Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity verification method and system

An identity verification method and identity verification technology, applied in the fields of digital data authentication, instruments, computing, etc., can solve the problems of long queues of personnel and the need to improve detection efficiency, and achieve the effect of improving efficiency and ensuring legality.

Active Publication Date: 2022-03-04
北京诺君安信息技术股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this system alleviates the problem of long queues caused by manual detection of documents and machine detection as a supplementary detection method to a certain extent, when the number of entry and exit personnel increases, the detection efficiency still needs to be improved, and it cannot satisfy the needs of people. Efficiency requirements for identity verification of entry-exit personnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity verification method and system
  • An identity verification method and system
  • An identity verification method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0054] Such as figure 1As shown, the identity verification method provided by the present invention includes the following steps: firstly, when performing certificate verification, turn on the first camera, and take pictures of the entire identity verification process; secondly, verify the authenticity of the certificate, and extract the certificate when the certificate is true information, and turn on the second camera to collect face information; compare the collected face information with the face information on the extracted certificate, and when the collected face information is consistent with the face information on the extracted certificate, collect and verify The fingerprint information of the person; then, save the video information captured by the first camera, the face information captured by the second camera, the entered certificate information, and fingerprint information, and set a unique identifier for association; finally, the unique identifier associated info...

no. 2 example

[0080] The second embodiment of the present invention provides an identity verification method for the entry-exit hall, which is different from the above-mentioned first embodiment in that:

[0081] When the first camera shoots the entire identity verification process, each time the verifier performs a verification operation, the first camera takes a group of verification photos. And the verification photo is saved together with the video information taken by the first camera, the face information taken by the second camera, the document information entered, and the fingerprint information, and a unique identifier is set for association.

[0082]Specifically, when performing certificate verification, the first camera is turned on to take pictures of the entire identity verification process; at this time, the first camera takes a verification photo during the certificate verification operation. When the certificate is true, the second camera is turned on to collect face informa...

no. 3 example

[0087] Such as figure 2 As shown, the third embodiment provided by the present invention provides an identity verification system to implement the above method. The identity verification system includes a first monitoring module, a second monitoring module, a certificate verification module, and a verification module; fingerprint collection module, storage module, printing module. In the third embodiment, each module can be implemented by a processor and a memory storing instructions executable by the processor. Wherein, the processor may be a general processor, such as a central processing unit (central processing unit, CPU), a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (application specific integrated circuit, ASIC), or a One or more integrated circuits configured to implement embodiments of the invention. The memory is used to store program code and transmit the program code to the CPU. The memory may include a v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method and system, wherein the identity verification method includes the following steps: when starting to verify the certificate, turn on the first camera, and photograph the operation information within the range from the face to the operation plane; read the certificate information ; and utilize the second camera to shoot face information; according to the face information taken by the second camera, when it is judged to be the same as the face information in the certificate information, fingerprint collection is carried out to obtain fingerprint information; the video taken by the first camera is Information, face information captured by the second camera, entered certificate information, and fingerprint information are stored correspondingly, and a unique identifier is set for association. This method can find all the verification information and verification process of the verification personnel by printing the receipt, and effectively relieves the pressure of the flow of people for customs clearance on the basis of ensuring the accuracy of the verification.

Description

technical field [0001] The invention relates to an identity verification method and an identity verification system for realizing the identity verification method; it belongs to the technical field of identity verification. Background technique [0002] Under the background of global economic integration, citizens from all over the world go abroad for business activities more and more frequently. With the continuous development of my country's economy and society, people's material and cultural level continues to improve, and cross-border tourism or cross-regional shopping has become more and more popular. With the surge in the number of people traveling or shopping across borders, the pressure on the management of the flow of people at the border is increasing. [0003] In the prior art, the manual detection of certificates is usually used as the main method and the machine detection is supplemented to judge whether it is legal to enter or exit the country. However, with t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06V40/16G06V40/13G07C9/25G07C9/27
CPCG07C9/257G07C9/27G06V40/13G06V40/161
Inventor 葛传洋张洪铭
Owner 北京诺君安信息技术股份有限公司