CN106204048B - Identity security verifies review method - Google Patents

Identity security verifies review method Download PDF

Info

Publication number
CN106204048B
CN106204048B CN201610511057.7A CN201610511057A CN106204048B CN 106204048 B CN106204048 B CN 106204048B CN 201610511057 A CN201610511057 A CN 201610511057A CN 106204048 B CN106204048 B CN 106204048B
Authority
CN
China
Prior art keywords
certificate
information
review
veritified
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610511057.7A
Other languages
Chinese (zh)
Other versions
CN106204048A (en
Inventor
周洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610511057.7A priority Critical patent/CN106204048B/en
Publication of CN106204048A publication Critical patent/CN106204048A/en
Application granted granted Critical
Publication of CN106204048B publication Critical patent/CN106204048B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to technical field of the computer network, verify review method more particularly, to a kind of identity security.It solves the technical problems such as existing authentication review safety is low.This method includes the following steps: A, review guidance;B, solicited message is checked in acquisition and transmission in real time;C, backstage review verifying.The present invention has the advantages that easy to operate, identity review verifying can rapidly be carried out, it is highly-safe, need the certificate information used when veritifying certificate information with authentication in review solicited message in real time identical or the same certificate holder of certificate information direction used when veritifying certificate information and authentication, and the real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified morphological requirements without departing from setting error range, identity security verifying could check successfully, picture and video information containing identity information are avoided to carry out authentication and ensure that composite authentication holds the identity information by person.

