Identity authentication black ash production scale amazing Ali biometric technology can make security protection

At the cloud Computing Conference which opened this morning, scientists and representatives of security enterprises from many countries gathered in the forum “New Security · New Starting Point” to discuss the prevention and control of black ash production in the field of online identity authentication.

According to media disclosure, every year the national identity information leakage up to 10 million, identity card loss is also millions. When Liu Hanting, a shenzhen resident, received a bank reminder, he found out that his identity information had been fraudulently used from 2012 to 2016 and that he owed 80 million yuan under his name.

Alibaba senior algorithm expert Wang Yan to this move, through face recognition, in vivo detection, voice print recognition and other biometric identification technology for account security protection, identity information security protection, will become a new trend.



Picture: Wang Yan, alibaba’s senior algorithm expert, introduces Alibaba’s biometric technologies such as face recognition, in vivo detection and voice print recognition at the special forum of “Xin ‘an New Starting Point” of the Cloud Computing Conference


Real person certification makes hotel, visa, Internet more convenient and safe

The size of the Internet black ash industry, which is used to trade fake identity information including ID cards, personal photos, bank cards, mobile phone cards, and Internet account numbers, has exceeded 10 million.

And there are cases of residents’ personal information leakage and trade all the time. Statistics show that the national identity information leakage is up to ten million pieces every year, and the identity card loss is also millions of levels. Tianjin, for example, reports as many as 200,000 lost ID cards a year.

A person in charge of the grey industry who buys and sells identity information also revealed that its sales revenue in half a year was 810,000 yuan, involving more than 2,000 pieces of material.

In the Internet era, whether it is eating, wearing, living or traveling, people are facing the risk of identity information leakage. How to ensure the security of personal identity information has become a common challenge for Internet consumption.

In order to put an end to liu Hanting’s experience repeated, in recent years, Alibaba Group security department comprehensive risk management real person certification team of technical experts, based on ali platform big data technology advantages launched real person certification services, aimed at bringing more convenience to consumer life, and provide higher security protection.

It is reported that Ali real person authentication through living detection, face recognition, voice print recognition and other biometric identification methods and OCR identification technology, combined with authoritative data sources and Ali real person trusted model, judge the authenticity of user identity, the effectiveness of online identity verification services.

“The hotel check-in kernel technology, which is based on alishi authentication, enables The future hotel credit of Feizhu. When checking in, users can swipe their ID card on a machine and then swipe their face to complete the check-in procedure and get the room card.” This not only fulfills the Ministry of Public Security’s requirements for real-name, real-number, real-fact and real-time registration, but also reduces hotel labor costs, Wang said.

In addition, with Alishishen certification as the core, feizhu online visa can identify and intercept illegal entry behaviors from the source through the online identity verification of applicants, and ensure the safety of online visa business.



Picture: Cloud Computing Conference “New Security new Starting Point” special forum, technical experts and security industry representatives from all over the world came to the scene


Ali platform uses voice print encryption to protect account security

Voice print recognition technology can effectively reduce the risk of identity information leakage. Voice print recognition technology has been widely used in ali platform user identity verification. If you want to change your password, just open the Mobile App and speak into the microphone, you can protect your password with your voice, without worrying about your account being stolen or your password being changed.

According to Wang, each person has a unique voice print, which is a feature gradually formed by the vocal organs as they grow up. No matter how similar one person mimics another’s speech, it’s actually so different that a copycat attack would be hard to pull off. Ali voiceprint recognition technology is an online identity verification service that verifies that the speaker is the user by using the unique biometric feature of the acoustic spectrum of human speech information.

Compared with fingerprint, palm, face, retina and other biometric technologies, voice print recognition not only has the characteristics of high ease of use, high accuracy and high user acceptance, but also has the lowest cost. It also supports remote authentication, mobile phone collection and other convenient features.

Alibaba Group security department senior algorithm expert Wang Yan said that the use of face, voice lines and other biometric technology is convenient, less restricted, but also has weaknesses, just like a person has a volatile, vulnerable to physical condition, age, emotion and other influences. But with deep learning and data-driven guidance, biometrics can be improved even better.


Ali gather security Ali Gather security (http://jaq.alibaba.com) produced by the Alibaba Security Department, for enterprises and developers to provide Internet business security solutions, comprehensive coverage of mobile security, data risk control, content security, real person authentication and other dimensions, and in the industry took the lead in putting forward “business-centric security”, enabling ecology, Alibaba Group and the industry to share years of precipitation of professional security ability.