CN106204048B - Identity security verifies review method - Google Patents
Identity security verifies review method Download PDFInfo
- Publication number
- CN106204048B CN106204048B CN201610511057.7A CN201610511057A CN106204048B CN 106204048 B CN106204048 B CN 106204048B CN 201610511057 A CN201610511057 A CN 201610511057A CN 106204048 B CN106204048 B CN 106204048B
- Authority
- CN
- China
- Prior art keywords
- certificate
- information
- review
- veritified
- real
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to technical field of the computer network, verify review method more particularly, to a kind of identity security.It solves the technical problems such as existing authentication review safety is low.This method includes the following steps: A, review guidance;B, solicited message is checked in acquisition and transmission in real time;C, backstage review verifying.The present invention has the advantages that easy to operate, identity review verifying can rapidly be carried out, it is highly-safe, need the certificate information used when veritifying certificate information with authentication in review solicited message in real time identical or the same certificate holder of certificate information direction used when veritifying certificate information and authentication, and the real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified morphological requirements without departing from setting error range, identity security verifying could check successfully, picture and video information containing identity information are avoided to carry out authentication and ensure that composite authentication holds the identity information by person.
Description
Technical field
The invention belongs to technical field of the computer network, are related to information and Technology On Data Encryption, more particularly, to a kind of body
Part safety verification checks method.
Background technique
In network technique field, user carries out authentication usually using identification documents, and authentication information is deposited
It is stored in server.It is general when the business operation that user enters requirement progress identity security review needs to carry out identity security verifying
Store-through is process is too complicated, the more low technical problem of not convenient enough and safety.In addition, some safety verification processes are using
When not too much meet terminal user's behavioural habits;And the network terminal using cell-phone number etc. do user name registration account there are users
Identity uniqueness major safety risks problem after name is subjective or odjective cause changes hands.Some users may be because of some special originals
Cause loses the control of account or has forgotten account name and password etc., there are security hidden trouble when registering new account again,
These user names change hands or lose the case where account's control, and security risk particularly may be divided into following a few classes: 1, account user is weighed
Beneficial safety --- the various functions of account cannot reuse, and acquired equity is unable to get guarantee in account.2, Zhang Huye
Data safety --- the business datum generated in account's use process is lost together with account for business.3, account's private data is pacified
Entirely --- private data present in account may cause personal secrets.4, account's valuable data safety --- if related in account
And when arriving virtual value object or closing balance, there are security risks.Therefore, accuracy, the peace of identity review verifying how to be improved
Full property and convenience have become network identity review verifying urgent problem.
Of the existing technology in order to solve the problems, such as, people have carried out long-term exploration, propose miscellaneous solution
Scheme.For example, Chinese patent literature disclose a kind of network checking method for identity card validation [application number:
200710017019.7], by being equipped with the identity card identification terminal and dedicated network of online checking management software, realize to a
The verifying online checking of the authenticity of the identity card of people client, the method and step for verifying online checking is: starting;Open identification eventually
End starts management software;Identification terminal has detected whether identity card, if there is identity card, identification terminal reading identity card information is simultaneously
Photo and relevant information are shown on identification terminal screen;Identification terminal forwards the request to Ministry of Public Security's population information database;
The database is verified, and will be verified result and is fed back to identification terminal;The body of requests verification is shown on identification terminal screen simultaneously
Part license piece, relevant information, and Ministry of Public Security's population information database feed back to the verification result after the verification of identification terminal, shine
Piece and relevant information;Verifying terminates and verifying next time is waited to verify.
Above scheme solves existing authentication checking device to a certain extent networks online and verifies to identity
The problem of review, but at least there are following problems in the program: real-time timeliness when one, due to submitting for identity document exists
It is not limited technically, not can avoid using only information such as the picture containing identity information or videos and carry out authentication,
It is unable to ensure the problem of whether verifying identity person really holds the identity document, safety is low.Two, it needs to access Ministry of Public Security's population
The dedicated networks such as information database are easy to adversely affect the safety of dedicated network, and cost of access is high, needs specially
With equipment, it is difficult to promote and apply.
Summary of the invention
Regarding the issue above, the present invention provides a kind of easy to operate, highly-safe identity security verifying is multiple
Kernel method.
In order to achieve the above objectives, present invention employs following technical proposals: this identity safety verification checks method, feature
It is, this method includes the following steps:
A, review guidance: background server generate review guidance information and send to corresponding terminal with guide user according to
Certificate to be veritified is placed in terminal according to the form of the review guidance information requirement by review guidance information can collect information
Real-time pickup area;
B, obtain real time information: terminal acquisition contains the reality for needing to be veritified certificate information and the real-time shape information of certificate to be veritified
Shi Fuhe verification information, and real-time review verification information is sent to background server;
C, backstage review verifying: background server is according to real-time review verification information, review guidance information for wait veritify
Certificate information used is veritified when certificate morphological requirements and authentication;
If in real time review verification information in the certificate information used when veritifying certificate information with authentication it is identical or to
Veritify certificate information direction used same certificate holder when certificate information and authentication, and the real-time form of certificate to be veritified
Information and review guidance information for certificate to be veritified morphological requirements without departing from the error range of setting, then identity security is verified
It checks successfully;
If certificate information used is different when review verification information is from authentication in real time and certificate information to be veritified and identity
Certificate information used cannot be directed toward same certificate holder when certification, and/or the real-time shape information of certificate to be veritified draws with review
It leads information and treats the morphological requirements for veritifying certificate beyond the error range of setting, then identity security verifying review failure.
In order to improve safety, further promotes the requirement to verifying timeliness and be necessary.For this purpose, raw in background server
After being transmitted to corresponding terminal at review guidance information or review guidance information, background server and/or corresponding terminal start
Timing, corresponding terminal does not acquire review verification information and/or background server in real time and does not receive accordingly within the set time
The real-time review verification information of terminal, then background server terminates this identity security verifying review or straight to corresponding terminal
It connects and determines identity security verifying review failure.
In above-mentioned identity security verifying review method, the review guidance information include picture, video, audio,
The combination of any one or more in text, review guidance data sequence.
In above-mentioned identity security verifying review method, the review guidance data sequence is being transferred into corresponding end
The information formation that can be recognized by user and/or the review guidance data sequence are converted on backstage by terminal behind end
Server is converted into that corresponding terminal can be transferred into after the information formation of user's cognition.
In above-mentioned identity security verifying review method, the real-time review verification information is obtained by the camera of terminal
Take and be the combination of any one in picture and video or both, the terminal will check verification information submission in real time automatically
Background server is submitted to background server or after user confirms.
In above-mentioned identity security verifying review method, the real-time review verification information is converted into checking by terminal
It is sent to background server after verify data sequence or the real-time review verification information is sent to background service by terminal
Review verify data sequence is converted by background server after device.
In above-mentioned identity security verifying review method, form of the review guidance information for certificate to be veritified
Require to include inclination angle of the certificate to be veritified in the camera viewfinder area, certificate to be veritified is found a view area in the camera
It is any one the location of in domain, in plane where certificate to be veritified and the angle between the camera lens central axes of the camera
Kind or a variety of combinations;The real-time shape information of certificate to be veritified includes certificate to be veritified in the camera viewfinder area
In real-time inclination angle, certificate to be veritified real time position locating in the camera viewfinder area, wait where veritifying certificate
The combination of any one or more in real-time angle between plane and the camera lens central axes of the camera;When review guides
When information includes the combination of any one or more in the inclination angle, position and angle, the certificate to be veritified is real-time
Shape information accordingly includes the combination of any one or more in the real-time inclination angle, real time position and real-time angle;
And when review guidance information constituent element corresponding with the real-time shape information of certificate to be veritified is without departing from the error range of setting
When, the real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified morphological requirements without departing from setting mistake
Poor range, otherwise the real-time shape information of certificate to be veritified exceeds with morphological requirements of the review guidance information for certificate to be veritified and sets
Fixed error range.
In above-mentioned identity security verifying review method, the review guidance information further includes that certificate to be veritified is put
The safety identification background information set;The real-time shape information of certificate to be veritified further includes the real-time background letter of certificate to be veritified
Breath;When error range and review guidance letter of the safety identification background information with the real-time background information of certificate to be veritified without departing from setting
Breath and wait veritify the real-time shape information of certificate other constituent elements without departing from the error range of setting when, certificate to be veritified is real-time
Shape information and review guidance information for certificate to be veritified morphological requirements without departing from setting error range, otherwise wait veritify
The real-time shape information of certificate and review guidance information exceed the morphological requirements of certificate to be veritified the error range of setting.
In above-mentioned identity security verifying review method, the safety identification background information include human body part or
Any one or combinations thereof in whole, indoor article, outdoor items and hand-made article;The certificate to be veritified is real-time
Shape information accordingly includes any one in some or all of human body, indoor article, outdoor items and hand-made article
Or combinations thereof.For example, safety identification background information here can be some position of human body, for example, palm, arm equipotential
It sets, also may include the indoor articles such as books, daily necessities, outdoor items and any one or its group in hand-made article
It closes.
In above-mentioned identity security verifying review method, the background server according to check in real time verification information,
Guidance information is checked for certificate information used when veritifying certificate morphological requirements and authentication, passes through Computing
Carry out identity security verifying review and/or by manually carrying out identity security verifying review.
In above-mentioned identity security verifying review method, the background server is in the veritification request for receiving terminal
It is random afterwards to generate review guidance information.
Compared with prior art, this identity safety verification review method the advantages of be: it is easy to operate, can rapidly into
Row identity review verifying, it is highly-safe, need in real time check solicited message in wait veritify certificate information and authentication when institute
It is identical or be directed toward same certificate holder wait veritify certificate information and when authentication certificate information used with certificate information, and
The real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified morphological requirements without departing from setting error
Range, identity security verifying, which could check, successfully to be avoided the picture containing identity information and video information and tests to carry out identity
Demonstrate,prove and ensure that the review person of being verified holds the identity information.
Detailed description of the invention
Fig. 1 is 1 flow chart of embodiment provided by the invention.
Fig. 2 is 2 flow chart of embodiment provided by the invention.
Fig. 3 is structural block diagram provided by the invention.
Fig. 4 is the schematic diagram that certificate to be veritified is acquired when no background provided by the invention checks guidance information.
Fig. 5 is that certificate to be veritified is placed on the signal on cigarette case when indoor article provided by the invention checks guidance information
Figure.
Fig. 6 is that certificate to be veritified is placed on the signal on pencil when indoor article provided by the invention checks guidance information
Figure.
Fig. 7 is that certificate to be veritified is placed on the signal on magazine when indoor article provided by the invention checks guidance information
Figure.
Fig. 8 is that certificate to be veritified is placed on the paper for being decorated with straight line when indoor article provided by the invention checks guidance information
Schematic diagram on.
Fig. 9 acquires the signal of certificate to be veritified when being the review guidance information of some or all of human body provided by the invention
Figure.
Figure 10 is provided by the invention using circle as referential error judgment schematic diagram.
Figure 11 is provided by the invention error judgment schematic diagram when by rectangular partition being several equal portions from top to bottom.
Figure 12 is provided by the invention error judgment schematic diagram when by rectangular partition being several equal portions from left to right.
Rectangle is divided into several equal portions being obliquely installed to be provided by the invention to be parallel to cornerwise straight line by Figure 13
When error judgment schematic diagram.
In figure, terminal 1, background server 2, camera 3, certificate to be veritified 4.
Specific embodiment
The present invention will be further described in detail with reference to the accompanying drawings and detailed description.
Embodiment 1:
As shown in figs. 1 and 3, this identity safety verification checks method, includes the following steps:
A, review guidance: background server 2 generates review guidance information and sends corresponding terminal 1 to guide user's root
Certificate 4 to be veritified, which is placed in terminal 1 according to the form of the review guidance information requirement, according to review guidance information to collect
The real-time pickup area of information;B, obtain real time information: the acquisition of terminal 1 is containing needing to be veritified certificate information and certificate to be veritified is real-time
The real-time review verification information of shape information, and real-time review verification information is sent to background server 2;C, backstage review is tested
Card: background server 2 is according to real-time review verification information, review guidance information for 4 morphological requirements of certificate to be veritified, Yi Jishen
Certificate information used is veritified when part certification;If in real time in review verification information wait veritify certificate information and when authentication
Certificate information used is identical or is directed toward same certificate holder wait veritify certificate information and when authentication certificate information used, and
And the real-time shape information of certificate to be veritified and review guidance information for certificate 4 to be veritified morphological requirements without departing from setting mistake
Poor range, then identity security verifying are checked successfully;If certificate information used is different when review verification information is from authentication in real time
And it cannot be directed toward same certificate holder wait veritify certificate information and when authentication certificate information used, and/or wait veritify card
The real-time shape information of part and review guidance information treat error range of the morphological requirements beyond setting of veritification certificate 4, then identity
Safety verification review failure.
In order to improve safety, further promotes the requirement to verifying timeliness and be necessary.For this purpose, raw in background server
After being transmitted to corresponding terminal at review guidance information or review guidance information, background server and/or corresponding terminal start
Timing, corresponding terminal does not acquire review verification information and/or background server in real time and does not receive accordingly within the set time
The real-time review verification information of terminal, then background server terminates this identity security verifying review or straight to corresponding terminal
It connects and determines identity security verifying review failure.
Wherein, review guidance information here includes picture, video, audio, text, checks appointing in guidance data sequence
It anticipates one or more combinations, i.e., be converted into after being transferred into corresponding terminal 1 by terminal 1 can be by for review guidance data sequence
The information formation of user's cognition and/or the review guidance data sequence are converted into be used in background server 2
It is transferred into corresponding terminal 1 after the information formation of person's cognition, real-time review verification information here is obtained by the camera 3 of terminal 1
Take and be the combination of any one in picture and video or both, the terminal 1 automatically proposes real-time review verification information
It gives background server 2 or submits to background server 2 after user confirms, wherein real-time review verification information here
By terminal 1 be converted into review verify data sequence after be sent to background server 2 or the real-time review verification information by
Terminal 1 is sent to after background server 2 and is converted into review verify data sequence by background server 2.
That is, review guidance information here includes that certificate 4 to be veritified exists for the morphological requirements of certificate 4 to be veritified
Inclination angle, certificate to be veritified 4 in 3 viewfinder area of camera the location of in 3 viewfinder area of camera, to
Veritify the combination of any one or more in the angle between 4 place plane of certificate and the camera lens central axes of the camera 3;
The real-time shape information of certificate to be veritified includes real-time inclination of the certificate 4 to be veritified in 3 viewfinder area of camera
Angle, certificate to be veritified 4 real time position locating in 3 viewfinder area of camera, 4 place plane of certificate to be veritified with it is described
The combination of any one or more in real-time angle between the camera lens central axes of camera 3;When review guidance information includes
When the combination of any one or more in the inclination angle, position and angle, the real-time shape information of certificate to be veritified
It accordingly include the combination of any one or more in the real-time inclination angle, real time position and real-time angle;That is,
Deviation angle is determined by the X of the camera 3 of terminal 1, Y-axis, and when review guidance information and the real-time form of certificate to be veritified
The corresponding constituent element of information without departing from the error range of setting when, the real-time shape information of certificate to be veritified and review guidance letter
Cease the morphological requirements for certificate 4 to be veritified without departing from the error range of setting, otherwise the real-time shape information of certificate to be veritified with
Guidance information is checked for the morphological requirements of certificate 4 to be veritified beyond the error range of setting, wherein background server here
2 bases check verification information, review guidance information for used when veritifying 4 morphological requirements of certificate and authentication in real time
Certificate information is carried out identity security verifying review and/or is passed through manually to carry out identity security verifying review by Computing,
Background server 2 generates review guidance information after the veritification request for receiving terminal 1 at random.
Further, review guidance information here further includes the safety identification background letter that certificate 4 to be veritified is placed
Breath;The real-time shape information of certificate to be veritified further includes the real-time background information of certificate 4 to be veritified;When safety identification background letter
Breath with the real-time background information of certificate 4 to be veritified without departing from the error range of setting and check guidance information and certificate to be veritified it is real-time
Shape information other constituent elements without departing from the error range of setting when, the real-time shape information of certificate to be veritified and review guide
Information for certificate 4 to be veritified morphological requirements without departing from the error range of setting, the otherwise real-time shape information of certificate to be veritified
With review guidance information the morphological requirements of certificate 4 to be veritified are exceeded with the error range of setting.Preferably, safety here is known
Other background information include some or all of human body, indoor article, outdoor items and any one in hand-made article or
A combination thereof;The real-time shape information of certificate to be veritified accordingly includes some or all of human body, indoor article, outdoor object
Any one or combinations thereof in product and hand-made article.
For example, as shown in figure 4, review guidance information here checks guidance information for no background, i.e., by by terminal 1
The X of camera 3, Y-axis determine the deviation angle of certificate 4 to be veritified.
As viewed in figures 5-8, review guidance information here is the review guidance information that background information is identified with safety, i.e.,
Checking guidance information prompts verifier by indoor article, e.g., cigarette case mobile phone paper chopsticks etc., to determine certificate to be veritified
4 deviation angles, for example in Fig. 5, certificate 4 to be veritified is placed on cigarette case, certificate 4 to be veritified is placed on chopsticks in Fig. 6,
Certificate 4 to be veritified is placed on magazine in Fig. 7, certificate 4 to be veritified is placed on the paper for being decorated with straight line in Fig. 8.
As shown in figure 9, review guidance information here is the review guidance information of some or all of human body, i.e., here
Safety identification background information can be human body itself: borrow some or all of human body to determine deviation angle, e.g., palm arm
Foot head and shoulder thigh etc., such as certificate 4 to be veritified is placed on palm.
In addition, safety identification background information can also be outdoor items: determining deviation angle by outdoor article, such as
Brick trees flowers and plants line bar automobile or automobile component building or building component etc., it is hand-made: by easy manual mode
Background is made to do the angle recognition deviated.
In the present embodiment, certificate information is often referred to be documented in the text information on certificate, can also be certainly and is documented in card
Information on part chip, if certificate information be certificate chip on information, by setting at the terminal can read certificate
The readout means reads of chip information take certificate information.
In the present embodiment, error range is set as needed, if wanting to improve the precision checked, by error range setting
It is smaller, if wanting to reduce the precision checked, by the larger of error range setting.As shown in Figure 10, using circle as referential, by this
Circle is divided into several equal portions, each equal portions is numbered in sequence, i.e. x0, x1, x2 ...;Box represents certificate 4 to be veritified in figure.
Choose reference line of the radius of the circle where the starting point of any one equal portions as setting, 4 length direction of certificate to be veritified
Central axes when being overlapped with reference line, represent certificate 4 to be veritified and be placed on normal place, and 4 length direction of certificate to be veritified
When forming angle between central axes and reference line, representing between certificate 4 to be veritified and normal place has error.Set the mistake allowed
Poor range is the equal portions of natural number, then representing when being more than the equal portions allowed is more than setting error range.Obviously, the equal portions of division are got over
It is more, veritification precision can be improved.As shown in figure 11, be several equal portions from top to bottom by rectangular partition, in figure box represent to
Veritify certificate 4.The normal place that one of equal portions are placed as certificate 4 to be veritified is chosen, is set when certificate 4 to be veritified is placed on
When in fixed equal portions, when representing certificate 4 to be veritified and be placed on normal place, and being placed in other equal portions wait veritify certificate 4, generation
There is error between table certificate 4 to be veritified and normal place.It as shown in figure 12, is several equal portions from left to right by rectangular partition,
Remaining is similar with the deterministic process of Figure 11.As shown in figure 13, rectangle inclination is divided into be parallel to cornerwise straight line to set
Several equal portions set, remaining is similar with the deterministic process of Figure 11 and Figure 12.
In the present embodiment, carrying out first carrying out identity security verifying review between specific business operation, at this point, terminal 1 to
Background server 2, which is sent, veritifies request, and background server 2 generates review guidance after the veritification request for receiving terminal 1 at random
Information.Then it carries out veritifying identity security verifying review.If identity security verifying is checked successfully, carry out entering specific business behaviour
Make process;If identity security verifying review failure, cannot be introduced into specific business operation process.
In actual use, this identity safety verification review method can be used in following several situations:
1, the remaining sum in the Account Response account of authentication is withdrawn deposit safely;
2, the Account Response of authentication uses the valuable virtual objects in account, ideal money, closing balance etc.;
3, the account of authentication after losing account's control (such as cell-phone number changes hands, password loss, account name lose
Deng), it has registered new account and requires to shift the data etc. of former account;
4, the account of authentication is when request is using some important service function;
5, the account of authentication is when request is using the function of having identity authority limitation to require.
Such as the user of cell-phone number registration:
Account title: 13888888888
Closing balance: 200 yuan
Business datum: 3000
Authentication: identity card picture uploads and the mode authentication of ID card No. binding;
User has replaced cell-phone number, loses the right to use to former cell-phone number;
User has registered account using the cell-phone number of replacement;
Other users have been multiplexed this cell-phone number again, and give the control that password succeeds and obtains account for change again
Former account title: after 13888888888 user replaces new cell-phone number 13999999999:
Account title: 13999999999
Authentication: prompt authentication ids mistake, it is desirable that use business datum safe transfer;
It is proved to be successful: by data from the new cell-phone after safe transfer to replacement cell-phone number in the account before replacement cell-phone number
In account.
Embodiment 2:
As shown in Fig. 2, the present embodiment, it is multiple that identity security verifying is carried out when specific business operation proceeds to final step again
Core, at this point, terminal 1 to background server 2 send veritify request, background server 2 receive terminal 1 veritification request after with
Machine generates review guidance information.Then it carries out veritifying identity security verifying review.If identity security verifying is checked successfully, specifically
Business operation success;If identity security verifying review failure, specific business operation failure.Remaining is similar with embodiment 1, no
It repeats.
Specific embodiment described herein is only an example for the spirit of the invention.The neck of technology belonging to the present invention
The technical staff in domain can make various modifications or additions to the described embodiments or replace by a similar method
In generation, however, it does not deviate from the spirit of the invention or beyond the scope of the appended claims.
Although the terms such as terminal 1, background server 2, camera 3, certificate to be veritified 4 are used more herein, simultaneously
A possibility that being not excluded for using other terms.The use of these items is only for be more convenient to describe and explain sheet of the invention
Matter;Being construed as any additional limitation is disagreed with spirit of that invention.
Claims (7)
1. a kind of identity security verifies review method, which is characterized in that this method includes the following steps:
A, review guidance: background server (2) generates review guidance information and sends corresponding terminal (1) to guide user's root
Certificate to be veritified (4), which is placed in terminal (1) according to the form that the review guidance information requires, according to review guidance information to adopt
Collect the real-time pickup area of information;
B, obtain real time information: terminal (1) acquisition contains the reality for needing to be veritified certificate information and the real-time shape information of certificate to be veritified
Shi Fuhe verification information, and real-time review verification information is sent to background server (2);
C, backstage review verifying: background server (2) is according to review verification information, review guidance information in real time for wait veritify card
Certificate information used is veritified when part (4) morphological requirements and authentication;
If the certificate information used when veritifying certificate information with authentication in real time in review verification information is identical or wait veritify
Certificate information direction used same certificate holder when certificate information and authentication, and the real-time shape information of certificate to be veritified
With review guidance information for certificate to be veritified (4) morphological requirements without departing from the error range of setting, then identity security is verified
It checks successfully;
If certificate information used is different when review verification information is from authentication in real time and certificate information to be veritified and authentication
Shi Suoyong certificate information cannot be directed toward same certificate holder, and/or the real-time shape information of certificate to be veritified and review guidance letter
Breath treats the morphological requirements for veritifying certificate (4) beyond the error range of setting, then identity security verifying review failure;
The review guidance information includes certificate to be veritified (4) in camera (3) for the morphological requirements of certificate to be veritified (4)
Inclination angle, certificate to be veritified (4) in viewfinder area are demonstrate,proved the location of in the camera (3) viewfinder area, wait veritify
The combination of any one or more in angle where part (4) between plane and the camera lens central axes of the camera (3);Institute
The real-time shape information of certificate to be veritified stated includes certificate to be veritified (4) inclining in the camera (3) viewfinder area in real time
It is flat where oblique angle, certificate to be veritified (4) real time position locating in the camera (3) viewfinder area, certificate to be veritified (4)
The combination of any one or more in real-time angle between face and the camera lens central axes of the camera (3);When review is drawn
When to lead information include the combination of any one or more in the inclination angle, position and angle, the certificate to be veritified is real
When shape information accordingly include the group of any one or more in the real-time inclination angle, real time position and real-time angle
It closes;And when review guidance information constituent element corresponding with the real-time shape information of certificate to be veritified is without departing from the error model of setting
When enclosing, the real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified (4) morphological requirements without departing from setting
Fixed error range, otherwise the real-time shape information of certificate to be veritified is with review guidance information for the form of certificate to be veritified (4)
It is required that the error range beyond setting;
The review guidance information further includes the safety identification background information that certificate to be veritified (4) is placed;It is described to core
Verifying the real-time shape information of part further includes certificate to be veritified (4) real-time background information;When safety identification background information with wait veritify
Background information without departing from the error range of setting and checks guidance information and the real-time shape information of certificate to be veritified to certificate (4) in real time
Other constituent elements without departing from the error range of setting when, the real-time shape information of certificate to be veritified and review guidance information for
The morphological requirements of certificate (4) to be veritified are without departing from the error range of setting, the otherwise real-time shape information of certificate to be veritified and review
Guidance information exceeds the morphological requirements of certificate to be veritified (4) error range of setting;
The safety identification background information includes some or all of human body, indoor article, outdoor items and hand-made object
Any one in product or combinations thereof;The real-time shape information of certificate to be veritified accordingly includes the part or complete of human body
Any one or combinations thereof in portion, indoor article, outdoor items and hand-made article.
2. identity security according to claim 1 verifies review method, which is characterized in that the review guidance information packet
It includes picture, video, audio, text, check the combination of any one or more guided in data sequence.
3. identity security according to claim 2 verifies review method, which is characterized in that the review guides data sequence
It is listed in after being transferred into corresponding terminal (1) and the information formation and/or described that can be recognized by user is converted by terminal (1)
Review guidance data sequence background server (2) be converted into can by user recognize information formation after be transferred into phase
Answer terminal (1).
4. identity security according to claim 1 or 2 or 3 verifies review method, which is characterized in that the real-time review
Verification information obtains by the camera (3) of terminal (1) and is the combination of any one in picture and video or both, described
Real-time review verification information is submitted to background server (2) or submits to backstage after user confirms and taken by terminal (1) automatically
It is engaged in device (2).
5. identity security according to claim 4 verifies review method, which is characterized in that letter is verified in the real-time review
Breath is converted into being sent to background server (2) after review verify data sequence by terminal (1) or the real-time review is verified
Information is sent to after background server (2) by terminal (1) and is converted into review verify data sequence by background server (2).
6. identity security according to claim 4 verifies review method, which is characterized in that the background server (2)
According to real-time review verification information, review guidance information for used when veritifying certificate (4) morphological requirements and authentication
Certificate information carries out identity security verifying review by Computing and/or by manually carrying out identity security verifying review.
7. identity security according to claim 1 or 2 or 3 verifies review method, which is characterized in that the background service
Device (2) generates review guidance information after the veritification request for receiving terminal (1) at random.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610511057.7A CN106204048B (en) | 2016-07-01 | 2016-07-01 | Identity security verifies review method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610511057.7A CN106204048B (en) | 2016-07-01 | 2016-07-01 | Identity security verifies review method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106204048A CN106204048A (en) | 2016-12-07 |
CN106204048B true CN106204048B (en) | 2019-10-11 |
Family
ID=57463124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610511057.7A Active CN106204048B (en) | 2016-07-01 | 2016-07-01 | Identity security verifies review method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106204048B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107944339B (en) * | 2017-10-20 | 2020-01-21 | 阿里巴巴集团控股有限公司 | Certificate verification and identity verification method and device |
CN107729847B (en) * | 2017-10-20 | 2020-08-04 | 阿里巴巴集团控股有限公司 | Certificate verification and identity verification method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801528A (en) * | 2012-08-17 | 2012-11-28 | 珠海市载舟软件技术有限公司 | Authentication system and method based on intelligent mobile communication equipment |
CN104504321A (en) * | 2015-01-05 | 2015-04-08 | 湖北微模式科技发展有限公司 | Method and system for authenticating remote user based on camera |
CN105227310A (en) * | 2014-06-24 | 2016-01-06 | 阿里巴巴集团控股有限公司 | A kind of identity identifying method and equipment |
CN105681316A (en) * | 2016-02-02 | 2016-06-15 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4793179B2 (en) * | 2005-11-14 | 2011-10-12 | オムロン株式会社 | Authentication device and portable terminal |
-
2016
- 2016-07-01 CN CN201610511057.7A patent/CN106204048B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801528A (en) * | 2012-08-17 | 2012-11-28 | 珠海市载舟软件技术有限公司 | Authentication system and method based on intelligent mobile communication equipment |
CN105227310A (en) * | 2014-06-24 | 2016-01-06 | 阿里巴巴集团控股有限公司 | A kind of identity identifying method and equipment |
CN104504321A (en) * | 2015-01-05 | 2015-04-08 | 湖北微模式科技发展有限公司 | Method and system for authenticating remote user based on camera |
CN105681316A (en) * | 2016-02-02 | 2016-06-15 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106204048A (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2053777B1 (en) | A certification method, system, and device | |
CN106453341B (en) | Information processing method and device | |
KR101676215B1 (en) | Method for signing electronic documents with an analog-digital signature with additional verification | |
CN105164689B (en) | Customer certification system and method | |
CN102420690B (en) | Fusion and authentication method and system of identity and authority in industrial control system | |
CN110535660A (en) | A kind of evidence obtaining service system based on block chain | |
CN108063750A (en) | dynamic user identity verification method | |
CN105868970B (en) | authentication method and electronic equipment | |
CN103825744A (en) | Off-site personal digital certificate application method and system | |
CN103139172A (en) | Service implementation method and device | |
CN105844481A (en) | System and method for performing digital signature and anticounterfeiting verification on contract | |
CN101051895B (en) | Certifying method and system for integrated biological certification and attribute certificate | |
CN110060403A (en) | The more ticket electronic voting methods of a people and system based on block chain | |
CN106204048B (en) | Identity security verifies review method | |
CN109327446A (en) | Identity identifying method, server, client and system | |
WO2019165352A1 (en) | Systems and methods for providing mobile identification of individuals | |
CN107548059A (en) | A kind of authentication method and system | |
CN109639623A (en) | Verification System and server unit | |
CN112035813B (en) | Method and computer readable medium for generating distributed identities based on fingerprint identification layering in blockchain | |
CN101127592A (en) | A biological template registration method and system | |
RU2444063C1 (en) | Voting method with high-reliability biometric protection of anonymity of voter | |
JP2021170224A (en) | Authentication system, terminal device, program, and authentication management communication system | |
JP7017774B2 (en) | Paper media value-giving system, paper-based value guarantee server, and paper-based value-giving method | |
CA2382445C (en) | Method, article and apparatus for registering registrants, such as voter registrants | |
CN109600353A (en) | Server unit, server clients end system and non-transitory recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |