Second-generation identity card-based authentication method and system

An identity verification and ID card technology, which is applied in the field of identity verification based on the second-generation ID card, can solve the problems that the reliability needs to be improved, the reliability of the second-generation ID card is reduced, and needs to be further improved, so as to improve the reliability. and high efficiency, the effect of removing interference

Inactive Publication Date: 2011-07-20
BEIJING SENSELOCK SOFTWARE TECH CO LTD
View PDF6 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the assistance of relevant staff is needed in the authenticity verification process of the second-generation ID card and the consistency verification process between the second-generation ID card and the cardholder, the reliability of the entire verification process depends on the experience and experience of the staff. The recognition ability is closely related, and the reliability of verification needs to be improved
In addition, some counterfeiters can further reduce the reliability of the second-generation ID card by falsifying the photos on the surface of the second-generation ID card and various anti-counterfeiting marks.
[0005] With the popularization and application of the second-generation ID card, more and more occasions need to accurately verify the identity of the card holder in a short period of time, which puts forward higher requirements for the reliability and efficiency of identity verification. , such as airport security checks, large-scale conference security checks, etc., but in the existing methods of identity verification based on second-generation ID cards, the reliability and efficiency of identity verification are limited due to the need for assistance from relevant staff during the entire identity verification process. Sexuality needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Second-generation identity card-based authentication method and system
  • Second-generation identity card-based authentication method and system
  • Second-generation identity card-based authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution, and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0041] figure 1 It is a flow chart of the method for identity verification based on the second-generation ID card of the present invention. Combine now figure 1 , the method for identity verification based on the second-generation ID card of the present invention is described, specifically as follows:

[0042] Step 101: Acquiring the first image and the third image;

[0043] In this step, the first image is obtained by reading the image stored in the built-in anti-counterfeiting chip of the second-generation ID card; the third image is obtained by collecting the image of the face of the certificate holder.

[0044] Wherein, the acquisition of the first image and the third image may be acquired at the same time, or may be acquired according to a set se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a second-generation identity card-based authentication method and a second-generation identity card-based authentication system. The method comprises the following steps of: A, reading an image stored in a built-in anti-counterfeiting chip of a second-generation identity card to obtain a first image, and performing image acquisition on the face of a card holder to obtain a third image; B, scanning a photo printed on the surface of the second-generation identity card to obtain a second image; C, judging whether similarity between the first and second images is more than or equal to a first preset threshold or not by utilizing a face recognition technology, executing a step D if the similarity between the first and second images is more than or equal to the first threshold, otherwise outputting authentication failure information; and D, judging whether the similarity between the second and third images is more than or equal to a second preset threshold or not by utilizing the face recognition technology, outputting authentication success information if the similarity between the second and third images is more than or equal to the second threshold, otherwise outputting the authentication failure information. By the method and the system provided by the invention, the reliability and efficiency of authentication can be improved.

Description

technical field [0001] The invention relates to image recognition technology, in particular to a method and system for identity verification based on a second-generation ID card. Background technique [0002] At present, my country's second-generation ID cards have been widely popularized. Since the second-generation ID card has a built-in anti-counterfeiting chip, the anti-counterfeiting chip can provide a certain amount of storage space for storing the photo of the cardholder, laying a good foundation for the electronic application of the second-generation ID card. [0003] As a special certificate, the second-generation ID card is mainly used to verify the identity of the holder, and this verification process includes two important links. The first link is the authenticity of the second-generation ID card itself. The second link is the consistency between the second-generation ID card and the holder; among them, the first link can be realized through anti-counterfeiting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/20G06K9/46
Inventor 孙吉平韩勇
Owner BEIJING SENSELOCK SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products