CN113177797B - User identity information authentication method, system, device, equipment and storage medium - Google Patents
User identity information authentication method, system, device, equipment and storage medium Download PDFInfo
- Publication number
- CN113177797B CN113177797B CN202110492466.8A CN202110492466A CN113177797B CN 113177797 B CN113177797 B CN 113177797B CN 202110492466 A CN202110492466 A CN 202110492466A CN 113177797 B CN113177797 B CN 113177797B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- authenticated
- stored
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Multimedia (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application discloses a user identity information authentication method, a system, a device, equipment and a storage medium. According to the technical scheme provided by the embodiment of the application, the first check code is generated according to the first user information by receiving the first user information sent by the trusted device, the device to be authenticated matched with the first user information is determined based on the first user information, the server matches the first check code with the third check code stored by the server, if the first check code is the same as the third check code, the stored trusted grade of the device to be authenticated is modified, the authentication of the user identity information is completed, the whole identity information authentication process greatly reduces the steps needing direct participation of the user, avoids the complicated operation of the user, can reduce the time of queuing operation of the user, greatly improves the convenience of use of the user, increases the user experience, reduces the input cost of the device, is convenient for the elderly to use, and has strong universality.
Description
Technical Field
The embodiment of the application relates to the technical field of identity authentication, in particular to a user identity information authentication method, a system, a device, user identity information authentication equipment and a storage medium.
Background
The identity authentication means that the identity of the user is confirmed by a special means, and the identity authentication process is needed in industrial and commercial, tax, finance, public inspection, transportation and other industrial scenes, for example, when the user goes to a bank to transact business, the identity of the user needs to be authenticated to determine the business transacting authority.
One of the important links of identity authentication is verification of personal identity information, namely, the credibility of the face, the name and the identification card number of a user is ensured.
The method is commonly used in combination with APP or applet, namely, a user inputs personal identity information such as personal information and face information when registering by using the APP or applet and then sends the personal identity information to a server or keeps a personal identity information in the APP or applet terminal. The personal identity information in the process is finished by the user, and the credibility of the personal identity information is not ensured without identity information verification. In order to ensure the credibility of personal identity information, there are several methods, namely, on-line verification of the identity is carried out by an authoritative personal information certification authority, which is fast, convenient and quick, but the certification cost is relatively high, and the other method is to carry out the certification by off-line equipment, wherein the common method is to put the identity card on identity verification equipment with an identity card reader, read the identity card information, then collect live face images and carry out face recognition comparison with the face of the identity card, and generate two-dimension codes after the identity is determined, and a user can complete the information verification of personal identity information and user accounts through the corresponding two-dimension codes on an APP or applet recognition screen, so that whether the personal identity information of a server end and a mobile phone end is credible is ensured, but the operation mode steps are relatively more, time is relatively long, the user learning cost is high, the mastering difficulty is relatively high, and the use of the mobile phone is more inconvenient for the elderly.
Disclosure of Invention
The embodiment of the application provides a user identity information authentication method, a system, a device, equipment and a storage medium, so as to minimize user operation steps in the identity information authentication process and improve the convenience of identity authentication.
In a first aspect, an embodiment of the present application provides a method for authenticating user identity information, including:
receiving first user information sent by trusted equipment, wherein the first user information is acquired through the trusted equipment;
Generating a first check code based on the first user information, and determining equipment to be authenticated matched with the first user information, wherein second user information is pre-stored in the equipment to be authenticated, and the reliability level of the first user information acquired through the trusted equipment is higher than that of the second user information stored in the equipment to be authenticated;
And determining a stored third check code corresponding to the equipment to be authenticated, and if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated to finish authentication of the user identity information.
Further, after modifying the stored trusted level of the device to be authenticated, the method further comprises:
and sending the first check code to the equipment to be authenticated, wherein the equipment to be authenticated is used for matching the first check code with a second check code, if the matching is successful, the equipment to be authenticated carries out authentication grade modification and informs a user, and the second check code is generated according to the second user information stored in the equipment to be authenticated.
Further, the trusted device comprises an identity card reading device, a trusted identity reader and a passport reader, the first user information comprises the identity card reading device, the trusted identity reader and the passport reader, and the first user information comprises the identity card information, citizen authentication, citizen cards, qualification certificates, driving licenses and passports.
Further, the generating a first check code based on the first user information includes:
and calculating hash values of the name and the identification card number in the identification card information through a hash algorithm to generate a first check code.
Further, the determining the device to be authenticated matched with the first user information includes:
acquiring the position information of the trusted device, and determining terminal devices within a preset range of the position information;
inquiring the stored face characteristics of the user corresponding to the terminal equipment;
Extracting features of the face image in the identity card information to obtain machine-readable face features;
And comparing the machine-readable face characteristics with the user face characteristics stored corresponding to each terminal device, and determining the terminal devices meeting the comparison result as devices to be authenticated.
Further, before inquiring the stored face features of the user corresponding to the terminal device, the method further includes:
determining the authentication grade of the terminal equipment within the recorded preset range;
Correspondingly, the inquiring the stored user face characteristics corresponding to the terminal equipment comprises the following steps:
inquiring the face characteristics of the user corresponding to the terminal equipment with authentication grade meeting the preset grade.
In a second aspect, an embodiment of the present application provides a user identity information authentication system, including a server, a device to be authenticated, and a trusted device;
The system comprises a trusted device, a server and a user authentication device, wherein the trusted device is used for sending first user information to the server, the first user information is acquired through the trusted device, the server is used for receiving the first user information, generating a first check code based on the first user information and determining equipment to be authenticated matched with the first user information, the trusted level of the first user information acquired through the trusted device is higher than the trusted level of second user information stored in the equipment to be authenticated, and the server is used for receiving the first user information, generating a first check code based on the first user information and determining the equipment to be authenticated matched with the first user information, wherein the trusted level of the first user information acquired through the trusted device is higher than the trusted level of the second user information stored in the equipment to be authenticated
Determining a stored third check code corresponding to the equipment to be authenticated, if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated, and sending the first check code and the modified authentication level to the equipment to be authenticated;
the device to be authenticated is configured to generate a second check code based on the stored second user information, receive the first check code sent by the server, and update the stored authentication level to the modified authentication level if the first check code is identical to the second check code.
Further, the first user information includes identification card information, and the server is configured to:
acquiring the position information of the trusted device, and determining terminal devices within a preset range of the position information;
inquiring the stored face characteristics of the user corresponding to the terminal equipment;
And comparing the machine-readable face characteristics with the user face characteristics stored corresponding to each terminal device, and determining the terminal devices meeting the comparison result as devices to be authenticated.
Further, the server is further configured to:
and inquiring the face characteristics of the user corresponding to the terminal equipment with the authentication level meeting the preset level.
In a third aspect, an embodiment of the present application provides a user identity information authentication apparatus, including:
The user information receiving module is used for receiving first user information sent by the trusted equipment, wherein the first user information is acquired through the trusted equipment;
The verification code generation module is used for generating a first verification code based on the first user information, and determining equipment to be authenticated matched with the first user information, wherein second user information is prestored in the equipment to be authenticated, and the credibility level of the first user information acquired through the credible equipment is higher than that of the second user information stored in the equipment to be authenticated;
and the authentication equipment verification module is used for determining a stored third verification code corresponding to the equipment to be authenticated, and if the first verification code is the same as the third verification code, modifying the stored credibility level of the equipment to be authenticated to finish authentication of the user identity information.
Further, the method further comprises the following steps:
And the check code sending module is used for sending the first check code to the equipment to be authenticated, and is used for the equipment to be authenticated to carry out the matching of the first check code and the second check code, if the matching is successful, the equipment to be authenticated carries out authentication grade modification and informs a user, wherein the second check code is generated according to the second user information stored in the equipment to be authenticated.
In a fourth aspect, an embodiment of the present application provides a user identity information authentication device, including a memory and one or more processors;
The memory is used for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the user identity information authentication method according to any one of the first aspects of the present application.
In a fifth aspect, an embodiment of the present application provides a storage medium containing computer executable instructions which, when executed by a computer processor, are for performing the user identity information authentication method according to the first aspect.
In a fifth aspect, an embodiment of the present application further provides a method for authenticating user identity information, including:
Receiving a first check code sent by trusted equipment, wherein the first check code is generated by the trusted equipment based on acquired first user information;
determining equipment to be authenticated matched with the first check code, wherein second user information is prestored in the equipment to be authenticated, and the credibility level of the first user information acquired through the credible equipment is higher than that of the second user information stored in the equipment to be authenticated;
And determining a stored third check code corresponding to the equipment to be authenticated, and if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated to finish authentication of the user identity information.
In a sixth aspect, the embodiment of the present application further provides a user identity information authentication system, including a server, a device to be authenticated, and a trusted device, where,
The device comprises a trusted device, a server and a server, wherein the trusted device is used for sending a first check code to the server, the first check code is calculated by the trusted device based on acquired first user information, the server is used for receiving the first check code and determining equipment to be authenticated matched with the first check code, the trusted level of the first user information acquired by the trusted device is higher than the trusted level of second user information stored by the equipment to be authenticated, and the server is used for receiving the first check code and determining the equipment to be authenticated matched with the first check code
Determining a stored third check code corresponding to the equipment to be authenticated, if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated, and sending the first check code and the modified authentication level to the equipment to be authenticated;
the device to be authenticated is configured to generate a second check code based on the stored second user information, receive the first check code sent by the server, and update the stored authentication level to the modified authentication level if the first check code is identical to the second check code.
The embodiment of the application is applied to a server, receives the first user information sent by the trusted device, generates the first check code according to the first user information, determines the device to be authenticated matched with the first user information based on the first user information, matches the first check code with the third check code stored by the server, modifies the stored trusted grade of the device to be authenticated if the first check code is the same as the third check code, and completes authentication of the user identity information.
Drawings
FIG. 1 is a flowchart of a user identity information authentication method provided by an embodiment of the present application;
FIG. 2 is a flowchart of another user identity information authentication method according to an embodiment of the present application;
FIG. 3 is a flowchart of another user identity information authentication method according to an embodiment of the present application;
FIG. 4 is a flowchart of another user identity information authentication method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a user identity information authentication system according to an embodiment of the present application;
Fig. 6 is a schematic structural diagram of a user identity information authentication device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another user identity information authentication device according to an embodiment of the present application;
Fig. 8 is a schematic structural diagram of a user identity information authentication device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the following detailed description of specific embodiments of the present application is given with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the matters related to the present application are shown in the accompanying drawings. Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The embodiment of the application provides a user identity information authentication method, a system, a device, user identity information authentication equipment and a storage medium. The embodiment of the application is applied to a server, receives the first user information sent by the trusted device, generates the first check code according to the first user information, determines the device to be authenticated matched with the first user information based on the first user information, matches the first check code with the third check code stored by the server, modifies the stored trusted grade of the device to be authenticated if the first check code is the same as the third check code, and completes authentication of the user identity information.
As an example of the complete business process of the application, firstly, the authentication level of the trusted device is determined, the trusted device acquires the personal identification card photo and personal information, wherein the personal information comprises personal identification information such as the country, the name, the identification card number and the like on the identity card, and then the trusted device sends the personal identification information and the identity information device ID or sends the personal identification information and the device position information to a server, and the identity information device ID refers to the device ID of the trusted device, and the position information of the trusted device can be acquired through the device ID. The server generates a first check code from the personal identity information by a hash algorithm or a national encryption algorithm, and determines the mobile equipment within a preset range according to the position information of the trusted equipment. The method comprises the steps of recording equipment to be authenticated, namely identity authentication level and a second check code of mobile equipment, in a database connected with a server, judging whether personal identity authentication level managed by the mobile equipment is lower than authentication level of trusted equipment, further judging whether the second check code of the mobile equipment meeting the condition is matched with the first check code, further comparing face characteristics of a user associated with the mobile equipment meeting the condition with identity card photos acquired by the trusted equipment, and modifying the authentication level of the mobile equipment meeting the condition. The server notifies the application program of the corresponding mobile equipment, sends the first check code and the authentication level, the mobile equipment verifies whether the second check code of the user is matched with the first check code, and when the matching is successful, the user authentication level of the mobile equipment can be modified and the user is notified. Wherein, in the server, also store the third verification code.
The following detailed description is given respectively.
Fig. 1 shows a flowchart of a user identity information authentication method according to an embodiment of the present application, where the user identity information authentication method according to the embodiment of the present application may be performed by a user identity information authentication device, and the user identity information authentication device may be implemented by hardware and/or software and integrated in a computer device.
The following description will be made taking as an example a user identity information authentication method performed by the user identity information authentication device.
Referring to fig. 1, the user identity information authentication method includes:
And 101, receiving first user information sent by the trusted equipment, wherein the first user information is acquired through the trusted equipment.
In the embodiment of the application, the main body for executing the user identity information authentication method can be a server, including a cloud server. The trusted device is generally arranged on a device arranged in a place where identity authentication is required to be performed, and user information collection and identification are performed. The trusted device may be a dedicated device that only provides user identity information collection, or may be a terminal device that combines other functions, such as an identity authentication terminal device that is set in a bank office, an integrated terminal device that is set in a tax office, a high-speed railway automatic ticket taking terminal device, and so on. The first user information may include information such as a user name, biometric information, an identification card number, a mobile phone number, and the like. The biological characteristic information comprises one or more of face information, iris information, sclera information, fingerprint information, palm print information, voiceprint information and DNA information, wherein the face information comprises living face information and face information analyzed based on a face photo, and the living face information obtains the face information of a user through a face recognition technology, so that the accuracy of identity recognition is improved. In other examples, the first user information may also include the country of interest. For example, the user is the person of country a, but owns his identity card in country B, the nationality of the user is the nationality of country a, but the country of ownership is country B.
In this embodiment, the first user information is collected by a trusted device, preferably, the trusted device includes an identification card reading device, a trusted identification reader, a passport reader, a driver's license reader, etc., and then the first user information includes identification card information. The identification card information is, for example, a complete identification card number or a partial identification card number, and may further include a user name, user photo information of the certificate (print user photo information of the certificate and/or chip user photo information of the certificate), and based on the user photo information of the certificate, face feature information of the user may be obtained. Only when the trusted device reads the identity card, the identity card information is acquired and uploaded to the server. Namely, the identity card is read by the trusted device, which is equivalent to the start of the identity information authentication flow.
And 102, generating a first check code based on the first user information, determining equipment to be authenticated matched with the first user information, wherein the equipment to be authenticated stores a second check code, second user information is pre-stored in the equipment to be authenticated, and the credibility level of the first user information acquired through the credible equipment is higher than that of the second user information stored in the equipment to be authenticated.
The server generates a first check code for the first user information from the trusted device, the first check code being used to perform handshake and identity confirmation with the device to be authenticated. Meanwhile, the server matches the equipment to be authenticated which meets the condition based on the first user information. The device to be authenticated is usually a terminal device held by a user, and comprises mobile terminal devices such as a smart phone, a smart bracelet, a smart key ring, a smart necklace, a smart watch, a notebook computer, a tablet personal computer and the like. The second user information is pre-stored in the equipment to be authenticated, and it can be understood that the equipment to be authenticated has the function of inputting the second user information, and likewise, the second user information comprises a user name, face characteristic information, an identity card number, a mobile phone number and the like. The face characteristic information can be obtained through face acquisition equipment such as a face scanner, a camera and the like, and the user can upload a face photo on equipment to be authenticated. And when the second user information is prestored, the device to be authenticated calculates and generates a second check code based on the second user information.
In an embodiment, the first check code generated by the server for the first user information may be a complete name plus an identification card number, where the complete identification card number is added after the complete name to form the first check code, or may be special information, for example CTID, where CTID is encrypted identification card information composed of 256 characters. In addition, the name of the name, the total word number of the name, the first three digits of the identity card and the last three digits of the identity card can be added, and the name is pinyin, english, letters or other languages of the name. The above three expression forms of the first check code are merely exemplary, and are not limited to the above three expression forms.
In this embodiment, the trusted level of the first user information acquired by the trusted device is higher than the trusted level of the second user information stored in the device to be authenticated. Specifically, the embodiment divides the data authentication and the like into five levels in the data authentication level, wherein level 0 represents no identity information, and simultaneously when an application program is just installed and a user does not operate the identity information, level 1 represents virtual information, usually a user-defined head portrait, a nickname and an OpenID automatically generated by combining a system, level 2 represents no credibility, usually represents identity information self-filled by the user, the identity information is self-filled by the user and does not pass any verification, thus the identity information belongs to unreliable information, level 3 represents preliminary credibility, OCR (Optical Character Recognition ) identity card identification authentication is usually required to be performed on the basis of level 3 information, level 4 represents commercial credibility, and the information can be authenticated by a third party institution authentication, including Alii authentication, weChat authentication, hundred degree authentication, silver-back authentication, telecom authentication, google authentication, amara authentication, sub-Massa authentication, commercial NFC identity card authentication third party authentication, legal reader authentication, authentication for reading by a national authentication for a national police, and the like, and level 5 represents legal credibility, including identity card reader authentication, eID authentication, CTID, ID card reader authentication, authentication reader for a national reader, and the like. Preferably, the data authentication in the trusted device disclosed by the embodiment of the application accords with a 5-level identity card authentication mode, namely that the first user information collected by the trusted device is legal and trusted and belongs to the highest level of the data authentication, or the data authentication in the trusted device disclosed by the embodiment of the application accords with a 4-level identity card authentication mode, namely that the first user information collected by the trusted device is commercial and trusted and belongs to the level with higher reliability of the data authentication. The second user information pre-stored in the device to be authenticated is usually automatically entered by the user, and the second user information belongs to the second level of data authentication under the condition of no other verification. The second user information pre-stored in the device to be authenticated comes from other devices or is automatically input by the user but is verified by other platforms, such as WeChat authentication, and the actual grade of the second user information is defined according to the actual situation.
In this embodiment, it is intended to verify user information with a low level of trust, so as to determine the degree of trust of the user information, and if the level of trust of data corresponding to the device to be authenticated is already the highest level, it is legal and trusted, and no further verification is needed. In this embodiment, determining the matched device to be authenticated includes checking the data level of the terminal device, and only selecting the device to be authenticated with a trust level lower than that of the trusted device for further actions. In practice, each terminal device periodically or continuously reports the position information to the server, and also periodically or continuously reports the data authentication level of the terminal device to the server, so that when the server receives the first user information of the trusted device and determines the device to be authenticated matched with the first user information, the data authentication level reported by each terminal device can exclude the device to be authenticated, where the data authentication level is equal to or even higher than that of the trusted device.
Since personal identity information relates to personal privacy, in order to ensure personal identity information security, common devices and enterprises cannot store personal identity information. In order to ensure the safety of personal identity information, for example, in the scene that the trusted device selects the identity card reading device, the trusted device reads the identity card information, obtains the mobile phone numbers corresponding to the users according to the identity card information, and selects the last n digits of the mobile phone numbers, wherein n is an integer greater than 1. And packing the user photo, the user name and the number n digits of the mobile phone number in the identity card information as first user information. Therefore, when the present application generates the first check code based on the first user information calculation, it may be generated by calculating the hash value of the n digits after the user name and the mobile phone number by the hash algorithm. From the convenience point of view, the content category included in the second user information may be the same as the first user information, including the user identification card information, and the user mobile phone number or the n-digit number after the mobile phone number. The second check code can also be generated by a hash algorithm to calculate the hash value of the n digits after the user name and the mobile phone number.
In further examples, the first user information may be only identification card information containing the user, i.e. not containing the phone number, but including identification card number, name, face information. The first check code may be generated by calculating a hash value of the name and the identification number in the identification information by a hash algorithm. The second user information can also comprise identification card number, name and face information, and the corresponding second check code can also be generated by calculating the hash value of the name and the identification card number in the identification card information through a hash algorithm.
And 103, determining a stored third check code corresponding to the equipment to be authenticated, and if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated to finish authentication of the user identity information.
The server cannot store the identity information, and thus the server stores in advance a third check code generated from user information corresponding to different users, respectively. Since the server generates the first check code based on the first user information and matches the first check code to the device to be authenticated, a third check code corresponding to the device to be authenticated is associated. Specifically, the server detects the consistency of the first check code and the second check code, and under the condition that the first check code and the second check code are consistent, the first check code and the second check code are proved to be matched, and the credibility level of equipment to be authenticated can be modified, so that authentication of user identity information is completed.
In another embodiment, a method for authenticating user identity information provided by the present application is as shown in fig. 2, and includes:
and 201, receiving first user information sent by the trusted device, wherein the first user information is acquired through the trusted device.
And 202, generating a first check code based on the first user information, and determining equipment to be authenticated matched with the first user information. Similarly, in this example, the second user information is pre-stored in the device to be authenticated, and the trust level of the first user information acquired by the trusted device is higher than the trust level of the second user information stored in the device to be authenticated.
And 203, determining a stored third check code corresponding to the equipment to be authenticated, and if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated to finish authentication of the user identity information.
In the foregoing steps 201 to 203, the execution flow and principle are the same as those of the previous embodiment, and are not described in detail in this embodiment. The main difference between this embodiment and the previous embodiment is that this embodiment further includes, after modifying the stored trust level of the device to be authenticated:
And 204, sending the first check code to the equipment to be authenticated, wherein the equipment to be authenticated is used for matching the first check code with a second check code, and if the matching is successful, the equipment to be authenticated is used for modifying the authentication level and notifying a user, and the second check code is generated according to the second user information stored in the equipment to be authenticated.
In this embodiment, on the basis of consistency verification of the server based on the first check code and the third check code, on the condition that the end of the device to be authenticated detects consistency of the first check code and the second check code, the first check code and the second check code are indicated to be matched, matching is successful, the device to be authenticated modifies the authentication level, and the user is notified.
And the device to be authenticated sends the matching result to the user. In this embodiment, when the matching result is that the matching is successful, the second user information of the device to be authenticated is authenticated. In the server, after receiving the trust level reported by each terminal device, the trust level of each terminal device is stored, so that when the server receives that the matching result of the device to be authenticated is successful, the server indicates that the identity authentication is successful and updates the trust level.
As shown in fig. 3, the embodiment of the present application further provides another user identity information authentication method, including:
and 301, receiving first user information sent by the trusted device, wherein the first user information is acquired through the trusted device.
The embodiment is applied to a server, and the server authenticates identity information of other terminal equipment based on the trusted equipment which has obtained the trusted-level authentication. Wherein the user inputs first user information via the trusted device, which is typically generated on the fly, rather than pre-stored in the trusted device. The trusted device is used as a device for obtaining the trusted level authentication and is generally applied to the scenes of banks, high-speed rails and government affair office occasions, for example, the trusted device is used as a bank identity authentication terminal, a high-speed rail identity card ticket checking terminal and a government affair handling self-service terminal. The first user information is typically identification card information.
A first check code is generated based on the first user information 302.
In this embodiment, the server performs calculation of the first check code on the basis of obtaining the first user information, and optionally, the first user information includes an identification card number, a name, and facial biometric information, and the first check code may be generated by calculating a hash value of the name and the identification card number in the identification card information through a hash algorithm.
And 303, acquiring the position information of the trusted device and determining the terminal device within the preset range of the position information.
When the user inputs the first user information through the trusted device, the method is equivalent to starting an identity information authentication process, and the server immediately receives the first user information, so as to search for terminal devices within a preset range. The terminal device periodically or continuously reports its own position information to the server, and thus the position information of each terminal device is actually stored in the server. In one example, the server also stores location information for trusted devices. Based on the position information of the trusted device, selecting terminal devices within a preset range according to the preset range set in advance. In other examples, the first user information may further include a device ID of the trusted device in addition to the personal identity information of the user, where the device ID may correspond to a registration address for querying the trusted device. In addition, the position information of the trusted device can be acquired through a satellite positioning device, a Bluetooth positioning device or other positioning devices, and the position information of the terminal device can also be acquired through the satellite positioning device, the Bluetooth positioning device or other positioning devices. The preset range is, for example, a circular area formed by taking the trusted device as a circle center and based on the circle center and a preset radius. And searching terminal equipment in a preset range, namely, selecting a circular area formed by taking the trusted equipment as a circle center according to the position information of the trusted equipment and combining with a preset radius, and determining the terminal equipment positioned in the circle center area as alternative equipment to be authenticated according to the position information of the terminal equipment to carry out the next matching process.
And 304, inquiring the stored face characteristics of the user corresponding to the terminal equipment.
The matching of the geographic position is the first step of determining the equipment to be authenticated in the embodiment of the application, so that other terminal equipment in a preset range is eliminated, and the subsequent workload is reduced. And then further matching the equipment to be authenticated based on the face characteristics of the user. Specifically, each terminal device pair has the face characteristics of the user. The user face features are, for example, face images collected as one type of content of the second user information when the user inputs the second user information, and include two different types of face photos and live face features.
And 305, extracting the characteristics of the face image in the identity card information to obtain the machine-readable face characteristics.
The trusted device scans the identity card to read the identity card information, including the face image in the identity card, and after uploading the identity card information to the server, the server further identifies and analyzes the face image to obtain the machine-readable face characteristics. In the last step, in the case that the face image of the second user information is assumed to be a face photo, because the shooting time of the face photo of the second user information and the shooting time of the face image in the identity card information are different, even if the face photos shot by the same user under different light rays, time, scenes and person states are not completely the same, further verification and matching are performed on the terminal equipment based on the face image.
And 306, comparing the machine-readable face characteristics with the user face characteristics stored corresponding to each terminal device, and determining the terminal device meeting the comparison result as the device to be authenticated.
In this embodiment, the device to be authenticated stores a second check code, where the second check code is generated by the device to be authenticated according to pre-stored second user information, and the trusted level of the first user information acquired by the trusted device is higher than the trusted level of the second user information stored in the device to be authenticated.
And 307, determining a stored third check code corresponding to the equipment to be authenticated, and if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated to finish authentication of the user identity information.
Referring to fig. 4, the embodiment of the application further provides another user identity information authentication method, which includes:
and 401, receiving first user information sent by the trusted device, wherein the first user information is acquired through the trusted device.
Similarly, in this embodiment, the main body for executing the authentication method of the user identity information may be a server, where the first user information includes a face feature, a name, an identification card number of the user, or includes n digits after the face feature, the name, and the phone number of the user.
A first check code is generated based on the first user information 402.
The server of this embodiment generates a first check code based on the first user information, which is a unique value and thus is particularly reliable enough. Specifically, the first check code can be generated by calculating the hash value of the n digits after the user name and the mobile phone number through a hash algorithm, or by calculating the hash value of the user name and the identity card number through a hash algorithm.
And 403, acquiring the position information of the trusted device, and determining the terminal device within the preset range of the position information.
When the user inputs the first user information through the trusted device, the method is equivalent to starting an identity information authentication process, and the server immediately receives the first user information, so as to search for terminal devices within a preset range. The terminal device periodically or continuously reports its own position information to the server, and thus the position information of each terminal device is actually stored in the server. Meanwhile, the server also stores the position information of the trusted device. Based on the position information of the trusted device, selecting terminal devices within a preset range according to the preset range set in advance. Specifically, the position information of the trusted device may be acquired by a satellite positioning device, a bluetooth positioning device or other positioning devices, and similarly, the position information of the terminal device may also be acquired by a satellite positioning device, a bluetooth positioning device or other positioning devices. The preset range is, for example, a formed grid area with a preset grid number based on a reference point with the trusted device as the reference point. For example, the preset grid number is 8, so that terminal equipment in a preset range is searched, namely, all the areas of 8 grids above, below, left and right in the position information are included as grid areas according to the position information of the trusted equipment, and the terminal equipment in the grid areas is determined to be equipment to be authenticated according to the position information of the terminal equipment.
And 404, determining the authentication level of the terminal equipment within the recorded preset range.
The application aims to authenticate the terminal equipment with the data authentication trust level lower than that of the trusted equipment, so as to upgrade and update the trust level of the terminal equipment later. In this embodiment, in order to determine the device to be authenticated, terminal devices within a preset range and with authentication levels that also meet the conditions are selected for subsequent matching.
And 405, inquiring the face characteristics of the user corresponding to the terminal equipment with the authentication grade meeting the preset grade.
In the present application, the authentication level meeting the preset level actually means that a terminal device with an authentication level lower than that of the trusted device is selected, and the corresponding trusted level is lower than level 4, usually not trusted, because the authentication level of the terminal device is low, and further authentication is required to make the data of the terminal device trusted. Therefore, terminal equipment with the authentication level lower than that of the trusted equipment is screened for the next face comparison matching.
And 406, extracting the characteristics of the face image in the identity card information to obtain the machine-readable face characteristics.
And 407, comparing the machine-readable face characteristics with the user face characteristics stored corresponding to each terminal device, and determining the terminal device meeting the comparison result as the device to be authenticated.
The equipment to be authenticated stores a second check code, the second check code is generated by the equipment to be authenticated according to the pre-stored second user information, and the credibility level of the first user information acquired by the credible equipment is higher than that of the second user information stored by the equipment to be authenticated.
And 408, determining a stored third check code corresponding to the equipment to be authenticated, and if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated to finish authentication of the user identity information.
Fig. 5 shows a schematic structural diagram of a user identity information authentication system provided by the embodiment of the present application, and as shown in fig. 5, the user identity information authentication system provided by the embodiment of the present application includes a server 501, a device 502 to be authenticated, and a trusted device 503, specifically:
The trusted device 503 is configured to send first user information to the server, where the first user information is acquired by the trusted device, and in this embodiment, the first user information may be identity card information, where the identity card information is obtained by the trusted device reading an identity card of a user. The second user information may be pre-stored in the device to be authenticated, and is input by the user through the device to be authenticated, including the face feature, the name and the identification card number of the user.
The server 501 is configured to receive the first user information, generate a first check code based on the first user information, and determine a device to be authenticated that matches the first user information, where the trusted level of the first user information acquired by the trusted device is higher than the trusted level of the second user information stored in the device to be authenticated, and
Determining a stored third check code corresponding to the equipment to be authenticated, if the first check code is the same as the third check code, modifying the stored credibility level of the equipment to be authenticated, and sending the first check code and the modified authentication level to the equipment to be authenticated;
the device to be authenticated 502 is configured to generate a second check code based on the stored second user information, receive the first check code sent by the server, and update the stored authentication level to the modified authentication level if the first check code is identical to the second check code.
With continued reference to fig. 5, this embodiment shows another user identity information authentication system, which includes a server 501, a device to be authenticated 502, and a trusted device 503, wherein:
the trusted device 503 is configured to send first user information to a server, where the first user information is acquired by the trusted device, and the first user information includes identification card information.
The server 502 is configured to obtain location information of the trusted device, determine terminal devices within a preset range of the location information, query stored user face features corresponding to the terminal devices, compare the machine-readable face features with the stored user face features corresponding to each terminal device, and determine the terminal devices satisfying the comparison result as devices to be authenticated.
The device to be authenticated 501 is configured to generate a second check code based on the stored second user information, receive the first check code sent by the server, and update the stored authentication level to the modified authentication level if the first check code is identical to the second check code.
Preferably, the trusted device is an identity card reader, and the identity card reader can scan an identity card to identify identity card information, so in the basic embodiment of the application, the first user information includes the identity card information.
In this embodiment, the device to be authenticated is determined after the screening of the terminal device based on the location information and the comparison with respect to the name and the identification card number are combined. The trusted device is internally provided with a geographic information acquisition device such as a satellite positioning device, a Bluetooth positioning device or other positioning devices, and position information of the trusted device is acquired and uploaded to a server for storage. Correspondingly, the terminal equipment is also provided with a positioning device for collecting the position information of the terminal equipment, and the collected position information is uploaded to the server. Therefore, when the preset range considered to be set is set, terminal equipment meeting the preset range can be screened out according to the position information of the trusted equipment and the position information of each terminal equipment.
In addition to the acquisition of the position information in this embodiment, the displacement of the terminal device may be acquired by using an acceleration sensor, a direction sensor, etc., so as to further acquire the current position information of the terminal device, and the method is suitable for a basement or other places without signals and with signal differences, and the position information of the terminal device may still be acquired in the event of failure of a geographic information acquisition device such as a satellite.
When the terminal equipment meeting the preset range is selected, the method means that other terminal equipment outside the preset range is screened, the workload of the subsequent process is reduced, and the range is narrowed. In this step, the name and the identification card number corresponding to the terminal device are queried, where the name and the identification card number may be included in the second user information, or may be input by the user before corresponding to the terminal device for each terminal device. Further, a relationship table may be formed, in which each terminal device and a name and an identification card number corresponding to each terminal device are recorded. Therefore, when the name and the identification card number of the terminal equipment are required to be inquired, the required name and identification card number can be obtained by traversing the relation table.
In the step, the server analyzes and identifies the identity card information from the trusted device, and can acquire the name and the identity card number in the identity card information. Specifically, when the trusted device reads the identity card, the identity card information is obtained, and the identity card information can be embodied in a picture form, wherein the picture is equivalent to scanning copy of the identity card, can also be in a list form, namely, name, identity card number and face characteristics of a user are directly obtained through reading the identity card, and can also be displayed in a list form, a display form of characters and pictures, and the like. And comparing the name contained in the identity card information of the first user information with the name stored corresponding to the terminal equipment, and simultaneously comparing the identity card number of the identity card information with the identity card number stored corresponding to the terminal equipment.
In this step, the step of specifically determining the device to be authenticated that matches the first user information may be to select a terminal device within a preset range based on a trusted device, and then compare a name and an identification card number obtained by identifying the identification card information of the first user information with the stored name and identification card number.
In this embodiment, the second user information includes a user face feature corresponding to the device to be authenticated, and the trust level of each terminal device is stored in the server, and the trust level of the trusted device is also stored in the server, where in this embodiment, the trust level of the trusted device is legal, that is, the trust level with the highest level.
In the embodiment of the application, the comparison of the machine-readable facial features and the user facial features corresponding to the equipment to be authenticated is actually the similarity of the computer-readable facial features and the user facial features of the equipment to be authenticated.
The comparison result meets the preset condition, namely that the similarity between the machine-readable face features and the face features of the user of the equipment to be authenticated reaches the preset threshold value, and the identity authentication is successful, so that the credibility level of the equipment to be authenticated is updated. It is common practice to upgrade the trust level of the terminal device to be consistent with the trusted device, i.e. legal trusted.
As shown in fig. 6, an embodiment of the present application provides a user identity information authentication apparatus, which includes a user information receiving module 601, a check code generating module 602, and an authentication device checking module 603. Specifically, the user information receiving module 601 is configured to receive first user information sent by a trusted device, where the first user information is acquired through the trusted device, the check code generating module 602 is configured to generate a first check code based on the first user information, determine a device to be authenticated that is matched with the first user information, where a second user information is pre-stored in the device to be authenticated, the trusted level of the first user information acquired through the trusted device is higher than the trusted level of the second user information stored in the device to be authenticated, and the authentication device check module 603 is configured to determine a third check code stored corresponding to the device to be authenticated, and modify the trusted level of the stored device to be authenticated to complete authentication of user identity information if the first check code is the same as the third check code.
In this embodiment, the trusted device includes an identity card reading device, a trusted identity reader, and a passport reader, and the first user information includes identity card information, citizen authentication, citizen card, qualification certificate, driver license, and passport, and the hash value of the name and the identity card number in the identity card information is calculated by a hash algorithm to generate the first check code. Correspondingly, the hash value of the name and the identification card number in the identification card information can be calculated through a hash algorithm to generate a first check code.
The verification code generation module 602 determines a device to be authenticated matched with the first user information, and comprises the steps of obtaining the position information of the trusted device, determining terminal devices within a preset range of the position information, inquiring stored user face features corresponding to the terminal devices, extracting features from face images in the identity card information to obtain machine-readable face features, comparing the machine-readable face features with the user face features stored corresponding to each terminal device, and determining the terminal devices meeting comparison results as the device to be authenticated.
Further, before inquiring the stored face features of the user corresponding to the terminal equipment, determining the authentication level of the terminal equipment within the recorded preset range. Correspondingly, the query of the stored user face features corresponding to the terminal equipment comprises the step of querying the user face features corresponding to the terminal equipment with authentication grade meeting the preset grade.
As a preferred implementation manner of the embodiment, the server stores the trust level of each terminal device, and the receiving the matching result sent by the device to be authenticated completes identity authentication based on the matching result, which includes receiving the matching result sent by the device to be authenticated, if the matching is successful, the identity authentication is successful, and updating the trust level.
As shown in fig. 7, the embodiment of the present application further provides another user identity information authentication device, where a check code sending module 704 is added to the user identity information authentication device shown in fig. 6, that is, the user identity information authentication device in the embodiment of the present application includes a user information receiving module 701, a check code generating module 702, an authentication device checking module 703 and a check code sending module 704.
Specifically, a check code sending module 704, configured to send the first check code to the device to be authenticated, and configured to enable the device to be authenticated to perform matching between the first check code and a second check code, and if matching is successful, perform authentication level modification on the device to be authenticated, and notify a user, where the second check code is generated according to the second user information stored in the device to be authenticated
The authentication device comprises a user information receiving module 701, an authentication device determining module 702 and an identity authentication completion module 703, wherein the user information receiving module 701 is used for receiving first user information sent by trusted devices, the first user information is acquired through the trusted devices, the authentication device determining module 702 is used for determining to-be-authenticated devices matched with the first user information and obtaining stored second user information corresponding to the to-be-authenticated devices, the trusted level of the first user information acquired through the trusted devices is higher than the trusted level of the stored second user information, and the identity authentication completion module 703 is used for generating a matching result according to the first user information and the second user information and completing identity authentication based on the matching result.
In this embodiment, the first user information includes identification card information, citizen authentication, citizen card, qualification certificate, driving license, and passport in an authentication device determining module 702, where determining a device to be authenticated matched with the first user information includes obtaining location information of the trusted device, determining a terminal device within a preset range of the location information, querying a stored name and identification card number corresponding to the terminal device, comparing the name and identification card number obtained by identifying the identification card information with the stored name and identification card number, and determining the terminal device with the consistent comparison result as the device to be authenticated.
Further optionally, the second user information includes a user face feature corresponding to the device to be authenticated, and the server stores a trust level of each terminal device. In the identity authentication completion module 803, a matching result is generated according to the first user information and the second user information, and identity authentication is completed based on the matching result, wherein the identity authentication completion module comprises the steps of extracting features of a face image in the identity card information to obtain machine-readable face features, comparing the machine-readable face features with user face features corresponding to equipment to be authenticated, and if the comparison result meets a preset condition, successful identity authentication and updating the credibility level.
As shown in fig. 8, an embodiment of the present application further provides a user identity information authentication device, which includes a memory 801 and one or more processors 802, where the memory 801 is configured to store one or more programs, and when the one or more programs are executed by the one or more processors 802, the one or more processors implement a user identity information authentication method according to the present application.
The embodiment of the application also provides a storage medium containing computer executable instructions, which are used for executing the user identity information authentication method provided by the embodiment when being executed by a computer processor, wherein the user identity information authentication method comprises the steps of receiving first user information sent by trusted equipment, acquiring the first user information through the trusted equipment, generating a first check code based on the first user information, determining equipment to be authenticated matched with the first user information, pre-storing second user information in the equipment to be authenticated, acquiring the first user information through the trusted equipment, wherein the trusted level of the first user information is higher than the trusted level of the second user information stored in the equipment to be authenticated, determining a stored third check code corresponding to the equipment to be authenticated, and if the first check code is identical to the third check code, modifying the trusted level of the stored equipment to be authenticated, and completing authentication of the user identity information.
Storage media-any of various types of memory devices or storage devices. The term "storage medium" is intended to include mounting media such as CD-ROM, floppy disk or tape devices, computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, lanbas (Rambus) RAM, etc., non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage), registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a second, different computer system connected to the first computer system through a network such as the internet. The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations (e.g., in different computer systems connected by a network). The storage medium may store program instructions (e.g., embodied as a computer program) executable by one or more processors.
Of course, the storage medium containing the computer executable instructions provided in the embodiments of the present application is not limited to the user identity information authentication method described above, and may also perform the related operations in the user identity information authentication method provided in any embodiment of the present application.
The user identity information authentication device, the device and the storage medium provided in the foregoing embodiments may perform the user identity information authentication method provided in any embodiment of the present application, and technical details not described in detail in the foregoing embodiments may be referred to the user identity information authentication method provided in any embodiment of the present application.
The foregoing description is only of the preferred embodiments of the application and the technical principles employed. The present application is not limited to the specific embodiments described herein, but is capable of numerous modifications, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit of the application, the scope of which is set forth in the following claims.
Claims (13)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110492466.8A CN113177797B (en) | 2021-05-06 | 2021-05-06 | User identity information authentication method, system, device, equipment and storage medium |
PCT/CN2022/091134 WO2022233313A1 (en) | 2021-05-06 | 2022-05-06 | User identity information authentication method, system, apparatus and device, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110492466.8A CN113177797B (en) | 2021-05-06 | 2021-05-06 | User identity information authentication method, system, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113177797A CN113177797A (en) | 2021-07-27 |
CN113177797B true CN113177797B (en) | 2024-12-06 |
Family
ID=76928611
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110492466.8A Active CN113177797B (en) | 2021-05-06 | 2021-05-06 | User identity information authentication method, system, device, equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113177797B (en) |
WO (1) | WO2022233313A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113177797B (en) * | 2021-05-06 | 2024-12-06 | 巽腾(广东)科技有限公司 | User identity information authentication method, system, device, equipment and storage medium |
CN113987442A (en) * | 2021-11-01 | 2022-01-28 | 郑州云智信安安全技术有限公司 | Citizen real identity authentication method and system based on personal privacy protection |
CN115170141A (en) * | 2022-07-14 | 2022-10-11 | 中国银行股份有限公司 | Transaction method and device of bank terminal |
CN116257869A (en) * | 2023-02-23 | 2023-06-13 | 深圳泰首智能技术有限公司 | Method, system, terminal and storage medium for converting SIM card storage data into two-dimension code |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107548059A (en) * | 2016-06-28 | 2018-01-05 | 中兴通讯股份有限公司 | A kind of authentication method and system |
CN108171512A (en) * | 2017-11-20 | 2018-06-15 | 胡研 | A kind of method of commerce and electronic equipment |
CN110826043A (en) * | 2018-08-08 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Digital identity application system and method, identity authentication system and method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10915618B2 (en) * | 2014-08-28 | 2021-02-09 | Facetec, Inc. | Method to add remotely collected biometric images / templates to a database record of personal information |
US11153303B2 (en) * | 2017-11-15 | 2021-10-19 | Citrix Systems, Inc. | Secure authentication of a device through attestation by another device |
US10360367B1 (en) * | 2018-06-07 | 2019-07-23 | Capital One Services, Llc | Multi-factor authentication devices |
US10812473B2 (en) * | 2018-06-15 | 2020-10-20 | Oracle International Corporation | Auto inline enrollment of time-based one-time password (TOTP) for multi-factor authentication |
CN109711133B (en) * | 2018-12-26 | 2020-05-15 | 巽腾(广东)科技有限公司 | Identity information authentication method and device and server |
CN113177797B (en) * | 2021-05-06 | 2024-12-06 | 巽腾(广东)科技有限公司 | User identity information authentication method, system, device, equipment and storage medium |
-
2021
- 2021-05-06 CN CN202110492466.8A patent/CN113177797B/en active Active
-
2022
- 2022-05-06 WO PCT/CN2022/091134 patent/WO2022233313A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107548059A (en) * | 2016-06-28 | 2018-01-05 | 中兴通讯股份有限公司 | A kind of authentication method and system |
CN108171512A (en) * | 2017-11-20 | 2018-06-15 | 胡研 | A kind of method of commerce and electronic equipment |
CN110826043A (en) * | 2018-08-08 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Digital identity application system and method, identity authentication system and method |
Also Published As
Publication number | Publication date |
---|---|
CN113177797A (en) | 2021-07-27 |
WO2022233313A1 (en) | 2022-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113177797B (en) | User identity information authentication method, system, device, equipment and storage medium | |
US20230129693A1 (en) | Transaction authentication and verification using text messages and a distributed ledger | |
KR102370529B1 (en) | Method and device for obtaining tracking information and recording it on the blockchain | |
US9544308B2 (en) | Compliant authentication based on dynamically-updated credentials | |
AU2017316312B2 (en) | Remote usage of locally stored biometric authentication data | |
EP3284240B1 (en) | Systems and methods for electronically sharing private documents using pointers | |
US11244146B2 (en) | Systems and methods for secure user logins with facial recognition and blockchain | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
EP3069297B1 (en) | Identity authentication by using human biological characteristics | |
JP2022512123A (en) | Identity authentication method, device and server | |
US20150317638A1 (en) | Methods, Devices and Systems for Transaction Initiation | |
JP7115760B2 (en) | Biometric digital signature generation for identity verification | |
JP5145179B2 (en) | Identity verification system using optical reading code | |
CN113111330B (en) | Enterprise legal identity authentication management method and system based on enterprise chain code | |
US12273338B2 (en) | Identity verification through a centralized biometric database | |
US11531739B1 (en) | Authenticating user identity based on data stored in different locations | |
US20210344491A1 (en) | System and method to generate a unique security proof for secure accessing of data | |
US20200120089A1 (en) | Multifactor authentication utilizing issued checks | |
KR20170118382A (en) | System and method for electronically managing certificate of real name confirmation | |
JP6907426B1 (en) | Authentication system, authentication method, and program | |
US20230325484A1 (en) | Systems and methods for identity authentication and feedback | |
US20250307365A1 (en) | Multi-Modal Verification & Authentication System and Methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |