WO2024001600A1 - 非自然人实体操作者实人核身 - Google Patents

非自然人实体操作者实人核身 Download PDF

Info

Publication number
WO2024001600A1
WO2024001600A1 PCT/CN2023/095218 CN2023095218W WO2024001600A1 WO 2024001600 A1 WO2024001600 A1 WO 2024001600A1 CN 2023095218 W CN2023095218 W CN 2023095218W WO 2024001600 A1 WO2024001600 A1 WO 2024001600A1
Authority
WO
WIPO (PCT)
Prior art keywords
natural person
person entity
photo
operator
verification
Prior art date
Application number
PCT/CN2023/095218
Other languages
English (en)
French (fr)
Inventor
夏军
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2024001600A1 publication Critical patent/WO2024001600A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition

Definitions

  • the present disclosure relates to the field of identity verification, and more specifically, to the verification of non-natural person entity operators.
  • a method for a non-natural person entity operator's physical identity includes: receiving a business request from a non-natural person entity operator; and obtaining the identity based on the business request.
  • Personally identifiable information of the operator of the non-natural person entity for personal verification in response to the personal verification process successfully, obtain and identify the ID photo of the non-natural person entity for verification of the non-natural person entity; in response to the successful verification of the non-natural person entity, confirm that the operator of the non-natural person entity is authorized by the non-natural person entity; and according to the Confirm the above-mentioned authorization and release the risk for the above-mentioned business request.
  • the method of integrating the person and the certificate is applied to the identity verification of non-natural person entities (for example, enterprises), and by identifying the operator information in the license (for example, the legal person information in the business license),
  • the risk of the enterprise can be released, and scenario services such as enterprise information changes can be completed quickly, safely and at low cost, which improves the user experience and also significantly improves the user experience. Reduces the investment in human resources of service providers.
  • confirming that the non-natural person entity operator is authorized by the non-natural person entity further includes: comparing the personal identity information of the authorized non-natural person entity operator identified from the ID photo with The personal identity information of the non-natural person entity operator; and in response to the consistency of the comparison results, confirm that the non-natural person entity operator is authorized by the non-natural person entity.
  • obtaining the personal identity information of the non-natural human entity operator for personal verification further includes: capturing the face information and ID card information of the non-natural human entity operator via a camera and transmitting it to the core The identity server; and perform a three-party comparison between the captured face information, the face information extracted from the identity document information, and the face information stored at the verification server to perform personal verification.
  • obtaining and identifying the ID photo of the non-natural person entity for verification of the non-natural person entity further includes: capturing the ID photo of the non-natural person entity via a camera and transmitting it to the verification server; in the verification service The terminal performs anti-counterfeiting detection and content identification on the certificate photo to obtain non-natural person entity certificate information; and compares the obtained non-natural person entity certificate information with the non-natural person entity certificate information stored at the core server. To carry out non-natural person entity verification.
  • performing content recognition on the ID photo to obtain non-natural person entity ID information further includes: performing OCR text recognition and official seal recognition on the ID photo to obtain non-natural person entity ID information.
  • the method further includes, according to the authorization confirmation, combining the obtained personal identity information of the operator of the non-natural person entity with the ID of the non-natural person entity identified from the ID photo of the non-natural person entity.
  • the information is bound and stored on the core server.
  • the ID photo includes a business license photo
  • the personal identity information of the authorized non-natural person entity operator identified from the ID photo is compared with the non-natural person entity operator.
  • the author's personally identifiable information further includes: comparing the name of the legal person identified from the business license photo with the name extracted from the personally identifiable information of the operator of the non-natural person entity.
  • the ID photo includes a business license photo and a power of attorney photo
  • the personal identity information of the authorized non-natural person entity operator identified from the ID photo is compared with the non-natural person entity
  • the operator's personal identity information further includes: comparing the name of the non-natural person entity identified from the photo of the authorization letter with the name of the non-natural person entity identified from the photo of the business license; if the name of the non-natural person entity is consistent, then The official seal of the non-natural person entity identified from the photo of the authorization letter is subject to anti-counterfeiting verification; if the anti-counterfeiting verification result is true, the name of the authorized non-natural person entity operator identified from the photo of the authorization letter is compared with the name of the operator of the non-natural person entity identified from the photo of the authorization letter.
  • the method further includes: in response to the authorization confirmation and the non-natural person entity operator continuing the business operation, performing a second verification.
  • a system for a non-natural person entity operator's physical identity includes: a personal identity module that receives a service request from a non-natural person entity operator; and responds to the Business request, obtain the personal identity information of the non-natural person entity operator for personal verification; the non-natural person entity verification module, in response to the success of the personal verification, obtain and identify the ID photo of the non-natural person entity for the non-natural person verification Entity verification; a risk release module, in response to the success of the non-natural person entity verification, confirming that the non-natural person entity operator has obtained the authorization of the non-natural person entity; and based on the authorization confirmation, risk-taking the business request freed.
  • the real-person identification of enterprise operators can be automatically completed through enterprise license identification and personal identity identification, reducing the instability of manual identification. and misjudgment, which improves the core efficiency of the enterprise and improves the user experience.
  • confirming that the non-natural person entity operator is authorized by the non-natural person entity further includes: comparing the personal identity information of the authorized non-natural person entity operator identified from the ID photo with The personal identity information of the non-natural person entity operator; and in response to the consistency of the comparison results, confirm that the non-natural person entity operator is authorized by the non-natural person entity.
  • obtaining the personal identity information of the non-natural human entity operator for personal verification further includes: capturing the face information and ID card information of the non-natural human entity operator via a camera and transmitting it to the core
  • the identity server performs a three-party comparison between the captured face information, the face information extracted from the identity document information, and the face information stored at the identity verification server to perform personal verification.
  • obtaining and identifying the ID photo of the non-natural person entity for verification of the non-natural person entity further includes: capturing the ID photo of the non-natural person entity via a camera and transmitting it to the verification server; in the verification service The terminal performs anti-counterfeiting detection and content identification on the certificate photo to obtain non-natural person entity certificate information; and compares the obtained non-natural person entity certificate information with the non-natural person entity certificate information stored at the core server. To carry out non-natural person entity verification.
  • performing content recognition on the ID photo to obtain non-natural person entity ID information further includes: performing OCR text recognition and official seal recognition on the ID photo to obtain non-natural person entity ID information.
  • the risk release module further: according to the authorization confirmation, combine the obtained personal identity information of the operator of the non-natural person entity with the non-natural person identified from the ID photo of the non-natural person entity.
  • the physical certificate information is bound and stored in the core server.
  • the ID photo includes a business license photo
  • the personal identity information of the authorized non-natural person entity operator identified from the ID photo is compared with the individual of the non-natural person entity operator.
  • the identity information further includes: comparing the name of the legal person identified from the business license photo with the name extracted from the personal identity information of the operator of the non-natural person entity.
  • the ID photo includes a business license photo and a power of attorney photo
  • the personal identity information of the authorized non-natural person entity operator identified from the ID photo is compared with the non-natural person entity
  • the operator's personal identity information further includes: comparing the name of the non-natural person entity identified from the photo of the authorization letter with the name of the non-natural person entity identified from the photo of the business license; if the name of the non-natural person entity is consistent, then The official seal of the non-natural person entity identified from the photo of the authorization letter is subject to anti-counterfeiting verification; if the anti-counterfeiting verification result is true, the name of the authorized non-natural person entity operator identified from the photo of the authorization letter is compared with the name of the operator of the non-natural person entity identified from the photo of the authorization letter.
  • the risk release module further: performs a secondary verification in response to the authorization confirmation and the non-natural person entity operator continuing the business operation.
  • a computer-readable storage medium having instructions stored thereon which, when executed, cause a machine to perform the method of any of the preceding aspects.
  • FIG. 1 is a schematic architecture diagram of a system in which a non-natural human entity operator is a human core according to an embodiment of the present disclosure.
  • Figure 2 is a timing diagram of an enterprise operator physical entity according to one embodiment of the present disclosure.
  • Figure 3 is a schematic diagram of identity document recognition and enterprise document recognition according to one embodiment of the present disclosure.
  • Figure 4 is a schematic flowchart of a method for a non-natural human entity to operate a physical body according to one embodiment of the present disclosure.
  • FIG. 5 is a schematic architecture diagram of a system in which a non-natural human entity operator is a human core according to an embodiment of the present disclosure.
  • FIG. 1 is a schematic architecture diagram of a system 100 for a non-natural human entity operator, according to an embodiment of the present disclosure.
  • the system 100 may include at least a personal identity module 101, a non-natural person entity identity module 102, and a risk release module 103.
  • the personal identity module 101 may receive a business request from a non-natural person entity operator, and in response to the business request, obtain the personal identity information of the non-natural person entity operator for personal verification.
  • the personal identity module 101 can capture the face information and ID card information of the non-natural person entity operator through a camera and transmit it to the identity server, and use the captured face information from the identity document information.
  • the extracted face information and the face information stored at the verification server are compared in a three-way manner to conduct personal verification.
  • the identity verification of the individual is realized through the integration of the person and the witness.
  • the non-natural person entity verification module 102 may obtain and identify the ID photo of the non-natural person entity in response to the successful personal verification to perform the non-natural person entity verification.
  • the non-natural person entity core module 102 may The camera captures the ID photo of the non-natural person entity and transmits it to the verification server, where anti-counterfeiting detection and content recognition (for example, OCR text recognition and official seal recognition) are performed on each ID photo to obtain the ID card of the non-natural person entity. information, and compare the obtained non-natural person entity certificate information with the non-natural person entity certificate information stored at the verification server to perform non-natural person entity verification.
  • the ID photos of the above-mentioned non-natural person entities may include, for example, photos of business licenses and letters of authorization representing the identity of the non-natural person entities.
  • the risk release module 103 may confirm that the non-natural person entity operator is authorized by the non-natural person entity in response to the successful verification of the non-natural person entity. In one embodiment, the risk release module 103 can compare whether the personal identity information of the authorized non-natural person entity operator identified from the ID photo is consistent with the personal identity information of the non-natural person entity operator, so as to complete the personal verification. After checking with the non-natural person entity, it is further determined whether the current operator is an operator authorized by the non-natural person entity or a non-natural person entity legal person.
  • the above-mentioned verification process of the authorized non-natural person entity operator can be done by comparing the name of the legal person identified from the business license photo with the name of the non-natural person entity operator. This is achieved based on whether the names extracted from the personally identifiable information are consistent.
  • the above-mentioned verification process of the authorized non-natural person entity operator can be realized by the following operation: comparing the identity card identified from the power of attorney photo. Whether the name of the non-natural person entity is consistent with the name of the non-natural person entity identified from the photo of the business license.
  • the risk release module 103 can also bind the obtained personal identity information of the non-natural person entity operator with the non-natural person entity document information identified from the non-natural person entity's document photo during authorization confirmation. And stored in the core server. In further embodiments, the risk release module 103 may also perform a secondary verification in response to authorization confirmation and the non-natural person entity operator continuing business operations.
  • system of the present disclosure and its modules can be implemented in hardware or software, and the modules can be merged or combined in any suitable manner.
  • system of the present disclosure can be implemented on smart devices, which can include but are not limited to smart phones, mobile phones, smart watches, wearable devices, etc.
  • smart devices can include but are not limited to smart phones, mobile phones, smart watches, wearable devices, etc.
  • an enterprise is used as an example to describe the above-mentioned non-natural person entities.
  • Figure 2 is a timing diagram of an enterprise operator physical entity according to one embodiment of the present disclosure.
  • step 1 the user initiates a business request to modify the corporate account password; in step 2, the business system then Call the core system to verify the user's identity; Step 3, after the core system receives the user's request, initialize the verification session and return the verification session to the business system; Step 4, the business front-end system passes the verification Step 5: Pull up the core body front-end SDK based on the core body session ID.
  • the core body front-end sdk displays the core body page based on the core body session ID and requires the user to follow the prompts; step 6.
  • the user follows the prompts to take a photo of the ID card and perform face recognition.
  • Step 7 the core body front-end sdk transmits the received ID document information and face information to the core body server to request the server to perform personal identity verification;
  • Step 8 perform verification on the identity document information at the core body server Recognition, face recognition, and three-way comparison with the face information stored on the core server for witness recognition.
  • the identified personal identity document information includes name, gender, identity number, face information, etc.;
  • Step 9 if the identity recognition is successful, return the personal identity document to the kernel front-end sdk.
  • Step 10 in response to successful face and ID recognition, the core front-end SDK renders the business license and stamped authorization photo page; Step 11, the user follows the prompts to take photos of the business license and stamped authorization; Step 12 , the core body front-end sdk transmits the received corporate ID photos to the core body server to request the core body server to identify the ID photos; step 13, the core body server can identify the received corporate ID photos (for example, business license and authorization letter) to perform content recognition (for example, OCR text recognition and official seal recognition) to obtain corporate certificate information, and compare the obtained corporate certificate information with the corporate certificate information stored on the core server to perform corporate identification. Nuclear body.
  • the core front-end SDK in response to successful face and ID recognition, the core front-end SDK renders the business license and stamped authorization photo page; Step 11, the user follows the prompts to take photos of the business license and stamped authorization; Step 12 , the core body front-end sdk transmits the received corporate ID photos to the core body server to request the core body server to identify the ID photos; step 13, the core
  • the identified business license information includes, for example, name, type, address, legal representative, etc.; in step 14, the core server can perform anti-counterfeiting detection on the received photos of each enterprise's ID through an algorithm.
  • the core server can perform anti-counterfeiting detection on the received photos of each enterprise's ID through an algorithm.
  • the core server can perform anti-counterfeiting detection on the received photos of each enterprise's ID through an algorithm.
  • it can be judged whether the personal identity information of the authorized enterprise operator identified from the ID photo is consistent with the personal identity information of the user. If they are consistent, then it is determined.
  • the user is an operator authorized by the enterprise or an enterprise legal person.
  • Step 15 save the enterprise certificate information obtained in step 13 and the user identity information obtained in step 8 at the verification server;
  • step 16 return the successful verification result of the authorized enterprise operator to the verification front-end SDK;
  • step 17 in response to the successful verification of the enterprise operator, jump to the business password modification page to continue the business operation;
  • Step 18, the user submits a new password;
  • Step 19 submit the new password to the business system;
  • Step 20, in response to the successful verification and continue the business Operation, request the core system to check the verification result for the second time;
  • Step 21 the core system returns the successful result of the second verification to the business system;
  • Step 22 the business system completes the password change request; and step 23, the business system notifies the user that the password change has been completed.
  • this technical solution can automatically complete the identity verification of authorized corporate operators when modifying corporate account passwords without manual intervention, significantly improving corporate verification efficiency, and completing human verification through algorithms. Face recognition and document recognition reduce the instability and misjudgment of manual recognition. In addition, the The technical solution is more secure than mailbox OTP, which solves the problem of mailboxes being easily breached.
  • FIG. 4 is a schematic flowchart of a method 300 for a non-natural human entity operator to conduct a physical examination according to one embodiment of the present disclosure.
  • the method 400 begins in step 401.
  • the personal core module 101 may receive a service request from a non-natural person entity operator.
  • the personal verification module 101 may obtain the personal identity information of the non-natural person entity operator in response to the business request for personal verification.
  • the personal identity module 101 can use smart devices to take photos of non-natural human entity operators and their identity documents, and transmit the captured face information and identity document information to the identity server for further verification. , and then the captured face information, the face information extracted from the ID document information, and the face information stored at the verification server can be compared in a three-way manner at the verification server to perform personal verification. Through the above three-party comparison, the accuracy of personal verification can be improved and the risk of false evidence can be reduced.
  • the non-natural person entity verification module 102 may obtain and identify the ID photo of the non-natural person entity in response to the successful personal verification to perform the non-natural person entity verification.
  • the non-natural person entity authentication module 102 can use a smart device to take photos of non-natural person entity documents (for example, business licenses and stamped authorization letters), and transmit the captured ID photos to the authentication server for verification.
  • anti-counterfeiting detection and content identification can be performed on each ID photo at the verification server to obtain the non-natural person entity certificate information, and the obtained non-natural person entity certificate information is compared with the non-natural person entity certificate information stored at the verification server.
  • the document information of the natural person entity is compared to verify the identity of the non-natural person entity.
  • the non-natural person entity verification module 102 can use OCR to perform text recognition when identifying each received ID photo, and perform official seal recognition to obtain non-natural person entity ID information (for example, non-natural person entity name, type, legal representative people, etc.).
  • the risk release module 103 may confirm that the non-natural person entity operator is authorized by the non-natural person entity in response to the successful verification of the non-natural person entity.
  • the risk release module 103 can compare the personal identity information of the authorized non-natural person entity operator identified from the ID photo with the personal identity information of the non-natural person entity operator, and if the comparison results are consistent Confirm that the operator of the non-natural person entity is authorized by the non-natural person entity.
  • the captured non-natural person entity ID photos include business license photos. The risk release module 103 can compare the business license photos when the personal verification and the non-natural person entity verification are successful.
  • the captured non-natural person entity ID photos include business license photos and authorization letter photos.
  • the risk release module 103 can identify the authorization letter photos from the authorization letter photos when the personal verification and the non-natural person entity verification are successful. Whether the name of the non-natural person entity is consistent with the name of the non-natural person entity identified from the photo of the business license.
  • the non-natural person entity If the name of the non-natural person entity is consistent, then conduct anti-counterfeiting verification on the official seal of the non-natural person entity identified from the photo of the authorization letter. If the anti-counterfeiting verification If the result is true, compare the name of the authorized non-natural person entity operator identified in the authorization letter photo with the name extracted from the personal identity information of the non-natural person entity operator. If they are consistent, then it is not The natural person entity operator core is successful.
  • the risk release module 103 may release the risk for the business request based on the above authorization confirmation. Further, the risk release module 103 may perform a second verification in response to authorization confirmation and the non-natural person entity operator continuing business operations.
  • the person's ID is applied to the identity verification of the non-natural person entity, by identifying the operator information in the ID card, and by using the person's ID to identify whether the user currently operating is an authorized operator or corporate legal person. Release enterprise risks, complete enterprise information changes and other scenario services quickly, safely and at low cost, which improves user experience and also reduces the investment in human resources of service providers.
  • FIG. 5 is a schematic architecture diagram of a multi-device assisted core system 500 according to an embodiment of the present disclosure.
  • system 500 may include memory 501 and at least one processor 502.
  • Memory 501 may include RAM, ROM, or a combination thereof.
  • Memory 501 may store computer-executable instructions that, when executed by at least one processor 502, cause the at least one processor 502 to perform various functions described herein, including: receiving business requests from non-natural human entity operators; based on The business requests to obtain the personal identity information of the non-natural person entity operator for personal verification; in response to the successful personal verification, obtain and identify the ID photo of the non-natural person entity for non-natural person entity verification; in response to the non-natural person entity verification If the identity is successful, it is confirmed that the operator of the non-natural person entity is authorized by the non-natural person entity; and based on the authorization confirmation, the risk of the business request is released.
  • memory 501 may include, among other things, a BIOS that may control basic hardware or software operations, such as interaction with peripheral components or devices.
  • Processor 502 may include an intelligent hardware device (e.g., general purpose processor, DSP, CPU, microcontroller, ASIC, FPGA, programmable logic device, discrete gate or transistor logic components, discrete hardware components, or any combination thereof) .
  • a general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices (eg, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration).
  • the functionality described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope of this disclosure and the appended claims. For example, due to the nature of software, the functionality described herein may be implemented using software executed by a processor, hardware, firmware, hardwiring, or any combination thereof. Features implementing functionality may also be physically located in various locations, including being distributed such that portions of the functionality are implemented at different physical locations.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本公开提供了一种用于非自然人实体操作者实人核身的方法和***。该方法包括:接收非自然人实体操作者的业务请求;基于该业务请求获取该非自然人实体操作者的个人身份信息以进行个人核身;响应于个人核身成功,获取并识别非自然人实体的证件照片以进行非自然人实体核身;响应于非自然人实体核身成功,确认该非自然人实体操作者获得该非自然人实体的授权;以及根据授权确认,对该业务请求进行风险释放。

Description

非自然人实体操作者实人核身 技术领域
本公开涉及身份核验领域,更具体地,涉及非自然人实体操作者实人核身。
背景技术
目前,随着企业电子化的发展,企业账户的安全也越来越重要,在以往***化进程中企业在各个领域或单位都有一套代表本企业的账户,如:银行账户、社保账户等等。这些账户往往都是由公司的财务人员或法人掌握并且用于日常业务。当企业人员流动频繁或者企业原始信息部分丢失时,在例如企业账户变更时,若要验证企业操作者的身份,将变得非常复杂且繁琐。
另外,当前的大部分***都是通过向注册的邮箱发送OTP随机验证码的方式进行校验,这种方式安全水平比较低,容易被攻破邮箱而方便地修改企业账户密码。同时在实际业务中发现很多中小企业注册时使用的邮箱或手机号都已无法追溯,用户此时发起修改密码就会因为无核身产品可用或者无法输入邮箱、手机验证码而失败。
虽然目前也存在一些企业操作者核身手段,但目前存在的核身手段是由企业操作者将能证明自己代表企业的一些资料上传后进行人工审核,然而人工审核的资料可能存在伪造情况,人工审核时不易发现,并且人工审核的流程繁琐且时间长,浪费人力资源。
因此,希望能够提供一种企业操作者实人核身方法,通过企业证照识别和人脸识别来自动完成企业操作者实人核身,降低人工识别的不稳定性和误判性,无需人工介入,提高了企业核身效率,同时提高了用户体验。
发明内容
提供本公开内容以便以简化形式介绍将在以下具体实施方式中进一步的描述一些概念。本公开内容并非旨在标识所要求保护的主题的关键特征或必要特征,也不旨在用于帮助确定所要求保护的主题的范围。
针对以上问题,根据本公开的一个方面,提供了一种用于非自然人实体操作者实人核身的方法,所述方法包括:接收非自然人实体操作者的业务请求;基于所述业务请求获取所述非自然人实体操作者的个人身份信息以进行个人核身;响应于所述个人核身成 功,获取并识别非自然人实体的证件照片以进行非自然人实体核身;响应于所述非自然人实体核身成功,确认所述非自然人实体操作者获得所述非自然人实体的授权;以及根据所述授权确认,对所述业务请求进行风险释放。
本公开实施例的技术方案中,通过将人证合一的方式运用到非自然人实体(例如,企业)身份验证中,通过识别证照中的操作者信息(例如,营业执照中的法人信息),在加上人证识别当前操作的用户是不是营业执照中的法人/授权的操作者来释放企业的风险,快速、安全、低成本完成企业信息变更等场景业务,提高了用户体验,同时也显著降低了服务提供方人力资源的投入。
根据本公开的一个实施例,确认所述非自然人实体操作者获得所述非自然人实体的授权进一步包括:比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息;以及响应于比对结果一致,确认所述非自然人实体操作者获得所述非自然人实体的授权。
根据本公开的进一步实施例,获取所述非自然人实体操作者的个人身份信息以进行个人核身进一步包括:经由相机捕捉所述非自然人实体操作者的人脸信息和身份证件信息并传送到核身服务端;以及将所捕捉的人脸信息、从所述身份证件信息中提取的人脸信息以及在所述核身服务端处存储的人脸信息进行三方比对以进行个人核身。
根据本公开的进一步实施例,获取并识别非自然人实体的证件照片以进行非自然人实体核身进一步包括:经由相机捕捉非自然人实体的证件照片并传送到核身服务端;在所述核身服务端处对所述证件照片进行防伪检测和内容识别以获取非自然人实体证件信息;以及将所获取的非自然人实体证件信息与在所述核身服务端处存储的非自然人实体证件信息进行比对以进行非自然人实体核身。
根据本公开的进一步实施例,对所述证件照片进行内容识别以获取非自然人实体证件信息进一步包括:对所述证件照片进行OCR文字识别和公章识别以获取非自然人实体证件信息。
根据本公开的进一步实施例,所述方法进一步包括根据所述授权确认,将所获取的非自然人实体操作者的个人身份信息与从所述非自然人实体的证件照片中识别出的非自然人实体证件信息进行绑定并存储在核身服务端。
根据本公开的进一步实施例,所述证件照片包括营业执照照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操 作者的个人身份信息进一步包括:比对从所述营业执照照片中识别出的法人姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
根据本公开的进一步实施例,所述证件照片包括营业执照照片和授权书照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息进一步包括:比对从所述授权书照片中识别出的非自然人实体名称与从所述营业执照照片中识别出的非自然人实体名称;如果非自然人实体名称一致,则对从所述授权书照片中识别出的非自然人实体公章进行防伪验证;如果防伪验证结果为真,则比对从所述授权书照片中识别出的经授权非自然人实体操作者的姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
根据本公开的进一步实施例,所述方法进一步包括:响应于所述授权确认且所述非自然人实体操作者继续业务操作,进行二次核身。
根据本公开的另一方面,提供了一种用于非自然人实体操作者实人核身的***,所述***包括:个人核身模块,接收非自然人实体操作者的业务请求;响应于所述业务请求,获取所述非自然人实体操作者的个人身份信息以进行个人核身;非自然人实体核身模块,响应于所述个人核身成功,获取并识别非自然人实体的证件照片以进行非自然人实体核身;风险释放模块,响应于所述非自然人实体核身成功,确认所述非自然人实体操作者获得所述非自然人实体的授权;以及根据所述授权确认,对所述业务请求进行风险释放。
本公开实施例的技术方案中,通过利用上述非自然人实体操作者实人核身的***,可以通过企业证照识别和个人身份识别来自动完成企业操作者实人核身,降低人工识别的不稳定性和误判性,提高了企业核身效率,同时提高了用户体验。
根据本公开的一个实施例,确认所述非自然人实体操作者获得所述非自然人实体的授权进一步包括:比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息;以及响应于比对结果一致,确认所述非自然人实体操作者获得所述非自然人实体的授权。
根据本公开的进一步实施例,获取所述非自然人实体操作者的个人身份信息以进行个人核身进一步包括:经由相机捕捉所述非自然人实体操作者的人脸信息和身份证件信息并传送到核身服务端;将所捕捉的人脸信息、从所述身份证件信息中提取的人脸信息以及在所述核身服务端处存储的人脸信息进行三方比对以进行个人核身。
根据本公开的进一步实施例,获取并识别非自然人实体的证件照片以进行非自然人实体核身进一步包括:经由相机捕捉非自然人实体的证件照片并传送到核身服务端;在所述核身服务端处对所述证件照片进行防伪检测和内容识别以获取非自然人实体证件信息;以及将所获取的非自然人实体证件信息与在所述核身服务端处存储的非自然人实体证件信息进行比对以进行非自然人实体核身。
根据本公开的进一步实施例,对所述证件照片进行内容识别以获取非自然人实体证件信息进一步包括:对所述证件照片进行OCR文字识别和公章识别以获取非自然人实体证件信息。
根据本公开的进一步实施例,所述风险释放模块进一步:根据所述授权确认,将所获取的非自然人实体操作者的个人身份信息与从所述非自然人实体的证件照片中识别出的非自然人实体证件信息进行绑定并存储在核身服务端。
根据本公开的进一步实施例,所述证件照片包括营业执照照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息进一步包括:比对从所述营业执照照片中识别出的法人姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
根据本公开的进一步实施例,所述证件照片包括营业执照照片和授权书照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息进一步包括:比对从所述授权书照片中识别出的非自然人实体名称与从所述营业执照照片中识别出的非自然人实体名称;如果非自然人实体名称一致,则对从所述授权书照片中识别出的非自然人实体公章进行防伪验证;如果防伪验证结果为真,则比对从所述授权书照片中识别出的经授权非自然人实体操作者的姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
根据本公开的进一步实施例,所述风险释放模块进一步:响应于所述授权确认且所述非自然人实体操作者继续业务操作,进行二次核身。
根据本公开的又一方面,提供了一种存储有指令的计算机可读存储介质,当这些指令被执行时使得机器执行前述方面中的任一者所述的方法。
通过阅读下面的详细描述并参考相关联的附图,这些及其他特点和优点将变得显而易见。应该理解,前面的概括说明和下面的详细描述只是说明性的,不会对所要求保护的各方面形成限制。
附图说明
为了能详细地理解本公开的上述特征所用的方式,可以参照各实施例来对以上简要概述的内容进行更具体的描述,其中一些方面在附图中示出。然而应该注意,附图仅示出了本公开的某些典型方面,故不应被认为限定其范围,因为该描述可以允许有其它等同有效的方面。
图1是根据本公开的一个实施例的非自然人实体操作者实人核身的***的示意架构图。
图2是根据本公开的一个实施例的企业操作者实人核身的时序图。
图3是根据本公开的一个实施例的身份证件识别以及企业证件识别的示意图。
图4是根据本公开的一个实施例的非自然人实体操作者实人核身的方法的示意流程图。
图5是根据本公开的一个实施例的非自然人实体操作者实人核身的***的示意架构图。
具体实施方式
下面结合附图详细描述本公开,本公开的特点将在以下的具体描述中得到进一步的显现。
图1是根据本公开的一个实施例的非自然人实体操作者实人核身的***100的示意架构图。***100可至少包括个人核身模块101、非自然人实体核身模块102和风险释放模块103。
个人核身模块101可接收非自然人实体操作者的业务请求,并且响应于该业务请求,获取该非自然人实体操作者的个人身份信息以进行个人核身。在一个实施方式中,个人核身模块101可经由相机捕捉非自然人实体操作者的人脸信息和身份证件信息并传送到核身服务端,并且将所捕捉的人脸信息、从身份证件信息中提取的人脸信息以及在该核身服务端处存储的人脸信息进行三方比对以进行个人核身,由此,通过人证合一来实现对个人的身份核验。
非自然人实体核身模块102可响应于个人核身成功而获取并识别非自然人实体的证件照片以进行非自然人实体核身。在一个实施方式中,非自然人实体核身模块102可经 由相机捕捉非自然人实体的证件照片并传送到核身服务端,在该核身服务端处对各证件照片进行防伪检测和内容识别(例如,OCR文字识别和公章识别)以获取非自然人实体证件信息,并且将所获取的非自然人实体证件信息与在该核身服务端处存储的非自然人实体证件信息进行比对以进行非自然人实体核身。上述非自然人实体的证件照片可包括例如代表非自然人实体身份的营业执照照片和授权书照片。
风险释放模块103可响应于非自然人实体核身成功而确认该非自然人实体操作者获得该非自然人实体的授权。在一个实施方式中,风险释放模块103可比对从证件照片中识别出的经授权非自然人实体操作者的个人身份信息与该非自然人实体操作者的个人身份信息是否一致,以在完成个人核身与非自然人实体核身之后进一步判断当前操作者是否是由非自然人实体授权的操作者或非自然人实体法人。在一个实施方式中,在证件照片包括营业执照照片的情形中,上述经授权非自然人实体操作者核身过程可以通过比对从营业执照照片中识别出的法人姓名与从非自然人实体操作者的个人身份信息中提取出的姓名是否一致来实现。在另一实施方式中,在证件照片包括营业执照照片和授权书照片的情形中,上述经授权非自然人实体操作者核身过程可以通过如下操作来实现:比对从授权书照片中识别出的非自然人实体名称与从营业执照照片中识别出的非自然人实体名称是否一致,如果非自然人实体名称一致,则对从授权书照片中识别出的非自然人实体公章进行防伪验证,如果防伪验证结果为真,则比对从该授权书照片中识别出的经授权非自然人实体操作者的姓名与从非自然人实体操作者的个人身份信息中提取出的姓名是否一致,若一致,则核身成功。在进一步的实施方式中,风险释放模块103还可在授权确认时将所获取的非自然人实体操作者的个人身份信息与从非自然人实体的证件照片中识别出的非自然人实体证件信息进行绑定并存储在核身服务端。在进一步的实施方式中,风险释放模块103还可响应于授权确认且非自然人实体操作者继续业务操作而进行二次核身。
本领域技术人员能够理解,本公开的***及其各模块既可以以硬件形式实现,也可以以软件形式实现,并且各模块可以任意合适的方式合并或组合。另外,本公开的***可以实现在智能设备上,该智能设备可包括但不限于智能电话、移动电话、智能手表、可穿戴设备等。另外,在下文中,为清楚起见,以企业为例来描述以上提及的非自然人实体。
图2是根据本公开的一个实施例的企业操作者实人核身的时序图。
在图2中,步骤1,用户发起修改企业账户密码的业务请求;步骤2,业务***随后 调用核身***对用户进行身份核身;步骤3,在核身***收到用户请求之后,初始化本次核身会话,并且将该核身会话返回给业务***;步骤4,业务前端***通过核身会话ID拉起核身前端sdk步骤5,该核身前端sdk根据该核身会话ID展示核身页面,要求用户按提示进行操作;步骤6,用户按提示对身份证件拍照并进行人脸识别;步骤7,该核身前端sdk将接收到的身份证件信息和人脸信息传送到核身服务端以请求服务端进行个人身份校验;步骤8,在核身服务端处对身份证件信息进行识别,并且进行人脸识别,并且与核身服务端处存储的人脸信息进行三方比对,以进行人证识别。如图3中的300所示,所识别出的个人身份证件信息包括姓名、性别、身份号码、人脸信息等;步骤9,在人证识别成功的情况下,向核身前端sdk返回个人核身成功结果;步骤10,响应于人脸及证件识别成功,核身前端sdk渲染营业执照、盖章授权书拍照页面;步骤11,用户按照提示对营业执照和盖章授权书进行拍照;步骤12,核身前端sdk将接收到的企业证件照片传送到核身服务端以请求该核身服务端对证件照片进行识别;步骤13,核身服务端可对接收到的各企业证件照片(例如,营业执照和授权书)进行内容识别(例如,OCR文字识别和公章识别)以获取企业证件信息,并且将所获取的企业证件信息与核身服务端处存储的企业证件信息进行比对以进行企业核身。如图3中的301所示,所识别出的营业执照信息包括例如名称、类型、住所、法定代表人等;步骤14,核身服务端可通过算法对接收到的各企业证件照片进行防伪检测以进一步实现企业核身,其中在企业核身成功的情况下,可判断从证件照片中识别出的经授权企业操作者的个人身份信息与该用户的个人身份信息是否一致,若一致,则确定该用户为企业授权的操作者或企业法人。如图3所示,可通过比对从身份证件中提取的姓名与从营业执照中提取的法定代表人的姓名来判断该用户是否为企业授权的操作者(在此为企业法人);步骤15,在核身服务端处对步骤13中获取的企业证件信息和步骤8中获取的用户身份信息进行存证;步骤16,向核身前端sdk返回经授权企业操作者核身成功结果;步骤17,响应于企业操作者核身成功,跳转业务修改密码页面以继续业务操作;步骤18,用户提交新密码;步骤19,向业务***提交新密码;步骤20,响应于核身成功以及继续业务操作,请求核身***二次检测核身结果;步骤21,核身***向业务***返回二次核身成功结果;
步骤22,业务***完成密码变更请求;以及步骤23,业务***通知用户已完成密码变更。
由上述修改企业账号密码的场景中可见,该技术方案在修改企业账户密码时可以自动完成经授权企业操作者的身份核验,无需人工介入,显著提高了企业核身效率,并且通过算法完成了人脸识别和证件识别,降低了人工识别的不稳定性和误判性,另外,该 技术方案的安全性比邮箱OTP更高,解决了邮箱易被攻破的问题。
考虑如下另一场景,在需要变更企业法人信息时,目前银行和社保等单位都要求企业操作者携带企业公章和营业执照等证件去对应柜台进行办理,此种方式繁琐且低效,需要去很多地点进行变更,利用本公开的技术方案,无需人工介入,只需通过算法进行人证识别即可完成经授权企业操作者的实人核身,这显著提高了核身安全性以及用户体验。
图4是根据本公开的一个实施例的非自然人实体操作者实人核身的方法300的示意流程图。方法400开始于步骤401,个人核身模块101可接收非自然人实体操作者的业务请求。
在步骤402,个人核身模块101可响应于该业务请求而获取该非自然人实体操作者的个人身份信息以进行个人核身。在一个实施方式中,个人核身模块101可利用智能设备对非自然人实体操作者及其身份证件进行拍照,并且将所捕捉的人脸信息和身份证件信息传送到核身服务端以进行进一步验证,随后可在核身服务端处将所捕捉的人脸信息、从身份证件信息中提取的人脸信息以及在该核身服务端处存储的人脸信息进行三方比对以进行个人核身。通过上述三方比对,可以提高个人核身的准确率并且降低假证风险。
在步骤403,非自然人实体核身模块102可响应于个人核身成功而获取并识别非自然人实体的证件照片以进行非自然人实体核身。在一个实施方式中,非自然人实体核身模块102可利用智能设备对非自然人实体证件(例如,营业执照和盖章授权书)进行拍照,将所捕捉的证件照片传送到核身服务端以进行进一步验证,随后可在核身服务端处对各证件照片进行防伪检测和内容识别以获取非自然人实体证件信息,并且将所获取的非自然人实体证件信息与在该核身服务端处存储的非自然人实体证件信息进行比对以进行非自然人实体核身。例如,非自然人实体核身模块102可在对接收到的各证件照片进行识别时利用OCR进行文字识别,并且进行公章识别以获取非自然人实体证件信息(例如,非自然人实体名称、类型、法定代表人等)。
在步骤404,风险释放模块103可响应于非自然人实体核身成功而确认该非自然人实体操作者获得该非自然人实体的授权。在一个实施方式中,风险释放模块103可比对从证件照片中识别出的经授权非自然人实体操作者的个人身份信息与非自然人实体操作者的个人身份信息,并且在比对结果一致的情况下确认该非自然人实体操作者获得该非自然人实体的授权。在一个实施方式中,捕捉的非自然人实体证件照片包括营业执照照片,风险释放模块103可在个人核身和非自然人实体核身成功时比对从该营业执照照 片中识别出的法人姓名与从该非自然人实体操作者的个人身份信息中提取出的姓名是否一致,若一致,则确定该非自然人实体操作者为由该非自然人实体授权的操作者(即,非自然人实体操作者核身成功)。在另一实施方式中,捕捉的非自然人实体证件照片包括营业执照照片和授权书照片,风险释放模块103可在个人核身和非自然人实体核身成功时比对从该授权书照片中识别出的非自然人实体名称与从该营业执照照片中识别出的非自然人实体名称是否一致,若非自然人实体名称一致,则对从该授权书照片中识别出的非自然人实体公章进行防伪验证,如果防伪验证结果为真,则比对从该授权书照片中识别出的经授权非自然人实体操作者的姓名与从该非自然人实体操作者的个人身份信息中提取出的姓名是否一致,若一致,则非自然人实体操作者核身成功。
在步骤405,风险释放模块103可根据上述授权确认,对业务请求进行风险释放。进一步地,风险释放模块103可响应于授权确认且该非自然人实体操作者继续业务操作,进行二次核身。
由此,通过将人证合一的方式运用到非自然人实体身份验证中,通过识别证照中的操作者信息,再加上人证识别当前操作的用户是否为经授权的操作者或企业法人来释放企业的风险,快速、安全、低成本完成企业信息变更等场景业务,提高了用户体验,同时也降低了服务提供方人力资源的投入。
图5是根据本公开的一个实施例的多设备协助式核身的***500的示意架构图。如图5中所示,***500可包括存储器501和至少一个处理器502。存储器501可包括RAM、ROM、或其组合。存储器501可存储计算机可执行指令,这些指令在由至少一个处理器502执行时使该至少一个处理器502执行本文中所描述的各种功能,包括:接收非自然人实体操作者的业务请求;基于该业务请求获取该非自然人实体操作者的个人身份信息以进行个人核身;响应于个人核身成功,获取并识别非自然人实体的证件照片以进行非自然人实体核身;响应于非自然人实体核身成功,确认该非自然人实体操作者获得该非自然人实体的授权;以及根据授权确认,对该业务请求进行风险释放。在一些情形中,存储器501可尤其包含BIOS,该BIOS可控制基本硬件或软件操作,诸如与***组件或设备的交互。处理器502可包括智能硬件设备(例如,通用处理器、DSP、CPU、微控制器、ASIC、FPGA、可编程逻辑器件、分立的门或晶体管逻辑组件、分立的硬件组件,或其任何组合)。
结合本文中的公开描述的各种解说性框以及模块可以用设计成执行本文中描述的功能的通用处理器、DSP、ASIC、FPGA或其他可编程逻辑器件、分立的门或晶体管逻辑、 分立的硬件组件、或其任何组合来实现或执行。通用处理器可以是微处理器,但在替换方案中,处理器可以是任何常规的处理器、控制器、微控制器、或状态机。处理器还可被实现为计算设备的组合(例如,DSP与微处理器的组合、多个微处理器、与DSP核心协同的一个或多个微处理器,或者任何其他此类配置)。
本文中所描述的功能可以在硬件、由处理器执行的软件、固件、或其任何组合中实现。如果在由处理器执行的软件中实现,则各功能可以作为一条或多条指令或代码存储在计算机可读介质上或藉其进行传送。其他示例和实现落在本公开及所附权利要求的范围内。例如,由于软件的本质,本文描述的功能可使用由处理器执行的软件、硬件、固件、硬连线或其任何组合来实现。实现功能的特征也可物理地位于各种位置,包括被分布以使得功能的各部分在不同的物理位置处实现。
以上所已经描述的内容包括所要求保护主题的各方面的示例。当然,出于描绘所要求保护主题的目的而描述每一个可以想到的组件或方法的组合是不可能的,但本领域内的普通技术人员应该认识到,所要求保护主题的许多进一步的组合和排列都是可能的。从而,所公开的主题旨在涵盖落入所附权利要求书的精神和范围内的所有这样的变更、修改和变化。

Claims (19)

  1. 一种用于非自然人实体操作者实人核身的方法,所述方法包括:
    接收非自然人实体操作者的业务请求;
    基于所述业务请求获取所述非自然人实体操作者的个人身份信息以进行个人核身;
    响应于所述个人核身成功,获取并识别非自然人实体的证件照片以进行非自然人实体核身;
    响应于所述非自然人实体核身成功,确认所述非自然人实体操作者获得所述非自然人实体的授权;以及
    根据所述授权确认,对所述业务请求进行风险释放。
  2. 如权利要求1所述的方法,确认所述非自然人实体操作者获得所述非自然人实体的授权进一步包括:
    比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息;以及
    响应于比对结果一致,确认所述非自然人实体操作者获得所述非自然人实体的授权。
  3. 如权利要求1所述的方法,获取所述非自然人实体操作者的个人身份信息以进行个人核身进一步包括:
    经由相机捕捉所述非自然人实体操作者的人脸信息和身份证件信息并传送到核身服务端;以及
    将所捕捉的人脸信息、从所述身份证件信息中提取的人脸信息以及在所述核身服务端处存储的人脸信息进行三方比对以进行个人核身。
  4. 如权利要求1所述的方法,获取并识别非自然人实体的证件照片以进行非自然人实体核身进一步包括:
    经由相机捕捉非自然人实体的证件照片并传送到核身服务端;
    在所述核身服务端处对所述证件照片进行防伪检测和内容识别以获取非自然人实体证件信息;以及
    将所获取的非自然人实体证件信息与在所述核身服务端处存储的非自然人实体证件信息进行比对以进行非自然人实体核身。
  5. 如权利要求4所述的方法,对所述证件照片进行内容识别以获取非自然人实体证件信息进一步包括:
    对所述证件照片进行OCR文字识别和公章识别以获取非自然人实体证件信息。
  6. 如权利要求1所述的方法,进一步包括:
    根据所述授权确认,将所获取的非自然人实体操作者的个人身份信息与从所述非自然人实体的证件照片中识别出的非自然人实体证件信息进行绑定并存储在核身服务端。
  7. 如权利要求2所述的方法,所述证件照片包括营业执照照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息进一步包括:
    比对从所述营业执照照片中识别出的法人姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
  8. 如权利要求2所述的方法,所述证件照片包括营业执照照片和授权书照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息进一步包括:
    比对从所述授权书照片中识别出的非自然人实体名称与从所述营业执照照片中识别出的非自然人实体名称;
    如果非自然人实体名称一致,则对从所述授权书照片中识别出的非自然人实体公章进行防伪验证;以及
    如果防伪验证结果为真,则比对从所述授权书照片中识别出的经授权非自然人实体操作者的姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
  9. 如权利要求1所述的方法,进一步包括:
    响应于所述授权确认且所述非自然人实体操作者继续业务操作,进行二次核身。
  10. 一种用于非自然人实体操作者实人核身的***,所述***包括:
    个人核身模块,
    接收非自然人实体操作者的业务请求;
    基于所述业务请求获取所述非自然人实体操作者的个人身份信息以进行个人核身;
    非自然人实体核身模块,
    响应于所述个人核身成功,获取并识别非自然人实体的证件照片以进行非自然人实体核身;以及
    风险释放模块,
    响应于所述非自然人实体核身成功,确认所述非自然人实体操作者获得所述非自然人实体的授权;以及
    根据所述授权确认,对所述业务请求进行风险释放。
  11. 如权利要求10所述的***,确认所述非自然人实体操作者获得所述非自然人实体的授权进一步包括:
    比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息;以及
    响应于比对结果一致,确认所述非自然人实体操作者获得所述非自然人实体的授权。
  12. 如权利要求10所述的***,获取所述非自然人实体操作者的个人身份信息以进行个人核身进一步包括:
    经由相机捕捉所述非自然人实体操作者的人脸信息和身份证件信息并传送到核身服务端;以及
    将所捕捉的人脸信息、从所述身份证件信息中提取的人脸信息以及在所述核身服务端处存储的人脸信息进行三方比对以进行个人核身。
  13. 如权利要求10所述的***,获取并识别非自然人实体的证件照片以进行非自然人实体核身进一步包括:
    经由相机捕捉非自然人实体的证件照片并传送到核身服务端;
    在所述核身服务端处对所述证件照片进行防伪检测和内容识别以获取非自然人实体证件信息;以及
    将所获取的非自然人实体证件信息与在所述核身服务端处存储的非自然人实体证件信息进行比对以进行非自然人实体核身。
  14. 如权利要求13所述的***,对所述证件照片进行内容识别以获取非自然人实体证件信息进一步包括:
    对所述证件照片进行OCR文字识别和公章识别以获取非自然人实体证件信息。
  15. 如权利要求10所述的***,所述风险释放模块进一步:
    根据所述授权确认,将所获取的非自然人实体操作者的个人身份信息与从所述非自然人实体的证件照片中识别出的非自然人实体证件信息进行绑定并存储在核身服务端。
  16. 如权利要求11所述的***,所述证件照片包括营业执照照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息进一步包括:
    比对从所述营业执照照片中识别出的法人姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
  17. 如权利要求11所述的***,所述证件照片包括营业执照照片和授权书照片,并且比对从所述证件照片中识别出的经授权非自然人实体操作者的个人身份信息与所述非自然人实体操作者的个人身份信息进一步包括:
    比对从所述授权书照片中识别出的非自然人实体名称与从所述营业执照照片中识 别出的非自然人实体名称;
    如果非自然人实体名称一致,则对从所述授权书照片中识别出的非自然人实体公章进行防伪验证;以及
    如果防伪验证结果为真,则比对从所述授权书照片中识别出的经授权非自然人实体操作者的姓名与从所述非自然人实体操作者的个人身份信息中提取出的姓名。
  18. 如权利要求10所述的***,所述风险释放模块进一步:
    响应于所述授权确认且所述非自然人实体操作者继续业务操作,进行二次核身。
  19. 一种存储有指令的计算机可读存储介质,当所述指令被执行时使得机器执行如权利要求1-9中任一项所述的方法。
PCT/CN2023/095218 2022-06-30 2023-05-19 非自然人实体操作者实人核身 WO2024001600A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210767253.6A CN115035583A (zh) 2022-06-30 2022-06-30 非自然人实体操作者实人核身方法和***
CN202210767253.6 2022-06-30

Publications (1)

Publication Number Publication Date
WO2024001600A1 true WO2024001600A1 (zh) 2024-01-04

Family

ID=83127971

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/095218 WO2024001600A1 (zh) 2022-06-30 2023-05-19 非自然人实体操作者实人核身

Country Status (2)

Country Link
CN (1) CN115035583A (zh)
WO (1) WO2024001600A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035583A (zh) * 2022-06-30 2022-09-09 支付宝(杭州)信息技术有限公司 非自然人实体操作者实人核身方法和***

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600294A (zh) * 2016-12-09 2017-04-26 广东网金云计算有限公司 用于金融领域快速识别企业身份的方法及***
CN111553785A (zh) * 2020-04-02 2020-08-18 上海浦东发展银行股份有限公司 一种交互式业务触发的银行对公账户开户核验方法和***
WO2020253225A1 (zh) * 2019-06-18 2020-12-24 创新先进技术有限公司 基于区块链的企业认证、认证追溯方法、装置及设备
CN115035583A (zh) * 2022-06-30 2022-09-09 支付宝(杭州)信息技术有限公司 非自然人实体操作者实人核身方法和***

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109523371B (zh) * 2018-10-12 2023-04-07 深圳壹账通智能科技有限公司 在线放款审核方法、装置、计算机设备及存储介质
CN110322646A (zh) * 2019-07-05 2019-10-11 上海卓繁信息技术股份有限公司 数字***理方法
CN113326263A (zh) * 2021-06-08 2021-08-31 支付宝(杭州)信息技术有限公司 安全存储区域的使用权限处理、使用控制方法及装置
CN114168912A (zh) * 2021-10-29 2022-03-11 中国建设银行股份有限公司 用户角色权限确定方法、装置及电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600294A (zh) * 2016-12-09 2017-04-26 广东网金云计算有限公司 用于金融领域快速识别企业身份的方法及***
WO2020253225A1 (zh) * 2019-06-18 2020-12-24 创新先进技术有限公司 基于区块链的企业认证、认证追溯方法、装置及设备
CN111553785A (zh) * 2020-04-02 2020-08-18 上海浦东发展银行股份有限公司 一种交互式业务触发的银行对公账户开户核验方法和***
CN115035583A (zh) * 2022-06-30 2022-09-09 支付宝(杭州)信息技术有限公司 非自然人实体操作者实人核身方法和***

Also Published As

Publication number Publication date
CN115035583A (zh) 2022-09-09

Similar Documents

Publication Publication Date Title
US10715520B2 (en) Systems and methods for decentralized biometric enrollment
JP7240030B2 (ja) 身元情報認証方法、装置及びサーバ
CN109389723B (zh) 利用人脸识别的访客管理方法、装置、计算机设备
US20210089635A1 (en) Biometric identity verification and protection software solution
US11824851B2 (en) Identification document database
WO2019042324A1 (zh) 资源转移方法、资金支付方法、装置及电子设备
US11228587B2 (en) Method, system, device and software programme product for the remote authorization of a user of digital services
US11665157B2 (en) Systems and methods for authenticating users within a computing or access control environment
WO2019153461A1 (zh) 身份信息更改方法、装置、终端设备及存储介质
US11663306B2 (en) System and method for confirming a person's identity
US20190280862A1 (en) System and method for managing id
CN114556356B (zh) 用户认证框架
KR102139257B1 (ko) 비대면 인증 서비스 제공 시스템
WO2024001600A1 (zh) 非自然人实体操作者实人核身
WO2018148900A1 (zh) 基于指纹识别的校验方法、装置、以及交易***
CN104809614A (zh) 基于网络和生物特征的身份识别和支付装置及其实现方法
US20190158493A1 (en) Triggering role-based workflows with user authentication
KR20150115049A (ko) 얼굴인식을 이용한 금융자동화 기기의 보안 강화 방법 및 시스템
EP3217593A1 (en) Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system
US11128620B2 (en) Online verification method and system for verifying the identity of a subject
CN103049686A (zh) 用Usb Key来实现数据库和用户信息验证方法
WO2016086801A1 (zh) 基于计算机***的业务处理方法及其装置
KR101876671B1 (ko) 서버 사이의 통신을 통한 전자 서명 방법 및 이를 실행하는 시스템
CN111353144A (zh) 一种身份认证的方法和装置
US20220124090A1 (en) Identity verification through a centralized biometric database

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23829786

Country of ref document: EP

Kind code of ref document: A1