Description

Identity security verifies review method
Technical field
The invention belongs to technical field of the computer network, are related to information and Technology On Data Encryption, more particularly, to a kind of body Part safety verification checks method.
Background technique
In network technique field, user carries out authentication usually using identification documents, and authentication information is deposited It is stored in server.It is general when the business operation that user enters requirement progress identity security review needs to carry out identity security verifying Store-through is process is too complicated, the more low technical problem of not convenient enough and safety.In addition, some safety verification processes are using When not too much meet terminal user's behavioural habits;And the network terminal using cell-phone number etc. do user name registration account there are users Identity uniqueness major safety risks problem after name is subjective or odjective cause changes hands.Some users may be because of some special originals Cause loses the control of account or has forgotten account name and password etc., there are security hidden trouble when registering new account again, These user names change hands or lose the case where account's control, and security risk particularly may be divided into following a few classes: 1, account user is weighed Beneficial safety --- the various functions of account cannot reuse, and acquired equity is unable to get guarantee in account.2, Zhang Huye Data safety --- the business datum generated in account's use process is lost together with account for business.3, account's private data is pacified Entirely --- private data present in account may cause personal secrets.4, account's valuable data safety --- if related in account And when arriving virtual value object or closing balance, there are security risks.Therefore, accuracy, the peace of identity review verifying how to be improved Full property and convenience have become network identity review verifying urgent problem.
Of the existing technology in order to solve the problems, such as, people have carried out long-term exploration, propose miscellaneous solution Scheme.For example, Chinese patent literature disclose a kind of network checking method for identity card validation [application number: 200710017019.7], by being equipped with the identity card identification terminal and dedicated network of online checking management software, realize to a The verifying online checking of the authenticity of the identity card of people client, the method and step for verifying online checking is: starting;Open identification eventually End starts management software;Identification terminal has detected whether identity card, if there is identity card, identification terminal reading identity card information is simultaneously Photo and relevant information are shown on identification terminal screen;Identification terminal forwards the request to Ministry of Public Security's population information database; The database is verified, and will be verified result and is fed back to identification terminal;The body of requests verification is shown on identification terminal screen simultaneously Part license piece, relevant information, and Ministry of Public Security's population information database feed back to the verification result after the verification of identification terminal, shine Piece and relevant information;Verifying terminates and verifying next time is waited to verify.
Above scheme solves existing authentication checking device to a certain extent networks online and verifies to identity The problem of review, but at least there are following problems in the program: real-time timeliness when one, due to submitting for identity document exists It is not limited technically, not can avoid using only information such as the picture containing identity information or videos and carry out authentication, It is unable to ensure the problem of whether verifying identity person really holds the identity document, safety is low.Two, it needs to access Ministry of Public Security's population The dedicated networks such as information database are easy to adversely affect the safety of dedicated network, and cost of access is high, needs specially With equipment, it is difficult to promote and apply.
Summary of the invention
Regarding the issue above, the present invention provides a kind of easy to operate, highly-safe identity security verifying is multiple Kernel method.
In order to achieve the above objectives, present invention employs following technical proposals: this identity safety verification checks method, feature It is, this method includes the following steps:
A, review guidance: background server generate review guidance information and send to corresponding terminal with guide user according to Certificate to be veritified is placed in terminal according to the form of the review guidance information requirement by review guidance information can collect information Real-time pickup area;
B, obtain real time information: terminal acquisition contains the reality for needing to be veritified certificate information and the real-time shape information of certificate to be veritified Shi Fuhe verification information, and real-time review verification information is sent to background server;
C, backstage review verifying: background server is according to real-time review verification information, review guidance information for wait veritify Certificate information used is veritified when certificate morphological requirements and authentication;
If in real time review verification information in the certificate information used when veritifying certificate information with authentication it is identical or to Veritify certificate information direction used same certificate holder when certificate information and authentication, and the real-time form of certificate to be veritified Information and review guidance information for certificate to be veritified morphological requirements without departing from the error range of setting, then identity security is verified It checks successfully;
If certificate information used is different when review verification information is from authentication in real time and certificate information to be veritified and identity Certificate information used cannot be directed toward same certificate holder when certification, and/or the real-time shape information of certificate to be veritified draws with review It leads information and treats the morphological requirements for veritifying certificate beyond the error range of setting, then identity security verifying review failure.
In order to improve safety, further promotes the requirement to verifying timeliness and be necessary.For this purpose, raw in background server After being transmitted to corresponding terminal at review guidance information or review guidance information, background server and/or corresponding terminal start Timing, corresponding terminal does not acquire review verification information and/or background server in real time and does not receive accordingly within the set time The real-time review verification information of terminal, then background server terminates this identity security verifying review or straight to corresponding terminal It connects and determines identity security verifying review failure.
In above-mentioned identity security verifying review method, the review guidance information include picture, video, audio, The combination of any one or more in text, review guidance data sequence.
In above-mentioned identity security verifying review method, the review guidance data sequence is being transferred into corresponding end The information formation that can be recognized by user and/or the review guidance data sequence are converted on backstage by terminal behind end Server is converted into that corresponding terminal can be transferred into after the information formation of user's cognition.
In above-mentioned identity security verifying review method, the real-time review verification information is obtained by the camera of terminal Take and be the combination of any one in picture and video or both, the terminal will check verification information submission in real time automatically Background server is submitted to background server or after user confirms.
In above-mentioned identity security verifying review method, the real-time review verification information is converted into checking by terminal It is sent to background server after verify data sequence or the real-time review verification information is sent to background service by terminal Review verify data sequence is converted by background server after device.
In above-mentioned identity security verifying review method, form of the review guidance information for certificate to be veritified Require to include inclination angle of the certificate to be veritified in the camera viewfinder area, certificate to be veritified is found a view area in the camera It is any one the location of in domain, in plane where certificate to be veritified and the angle between the camera lens central axes of the camera Kind or a variety of combinations;The real-time shape information of certificate to be veritified includes certificate to be veritified in the camera viewfinder area In real-time inclination angle, certificate to be veritified real time position locating in the camera viewfinder area, wait where veritifying certificate The combination of any one or more in real-time angle between plane and the camera lens central axes of the camera;When review guides When information includes the combination of any one or more in the inclination angle, position and angle, the certificate to be veritified is real-time Shape information accordingly includes the combination of any one or more in the real-time inclination angle, real time position and real-time angle; And when review guidance information constituent element corresponding with the real-time shape information of certificate to be veritified is without departing from the error range of setting When, the real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified morphological requirements without departing from setting mistake Poor range, otherwise the real-time shape information of certificate to be veritified exceeds with morphological requirements of the review guidance information for certificate to be veritified and sets Fixed error range.
In above-mentioned identity security verifying review method, the review guidance information further includes that certificate to be veritified is put The safety identification background information set;The real-time shape information of certificate to be veritified further includes the real-time background letter of certificate to be veritified Breath;When error range and review guidance letter of the safety identification background information with the real-time background information of certificate to be veritified without departing from setting Breath and wait veritify the real-time shape information of certificate other constituent elements without departing from the error range of setting when, certificate to be veritified is real-time Shape information and review guidance information for certificate to be veritified morphological requirements without departing from setting error range, otherwise wait veritify The real-time shape information of certificate and review guidance information exceed the morphological requirements of certificate to be veritified the error range of setting.
In above-mentioned identity security verifying review method, the safety identification background information include human body part or Any one or combinations thereof in whole, indoor article, outdoor items and hand-made article;The certificate to be veritified is real-time Shape information accordingly includes any one in some or all of human body, indoor article, outdoor items and hand-made article Or combinations thereof.For example, safety identification background information here can be some position of human body, for example, palm, arm equipotential It sets, also may include the indoor articles such as books, daily necessities, outdoor items and any one or its group in hand-made article It closes.
In above-mentioned identity security verifying review method, the background server according to check in real time verification information, Guidance information is checked for certificate information used when veritifying certificate morphological requirements and authentication, passes through Computing Carry out identity security verifying review and/or by manually carrying out identity security verifying review.
In above-mentioned identity security verifying review method, the background server is in the veritification request for receiving terminal It is random afterwards to generate review guidance information.
Compared with prior art, this identity safety verification review method the advantages of be: it is easy to operate, can rapidly into Row identity review verifying, it is highly-safe, need in real time check solicited message in wait veritify certificate information and authentication when institute It is identical or be directed toward same certificate holder wait veritify certificate information and when authentication certificate information used with certificate information, and The real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified morphological requirements without departing from setting error Range, identity security verifying, which could check, successfully to be avoided the picture containing identity information and video information and tests to carry out identity Demonstrate,prove and ensure that the review person of being verified holds the identity information.
Detailed description of the invention
Fig. 1 is 1 flow chart of embodiment provided by the invention.
Fig. 2 is 2 flow chart of embodiment provided by the invention.
Fig. 3 is structural block diagram provided by the invention.
Fig. 4 is the schematic diagram that certificate to be veritified is acquired when no background provided by the invention checks guidance information.
Fig. 5 is that certificate to be veritified is placed on the signal on cigarette case when indoor article provided by the invention checks guidance information Figure.
Fig. 6 is that certificate to be veritified is placed on the signal on pencil when indoor article provided by the invention checks guidance information Figure.
Fig. 7 is that certificate to be veritified is placed on the signal on magazine when indoor article provided by the invention checks guidance information Figure.
Fig. 8 is that certificate to be veritified is placed on the paper for being decorated with straight line when indoor article provided by the invention checks guidance information Schematic diagram on.
Fig. 9 acquires the signal of certificate to be veritified when being the review guidance information of some or all of human body provided by the invention Figure.
Figure 10 is provided by the invention using circle as referential error judgment schematic diagram.
Figure 11 is provided by the invention error judgment schematic diagram when by rectangular partition being several equal portions from top to bottom.
Figure 12 is provided by the invention error judgment schematic diagram when by rectangular partition being several equal portions from left to right.
Rectangle is divided into several equal portions being obliquely installed to be provided by the invention to be parallel to cornerwise straight line by Figure 13 When error judgment schematic diagram.
In figure, terminal 1, background server 2, camera 3, certificate to be veritified 4.
Specific embodiment
The present invention will be further described in detail with reference to the accompanying drawings and detailed description.
Embodiment 1:
As shown in figs. 1 and 3, this identity safety verification checks method, includes the following steps:
A, review guidance: background server 2 generates review guidance information and sends corresponding terminal 1 to guide user's root Certificate 4 to be veritified, which is placed in terminal 1 according to the form of the review guidance information requirement, according to review guidance information to collect The real-time pickup area of information;B, obtain real time information: the acquisition of terminal 1 is containing needing to be veritified certificate information and certificate to be veritified is real-time The real-time review verification information of shape information, and real-time review verification information is sent to background server 2;C, backstage review is tested Card: background server 2 is according to real-time review verification information, review guidance information for 4 morphological requirements of certificate to be veritified, Yi Jishen Certificate information used is veritified when part certification;If in real time in review verification information wait veritify certificate information and when authentication Certificate information used is identical or is directed toward same certificate holder wait veritify certificate information and when authentication certificate information used, and And the real-time shape information of certificate to be veritified and review guidance information for certificate 4 to be veritified morphological requirements without departing from setting mistake Poor range, then identity security verifying are checked successfully;If certificate information used is different when review verification information is from authentication in real time And it cannot be directed toward same certificate holder wait veritify certificate information and when authentication certificate information used, and/or wait veritify card The real-time shape information of part and review guidance information treat error range of the morphological requirements beyond setting of veritification certificate 4, then identity Safety verification review failure.
In order to improve safety, further promotes the requirement to verifying timeliness and be necessary.For this purpose, raw in background server After being transmitted to corresponding terminal at review guidance information or review guidance information, background server and/or corresponding terminal start Timing, corresponding terminal does not acquire review verification information and/or background server in real time and does not receive accordingly within the set time The real-time review verification information of terminal, then background server terminates this identity security verifying review or straight to corresponding terminal It connects and determines identity security verifying review failure.
