CN108429745B - Login authentication method and system, and webpage login method and system - Google Patents

Login authentication method and system, and webpage login method and system Download PDF

Info

Publication number
CN108429745B
CN108429745B CN201810179220.3A CN201810179220A CN108429745B CN 108429745 B CN108429745 B CN 108429745B CN 201810179220 A CN201810179220 A CN 201810179220A CN 108429745 B CN108429745 B CN 108429745B
Authority
CN
China
Prior art keywords
user
picture
login
client
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810179220.3A
Other languages
Chinese (zh)
Other versions
CN108429745A (en
Inventor
温云龙
程庆年
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jiesai Communication Planning And Design Institute Co ltd
GCI Science and Technology Co Ltd
Original Assignee
Guangzhou Jiesai Communication Planning And Design Institute Co ltd
GCI Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jiesai Communication Planning And Design Institute Co ltd, GCI Science and Technology Co Ltd filed Critical Guangzhou Jiesai Communication Planning And Design Institute Co ltd
Priority to CN201810179220.3A priority Critical patent/CN108429745B/en
Publication of CN108429745A publication Critical patent/CN108429745A/en
Application granted granted Critical
Publication of CN108429745B publication Critical patent/CN108429745B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Library & Information Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application relates to a login authentication method and system, wherein the method comprises the following steps: receiving a user identity sent by a client; searching a target picture matched with the identity identification from a picture library according to the identity identification of the user, and generating an interference picture of the target picture; sending the target picture and the interference picture to a client for displaying; and receiving the selection operation of the user on the target picture and the interference picture fed back by the client, and authenticating the identity of the user. The login authentication method avoids the problem of low accuracy caused by the traditional technology, enables a user to select pictures from a large number of interference pictures so as to authenticate the login identity of the user, can improve the accuracy of login authentication, and simultaneously ensures the security of login authentication. A web page login method and a web page login system, a computer device and a computer readable storage medium are also provided.

Description

Login authentication method and system, and webpage login method and system
Technical Field
The present application relates to the field of internet technologies, and in particular, to a login authentication method, a login authentication system, a web page login method, a web page login system, a computer device, and a computer-readable storage medium.
Background
With the development of internet technology, various industries provide users with various web service contents through the internet using a web page system such as a web application. The current webpage system is generally configured with a login module, the webpage system authenticates the identity of a user when the user accesses the webpage system through the login module, and corresponding website service content is provided for the user after the authentication is passed.
In the conventional technology, an account password input when a user logs in a system is usually verified based on a user information database, so as to authenticate whether the login identity of the user is a registered legal user, however, the accuracy of authenticating the true identity of the user login is low due to the fact that the account password of the user is leaked and the like.
Disclosure of Invention
In view of the above, it is necessary to provide a login authentication method and login authentication system, a web login method and system, a computer device, and a computer-readable storage medium, which solve the problem of low accuracy of the conventional techniques.
A login authentication method comprises the following steps:
receiving a user identity sent by a client; the user identity identification is identification information input by user login;
searching a target picture matched with the identity identification from a picture library according to the user identity identification, and generating an interference picture of the target picture;
sending the target picture and the interference picture to the client for displaying;
and receiving the selection operation of the user on the target picture and the interference picture fed back by the client, and authenticating the identity of the user.
According to the login authentication method, the user identity identification input by the user login sent by the client is received, the target picture matched with the user identity identification is searched from the picture library and the interference picture of the target picture is generated, the target picture and the interference picture are sent to the client to be displayed, the selection operation fed back by the client and used for the target picture and the interference picture is received, the identity of the user is authenticated, the problem of low accuracy caused by the traditional technology is solved, the user selects pictures from a large number of interference pictures so as to authenticate the user login identity, the accuracy of login authentication can be improved, and meanwhile the safety of login authentication is guaranteed.
In one embodiment, the login authentication method further includes the steps of:
acquiring account information of the mobile terminal bound with the target picture and the interference picture;
the step of authenticating the identity of the user comprises:
determining a login picture selected by the client from the target picture and the interference picture according to the selection operation; searching account information of the mobile terminal bound with the login picture according to the login picture; sending an authentication code to a corresponding mobile terminal according to the account information;
and if the authentication code is received from the client, determining that the user is a legal login user.
In one embodiment, the login authentication method further includes the steps of:
and if the authentication code is not received from the client within a set time, identifying the user as an illegal login user.
In one embodiment, the target picture comprises a facial image of the user;
the step of searching the target picture matched with the identity identifier from the picture library according to the user identity identifier and generating the interference picture of the target picture comprises the following steps:
acquiring a face image of the registered user corresponding to the user identity mark from a picture library of the registered user as the target picture; and extracting a plurality of images similar to the face images of the registered users from the picture library to serve as the interference pictures.
In one embodiment, the login authentication method further includes the steps of:
acquiring a face image of the user through image acquisition equipment of the client; inputting the face image of the user into a pre-trained image recognition model for recognition, and acquiring the similarity between the face image of the user and the image recognition model; comparing the similarity to a threshold; if the similarity is larger than a threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user; sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code is received from the client, determining that the user is a legal login user.
In one embodiment, there is provided a login authentication method, including the steps of:
sending a user identity to a server; the user identity is identification information input by a user, and is used for indicating the server to search a target picture matched with the identity from a picture library and generate an interference picture of the target picture;
receiving the target picture and an interference picture from the server;
and feeding back the selection operation of the user on the target picture and the interference picture to the server, and indicating the server to authenticate the identity of the user.
According to the login authentication method, the user identity identification is sent to the server, the server is instructed to search the target picture matched with the identity identification from the picture library, the interference picture of the target picture is generated, the target picture and the interference picture are received by the server, the selection operation of the user on the target picture and the interference picture is fed back to the server, the server is instructed to authenticate the identity of the user, the problem of low accuracy caused by the traditional technology is solved, the user can select the picture from a large number of interference pictures so as to authenticate the login identity of the user, the login authentication accuracy can be improved, and meanwhile the login authentication safety is guaranteed.
In one embodiment, a web page login method is provided, which includes the steps of:
receiving a webpage login request of a user through a client; carrying out legality authentication on the identity of the user login webpage by using the login authentication method in any embodiment; and if the user is a legal login user, responding the webpage content to the client.
According to the webpage login method, the client receives the webpage login request of the user, the login authentication method of the embodiment is utilized to carry out legality authentication on the identity of the user login webpage, when the identity of the user is a legal login object, webpage content is responded to the client, the accuracy of webpage login identity authentication is improved, and meanwhile, the safety of the login webpage and the webpage content publishing is guaranteed.
In one embodiment, a web page login method is provided, which includes the steps of:
sending a webpage login request of a user to a server; carrying out legality authentication on the identity of the user login webpage by using the login authentication method in the embodiment; and receiving the webpage content responded by the server.
According to the webpage login method, the webpage login request of the user is sent to the server, the identity of the user login webpage is legally authenticated by using the login authentication method of the embodiment, and the webpage content responded by the server is received after the authentication is passed, so that the accuracy of webpage login identity authentication is improved, and meanwhile, the safety of the login webpage and the webpage content publishing is also ensured.
In one embodiment, there is provided a login authentication system, including:
the identification receiving module is used for receiving the user identity identification sent by the client; the user identity identification is identification information input by user login;
the picture searching module is used for searching a target picture matched with the identity identifier from a picture library according to the user identity identifier and generating an interference picture of the target picture;
the picture sending module is used for sending the target picture and the interference picture to the client for displaying;
and the identity authentication module is used for receiving the selection operation of the user on the target picture and the interference picture fed back by the client and authenticating the identity of the user.
According to the login authentication system, the user identity identification input by the user login and sent by the client is received by the identification receiving module, the target picture matched with the user identity identification is searched from the picture library by the picture searching module to generate the interference picture of the target picture, the target picture and the interference picture are sent to the client for displaying by the picture sending module, the selection operation fed back by the client for the target picture and the interference picture is received by the identity authentication module, the identity of the user is authenticated, the problem of low accuracy caused by the traditional technology is solved, the user selects the picture from a large number of interference pictures to authenticate the user login identity, the accuracy of login authentication can be improved, and meanwhile, the login authentication safety is also ensured.
In one embodiment, there is provided a login authentication system, including:
the identification sending module is used for sending the user identification to the server; the user identity is identification information input by a user, and is used for indicating the server to search a target picture matched with the identity from a picture library and generate an interference picture of the target picture;
the picture receiving module is used for receiving the target picture and the interference picture from the server;
and the picture selection module is used for feeding back the selection operation of the user on the target picture and the interference picture to the server and indicating the server to authenticate the identity of the user.
According to the login authentication system, the identification sending module is used for sending the user identification to the server, the server is indicated to search the target picture matched with the identification from the picture library, the interference picture of the target picture is generated, the picture receiving module is used for receiving the target picture and the interference picture from the server, the selection operation of the user on the target picture and the interference picture is fed back to the server through the picture selection module, the server is indicated to authenticate the identity of the user, the problem of low accuracy caused by the traditional technology is solved, the user can select the picture from a large number of interference pictures so as to authenticate the login identity of the user, the accuracy of login authentication can be improved, and meanwhile, the safety of the login authentication is also guaranteed.
In one embodiment, there is provided a web page login system, comprising:
the request receiving module is used for receiving a webpage login request of a user through a client;
the first authentication module is used for carrying out validity authentication on the identity of the user login webpage by using the login authentication method in the embodiment;
and the content response module is used for responding the webpage content to the client if the identity of the user is a legal login object.
According to the webpage login system, the request receiving module is used for receiving the webpage login request of the user through the client, the first authentication module is used for carrying out legality authentication on the identity of the user login webpage through the login authentication method in the embodiment, when the identity of the user is a legal login object, the content response module is used for responding webpage content to the client, the accuracy of webpage login identity authentication is improved, and meanwhile, the safety of the login webpage and the webpage content publishing are guaranteed.
In one embodiment, there is provided a web page login system, comprising:
the request sending module is used for sending a webpage login request of a user to the server;
the second authentication module is used for carrying out validity authentication on the identity of the user login webpage by using the login authentication method in the embodiment;
and the content receiving module is used for receiving the webpage content responded by the server.
According to the webpage login system, the request sending module is used for sending the webpage login request of the user to the server, the second authentication module is used for carrying out legality authentication on the identity of the user login webpage by using the login authentication method in the embodiment, the content receiving module is used for receiving webpage content responded by the server, the accuracy of webpage login identity authentication is improved, and meanwhile, the safety of the login webpage and the webpage content publishing is guaranteed.
In one embodiment, a computer device is provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the authentication method of login or the web login method as described in the above embodiment when executing the computer program.
According to the computer equipment, the accuracy of the webpage login authentication can be improved through the computer program running on the processor, and meanwhile, the safety of the webpage login authentication is also ensured.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which, when executed by a processor, implements the authentication method of login or the web page login method as described in the above embodiments.
The computer readable storage medium can improve the accuracy of the webpage login authentication and simultaneously ensure the safety of the webpage login authentication through the stored computer program.
Drawings
FIG. 1 is a diagram of an application environment for a login authentication method in one embodiment;
FIG. 2 is a flowchart illustrating a login authentication method according to an embodiment;
FIG. 3 is a flowchart illustrating a login authentication method according to another embodiment;
FIG. 4 is a flowchart illustrating a web page login method according to an embodiment;
FIG. 5 is a block diagram of the authentication system for login in one embodiment;
FIG. 6 is a block diagram showing the structure of a login authentication system in another embodiment;
FIG. 7 is a block diagram of the architecture of the web page registration system in one embodiment;
FIG. 8 is a block diagram showing the construction of a Web page registration system in another embodiment;
FIG. 9 is a diagram showing an internal structure of a computer device in one embodiment;
fig. 10 is an internal structural view of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The login authentication method provided by the present application can be applied to the application environment shown in fig. 1, where fig. 1 is an application environment diagram of the login authentication method in one embodiment. The technical solution of the present invention can be applied to the client 20, and the client 20 can include devices such as a personal computer 201, a smart phone 202, a tablet computer 203, a personal digital assistant 204, and the like, but is not limited thereto. The client 20 can access a public network such as the internet or the like by a wired or wireless method and communicate with the server 30. The client 20 is operable with a browser, a communication tool such as various communication clients, a web page access tool, and the like, and a user can access the server 30 via the internet network using the browser and the like to log in a designated website. The server 30 is a server device that implements various background functions, and in consideration of the actual situation of the current server process, the device may also be a device or a cluster of multiple devices.
The client 20 may send identification information input by user login to the server 30 through the internet, the server 30 receives the identification information of the client 20, searches for a target picture and an interference picture matched with the identification information, and sends the target picture and the interference picture to the client 20 for display, the client 20 receives the target picture and the interference picture and feeds back a selection operation of the user on the target picture and the interference picture to the server 30, and the selection may be sent to the server 30 in a request manner to authenticate the identity of the user.
In an embodiment, as shown in fig. 2, fig. 2 is a flowchart illustrating an authentication method for login in an embodiment, and the authentication method for login is described by taking the method as an example applied to the server 30 in fig. 1, and the authentication method may include the following steps:
step S101, receiving a user identity sent by a client.
In this step, the user identity refers to identification information input by the user during login, and the identification information may include a user identity ID allocated by a web page system when the user registers on a web page or a user name defined by the user, and is mainly used for identifying the login identity of the user.
The server can extract the user identity input by the user from the login request by receiving the login request which is sent by the client and carries the user identity.
And S102, searching a target picture matched with the identity identification from a picture library according to the user identity identification, and generating an interference picture of the target picture.
The server can create a picture library for each registered user in advance, and uses the user identity as an index to search the picture of the corresponding user, and in order to improve the security, the server can also use the target picture input by the user to generate a picture with higher similarity with the target picture in advance as interference information.
The server can search a target picture corresponding to the user identity from the input picture library according to the obtained user identity, and obtain a plurality of interference pictures according to the target picture, and the user client identifies the user. In the step, the target picture is searched by using the user identity identifier and a plurality of interference pictures are generated, so that the safety of login authentication can be improved.
And step S103, sending the target picture and the interference picture to a client for displaying.
The server can send the searched target picture and the interference picture to a client of the user through a network, display the target picture and the interference picture through a screen of the client and provide the target picture and the interference picture for the user to select the pictures.
Considering that if the server returns too many interference pictures to the client, the authentication speed is easily reduced under the condition of network congestion, and too few interference pictures influence the accuracy of identity authentication, one target picture and eight interference pictures can be sent to the client for displaying in a nine-square form, so that the authentication accuracy can be ensured while the speed is not influenced.
And step S104, receiving the selection operation of the user to the target picture and the interference picture fed back by the client, and authenticating the identity of the user.
After the client receives the target picture and the interference picture returned by the server, the user can select the displayed target picture and the displayed interference picture through the client, the server can obtain the photo selected by the user through the selection operation fed back by the client, and the server can authenticate the login identity of the user according to the photo selected by the user. Generally, if it is determined that the photo selected by the user is the target photo, the server may determine that the user is a legitimate login user, otherwise, authenticate the user as an illegitimate login user.
According to the login authentication method, the user identity identification input by the user login sent by the client is received, the target picture matched with the user identity identification is searched from the picture library and the interference picture of the target picture is generated, the target picture and the interference picture are sent to the client to be displayed, the selection operation fed back by the client and used for the target picture and the interference picture is received, the identity of the user is authenticated, the problem of low accuracy caused by the traditional technology is solved, the user selects pictures from a large number of interference pictures so as to authenticate the user login identity, the accuracy of login authentication can be improved, and meanwhile the safety of login authentication is guaranteed.
In one embodiment, the target picture may include a facial image of the user; the step of searching the target picture matched with the identity identifier from the picture library according to the user identity identifier and generating the interference picture of the target picture in step S102 may include:
acquiring a face image of the registered user corresponding to the user identity identification from a picture library of the registered user as a target picture; and extracting a plurality of images similar to the face images of the registered users from the picture library to be used as interference pictures.
The system of the server can input face images of the user under different scenes when the user registers, for example, the server can input face images of different angles and lights, different dresses and different ornaments including glasses for each registered user, creates a picture library of the face images for each registered user, and can use the user identity as an index of the pictures, wherein the picture library can comprise the input face images and can also comprise pictures which are automatically input by the server and have higher similarity with the face images of the registered users.
The server can search the face image of the user identity mark from the picture library of the registered user as a target image according to the received user identity mark, can perform primary similarity recognition on the target image by utilizing a pre-trained image recognition model, and selects a plurality of face images with the similarity of 60-80% from the image recognition model as interference images.
According to the technical scheme of the embodiment, the correct face image and the interference image with high similarity are found out through the user identity identification, so that the accuracy and the safety of user identity authentication are improved.
In one embodiment, before authenticating the identity of the user in step S104, the method may further include: acquiring account information of the mobile terminal bound with the target picture and the interference picture; further, the step S104 of authenticating the identity of the user may include the following steps:
determining a login picture selected by the client from the target picture and the interference picture according to the selection operation; searching account information of the mobile terminal bound with the login picture according to the login picture; sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code is received from the client, determining that the user is a legal login user.
The account information of the mobile terminal may refer to a communication number of the mobile terminal such as a mobile phone, and since the server system may enter information such as a picture of the user and a communication number of the mobile terminal of the user when the user registers, and may bind the information, the mobile terminal referred to herein may be a terminal device different from the client, taking fig. 1 as an example, if the client is a personal computer 201, the mobile terminal may be a smart phone 202.
In this embodiment, the server mainly searches account information of the mobile terminal bound in association with the picture after the user selects the picture for login from the target picture and the interference picture through the client, and sends an authentication code for verifying the login identity of the user to the bound mobile terminal, and can receive the authentication code input by the user through the client, match the authentication code input by the user with the authentication code sent by the server to the mobile terminal, and if the authentication code input by the user and the authentication sent by the server to the mobile terminal are the same authentication code, it can be determined that the user is a legitimate login user.
According to the embodiment, the picture authentication mode and the authentication mode for sending the authentication code to the mobile terminal are combined, and the correct authentication code needs to be input under the condition that the user selects the target picture, so that the accuracy of login identity authentication is further improved, the defect that the login identity of the user cannot be accurately authenticated when an illegal user steals the picture information of a legal user is avoided, and the login safety is also improved.
In an embodiment, in the step of authenticating the identity of the user in step S104, if the authentication code is not received from the client within a set time, the user is identified as an illegal login user.
An authentication time may be preset, and after the authentication code is sent to the mobile terminal, the authentication time countdown is started, and if the server does not receive the authentication code sent to the mobile terminal from the client before the authentication time is over, the user may be considered as an illegal login user.
According to the embodiment, the identity authentication is carried out on the user by setting the authentication time, the risk that an illegal user steals the authentication code of the mobile terminal can be avoided, and the accuracy and the safety of the authentication are improved.
In one embodiment, considering that the client may be configured with an image capture device, before authenticating the user identity in step S104, the login identity of the user may be authenticated by the following method, including the steps of:
step S105, acquiring a face image of a user through image acquisition equipment of a client; inputting a face image of a user into a pre-trained image recognition model for recognition, and acquiring the similarity between the face image of the user and the image recognition model; comparing the similarity with a threshold; if the similarity is greater than the threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user; sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code is received from the client, determining that the user is a legal login user.
In this embodiment, the server may authenticate the login identity of the user through the image capturing device of the client, mainly when the client is configured with the image capturing device. The image acquisition equipment can comprise a camera, the server can utilize the camera to input a plurality of face images registered by a user for training an image recognition model, and the image recognition module is used for recognizing the identity of the user in real time.
When the server can detect that the client is provided with the camera, the camera can be opened and video frame captured in real time can be serialized, continuous video stream is converted into a static image file through an OpenCV tool, the static image file is transmitted to a background of the server for processing after serialization, the streaming data after serialization is received by the background of the server, and the acquired face image data of the user is written into a temporary file of the background server through re-deserialization.
The face image recorded by the temporary file can be input into a pre-trained image recognition model, similarity recognition is performed on the face image by using the pre-trained image recognition model, for example, the pre-trained image recognition model can be loaded based on a tool library of Keras, the similarity between the face image of the temporary file and the image in the image recognition model is compared, if the similarity of the face image is greater than a set threshold value, such as 99%, it is determined that the face image of the user is matched with the image recognition model of the registered user, account information of the mobile terminal bound with the face image is searched from a database of the registered user, a verification code can be sent to the bound mobile terminal, and if an authentication code sent to the mobile terminal is received from the client, the user is authenticated as a legal login user. The server can repeatedly identify the collected face image of the user after the user adjusts the posture so as to ensure the accuracy of login authentication.
In one embodiment, after the authentication code is sent to the mobile terminal in step S105, further, if the authentication code has not been received from the client within a set time period, it is determined that the user is an illegal user.
According to the technical scheme provided by the embodiment, when the client is provided with the camera, the camera is used for collecting the face image of the user in real time, and the authentication code is sent to the mobile terminal bound with the face image for identity authentication of the user, so that the accuracy and the safety of the identity authentication are ensured, and the efficiency of the identity authentication is also improved.
In one embodiment, before inputting the face image of the user into the pre-trained image recognition model for recognition in step S105, an image recognition model for recognizing the identity of the user may be obtained by:
acquiring a plurality of face images input by a user in advance; extracting basic image data for model training from a plurality of face images; acquiring interference image data from a facial expression database; and inputting the basic image data and the interference image data into a convolutional neural network model for training to obtain an image recognition model of the user.
The data of the public facial expression database can be used as interference image data, and as registered users in a server system independently construct a folder for representing facial images of all users identified by the server, the more the facial data, the higher the identification accuracy.
Before each user registers, at least 16 images of different angles and lamplights, different clothes and different ornaments including glasses can be input and used as basic images, the training data can adopt TensorFlow and Keras as bottom technical support, a three-layer convolutional neural network algorithm is adopted, all input photo images are converted into variables represented by vectors, direction angles are adopted among the variables to represent the similarity between the images, and the trained model is finally converted into an image recognition model in the Keras for subsequent real-time recognition.
According to the technical scheme of the embodiment, the plurality of face images pre-input by the user and the interference image acquired from the facial expression database are used as the training data source, so that the accuracy of user identity recognition can be improved, and the accuracy of user login identity authentication is improved.
In an embodiment, as shown in fig. 3, fig. 3 is a flowchart illustrating an authentication method for login in another embodiment, which is described by taking the method as an example applied to the client 20 in fig. 1, and the authentication method may include the following steps:
step S401, sending the user identity to the server.
The user identity is identification information input by a user during login, and the identification information may include a user identity ID allocated by a web page system when the user registers in a web page or a user name defined by the user, and is mainly used for identifying the login identity of the user, instructing the server to search a target picture matched with the identity from a picture library, and generating an interference picture of the target picture.
The client can obtain a user identity input by a user, send the user identity to the server through the Internet, instruct the server to search a target picture matched with the identity from the picture library, and generate an interference picture of the target picture.
In step S402, a target picture and an interference picture are received from a server.
The method mainly comprises the step that a client receives a target picture searched by a server according to a user identity identifier and an interference picture generated according to the target picture from the server and is used for carrying out identity recognition on a user.
The user can input information capable of reflecting user characteristics, such as inputting user photos and the like, when registering on a system of the server through the client, the system generally allocates corresponding identification IDs to each registered user to serve as user identity identifications of the users, or user-defined user names are directly adopted to serve as the user identity identifications, the server can create a picture library for each registered user in advance, the user identity identifications serve as indexes to search pictures of the corresponding users, and in order to improve safety, the server can also utilize target pictures input by the user to generate pictures with high similarity with the target pictures in advance to serve as interference information. Therefore, the client can receive the target picture and the interference picture from the server after sending the user identity to the server.
In the step, the target picture is searched by using the user identity identifier and a plurality of interference pictures are generated, so that the safety of login authentication can be improved.
Step S403, feeding back, to the server, a selection operation of the user on the target picture and the interference picture, so as to instruct the server to authenticate the identity of the user.
In the step, the client can display the target picture and the interference picture through the screen and provide the target picture and the interference picture for the user to select the picture, and considering that if the server returns too many interference pictures to the client, the authentication speed is easily reduced under the condition of network congestion, and too few interference pictures can influence the accuracy of identity authentication, one target picture and eight interference pictures can be displayed in a nine-square form, so that the accuracy of authentication can be ensured without influencing the speed.
After receiving the target picture and the interference picture returned by the server, the client can select the displayed target picture and the displayed interference picture through the client, the client can acquire a picture selection instruction of the user through the touch screen and feed back the picture selection instruction to the server, and the server can be used for authenticating the login identity of the user according to the picture selected by the user. Generally speaking, if the photo selected by the user is the target photo, the server can determine that the user is a legal login user, otherwise, the server authenticates the user as an illegal login user.
According to the login authentication method, the user identity identification is sent to the server, the server is instructed to search the target picture matched with the identity identification from the picture library, the interference picture of the target picture is generated, the target picture and the interference picture are received by the server, the selection operation of the user on the target picture and the interference picture is fed back to the server, the server is instructed to authenticate the identity of the user, the problem of low accuracy caused by the traditional technology is solved, the user can select the picture from a large number of interference pictures so as to authenticate the login identity of the user, the login authentication accuracy can be improved, and meanwhile the login authentication safety is guaranteed.
In one embodiment, a web page login method is provided, which is exemplified by the application of the method to the server 30 in fig. 1, and the web page login method may include the following steps:
receiving a webpage login request of a user through a client; the identity of the user login webpage is legally authenticated by using the login authentication method in the embodiment; and if the identity of the user is a legal login object, responding the webpage content to the client.
In this embodiment, before accessing a web page, a user may send a web page login request carrying a user identity through a client, a server may receive the web page login request through the client and extract the user identity, perform validity authentication on the identity of the user login web page according to the identity by using the login authentication method provided in the above embodiment, and respond to the web page content to the client if the identity of the user is authenticated as a valid login object.
The webpage login method provided by the embodiment can be used for a server, a webpage login request of a user is received through a client, the identity of the user login webpage is legally authenticated by using the login authentication method provided by the embodiment, and when the identity of the user is a legal login object, webpage content is responded to the client, so that the accuracy of webpage login identity authentication is improved, and meanwhile, the safety of logging in the webpage and publishing the webpage content is also ensured.
In one embodiment, a web page login method is provided, which is exemplified by the method applied to the client 20 in fig. 1, and the web page login method may include the following steps:
sending a webpage login request of a user to a server; the identity of the user login webpage is legally authenticated by using the login authentication method in the embodiment; and receiving the webpage content responded by the server.
The client can obtain a webpage login request carrying a user identity input by a user, and by using the login authentication method provided by the embodiment, the server is indicated to carry out validity authentication on the identity of the user login webpage through the webpage login request, so that webpage content responded by the server is received.
The webpage login method can be used for a client side, a webpage login request of a user is sent to a server, the identity of the user login webpage is legally authenticated by using the login authentication method of the embodiment, webpage content responded by the server is received after the authentication is passed, the accuracy of webpage login identity authentication is improved, and meanwhile, the safety of the login webpage and the webpage content publishing is guaranteed.
To more clearly illustrate the technical solution of the present invention, in an embodiment, a method for logging in a web page is provided, referring to fig. 4, where fig. 4 is a schematic flow chart of the method for logging in a web page in an embodiment, the method may include the following steps:
s1, initiating a login request;
the user can send a webpage login request carrying the user identity to the server through the client.
s2, detecting the camera;
when the server receives the web page login request, whether the client is provided with the camera or not can be detected, if so, s3 is executed, and otherwise, s5 is executed.
s3, acquiring a real-time image;
the server can acquire the face image of the user in real time through the camera configured on the client.
s4, converting the video stream into frame images;
the server can convert the dynamic video stream containing the face image of the user, which is collected by the camera in real time, into a plurality of frames of static images through the client.
s5, random squared figure wall;
under the condition that the client is not provided with the camera, a correct face image and eight interference images similar to the correct face image can be obtained according to the user identity input by the user, a Sudoku picture wall is formed and sent to the client for display.
s6, input to the image recognition model;
the server can input a plurality of frames of static images acquired in real time or pictures selected by the user in the Sudoku picture wall into a pre-trained image recognition model for recognition and detection.
s7, detecting a pass;
judging whether the similarity between a plurality of frames of static images acquired in real time or a picture selected by a user in a Sudoku picture wall and a picture in a pre-trained image recognition model is higher than a set threshold value, if so, passing the detection, and executing s 9; otherwise, not pass, s8 is executed.
s8, error reporting;
when the detection fails, the server may send an error message to the client to indicate that the user is an illegal login user.
s9, the database obtains the user mobile device information;
when the detection is passed, the server can extract the device information of the mobile terminal bound with the face image of the login user, such as a mobile phone number, from the database of the registered user.
s10, sending verification information;
and the server sends verification information to the corresponding mobile terminal according to the bound equipment information of the mobile terminal, such as a short message verification code to a mobile phone.
s11, inputting authentication information;
the client may send authentication information input by the user to the server.
s12, verification is passed;
and the server receives the verification information sent by the client and judges whether the verification information is consistent with the verification information sent to the mobile terminal, if so, s14 is executed, otherwise, s13 is executed.
s13, error reporting;
when the verification information sent by the client is inconsistent with the verification information sent by the server to the mobile terminal, the server can send an error message to the client to indicate that the user is an illegal login user.
s14, completing login;
when the authentication information sent by the client is consistent with the authentication information sent by the server to the mobile terminal, the server can respond to the web page content to the client, and can also perform necessary processing such as cookie processing on the client.
The webpage login method provided by the embodiment realizes the login identity authentication of the traditional webpage system accessed to the face recognition system, can prevent the situation that the traditional webpage system is easy to mistakenly send verification information due to too low recognition degree, allows the user identity identification mode to be used to send to the server to request offline image for verification when the server detects that the client does not have a camera, returns the nine-grid image information which has lower recognition degree and is difficult to distinguish and comprises the correct face at the background, realizes interface compatibility when the camera does not exist, utilizes the characteristic that the face image and the interference image of the user have higher similarity, provides the webpage login mode of accurate authentication of the login identity in an offline mode for the user, and also adopts the scheme of combining the face recognition with the mobile terminal verification to bind the face image data and the user mobile equipment information, the safety of the webpage login and the webpage content is ensured.
In an embodiment, there is provided a login authentication system, and referring to fig. 5, fig. 5 is a block diagram illustrating a structure of the login authentication system in an embodiment, where the login authentication system may include:
an identifier receiving module 101, configured to receive a user identifier sent by a client; the user identity identification is identification information input by user login;
the picture searching module 102 is configured to search a target picture matched with the user identity from a picture library according to the user identity, and generate an interference picture of the target picture;
the picture sending module 103 is configured to send the target picture and the interference picture to the client for display;
and the identity authentication module 104 is configured to receive a selection operation of the user on the target picture and the interference picture, which is fed back by the client, and authenticate the identity of the user.
The login authentication system can be used for a server, a user identity input by a user login sent by a client is received by the identity receiving module 101, a target picture matched with the user identity is searched from a picture library by the picture searching module 102 and an interference picture of the target picture is generated, the target picture and the interference picture are sent to the client for display by the picture sending module 103, the selection operation fed back by the client for the target picture and the interference picture is received by the identity authentication module 104, the identity of the user is authenticated, the problem of low accuracy caused by the traditional technology is solved, the user selects pictures in a large number of interference pictures to authenticate the user login identity, the accuracy of login authentication can be improved, and meanwhile, the security of login authentication is ensured.
In an embodiment, a login authentication system is provided, and referring to fig. 6, fig. 6 is a block diagram of a login authentication system in another embodiment, where the login authentication system may include:
an identifier sending module 401, configured to send a user identity identifier to a server; the user identity is identification information input by a user, and is used for indicating the server to search a target picture matched with the identity from a picture library and generate an interference picture of the target picture;
a picture receiving module 402, configured to receive the target picture and the interference picture from the server;
a picture selection module 403, configured to feed back, to the server, a selection operation of the user on the target picture and the interference picture, and instruct the server to authenticate the identity of the user.
The login authentication system can be used for a client, a user identity is sent to a server by the identity sending module 401, the server is indicated to search a target picture matched with the identity from a picture library, an interference picture of the target picture is generated, the target picture and the interference picture are received from the server by the picture receiving module 402, the selection operation of the user on the target picture and the interference picture is fed back to the server by the picture selecting module 403, the server is indicated to authenticate the identity of the user, the problem of low accuracy caused by the traditional technology is solved, the user can select pictures from a large number of interference pictures so as to authenticate the login identity of the user, the accuracy of login authentication can be improved, and meanwhile, the security of the login authentication is also ensured.
For the specific limitation of the login authentication system, reference may be made to the above limitation on the login authentication method, which is not described herein again. The various modules described above in the logged-in authentication system may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a netpage login system is provided, and referring to fig. 7, fig. 7 is a block diagram illustrating a structure of the netpage login system in one embodiment, where the netpage login system may include:
a request receiving module 501, configured to receive a web page login request of a user through a client;
a first authentication module 502, configured to perform validity authentication on an identity of a user logging in a webpage by using the login authentication method according to any embodiment;
the content response module 503 is configured to respond to the web page content to the client if the identity of the user is a legal login object.
The web page login system can be used for a server, receives a web page login request of a user through a client by using the request receiving module 501, carries out legality authentication on the identity of a user login web page by using the login authentication method described in the embodiment through the first authentication module 502, and when the identity of the user is a legal login object, responds web page content to the client through the content response module 503, so that the accuracy of the authentication of the web page login identity is improved, and meanwhile, the security of the login web page and the security of the issued web page content are also ensured.
In one embodiment, a netpage login system is provided, and referring to fig. 8, fig. 8 is a block diagram of a netpage login system in another embodiment, where the netpage login system may include:
a request sending module 601, configured to send a web page login request of a user to a server;
a second authentication module 602, configured to perform validity authentication on the identity of the user logging in the webpage by using the login authentication method according to the above embodiment;
a content receiving module 603, configured to receive the web page content responded by the server.
The web page login system can be used for a client, a request sending module 601 is used for sending a web page login request of a user to a server, the second authentication module 602 is used for carrying out legality authentication on the identity of a user login web page by using the login authentication method in the embodiment, and the content receiving module 603 is used for receiving web page content responded by the server, so that the accuracy of the authentication of the web page login identity is improved, and meanwhile, the security of the login web page and the security of the issued web page content are also ensured.
For specific limitations of the netpage login system, reference may be made to the above limitations on the netpage login method, which will not be described herein again. The modules in the web page login system can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data generated in the process of the login authentication method or the webpage login method. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a login authentication method or a web login method.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 10. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a login authentication method or a web login method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the configurations shown in fig. 9 or 10 are merely block diagrams of some configurations relevant to the present disclosure, and do not constitute a limitation on the computing devices to which the present disclosure may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving a user identity sent by a client; searching a target picture matched with the identity identification from a picture library according to the identity identification of the user, and generating an interference picture of the target picture; sending the target picture and the interference picture to a client for displaying; and receiving the selection operation of the user on the target picture and the interference picture fed back by the client, and authenticating the identity of the user.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring account information of the mobile terminal bound with the target picture and the interference picture; determining a login picture selected by the client from the target picture and the interference picture according to the selection operation; searching account information of the mobile terminal bound with the login picture according to the login picture; sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code is received from the client, determining that the user is a legal login user.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and if the authentication code is not received from the client within a set time, identifying the user as an illegal login user.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring a face image of the registered user corresponding to the user identity identification from a picture library of the registered user as a target picture; and extracting a plurality of images similar to the face images of the registered users from the picture library to be used as interference pictures.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring a face image of a user through image acquisition equipment of a client; inputting a face image of a user into a pre-trained image recognition model for recognition, and acquiring the similarity between the face image of the user and the image recognition model; comparing the similarity with a threshold; if the similarity is greater than the threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user; sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code is received from the client, determining that the user is a legal login user.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
sending a user identity to a server; receiving a target picture and an interference picture from a server; and feeding back the selection operation of the user on the target picture and the interference picture to the server, and indicating the server to authenticate the identity of the user.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving a webpage login request of a user through a client; carrying out legality authentication on the identity of the user login webpage by using the login authentication method in any embodiment; and if the user is a legal login user, responding the webpage content to the client.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
sending a webpage login request of a user to a server; the identity of the user login webpage is legally authenticated by using the login authentication method in the embodiment; and receiving the webpage content responded by the server.
The computer device according to any of the above embodiments, through the computer program running on the processor, can improve the accuracy of the web page login authentication, and also ensure the security of the web page login authentication.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving a user identity sent by a client; searching a target picture matched with the identity identification from a picture library according to the identity identification of the user, and generating an interference picture of the target picture; sending the target picture and the interference picture to a client for displaying; and receiving the selection operation of the user on the target picture and the interference picture fed back by the client, and authenticating the identity of the user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring account information of the mobile terminal bound with the target picture and the interference picture; determining a login picture selected by the client from the target picture and the interference picture according to the selection operation; searching account information of the mobile terminal bound with the login picture according to the login picture; sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code is received from the client, determining that the user is a legal login user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and if the authentication code is not received from the client within a set time, identifying the user as an illegal login user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring a face image of the registered user corresponding to the user identity identification from a picture library of the registered user as a target picture; and extracting a plurality of images similar to the face images of the registered users from the picture library to be used as interference pictures.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring a face image of a user through image acquisition equipment of a client; inputting a face image of a user into a pre-trained image recognition model for recognition, and acquiring the similarity between the face image of the user and the image recognition model; comparing the similarity with a threshold; if the similarity is greater than the threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user; sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code is received from the client, determining that the user is a legal login user.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
sending a user identity to a server; receiving a target picture and an interference picture from a server; and feeding back the selection operation of the user on the target picture and the interference picture to the server, and indicating the server to authenticate the identity of the user.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving a webpage login request of a user through a client; carrying out legality authentication on the identity of the user login webpage by using the login authentication method in any embodiment; and if the user is a legal login user, responding the webpage content to the client.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
sending a webpage login request of a user to a server; the identity of the user login webpage is legally authenticated by using the login authentication method in the embodiment; and receiving the webpage content responded by the server.
The computer-readable storage medium according to any of the above embodiments, through the stored computer program, can improve the accuracy of the web page login authentication, and also ensure the security of the web page login authentication.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A login authentication method is characterized by comprising the following steps:
receiving a user identity sent by a client; the user identity identification is identification information input by user login;
searching the target picture matched with the identity mark from the picture library according to the user identity mark, and generating
Forming an interference picture of the target picture; acquiring account information of the mobile terminal bound with the target picture and the interference picture; the interference picture is a picture pre-recorded in the picture library; the account information of the mobile terminal is bound with the target picture or the interference picture after being input:
sending the target picture and the interference picture to the client for displaying:
receiving the selection operation of the user fed back by the client on the target picture and the interference picture; determining a login picture selected by the client from the target picture and the interference picture according to the selection operation;
searching account information of the mobile terminal bound with the login picture according to the login picture; sending an authentication code to a corresponding mobile terminal according to the account information;
if the authentication code determined based on the account information of the mobile terminal bound by the login picture is received from the client, determining that the user is a legal login user; if the authentication code is not received from the client, determining that the user is an illegal login user;
and the number of the first and second groups,
acquiring a face image of the user through image acquisition equipment of the client; inputting the face image of the user into a pre-trained image recognition model for recognition, and acquiring the similarity between the face image of the user and the image recognition model; comparing the similarity with a threshold: if the similarity is greater than a threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user: and sending an authentication code to a corresponding mobile terminal according to the account information: and if the authentication code determined by the account information of the mobile terminal bound based on the face image is received from the client, determining that the user is a legal login user.
2. The login authentication method according to claim 1, further comprising the steps of:
and if the authentication code is not received from the client within a set time, identifying the user as an illegal login user.
3. The login authentication method according to any one of claims 1 to 2, wherein the target picture includes a face image of the user;
the step of searching the target picture matched with the identity identifier from the picture library according to the user identity identifier and generating the interference picture of the target picture comprises the following steps:
acquiring a face image of the registered user corresponding to the user identity mark from a picture library of the registered user as the target picture;
and extracting a plurality of images similar to the face images of the registered users from the picture library to serve as the interference pictures.
4. A login authentication method is characterized by comprising the following steps:
sending a user identity to a server; the user identity is identification information input by a user, and is used for indicating the server to search a target picture matched with the identity from a picture library and generate an interference picture of the target picture; the server is further used for indicating to acquire account information of the mobile terminal bound with the target picture and the interference picture; the interference picture is a picture pre-recorded in the picture library; the account information of the mobile terminal and the target picture or the interference picture are bound after being input into the server;
receiving the target picture and an interference picture from the server;
feeding back the selection operation of the user on the target picture and the interference picture to the server so that the server determines a login picture selected by the client from the target picture and the interference picture according to the selection operation; searching account information of the mobile terminal bound with the login picture according to the login picture; sending an authentication code to a corresponding mobile terminal according to the account information; if the authentication code determined based on the account information of the mobile terminal bound by the login picture is received from the client, determining that the user is a legal login user: if the authentication code is not received from the client, determining that the user is an illegal login user;
and the number of the first and second groups,
after the authentication code determined based on the account information of the mobile terminal bound by the login picture is sent to the server, the face image of the user collected by the image collecting device is sent to the server, so that the server inputs the face image of the user into a pre-trained image recognition model for recognition, and the similarity between the face image of the user and the image recognition model is obtained: comparing the similarity with a threshold: if the similarity is greater than a threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user: and sending an authentication code to a corresponding mobile terminal according to the account information: and if the authentication code determined by the account information of the mobile terminal bound based on the face image is received from the client, determining that the user is a legal login user.
5. A web page login method is characterized by comprising the following steps:
receiving a webpage login request of a user through a client;
carrying out legal authentication on the identity of the user logging in the webpage by using the login authentication method according to any one of claims 1 to 3;
if the identity of the user is a legal login object, responding to the webpage content to the client;
or
Sending a webpage login request of a user to a server;
carrying out legality authentication on the identity of the user login webpage by using the login authentication method according to claim 4;
and receiving the webpage content responded by the server.
6. A login authentication system, comprising:
the identification receiving module is used for receiving the user identity identification sent by the client; the user identity identification is identification information input by user login;
the picture searching module is used for searching a target picture matched with the identity identifier from a picture library according to the user identity identifier and generating an interference picture of the target picture; acquiring account information of the mobile terminal bound with the target picture and the interference picture; the interference picture is a picture pre-recorded in the picture library: the account information of the mobile terminal is bound with the target picture or the interference picture after being input;
the picture sending module is used for sending the target picture and the interference picture to the client for displaying;
the identity authentication module is used for receiving the selection operation of the user on the target picture and the interference picture fed back by the client, and determining the login picture selected by the client from the target picture and the interference picture according to the selection operation; and searching account information of the mobile terminal bound with the login picture according to the login picture: and sending an authentication code to a corresponding mobile terminal according to the account information: if the authentication code determined based on the account information of the mobile terminal bound by the login picture is received from the client, determining that the user is a legal login user; if the authentication code is not received from the client, determining that the user is an illegal login user;
and the number of the first and second groups,
the face image recognition module is used for collecting the face image of the user through the image collection equipment of the client based on the authentication code determined by the account information of the mobile terminal bound by the login picture; inputting the face image of the user into a pre-trained image recognition model for recognition, and acquiring the similarity between the face image of the user and the image recognition model;
the face image identity authentication module is used for comparing the similarity with a threshold value; if the similarity is larger than a threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user: sending an authentication code to a corresponding mobile terminal according to the account information; and if the authentication code determined by the account information of the mobile terminal bound based on the face image is received from the client, determining that the user is a legal login user.
7. The login authentication system of claim 6, wherein the identity authentication module further comprises:
and the illegal user identification unit is used for identifying the user as an illegal login user if the authentication code is not received from the client within a set time.
8. A login authentication system, comprising:
the identification sending module is used for sending the user identification to the server; the user identity is identification information input by a user, and is used for indicating the server to search a target picture matched with the identity from a picture library and generate an interference picture of the target picture; acquiring account information of the mobile terminal bound with the target picture and the interference picture; the interference picture is a picture pre-recorded in the picture library: the account information of the mobile terminal is bound with the target picture or the interference picture after being input;
the picture receiving module is used for receiving the target picture and the interference picture from the server;
the picture selection module is used for feeding back the selection operation of the target picture and the interference picture by the user to the server so that the server determines the login picture selected by the client from the target picture and the interference picture according to the selection operation; and searching account information of the mobile terminal bound with the login picture according to the login picture: and sending an authentication code to a corresponding mobile terminal according to the account information: if the authentication code determined based on the account information of the mobile terminal bound by the login picture is received from the client, determining that the user is a legal login user; if the authentication code is not received from the client, determining that the user is an illegal login user;
and the number of the first and second groups,
the face image sending module is used for sending the authentication code determined based on the account information of the mobile terminal bound by the login picture to the server and then sending the face image of the user acquired by the image acquisition equipment to the server so that the server inputs the face image of the user into a pre-trained image recognition model for recognition and obtains the similarity between the face image of the user and the image recognition model; comparing the similarity to a threshold; if the similarity is larger than a threshold value, searching account information of the mobile terminal bound with the face image according to the face image of the user; and sending an authentication code to a corresponding mobile terminal according to the account information: and if the authentication code determined by the account information of the mobile terminal bound based on the face image is received from the client, determining that the user is a legal login user.
9. A web page login system, comprising:
the request receiving module is used for receiving a webpage login request of a user through a client;
a first authentication module, configured to perform validity authentication on the identity of the user logging in the webpage by using the login authentication method according to any one of claims 1 to 3;
the content response module is used for responding the webpage content to the client if the identity of the user is a legal login object;
or
The request sending module is used for sending a webpage login request of a user to the server;
a second authentication module, configured to perform validity authentication on the identity of the user logging in the webpage by using the login authentication method according to claim 4;
and the content receiving module is used for receiving the webpage content responded by the server.
10. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 4.
CN201810179220.3A 2018-03-05 2018-03-05 Login authentication method and system, and webpage login method and system Active CN108429745B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810179220.3A CN108429745B (en) 2018-03-05 2018-03-05 Login authentication method and system, and webpage login method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810179220.3A CN108429745B (en) 2018-03-05 2018-03-05 Login authentication method and system, and webpage login method and system

Publications (2)

Publication Number Publication Date
CN108429745A CN108429745A (en) 2018-08-21
CN108429745B true CN108429745B (en) 2021-08-10

Family

ID=63157760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810179220.3A Active CN108429745B (en) 2018-03-05 2018-03-05 Login authentication method and system, and webpage login method and system

Country Status (1)

Country Link
CN (1) CN108429745B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104657A (en) * 2018-10-25 2020-05-05 中国电信股份有限公司 Identity authentication method and system, authentication platform, user terminal and application terminal
CN109246156B (en) * 2018-10-30 2021-03-02 佛山中科芯蔚科技有限公司 Login authentication method and device, login method and device, and login authentication system
CN110519269B (en) * 2019-08-28 2021-09-21 中国工商银行股份有限公司 Verification method, device and system for image-text click data and mobile terminal
CN111159687B (en) * 2019-12-31 2022-07-08 维沃移动通信有限公司 Account information processing method, electronic equipment and server
CN111666543A (en) * 2020-05-08 2020-09-15 武汉文华众创空间管理有限公司 Identity authentication code generation system and method based on user input habit
CN111740980B (en) * 2020-06-18 2022-05-17 天翼数字生活科技有限公司 Method and device for logging in application, mobile terminal and storage medium
CN113162918B (en) * 2021-03-25 2022-10-18 重庆扬成大数据科技有限公司 Method for extracting abnormal data under condition of rapidly mining four-in-one network
CN116503112A (en) * 2023-06-12 2023-07-28 深圳市豪斯莱科技有限公司 Advertisement recommendation system and method based on video content identification

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102651739A (en) * 2011-02-28 2012-08-29 阿里巴巴集团控股有限公司 Login verification method, system and instant messaging (IM) server
CN106411856A (en) * 2016-09-06 2017-02-15 北京交通大学 Authentication method and apparatus based on face recognition of mobile terminal
CN106453209A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verifying method and apparatus

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106034029A (en) * 2015-03-20 2016-10-19 阿里巴巴集团控股有限公司 Verification method and apparatus based on image verification codes
CN105468948B (en) * 2015-12-09 2019-01-25 广州广电运通金融电子股份有限公司 A method of authentication is carried out by social networks
CN107347054B (en) * 2016-05-05 2021-08-03 腾讯科技(深圳)有限公司 Identity verification method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102651739A (en) * 2011-02-28 2012-08-29 阿里巴巴集团控股有限公司 Login verification method, system and instant messaging (IM) server
CN106453209A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verifying method and apparatus
CN106411856A (en) * 2016-09-06 2017-02-15 北京交通大学 Authentication method and apparatus based on face recognition of mobile terminal

Also Published As

Publication number Publication date
CN108429745A (en) 2018-08-21

Similar Documents

Publication Publication Date Title
CN108429745B (en) Login authentication method and system, and webpage login method and system
US10664581B2 (en) Biometric-based authentication method, apparatus and system
US11120250B2 (en) Method, system and computer program for comparing images
KR102391887B1 (en) Identity authentication method and device
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
US11188628B2 (en) Biometric challenge-response authentication
EP4007968A1 (en) Systems and methods of identification verification using hybrid near-field communication and optical authentication
CN109766072B (en) Information verification input method and device, computer equipment and storage medium
CN107786487B (en) Information authentication processing method, system and related equipment
WO2021169159A1 (en) Photograph information processing method and apparatus, device, and medium
US11461567B2 (en) Systems and methods of identification verification using hybrid near-field communication and optical authentication
CN112632504B (en) Webpage access method, device, system, computer equipment and storage medium
CN110807630B (en) Payment method and device based on face recognition, computer equipment and storage medium
CN116541814B (en) Unified login authentication method and system
CN111753170B (en) Big data quick retrieval system and method
US20240048558A1 (en) Device authentication method, terminal device, server, and computer device
CN113515318A (en) Login method, device and equipment for application program
CN113515734A (en) Data processing method, device and equipment
CN117558058A (en) User login method, system, computer equipment and storage medium
CN117133021A (en) Palm image recognition method, palm image recognition device, palm image recognition apparatus, palm image recognition device, palm image recognition program, and palm image recognition program
CN113516477A (en) Payment verification method and device, computer equipment and storage medium
OA17098A (en) Authentication method, device and system based on biological characteristics.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant