Identity authentication method, electronic apparatus and computer readable storage medium

An identity authentication and ID card technology, applied in the fields of identity authentication methods, electronic devices and computer-readable storage media, to achieve the effect of improving accuracy and security

Inactive Publication Date: 2018-06-15
PING AN TECH (SHENZHEN) CO LTD
View PDF2 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the vigorous development of the Internet, various traditional industries are facing transformation. The original offline face-to-face business is gradually migrated to the Internet for remote completion, which can greatly save the cost of manpower and outlets, and also reduce Dealing with the suffering of business parties, but how to confirm the real identity of people in the virtual Internet has become the biggest problem in the transformation process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, electronic apparatus and computer readable storage medium
  • Identity authentication method, electronic apparatus and computer readable storage medium
  • Identity authentication method, electronic apparatus and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Refer to figure 1 , Shows an identity authentication method, including the following steps:

[0031] Step 01: The second terminal obtains ID card information collected and sent by the first terminal.

[0032] The user sends a service request to the second terminal through the first terminal. After receiving the request, the second terminal sends an identity verification instruction to the first terminal. After receiving the instruction, the first terminal turns on the ID card authenticator at the first terminal , And give the user text and voice operation instructions on the first terminal interface, including reminding the user to place the ID card in the designated area, and adjust the brightness of the client and other collection parameters, and the authenticator scans the ID card to extract the avatar on the ID card Photos, ID card number information, and de-texture the avatar photo, send the processed photo and ID card number information to the file server of the first ...

Embodiment 2

[0044] Refer to figure 2 , Shows an identity authentication method, including the following steps:

[0045] Step 01: The second terminal obtains ID card information collected and sent by the first terminal.

[0046] The user sends a service request to the second terminal through the first terminal. After receiving the request, the second terminal sends an identity verification instruction to the first terminal. After receiving the instruction, the first terminal turns on the ID card authenticator at the first terminal , And give the user text and voice operation instructions on the first terminal interface, including reminding the user to place the ID card in the designated area, and adjust the brightness of the client and other collection parameters, and the authenticator scans the ID card to extract the avatar on the ID card Photos, ID card number information, and de-texture the avatar photo, send the processed photo and ID card number information to the file server of the first...

Embodiment 3

[0060] Refer to Figure 3-6 , Shows an identity authentication system 20. In this embodiment, the identity authentication system 20 is divided into one or more program modules, one or more program modules are stored in a storage medium, and are composed of one or more The processor executes to complete the present invention. The program module referred to in the present invention refers to a series of computer program instruction segments that can complete specific functions, and is more suitable for describing the execution process of the identity authentication system 20 in the storage medium than the program itself. The following description will specifically introduce each program module of this embodiment Function:

[0061] The ID card information collection module 201 is used to collect ID card information of the user, including ID card avatar photos and ID card numbers, and de-netize the avatar photos.

[0062] The ID card verification module 202 is used to verify the vali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, an electronic apparatus and a computer readable storage medium. The method comprises the following steps of 01, obtaining identity card information collected and sent by a first terminal through a second terminal; 02, performing verification on validity of the identity card information by the second terminal, and if the verification is passed, entering the step 03, otherwise, reminding information of returning to the first terminal for re-collection; 03, performing human face identification verification on a user by the second terminal, and if the verification is passed, entering the next step for operation, otherwise, reminding the user to perform human face identification again, wherein in the human face identification verification, a human face image of the user is collected and is subjected to comparative verification with an identity card portrait photo. According to the method provided by the invention, the accuracy of user identity authentication is improved through a multiple identity verification technology.

Description

Technical field [0001] This application relates to an identity verification method, in particular to an identity verification method, an electronic device and a computer-readable storage medium Background technique [0002] A type of social industry represented by the banking, securities, insurance and other financial industries. When providing services to the public, it is necessary to verify the true identity of the parties, that is, to do a good job of real-name verification. The original methods require the parties themselves Visit the counter of the branch in person, provide valid personal identity certificates, express your true wishes and sign relevant documents. With the vigorous development of the Internet, various traditional industries are facing transformation. The original offline people-to-person face-to-face business is gradually migrated to the network and completed remotely, which can greatly save the cost of manpower and outlets, and also reduce Dealing with th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K9/00G06K9/62
CPCG06F21/32G06V40/16G06V40/168G06F18/22
Inventor 牛华
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products