Wherein, review guidance information here includes picture, video, audio, text, checks appointing in guidance data sequence It anticipates one or more combinations, i.e., be converted into after being transferred into corresponding terminal 1 by terminal 1 can be by for review guidance data sequence The information formation of user's cognition and/or the review guidance data sequence are converted into be used in background server 2 It is transferred into corresponding terminal 1 after the information formation of person's cognition, real-time review verification information here is obtained by the camera 3 of terminal 1 Take and be the combination of any one in picture and video or both, the terminal 1 automatically proposes real-time review verification information It gives background server 2 or submits to background server 2 after user confirms, wherein real-time review verification information here By terminal 1 be converted into review verify data sequence after be sent to background server 2 or the real-time review verification information by Terminal 1 is sent to after background server 2 and is converted into review verify data sequence by background server 2.
That is, review guidance information here includes that certificate 4 to be veritified exists for the morphological requirements of certificate 4 to be veritified Inclination angle, certificate to be veritified 4 in 3 viewfinder area of camera the location of in 3 viewfinder area of camera, to Veritify the combination of any one or more in the angle between 4 place plane of certificate and the camera lens central axes of the camera 3; The real-time shape information of certificate to be veritified includes real-time inclination of the certificate 4 to be veritified in 3 viewfinder area of camera Angle, certificate to be veritified 4 real time position locating in 3 viewfinder area of camera, 4 place plane of certificate to be veritified with it is described The combination of any one or more in real-time angle between the camera lens central axes of camera 3;When review guidance information includes When the combination of any one or more in the inclination angle, position and angle, the real-time shape information of certificate to be veritified It accordingly include the combination of any one or more in the real-time inclination angle, real time position and real-time angle;That is, Deviation angle is determined by the X of the camera 3 of terminal 1, Y-axis, and when review guidance information and the real-time form of certificate to be veritified The corresponding constituent element of information without departing from the error range of setting when, the real-time shape information of certificate to be veritified and review guidance letter Cease the morphological requirements for certificate 4 to be veritified without departing from the error range of setting, otherwise the real-time shape information of certificate to be veritified with Guidance information is checked for the morphological requirements of certificate 4 to be veritified beyond the error range of setting, wherein background server here 2 bases check verification information, review guidance information for used when veritifying 4 morphological requirements of certificate and authentication in real time Certificate information is carried out identity security verifying review and/or is passed through manually to carry out identity security verifying review by Computing, Background server 2 generates review guidance information after the veritification request for receiving terminal 1 at random.
Further, review guidance information here further includes the safety identification background letter that certificate 4 to be veritified is placed Breath;The real-time shape information of certificate to be veritified further includes the real-time background information of certificate 4 to be veritified;When safety identification background letter Breath with the real-time background information of certificate 4 to be veritified without departing from the error range of setting and check guidance information and certificate to be veritified it is real-time Shape information other constituent elements without departing from the error range of setting when, the real-time shape information of certificate to be veritified and review guide Information for certificate 4 to be veritified morphological requirements without departing from the error range of setting, the otherwise real-time shape information of certificate to be veritified With review guidance information the morphological requirements of certificate 4 to be veritified are exceeded with the error range of setting.Preferably, safety here is known Other background information include some or all of human body, indoor article, outdoor items and any one in hand-made article or A combination thereof;The real-time shape information of certificate to be veritified accordingly includes some or all of human body, indoor article, outdoor object Any one or combinations thereof in product and hand-made article.
For example, as shown in figure 4, review guidance information here checks guidance information for no background, i.e., by by terminal 1 The X of camera 3, Y-axis determine the deviation angle of certificate 4 to be veritified.
As viewed in figures 5-8, review guidance information here is the review guidance information that background information is identified with safety, i.e., Checking guidance information prompts verifier by indoor article, e.g., cigarette case mobile phone paper chopsticks etc., to determine certificate to be veritified 4 deviation angles, for example in Fig. 5, certificate 4 to be veritified is placed on cigarette case, certificate 4 to be veritified is placed on chopsticks in Fig. 6, Certificate 4 to be veritified is placed on magazine in Fig. 7, certificate 4 to be veritified is placed on the paper for being decorated with straight line in Fig. 8.
As shown in figure 9, review guidance information here is the review guidance information of some or all of human body, i.e., here Safety identification background information can be human body itself: borrow some or all of human body to determine deviation angle, e.g., palm arm Foot head and shoulder thigh etc., such as certificate 4 to be veritified is placed on palm.
In addition, safety identification background information can also be outdoor items: determining deviation angle by outdoor article, such as Brick trees flowers and plants line bar automobile or automobile component building or building component etc., it is hand-made: by easy manual mode Background is made to do the angle recognition deviated.
In the present embodiment, certificate information is often referred to be documented in the text information on certificate, can also be certainly and is documented in card Information on part chip, if certificate information be certificate chip on information, by setting at the terminal can read certificate The readout means reads of chip information take certificate information.
In the present embodiment, error range is set as needed, if wanting to improve the precision checked, by error range setting It is smaller, if wanting to reduce the precision checked, by the larger of error range setting.As shown in Figure 10, using circle as referential, by this Circle is divided into several equal portions, each equal portions is numbered in sequence, i.e. x0, x1, x2 ...;Box represents certificate 4 to be veritified in figure. Choose reference line of the radius of the circle where the starting point of any one equal portions as setting, 4 length direction of certificate to be veritified Central axes when being overlapped with reference line, represent certificate 4 to be veritified and be placed on normal place, and 4 length direction of certificate to be veritified When forming angle between central axes and reference line, representing between certificate 4 to be veritified and normal place has error.Set the mistake allowed Poor range is the equal portions of natural number, then representing when being more than the equal portions allowed is more than setting error range.Obviously, the equal portions of division are got over It is more, veritification precision can be improved.As shown in figure 11, be several equal portions from top to bottom by rectangular partition, in figure box represent to Veritify certificate 4.The normal place that one of equal portions are placed as certificate 4 to be veritified is chosen, is set when certificate 4 to be veritified is placed on When in fixed equal portions, when representing certificate 4 to be veritified and be placed on normal place, and being placed in other equal portions wait veritify certificate 4, generation There is error between table certificate 4 to be veritified and normal place.It as shown in figure 12, is several equal portions from left to right by rectangular partition, Remaining is similar with the deterministic process of Figure 11.As shown in figure 13, rectangle inclination is divided into be parallel to cornerwise straight line to set Several equal portions set, remaining is similar with the deterministic process of Figure 11 and Figure 12.
In the present embodiment, carrying out first carrying out identity security verifying review between specific business operation, at this point, terminal 1 to Background server 2, which is sent, veritifies request, and background server 2 generates review guidance after the veritification request for receiving terminal 1 at random Information.Then it carries out veritifying identity security verifying review.If identity security verifying is checked successfully, carry out entering specific business behaviour Make process;If identity security verifying review failure, cannot be introduced into specific business operation process.
In actual use, this identity safety verification review method can be used in following several situations:
1, the remaining sum in the Account Response account of authentication is withdrawn deposit safely;
2, the Account Response of authentication uses the valuable virtual objects in account, ideal money, closing balance etc.;
3, the account of authentication after losing account's control (such as cell-phone number changes hands, password loss, account name lose Deng), it has registered new account and requires to shift the data etc. of former account;
4, the account of authentication is when request is using some important service function;
5, the account of authentication is when request is using the function of having identity authority limitation to require.
Such as the user of cell-phone number registration:
Account title: 13888888888
Closing balance: 200 yuan
Business datum: 3000
Authentication: identity card picture uploads and the mode authentication of ID card No. binding;
User has replaced cell-phone number, loses the right to use to former cell-phone number;
User has registered account using the cell-phone number of replacement;
Other users have been multiplexed this cell-phone number again, and give the control that password succeeds and obtains account for change again
Former account title: after 13888888888 user replaces new cell-phone number 13999999999:
Account title: 13999999999
Authentication: prompt authentication ids mistake, it is desirable that use business datum safe transfer;
It is proved to be successful: by data from the new cell-phone after safe transfer to replacement cell-phone number in the account before replacement cell-phone number In account.
Embodiment 2:
As shown in Fig. 2, the present embodiment, it is multiple that identity security verifying is carried out when specific business operation proceeds to final step again Core, at this point, terminal 1 to background server 2 send veritify request, background server 2 receive terminal 1 veritification request after with Machine generates review guidance information.Then it carries out veritifying identity security verifying review.If identity security verifying is checked successfully, specifically Business operation success;If identity security verifying review failure, specific business operation failure.Remaining is similar with embodiment 1, no It repeats.
Specific embodiment described herein is only an example for the spirit of the invention.The neck of technology belonging to the present invention The technical staff in domain can make various modifications or additions to the described embodiments or replace by a similar method In generation, however, it does not deviate from the spirit of the invention or beyond the scope of the appended claims.
Although the terms such as terminal 1, background server 2, camera 3, certificate to be veritified 4 are used more herein, simultaneously A possibility that being not excluded for using other terms.The use of these items is only for be more convenient to describe and explain sheet of the invention Matter;Being construed as any additional limitation is disagreed with spirit of that invention.

Claims (7)

1. a kind of identity security verifies review method, which is characterized in that this method includes the following steps:
A, review guidance: background server (2) generates review guidance information and sends corresponding terminal (1) to guide user's root Certificate to be veritified (4), which is placed in terminal (1) according to the form that the review guidance information requires, according to review guidance information to adopt Collect the real-time pickup area of information;
B, obtain real time information: terminal (1) acquisition contains the reality for needing to be veritified certificate information and the real-time shape information of certificate to be veritified Shi Fuhe verification information, and real-time review verification information is sent to background server (2);
C, backstage review verifying: background server (2) is according to review verification information, review guidance information in real time for wait veritify card Certificate information used is veritified when part (4) morphological requirements and authentication;
If the certificate information used when veritifying certificate information with authentication in real time in review verification information is identical or wait veritify Certificate information direction used same certificate holder when certificate information and authentication, and the real-time shape information of certificate to be veritified With review guidance information for certificate to be veritified (4) morphological requirements without departing from the error range of setting, then identity security is verified It checks successfully;
If certificate information used is different when review verification information is from authentication in real time and certificate information to be veritified and authentication Shi Suoyong certificate information cannot be directed toward same certificate holder, and/or the real-time shape information of certificate to be veritified and review guidance letter Breath treats the morphological requirements for veritifying certificate (4) beyond the error range of setting, then identity security verifying review failure;
The review guidance information includes certificate to be veritified (4) in camera (3) for the morphological requirements of certificate to be veritified (4) Inclination angle, certificate to be veritified (4) in viewfinder area are demonstrate,proved the location of in the camera (3) viewfinder area, wait veritify The combination of any one or more in angle where part (4) between plane and the camera lens central axes of the camera (3);Institute The real-time shape information of certificate to be veritified stated includes certificate to be veritified (4) inclining in the camera (3) viewfinder area in real time It is flat where oblique angle, certificate to be veritified (4) real time position locating in the camera (3) viewfinder area, certificate to be veritified (4) The combination of any one or more in real-time angle between face and the camera lens central axes of the camera (3);When review is drawn When to lead information include the combination of any one or more in the inclination angle, position and angle, the certificate to be veritified is real When shape information accordingly include the group of any one or more in the real-time inclination angle, real time position and real-time angle It closes;And when review guidance information constituent element corresponding with the real-time shape information of certificate to be veritified is without departing from the error model of setting When enclosing, the real-time shape information of certificate to be veritified and review guidance information for certificate to be veritified (4) morphological requirements without departing from setting Fixed error range, otherwise the real-time shape information of certificate to be veritified is with review guidance information for the form of certificate to be veritified (4) It is required that the error range beyond setting;
The review guidance information further includes the safety identification background information that certificate to be veritified (4) is placed;It is described to core Verifying the real-time shape information of part further includes certificate to be veritified (4) real-time background information;When safety identification background information with wait veritify Background information without departing from the error range of setting and checks guidance information and the real-time shape information of certificate to be veritified to certificate (4) in real time Other constituent elements without departing from the error range of setting when, the real-time shape information of certificate to be veritified and review guidance information for The morphological requirements of certificate (4) to be veritified are without departing from the error range of setting, the otherwise real-time shape information of certificate to be veritified and review Guidance information exceeds the morphological requirements of certificate to be veritified (4) error range of setting;
The safety identification background information includes some or all of human body, indoor article, outdoor items and hand-made object Any one in product or combinations thereof;The real-time shape information of certificate to be veritified accordingly includes the part or complete of human body Any one or combinations thereof in portion, indoor article, outdoor items and hand-made article.
2. identity security according to claim 1 verifies review method, which is characterized in that the review guidance information packet It includes picture, video, audio, text, check the combination of any one or more guided in data sequence.
3. identity security according to claim 2 verifies review method, which is characterized in that the review guides data sequence It is listed in after being transferred into corresponding terminal (1) and the information formation and/or described that can be recognized by user is converted by terminal (1) Review guidance data sequence background server (2) be converted into can by user recognize information formation after be transferred into phase Answer terminal (1).
4. identity security according to claim 1 or 2 or 3 verifies review method, which is characterized in that the real-time review Verification information obtains by the camera (3) of terminal (1) and is the combination of any one in picture and video or both, described Real-time review verification information is submitted to background server (2) or submits to backstage after user confirms and taken by terminal (1) automatically It is engaged in device (2).
5. identity security according to claim 4 verifies review method, which is characterized in that letter is verified in the real-time review Breath is converted into being sent to background server (2) after review verify data sequence by terminal (1) or the real-time review is verified Information is sent to after background server (2) by terminal (1) and is converted into review verify data sequence by background server (2).
6. identity security according to claim 4 verifies review method, which is characterized in that the background server (2) According to real-time review verification information, review guidance information for used when veritifying certificate (4) morphological requirements and authentication Certificate information carries out identity security verifying review by Computing and/or by manually carrying out identity security verifying review.
7. identity security according to claim 1 or 2 or 3 verifies review method, which is characterized in that the background service Device (2) generates review guidance information after the veritification request for receiving terminal (1) at random.
CN201610511057.7A 2016-07-01 2016-07-01 Identity security verifies review method Active CN106204048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610511057.7A CN106204048B (en) 2016-07-01 2016-07-01 Identity security verifies review method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610511057.7A CN106204048B (en) 2016-07-01 2016-07-01 Identity security verifies review method

Publications (2)

Publication Number Publication Date
CN106204048A CN106204048A (en) 2016-12-07
CN106204048B true CN106204048B (en) 2019-10-11

Family

ID=57463124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610511057.7A Active CN106204048B (en) 2016-07-01 2016-07-01 Identity security verifies review method

Country Status (1)

Country Link
CN (1) CN106204048B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107944339B (en) * 2017-10-20 2020-01-21 阿里巴巴集团控股有限公司 Certificate verification and identity verification method and device
CN107729847B (en) * 2017-10-20 2020-08-04 阿里巴巴集团控股有限公司 Certificate verification and identity verification method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801528A (en) * 2012-08-17 2012-11-28 珠海市载舟软件技术有限公司 Authentication system and method based on intelligent mobile communication equipment
CN104504321A (en) * 2015-01-05 2015-04-08 湖北微模式科技发展有限公司 Method and system for authenticating remote user based on camera
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4793179B2 (en) * 2005-11-14 2011-10-12 オムロン株式会社 Authentication device and portable terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801528A (en) * 2012-08-17 2012-11-28 珠海市载舟软件技术有限公司 Authentication system and method based on intelligent mobile communication equipment
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
CN104504321A (en) * 2015-01-05 2015-04-08 湖北微模式科技发展有限公司 Method and system for authenticating remote user based on camera
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device

Also Published As

Publication number Publication date
CN106204048A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
EP2053777B1 (en) A certification method, system, and device
CN106453341B (en) Information processing method and device
KR101676215B1 (en) Method for signing electronic documents with an analog-digital signature with additional verification
CN105164689B (en) Customer certification system and method
CN102420690B (en) Fusion and authentication method and system of identity and authority in industrial control system
CN110535660A (en) A kind of evidence obtaining service system based on block chain
CN108063750A (en) dynamic user identity verification method
CN105868970B (en) authentication method and electronic equipment
CN103825744A (en) Off-site personal digital certificate application method and system
CN103139172A (en) Service implementation method and device
CN105844481A (en) System and method for performing digital signature and anticounterfeiting verification on contract
CN101051895B (en) Certifying method and system for integrated biological certification and attribute certificate
CN110060403A (en) The more ticket electronic voting methods of a people and system based on block chain
CN106204048B (en) Identity security verifies review method
CN109327446A (en) Identity identifying method, server, client and system
WO2019165352A1 (en) Systems and methods for providing mobile identification of individuals
CN107548059A (en) A kind of authentication method and system
CN109639623A (en) Verification System and server unit
CN112035813B (en) Method and computer readable medium for generating distributed identities based on fingerprint identification layering in blockchain
CN101127592A (en) A biological template registration method and system
RU2444063C1 (en) Voting method with high-reliability biometric protection of anonymity of voter
JP2021170224A (en) Authentication system, terminal device, program, and authentication management communication system
JP7017774B2 (en) Paper media value-giving system, paper-based value guarantee server, and paper-based value-giving method
CA2382445C (en) Method, article and apparatus for registering registrants, such as voter registrants
CN109600353A (en) Server unit, server clients end system and non-transitory recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant