passed, the user is allowed to perform the next operation, and if the verification fails, it will prompt that the verification fails.

[0051] Wherein, the user makes a specified expression according to the prompt, and extracts the expression feature and...

Embodiment 3

[0053] refer to Figure 3-4 , shows an identity recognition system. In this embodiment, the identity recognition system is divided into one or more program modules, one or more program modules are stored in a storage medium, and are processed by one or more processors Executed to complete the present invention. The program module referred to in the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable than the program itself to describe the execution process of the identification system in the storage medium. The following description will specifically introduce the program modules of this embodiment. Features:

[0054] The identity information collecting module 201 is used for collecting the ID card information of the user, including collecting the ID card number and avatar photo on the ID card, and is suitable for collecting the identity information of the ID card. The identity informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity recognition method. The method is characterized by comprising the following steps of: 01, acquiring identity card information of a user; 02, judging whether the identity card information is consistent with identity information of an identity information management network or not, if the judging result is positive, executing step 03, and otherwise, prompting thatthe identity card information loses efficacy; 03, judging whether the identity card information is consistent with identity information pre-stored by the user or not, if the judging result is positive, executing step 04, and otherwise, prompting that the user does not exist; and 04, acquiring a spot face picture of the user, carrying out face recognition verification, if the verification passes,allowing the user to execute the next step, and otherwise, prompting that the verification fails.

Description

technical field [0001] The invention relates to an identity verification method, in particular to an identity recognition method, an electronic device and a computer-readable storage medium. Background technique [0002] With the development of Internet technology, business transactions in many industries such as securities, banking, and insurance can gradually be handled remotely on the Internet or remote terminal devices. In the insurance industry, after customers sign a new contract, the insurance company will Return visits to customers within a certain period of time to verify their identities. The traditional method of return visits is through telephone inquiries. In this way, malicious people may be impersonated as return visitors, resulting in the inability of the insurance formula to accurately verify the identity of customers. If these businesses are moved to the Internet Or on a remote terminal device, if the client is remotely verified, it is faced with how to det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/46G06K9/62
CPCG06V40/165G06V40/171G06V10/443G06F18/214
Inventor 陈茂林杨承勇侯绪梅曾荀
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products