Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted identity authentication method and user terminal

A technology of identity authentication and identity authentication device, which is applied in the field of trusted identity authentication methods and user terminals, can solve the problems of reduced recognition accuracy, long collection time, and difficult management, etc., and achieves strong operability, suitable for promotion, The effect of solving the problem of real-name authentication

Inactive Publication Date: 2019-01-01
ANHUI JIYUAN SOFTWARE CO LTD +3
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. For most of the existing face recognition methods, illegal users can use the static face photos of legal users to pass the authentication, which brings a great security threat;
[0006] 2. When the existing face recognition method changes in the actual measurement environment, the recognition accuracy will be greatly reduced;
[0007] 3. The existing face recognition method requires centralized collection and database building of personnel information, which takes a long time to collect and is difficult to manage, and there is no authoritative third party to provide credible and unified certification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted identity authentication method and user terminal
  • Trusted identity authentication method and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with accompanying drawing:

[0033] Such as Figure 1-2 As shown, the trusted identity authentication method and user terminal of this embodiment include the following steps:

[0034] S1: Obtain the ID card number and face information of the ID card of the person to be authenticated, and obtain the facial image of the person to be authenticated through a camera device. Wherein, the obtained ID card information can be obtained through the ID card reader, and the obtained facial image can be obtained on-site or remotely through the camera device.

[0035] In order to be able to perform the next step normally, the acquired facial image should preferably have clear frontal facial information of the person to be authenticated, and the facial image should meet the interval between the eyes of 15-200 pixels, the facial expression should be normal, and there should be no strong backlight and obvious occlusion...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a trusted identity authentication method and a user terminal. An image capturing device for detecting and collecting face features is turned on, and a face image information is captured from the image capturing device according to preset face posture rules and illumination conditions. The corresponding ID card license information is obtained from the national resident identity information database of the Ministry of Public Security according to the ID card information; an action trajectory made by the user is extracted according to the action instruction; the selectedface image information and the motion trajectory are matched with the retrieved credential photo information and the randomly transmitted motion instruction, and the real name authentication of the user is performed according to the matching degree. The invention has strong operability, is suitable for pushing, and can well solve the real name authentication problem.

Description

technical field [0001] The invention relates to the field of security authentication, in particular to a trusted identity authentication method and a user terminal. Background technique [0002] In people's daily life, there are many occasions where user authentication is required, for example, the user needs to verify the user's identity when logging in to a website on the Internet, and the user needs to verify the user's identity when entering a specific area or a specific occasion. Traditional identity authentication mostly uses passwords, electronic certificates, keys, etc., which are difficult to carry around and easy to be stolen or lost, and cannot determine the real identity of users. Therefore, passwords are cracked and smart cards are stolen from time to time. , causing unnecessary losses to people's work and life. [0003] With the development of biometric technology in recent years, using biometric technology as one of the means of security authentication has be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00
CPCG06V40/172G06V20/30
Inventor 李玉蔡怡挺陈梦娴陈红梅范叶平马志程杨仕博杨德胜郭瑞祥靳丹杨波马冬尚守卫李翔宇张地操李节刘小明汤晓君赵林孙奉林郭政汪鹏
Owner ANHUI JIYUAN SOFTWARE CO LTD