CN107025397A - The acquisition methods and device of identity information - Google Patents

The acquisition methods and device of identity information Download PDF

Info

Publication number
CN107025397A
CN107025397A CN201610066074.4A CN201610066074A CN107025397A CN 107025397 A CN107025397 A CN 107025397A CN 201610066074 A CN201610066074 A CN 201610066074A CN 107025397 A CN107025397 A CN 107025397A
Authority
CN
China
Prior art keywords
information
identity
account
identity information
acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610066074.4A
Other languages
Chinese (zh)
Other versions
CN107025397B (en
Inventor
刘坤
饶利他
姜巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610066074.4A priority Critical patent/CN107025397B/en
Publication of CN107025397A publication Critical patent/CN107025397A/en
Application granted granted Critical
Publication of CN107025397B publication Critical patent/CN107025397B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of acquisition methods of identity information and device.Wherein, this method includes:The image information that the authentication client logged in using the first account is sent is obtained, wherein, record needs to be checked the biological characteristic of object in image information;In the case of finding biological characteristic in database, extract biological characteristic the first identity information, using the first identity information extracted as object to be checked the second identity information.The present invention is solved in correlation technique when carrying out the checking of network identity, it is impossible to the technical problem of the accurate identity for determining verifier.

Description

The acquisition methods and device of identity information
Technical field
The present invention relates to data processing field, in particular to the acquisition methods and device of a kind of identity information.
Background technology
In network activity, due to being difficult to the true identity of network account, often to criminal with opportunity, Cause the illegal activities such as cyber thefts, swindle to emerge in an endless stream, wherein, the leakage of individual privacy information be network, Telecommunication fraud and the major source of the pseudo- card crime of credit card.Network anonymous property causes online integrity system to be difficult to set up, Netizen's behavior lacks responsibility consciousness, has been further exacerbated by the disordered state of Network-Virtual Society.
The pictorial information that identification scheme of the prior art mainly inputs identity document by user is veritified, can To be authenticated to identity card, phone number.But in the identifying schemes, the authentication information such as educational background, mailbox can only User is manually entered, and can not verify this category information whether real effectiveness.
Specifically, network identity identification of the prior art generally depends on the identity information of second generation identity card, that is, leads to Personal information such as " name+identification card number " of user's input is crossed, by backstage to name and identification card number incidence relation Contrast to assert identity.But this " association contrast " method, relies solely on user's input personal information, it is impossible to ensure The authenticity of the network identity, it is impossible to fundamentally play a part of identification and prevent identity from falsely using.
In addition, in the prior art, numerous each self checking user identity in website each store these individual privacy informations, Differ because each enterprises safeguard protection level is irregular, be faced with the attack of external hackers and the pilferage of insider, deposit In the major hidden danger of leakage individual privacy information.
Meanwhile, the existing certification dimension to identity information is concentrated mainly on the certification certificate of this uniformity of identity card, And the coding rule of identification number, it is well known that, that is, what is even obtained is the identity for meeting coding rule Card number can not show that the identification card number must be authentic and valid, can not also show that the people for inputting the identification card number is legal and gather around There is the identification card number.
For in correlation technique when carrying out the checking of network identity, it is impossible to the technology of the accurate identity for determining verifier is asked Topic, not yet proposes effective solution at present.
The content of the invention
The embodiments of the invention provide a kind of acquisition methods of identity information and device, with least solve in correlation technique When carrying out the checking of network identity, it is impossible to the technical problem of the accurate identity for determining verifier.
One side according to embodiments of the present invention includes there is provided a kind of acquisition methods of identity information, this method: The image information that the authentication client logged in using the first account is sent is obtained, wherein, there be record in image information The biological characteristic of object to be checked;In the case of finding biological characteristic in database, the first of biological characteristic is extracted Identity information, using the first identity information extracted as object to be checked the second identity information.
Another aspect according to embodiments of the present invention, additionally provides a kind of acquisition methods of identity information, and this method includes: The authentication user end to server logged in using the first account sends the image information of collection, wherein, image information Middle record needs to be checked the biological characteristic of object, and biological characteristic is used for the second identity letter that server obtains object to be checked Breath;The second identity information that authentication client the reception server is obtained.
3rd aspect according to embodiments of the present invention is there is provided a kind of acquisition device of identity information, and the device includes: First acquisition unit, for obtaining the image information that the authentication client logged in using the first account is sent, wherein, Record needs to be checked the biological characteristic of object in image information;Extraction unit, for finding biological spy in database In the case of levying, extract biological characteristic the first identity information, using the first identity information extracted as treat examination pair The second identity information of elephant.
4th aspect according to embodiments of the present invention, additionally provides a kind of acquisition device of identity information, the device bag Include:Transmitting element, the image that the authentication user end to server for being logged in using the first account sends collection is believed Breath, wherein, record needs to be checked the biological characteristic of object in image information, and biological characteristic is used for server and obtains to be checked Test the second identity information of object;Receiving unit, the second identity obtained for authentication client the reception server Information.
In embodiments of the present invention, needing to obtain when the identity information of object is checked, acquisition is stepped on using the first account The image information (record needs to be checked the biological characteristic of object in image information) that the authentication client in land is sent, and In searching data storehouse whether there is with object identical biological characteristic to be checked, biological characteristic is found in database In the case of, extract corresponding first identity information of the biological characteristic, and using the first identity information extracted as to be checked The second identity information of object is tested, it is determined by gathering the biological characteristic of object to be checked, and according to its biological characteristic Identity, due to having used biological characteristic when obtaining identity information, and for same target, biological characteristic is general It is difficult to change to be, obtains identity information by biological characteristic, it is ensured that the accuracy of the identity information of acquisition, solves In correlation technique of having determined when carrying out the checking of network identity, it is impossible to the technical problem of the accurate identity for determining verifier, Realize the effect of the accurate identity for obtaining verifier.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not constitute inappropriate limitation of the present invention.In accompanying drawing In:
Fig. 1 is a kind of hardware block diagram of terminal of the embodiment of the present invention;
Fig. 2 is a kind of flow chart of the acquisition methods of optional identity information according to embodiments of the present invention;
Fig. 3 is the flow chart of the acquisition methods of another optional identity information according to embodiments of the present invention;
Fig. 4 is a kind of schematic diagram of optional authentication client according to embodiments of the present invention;
Fig. 5 is the schematic diagram of another optional authentication client according to embodiments of the present invention;
Fig. 6 is the schematic diagram of the third optional authentication client according to embodiments of the present invention;
Fig. 7 is the schematic diagram of the optional authentication client of according to embodiments of the present invention the 4th kind;
Fig. 8 is the flow chart of the acquisition methods of the third optional identity information according to embodiments of the present invention;
Fig. 9 is the flow chart of the acquisition methods of the optional identity information of according to embodiments of the present invention the 4th kind;
Figure 10 is a kind of schematic diagram of the acquisition device of optional identity information according to embodiments of the present invention;
Figure 11 is the schematic diagram of the acquisition device of another optional identity information according to embodiments of the present invention;
Figure 12 is the schematic diagram of the acquisition device of the third optional identity information according to embodiments of the present invention;
Figure 13 is the schematic diagram of the acquisition device of the optional identity information of according to embodiments of the present invention the 4th kind;And
Figure 14 is the structured flowchart of another terminal according to embodiments of the present invention.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment The only embodiment of a present invention part, rather than whole embodiments.Based on the embodiment in the present invention, ability The every other embodiment that domain those of ordinary skill is obtained under the premise of creative work is not made, should all belong to The scope of protection of the invention.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that this The data that sample is used can be exchanged in the appropriate case, so as to embodiments of the invention described herein can with except Here the order beyond those for illustrating or describing is implemented.In addition, term " comprising " and " having " and they Any deformation, it is intended that covering is non-exclusive to be included, for example, containing process, the side of series of steps or unit Method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include unclear It is that ground is listed or for the intrinsic other steps of these processes, method, product or equipment or unit.
Embodiment 1
According to embodiments of the present invention, a kind of embodiment of the method for the acquisition methods of identity information is additionally provided, it is necessary to illustrate , can be in the computer system of such as one group computer executable instructions the step of the flow of accompanying drawing is illustrated Perform, and, although logical order is shown in flow charts, but in some cases, can be with different from this The order at place performs shown or described step.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune Calculate in device and perform.Exemplified by running on computer terminals, Fig. 1 is a kind of terminal of the embodiment of the present invention Hardware block diagram.As shown in figure 1, terminal 10 (can only show one including one or more in Fig. 1 It is individual) (processor 102 can include but is not limited to Micro-processor MCV or PLD FPGA to processor 102 Deng processing unit), the memory 104 for data storage and the transport module 106 for communication function.This Field those of ordinary skill is appreciated that the structure shown in Fig. 1 is only signal, its knot not to above-mentioned electronic installation It is configured to limit.For example, terminal 10 may also include than shown in Fig. 1 more either less components or With the configuration different from shown in Fig. 1.
The identity that memory 104 can be used in the software program and module of storage application software, such as embodiment of the present invention Corresponding programmed instruction/the module of acquisition methods of information, processor 102 is stored in soft in memory 104 by operation Part program and module, so as to perform various function application and data processing, that is, realize obtaining for above-mentioned identity information Take method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, such as one or Multiple magnetic storage devices, flash memory or other non-volatile solid state memories.In some instances, memory 104 The memory remotely located relative to processor 102 can be further comprised, these remote memories can be connected by network It is connected to terminal 10.The example of above-mentioned network includes but is not limited to internet, intranet, LAN, shifting Dynamic communication network and combinations thereof.
Transmitting device 106 is used to data are received or sent via a network.Above-mentioned network instantiation may include The wireless network that the communication providerses of terminal 10 are provided.In an example, transmitting device 106 includes one Network adapter (Network Interface Controller, NIC), it can pass through base station and other network equipments It is connected to be communicated with internet.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module, it is used to wirelessly be communicated with internet.
Under above-mentioned running environment, this application provides the acquisition methods of identity information as shown in Figure 2.Fig. 2 is root According to a kind of flow chart of the acquisition methods of optional identity information of the embodiment of the present invention.As shown in Fig. 2 this method bag Include:
Step S201, obtains the image information that the authentication client logged in using the first account is sent, wherein, figure As record needs to be checked the biological characteristic of object in information.
Image information can be the figure that object to be checked is gathered by being provided with the camera of the terminal of authentication client As information, the image information can be that record needs to be checked object in action message or head image information, the image information Biological characteristic, e.g., the feature such as face, pupil, wrinkle, position shape, skin, the expression of face.
Above-mentioned terminal can be mobile terminal or personal computer, and mobile terminal can be computer, mobile phone, flat board etc..
For example, authentication client can be installed on mobile phone, and logged in using the first account of user's registration at this In authentication client, when needing to verify the identity information of object to be verified, by where authentication client Terminal collection client (object i.e. to be checked) image information, client sends the image information collected to clothes Business device, server the biological characteristic in the image information is identified the biological characteristic for obtaining object to be checked.
Step S202, in the case of finding biological characteristic in database, extracts the first identity information of biological characteristic, Using the first identity information extracted as object to be checked the second identity information.
Record has the biological characteristic of the acquisition target gathered in advance in database, utilizes the object to be checked got Biological characteristic is compared in database, if comparing successfully, that is, confirms to find biological characteristic in database;If Comparison is unsuccessful, then confirms not find biological characteristic in database, in that case, generates for pointing out ratio To the prompt message of failure (or prompting does not find biological characteristic), the prompt message is back to the first account, should Prompt message can be:The biological characteristic of the object is not found.
Such as, server is identifying the biological characteristic (such as five of object to be checked in image information according to image processing algorithm The position of official) after, found in database with after identical face position feature, extract the biological characteristic Record the first identity information in database.
Using first identity information with object to be checked in database with identical biological characteristic as the second identity information, Its identity information is identified from database according to the biological characteristic of object to be checked, obtained identity information can be used In the legitimacy for verifying its identity.
By above-described embodiment, needing to obtain when the identity information of object is checked, acquisition is logged in using the first account The image information (in image information record need to be checked the biological characteristic of object) that sends of authentication client, and look into Look in database whether there is with object identical biological characteristic to be checked, the feelings of biological characteristic are found in database Under condition, corresponding first identity information of the biological characteristic is extracted, and using the first identity information extracted as waiting to check Second identity information of object, its body is determined by gathering the biological characteristic of object to be checked, and according to its biological characteristic Part, due to having used biological characteristic when obtaining identity information, and for same target, biological characteristic is usually It is difficult to change, identity information is obtained by biological characteristic, it is ensured that the accuracy of the identity information of acquisition, solved It is real in correlation technique when carrying out the checking of network identity, it is impossible to the technical problem of the accurate identity for determining verifier The effect of the identity of accurate acquisition verifier is showed.
It should be noted that the detection in order to realize the legitimacy for treating examination object identity information, reduces looking into for identity The time tested and resources costs, in addition it is also necessary to set up related database, the identity such as logged in acquisition using the first account Verify before the image information that client is sent, be achieved by the steps of:
Step S11, obtains the identity document information of each acquisition target and the physiological characteristic of acquisition target.
For example, (such as house is rented a house, nurse employs, enterprise interviews, believed in it need to carry out the application scenarios of challenge With inquiry etc.), Party A and Party B set up certain relation, and house to let is employed nurse by such as Party A to Party B, employer Party A When Party B, the relevant information of enterprise interviewer Party A inquiry interviewee Party B, Party A and the cargo transaction of Party B, need Party B is wanted to provide the relevant information for being able to demonstrate that its identity, now, Party B's (i.e. acquisition target) can download above-mentioned body Part checking client, registers an account and is simultaneously logged in by the account, and related demonstrate,prove is uploaded so as to pass through the client Part information, such as identity card, teacher's card, academic card, driving license, officer's identity card, passport, employee's card, student's identity card.
Step S12, carries out Information Authentication to identity document information and obtains information authentication results.
The step can be realized by following sub-step:
Step S121, calls the third-party platform corresponding to identity document information.I.e. according to belonging to identity document information Certificate classification calls the third-party platform of the certificate information for the category that is stored with to verify the certificate of the category.Such as, If desired the certificate classification verified is identity card, then can call the ID card verification platform of public security bureau;If desired verify Certificate classification be teacher card, then can call the Ministry of Education teacher demonstrate,prove verification platform;If desired the certificate classification verified For driving license, then the driving license verification platform of Ministry of Communications can be called.For officer's identity card, passport, employee's card, student The certificate informations such as card, can also call corresponding platform, just differ a citing herein.
Whether legal step S122, verify identity document information by third-party platform.Above-mentioned authentication client The data-interface that can be provided with third-party platform is docked, when needing to verify the authentication information of acquisition target, collection Object can upload its certificate photo by the above-mentioned authentication client on mobile phone, and will be recognized from certificate photo The certificate information gone out is sent to third-party platform, and third-party platform determines above-mentioned certificate according to the information stored in database The legitimacy of information.
Step S123, if verifying out, identity certificate information is legal, obtains what is passed through for representing identity document Information Authentication First result.I.e. in the case where third-party platform can inquire above-mentioned certificate information in database, it may be determined that the card Part information is legal information, determines that certificate information is verified.
Step S124, if it is illegal to verify out identity certificate information, obtains being used to represent that identity document Information Authentication is not led to The second result crossed, wherein, information authentication results include the first result and the second result.I.e. can not in third-party platform In the case of above-mentioned certificate information is inquired in database, it may be determined that the certificate information is invalid information, determines certificate Information Authentication does not pass through.
Step S15, by the account belonging to acquisition target, the physiological characteristic of acquisition target, identity document information and its right The information authentication results answered are saved into database.I.e. the information of acquisition target is in the checking by above-mentioned third-party platform Afterwards, it is necessary to gather its physiological characteristic by authentication client, so that the corresponding server of authentication client Account belonging to acquisition target, the physiological characteristic of acquisition target, identity document information and its corresponding information can be tested Card result is saved into database.
Above-mentioned physiological characteristic can include above-mentioned biological characteristic, and (biological characteristic is mainly the upper part of the body of destination object Correlated characteristic, such as face, pupil, wrinkle, the feature such as position, the shape of face), physiological characteristic can also include mesh Mark the features such as the height of object, age, body weight, blood group, arm exhibition, leg length, stature ratio, fingerprint, palmmprint.
Alternatively, the above embodiment of the present invention can be realized by step as shown in Figure 3:
Step S301, starts authentication, and user's (i.e. acquisition target) registers an account in authentication client Family is simultaneously logged in by the account, then starts its identification verification function, account, client, is called on first terminal Camera is gathered.
Step S302, gathers the living body characteristics of user, that is, gathers the biological characteristic of user.
For example, user initiates flow for authenticating ID by authentication client first, detected by In vivo detection, 1 half body is shot such as during In vivo detection, and according to big figure, (user can be by being provided with client with 4 action process figures The camera of the flat board at end or mobile phone is shot), be stored in after image ciphering it is local so that certificate server can be according to address Captured, compared for follow-up portrait and process examination.
Step S303, uploads identity card positive and negative and shines.User can by authentication client by the identity card of shooting just Reverse side is according to the end that uploads onto the server.
Name and identification card number in step S304, identification identity card positive and negative photograph.
Specifically, server end can (Optical Character Recognition, optical character be known using OCR Not, i.e., by detect it is dark, it is bright carry out character recognition a kind of technology) technology identify identity card positive and negative shine in surname Name and identification card number.
Step S305, uploads identity information, that is, the name and identification card number that will identify that are uploaded to the clothes of third-party platform Business device carries out authentication.
Step S306, third-party platform carries out authentication.
Such as, when verifying identity information, name and identification card number are sent to the identity authentication platform of public security bureau, identity Whether whether the name and identification card number that authentication platform is identified according to data base querying are legal, that is, inquire about and deposited in database In the name and corresponding identification card number, if being determined in the presence of if, its is legal, otherwise determines that its is illegal.Pass through in user In the case of authentication, step S307 is performed, in the case of not by authentication, step S301 is performed, with Again related certificate information is uploaded to be verified.
If it should be noted that by the checking of service end, i.e. user by the certification of identity card examination & verification after, namely Confirm that the user is completed after real people's certification, then can enter the certification of other certificates of next step, can be according to the user's ID card No. carries out the certification of other certificates as the bridge of credit;If do not passed through, prompting is needed not by original Cause, such as name mistake, incorrect identification card number length, name and identification card number are mismatched, and return to certification Beginning page points out user;If above-mentioned authentication needs to carry out manual examination and verification, at the end of pointing out the estimated examination & verification of user Between.
Step S307, inputs the certificate information of certificate to be certified.
User can select the type of credential for needing to carry out certificate certification, such as driver's license, traveling in authentication client Card, academic certificate, teacher's card, police officer's identity card, Health Certificate, unmarried proof etc. carry the certificate of ID card No., and The certificate informations such as the certificate number or Docket No. of input authentication certificate.
It should be further stated that, when user carries out real people's certification, the " personal of authentication client can be passed through Information " interface input authentication information (such as biological characteristic, name, identity card, phone number, mailbox information).Tool Body, the camera of terminal where the authentication client can be called by the button of taking pictures shown in operation diagram 4, The image (including head portrait image and motion images) of certification object (acquisition target i.e. in above-described embodiment) is gathered, also Name as shown in Figure 4 can be inputted:Zhang San, identity card, 511122233, phone number:1391111111, postal Case:[email protected].
As shown in figure 4, the 2 D code information of the account can also be recorded in " personal information " interface;User can also lead to Cross the interface and enter other interfaces such as " my certificate " and " more ".
Step S308, the server of authentication client judges that certificate to be certified is according to the ID card No. of the user It is no legal.If judging, certificate to be certified is legal, performs step S309, certificate to be certified is illegal if judging, Then perform step S310.
For example, the server of above-mentioned authentication client can be directly invoked using interface database mode call it is to be certified The database of the corresponding third-party platform of certificate, obtains the certificate information that user identity demonstrate,proves number corresponding certificate to be certified, Whether the certificate informations such as certificate number or Docket No. to judge user's input are correct.
For another example, the certificate number or shelves for the certification certificate that the server of above-mentioned authentication client can also input user Case numbering etc. certificate information send to third-party platform, third-party platform by keyword query of the identification card number of user its Corresponding certificate information in database, if the certificate information of user's input is matched with the certificate information preserved in database, Then the successful information of return authentication is to the server of authentication client, and otherwise, then the information that return authentication fails is extremely The server of authentication client.If the server of checking client receives the successful information of certification, it is determined that treat Certification certificate is legal, if the server of checking client receives the information of authentification failure, it is determined that certificate to be certified is not It is legal.
Step S309, generates the state that certificate certification to be certified passes through, by certificate to be certified labeled as certification certificate. Certification is being compared in the case of, is recorded the certificate information, is marked as certification certificate.
Step S310, generates the unsanctioned state of certificate certification to be certified, that is, is comparing certification not in the case of, The certificate information is recorded, unverified certificate is marked as.
After obtaining step S309 or step S310 authentication result, user can terminate certification, also can return to step Rapid S307 carries out re-authentication or carries out the certification of other new certificates.
After certification terminates, user can be checked by " my certificate " interface of authentication client certification and Unverified each certificate.As shown in figure 5, record has identity card, driver's license, driving license and teacher's card in the interface The certificate title (such as identity card, driver's license) and information that being recorded in information, the information of each certificate has certificate are tested Result is demonstrate,proved, certificate classification is consistent with certificate title in this embodiment, certainly, when actually using the application mode, Certificate classification and certificate title can also be inconsistent, and identity card and driver's license such as are set into identity document classification, will teach Teacher demonstrate,proves and computer grade card is set to technical ability certificate classification.
The information authentication results that teacher demonstrate,proves in the certificate shown in Fig. 5 are " unverified ", and " unverified " is somebody's turn to do by clicking on, The reason for can obtaining unverified prompt message, it is possible to by this reason for unverified prompt message include terminal screen On curtain.
The identification number of each certificate is consistent in the figure, is 12345678910, is merely to illustrate the processing of the application Principle, the processing procedure to the application does not do any restriction.
By above-described embodiment, verified by third-party platform come the information to user, numerous websites can be overcome Each self checking user identity, each stores these individual privacy informations, because each enterprises safeguard protection level is irregular Differ, be faced with the attack of external hackers and the pilferage of insider, there is the major hidden danger of leakage individual privacy information Problem;Can also solve the certification dimension of identity information to be concentrated mainly in correlation technique identity card this uniformity simultaneously Certification certificate on, the life attribute certificate of people is lacked in the service platform and operational program that are authenticated so that body The problem of scene of part certification and application receive larger limitation.
After the completion of preposition flow (i.e. above-mentioned identifying procedure), user has been achieved for certain certificate information and complete Into certification, in actual life usage scenario, above-mentioned authentication result can be used, such as borrows mobile terminal and carries out Instant authentication examination, other users can be treated examination object by authentication client and carry out authentication, as above Stating the first identity information of step S202 extraction biological characteristic can specifically be realized by the steps:
Step S21, obtains the second account belonging to biological characteristic.Obtain the account of object to be checked.
Step S22, extracts the first identity information of the second account, wherein, the first identity information is at least used to record the The identity document information of two accounts.
In an optional embodiment, the first identity information of the above-mentioned steps S22 account of extraction second can include Following sub-step:
Step S221, generation challenge request, and challenge request is sent to the second account, wherein, identity Echo request is used for the authorization message of the account of acquisition request second.Such as landlord Li Si, can be by above-mentioned in rented house Authentication client is authenticated to the identity information of tenant, particular by the authentication of authentication client Function is realized, when the server of authentication client receives the request of authentication client, generates challenge Request, and challenge is asked into transmission to the account of tenant.
Step S222, receives the authorization message that the second account asks to return in response to challenge.Tenant is receiving " Lee Four-way you initiate primary information and check application " challenge request after, challenge request may be displayed on letter Breath is authorized in interface, optionally, may be displayed on the top of certificate information.User can select (such as according to actual conditions Selection identity card, driver's license shown in Fig. 6, teacher's card, driving license) the certificate title that authorizes landlord Li Si to check, There is the certificate for selected mandate of black color dots in the middle of in Fig. 6.
Step S223, extracts the first identity information that the permission indicated by authorization message is checked by the first account.I.e. in number Allow the information checked according to extraction tenant in storehouse, and send it to the authentication client of landlord, landlord can pass through " other side's authentication information " boundary of authentication client (client for logging in the first account) as shown in Figure 7 The information of authorized certificate is checked in face, and landlord can confirm the identity information, also may be used by clicking on " confirmation " button With by clicking on " comment " button, into comment interface, to input the letter of the comment to the user (i.e. the second account) Breath.
It should be noted that all or part in the identity information set that the first identity information is had by the second account, Identification number is partly or entirely carried in identity information set.
Specifically, the above method of the application can also be realized by step as shown in Figure 8, as shown in Figure 8:
Step S801, gathers the image information of object to be checked.
When starting authentication, the shooting of the first terminal for being provided with authentication client of the first account can be used Head gathers the image information of object to be checked.Such as by using client, camera is opened to needing to carry out challenge Party B's (object i.e. to be checked) carry out face and take pictures collection biological information.
Such as when Party A and Party B are being traded, it is necessary to which when checking Party B's relevant information, Party A can open authentication Client, opens camera and gathers its biological information, identity to needing the Party B's progress face for carrying out challenge to take pictures Verify that client after IMAQ completion, sends it to server.
Step S802, first terminal sends the image information collected to server.
Step S803, the server of checking client receives the image information that authentication client is sent.
Step S804, server is extracted to the biological information (such as face information) in image information, and by its with Already present biological information is contrasted in database.Specifically used according to the face information of user and in preposition flow The half body shot when family is by In vivo detection shines into row face contrast.
Step S805, in the case where comparing failure, points out Party A to compare failure, or prompting does not find biological characteristic.
Step S806, if comparing successfully, extracts Back ground Information, authentication information, the third party's card of the second account Part information etc., such as matches corresponding second account according to image information, the biological letter searched for and collected in database Second account of manner of breathing matching.
Step S807, carries out application operation, and server sends certification request to the second account, the first account application is looked into See that the request of its identity information is sent to the second account.Such as after comparing successfully, server is according to user account to second The user of account pushes an authentication examination application information.
Step S808, if the second account disagrees the echo request of the first account, transmission disagrees the information of examination extremely First account, will also can in the lump send to the first account the reason for disagreeing examination.The user of second account can be by such as Authentication client shown in Fig. 6 checks the request.
As shown in fig. 6, the user (i.e. Party B) of the second account is received after examination application, client ejection examination information Authorization page, show application examination Party A's information (i.e. using the first account user Party A relevant information), at present The identity information of examination can be authorized.If Party B agrees to authorize, it can this time be looked into according to actual conditions selection to Party A The certificate information tested (certificate information of certification or unverified only record may be selected);Awarded if Party B disagrees Power, can directly refuse the request, and server feedback refuses the result of request to Party A Party B.
Step S809, the type of credential that Party B selection Party A can check.If Party B agrees to that Party A checks its certificate information, The type of credential for selecting Party A to check is needed, and clicks on determination option, so that Party A checks the certificate information of selection.
Step S810, the second account sends the information for the type of credential that can be checked including Party A to server.
Step S811, server transfers correspondence type of credential and deposits card information.Such as, using the identification card number of Party B as key Word third-party platform inquire about and transfer the driver's license of the user, driving license, academic certificate, teacher's card, police officer's identity card etc. The information of certificate.
By above-described embodiment, by biometrics identification technologies such as the higher recognition of face of arithmetic accuracy, vivo identifications, Up to convenient to carry out, it is possible to improve the experience for the user for carrying out authentication, this method can reach following technology effect Really:(1) instant biomedical information acquisition carried out by wireless terminal, carry out challenge;(2) identity information is awarded Weigh examination mechanism;(3) the various dimensions certificate certificate scheme by core of identity card;(4) O2O (Online To are combined Offline, i.e., combined the commercial chance under line with internet, allow internet turn into off-line transaction platform) difference Scene, user only can allow other side to inquire about the identity that oneself allows to authorizing examination information to take corresponding licensing scheme Information;(5) unified authentication platform and entrance is provided.
Alternatively, in the first identity information that will be extracted as after the second identity information of object to be checked, this Shen Acquisition methods please can also include:The corresponding identity information table of the second identity information is generated, wherein, identity information table In at least record have the certificate title of the second identity information, the identification number corresponding to the second identity information and the second identity Corresponding relation between the information authentication results of information, information authentication results are used to indicate whether the second identity information is verified Pass through;Identity information table is sent to the first account.It can specifically be realized by following steps as shown in Figure 8:
Step S812, generates identity information table.Server can authorize the identity information of examination to generate examination letter according to Party B Table is ceased, Party A's client is pushed to and is shown.
Step S813, sends identity information table to the first account.Party A receives Party B's identity by client and deposits card information Exhibition information table.
Step S814, sends and authorizes the identity information sent to send successful notify to the second account.In server by second The identity information of side is sent to the client of Party A, is sent identity information and is sent successful notice to Party B's client, To point out Party B.
By above-described embodiment, lost face by mobile video or the biological attribute of user just can be quick in short several seconds Acquisition object to be verified identity information, greatly facilitate rent a house, the business in the living scene such as nurse so that Party A can be quickly checked the identity of Party B, and to pay cost smaller for the time of the examination of identity and resource;Use The program, in addition to it can realize the conventional certification of this tradition of identity card, moreover it is possible to using ID card information as tie, lead to Cross with third party certificate management side in the way of mutual trust authorization invocation, to being demonstrate,proved by the teacher of the user of authentication, Other certificates such as academic card, driving license are authenticated, and can be applied it in specific O2O living scenes, On the one hand, the authentication means of challenge have high public credibility, pass through the conjunction of existing certification passage and the Ministry of Public Security Make, can realize and high-precision discrimination is carried out to deposit the card information, biological attribute of existing user, in addition, identity information Secret protection is high, and the side of checking that receiving the identity information of examination side can only authorize at oneself is checked in limited time, and the tool checked Body information is controlled by oneself, protects the use of the identity information of user, furthermore, without identity information is dispersed in not In same O2O scenes, the Party A and Party B of different scenes and industry can enter above-mentioned client as medium platform Examination application, the examination of row identity are authorized.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to one it is The combination of actions of row, but those skilled in the art should know, the present invention is not limited by described sequence of movement System, because according to the present invention, some steps can be carried out sequentially or simultaneously using other.Secondly, art technology Personnel should also know that embodiment described in this description belongs to preferred embodiment, involved action and module Not necessarily necessary to the present invention.
Embodiment 2
According to embodiments of the present invention, a kind of embodiment of the method for the acquisition methods of identity information is additionally provided, Fig. 9 is root According to the flow chart of the acquisition methods of the 4th kind of optional identity information of the embodiment of the present invention.As shown in figure 9, this method Including:
Step S901, the authentication user end to server logged in using the first account sends the image information of collection, Wherein, record needs to be checked the biological characteristic of object in image information, and biological characteristic is obtained for server treats examination pair The second identity information of elephant.
Such as a certain user is when initiating identity information checking request, the authentication client that the first account can be used to log in The image information for gathering another user is sent to server, server identifies another use by the way that image is identified The biological characteristic at family, and corresponding account in database is searched according to the biological characteristic, and obtain the second body of the account Part information, then sends the identity information to the subscription client for initiating identity information checking request.
Step S902, the second identity information that authentication client the reception server is obtained.
By above-described embodiment, needing to obtain when the identity information of object is checked, its first account can be used in user The authentication client logged in, and the image information of the object to be checked by user end to server transmission collection, Record needs to be checked the biological characteristic of object in image information, and server obtains the of object to be checked according to biological characteristic Two identity informations, and the second identity information is sent to request to the authentication client for carrying out authentication, by adopting Collect the biological characteristic of object to be checked, and its identity is determined according to its biological characteristic, due to making when obtaining identity information With biological characteristic, and for same target, it is difficult what is changed that biological characteristic, which is usually, is obtained by biological characteristic Take identity information, it is ensured that the accuracy of the identity information of acquisition, solve in correlation technique and carrying out network identity Checking when, it is impossible to the technical problem of the accurate identity for determining verifier, realize the accurate identity for obtaining verifier Effect.
Alternatively, after the second identity information that authentication client the reception server is obtained, above-mentioned acquisition methods It can also include:The evaluation information of object to be checked is generated, wherein, evaluation information is used for the body for representing object to be checked The confidence level of part information;The evaluation information of object to be checked is uploaded onto the server.
Specifically, the authorization identifying information of Party B's (object i.e. to be checked) is pushed to Party A, the body of Party A by server Part checking client receives and shows Party B's Back ground Information, photo, correspondingly certificate title, passport NO., by certification Whether etc. information;Meanwhile, Party A can be commented on to generate object to be checked by authentication client to Party B Evaluation information, authentication client uploads onto the server the evaluation information of Party A, so that other users check user To the comment information of Party B, to strengthen the richness of the identity information understanding to Party B.
By above-described embodiment there is provided one centered on the identity information of user, with the life attribute certificate of user For the authentication platform of Basic Authentication point, thus overcome authentication in the prior art scene and application by compared with overall situation The defect of limit, meanwhile, user can be commented on by authentication platform to the information of other users, so as to by force to The richness that the identity information at family understands.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to one it is The combination of actions of row, but those skilled in the art should know, the present invention is not limited by described sequence of movement System, because according to the present invention, some steps can be carried out sequentially or simultaneously using other.Secondly, art technology Personnel should also know that embodiment described in this description belongs to preferred embodiment, involved action and module Not necessarily necessary to the present invention.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but The former is more preferably embodiment in many cases.Based on it is such understand, technical scheme substantially or Say that the part contributed to prior art can be embodied in the form of software product, the computer software product is deposited Storage is in a storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal Equipment (can be mobile phone, computer, server, or network equipment etc.) is performed described in each embodiment of the invention Method.
Embodiment 3
According to embodiments of the present invention, a kind of identity information for being used to implement the acquisition methods of above-mentioned identity information is additionally provided Acquisition device, as shown in Figure 10, the device includes:First acquisition unit 20 and extraction unit 30.
First acquisition unit 20 is used to obtain the image information that the authentication client logged in using the first account is sent, Wherein, record needs to be checked the biological characteristic of object in image information.
Image information can be the figure that object to be checked is gathered by being provided with the camera of the terminal of authentication client As information, the image information can be that record needs to be checked object in action message or head image information, the image information Biological characteristic, e.g., the feature such as face, pupil, wrinkle, position shape, skin, the expression of face.
Above-mentioned terminal can be mobile terminal or personal computer, and mobile terminal can be computer, mobile phone, flat board etc..
For example, authentication client can be installed on mobile phone, and logged in using the first account of user's registration at this In authentication client, when needing to verify the identity information of object to be verified, by where authentication client Terminal collection client (object i.e. to be checked) image information, client sends the image information collected to clothes Business device, server the biological characteristic in the image information is identified the biological characteristic for obtaining object to be checked.
Extraction unit 30 is used in the case of finding biological characteristic in database, extracts the first identity of biological characteristic Information, using the first identity information extracted as object to be checked the second identity information.
Record has the biological characteristic of the acquisition target gathered in advance in database, utilizes the object to be checked got Biological characteristic is compared in database, if comparing successfully, that is, confirms to find biological characteristic in database;If Comparison is unsuccessful, then confirms not find biological characteristic in database, in that case, generates for pointing out ratio To the prompt message of failure (or prompting does not find biological characteristic), the prompt message is back to the first account, should Prompt message can be:The biological characteristic of the object is not found.
Such as, server is identifying the biological characteristic (such as five of object to be checked in image information according to image processing algorithm The position of official) after, found in database with after identical face position feature, extract the biological characteristic Record the first identity information in database.
Using first identity information with object to be checked in database with identical biological characteristic as the second identity information, Its identity information is identified from database according to the biological characteristic of object to be checked, obtained identity information can be used In the legitimacy for verifying its identity.
By above-described embodiment, needing to obtain when the identity information of object is checked, obtained by first acquisition unit The image information that the authentication client logged in using the first account is sent, wherein, record has to be checked in image information Test the biological characteristic of object;In the case that extraction unit finds biological characteristic in database, biological characteristic is extracted First identity information, and using the first identity information extracted as object to be checked the second identity information, by adopting Collect the biological characteristic of object to be checked, and its identity is determined according to its biological characteristic, due to making when obtaining identity information With biological characteristic, and for same target, it is difficult what is changed that biological characteristic, which is usually, is obtained by biological characteristic Take identity information, it is ensured that the accuracy of the identity information of acquisition, solve in correlation technique and carrying out network identity Checking when, it is impossible to the technical problem of the accurate identity for determining verifier, realize the accurate identity for obtaining verifier Effect.
It should be noted that extraction unit the first identity information that will be extracted as object to be checked the second identity After information, the corresponding identity information table of the second identity information can also be generated, wherein, at least remember in identity information table Record the letter of the certificate title for having the second identity information, the identification number corresponding to the second identity information and the second identity information The corresponding relation between the result is ceased, information authentication results are used to indicate whether the second identity information is verified;Will Identity information table is sent to the first account.
Alternatively, as shown in figure 11, said extracted unit 30 can include:First acquisition module 31, for obtaining The second account belonging to biological characteristic;Extraction module 32, the first identity information for extracting the second account, wherein, First identity information is at least used for the identity document information for recording the second account.
Specifically, as shown in figure 11, extraction module 32 can include:Sending submodule 321, for generating identity Echo request, and challenge request is sent to the second account, wherein, challenge asks to be used for acquisition request the The authorization message of two accounts;Receiving submodule 322, is returned for receiving the second account in response to challenge request Authorization message;Extracting sub-module 323, for extracting the permission indicated by authorization message is checked by the first account first Identity information.
As shown in figure 12, above-mentioned acquisition device can also include:Second acquisition unit 40, for using in acquisition Before the image information that the authentication client that one account is logged in is sent, the identity document letter of each acquisition target is obtained The physiological characteristic of breath and acquisition target;Authentication unit 50, information is obtained for carrying out Information Authentication to identity document information The result;Storage unit 60, for by the account belonging to acquisition target, the physiological characteristic of acquisition target, identity card Part information and its corresponding information authentication results are saved into database.
Above-mentioned authentication unit is additionally operable to call the third-party platform corresponding to identity document information;Pass through third-party platform Whether legal verify identity document information;If it is legal to verify out identity certificate information, obtain being used to represent that identity document is believed Cease the first result being verified;If it is illegal to verify out identity certificate information, obtain being used to represent identity document information Unsanctioned second result is verified, wherein, information authentication results include the first result and the second result.
Embodiment 4
According to embodiments of the present invention, a kind of identity information for being used to implement the acquisition methods of above-mentioned identity information is additionally provided Acquisition device, as shown in figure 13, the device includes:Transmitting element 70 and receiving unit 80.
The authentication user end to server that transmitting element 70 is used to log in using the first account sends the image gathered Information, wherein, record needs to be checked the biological characteristic of object in image information, and biological characteristic, which is used for server acquisition, to be treated Check the second identity information of object.
Such as a certain user is when initiating identity information checking request, the authentication client that the first account can be used to log in The image information for gathering another user is sent to server, server identifies another use by the way that image is identified The biological characteristic at family, and corresponding account in database is searched according to the biological characteristic, and obtain the second body of the account Part information, then sends the identity information to the subscription client for initiating identity information checking request.
Receiving unit 80 is used for the second identity information that authentication client the reception server is obtained.
By above-described embodiment, needing to obtain when the identity information of object is checked, first is used by transmitting element The authentication user end to server that account is logged in sends the image information of collection, wherein, there be record in image information The biological characteristic of object to be checked, biological characteristic is used for the second identity information that server obtains object to be checked;Receive The second identity information that unit is obtained by authentication client the reception server, by the life for gathering object to be checked Thing feature, and its identity is determined according to its biological characteristic, due to having used biological characteristic when obtaining identity information, and For same target, it is difficult what is changed that biological characteristic, which is usually, and identity information is obtained by biological characteristic, can be with Ensure the accuracy of identity information obtained, solve in correlation technique when carrying out the checking of network identity, it is impossible to accurate Determining the technical problem of the identity of verifier realizes the effect of the accurate identity for obtaining verifier.
Modules provided in the present embodiment are identical with the application method that the corresponding step of embodiment of the method is provided, should Can also be identical with scene.It is noted, of course, that the scheme that above-mentioned module is related to can be not limited to above-mentioned implementation Content and scene in example, and above-mentioned module may operate in terminal or mobile terminal, can by software or Hardware is realized.
Embodiment 5
Embodiments of the invention can provide a kind of terminal, the terminal can be terminal group in Any one computer terminal.Alternatively, in the present embodiment, above computer terminal can also be replaced with The terminal devices such as mobile terminal.
Alternatively, in the present embodiment, above computer terminal can be located in multiple network equipments of computer network At least one network equipment.
Alternatively, Figure 14 is the structured flowchart of another terminal according to embodiments of the present invention.Such as Figure 14 institutes Show, terminal A can include:One or more (one is only shown in figure) processors, memory, with And the acquisition device of identity information.
Wherein, memory can be used for storing obtaining for the identity information in software program and module, such as embodiment of the present invention Take the corresponding programmed instruction/module of method and apparatus, processor by operation be stored in software program in memory and Module, so as to perform various function application and data processing, that is, realizes the acquisition methods of above-mentioned identity information.Deposit Reservoir may include high speed random access memory, can also include nonvolatile memory, such as one or more magnetic storage Device, flash memory or other non-volatile solid state memories.In some instances, memory can further comprise phase For the remotely located memory of processor, these remote memories can pass through network connection to terminal A.Above-mentioned net The example of network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Processor can call the information and application program of memory storage by transmitting device, to perform following step: The image information that the authentication client logged in using the first account is sent is obtained, wherein, there be record in image information The biological characteristic of object to be checked;In the case of finding biological characteristic in database, the first of biological characteristic is extracted Identity information, using the first identity information extracted as object to be checked the second identity information.It can also carry out down State step:The authentication user end to server logged in using the first account sends the image information of collection, wherein, Record needs to be checked the biological characteristic of object in image information, and biological characteristic is used for that server obtains object to be checked Two identity informations;The second identity information that authentication client the reception server is obtained.
Optionally, above-mentioned processor can also carry out the program code of following steps:Obtain second belonging to biological characteristic Account;The first identity information of the second account is extracted, wherein, the first identity information is at least used to record the second account Identity document information.
Optionally, above-mentioned processor can also carry out the program code of following steps:Challenge request is generated, and will Challenge request is sent to the second account, wherein, challenge asks the mandate letter for the account of acquisition request second Breath;Receive the authorization message that the second account asks to return in response to challenge;Extract the permission indicated by authorization message The first identity information checked by the first account.
Processor can call the information and application program of memory storage by transmitting device, to perform following step:
Step S41, the authentication user end to server logged in using the first account sends the image information of collection, Wherein, record needs to be checked the biological characteristic of object in image information, and biological characteristic is obtained for server treats examination pair The second identity information of elephant.
Step S42, the second identity information that authentication client the reception server is obtained.
Using the embodiment of the present invention, needing to obtain when the identity information of object is checked, acquisition is stepped on using the first account The image information (record needs to be checked the biological characteristic of object in image information) that the authentication client in land is sent, and In searching data storehouse whether there is with object identical biological characteristic to be checked, biological characteristic is found in database In the case of, extract corresponding first identity information of the biological characteristic, and using the first identity information extracted as to be checked The second identity information of object is tested, it is determined by gathering the biological characteristic of object to be checked, and according to its biological characteristic Identity, due to having used biological characteristic when obtaining identity information, and for same target, biological characteristic is general It is difficult to change to be, obtains identity information by biological characteristic, it is ensured that the accuracy of the identity information of acquisition, solves In correlation technique of having determined when carrying out the checking of network identity, it is impossible to the technical problem of the accurate identity for determining verifier, Realize the effect of the accurate identity for obtaining verifier.
It will appreciated by the skilled person that the structure shown in Figure 14 is only signal, terminal can also be Smart mobile phone (such as Android phone, iOS mobile phones), tablet personal computer, applause computer and mobile internet device The terminal device such as (Mobile Internet Devices, MID), PAD.Figure 14 its not to above-mentioned electronic installation Structure cause limit.For example, terminal 10 may also include the component more or less than shown in Figure 14 (such as network interface, display device), or with the configuration different from shown in Figure 14.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can be with Completed by program come the device-dependent hardware of command terminal, the program can be stored in a computer-readable storage medium In matter, storage medium can include:Flash disk, read-only storage (Read-Only Memory, ROM), deposit at random Take device (Random Access Memory, RAM), disk or CD etc..
Embodiment 6
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium It can be used for preserving the program code performed by the acquisition methods for the identity information that above-described embodiment one is provided.
Alternatively, in the present embodiment, above-mentioned storage medium can be located in computer network Computer terminal group In any one terminal, or in any one mobile terminal in mobile terminal group.
Alternatively, in the present embodiment, storage medium is arranged to the program code that storage is used to perform following steps:
Step S51, obtains the image information that the authentication client logged in using the first account is sent, wherein, figure As record needs to be checked the biological characteristic of object in information.
Step S52, in the case of finding biological characteristic in database, extracts the first identity information of biological characteristic, Using the first identity information extracted as object to be checked the second identity information.
Alternatively, in the present embodiment, storage medium is arranged to the program code that storage is used to perform following steps:
Step S61, the authentication user end to server logged in using the first account sends the image information of collection, Wherein, record needs to be checked the biological characteristic of object in image information, and biological characteristic is obtained for server treats examination pair The second identity information of elephant.
Step S62, the second identity information that authentication client the reception server is obtained.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
In the above embodiment of the present invention, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment The part of detailed description, may refer to the associated description of other embodiment.
, can be by other in several embodiments provided herein, it should be understood that disclosed technology contents Mode realize.Wherein, device embodiment described above is only schematical, such as division of described unit, It is only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, institute Display or the coupling each other discussed or direct-coupling or communication connection can be by some interfaces, unit or mould The INDIRECT COUPLING of block or communication connection, can be electrical or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to On multiple NEs.Some or all of unit therein can be selected to realize the present embodiment according to the actual needs The purpose of scheme.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit realized using in the form of SFU software functional unit and as independent production marketing or in use, It can be stored in a computer read/write memory medium.Understood based on such, technical scheme essence On all or part of the part that is contributed in other words to prior art or the technical scheme can be with software product Form is embodied, and the computer software product is stored in a storage medium, including some instructions are to cause one Platform computer equipment (can be personal computer, server or network equipment etc.) performs each embodiment institute of the invention State all or part of step of method.And foregoing storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD Etc. it is various can be with the medium of store program codes.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improve and moistened Decorations also should be regarded as protection scope of the present invention.

Claims (14)

1. a kind of acquisition methods of identity information, it is characterised in that including:
The image information that the authentication client logged in using the first account is sent is obtained, wherein, described image Record needs to be checked the biological characteristic of object in information;
In the case of the biological characteristic is found in database, the first identity letter of the biological characteristic is extracted Breath, using first identity information extracted as the object to be checked the second identity information.
2. acquisition methods according to claim 1, it is characterised in that extract the first identity letter of the biological characteristic Breath includes:
Obtain the second account belonging to the biological characteristic;
First identity information of second account is extracted, wherein, first identity information is at least used for Record the identity document information of second account.
3. acquisition methods according to claim 2, it is characterised in that extract first body of second account Part information includes:
Challenge request is generated, and challenge request is sent to second account, wherein, institute State challenge and ask authorization message for the second account described in acquisition request;
Receive the authorization message that second account asks to return in response to the challenge;
Extract first identity information that the permission of the authorization message instruction is checked by first account.
4. acquisition methods according to claim 3, it is characterised in that first identity information is second account All or part in the identity information set that family has, the part or all of band in the identity information set There is identification number.
5. acquisition methods according to claim 1, it is characterised in that by first identity information extracted After the second identity information as the object to be checked, the acquisition methods also include:
The corresponding identity information table of second identity information is generated, wherein, at least remember in the identity information table Record has the certificate title of second identity information, the identification number corresponding to second identity information and described Corresponding relation between the information authentication results of second identity information, described information the result is used to indicate second Whether identity information is verified;
The identity information table is sent to first account.
6. acquisition methods as claimed in any of claims 2 to 5, it is characterised in that use first in acquisition Before the image information that the authentication client that account is logged in is sent, the acquisition methods also include:
Obtain the identity document information of each acquisition target and the physiological characteristic of the acquisition target;
Information Authentication is carried out to the identity document information and obtains information authentication results;
By the account belonging to the acquisition target, the physiological characteristic of the acquisition target, the identity document information And its corresponding information authentication results are saved into the database.
7. acquisition methods according to claim 6, it is characterised in that row information is entered to the identity document information and tested Card, which obtains information authentication results, to be included:
Call the third-party platform corresponding to the identity document information;
The identity document information is verified by the third-party platform whether legal;
If it is legal to verify out the identity document information, obtain being used to represent that the identity document Information Authentication passes through The first result;
If it is illegal to verify out the identity document information, obtain being used to represent the identity document Information Authentication not The second result passed through, wherein, described information the result includes first result and second result.
8. a kind of acquisition methods of identity information, it is characterised in that including:
The authentication user end to server logged in using the first account sends the image information of collection, wherein, Record needs to be checked the biological characteristic of object in described image information, and the biological characteristic is obtained for the server Take the second identity information of the object to be checked;
The authentication client receives the second identity information that the server is obtained.
9. acquisition methods according to claim 8, it is characterised in that receive described in the authentication client After the second identity information that server is obtained, the acquisition methods also include:
The evaluation information of the generation object to be checked, wherein, the evaluation information is waited to check for representing described The confidence level of the identity information of object;
The evaluation information of the object to be checked is uploaded to the server.
10. a kind of acquisition device of identity information, it is characterised in that including:
First acquisition unit, believes for obtaining the image that the authentication client logged in using the first account is sent Breath, wherein, record needs to be checked the biological characteristic of object in described image information;
Extraction unit, in the case of the biological characteristic is found in database, extracts described biological special The first identity information levied, using first identity information extracted as the object to be checked the second body Part information.
11. acquisition device according to claim 10, it is characterised in that the extraction unit includes:
First acquisition module, for obtaining the second account belonging to the biological characteristic;
Extraction module, first identity information for extracting second account, wherein, first body Part information is at least used for the identity document information for recording second account.
12. acquisition device according to claim 11, it is characterised in that the extraction module includes:
Sending submodule, sends to described for generating challenge request, and by challenge request Two accounts, wherein, the challenge asks the authorization message for the second account described in acquisition request;
Receiving submodule, for receiving second account in response to being awarded described in challenge request return Weigh information;
Extracting sub-module, for extracting the permission of the authorization message instruction described in first account examination First identity information.
13. the acquisition device according to claim 11 or 12, it is characterised in that the acquisition device also includes:
Second acquisition unit, for obtaining the image that the authentication client logged in using the first account is sent Before information, the identity document information of each acquisition target and the physiological characteristic of the acquisition target are obtained;
Authentication unit, information authentication results are obtained for carrying out Information Authentication to the identity document information;
Storage unit, for by the account belonging to the acquisition target, the physiological characteristic of the acquisition target, institute State identity document information and its corresponding information authentication results are saved into the database.
14. a kind of acquisition device of identity information, it is characterised in that including:
Transmitting element, the authentication user end to server for being logged in using the first account sends the figure of collection As information, wherein, record needs to be checked the biological characteristic of object in described image information, and the biological characteristic is used The second identity information of the object to be checked is obtained in the server;
Receiving unit, the second identity information that the server is obtained is received for the authentication client.
CN201610066074.4A 2016-01-29 2016-01-29 Identity information acquisition method and device Active CN107025397B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610066074.4A CN107025397B (en) 2016-01-29 2016-01-29 Identity information acquisition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610066074.4A CN107025397B (en) 2016-01-29 2016-01-29 Identity information acquisition method and device

Publications (2)

Publication Number Publication Date
CN107025397A true CN107025397A (en) 2017-08-08
CN107025397B CN107025397B (en) 2020-09-04

Family

ID=59524913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610066074.4A Active CN107025397B (en) 2016-01-29 2016-01-29 Identity information acquisition method and device

Country Status (1)

Country Link
CN (1) CN107025397B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909339A (en) * 2017-11-01 2018-04-13 平安科技(深圳)有限公司 Job candidates verify grading approach, application server and computer-readable recording medium
CN108038179A (en) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 Identity information authentication method and device
CN108347444A (en) * 2018-02-26 2018-07-31 深圳智乾区块链科技有限公司 Identity identifying method, device based on block chain and computer readable storage medium
CN108961096A (en) * 2018-06-27 2018-12-07 温州大学瓯江学院 A kind of construction worker's management system
CN109359601A (en) * 2018-10-19 2019-02-19 平安科技(深圳)有限公司 Authentication recognition methods, electronic device and computer readable storage medium
CN109446778A (en) * 2018-10-30 2019-03-08 珠海市时杰信息科技有限公司 Immovable Property Registration information acquisition method, computer installation and computer readable storage medium based on recognition of face
CN110266658A (en) * 2019-05-31 2019-09-20 苏州达家迎信息技术有限公司 A kind of information updating method, device, electronic equipment and storage medium
CN110796548A (en) * 2019-10-30 2020-02-14 中国农业银行股份有限公司 Asset transaction method and device
WO2020135115A1 (en) * 2018-12-26 2020-07-02 巽腾(广东)科技有限公司 Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
CN112801647A (en) * 2021-01-27 2021-05-14 ***股份有限公司 Transfer method, device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333277A (en) * 2011-07-29 2012-01-25 上海合合信息科技发展有限公司 Electronic name card transmitting method and system combining geographical position information and Bluetooth technology
CN202210263U (en) * 2011-06-30 2012-05-02 汉王科技股份有限公司 Face recognition device
CN102624720A (en) * 2012-03-02 2012-08-01 华为技术有限公司 Method, device and system for identity authentication
CN104717073A (en) * 2015-03-19 2015-06-17 张文 Personal information sharing, personal information sharing method and identity authentication method
CN105095704A (en) * 2014-12-09 2015-11-25 段义生 Identity recognition method based on multiple dynamic authentication
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202210263U (en) * 2011-06-30 2012-05-02 汉王科技股份有限公司 Face recognition device
CN102333277A (en) * 2011-07-29 2012-01-25 上海合合信息科技发展有限公司 Electronic name card transmitting method and system combining geographical position information and Bluetooth technology
CN102624720A (en) * 2012-03-02 2012-08-01 华为技术有限公司 Method, device and system for identity authentication
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
CN105095704A (en) * 2014-12-09 2015-11-25 段义生 Identity recognition method based on multiple dynamic authentication
CN104717073A (en) * 2015-03-19 2015-06-17 张文 Personal information sharing, personal information sharing method and identity authentication method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909339A (en) * 2017-11-01 2018-04-13 平安科技(深圳)有限公司 Job candidates verify grading approach, application server and computer-readable recording medium
CN108038179A (en) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 Identity information authentication method and device
CN108347444A (en) * 2018-02-26 2018-07-31 深圳智乾区块链科技有限公司 Identity identifying method, device based on block chain and computer readable storage medium
CN108961096A (en) * 2018-06-27 2018-12-07 温州大学瓯江学院 A kind of construction worker's management system
CN109359601A (en) * 2018-10-19 2019-02-19 平安科技(深圳)有限公司 Authentication recognition methods, electronic device and computer readable storage medium
CN109446778A (en) * 2018-10-30 2019-03-08 珠海市时杰信息科技有限公司 Immovable Property Registration information acquisition method, computer installation and computer readable storage medium based on recognition of face
WO2020135115A1 (en) * 2018-12-26 2020-07-02 巽腾(广东)科技有限公司 Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
CN110266658A (en) * 2019-05-31 2019-09-20 苏州达家迎信息技术有限公司 A kind of information updating method, device, electronic equipment and storage medium
CN110796548A (en) * 2019-10-30 2020-02-14 中国农业银行股份有限公司 Asset transaction method and device
CN110796548B (en) * 2019-10-30 2022-09-27 中国农业银行股份有限公司 Asset transaction method and device
CN112801647A (en) * 2021-01-27 2021-05-14 ***股份有限公司 Transfer method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN107025397B (en) 2020-09-04

Similar Documents

Publication Publication Date Title
CN107025397A (en) The acquisition methods and device of identity information
US20200119921A1 (en) Digital Identity System
US9712526B2 (en) User authentication for social networks
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
US12050676B2 (en) Digital identity authentication and verification system, method, and device
CA2487055C (en) Use of public switched telephone network for authentication and authorization in on-line transactions
US20210287472A1 (en) Attendance management system and method, and electronic device
US20120032782A1 (en) System for restricted biometric access for a secure global online and electronic environment
WO2016128568A1 (en) Authentication of web content
JP2009543176A (en) Traceless biometric identification system and method
US20150237045A1 (en) Method and system for enhanced biometric authentication
CN103957217A (en) Internet-electronic-business-transaction-oriented method and system
CN107038509A (en) Self-service registration-management system
WO2019200737A1 (en) Real estate data uploading method and apparatus, computer device, and storage medium
Ford Identity and personhood in digital democracy: Evaluating inclusion, equality, security, and privacy in pseudonym parties and other proofs of personhood
CN108306886A (en) A kind of auth method, device and storage medium
AU2021276728A1 (en) Contactless biometric authentication systems and methods thereof
Venter et al. A digital forensic readiness architecture for online examinations
CN113111330A (en) Enterprise legal identity authentication management method and system based on enterprise chain code
CN107517180A (en) Login method and device
Goode Digital identity: solving the problem of trust
Ikuomola Fingerprint-based authentication system for time and attendance management
US20210051017A1 (en) Mobile voting and voting verification system and method
US8886952B1 (en) Method of controlling a transaction
KR20200137435A (en) Opinion collection system and method using secure link address based on block-chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1240344

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant