Identity authentication method and device, computer equipment, storage medium and program product

A computer program and identity authentication technology, applied in the field of information security, can solve the problems of identity authentication and business handling process difficulties, and achieve the effect of facilitating identity authentication and business handling, improving work efficiency and improving accuracy

Pending Publication Date: 2022-07-26
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above method is more difficult for users with irregular heights to perform identity authentication and business processing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, computer equipment, storage medium and program product
  • Identity authentication method and device, computer equipment, storage medium and program product
  • Identity authentication method and device, computer equipment, storage medium and program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0055] It should be noted that the identity authentication method, device, computer equipment, storage medium and program product of this application can be applied in the field of information security technology, and can also be used in other technical fields except information security technology. The application fields of the apparatus, computer equipment, storage medium and program product are not limited.

[0056] First, before the technical solutions of the embodiments of the present application are introduced in detail, the technical background on which the embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, in particular to an identity authentication method and device, computer equipment, a storage medium and a program product. The method comprises the following steps: in response to an identity authentication request of a target user input in a bank terminal by a customer manager, obtaining a head position of the target user; the target user represents a user whose height is not matched with the installation position of the camera in the bank terminal; determining a target acquisition position according to the head position of the target user; according to the target collection position, controlling a camera to adjust a collection pose, and collecting a face image of the target user through the adjusted camera; the face of the target user is located at the central position of the view of the adjusted camera; and authenticating the identity of the target user based on the face image of the target user. By adopting the method, users with unconventional heights can conveniently carry out identity authentication and business handling.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to an identity authentication method, apparatus, computer equipment, storage medium and program product. Background technique [0002] With the continuous development of Internet technology, users need to perform identity authentication when using bank self-service terminals for business processing to ensure the accuracy of user identity. User identity authentication is mostly completed through face recognition. [0003] In the related art, the camera in the bank self-service terminal is set according to the normal height, and the camera is fixed at a fixed position of the bank self-service terminal to facilitate the user to perform identity authentication and business processing in the bank self-service terminal. However, the above method is difficult to perform identity authentication and business processing for users with unconventional heights. SUMM...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 王斌文易伟文常青刘西彦
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products