Identity authentication method and apparatus, terminal device, and storage medium

A technology of identity authentication and ID card, which is applied in the fields of devices, terminal equipment and storage media, and identity authentication methods, can solve problems such as large manpower consumption, heavy audit workload, and uselessness, so as to enhance rigor, safety, and guarantee Legitimate interests, the effect of reducing labor costs

Pending Publication Date: 2019-03-29
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has caused a relatively large review workload for bank staff, and the bank needs to consume a lot of manpower
If there are wool parties or users who maliciously open accounts for fraud, many useless accounts will be generated, and the workload of bank staff will be increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and apparatus, terminal device, and storage medium
  • Identity authentication method and apparatus, terminal device, and storage medium
  • Identity authentication method and apparatus, terminal device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 1 It is a flow chart of the identity authentication method provided by Embodiment 2 of the present invention. According to different requirements, the execution sequence in the flowchart can be changed, and some steps can be omitted.

[0044] In this embodiment, the identity authentication method can be applied to a server, and the function for secure payment provided by the method of the present invention can be directly integrated on the electronic device, or a software development kit (Software Development Kit, SDK) runs on the server.

[0045] Such as figure 1 As shown, the identity authentication method specifically includes the following steps. According to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.

[0046] S1. Receive user identity information input from the outside.

[0047]In this embodiment, the user identity information input from the outside may be received through the input and ...

Embodiment 3

[0093] image 3 It is a functional block diagram of a preferred embodiment of the identity authentication device of the present invention.

[0094] In some embodiments, the identity authentication device 30 runs in a terminal device. The identity authentication device 30 may include a plurality of functional modules composed of program code segments. The program codes of each program segment in the identity authentication device 30 can be stored in a memory, and executed by at least one processor to execute (see figure 1 and its related description) identity authentication function.

[0095] In this embodiment, the identity authentication device 30 can be divided into multiple functional modules according to the functions it performs. The functional modules may include: a receiving module 301 , an acquiring module 302 and a confirming module 303 . The module referred to in the present invention refers to a series of computer program segments that can be executed by at leas...

Embodiment 4

[0141] Figure 4 It is a schematic diagram of a terminal device provided in Embodiment 4 of the present invention.

[0142] The terminal device 4 includes: a communication unit 41 , a memory 42 , at least one processor 43 , a computer program 44 stored in the memory 42 and executable on the at least one processor 43 , and at least one communication bus 45 .

[0143] When the at least one processor 43 executes the computer program 44, the steps in the above embodiment of the method for intelligently recognizing pictures are realized.

[0144] Exemplarily, the computer program 44 may be divided into one or more modules / units, and the one or more modules / units are stored in the memory 42 and executed by the at least one processor 43, To complete the present invention. The one or more modules / units may be a series of computer program instruction segments capable of accomplishing specific functions, and the instruction segments are used to describe the execution process of the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An identity authentication method includes receiving externally inputted user identity information, wherein the user identity information includes a name and an identity card number; acquiring a photograph of the user holding an identity card, wherein the photograph comprises positive information of the identity card and facial information of the user; and confirming whether the user is qualifiedaccording to the received user identity information and the obtained photograph, and receiving an account opening application when the user is confirmed to be qualified. The invention also provides anidentity authentication device, a terminal device and a storage medium. The invention authenticates the user identity based on the face recognition and the OCR recognition, which can obviously enhance the rigor and the security of the user opening an account, and protects the legitimate interests of the user and the bank.

Description

technical field [0001] The present invention relates to the technical field of image recognition, in particular to an identity authentication method, device, terminal equipment and storage medium. Background technique [0002] When a user goes to a bank to open a bank account, real-name authentication is required. Specifically, the user needs to upload the front image of the ID card and the image of the user holding the ID card, and also needs the user to input ID card information. Then the bank staff conducts a manual review in the back management system to screen out users whose ID card information is inconsistent with the ID card picture, and screen out pictures in which the face image in the user's hand-held ID card is different from the user's own face image. This method has caused a relatively large review workload for bank staff, and the bank needs to consume a lot of manpower. If there are wool parties or users who maliciously open accounts for fraud, many useless ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06Q40/02
CPCG06Q40/02G06V40/172G06V20/10
Inventor 张振兴
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products