Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity verification method and device and equipment

An identity verification method and image technology, applied in the field of images, can solve the problem of low security of identity verification, achieve the effect of improving safety and avoiding leakage

Active Publication Date: 2018-11-30
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the prior art, when the pre-stored image information in the terminal device is stolen, criminals can use the stolen image information to perform identity verification in the terminal device, resulting in relatively low security of the identity verification in the prior art. Low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device and equipment
  • Identity verification method and device and equipment
  • Identity verification method and device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0073] figure 1 Schematic diagram of the application scenarios provided by the embodiments of the present invention Figure 1 . See figure 1 , including a terminal device 101 on which a camera device A is disposed. Optionally, the terminal device 101 may be an access control terminal or the like. See figure 1 , in the registration proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity verification method and device and equipment. The method comprises the steps that partial coding processing is performed on a first image of a userto obtain first partial coding data of the first image, wherein the partial coding processing comprises filtering processing, data blocking processing and data block prediction processing; first feature information of the first image is extracted from the first partial coding data; pre-stored ciphertext data is decrypted to obtain second feature information, wherein the ciphertext data is data obtained after partial coding processing, feature extraction and data encryption processing are performed on a second image; and the first image is verified according to the first feature information and the second feature information. The identity verification method and device and the equipment are used for improving the security of user identity verification.

Description

technical field [0001] The embodiments of the present invention relate to the field of image technology, and in particular, to an identity verification method, device and equipment. Background technique [0002] Currently, in various application scenarios (eg, access control systems, payment systems, etc.), user images (eg, face images, etc.) can be used for identity verification. [0003] In the prior art, before the user's image can be used for authentication, registration is required. When the user registers, the terminal device (for example, the device corresponding to the access control system, the device corresponding to the payment system, etc.) acquires the image information of the user, and stores the image information of the user. When the user is authenticated, the terminal device collects the user's image information through the camera, and compares the collected image information with the pre-stored image information. If the similarity between the collected ima...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06F21/60G06K9/62
CPCG06F21/602G06V40/168G06V40/10G06V40/53G06F18/22
Inventor 毛建国杨安宁何睿闻一鸣刘昆乔爽爽韩超朱名发史纯华郭江亮李旭刘俊李硕尹世明
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD