Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and system

An authentication method and document technology, applied in the field of authentication and systems, can solve the problems of time-consuming data marking tasks and difficult detection of special patterns.

Pending Publication Date: 2021-02-26
ALIPAY LABS SINGAPORE PTE LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have some limitations
First, the data labeling task is time-consuming
Second, in some cases, special patterns such as moiré patterns observed on electronic displays are difficult to detect due to the high resolution of the display

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system
  • Authentication method and system
  • Authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Embodiments will be described, by way of example only, with reference to the accompanying drawings. The same reference numerals and symbols in the drawings indicate the same elements or equivalents.

[0016] Some portions of the following description are presented either explicitly or implicitly in terms of algorithms and functions or symbolic representations of operations on data within a computer memory. These algorithmic descriptions and functional or symbolic representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. Here, an algorithm is generally thought of as a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulation of physical quantities, such as electrical, magnetic or optical signals, capable of being stored, transferred, combined, compared and otherwise manipulated.

[0017] Unless expressly sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity certificate (ID) file authentication method and system are provided herein. The method includes: receiving an image of an ID file, where the image is captured when a flash lamp is projected onto either (i) the ID file or (ii) an electronic display of the ID file; generating an authentication score associated with the image using a convolutional neural network (CNN), wherein the convolutional neural network is trained with training data, the training data comprises an image of an ID file captured when the flash lamp is projected onto each ID file and an image of an electronic display captured when the flash lamp is projected onto the electronic display of each ID file; and authenticating the ID file based on a comparison between the authentication score and a predetermined threshold.

Description

technical field [0001] This document relates broadly, but not exclusively, to identification document authentication methods and identification document authentication systems. Background technique [0002] Electronic Know Your Customer (eKYC) is a digital due diligence process performed by a business entity or service provider to verify the identity of its customers to prevent identity fraud. The eKYC process usually includes a series of checks to verify the identity of the client during the initial stages of establishing a relationship with the client. Many eKYC processes involve potential customers submitting copies of their official identification (ID) documents, e.g. national identity cards, driver's licenses, passports, etc. Submissions can then be analyzed to verify the client's identity. [0003] In a typical eKYC process, customers are asked to take a photo of their ID document. However, some attackers can use fraudulent ID documents or high-resolution copies of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06N3/04G06N3/08
CPCG06F21/36G06N3/08G06N3/045
Inventor 黄江波
Owner ALIPAY LABS SINGAPORE PTE LTD