Identity verification method and system thereof
An identity verification method and identity verification technology, applied in the direction of instruments, character and pattern recognition, computer parts, etc., can solve the problems of long queues of personnel, detection efficiency needs to be improved, etc., to achieve the effect of improving efficiency and ensuring legality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0054] Such as figure 1As shown, the identity verification method provided by the present invention includes the following steps: firstly, when performing certificate verification, turn on the first camera, and take pictures of the entire identity verification process; secondly, verify the authenticity of the certificate, and extract the certificate when the certificate is true information, and turn on the second camera to collect face information; compare the collected face information with the face information on the extracted certificate, and when the collected face information is consistent with the face information on the extracted certificate, collect and verify The fingerprint information of the person; then, save the video information captured by the first camera, the face information captured by the second camera, the entered certificate information, and fingerprint information, and set a unique identifier for association; finally, the unique identifier associated info...
no. 2 example
[0080] The second embodiment of the present invention provides an identity verification method for the entry-exit hall, which is different from the above-mentioned first embodiment in that:
[0081] When the first camera shoots the entire identity verification process, each time the verifier performs a verification operation, the first camera takes a group of verification photos. And the verification photo is saved together with the video information taken by the first camera, the face information taken by the second camera, the document information entered, and the fingerprint information, and a unique identifier is set for association.
[0082]Specifically, when performing certificate verification, the first camera is turned on to take pictures of the entire identity verification process; at this time, the first camera takes a verification photo during the certificate verification operation. When the certificate is true, the second camera is turned on to collect face informa...
no. 3 example
[0087] Such as figure 2 As shown, the third embodiment provided by the present invention provides an identity verification system to implement the above method. The identity verification system includes a first monitoring module, a second monitoring module, a certificate verification module, and a verification module; fingerprint collection module, storage module, printing module. In the third embodiment, each module can be implemented by a processor and a memory storing instructions executable by the processor. Wherein, the processor may be a general processor, such as a central processing unit (central processing unit, CPU), a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (application specific integrated circuit, ASIC), or a One or more integrated circuits configured to implement embodiments of the invention. The memory is used to store program code and transmit the program code to the CPU. The memory may include a v...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


