CN110709854A - Identity information security monitoring method and system - Google Patents

Identity information security monitoring method and system Download PDF

Info

Publication number
CN110709854A
CN110709854A CN201780000224.4A CN201780000224A CN110709854A CN 110709854 A CN110709854 A CN 110709854A CN 201780000224 A CN201780000224 A CN 201780000224A CN 110709854 A CN110709854 A CN 110709854A
Authority
CN
China
Prior art keywords
comparison
identity
verification
information
business handling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780000224.4A
Other languages
Chinese (zh)
Inventor
胡梓楷
林程博
胡高价
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd
Original Assignee
Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd filed Critical Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd
Publication of CN110709854A publication Critical patent/CN110709854A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Alarm Systems (AREA)

Abstract

An identity information security monitoring method and system are provided, wherein the identity information security monitoring method comprises the following steps: collecting identity card information of current business handling personnel, wherein the identity card information comprises character information and face photos (S1); performing real-time camera monitoring on a current business handling window, and performing face recognition on current business handling personnel who are performing identity card information acquisition in time to acquire a face image of the current business handling personnel (S2); performing comparison verification, wherein the comparison verification comprises comparison verification of the similarity between the face image and the face photo (S3); and displaying the comparison and verification result and the identity card information on the camera monitoring picture in real time in a label insertion mode (S4). The identity information security monitoring method and the identity information security monitoring system can realize the unity of the identity cards and prevent the phenomena of embezzlement and imposition of the identity cards of other people as far as possible.

Description

Identity information security monitoring method and system Technical Field
The invention relates to the technical field of information security, in particular to a method and a system for monitoring identity information security.
Background
Along with the development of society, the demand of strengthening the safety control of identity information authenticity is higher and higher, can't be cancelled to impersonating other people's certificate and second generation certificate, the problem of being easily stolen, bring a great deal of hidden danger for certificate-using unit and individual, bring huge economic property loss even, offend law, cause official and so on, therefore, need to show identity card mechanism or place at bank, public security, management of going out and entering, social security center etc. urgent need to strengthen identity information safety monitoring, in order to stop appearing the problem of impersonating other people's certificate as far as possible.
Disclosure of Invention
The invention aims to provide an identity information security monitoring method and system, which can realize identity card unification and prevent the phenomena of embezzlement and imposition of identity cards of other people as far as possible.
In order to achieve the above object, the present invention provides an identity information security monitoring method, which comprises the following steps: acquiring identity card information of current business handling personnel, wherein the identity card information comprises character information and face photos; performing real-time camera monitoring on a current business handling window, and performing face recognition on current business handling personnel who are performing identity card information acquisition in time to acquire face images of the current business handling personnel; performing comparison verification, wherein the comparison verification comprises comparison verification of the similarity between the face image and the face picture; and displaying the comparison and verification result and the identity card information on a camera monitoring picture in real time in a tag insertion mode respectively.
Preferably, the identification card information further includes fingerprint feature information.
Preferably, the identity information security monitoring method further includes the following steps: performing fingerprint acquisition on the current business handling personnel to obtain a fingerprint image of the current business handling personnel; the comparison and verification further comprises comparison and verification of the similarity between the fingerprint image and the fingerprint feature information.
Preferably, the identity information security monitoring method further includes the following steps: and recording all data generated in the comparison and verification process in real time so as to carry out data management and data query.
Preferably, the identity information security monitoring method further includes the following steps: and (4) a public security system is connected, the flow and the population information are counted, and linkage alarm is carried out on the expert persons and the credit investigation blacklist persons found in the comparison verification process.
In addition, in order to achieve the above object, the present invention further provides an identity information security monitoring system, including: the identity card information acquisition module is used for acquiring identity card information of current business handling personnel, wherein the identity card information comprises character information and face photos; the camera monitoring module is used for carrying out real-time camera monitoring on a current business handling window and carrying out face recognition on the current business handling personnel who are carrying out identity card information acquisition in time so as to obtain a face image of the current business handling personnel; the comparison verification module is used for performing comparison verification, and the comparison verification comprises comparison verification of the similarity between the face image and the face photo; and the label generation and insertion module is used for displaying the comparison and verification result and the identity card information on a camera monitoring picture in real time in a label insertion mode.
Preferably, the identification card information further includes fingerprint feature information.
Preferably, the identity information security monitoring system further comprises a fingerprint acquisition module, which is used for performing fingerprint acquisition on the current business handling personnel to obtain a fingerprint image of the current business handling personnel; the comparison and verification further comprises comparison and verification of the similarity between the fingerprint image and the fingerprint feature information.
Preferably, the identity information security monitoring system further comprises a data management query module, which is used for recording all data generated in the comparison and verification process in real time so as to perform data management and data query.
Preferably, the identity information security monitoring system further comprises a linkage alarm module, which is used for connecting a public security system, counting the flow of people and the population information, and performing linkage alarm on the editorial staff and the credit investigation blacklist staff discovered in the comparison verification process.
The identity information safety monitoring method and the identity information safety monitoring system provided by the invention have the advantages that the identity card information of the current business handling personnel is collected, the face image of the current business handling personnel is also collected in real time, and the similarity between the face image and the face picture in the identity card information is compared and verified, so that the current business handling personnel can be ensured to use the identity card of the user for business handling, the unity of the identity card is further realized, and the phenomena of embezzlement and imposition of other identity cards are avoided as far as possible. Meanwhile, the comparison and verification result and the identity card information are respectively displayed on the camera monitoring picture in real time in a label inserting mode, so that the information becomes visual and visible, and monitoring personnel can conveniently control the field condition in real time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a method for monitoring identity information security according to a first embodiment of the present invention.
Fig. 2 is a block diagram of an identity information security monitoring system according to a second embodiment of the present invention.
Detailed Description
The following further describes embodiments of the present invention with reference to the drawings. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
As shown in fig. 1, a first embodiment of the present invention provides an identity information security monitoring method, which specifically includes the following steps:
step S1: and acquiring identity card information of the current business handling personnel, wherein the identity card information comprises character information and face photos.
Specifically, an identity card reader can be arranged on the current business handling window to collect the identity card information of the current business handling personnel, the identity card can be identified by 100%, and the false identity card cannot read the identity card information. The personnel of handling business need provide oneself resident identification card before handling relevant business at present, at this moment, read the ware through the ID card and can intelligently read the characters information and the face photo that store in the resident identification card, and along with increasing the standard of policeman's management to resident identification information, still store resident's fingerprint characteristic information in the resident identification card, at this moment, read the ware through the ID card and still intelligently read the fingerprint characteristic information that stores in the resident identification card.
Step S2: and carrying out real-time camera monitoring on the current business handling window, and timely carrying out face recognition on current business handling personnel who are carrying out identity card information acquisition so as to obtain face images of the current business handling personnel.
Specifically, a high-definition camera is used for carrying out real-time camera shooting monitoring on a current business handling window and carrying out all-weather real-time video recording so as to facilitate follow-up inquiry and evidence collection. Meanwhile, when the identity card reader on the current business handling window acquires the identity card information of the current business handling personnel, the face acquisition program of the high-definition camera can be automatically triggered, and face recognition is automatically performed on the current business handling personnel to acquire the face image of the current business handling personnel. Whole process need not manual operation, and one-stop collection, simultaneously, the camera direction is adjustable, makes things convenient for not co-altitude personnel to shoot, and software automatic identification people face, and in addition, this high definition digtal camera disposes the high color rendering LED people face light source of professional just white light, can be according to ambient light, and the light intensity is adjusted, guarantees that people face light is even and light standard is unified.
In addition, if the ID card reader also intelligently reads fingerprint characteristic information stored in the resident ID card, in order to further improve the accuracy of comparison verification results, the following steps can be simultaneously carried out: and fingerprint collection is carried out on the current business handling personnel to obtain the fingerprint image of the current business handling personnel.
Specifically, a fingerprint acquisition module meeting the standard of the ministry of public security can be arranged on the current business handling window so as to acquire fingerprints of current business handling personnel on site, and further acquire fingerprint images of the current business handling personnel so as to facilitate further comparison and verification in the follow-up process.
Step S3: and performing comparison verification, wherein the comparison verification comprises comparison verification of the similarity between the face image and the face photo.
Specifically, in order to ensure that the current business handling personnel uses the personal identity card to conduct business handling, so as to realize unity of the personal identity card and to stop stealing and faking of the identity card of other people as much as possible, the similarity between the face image acquired by the high-definition camera and the face picture in the identity card information needs to be compared and verified, at the moment, the comparison similarity can be manually set (namely, the similarity value is automatically set), when the similarity between the face image acquired by the high-definition camera and the face picture in the identity card information reaches the set value, the comparison is passed, and at the moment, the system judges that the current business handling personnel uses the personal identity card to conduct business handling; when the similarity between the human face image collected by the high-definition camera and the human face picture in the identity card information does not reach the set value, the comparison is not passed, at the moment, the system judges that the current business handling personnel can falsely use other person identity cards to handle the business, and the voice reminds the monitoring personnel to pay attention to the current business handling personnel.
In addition, in order to further improve the accuracy of the comparison verification result, the similarity between the fingerprint image acquired by the fingerprint acquisition module on site and the fingerprint characteristic information in the identity card information can be compared and verified, at the moment, the comparison similarity can be manually set (namely, the similarity value is automatically set), when the similarity between the fingerprint image acquired by the fingerprint acquisition module on site and the fingerprint characteristic information in the identity card information reaches the set value, the comparison is calculated to be passed, and at the moment, the system judges that the current business transacting personnel uses the identity card to transact business; when the similarity between the fingerprint image acquired on the spot by the fingerprint acquisition module and the face photo in the identity card information does not reach the set value, the comparison is not passed, at the moment, the system judges that the current service handling personnel can falsely use the identity card of other people to handle the service, and the voice reminds the monitoring personnel to attend to the current service handling personnel. And when the two comparison verification results are both failed, the system judges that the current business handling personnel really use the identity cards of other people to handle the business, and reminds the monitoring personnel to manage and control the current business handling personnel through voice.
Step S4: and respectively displaying the comparison and verification result and the identity card information on a camera monitoring picture in real time in a tag insertion mode.
Specifically, in order to enable the comparison information to be visual and convenient for monitoring personnel to control the field situation in real time, the comparison and verification result and the identity card information can be displayed on the camera monitoring picture in real time in a label inserting mode respectively. The monitoring interface of the high-definition camera supports label insertion through a software mode, so that the comparison and verification result and the identity card information (including character information, face photos and fingerprint characteristic information) can be displayed on the monitoring interface in a label insertion mode.
Step S51: all data generated in the comparison and verification process are recorded in real time so as to facilitate data management and data query.
Specifically, all data generated in the verification process are recorded in real time through comparison, the data comprise face images collected by a high-definition camera, fingerprint images collected by a fingerprint collection module, identity card information (including character information, face photos and fingerprint characteristic information) collected by an identity card reader and the like, and comparison verification results, so that data management and data query are facilitated, workers can check the face images, the fingerprint images, the identity card information, the comparison verification results and the like recorded in verification in the future conveniently, meanwhile, information data and photos can be exported, the exported photo names are named according to the identity card photos and the field collected photos, identity card data can also be exported to EXCEL, and backup checking or other purposes can be performed.
Step S52: and (4) a public security system is connected, the flow and the population information are counted, and linkage alarm is carried out on the expert persons and the credit investigation blacklist persons found in the comparison verification process.
Specifically, the system can be in butt joint with a public security system, can download or upload a face picture to a designated server to count the flow and population information of people, and meanwhile, the system is provided with a blacklist/white list early warning mechanism to perform linkage warning on the editorial staff and the credit investigation blacklist staff of the public security system found in the comparison and verification process.
As shown in fig. 2, a second embodiment of the present invention provides an identity information security monitoring system 100, where the identity information security monitoring system 100 includes an identity card collecting module 110, a camera monitoring module 120, a fingerprint collecting module 130, a comparison verifying module 140, a tag generating and inserting module 150, a data management querying module 160, and a linkage alarming module 170.
The identity card collecting module 110 is mainly used for collecting identity card information of current business handling personnel, wherein the identity card information comprises character information, face photos and fingerprint characteristic information. The camera monitoring module 120 is mainly used for performing real-time camera monitoring on a current business handling window, and performing face recognition on current business handling personnel performing identity card information acquisition in time to acquire face images of the current business handling personnel. The fingerprint collecting module 130 is mainly used for collecting fingerprints of currently performed service staff to obtain fingerprint images of the currently performed service staff. The comparison and verification module 140 is mainly used for performing comparison and verification, where the comparison and verification includes comparison and verification of the similarity between the face image and the face photo and comparison and verification of the similarity between the fingerprint image and the fingerprint feature information. The tag generation and insertion module 150 is mainly used for displaying the comparison and verification result and the identification card information on the camera monitoring picture in real time in a tag insertion mode. The data management query module 160 is mainly used for recording all data generated in the comparison and verification process in real time so as to perform data management and data query. The linkage alarm module 170 is mainly used for connecting a public security system, counting the pedestrian volume and the population information, and carrying out linkage alarm on the expert and the credit investigation blacklist people discovered in the comparison verification process.
In operation, the camera monitoring module 120 will perform real-time camera monitoring on the current business handling window, perform all-weather real-time video recording, while the current business handling personnel need to provide the resident identification card of the user in the process of carrying out business handling in the current business handling window, the identification card collecting module 110 will collect the identification card information of the resident identification card, collect the identification card information including the character information, face photograph and fingerprint feature information, the fingerprint collection module 130 will perform on-site fingerprint collection for the current business handling personnel, so as to obtain the fingerprint image of the currently performing business handling personnel, and at the same time, the camera monitoring module 120 will also start the face recognition mode to perform face recognition on the currently performing business handling personnel in time, so as to obtain the face image of the currently performing business handling personnel. Then, the comparison and verification module 140 starts comparison and verification, wherein the comparison and verification comprises comparison and verification of the similarity between the face image and the face photo and comparison and verification of the similarity between the fingerprint image and the fingerprint feature information, when the similarity between the face image and the fingerprint feature information reaches a set value, the comparison is passed, and at the moment, the system judges that the current business handling personnel uses the personal identity card to perform business handling; when the similarity between the two does not reach the set value, the comparison is not passed, at the moment, the system judges that the current business handling personnel may falsely use the identity cards of other people to handle the business, and the voice reminds the monitoring personnel to pay attention to the current business handling personnel. In the process of comparing and verifying by the comparison and verification module 140, the tag generation and insertion module 150 gradually displays the identification card information and the comparison and verification result on the camera monitoring picture in real time in a tag insertion manner, so that the comparison information becomes visual and visible, and monitoring personnel can conveniently control the field situation in real time. At this time, the linkage alarm module 170 may also perform statistics of the flow rate and the demographic information, and perform linkage alarm on the expert and the credit investigation blacklist persons found in the comparison verification process, and the data management query module 160 may record all data generated in the comparison verification process in real time, so as to perform data management and data query.
The identity information safety monitoring method and the identity information safety monitoring system provided by the invention have the advantages that the identity card information of the current business handling personnel is collected, the face image of the current business handling personnel is also collected in real time, and the similarity between the face image and the face picture in the identity card information is compared and verified, so that the current business handling personnel can be ensured to use the identity card of the user for business handling, the unity of the identity card is further realized, and the phenomena of embezzlement and imposition of other identity cards are avoided as far as possible. Meanwhile, the comparison and verification result and the identity card information are respectively displayed on the camera monitoring picture in real time in a label inserting mode, so that the information becomes visual and visible, and monitoring personnel can conveniently control the field condition in real time.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the described embodiments. It will be apparent to those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, and the scope of protection is still within the scope of the invention.

Claims (10)

  1. An identity information security monitoring method is characterized by comprising the following steps:
    acquiring identity card information of current business handling personnel, wherein the identity card information comprises character information and face photos;
    performing real-time camera monitoring on a current business handling window, and performing face recognition on current business handling personnel who are performing identity card information acquisition in time to acquire face images of the current business handling personnel;
    performing comparison verification, wherein the comparison verification comprises comparison verification of the similarity between the face image and the face picture;
    and displaying the comparison and verification result and the identity card information on a camera monitoring picture in real time in a tag insertion mode respectively.
  2. The identity information security monitoring method of claim 1, wherein the identity card information further comprises fingerprint feature information.
  3. The identity information security monitoring method of claim 2, further comprising the steps of: performing fingerprint acquisition on the current business handling personnel to obtain a fingerprint image of the current business handling personnel; the comparison and verification further comprises comparison and verification of the similarity between the fingerprint image and the fingerprint feature information.
  4. The identity information security monitoring method of any one of claims 1 to 3, further comprising the steps of: and recording all data generated in the comparison and verification process in real time so as to carry out data management and data query.
  5. The identity information security monitoring method of any one of claims 1 to 3, further comprising the steps of: and (4) a public security system is connected, the flow and the population information are counted, and linkage alarm is carried out on the expert persons and the credit investigation blacklist persons found in the comparison verification process.
  6. An identity information security monitoring system, comprising:
    the identity card information acquisition module is used for acquiring identity card information of current business handling personnel, wherein the identity card information comprises character information and face photos;
    the camera monitoring module is used for carrying out real-time camera monitoring on a current business handling window and carrying out face recognition on the current business handling personnel who are carrying out identity card information acquisition in time so as to obtain a face image of the current business handling personnel;
    the comparison verification module is used for performing comparison verification, and the comparison verification comprises comparison verification of the similarity between the face image and the face photo;
    and the label generation and insertion module is used for displaying the comparison and verification result and the identity card information on a camera monitoring picture in real time in a label insertion mode.
  7. The identity information security monitoring system of claim 6, wherein the identity card information further comprises fingerprint feature information.
  8. The identity information security monitoring system of claim 6, further comprising a fingerprint acquisition module for performing fingerprint acquisition on the currently performing business handling personnel to obtain a fingerprint image of the currently performing business handling personnel; the comparison and verification further comprises comparison and verification of the similarity between the fingerprint image and the fingerprint feature information.
  9. The system for monitoring identity information security of any one of claims 6-8, further comprising a data management and query module for recording all data generated during the comparison and verification process in real time for data management and data query.
  10. The identity information security monitoring system according to any one of claims 6 to 8, further comprising a linkage alarm module for interfacing with a public security system, counting the flow of people and the demographic information, and performing linkage alarm on the editorial staff and the credit blacklist staff found in the comparison and verification process.
CN201780000224.4A 2017-04-12 2017-04-12 Identity information security monitoring method and system Pending CN110709854A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/080217 WO2018187959A1 (en) 2017-04-12 2017-04-12 Identity information security monitoring method and system

Publications (1)

Publication Number Publication Date
CN110709854A true CN110709854A (en) 2020-01-17

Family

ID=63792222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780000224.4A Pending CN110709854A (en) 2017-04-12 2017-04-12 Identity information security monitoring method and system

Country Status (2)

Country Link
CN (1) CN110709854A (en)
WO (1) WO2018187959A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291912A (en) * 2020-03-10 2020-06-16 广州南翼信息科技有限公司 Number taking method, number taking machine and number taking system using witness verification
CN113704727A (en) * 2021-07-02 2021-11-26 深圳市赛云数据有限公司 SIM card identity verification management and updating device

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598208B (en) * 2018-11-14 2023-06-06 创新先进技术有限公司 Portrait verification method and device
CN109800638A (en) * 2018-12-14 2019-05-24 四川远鉴科技有限公司 A kind of emphasis people's monitoring method based on face recognition technology
CN109543657A (en) * 2018-12-19 2019-03-29 深圳市亚略特生物识别科技有限公司 Face identity veritifies device
CN109902780A (en) * 2019-02-14 2019-06-18 广州番禺职业技术学院 Testimony of a witness unification verification terminal and system and method based on multi-modal recognition of face
CN110346842A (en) * 2019-08-08 2019-10-18 广州佳都数据服务有限公司 Self-service security system and control method
CN112988820A (en) * 2019-12-16 2021-06-18 航天信息股份有限公司 Service processing method and device
CN110942407A (en) * 2019-12-26 2020-03-31 北京中安百傲科技有限公司 Electronic evidence collection device and management system
CN110955677A (en) * 2019-12-31 2020-04-03 中国银行股份有限公司 Identity verification method, device and system
CN114554124A (en) * 2020-11-24 2022-05-27 深圳市银翔科技有限公司 Electronic evidence collection and management platform
CN112842314A (en) * 2020-12-31 2021-05-28 合肥指南针电子科技有限责任公司 Security check module and physical examination module integrated monitoring system
CN112842313A (en) * 2020-12-31 2021-05-28 合肥指南针电子科技有限责任公司 Monitoring system comprising physical examination module and attendance module
CN112842315A (en) * 2020-12-31 2021-05-28 合肥指南针电子科技有限责任公司 Monitoring system
CN113221732B (en) * 2021-05-10 2021-12-10 精点视界(深圳)科技有限公司 Realization method for precisely manufacturing intelligent certificate card by big data based on face recognition

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218599A (en) * 2013-03-26 2013-07-24 苏州福丰科技有限公司 System and method for authenticating generation II identity card based on face recognition
WO2014101220A1 (en) * 2012-12-31 2014-07-03 Xu Jin Intelligent security system based on facial recognition
CN104134065A (en) * 2014-07-11 2014-11-05 北京航天金盾科技有限公司 Office business system with face comparison and fingerprint identification functions for notary office
CN105844247A (en) * 2016-03-25 2016-08-10 杭州信鸽金融信息服务股份有限公司 Bi-camera cabinet machine and face recognition and second-generation ID card identification system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425972A (en) * 2013-09-02 2013-12-04 北方工业大学 Method and system for automatically identifying true and false of identity document possessor
CN103440482A (en) * 2013-09-02 2013-12-11 北方工业大学 Method, system and device for identifying identity document holder based on hidden video

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014101220A1 (en) * 2012-12-31 2014-07-03 Xu Jin Intelligent security system based on facial recognition
CN103218599A (en) * 2013-03-26 2013-07-24 苏州福丰科技有限公司 System and method for authenticating generation II identity card based on face recognition
CN104134065A (en) * 2014-07-11 2014-11-05 北京航天金盾科技有限公司 Office business system with face comparison and fingerprint identification functions for notary office
CN105844247A (en) * 2016-03-25 2016-08-10 杭州信鸽金融信息服务股份有限公司 Bi-camera cabinet machine and face recognition and second-generation ID card identification system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
裴志扬, 重庆大学出版社 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291912A (en) * 2020-03-10 2020-06-16 广州南翼信息科技有限公司 Number taking method, number taking machine and number taking system using witness verification
CN113704727A (en) * 2021-07-02 2021-11-26 深圳市赛云数据有限公司 SIM card identity verification management and updating device

Also Published As

Publication number Publication date
WO2018187959A1 (en) 2018-10-18

Similar Documents

Publication Publication Date Title
CN110709854A (en) Identity information security monitoring method and system
US9740926B2 (en) Identity verification using biometric data
CN109214276A (en) A kind of system and method for the target person track following based on face recognition technology
US8558663B2 (en) Integration of facial recognition into cross channel authentication
CN109829381A (en) A kind of dog only identifies management method, device, system and storage medium
CN106780250B (en) Intelligent community security event processing method and system based on Internet of things technology
US20100177193A1 (en) Remote and digital data transmission systems and satellite location from mobile or fixed terminals with urban surveillance cameras for facial recognition, data collection of public security personnel and missing or kidnapped individuals and city alarms, stolen vehicles, application of electronic fines and collection thereof through a personal id system by means of a multifunctional card and collection of services which all of the elements are communicated to a command center
CN108876276A (en) Automatic Work attendance method and device based on recognition of face
CN107093066A (en) Service implementation method and device
CN103559485A (en) Identity authentication method and device based on remote bank VTM
CN105844246A (en) Face recognition and second-generation ID card identification system with single camera cabinet machine
KR101554174B1 (en) Method and system for controlling an entrance and exit in airport security area
CN210515326U (en) Scenic spot ticket inspection system based on face AI recognition
US20160125404A1 (en) Face recognition business model and method for identifying perpetrators of atm fraud
CN109598251A (en) Testimony of a witness checking method, device, equipment and system and storage medium
US11348367B2 (en) System and method of biometric identification and storing and retrieving suspect information
CN110930566A (en) Safe rechecking method, system and device for vehicles to and from prisons and storable medium
CN113837030A (en) Intelligent personnel management and control method and system for epidemic situation prevention and control and computer equipment
CN111291912A (en) Number taking method, number taking machine and number taking system using witness verification
CN205581878U (en) Two camera cabinet -type air conditioner testimony of a witness recognition device
CN111385530B (en) Intelligent camera combined encryption method and system
CN110728778A (en) Intelligent visitor reservation management system and method based on face recognition
KR20090035798A (en) Store and search system and the method of the license plate images
CN108197599A (en) A kind of face identification system
CN208013969U (en) A kind of content reproduction terminal and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200117

RJ01 Rejection of invention patent application after publication