Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method and system

A technology of identity authentication and ID card, applied in character and pattern recognition, instruments, computer parts, etc., can solve the problems of fraudulent telecommunication charges, contract fraud, false capital contribution, etc., to reduce personal and social losses and reduce opportunities machine effect

Inactive Publication Date: 2018-06-15
BEIJING GZT NETWORK TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. Loan fraud
[0005] 3. Contract fraud
[0006] 4. Fraudulently using other people's identity documents to register the company and make false capital contributions
[0007] 5. Telecom tariff fraud
[0008] 6. Falsely using other people's ID cards to commit online fraud
However, there are problems with the above method. For example, because some ID photos have been taken for a long time, they may differ from their appearance when handling business, which makes some users unable to handle business; in addition, if a criminal wants to pretend to be an ID card , you can use makeup and other means to make it look very similar to the ID card, so as to complete criminal acts such as financial fraud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0058] Specifically, such as figure 1 As shown, the present invention proposes a method for identity authentication, which includes the following steps:

[0059] Step S101, taking on-site photos of users to obtain on-site photos;

[0060] Step S102, scanning the ID card of the user to obtain the image of the ID card;

[0061] Step S103, comparing the on-site photo with the photo of the ID card, if the image comparison result does...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and system. The method comprises the following steps of 1, performing site photography on a user to obtain a site photo; 2, scanning an identity card of the user to obtain an identity card image; 3, performing image comparison on the site photo and the identity card image, and if an image comparison result is that the site photo is not matched with the identity card image, indicating that identity authentication fails, otherwise, entering the step 4; and 4, comparing the site photo with photos in a big data photo database one by one, andif an image comparison result is that the site photo is not matched with the photos in the big data photo database, indicating that the identity authentication fails, otherwise, indicating that the identity authentication succeeds. Through the method and the system, personal identity authentication can be effectively performed; lawbreakers can be effectively prevented from performing financial fraud, internet fraud and phone fraud by utilizing identity cards lost by others; the exploitable opportunities of criminals are objectively reduced; and the personal and social loss is reduced.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to an identity authentication method and system. Background technique [0002] At present, in order to prevent criminals from using fake ID cards to carry out illegal and criminal activities, the public security department and the financial system and other departments have established an identity system network to effectively curb the use of fake ID cards to carry out illegal and criminal activities. However, in real life, it is more common for ID cards to be lost or stolen, and criminals use other people’s real ID cards to carry out illegal and criminal activities. The common types of crime methods are: [0003] 1. Credit card fraud. Criminals falsely use other people's ID cards to open accounts in banks and apply for credit cards, and then use credit cards to carry out malicious overdrafts. [0004] 2. Loan fraud. Criminals use other people's ID cards to apply for loan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G06K9/34G06K9/46G06K9/62
CPCG06V40/172G06V10/26G06V10/464G06F18/24155
Inventor 汪陆生高红梅李莉莉孙立宏陈放
Owner BEIJING GZT NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products