Identity verification method and device

An identity verification method and identity verification technology, which are applied in the field of identity verification methods and devices, can solve the problems of low security of the identity verification process, and achieve the effect of improving safety and increasing hardware costs

Active Publication Date: 2020-04-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem of low security of the identity verification process based on face recognition provided by the prior art, an embodiment of the present invention provides an identity verification method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device
  • Identity verification method and device
  • Identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0031] The technical solutions provided by the embodiments of the present invention are mainly used for authenticating users. In many application scenarios, user authentication is involved, such as login verification, payment verification, sign-in verification, etc.

[0032] In the method provided by the embodiment of the present invention, each step may be executed by a terminal device equipped with a camera. For example, the terminal device may be an electronic device such as a mobile phone, a tablet computer, an e-book reader, a multimedia playback device, and a PC (personal computer, personal computer). For ease of description, in the following method embodiments, the execution subject of each step is a terminal device for descrip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity verification method and device, belonging to the technical field of information security. The method includes: acquiring the face information of the target user; detecting whether the face information of the target user matches the face information of the registered user; if the face information of the target user matches the face information of the registered user, obtaining Gesture information of the target user; detecting whether the gesture information of the target user matches the gesture information of the registered user; if the gesture information of the target user matches the gesture information of the registered user, it is determined that the target user has passed the identity verification. The present invention performs identity verification by introducing gesture information combined with face information. Even if the user's face information is obtained by others, as long as the gesture information set by the user is not leaked to others, others still cannot counterfeit the user to pass the identity verification, and the security is higher.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity verification method and device. Background technique [0002] The identity verification technology based on face recognition has been widely used because of its convenience and high efficiency. For example, this technology is used in practical application scenarios such as login verification and payment verification. [0003] In the prior art, the identity verification process based on face recognition is roughly as follows: a terminal device such as a mobile phone collects the face information of the target user, detects whether the face information of the target user matches the face information of the registered user, and if A match determines that the target user is authenticated. Wherein, the face information is usually a face image collected by a camera. [0004] In the prior art, users are only authenticated based on face information, but in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00G06F21/32G06Q20/40
CPCG06F21/32G06Q20/40145G06V40/168G06V40/28G06V40/172
Inventor 陈阳
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products