Identity authentication method, device and system, terminal, server and storage medium

An identity authentication and server technology, applied in the field of image processing, can solve problems such as loss of user privacy or property, easy forgery or fraudulent use of documents, and cumbersome password input.

Inactive Publication Date: 2018-09-25
BEIJING KUANGSHI TECH +1
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two methods have certain disadvantages. The former requires the user to remember the password, and it is cumbersome to enter the password each time. Once the password is stolen by illegal elements, it will cause loss of privacy or property to the user. For the latter, Documents are easy to be forged or used fraudulently, and their security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system, terminal, server and storage medium
  • Identity authentication method, device and system, terminal, server and storage medium
  • Identity authentication method, device and system, terminal, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0230] In order to make the objects, technical solutions and advantages of the present invention more apparent, exemplary embodiments according to the present invention will be described in detail below with reference to the accompanying drawings. Apparently, the described embodiments are only some embodiments of the present invention, rather than all embodiments of the present invention, and it should be understood that the present invention is not limited by the exemplary embodiments described here. Based on the embodiments of the present invention described in the present invention, all other embodiments obtained by those skilled in the art without creative effort shall fall within the protection scope of the present invention.

[0231] In order to solve the above problems, embodiments of the present invention provide an identity authentication method and device. The identity authentication method and device combine personal identification information identification and fac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity authentication method, device and system, a terminal, a server and a storage medium. The method comprises steps of acquiring personal identifier information of a to-be-authenticated person; judging whether the personal identifier information is the authenticated information so as to acquire an information authentication result; acquiring a faceimage of the to-be-authenticated person; based on a face image, acquiring a living body detection result, wherein under the condition that a first detection result acquired in living body detection carried out by a local terminal based on a face image and a second detection result acquired in living body detection carried out by a server based on at least one part of the face image represent thatan authentication worker is a living body, the living body detection result is determined to be the result for representing the to-be-authenticated worker is a living body; and at least according to the information authentication result and the living body detection result, whether the identity of the to-be-authenticated worker is legal. According to the invention, by combining the authenticated information judgment and double living body detections, whether the identity of the to-be-authenticated worker is legal is determined.

Description

technical field [0001] The present invention relates to the field of image processing, and more particularly relates to an identity authentication method, device and system, as well as a terminal, a server and a storage medium. Background technique [0002] The socialization of the use of scientific and technological products has become a beautiful landscape of modern social life. People's clothing, food, housing and transportation are all closely related to science and technology. Scientific and technological products have gradually been applied to all aspects of social life and become an indispensable and important part of modern human daily life. However, while enjoying the benefits brought by scientific products, people also feel the negative problems it brings, such as information security issues. [0003] At present, information security issues are involved in many fields, especially in technical fields such as e-commerce, mobile payment, and bank account opening, wher...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V40/161G06V40/168G06V40/45
Inventor 敖翔
Owner BEIJING KUANGSHI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products