Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-counterfeiting method for network access living body authentication image of telecommunication user

A technology of living body authentication and living body image, applied in image data processing, image data processing, instruments, etc., can solve the problems of fixed encryption method and cracking by criminals, and achieve the effect of ensuring efficiency, strong performance, and ensuring security

Pending Publication Date: 2022-04-29
广西壮族自治区公众信息产业有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, its encryption method is too fixed, giving criminals the possibility of cracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-counterfeiting method for network access living body authentication image of telecommunication user
  • Anti-counterfeiting method for network access living body authentication image of telecommunication user
  • Anti-counterfeiting method for network access living body authentication image of telecommunication user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] An anti-counterfeiting method for live body authentication images of telecom users, comprising the following steps:

[0036] Step 1, the acquisition terminal acquires activation information and live images;

[0037] Step 2, inserting anti-counterfeiting data according to the activation information;

[0038] Step 3, the verifier verifies the anti-counterfeiting data;

[0039] Step 4, output the activation result.

Embodiment 2

[0041] An anti-counterfeiting method for live body authentication images of telecom users, comprising the following steps:

[0042] Step 1, the acquisition terminal acquires activation information and live images;

[0043] The activation information is an ID number; the live image can be acquired by a camera at the collection end.

[0044] Step 2, inserting anti-counterfeiting data according to the activation information;

[0045] The process of inserting anti-counterfeiting data according to the activation information includes:

[0046] 21) Place the live image in the viewfinder, the size of the viewfinder is x*y;

[0047] 22) Generate an anti-counterfeiting matrix according to the activation information;

[0048] 23) Find the coordinate pixel of the viewfinder frame and its surrounding 8 pixels;

[0049] 24) Change the color value of the 8 pixels around the frame coordinate pixel to add anti-counterfeiting.

[0050] Step 3, the verifier verifies the anti-counterfeiting ...

Embodiment 3

[0057] An anti-counterfeiting method for live body authentication images of telecom users, comprising the following steps:

[0058] Step 1, the acquisition terminal acquires activation information and live images;

[0059] The activation information is an ID number; the live image can be acquired by a camera at the collection end.

[0060] Step 2, inserting anti-counterfeiting data according to the activation information;

[0061] The process of inserting anti-counterfeiting data according to the activation information includes:

[0062] 21) Place the live image in the viewfinder, the size of the viewfinder is x*y;

[0063] 22) Generate an anti-counterfeiting matrix according to the activation information;

[0064] 23) Find the coordinate pixel of the viewfinder frame and its surrounding 8 pixels;

[0065] 24) Change the color value of the 8 pixels around the frame coordinate pixel to add anti-counterfeiting.

[0066] The specific process of generating the anti-counterfei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-counterfeiting method for a telecommunication user network access living body authentication image. The anti-counterfeiting method comprises the following steps that 1, an acquisition end acquires activation information and a living body image; step 2, inserting anti-counterfeiting data according to the activation information; 3, the verification end verifies the anti-fake data; and 4, outputting an activation result. According to the method, the user identity information and the picture are fused, the anti-fake data are embedded into the pixels of the picture under the condition that picture recognition and display are not affected, meanwhile, calculation is conducted in combination with a matrix collected by a camera, the performance is high, and safety and efficiency are guaranteed.

Description

technical field [0001] The invention belongs to the technical field of authentication image anti-counterfeiting, and in particular relates to an anti-counterfeiting method for live body authentication images of telecommunication users entering the network. Background technique [0002] At present, more than 70% of telecom users open their cards and access the network remotely. Generally, there are user self-activation or face-to-face activation by couriers. Even if the AI ​​technology is advanced and the verification is strict, there are still many cards that are defrauded. Molecular use, once the card is stolen or lost or forged, it will inevitably cause other people to hold the card for use or other behaviors, which will not only bring economic and reputation losses to the card owner, but also cause damage to the card issuer. Bringing economic and reputational losses, therefore, how to ensure the authenticity of the identity of the card issuer and the consistency of witnes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T1/0007
Inventor 唐继哲梁德成黄子君曾锦超
Owner 广西壮族自治区公众信息产业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products