CN110119606A - Identity data verification method, system and computer readable storage medium - Google Patents
Identity data verification method, system and computer readable storage medium Download PDFInfo
- Publication number
- CN110119606A CN110119606A CN201810120998.7A CN201810120998A CN110119606A CN 110119606 A CN110119606 A CN 110119606A CN 201810120998 A CN201810120998 A CN 201810120998A CN 110119606 A CN110119606 A CN 110119606A
- Authority
- CN
- China
- Prior art keywords
- electronic equipment
- server
- identity information
- verify data
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000013524 data verification Methods 0.000 title claims abstract description 23
- 230000001815 facial effect Effects 0.000 claims abstract description 65
- 238000012795 verification Methods 0.000 claims abstract description 14
- 238000004891 communication Methods 0.000 claims description 14
- 238000012360 testing method Methods 0.000 claims description 4
- 241001269238 Data Species 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 230000005764 inhibitory process Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Collating Specific Patterns (AREA)
Abstract
A kind of identity data verification method, system and computer readable storage medium provided by the invention.Identity data verification method is applied to identity data and verifies system.Wherein, the above method includes: and collects facial characteristics when the electronic equipment gets the identity information of requests verification and receive the verify data of input;The identity information, verify data and the facial characteristics are sent to the server by the electronic equipment;The server is based on the identity information, the verify data and the facial characteristics and carries out authentication;If authentication success, the server sending permission information to the corresponding electronic equipment, so that the electronic equipment obtains permission corresponding with the identity information.It is, pass through the raising safety of facial characteristics and verify data double verification, meanwhile, facial characteristics ensures the reliability of the data of acquisition with obtaining while verify data.
Description
Technical field
The present invention relates to field of information security technology, in particular to a kind of identity data verification method, system and meter
Calculation machine readable storage medium storing program for executing.
Background technique
The development of the communication technology, makes people's lives step into the information age.Information age is to people's lives
With convenience, for example, intelligentized attendance, gate inhibition and digitization transaction etc..But consequently also bring many security risks.
Wherein, information security directly influences the vital interests of user, becomes and is concerned the most and the highest peace of danger coefficient
Full hidden danger.It is a kind of method that can effectively improve information security coefficient using authentication, even if in this way, in the related technology
Authentication there is also many deficiencies, safety need further to improve.
Summary of the invention
The purpose of the present invention is to provide a kind of identity data verification method, system and computer readable storage mediums, use
To improve the above problem.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, being applied to identity data verifying system the embodiment of the invention provides a kind of identity data verification method
System, the identity data verifying system include electronic equipment and the server with electronic equipment communication connection, the method
It include: to collect facial characteristics when the electronic equipment gets the identity information of requests verification and receive testing for input
Demonstrate,prove data;The identity information, verify data and the facial characteristics are sent to the server by the electronic equipment;It is described
Server is based on the identity information, the verify data and the facial characteristics and carries out authentication;If authentication success,
The server sending permission information is to the corresponding electronic equipment, so that the electronic equipment obtains and the identity information
Corresponding permission.
Second aspect, the embodiment of the invention provides a kind of identity datas to verify system, and the identity data verifies system
Server including electronic equipment and with electronic equipment communication connection;The electronic equipment is tested for that ought get request
When the identity information of card, collects facial characteristics and receive the verify data of input;The electronic equipment, being also used to will be described
Identity information, verify data and the facial characteristics are sent to the server;The server is also used to based on the identity
Information, the verify data and the facial characteristics carry out authentication;The server, if being also used to authentication success,
Sending permission information is to the corresponding electronic equipment, so that the electronic equipment obtains power corresponding with the identity information
Limit.
The third aspect, the embodiment of the invention provides a kind of computer readable storage mediums, are stored thereon with computer and refer to
The step of order, those computer instructions realize above-mentioned identity data verification method when being executed by processor.
Compared with prior art, the embodiment of the invention provides a kind of identity data verification methods.In electronics in this method
When equipment gets the identity information of requests verification, collects facial characteristics and receive the verify data of input, and by servicing
Device is based on the identity information, the verify data and the facial characteristics and carries out authentication, makes after authentication success,
Sending permission information is to the corresponding electronic equipment, so that the electronic equipment obtains power corresponding with the identity information
Limit.It is, pass through the raising safety of facial characteristics and verify data double verification, meanwhile, facial characteristics and verify data
While obtain ensure acquisition data reliability.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the structural schematic diagram that a kind of identity data provided in an embodiment of the present invention verifies system.
Fig. 2 is a kind of schematic diagram of server provided in an embodiment of the present invention.
Fig. 3 is a kind of one of step flow chart of identity data verification method provided in an embodiment of the present invention.
Fig. 4 is the sub-step flow chart of step S101 in Fig. 3.
Fig. 5 is the two of a kind of step flow chart of identity data verification method provided in an embodiment of the present invention.
Fig. 6 is the three of a kind of step flow chart of identity data verification method provided in an embodiment of the present invention.
Icon: 100- server;200- electronic equipment;300- identity data verifies system;111- memory;112- processing
Device;113- communication unit.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It in the related technology, is a kind of method that can effectively improve information security coefficient by authentication, it is most common
Mode is to carry out permission to be encrypted.It needs to input password for example, bank withdraws cash, log in communication software and need to input password, logical
It crosses the card that brush includes identity data and passes through gate inhibition etc..The mode of rights encryption is also various, for example, numerical ciphers encrypt, sound is close
Code encryption, finger-print cipher encryption and recognition of face etc..Above-mentioned rights encryption can play a role, but single class rights encryption
It is all easy to be decrypted.Therefore, the present invention provides a kind of identity data verification method, system and computer readable storage medium,
For further increasing the safety of rights encryption.It should be noted that identity data authentication provided in an embodiment of the present invention
Method, system and computer readable storage medium are applicable not only to access control system, banking system, can also be applied to system etc. of registering
The field of permission is given after needing to confirm identity.
Referring to FIG. 1, identity data verifying system 300 provided in an embodiment of the present invention includes server 100 and at least one
A electronic equipment 200.Server 100 is connect with electronic equipment 200.Preferably, server 100 and 200 communication link of electronic equipment
It connects.
Above-mentioned electronic equipment 200 can be the terminal device with image collecting function.Electronic equipment 200100 can be
Desktop computer, laptop, tablet computer, smart phone, personal digital assistant (personal digital
Assistant, PDA), attendance record terminal, gate inhibition unlock terminal, ATM machine etc..
It referring to figure 2., is the block diagram of above-mentioned server 100.Server 100 includes memory 111, processor
112 and communication unit 113.
The memory 111, processor 112 and each element of communication unit 113 are directly or indirectly electrical between each other
Connection, to realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus or letter between each other
Number line, which is realized, to be electrically connected.The software for realizing identity data verification method includes that at least one can be with software or firmware
(Firmware) form is stored in the memory 111 or is solidificated in the operating system (Operating of server 100
System, OS) in software function module.The processor 112 is for executing the executable mould stored in the memory 111
Block.
Wherein, the memory 111 may be, but not limited to, random access memory (Random Access
Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable
Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only
Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only
Memory, EEPROM) etc..Wherein, memory 111 is for storing program or data.The communication unit 113 is for passing through institute
The communication connection that network is established between server 100 and other communication terminals is stated, and for passing through the network sending and receiving data.
It should be understood that structure shown in Fig. 2 is only the structural schematic diagram of server 100, server 100 may also include
The more perhaps less component or with the configuration different from shown in Fig. 3 than shown in Fig. 2.Each component shown in Fig. 2 can
To be realized using hardware, software, or its combination.
Referring to FIG. 3, Fig. 3 is a kind of flow chart for identity data verification method that present pre-ferred embodiments provide.It should
Identity data verification method is applied to identity data and verifies system 300.Above-mentioned identity data verification method the following steps are included:
Step S101 collects facial characteristics and reception when electronic equipment 200 gets the identity information of requests verification
To the verify data of input.
In embodiments of the present invention, the identity information of above-mentioned requests verification can be account information.Each account information with
Each registered users uniquely correspond to.The identity information mode that above-mentioned electronic equipment 200 gets requests verification can be according to answering
It is different with the difference of environment, for example, being applied to ATM system, then it can be the account information in ATM machine reading bank card.It answers
It then can be the account information etc. stored in door lock terminal recognition to access card for access control system.
As a kind of possible embodiment, as shown in figure 4, above-mentioned steps S101 can also include following sub-step:
Sub-step S1011, when the verifying of 200 acquisition request of electronic equipment identity information and monitor the input of verify data
When signal, starting facial characteristics acquisition.
Above-mentioned verify data can be the symbol combination inputted by the input-output unit of electronic equipment 200, fingerprint is known
The voiceprint that finger print information that other unit identifies, acoustic recognition unit identify.Above-mentioned symbol may include number, letter
Deng.
The input signal of above-mentioned verify data can be according to the letter generated when detecting user's starting validation information
Breath.For example, generation when detecting first symbol input according to input-output unit, fingerprint identification unit collect finger print information
Shi Shengcheng, generation or user, which pass through operation, when acoustic recognition unit collects voiceprint makes electronic equipment 200 enter verifying
It is generated when data input screen.
For convenience of explanation, in the present embodiment using the symbol combination that is inputted by input-output unit as verify data into
Row explanation.
Further, in the identity information of 200 acquisition request of electronic equipment verifying and when monitoring input signal, then start
Image acquisition units carry out facial image acquisition, and facial feature extraction is carried out in face-image from collecting.
Sub-step S1012, the electronic equipment 200 receive the verify data of input.
In embodiments of the present invention, it is special to carry out face when detecting user and starting to input verify data for electronic equipment 200
Sign obtains, but electronic equipment 200 has received verify data completely and obtained and had no absolute sequencing between facial characteristics.It is excellent
Selection of land, execution can be synchronized by obtaining verify data and obtaining facial characteristics.
The identity information, verify data and the facial characteristics are sent to institute by step S102, the electronic equipment 200
State server 100.
In embodiments of the present invention, electronic equipment 200 will be started obtain the identity information of verify data and facial characteristics, obtain
The verify data and facial characteristics taken is sent to server 100, so that server 100 is handled.
Step S103, server 100 are based on the identity information, the verify data and the facial characteristics and carry out identity
Verifying.
In embodiments of the present invention, it is verified according to identity information inquiry is pre-set with the matched decoding of the identity information
Data and decoding characteristic.Verify data is compared with decoding verify data, and by the facial characteristics and the solution
Code characteristic is compared.If the verify data and the decoding verify data compare successfully and the facial characteristics and institute
It states decoding characteristic to compare successfully, then authentication success.If the verify data and the decoding verify data compare mistake
It loses or the facial characteristics and the decoding characteristic compares failure, then authentication failure.
There are corresponding relationships for above-mentioned identity information and decoding verify data and decoding characteristic.Identity information is tested with decoding
Corresponding relationship existing for card data and decoding characteristic can be pre-stored in server 100.Each decoding verify data
Corresponding decoding characteristic.The mode of being stored in advance can be such that
After user's registration, corresponding unique identity information is obtained.Electronic equipment 200 shows that verify data configures boundary
Face reminds user to be decoded verify data input.Judge whether decoding verify data is effective according to preset rule.Example
Such as, it is more than 6 that preset rule, which is the number of characters of decoding verify data, then receives the decoding verify data of user's input
Number of characters when being more than 6, then show effectively.When received decoding verify data is judged not yet in effect, user is prompted to carry out face
Portion's Image Acquisition.After completing facial image acquisition, the face-image according to acquisition carries out facial feature extraction, and to extraction
Facial characteristics carries out Effective judgement.It is effective then using the facial characteristics as decoding characteristic, then restart face in vain
Image Acquisition.Decoding verify data and decoding characteristic binding will be obtained, then will decoding verify data and decoding characteristic
The server 100 that is sent to corresponding with identity information is stored.
As a kind of possible embodiment, each identity information can decode multiple groups verify data and decoding feature
Data.It is above-mentioned pre-set special with the matched decoding verify data of the identity information and decoding according to identity information inquiry
Sign data, which may is that, inquires the corresponding decoding verify data according to the identity information.According to the decoding verify data
Obtain corresponding decoding characteristic.
Step S104, if authentication success, the 100 sending permission information of server to the corresponding electronic equipment
200。
In embodiments of the present invention, above-mentioned authority information can be License Info.Electronic equipment 200 can be believed according to permission
Breath obtains permission corresponding with the identity information.
As a kind of possible embodiment, the corresponding permission of identity information can be preset by user.User can be with
Set the corresponding each group of decoding verify data of identity information permission corresponding with decoding characteristic.For example, being applied to ATM
When system, it is inquiry into balance that user setting, which decodes verify data A permission corresponding with decoding characteristic A, decodes verify data B
Permission corresponding with decoding characteristic B is inquiry into balance and withdrawal.If user passes through decoding verify data A and decoding feature
Data A has carried out identity information verifying, then the corresponding authority information of inquiry into balance is sent to electronic equipment 200 by server 100,
So that corresponding ATM machine obtains inquiry into balance permission, so that user carries out inquiry into balance operation using the ATM machine.
Further, as shown in figure 5, the identity data verification method can also include the following steps:
Step S201, if authentication fails, the server 100 sends re-examination and instructs to the electronic equipment 200.
In embodiments of the present invention, after authentication failure, the generation re-examination of server 100, which instructs and is sent to electronics, to be set
Standby 200.Electronic equipment 200 restarts the prompt of verifying according to the instruction display of above-mentioned re-examination.Electronic equipment 200 is again introduced into etc. waiting
Receive facial characteristics acquisition corresponding to the identity information and verify data.
Step S202, electronic equipment 200 repeat facial characteristics acquisition and receive the verify data of input again.
In embodiments of the present invention, repeat facial characteristics acquisition and receive the side of the verify data of input again
Facial characteristics is collected in formula and step S101 and to receive the mode of verify data of input identical, is repeated no more secondary.
The identity information, the facial characteristics of newest acquisition and verify data are sent to the clothes by step S203
Business device 100.
Step S204, the server 100 repeat based on the identity information, newest acquisition the facial characteristics and test
It demonstrate,proves data and carries out authentication, until authentication success.
In embodiments of the present invention, the mode of authentication and the mode phase that authentication is carried out in step S103 are carried out
Together, it is repeated no more secondary.
Further, the influence for safety identity data verified in order to avoid repeated attempt, also for making to invade
When power behavior, there is trackability.As shown in fig. 6, the method can also include:
Step S301, the server 100 count the read-around ratio of authentication failure corresponding with the identity information.
As an implementation, server 100 can be by counting the re-examination corresponding to the identity information continuously transmitted
Instruction, to determine the read-around ratio of authentication real scene shooting.Above-mentioned read-around ratio can be to the continuous of same identity information progress
Verifying number.
Step S302, if the read-around ratio is more than preset value, the server 100 starts alarm.
In embodiments of the present invention, the mode for starting alarm may is that server 100 will lose in the authentication each time
It loses the corresponding facial characteristics and is sent to the terminal bound with the identity information.Server 100 sends warning message to electricity
Sub- equipment 200 carries out locking mode to electronic equipment 200, is allowed to not operated.The electronic equipment 200 is according to the report
Alert information carries out locking mode.And starts alert mode and can be and blown a whistle, flashed.
It should be noted that with the identity information binding terminal can be bound when user registers contact end
End, for example, email address, mobile terminal etc..It can also be the storage server of default with the terminal of identity information binding
100。
The embodiment of the present invention also provides a kind of identity data verifying system 300 corresponded to the above method, in the system
Detail schema be referred to the above method to realize, it is specific as follows:
The electronic equipment 200, for collecting facial characteristics and reception when getting the identity information of requests verification
To the verify data of input;
The electronic equipment 200 is also used to for the identity information, verify data and the facial characteristics being sent to described
Server 100;
The server 100 is also used to carry out body based on the identity information, the verify data and the facial characteristics
Part verifying;
The server 100, if being also used to authentication success, sending permission information to the corresponding electronic equipment
200, so that the electronic equipment 200 obtains permission corresponding with the identity information.
The server 100 controls the display of electronic equipment 200 and restarts verifying if being also used to authentication failure
Prompt;
The electronic equipment 200 is also used to repeat the facial characteristics acquisition and receives the described of input again test
Demonstrate,prove data;
The electronic equipment 200 is also used to the identity information, the facial characteristics of newest acquisition and verify data
It is sent to the server 100;
The server 100 is also used to repeat based on the identity information, the facial characteristics of newest acquisition and verifying
Data carry out authentication, until authentication success.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
Specific work process, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
The embodiment of the present invention further discloses a kind of computer readable storage medium, is stored thereon with computer program, described
The identity data verification method that present invention discloses is realized when computer program is executed by processor 112.
In conclusion a kind of identity data verification method, system and computer readable storage medium provided by the invention.Institute
It states identity data verification method and verifies system applied to identity data.Identity data verifying system include electronic equipment and with
The server of the electronic equipment communication connection, which comprises when the electronic equipment gets the identity of requests verification
When information, collects facial characteristics and receive the verify data of input;The electronic equipment by the identity information, verifying number
According to and the facial characteristics be sent to the server;The server is based on the identity information, the verify data and institute
It states facial characteristics and carries out authentication;If authentication success, the server sending permission information to the corresponding electronics
Equipment, so that the electronic equipment obtains permission corresponding with the identity information.It is, passing through facial characteristics and verifying number
According to the raising safety of double verification, meanwhile, facial characteristics and obtain the data for ensuring acquisition while verify data can
By property.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of identity data verification method, which is characterized in that be applied to identity data and verify system, the identity data verifying
System includes electronic equipment and the server with electronic equipment communication connection, which comprises
When the electronic equipment gets the identity information of requests verification, collects facial characteristics and receive the verifying of input
Data;
The identity information, verify data and the facial characteristics are sent to the server by the electronic equipment;
The server is based on the identity information, the verify data and the facial characteristics and carries out authentication;
If authentication success, the server sending permission information to the corresponding electronic equipment, so that the electronics is set
It is standby to obtain permission corresponding with the identity information.
2. the method as described in claim 1, which is characterized in that the method also includes:
If authentication fails, the server sends re-examination and instructs to the electronic equipment, to be that the electronic equipment is shown
Restart the prompt of verifying;
The electronic equipment repeats the facial characteristics acquisition and receives the verify data of input again;
The identity information, the facial characteristics of newest acquisition and verify data are sent to the server;
The server repeats to test based on the identity information, the facial characteristics of newest acquisition and verify data progress identity
Card, until authentication success.
3. method according to claim 2, which is characterized in that after authentication failure, the method also includes:
The read-around ratio of server statistics authentication failure corresponding with the identity information;
If the read-around ratio is more than preset value, the server starts alarm.
4. method as claimed in claim 3, which is characterized in that the step of server starting alarm includes:
The server the corresponding facial characteristics of the authentication failure will be sent to and the identity information each time
The terminal of binding.
5. method as claimed in claim 3, which is characterized in that the step of server starting alarm includes:
The server sends warning message to the electronic equipment;
The electronic equipment carries out locking mode according to the warning message, and starts alert mode.
6. the method as described in claim 1, which is characterized in that when the electronic equipment gets the identity information of requests verification
When, it collects facial characteristics and includes: the step of receiving the verify data of input
When the identity information of electronic equipment acquisition request verifying and when monitoring the input signal of verify data, starting face
Collection apparatus;
The electronic equipment receives the verify data of input.
7. the method as described in claim 1, which is characterized in that the server is based on the identity information, the verifying number
According to and the facial characteristics carry out authentication the step of include:
The pre-set and matched decoding verify data of the identity information and decoding characteristic are inquired according to the identity information
According to;
The verify data is compared with the decoding verify data, and by the facial characteristics and the decoding characteristic
According to being compared;
If the verify data and the decoding verify data compare successfully and the facial characteristics and the decoding characteristic
It compares successfully, then authentication success;
If the verify data and the decoding verify data compare failure or the facial characteristics and the decoding characteristic
Failure is compared, then authentication fails.
8. the method for claim 7, which is characterized in that inquire the pre-set and identity according to the identity information
The step of decoding verify datas of information matches and decoding characteristic includes:
The corresponding decoding verify data is inquired according to the identity information;
Corresponding decoding characteristic is obtained according to the decoding verify data.
9. a kind of identity data verifies system, which is characterized in that the identity data verifying system include electronic equipment and with institute
State the server of electronic equipment communication connection;
The electronic equipment, for when getting the identity information of requests verification, collecting facial characteristics and receiving input
Verify data;
The electronic equipment is also used to the identity information, verify data and the facial characteristics being sent to the server;
The server is also used to carry out authentication based on the identity information, the verify data and the facial characteristics;
The server, if being also used to authentication success, sending permission information is to the corresponding electronic equipment, so that described
Electronic equipment obtains permission corresponding with the identity information.
10. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that those computer instructions
The step of claim 1 to identity data verification method described in any one of claim 8 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810120998.7A CN110119606A (en) | 2018-02-07 | 2018-02-07 | Identity data verification method, system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810120998.7A CN110119606A (en) | 2018-02-07 | 2018-02-07 | Identity data verification method, system and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110119606A true CN110119606A (en) | 2019-08-13 |
Family
ID=67519489
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810120998.7A Pending CN110119606A (en) | 2018-02-07 | 2018-02-07 | Identity data verification method, system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110119606A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555930A (en) * | 2019-08-30 | 2019-12-10 | 北京市商汤科技开发有限公司 | Door lock control method and device, electronic equipment and storage medium |
CN110753034A (en) * | 2019-09-27 | 2020-02-04 | 万翼科技有限公司 | Authority management method and related device |
CN110933100A (en) * | 2019-12-06 | 2020-03-27 | 广州国音智能科技有限公司 | Authority verification method, system and computer readable storage medium |
CN113017321A (en) * | 2021-02-09 | 2021-06-25 | 辽宁工程技术大学 | Triggering type rocking chair with learning function |
CN113076859A (en) * | 2021-03-31 | 2021-07-06 | 深圳供电局有限公司 | Safety monitoring method and system for face recognition, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120140993A1 (en) * | 2010-12-05 | 2012-06-07 | Unisys Corp. | Secure biometric authentication from an insecure device |
CN103268549A (en) * | 2013-04-24 | 2013-08-28 | 徐明亮 | Mobile payment verification system based on facial features |
CN105956451A (en) * | 2016-05-05 | 2016-09-21 | 长沙海川自动化设备有限公司 | Identity identification method and device for tower crane and construction hoist |
CN106713370A (en) * | 2016-05-11 | 2017-05-24 | 北京得意音通技术有限责任公司 | Identity authentication method, server and mobile terminal |
-
2018
- 2018-02-07 CN CN201810120998.7A patent/CN110119606A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120140993A1 (en) * | 2010-12-05 | 2012-06-07 | Unisys Corp. | Secure biometric authentication from an insecure device |
CN103268549A (en) * | 2013-04-24 | 2013-08-28 | 徐明亮 | Mobile payment verification system based on facial features |
CN105956451A (en) * | 2016-05-05 | 2016-09-21 | 长沙海川自动化设备有限公司 | Identity identification method and device for tower crane and construction hoist |
CN106713370A (en) * | 2016-05-11 | 2017-05-24 | 北京得意音通技术有限责任公司 | Identity authentication method, server and mobile terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555930A (en) * | 2019-08-30 | 2019-12-10 | 北京市商汤科技开发有限公司 | Door lock control method and device, electronic equipment and storage medium |
CN110753034A (en) * | 2019-09-27 | 2020-02-04 | 万翼科技有限公司 | Authority management method and related device |
CN110753034B (en) * | 2019-09-27 | 2021-10-15 | 万翼科技有限公司 | Authority management method and related device |
CN110933100A (en) * | 2019-12-06 | 2020-03-27 | 广州国音智能科技有限公司 | Authority verification method, system and computer readable storage medium |
CN113017321A (en) * | 2021-02-09 | 2021-06-25 | 辽宁工程技术大学 | Triggering type rocking chair with learning function |
CN113017321B (en) * | 2021-02-09 | 2024-02-02 | 辽宁工程技术大学 | Trigger formula rocking chair that possesses study function |
CN113076859A (en) * | 2021-03-31 | 2021-07-06 | 深圳供电局有限公司 | Safety monitoring method and system for face recognition, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110119606A (en) | Identity data verification method, system and computer readable storage medium | |
US11140155B2 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
KR102004840B1 (en) | Authentication in ubiquitous environment | |
US9589399B2 (en) | Credential quality assessment engine systems and methods | |
CN107026844B (en) | Enhance the user authen method of safety | |
CN106170793B (en) | System, method and apparatus for secure log | |
TWI706269B (en) | Service realization method and device | |
US20130068837A1 (en) | Mobile computing device authentication using scannable images | |
CN103907328A (en) | Mobile Device Based Authentication | |
CN105894616A (en) | Access Management System And Method | |
CN104318647A (en) | Access control system based on intelligent terminal and control method of access control system | |
CN108171137B (en) | Face recognition method and system | |
CN102111271A (en) | Network security authentication method and device, and handheld electronic device authentication method | |
CN109067881A (en) | Remote-authorization method and its device, equipment and storage medium | |
WO2021113022A1 (en) | Transferring a customer from an atm transaction to a device-based transaction during an error state, and applications thereof | |
CN109617703B (en) | Key management method and device, electronic equipment and storage medium | |
KR102601890B1 (en) | DID Access Certifying System by Using Smart Treminal and Method thereof | |
CN113395162B (en) | System and method for counting votes in an electronic voting system | |
CN107294981B (en) | Authentication method and equipment | |
KR101272349B1 (en) | User authentication method using plural one time password | |
EP2766860A1 (en) | Identity verification | |
US20160342996A1 (en) | Two-factor authentication method | |
Abdurohman et al. | Secure smart card reader for university presence system | |
WO2018226500A1 (en) | Biometric identification system and associated methods | |
CN107403080A (en) | Hide/show the method and terminal device of application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190813 |