information community file
Face real name authentication solution
A remote face verification scheme with high security, high pass rate and high usability
Understand the scheme
One minute comprehensive understanding of real name authentication
Product Overview
The face real name authentication solution provides live detection, face comparison, ID card OCR and other functions, and directly connects to the authoritative data source of the public security, Provide a complete set of integration and O&M solutions for APP, H5, cloud services, etc. It has been widely used in finance, insurance, medical care, government affairs and other scenarios to ensure the business operation of thousands of enterprises.
one
OCR ID card identification
two
In vivo detection
three
Face contrast
Scheme advantages
Business risk
Risk of false information registration
The traditional method of holding identity cards or comparing the consistency of name and ID number has the risk of fraudulent use. This led to the registration of false account numbers by the black industry and the profit of wool collection.
Scheme advantages
Add facial biometric information for all-round trusted identity authentication
In the authentication process, face information is collected in real time for live judgment, and verified with authoritative data sources to protect user privacy and enterprise business.
Business risk
Risk of new prosthesis attack
Black production live attack methods have been turned into new ones, including ultra clear images, videos, photo digging, 3D masks, printed photos+light filling, and even AI technology composite faces. The business side urgently needs reliable live detection capabilities to stop them.
Scheme advantages
Up to 10 types of end+cloud live detection schemes, making the prosthesis invisible
The ability of live detection meets the requirements of GA/T 1723.4-2020, and has obtained the authentication certificate of the authority; Innovative pupil dazzle live technology has excellent experience, which is safer than the traditional facial reflection scheme; Advanced composite image detection special identification depth forgery face image.
Business risk
ROM and other engineering dimension attacks
The black industry uses customized system equipment to replace the real-time video stream with "fake video", bypassing the verification process on the mobile phone. This kind of attack is technically tampered from the bottom of the device, which is difficult to defend.
Scheme advantages
Identification of system risk+operation level anomaly, double insurance for business safety
Secure and reinforce face collection through biological probes and risk detection to effectively prevent the risk of underlying ROM tampering, Hook, camera hijacking, injection, etc; Cooperate with Baidu to accumulate big data output risk profile for many years, and specialize in fake registration and clocking of black production all-in-one machines.
Business Value
Authoritative organization trusted data
Multi data angle verification
Enrich the live mode of end cloud
Flexible business selection
Leading live detection scheme
Prosthesis without hiding
High passing rate and low customer complaints
Guarantee the user experience of C end
High concurrency/high performance/high availability
Resilient response to various business volumes
Customizing industry programs on demand
Guarantee risk control and post audit
Application scenarios
Bank mutual funds
Life Insurance
Transportation logistics
Electronic Commerce
Operator
Social live broadcast
network game
The increasing evolution of black industry attack means has brought many challenges to our business. After a lot of tests and model selection comparison, Baidu's dazzle pupil live detection technology, the latest ray based live detection technology, gives consideration to business security and C-end user experience, and meets the inspection requirements of the agency.
——Technical Manager of IT Department of a bank
Product service
Face Acquisition SDK
On the mobile phone end, it is based on the action/dazzle pupil live body technology to defend the prosthesis attack and identify the risk with the safety factor.
In vivo inspection API
It supports pictures, videos, pupil dazzle, real-time detection and other methods to effectively resist all kinds of prosthesis cheating.
Face real name authentication
Support the verification of three elements, two elements, operators and bank card elements, and directly connect to authoritative data sources.
Face contrast
Compare the similarity between the face collected on site and the reserved photos, and have the ability of live detection and quality detection.
Start using face real name authentication
Technical capability
Voice technology
Character recognition
Face and Human Body
Image technology
Language and knowledge
video technique