CN110177042A - A kind of auth method based on social relations and device - Google Patents

A kind of auth method based on social relations and device Download PDF

Info

Publication number
CN110177042A
CN110177042A CN201910526738.4A CN201910526738A CN110177042A CN 110177042 A CN110177042 A CN 110177042A CN 201910526738 A CN201910526738 A CN 201910526738A CN 110177042 A CN110177042 A CN 110177042A
Authority
CN
China
Prior art keywords
good friend
user
several
scene
video recording
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910526738.4A
Other languages
Chinese (zh)
Inventor
于洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Reliability Network Technology Co Ltd
Original Assignee
Shenzhen Reliability Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Reliability Network Technology Co Ltd filed Critical Shenzhen Reliability Network Technology Co Ltd
Priority to CN201910526738.4A priority Critical patent/CN110177042A/en
Publication of CN110177042A publication Critical patent/CN110177042A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of auth method based on social relations and devices, method includes: to obtain comprising at least several width character images of width good friend's image when detecting that user needs to carry out authentication or several personages of at least one section good friend's video recording record a video;The verifying requirement for obtaining verifying scene requires to execute and identifies that the identification of good friend is operated from several width character images or several personages video recording at least once according to verifying;When detecting that user identifies all good friends from several width character images or several personages video recording every time, then determine that subscriber authentication passes through.The embodiment of the present invention confirms the identity of active user by verifying the social networks of user account, it does not need user and reserves the privacy information of oneself to verify identity, identity is verified by social networks, excludes the problem of identity is falsely used, it is further provided the safety of authentication.

Description

A kind of auth method based on social relations and device
Technical field
The present invention relates to identity validation technology field more particularly to a kind of auth methods based on social relations and dress It sets.
Background technique
With the development of network technology and universal, network social intercourse is increasingly becoming a part indispensable in people's life. The user account of one social software is often connected to most social networks of the user, and user account is not merely one The logging on authentication of a social software, even more the human connection resource and wealth of the user.Therefore, the safety of user account increasingly by To attention.
Current authentication mode, such as password, recognition of face, fingerprint recognition require people and reserve these information Whether (typing) gets off, check in carrying out verification process consistent with reserved information, completes authentication with this, it was demonstrated that when Before the people that is verified and reserve these passwords, face, fingerprint people be the same person, still, by reserved password, face, Fingerprint verifies identity, after these unavoidable leakage of information, is brought and verifies by other people, it will identity is caused to be falsely used The problem of.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of authentications based on social relations Method and device, it is intended to solve to verify identity by reserved password, face, fingerprint in the prior art, it is unavoidable these It after leakage of information, is brought and verifies by other people, it will the problem of causing identity to be falsely used.
Technical scheme is as follows:
A kind of auth method based on social relations, which comprises
When detecting that user needs to carry out authentication, several width figure maps comprising at least width good friend's image are obtained Several personages video recording of picture or at least one section good friend's video recording;
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several according to verifying A personage's video recording identifies the identification operation of good friend;
When detecting that user identifies all good friends from several width character images or several personages video recording every time, Then determine that subscriber authentication passes through.
Optionally, described when detecting that user needs to carry out authentication, it obtains comprising at least width good friend's image Before several width character images or several personages video recording of at least one section good friend's video recording, comprising:
Several good friends that user binds in advance are obtained, and obtain user in advance to the label of several good friends setting.
Optionally, the verifying scene includes general scene and stringent scene, when the verifying scene is general scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or Several personages video recording identifies the identification operation of good friend, comprising:
Obtaining verifying scene is general scene, then executes and once know from several width character images or several everybody object video recordings Not Chu good friend identification operation;
And the scene of good friend, which is recorded a video, to be identified to user.
Optionally, described to detect that user identifies from several width character images or several personages video recording every time When all good friends, then after determining that subscriber authentication passes through, comprising:
When detecting that user does not identify good friend from several width character images or several personages video recording, decision verification Do not pass through;
And user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to user good friend, obtain user The recognition result of good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
Optionally, the verifying scene includes general scene and stringent scene, when the verifying scene is stringent scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or Several personages video recording identifies the identification operation of good friend, comprising:
When to obtain verifying scene be stringent scene, if according to verifying require to execute at least twice from several width character images or Dry personage's video recording identifies the identification operation of good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
Optionally, described to detect that user identifies from several width character images or several personages video recording every time When all good friends, then determine that subscriber authentication passes through, comprising:
When detect user every time from several width character images or several personages video recording in identify all good friends, then Determine to be verified for the first time;
Detect that the corresponding video recording of scene and several strange video recordings by user identification good friend are sent out when being verified for the first time User good friend is given, the recognition result of user good friend is obtained, and is recorded a video to the identification process of user good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
Optionally, the recognition result for obtaining user good friend, and after recording a video to the identification process of user good friend, also Include:
The video recording for obtaining the identification process of user good friend, by the video recording of the identification process of user good friend and several strange records Good friend as being sent to user good friend;
The recognition result of the good friend of user good friend is obtained, if the good friend's of user good friend correctly identifies user good friend place Video recording, then determine that the authentication of user good friend passes through.
Further embodiment of this invention additionally provides a kind of authentication means based on social relations, and described device includes extremely A few processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one A processor executes, so that at least one described processor is able to carry out above-mentioned auth method based on social relations.
Another embodiment of the present invention additionally provides a kind of non-volatile computer readable storage medium storing program for executing, described non-volatile Computer-readable recording medium storage has computer executable instructions, and the computer executable instructions are by one or more processors When execution, one or more of processors may make to execute above-mentioned auth method based on social relations.
Another embodiment of the invention provides a kind of computer program product, and the computer program product includes depositing The computer program on non-volatile computer readable storage medium storing program for executing is stored up, the computer program includes program instruction, works as institute When stating program instruction and being executed by processor, the processor is made to execute above-mentioned auth method based on social relations.
The utility model has the advantages that the invention discloses a kind of auth method based on social relations and devices, compared to existing Technology, the embodiment of the present invention confirm the identity of active user by verifying the social networks of user account, it is pre- not to need user It stays the privacy information of oneself to verify identity, verifies identity by social networks, exclude the problem of identity is falsely used, further mention For the safety of authentication.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of flow chart of auth method preferred embodiment based on social relations of the present invention;
Fig. 2 is a kind of hardware structural diagram of authentication means preferred embodiment based on social relations of the present invention.
Specific embodiment
To make the purpose of the present invention, technical solution and effect clearer, clear and definite, below to the present invention further specifically It is bright.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.Below The embodiment of the present invention is introduced in conjunction with attached drawing.
Referring to Fig. 1, Fig. 1 is a kind of process of auth method preferred embodiment based on social relations of the present invention Figure.As shown in Figure 1, itself comprising steps of
Step S100, when detecting that user needs to carry out authentication, if obtaining comprising at least width good friend's image Several personages video recording of dry width character image or at least one section good friend's video recording;
Step S200, the verifying requirement for obtaining verifying scene, requires to execute at least once from several width personages according to verifying Image or several personages video recording identify the identification operation of good friend;
Step S300, when detect user every time from several width character images or several personages video recording in identify institute When having good friend, then determine that subscriber authentication passes through.
When it is implemented, user passes through application software by mobile client, it usually needs carry out authentication.But it is existing Authentication need reserved privacy information to be easy to appear identity when reserved privacy information is leaked and falsely use.
When user needs to carry out authentication in the embodiment of the present invention, need to recognize acquaintance, wherein acquaintance refers to user Good friend in application software, good friend include but is not limited to the social relationships such as household, colleague, classmate.If user provides from system Several width images or several video recordings in, identify good friend, then it is assumed that the current people for carrying out authentication is me, determines to use Family identity passes through.
Under some stringent scenes, it can also identify that the process of good friend is recorded a video to user, user is identified to the record of good friend As mixing other several online strange video recordings, user good friend is issued together, if user good friend recognizes the current identity that carries out and tests The people of card is me, then is verified, further increases security verified.
For example, recognizing good friend from 4 cardons, and can be videoed during recognizing people;Need to recognize numerical digit difference pass The good friend (such as household, classmate, colleague) of system, the numerical digit good friend intimate with verifying customer relationship is initiated will receive verifying, together Sample recognizes the good friend for initiating verifying under the premise of videoeding from 4 cardons.
When user initiates authentication, need there are multiple personages from several width character images or personage's video recording Video recording recognizes oneself one or the numerical digit good friend that has relationship different as choosing figure, according to the verifying requirement under different scenes, uses Family will do it one to the operation for recognizing good friend for several times, selects from multiple recognize a good friend in figure every time, such as in new equipment Upper logon account needs user to recognize multidigit good friend, and only needed on the original equipment being commonly used recently user recognize 1 it is good Friend, and can be videoed in verification process;After user is just confirming one or numerical digit good friend, verifying will be passed through.
In further carrying out example, when detecting that user needs to carry out authentication, it is good comprising an at least width to obtain Before several width character images of friendly image or several personages video recording of at least one section good friend's video recording, comprising:
Several good friends that user binds in advance are obtained, and obtain user in advance to the label of several good friends setting.
When it is implemented, user needs the good friend that quantity is no less than 1 in mobile client, user and good friends can To be confirmed each other social relationships, social relationships can be confirmed by way of labelling, wherein label include household, it is same Thing, classmate etc., part relations can be analyzed to obtain by data, be such as with the company of some contact person it is same, school is same One etc..
User can determine cohesion by label, when carrying out authentication, when being sent to good friend and identifying, may be selected The high good friend of cohesion sends image or video recording to be identified.Wherein judge that the intimate degree of user is high, there is other set algorithm, such as According to the relational tags that the two users paste to other side, the frequency of both sides' connection, if mobile phone contact, if updated to other side A series of Social behaviors of crossing data etc.. obtain intimate degree.Remarks: the mobile client product itself has certain society Hand over function: such as, user can send messaging chat between good friend as wechat;Can also as using cell phone address book, Check and improve the contact data of good friend, the information such as name, phone, work, address.
Further, verifying scene includes general scene and stringent scene, when the verifying scene is general scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or Several personages video recording identifies the identification operation of good friend, comprising:
Obtaining verifying scene is general scene, then executes and once know from several width character images or several everybody object video recordings Not Chu good friend identification operation;
And the scene of good friend, which is recorded a video, to be identified to user.
When it is implemented, verifying scene includes general scene and stringent scene, general scene, which refers to, does not have that security requirement High scene, the application scenarios not comprising privacy of user, stringent scene refer to the application of the privacy of user such as bank account Scene.
Under general scene, such as authentication is carried out on commonly used equipment, at this time Exactly-once from several width (preferably 4 width or 9 width) identification operation that a good friend is found out in image or several (preferably 4 or 9) personages video recording, and to user The scene of identification good friend is recorded a video.
Further, when detect user every time from several width character images or several personages video recording in identify institute When having good friend, then after determining that subscriber authentication passes through, comprising:
When detecting that user does not identify good friend from several width character images or several personages video recording, decision verification Do not pass through;
And user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to user good friend, obtain user The recognition result of good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
When it is implemented, then needing to verify again when user's checking fails, user is identified that the scene of good friend is corresponding at this time Several strange video recordings of video recording mixing are sent to user good friend, the recognition result of user good friend are obtained, if user good friend correctly knows Not Chu video recording where user, then determine that subscriber authentication passes through, if where user good friend cannot correctly identify user Video recording, then determine subscriber authentication fail.
Further, verifying scene includes general scene and stringent scene, when the verifying scene is stringent scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or Several personages video recording identifies the identification operation of good friend, comprising:
When to obtain verifying scene be stringent scene, if according to verifying require to execute at least twice from several width character images or Dry personage's video recording identifies the identification operation of good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
When it is implemented, under stringent scene, video recording of the user when recognizing good friend, i.e., above user in verification process It can videoed, the good friends of the user can be sent to, in different society relationship, will receive record in the high good friend of intimate degree Picture.
Under stringent scene, it is also necessary to which good friends verify user video recording, if good friends, which confirm just to calculate, passes through verifying.Stringent field Scape is for example in new equipment logon account, if good friend's negligible amounts of user, such as only one or two, user recognizes at this time After intact friend, need to wait the verifying of good friend, and if user has multidigit good friend, for example have more than 10, then may user only It need to just confirm 5 good friends, so that it may by verifying, without waiting for good friend's verifying;For another example, as long as on common original equipment Recognizing 1 good friend can complete to verify, if user admits one's mistake, recognize 1 or 2 good friends again it would be possible that may require that more, If less more good friends, it is necessary to good friend be waited to verify.Similarly, when verifying does not pass through (just not confirming good friend), such as Good friend's verifying twice has been initiated all not over third time also may require that user waits good friend to verify.
It needs that good friend is waited to verify video recording described in i.e. stringent scene, can be used as a kind of when user's social relationships not that A kind of means of supplementing out economy in the case where abundant (i.e. good friend's quantity is few).Certainly, some to need the authentications industry such as real name verification In scene of being engaged in, for example bank remotely opens an account, then can force to need to have to pass through the video recording that good friend verifies the user;It is letter above Single citing, because the adaptable scene of authentication is many, different business activity may be to the good friend's quantity recognized, and is The no verifying for having to pass through good friend, may all have any different.
Further, when detect user every time from several width character images or several personages video recording in identify institute When having good friend, then determine that subscriber authentication passes through, comprising:
When detect user every time from several width character images or several personages video recording in identify all good friends, then Determine to be verified for the first time;
Detect that the corresponding video recording of scene and several strange video recordings by user identification good friend are sent out when being verified for the first time User good friend is given, the recognition result of user good friend is obtained, and is recorded a video to the identification process of user good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
Detect that user identifies from several width character images or several personages video recording every time when it is implemented, working as All good friends then determine to be verified for the first time, and when detecting that first time is verified, user is identified that the scene of good friend is corresponding Video recording and several strange video recordings are sent to user good friend.
If good friend's quantity is more than 20, cohesion therein higher 20 are chosen, in every kind of relationship as far as possible at least Contain a higher good friend of cohesion;
If being less than 20, all good friends receive video recording, and good friends need from several width personages video recording, wherein more Kind, which is selected, only has the video recording figure for being the user in figure, the user is recognized, if identification process is to have numerical digit good friend just to confirm The video recording of the user, then subscriber authentication passes through.
Further, the recognition result of user good friend is obtained, and after recording a video to the identification process of user good friend, is also wrapped It includes:
The video recording for obtaining the identification process of user good friend, by the video recording of the identification process of user good friend and several strange records Good friend as being sent to user good friend;
The recognition result of the good friend of user good friend is obtained, if the good friend's of user good friend correctly identifies user good friend place Video recording, then determine that the authentication of user good friend passes through.
When it is implemented, user good friend can videoed during recognizing people under stringent scene, wherein this records a video, i.e. good friend It recognizes the picture of the user Shi Beilu, its good friend can be issued, is i.e. the good friends of user good friend will receive video recording, and with same side Formula also demonstrates the identity reality for participating in the good friend of verifying with this from the video recording for selecting good friend in figure is selected;
This should be the transmittance process of an authentication, and first user actively initiates verifying, and good friend receives video recording rear side The user is helped to complete verifying, this is the authentication for initiating active the user of verifying;And help initiates user and completes verifying Good friend be equivalent to and passively initiated verifying because by picture has been recorded, " good friend of good friend " verifies " good friend ", this It is the authentication to " good friend ", and so on, " good friend of good friend " also can be by carry out authentication;
So being more like a process for transmitting, in addition to that user that verifying is initiated in active is tested because business needs Card, other participate in the good friend of verifying, are all verified " unconsciously ", the transmitting of this authentication, it will a circle one Circle is spread out, so that entire circle of friends and friends of friends' ring border all keep authenticity.
It is obstructed out-of-date to verify, i.e., when not recognized by good friend, the user for initiating verifying need to carry out stringenter verifying, if you need to It recognizes that the number of good friend's video recording increases (video recording for needing to recognize more good friends), needs to be recognized by greater number of good friend with this After the video recording of oneself, verifying could be passed through.
In some other embodiments, if if there is digital subscriber good friend does not recognize user, the identity of the user Verifying does not pass through, and can videoed during recognizing people, and wherein this records a video, i.e. good friend's picture for recognizing the user Shi Beilu, can send out Its good friend is given, i.e. the good friends of user good friend will receive video recording, and in the same way, from selecting the record for selecting good friend in figure Picture also demonstrates the identity reality for participating in the good friend of verifying with this.User under the process such as above-mentioned stringent scene that execute later The authentication process itself of good friend is identical, and details are not described herein again.
By above method implementation it is found that the embodiment of the invention provides a kind of auth method based on social relations, User is recognized by allowing good friend, and whether my this mode is as authentication;By selecting in figure from multiple, good friend is recognized The mode of video recording figure verified;It records a video in verification process to user, and its last video recording figure is made One of choosing figure when verifying is initiated for its good friend;By allow user recognize numerical digit different society relationship good friend video recording, as Verify one of Rule of judgment;It records a video in authentication procedures, by its numerical digit, intimate good friend is recognized;Good friend is recognizing When the video recording of user, process can be videoed, and the good friends which can also issue good friend recognize, recognize the body of its good friend Part authenticity, prevents identity from being falsely used, improves the safety of authentication.
Another embodiment of the present invention provides a kind of authentication means based on social relations, as shown in Fig. 2, device 10 wraps It includes:
One or more processors 110 and memory 120 are introduced in Fig. 2 by taking a processor 110 as an example, are located Reason device 110 can be connected with memory 120 by bus or other modes, in Fig. 2 for being connected by bus.
Processor 110 is used for the various control logics of finishing device 10, can be general processor, Digital Signal Processing Device (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA), single-chip microcontroller, ARM (Acorn RISC ) or other programmable logic device, discrete gate or transistor logic, discrete hardware component or these components Machine Any combination.In addition, processor 110 can also be any conventional processors, microprocessor or state machine.Processor 110 can also To be implemented as calculating the combination of equipment, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more micro- places Manage device combination DSP core or any other this configuration.
Memory 120 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey Sequence, non-volatile computer executable program and module, such as the authentication based on social relations in the embodiment of the present invention The corresponding program instruction of method.Processor 110 is by running the non-volatile software program being stored in memory 120, instruction And unit, thereby executing the various function application and data processing of device 10, i.e. base in realization above method embodiment In the auth method of social networks.
Memory 120 may include storing program area and storage data area, wherein storing program area can store operation dress It sets, application program required at least one function;Storage data area, which can be stored, uses created data etc. according to device 10. It can also include nonvolatile memory in addition, memory 120 may include high-speed random access memory, for example, at least one A disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 120 can Choosing includes the memory remotely located relative to processor 110, these remote memories can pass through network connection to device 10. The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
One or more unit is stored in memory 120, when being executed by one or more processor 110, is held Auth method based on social relations in the above-mentioned any means embodiment of row, for example, executing in Fig. 1 described above Method and step S100 to step S300.
The embodiment of the invention provides a kind of non-volatile computer readable storage medium storing program for executing, computer readable storage medium is deposited Computer executable instructions are contained, which is executed by one or more processors, for example, executing above retouch Method and step S100 to step S300 in the Fig. 1 stated.
As an example, non-volatile memory medium can include that read-only memory (ROM), programming ROM (PROM), electricity can Programming ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory can include as external high speed The random access memory (RAM) of buffer memory.By illustrate it is beautiful unrestricted, RAM can with such as synchronous random access memory (SRAM), Dynamic ram, (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), many forms of Synchlink DRAM (SLDRAM) and directly Rambus (Lan Basi) RAM (DRRAM) etc It obtains.The disclosed memory assembly or memory of operating environment described herein be intended to include these and/or it is any Other are suitble to one or more of the memory of type.
Another embodiment of the invention provides a kind of computer program product, and computer program product includes being stored in Computer program on non-volatile computer readable storage medium storing program for executing, computer program include program instruction, when program instruction quilt When processor executes, the processor is made to execute the auth method based on social relations of above method embodiment.For example, Execute the method and step S100 to step S300 in Fig. 1 described above.
Embodiments described above is only schematical, wherein as illustrated by the separation member unit can be or It may not be and be physically separated, component shown as a unit may or may not be physical unit, it can It is in one place, or may be distributed over multiple network units.Can select according to actual needs part therein or Person's whole module achieves the purpose of the solution of this embodiment.
By the description of above embodiment, those skilled in the art can be understood that each embodiment can be by Software adds the mode of general hardware platform to realize, naturally it is also possible to pass through hardware realization.Based on this understanding, above-mentioned technology Scheme substantially in other words can be embodied in the form of software products the part that the relevant technologies contribute, the computer Software product can reside in computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions to So that a computer electronic equipment (can be personal computer, server or network electronic devices etc.) executes each reality The method for applying certain parts of example or embodiment.
Among other things, such as " can ', " energy ", " possibility " or " can be with " etc conditional statement unless in addition specific Ground is stated or is otherwise understood in context as used, is otherwise generally intended to convey particular implementation energy Including (however other embodiments do not include) special characteristic, element and/or operation.Therefore, such conditional statement is generally It is not intended to imply that feature, element and/or operation are all needed one or more embodiments or one anyway Or multiple embodiments must include for determining these features, element in the case where being with or without student's input or prompt And/or the logic whether operation is included or will be performed in any particular implementation.
The content described in the present description and drawings herein includes being capable of providing body based on social relations The example of part verification method and device.Certainly, can not for description the disclosure various features purpose come describe element and/ Or the combination that each of method is envisioned that, it can be appreciated that, many other combinations and displacement of disclosed feature It is possible., it will thus be apparent that can be made without departing from the scope or spirit of the present disclosure to the disclosure Various modifications.In addition, or in alternative solution, the considerations of other embodiments of the disclosure are to the specification and drawings and such as It may be obvious in the practice of the disclosure presented herein.It is intended that proposed in the specification and drawings Example is considered illustrative and not restrictive in all respects.Although using specific term herein, it Used and be not used in the purpose of limitation in general and descriptive sense.

Claims (10)

1. a kind of auth method based on social relations, it is characterised in that, the described method includes:
When detecting that user needs to carry out authentication, obtain comprising at least several width character images of width good friend's image or Several personages video recording of at least one section good friend's video recording;
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several individuals according to verifying Object video recording identifies the identification operation of good friend;
When detecting that user identifies all good friends from several width character images or several personages video recording every time, then sentence Determine subscriber authentication to pass through.
2. auth method based on social relations according to claim 1, which is characterized in that described to detect use When family needs to carry out authentication, obtaining includes at least several width character images of width good friend's image or at least one section of good friend's record Before several personages video recording of picture, comprising:
Several good friends that user binds in advance are obtained, and obtain user in advance to the label of several good friends setting.
3. auth method based on social relations according to claim 1, which is characterized in that the verifying scene includes General scene and stringent scene, when the verifying scene is general scene,
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several according to verifying A personage's video recording identifies the identification operation of good friend, comprising:
Obtaining verifying scene is general scene, then executes and once identify from several width character images or several everybody object video recordings The identification operation of one good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
4. auth method based on social relations according to claim 3, which is characterized in that described to detect user When identifying all good friends from several width character images or several personages video recording every time, then determine that subscriber authentication is logical Later, comprising:
When detecting that user does not identify good friend from several width character images or several personages video recording, decision verification is obstructed It crosses;
And user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to user good friend, obtain user good friend Recognition result;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
5. auth method based on social relations according to claim 1, which is characterized in that the verifying scene packet General scene and stringent scene are included, when the verifying scene is stringent scene,
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several according to verifying A personage's video recording identifies the identification operation of good friend, comprising:
Obtain verifying scene be stringent scene when, according to verifying require execute at least twice from several width character images or several Personage's video recording identifies the identification operation of good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
6. auth method based on social relations according to claim 5, which is characterized in that described to detect use When all good friends are identified from several width character images or several personages video recording every time in family, then subscriber authentication is determined Pass through, comprising:
When detect user every time from several width character images or several personages video recording in identify all good friends, then determine It is verified for the first time;
When detecting that first time is verified, user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to User good friend, obtains the recognition result of user good friend, and records a video to the identification process of user good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
7. auth method based on social relations according to claim 6, which is characterized in that the acquisition user is good The recognition result of friend, and after recording a video to the identification process of user good friend, further includes:
The video recording of the identification process of user good friend and several strange video recordings are sent out in the video recording for obtaining the identification process of user good friend Give the good friend of user good friend;
The recognition result of the good friend of user good friend is obtained, if the record of the good friend of user good friend correctly identified where user good friend Picture then determines that the authentication of user good friend passes through.
8. a kind of authentication means based on social relations, which is characterized in that described device includes at least one processor;With And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one It manages device to execute, so as to be able to carry out claim 1-7 described in any item based on social relations at least one described processor Auth method.
9. a kind of non-volatile computer readable storage medium storing program for executing, which is characterized in that the non-volatile computer readable storage medium Matter is stored with computer executable instructions, when which is executed by one or more processors, may make institute It states one or more processors perform claim and requires the described in any item auth methods based on social relations of 1-7.
10. a kind of computer program product, which is characterized in that the computer program product includes being stored in non-volatile calculating Computer program on machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is processed When device executes, the processor perform claim is made to require the described in any item auth methods based on social relations of 1-7.
CN201910526738.4A 2019-06-18 2019-06-18 A kind of auth method based on social relations and device Pending CN110177042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910526738.4A CN110177042A (en) 2019-06-18 2019-06-18 A kind of auth method based on social relations and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910526738.4A CN110177042A (en) 2019-06-18 2019-06-18 A kind of auth method based on social relations and device

Publications (1)

Publication Number Publication Date
CN110177042A true CN110177042A (en) 2019-08-27

Family

ID=67698458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910526738.4A Pending CN110177042A (en) 2019-06-18 2019-06-18 A kind of auth method based on social relations and device

Country Status (1)

Country Link
CN (1) CN110177042A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120291107A1 (en) * 2007-06-01 2012-11-15 Piliouras Teresa C Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation
CN104883367A (en) * 2015-05-20 2015-09-02 吴振祎 Method for auxiliary verification login, system, and application client
CN105468948A (en) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 Method for identifying identity through social relation
CN105930765A (en) * 2016-02-29 2016-09-07 中国银联股份有限公司 Payment method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120291107A1 (en) * 2007-06-01 2012-11-15 Piliouras Teresa C Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation
CN104883367A (en) * 2015-05-20 2015-09-02 吴振祎 Method for auxiliary verification login, system, and application client
CN105468948A (en) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 Method for identifying identity through social relation
CN105930765A (en) * 2016-02-29 2016-09-07 中国银联股份有限公司 Payment method and device

Similar Documents

Publication Publication Date Title
US11301555B2 (en) Authentication system
US10812485B1 (en) Wearable device-based user authentication
CN205015915U (en) Management system by oneself stays
US8490157B2 (en) Authentication—circles of trust
CN106325562B (en) Devices, systems, and methods for registering and verifying handwritten signature and achieved to hand-written information
CN103118031B (en) Log in method and the electronic equipment of application account
CN108038687B (en) Transaction method based on voice recognition, server and computer-readable storage medium
CN106331178B (en) A kind of information sharing method and mobile terminal
CN105468948A (en) Method for identifying identity through social relation
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN104092653B (en) Data processing method and system
CN107870997A (en) Management method, device, display device and the storage medium of conference board written matter
CN108429745A (en) The authentication method and Verification System of login, webpage login method and system
CN107612880A (en) One kind applies access method and device
CN107038509A (en) Self-service registration-management system
CN110266738A (en) Identification authentication method and device based on multi-biological characteristic
CN108241999A (en) A kind of generation method of invoice information, apparatus and system
CN109005104A (en) A kind of instant communicating method, device, server and storage medium
CN109697779A (en) A kind of access control method and relevant apparatus
CN107358120A (en) Document edit method and device, terminal device and computer-readable recording medium
CN110166634A (en) User identity assists in identifying method, apparatus, equipment and readable storage medium storing program for executing
CN109714708A (en) APP punch card method, device, equipment and storage medium based on location information
CN105871900A (en) Identity authentication method and system
CN106295423A (en) A kind of method for exhibiting data and client
CN106489155A (en) Double factor authentication method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190827