CN109067767B - Face recognition authentication method and system - Google Patents

Face recognition authentication method and system Download PDF

Info

Publication number
CN109067767B
CN109067767B CN201811012824.5A CN201811012824A CN109067767B CN 109067767 B CN109067767 B CN 109067767B CN 201811012824 A CN201811012824 A CN 201811012824A CN 109067767 B CN109067767 B CN 109067767B
Authority
CN
China
Prior art keywords
authentication
user
similarity
certificate
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811012824.5A
Other languages
Chinese (zh)
Other versions
CN109067767A (en
Inventor
何继远
李剑
白冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai I2finance Software Co ltd
Original Assignee
Shanghai I2finance Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai I2finance Software Co ltd filed Critical Shanghai I2finance Software Co ltd
Priority to CN201811012824.5A priority Critical patent/CN109067767B/en
Publication of CN109067767A publication Critical patent/CN109067767A/en
Application granted granted Critical
Publication of CN109067767B publication Critical patent/CN109067767B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the application discloses a face recognition method and a face recognition system, wherein the face recognition method comprises the following steps: the client acquires a face image and a certificate number of a user and sends the face image and the certificate number to an authentication server; the authentication server receives the face image and the certificate number, acquires the certificate image of the user from the core server according to the certificate number, and sends an authentication request to the cloud server; the cloud server receives the authentication request, acquires the face image and the certificate image from the authentication server, calculates the similarity between the face image and the certificate image, and feeds the similarity back to the authentication server; and the authentication server receives the similarity, determines an authentication result according to the similarity, and feeds the authentication result back to the client. According to the technical scheme, when the face recognition authentication is required to be carried out on the user, the certificate image of the user is directly acquired from the core server, the reference face image of the user does not need to be stored in advance at the client side, and the reliability of the face recognition authentication method and the face recognition authentication system is effectively improved.

Description

Face recognition authentication method and system
Technical Field
The present application relates to the field of biometric identification technologies, and in particular, to a face identification authentication method and system.
Background
With the continuous progress of society and the urgent requirements for quick and effective automatic identity authentication in various aspects, biometric identification technology has been rapidly developed in recent decades. The biological characteristics become the most ideal basis for automatic identity authentication, and the biological characteristics are taken as an intrinsic attribute of people and have strong self stability and individual difference. The current biometric identification technology mainly comprises: fingerprint identification, retina identification, iris identification, gait identification, vein identification, face identification and the like. Compared with other recognition methods, the face recognition method has the characteristics of directness, friendliness and convenience, so that a user has no psychological barrier and is easy to accept by the user, thereby obtaining wide research and application.
In the prior art, the flow of face recognition mainly comprises: firstly, storing facial images of one or more users inside a client; then, the acquired face image is compared with a face image of a user stored in advance, and whether the authentication is passed or not is determined according to a comparison result.
However, the existing solutions have certain limitations: on one hand, when a user does not store the facial image of the user in advance, the face recognition authentication function cannot be completed for the user; on the other hand, the face images stored in advance have no mutually consistent standard, so that the recognition efficiency is not high when the face recognition is carried out, and the reliability of the face recognition authentication is reduced.
In summary, in the prior art, a high-reliability face identification authentication method and system are lacking.
Disclosure of Invention
The embodiment of the application provides a face identification authentication method and system, and aims to solve the technical problem that a high-reliability face identification authentication method and system are lacked in the prior art.
The face recognition authentication method provided by the embodiment of the application comprises the following steps:
the method comprises the steps that a client acquires a face image and a certificate number of a user and sends the face image and the certificate number to an authentication server;
the authentication server receives the face image and the certificate number, acquires the certificate image of the user from a core server according to the certificate number, and sends an authentication request to a cloud server;
the cloud server receives the authentication request, acquires the face image and the certificate image from the authentication server, calculates the similarity between the face image and the certificate image, and feeds the similarity back to the authentication server;
and the authentication server receives the similarity, determines an authentication result according to the similarity, and feeds back the authentication result to the client.
In one embodiment, the method further comprises:
the client acquires the service type input by the user;
storing the corresponding relation of the similarity, the service type and the authentication result in the authentication server;
the authentication server determines an authentication result according to the similarity, and the authentication result comprises the following steps:
and the authentication server determines whether the similarity passes the authentication under the service type according to the corresponding relation among the similarity, the service type and the authentication result.
In one embodiment, the method further comprises:
and storing the facial image, the certificate number, the service type and the similarity in a database.
In one embodiment, the acquiring the certificate image of the user from the core server according to the certificate number includes:
if the current moment is in a first time period, acquiring a certificate image of the user from a first core server according to the certificate number;
if the current time is in a second time period, acquiring a certificate image of the user from a second core server according to the certificate number;
wherein the first time period and the second time period belong to the same natural day.
In one embodiment, the user is on a white list and a switch of the white list is in an open state; wherein the white-listed switch characterizes whether the user needs to be authenticated.
According to the embodiment of the application, a face recognition authentication system comprises:
the client is used for acquiring a face image and a certificate number of a user and sending the face image and the certificate number;
the authentication server is used for receiving the face image and the certificate number, acquiring the certificate image of the user from the core server according to the certificate number and sending an authentication request to the cloud server;
the cloud server is used for receiving the authentication request, acquiring the face image and the certificate image from the authentication server, calculating the similarity between the face image and the certificate image, and feeding the similarity back to the authentication server;
the authentication server is further used for receiving the similarity, determining an authentication result according to the similarity, and feeding the authentication result back to the client.
In one embodiment of the present invention,
the client is further configured to:
acquiring a service type input by a user;
the authentication server determines an authentication result according to the similarity, and the authentication result comprises the following steps:
and the authentication server determines whether the similarity passes the authentication under the service type according to the corresponding relation among the similarity, the service type and the authentication result.
In one embodiment, the system further comprises:
a database. The face image, the certificate number, the service type and the authentication result are stored.
In one embodiment, the authentication server is specifically configured to:
if the current moment is in a first time period, acquiring a certificate image of the user from a first core server according to the certificate number;
if the current time is in a second time period, acquiring a certificate image of the user from a second core server according to the certificate number;
wherein the first time period and the second time period belong to the same natural day.
In one embodiment, the user is on a white list and a switch of the white list is in an open state; wherein the white-listed switch characterizes whether the user needs to be authenticated.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
according to the face recognition authentication method and system provided by the embodiment of the application, when the face recognition authentication needs to be carried out on the user, the certificate image of the user is directly obtained from the core server, the face image of the user does not need to be stored in advance at the client side, and the reliability of the face recognition authentication method and system is effectively improved.
The face recognition authentication method and system provided by the embodiment of the application store the face image, the certificate number, the service type and the authentication result of the user in the database. If the facial image of the user which is just authenticated is authenticated again within the preset time interval, the authentication result corresponding to the service type can be directly obtained from the database, the time for performing authentication again is saved, and the authentication efficiency is effectively improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart of a face recognition method according to an embodiment of the present application;
FIG. 2 is a flow chart of another face recognition method in an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating a client prompting a user to move a face to a shooting area in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a face recognition system according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another face recognition system according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Example 1
Referring to fig. 1, an embodiment of the present application provides a face identification authentication method, including the following steps:
step S101, a client acquires a face image and a certificate number of a user and sends the certificate number to an authentication server;
in the embodiment of the application, the client can provide an interface for inputting the facial image for the user, and meanwhile, the client can also provide an interface for inputting the certificate number for the user, so that the client can also obtain the certificate number of the user in addition to the facial image.
Further, the client provides a device for inputting the facial image for the user, besides providing an interface for the user to input the facial image, wherein the device for inputting the facial image can be a front camera device or a rear camera device, preferably the front camera device, so that the user can complete the input of the facial image without using additional other devices; the interface provided by the client for inputting the certificate number may be an input interface, and means for inputting the certificate number may be provided at the same time as the interface for inputting the certificate number, such as pressing or touching a key, for inputting the certificate number of the user.
In the embodiment of the present application, a facial image of a user may be acquired first, and as shown in fig. 2, when performing face recognition authentication, a client first prompts the user to place his face in a camera shooting area to acquire a facial image input by the user.
After the client successfully acquires the facial image of the user, an interface and a device for inputting the certificate number are continuously provided for the user, such as a page for inputting the certificate number and a key (a push key or a touch key) for inputting the certificate number, so that the user can input the certificate number.
After acquiring the facial image and the certificate number of the user, the client sends the acquired certificate number to an authentication server connected with the client, so that the authentication server searches for the reference facial image according to the certificate number, and further the subsequent identification authentication is completed.
In this embodiment of the application, the client may be an intelligent device such as a smart phone, a tablet computer, and a notebook computer, which is not specifically limited herein.
Step S103, the authentication server receives the face image and the certificate number, acquires the certificate image of the user from a core server according to the certificate number, and sends an authentication request to a cloud server;
in the embodiment of the application, the certificate image is used as the reference facial image, and the certificate image is the facial image of the user and is not subjected to the picture modification process, so that the facial features of the user can be well shown, and the identification efficiency can be effectively improved.
In an embodiment of the application, the certificate image may be a certificate photo of a user.
In this embodiment of the present application, a corresponding relationship between a certificate number and a certificate image may be stored in a core server in advance, so that a certificate image of a user may be acquired from the core server according to the certificate number, and in a specific embodiment, the relationship between the certificate number and the certificate image stored in the core server may be as shown in table 1:
certificate number Certificate image
452036412856954210 1.jpg
352012457896541252 3.jpg
214530145327896423 5.jpg
TABLE 1
As shown in table 1, when the certificate number of the user acquired by the client is "352012457896541252", the certificate image named "2. jpg" corresponding to the certificate number is stored in the core server; when the certificate number of the user acquired by the client is '452036412856954210', the certificate image with the name of '1. jpg' corresponding to the certificate number is stored in the core server; similarly, when the certificate number of the user acquired by the client is "214530145327896423", the certificate image named "3. jpg" is stored in the core server in correspondence with the certificate number.
Note that the correspondence shown in table 1 is merely one correspondence listed for convenience of description, and is not a specific limitation on the correspondence between the certificate number and the certificate image.
In the embodiment of the application, the certificate image is obtained by acquiring the certificate image from the core server, so that the certificate image can be stored separately in the client, and therefore, when the client performs face recognition authentication, the client does not need to store the reference facial image of the person to be recognized in the client in advance, the application range of the face recognition authentication is effectively expanded, and the limitation of face recognition in the prior art is overcome.
In the embodiment of the application, the cloud server executes a computing process of face recognition authentication, and after the authentication server acquires a certificate image corresponding to a certificate number from the core server, the authentication server sends an authentication request to the cloud server to request the cloud server to execute the computing process.
Step S105, the cloud server receives the authentication request, acquires the face image and the certificate image from the authentication server, calculates the similarity between the face image and the certificate image, and feeds the similarity back to the authentication server;
in the embodiment of the application, after receiving an authentication request sent by an authentication server, a cloud server acquires a face image and a certificate image of a user from the authentication server, calculates the similarity between the face image and the certificate image, and feeds back the calculated result to the authentication server.
And S107, the authentication server determines an authentication result according to the similarity and feeds the authentication result back to the client.
The similarity between the face image and the certificate image is obtained in the steps, the similarity is fed back to the authentication server by the cloud server, and the authentication result determined by the authentication server according to the similarity can be 'authenticated' or 'non-authenticated'. And after determining the authentication result, the authentication server feeds the authentication result back to the client, and the client executes corresponding operation according to the corresponding authentication result.
Further, when the authentication result is "pass authentication", the client sends a reminder of "pass authentication", allowing the user to perform subsequent operations, and the client may provide an operation entry to perform subsequent operations by receiving the operation of the user; after the authentication is sent out, the user can directly jump to an interface for executing subsequent operations, for example, before the user completes the payment of the mobile transaction, the client calls a face recognition authentication function, after the authentication is passed, the user can be prompted to pass the authentication, and the user clicks a button such as 'confirm' or 'next step' to complete the payment of the mobile transaction; the payment of the mobile transaction can also be directly completed without sending out the reminding of passing the authentication. And when the authentication result is "failed authentication", the client may issue a reminder similar to "failed authentication", and at the same time, while issuing a reminder such as "failed authentication", the user may be reminded to re-input the face image to perform the re-recognition authentication process.
According to the face recognition authentication method provided by the embodiment of the application, the authentication server directly obtains the certificate image from the core server, the client does not need to store the reference face image for face recognition in advance, the technical problem that the face recognition cannot be finished due to the fact that the reference face image is not stored in advance is effectively solved, and the reliability of face recognition authentication is improved.
Example 2
Referring to fig. 2, an embodiment of the present application provides another face identification authentication method, including the following steps:
step S201, a client acquires a face image, a certificate number and a service type of a user, and sends the certificate number to an authentication server connected with the certificate number;
in the embodiment of the application, a white list is arranged at a client, the user is in the white list, and a switch of the white list is in an open state; wherein the white-listed switch characterizes whether the user needs to be authenticated. Specifically, when the user is in the white list and the on-off state of the white list is an on state, after the user passes the face recognition authentication, the user may be allowed to perform a related operation of the client, such as "unlock the client" or "complete payment for a transaction"; otherwise, the process of face recognition authentication of the user is not needed, because the user not in the white list can not complete the relevant operation on the client even if the user passes the face recognition authentication.
In the embodiment of the present application, the client may obtain, in addition to the facial image and the certificate number of the user, a service type input by the client, where the service type may be, but is not limited to: unlocking the mobile terminal, completing mobile payment and the like.
Further, different authentication results may be obtained according to different service types, for example, when the service type is "mobile payment is completed", the requirement on the similarity between the face image and the certificate image is high; and when the service type is 'unlocking the intelligent terminal', the requirement on the similarity between the face image and the certificate image is low. Thus, the same authentication result may result in distinct authentication results according to different service types.
Step S202, checking the certificate number, if the certificate number passes the checking, executing step S203, otherwise, reminding the user to input the certificate number again;
in the embodiment of the present application, a verification process may be provided to perform a preliminary verification on the certificate number inputted by the user, such as verifying whether the inputted certificate number is 18 digits. When the certificate number input by the user is checked to be 18 digits, executing step S203; when the certificate number input by the user is not 18 digits, a prompt message can be sent out to prompt the user to check the certificate number input by the user, and then the certificate number is input again. Through this scheme, can in time discover whether the certificate number has the mistake, thereby just learn the waste that the certificate number has the mistake and cause the time when can't follow the core server and acquire the certificate number in having avoided traditional scheme.
Step S203, the authentication server receives the face image, the certificate number and the service type, and acquires the certificate image of the user from a first core server according to the certificate number in a first time period; in a second time period, acquiring a certificate image of the user from a second core server according to the certificate number, and sending an authentication request to a cloud server; wherein the first time period and the second time period belong to a natural day.
In the embodiment of the application, the certificate images are acquired from different core servers according to different time periods. Such as: in a first time period, acquiring a certificate image from a first core server according to a certificate number, and acquiring the certificate image from a second core server when the certificate image cannot be acquired from the first core server, where the first core server and the second core server are different only in time period, and there is no essential difference therebetween, and a specific embodiment is described as follows:
the certificate image of the user stored on the basis of the bank server and the public security system server is comprehensive, and the certificate image is recorded at a speed of 08: 00-17: 00, the server of the bank is opened, if the operation of face recognition authentication is executed in the time slot, the authentication server can acquire the certificate image of the user from the bank server (the first core server), and every day except 08: 00-17: in the time period beyond 00, the authentication server can acquire the certificate image of the user from the public security system server (second core server) because the bank server is closed.
In the embodiment of the present application, the first core server and the second core server both store the correspondence between the certificate number and the certificate image, and when the authentication server acquires the certificate image from the first core server or the second core server, the authentication server acquires the certificate image corresponding to the received certificate number from the first core server or the second core server based on the correspondence between the certificate number and the certificate image.
Step S205, the cloud server receives the authentication request, acquires the face image and the certificate image from the authentication server, calculates the similarity between the face image and the certificate image, and feeds the similarity back to the authentication server;
in the embodiment of the application, after receiving an authentication request sent by an authentication server, a cloud server acquires a face image and a certificate image from the authentication service, wherein the certificate number is sent to the authentication server by a client, and the certificate image is acquired by the authentication server according to the received certificate number.
After the authentication server acquires the face image and the certificate image, the similarity of the face image and the certificate image is calculated, and then the result of the calculated similarity is fed back to the authentication server.
In the embodiment of the application, the face models in the face image and the certificate image can be respectively obtained through a preset face recognition algorithm, and then the similarity between the face model in the face image and the face model in the certificate image is calculated by adopting a face similarity calculation method. As an alternative embodiment, the cosine distance or the euclidean distance between the two may be used to represent the similarity between the two.
Step S207, the authentication server receives the similarity, determines whether the similarity passes the authentication under the service type according to the corresponding relation among the similarity, the service type and the authentication result, and feeds back the result of whether the similarity passes the authentication to the client.
In the embodiment of the present application, the authentication server stores the correspondence between the similarity, the service type, and the authentication result. After receiving the similarity between the face image and the certificate image sent by the cloud server, the authentication server searches whether the similarity passes the authentication under the service type in the corresponding relation, and feeds back the result of whether the similarity passes the authentication to the client.
In the embodiment of the present application, after receiving the authentication result, the client performs an operation corresponding to the authentication result.
In the embodiment of the application, the service type may be "unlock the intelligent terminal", or "open payment software", or the like. When the authentication result is "pass authentication", the similarity corresponding to the service type "unlock the intelligent terminal" may be slightly lower than the similarity corresponding to the service type "open payment software". The rule that the authentication results obtained from different service types are the similarity corresponding to the "passing authentication" may be determined according to the loss caused by the corresponding service type to the user.
The method of the embodiment of the application further comprises the following steps:
and step S208, the authentication server stores the facial image, the certificate number, the service type and the authentication result in a database.
In the embodiment of the application, a database module can be arranged for storing the face image, the certificate image, the service type and the authentication result.
Further, in the embodiment of the present application, after obtaining the authentication result, the authentication server stores the facial image, the certificate number, the service type, and the similarity in a database. When the face recognition authentication is performed on the same user within the preset time, the authentication server may directly use the similarity stored in the database, and determine whether the similarity passes under the condition of the new service type based on the correspondence between the service type, the similarity, and the authentication result. As follows, a specific example is illustrated:
after the client performs face recognition authentication on the user A for the first time, the authentication server stores the face image, the certificate number, the similarity and the similarity of the user A in the database. If the client needs to perform face recognition authentication on the user A for the second time within a preset time interval (such as 15 minutes), the authentication server can directly call the similarity stored in the database according to the certificate number and the face image, judge whether the authentication is passed according to the corresponding relation of the service type, the similarity and the authentication result input for the second time, and feed back the authentication result to the client. Therefore, if the time of the face recognition authentication intervals is short for many times, the authentication server determines whether the authentication is passed or not based on the similarity acquired last time, the similarity between the face image and the certificate number and the new service type, and the certificate number does not need to be called again from the core server and the calculation process of the similarity is not executed, so that the time is saved, and the efficiency of the face recognition authentication is improved.
According to the face recognition authentication method provided by the embodiment of the application, the authentication server directly obtains the certificate image from the core server, the reference face image of the face recognition is not required to be stored in advance, the technical problem that the face recognition cannot be finished due to the fact that the reference face image is not stored in advance is effectively solved, and the reliability of the face recognition authentication is improved.
In addition, the face recognition authentication method provided by the embodiment of the application comprises the step that the authentication server stores the face image, the certificate number, the certificate image and the similarity between the certificate image and the face image in the database, when the face recognition authentication needs to be performed on the user again within the preset time interval, the similarity stored in the database can be directly called, the authentication result is obtained based on the correspondence between the service type and the authentication result which are input again and the similarity, the time for acquiring the certificate image from the core server and calculating the similarity between the face image and the certificate image by the authentication server is saved, and the face recognition authentication efficiency is effectively improved.
Example 3
The foregoing embodiments are all embodiments of a face recognition authentication method, and accordingly, an embodiment of the present application provides a face recognition system, and specifically, referring to fig. 4, the face recognition authentication system includes:
a client 41, configured to acquire a facial image and a certificate number of a user, and send the facial image and the certificate number;
the authentication server 42 is configured to receive the face image and the certificate number, acquire the certificate image of the user from the core server 44 according to the certificate number, and send an authentication request to the cloud server;
the cloud server 43 is configured to receive the authentication request, acquire the face image and the certificate image from the authentication server, calculate a similarity between the face image and the certificate image, and feed the similarity back to the authentication server;
the authentication server 42 is further configured to receive the similarity, determine an authentication result according to the similarity, and feed back the authentication result to the client.
According to the face recognition authentication system provided by the embodiment of the application, after receiving a certificate number and a face image input by a user, an authentication server acquires the certificate image from a core server according to the certificate number, and then completes recognition authentication on the face image by acquiring the similarity calculated by a cloud server and the corresponding relation between the similarity and an authentication result in the authentication server. In the embodiment of the application, the reference image for identifying and authenticating the user is not required to be stored in the client side in advance, but is directly acquired from the core server, so that the technical problem that the face identification process of the user cannot be carried out due to the fact that the reference face image is not stored in the client side is effectively solved.
Example 4
An embodiment of the present application provides another face identification authentication system, as shown in fig. 5, where the face identification authentication system includes:
the client 51 is configured to obtain a facial image and a certificate number of a user, obtain a service type input by the user, and send the facial image, the certificate number, and the service type to the authentication server.
In the embodiment of the application, a checking module can be arranged in the client to carry out preliminary checking on the certificate number input by the user, check whether the input certificate number is 18 bits or not, and allow subsequent operation to be executed when the certificate number input by the user is checked to be 18 bits; when the certificate number input by the user is not 18 digits after verification, the client side does not need to send information such as the certificate number, the face image and the service type to the authentication server, but sends prompt information to prompt the user to check the certificate number input by the user.
And the authentication server 52 is configured to receive the face image, the certificate number, and the service type, acquire the certificate image of the user from the core server according to the certificate number, and send an authentication request to the cloud server.
The acquiring the certificate image of the user from the core server according to the certificate number specifically includes:
if the current moment is in a first time period, acquiring a certificate image of the user from a first core server 541 according to the certificate number; and if the current time is in a second time period, acquiring the certificate image of the user from a second core server 542 according to the certificate number, wherein the first time period and the second time period belong to the same natural day.
The cloud server 53 is configured to receive the authentication request, acquire the face image and the certificate image from the authentication server, calculate a similarity between the face image and the certificate image, and feed the similarity back to the authentication server.
And the authentication server is further used for receiving the similarity and determining whether the similarity passes the authentication under the service type according to the corresponding relation among the similarity, the service type and the authentication result.
In the embodiment of the present application, the method further includes:
a database 55. The face image, the certificate number, the service type and the authentication result are stored.
In the embodiment of the application, the user is in a white list, and a switch of the white list is in an open state; wherein the white-listed switch characterizes whether the user needs to be authenticated.
According to the face recognition authentication system provided by the embodiment of the application, the authentication server directly obtains the certificate image from the core server after receiving the certificate number and the face image input by the user, and then the face image is recognized and authenticated by calculating the similarity between the face image and the certificate image. In the embodiment of the application, the reference image for identifying and authenticating the user is not required to be stored in the client in advance, but is directly acquired from the core server, so that the technical problem that the face identification process of the user cannot be carried out because the client does not store the reference image is effectively solved.
In addition, according to the face recognition authentication system provided by the embodiment of the application, the authentication server can store the face image, the certificate number, the certificate image, the similarity between the certificate image and the face image in the database, and when the face recognition authentication is performed on the user again within the preset time interval, the similarity stored in the database can be directly called, so that the time for acquiring the certificate image from the core server and calculating the similarity between the face image and the certificate image by the authentication server is saved, and the face recognition authentication efficiency is effectively improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (4)

1. A face recognition authentication method is characterized by comprising the following steps:
the method comprises the steps that a client acquires a face image, a certificate number and a service type of a user, and sends the face image, the certificate number and the service type to an authentication server;
checking the certificate number, if the certificate number passes the checking, executing the following steps, otherwise, reminding the user to input the certificate number again; setting a checking process to preliminarily check the certificate number input by the user, checking whether the input certificate number is 18 digits, and executing the following steps when the certificate number input by the user is checked to be 18 digits; when the certificate number input by the user is not 18 digits, a prompt message is sent to prompt the user to check the certificate number input by the user, and then the certificate number is input again;
the authentication server receives the face image, the certificate number and the service type, and acquires the certificate image of the user from a first core server according to the certificate number in a first time period; in a second time period, acquiring a certificate image of the user from a second core server according to the certificate number, and sending an authentication request to a cloud server; wherein the first time period and the second time period belong to a natural day;
the cloud server receives the authentication request, acquires the face image and the certificate image from the authentication server, calculates the similarity between the face image and the certificate image, and feeds the similarity back to the authentication server;
the authentication server receives the similarity, determines whether the similarity passes the authentication under the service type according to the corresponding relation among the similarity, the service type and the authentication result, and feeds back the result of whether the similarity passes the authentication to the client; the authentication server stores the corresponding relation among the similarity, the service type and the authentication result; after receiving the similarity between the face image and the certificate image sent by the cloud server, the authentication server searches whether the similarity passes the authentication under the service type in the corresponding relation and feeds back the result of whether the similarity passes the authentication to the client;
the authentication server stores the facial image, the certificate number, the service type and the authentication result in a database; when the face recognition authentication is carried out on the same user within the preset time, the similarity stored in the database is directly used, and the authentication server judges whether the similarity passes under the condition of a new service type based on the corresponding relation among the service type, the similarity and the authentication result.
2. The method of claim 1, wherein the user is on a white list and a switch of the white list is on; wherein the white listed switches characterize whether the user needs to be authenticated.
3. A face recognition authentication system, comprising:
the system comprises a client, an authentication server and a server, wherein the client is used for acquiring a face image and a certificate number of a user, acquiring a service type input by the user and sending the face image, the certificate number and the service type to the authentication server; a checking module is arranged in the client to carry out preliminary checking on the certificate number input by the user, check whether the input certificate number is 18 digits or not, and allow the execution of subsequent operations when the checking shows that the certificate number input by the user is 18 digits; when the certificate number input by the user is not 18 digits, the client does not need to send the certificate number, the face image and the service type to the authentication server, but sends a prompt message to prompt the user to check the input certificate number;
the authentication server is used for receiving the face image, the certificate number and the service type, acquiring the certificate image of the user from a core server according to the certificate number and sending an authentication request to a cloud server; the acquiring the certificate image of the user from the core server according to the certificate number specifically includes: if the current moment is in a first time period, acquiring a certificate image of the user from a first core server according to the certificate number; if the current time is in a second time period, acquiring a certificate image of the user from a second core server according to the certificate number, wherein the first time period and the second time period belong to the same natural day;
the cloud server is used for receiving the authentication request, acquiring the face image and the certificate image from the authentication server, calculating the similarity between the face image and the certificate image, and feeding the similarity back to the authentication server; the authentication server is further used for receiving the similarity and determining whether the similarity passes the authentication under the service type according to the corresponding relation among the similarity, the service type and the authentication result;
the database is used for storing the facial image, the certificate number, the service type and the authentication result; when the face recognition authentication is carried out on the same user within the preset time, the similarity stored in the database is directly used, and the authentication server judges whether the similarity passes under the condition of a new service type on the basis of the corresponding relation among the service type, the similarity and the authentication result;
the authentication server is further used for receiving the similarity, determining whether the similarity passes the authentication under the service type according to the corresponding relation among the similarity, the service type and the authentication result, and feeding back the result of whether the similarity passes the authentication to the client; the authentication server stores the corresponding relation among the similarity, the service type and the authentication result; after receiving the similarity between the face image and the certificate image sent by the cloud server, the authentication server searches whether the similarity passes the authentication under the service type in the corresponding relation, and feeds back the result of whether the similarity passes the authentication to the client.
4. The system of claim 3, wherein the user is on a white list and a switch of the white list is on; wherein the white listed switches characterize whether the user needs to be authenticated.
CN201811012824.5A 2018-08-31 2018-08-31 Face recognition authentication method and system Active CN109067767B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811012824.5A CN109067767B (en) 2018-08-31 2018-08-31 Face recognition authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811012824.5A CN109067767B (en) 2018-08-31 2018-08-31 Face recognition authentication method and system

Publications (2)

Publication Number Publication Date
CN109067767A CN109067767A (en) 2018-12-21
CN109067767B true CN109067767B (en) 2021-02-19

Family

ID=64758208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811012824.5A Active CN109067767B (en) 2018-08-31 2018-08-31 Face recognition authentication method and system

Country Status (1)

Country Link
CN (1) CN109067767B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503033B (en) * 2019-08-21 2022-02-15 杭州宇泛智能科技有限公司 Method for reducing false recognition of multiple similar faces in face library
CN111723648B (en) * 2020-05-06 2024-04-16 国网浙江省电力有限公司衢州供电公司 Identity identification method and system for electric power operation
CN113469095B (en) * 2021-07-13 2023-05-16 浙江大华技术股份有限公司 Gait-based character secondary verification method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593598A (en) * 2013-11-25 2014-02-19 上海骏聿数码科技有限公司 User online authentication method and system based on living body detection and face recognition
CN104219050A (en) * 2014-08-08 2014-12-17 腾讯科技(深圳)有限公司 Voiceprint verification method and system, voiceprint verification server and voiceprint verification client side
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
CN105407098A (en) * 2015-11-26 2016-03-16 小米科技有限责任公司 Identity verification method and device
CN106302330A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 Auth method, device and system
CN108090406A (en) * 2016-11-23 2018-05-29 浙江宇视科技有限公司 Face identification method and system
CN108171032A (en) * 2017-12-01 2018-06-15 平安科技(深圳)有限公司 A kind of identity identifying method, electronic device and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016081249A (en) * 2014-10-15 2016-05-16 株式会社ソニー・コンピュータエンタテインメント Information processing device and information processing method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593598A (en) * 2013-11-25 2014-02-19 上海骏聿数码科技有限公司 User online authentication method and system based on living body detection and face recognition
CN105227310A (en) * 2014-06-24 2016-01-06 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
CN104219050A (en) * 2014-08-08 2014-12-17 腾讯科技(深圳)有限公司 Voiceprint verification method and system, voiceprint verification server and voiceprint verification client side
CN106302330A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 Auth method, device and system
CN105407098A (en) * 2015-11-26 2016-03-16 小米科技有限责任公司 Identity verification method and device
CN108090406A (en) * 2016-11-23 2018-05-29 浙江宇视科技有限公司 Face identification method and system
CN108171032A (en) * 2017-12-01 2018-06-15 平安科技(深圳)有限公司 A kind of identity identifying method, electronic device and computer readable storage medium

Also Published As

Publication number Publication date
CN109067767A (en) 2018-12-21

Similar Documents

Publication Publication Date Title
EP3214798B1 (en) Identity authentication method and device
AU2021201911B2 (en) Methods and devices for acquiring and recording tracking information on blockchain
TWI752418B (en) Server, client, user authentication method and system
CN110768968B (en) Authorization method, device, equipment and system based on verifiable statement
US11075942B2 (en) Identity verification and account information updating methods and apparatuses
CN109165940B (en) Anti-theft method and device and electronic equipment
US10135818B2 (en) User biological feature authentication method and system
WO2017162112A1 (en) Identity registration method and device
CN109067767B (en) Face recognition authentication method and system
CN105868970B (en) authentication method and electronic equipment
KR102306407B1 (en) User authentication method and device based on feature information
CN110765429A (en) User identity identification method, safety protection problem generation method and device
CN105205365B (en) Registration and authentication method and device for biological characteristic information
WO2022233313A1 (en) User identity information authentication method, system, apparatus and device, and storage medium
CN112036894B (en) Method and system for identity confirmation by utilizing iris characteristics and action characteristics
CN111882425B (en) Service data processing method, device and server
US10460094B2 (en) Method, apparatus, and storage medium for data processing
JP6349062B2 (en) Authentication system, client terminal, authentication server, terminal program, and server program
CN105404803B (en) Operation responding device and operation response method for terminal device
WO2022143056A1 (en) Identity card-based hardware wallet fingerprint authentication method and system, and hardware wallet
CN116128508A (en) Transaction certificate generation method and device, processor and electronic equipment
JP6349063B2 (en) Authentication system, authentication server, and server program
CN115689703A (en) Account hosting processing method and device based on block chain
CN114238905A (en) Verification processing method and device
CN116976891A (en) Financial data security management system, device and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant