CN110177042A - A kind of auth method based on social relations and device - Google Patents
A kind of auth method based on social relations and device Download PDFInfo
- Publication number
- CN110177042A CN110177042A CN201910526738.4A CN201910526738A CN110177042A CN 110177042 A CN110177042 A CN 110177042A CN 201910526738 A CN201910526738 A CN 201910526738A CN 110177042 A CN110177042 A CN 110177042A
- Authority
- CN
- China
- Prior art keywords
- good friend
- user
- several
- scene
- video recording
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 230000015654 memory Effects 0.000 claims description 25
- 238000004590 computer program Methods 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 9
- 238000004891 communication Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 235000011464 Pachycereus pringlei Nutrition 0.000 description 2
- 240000006939 Pachycereus weberi Species 0.000 description 2
- 235000011466 Pachycereus weberi Nutrition 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000011273 social behavior Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001502 supplementing effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000002834 transmittance Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Primary Health Care (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of auth method based on social relations and devices, method includes: to obtain comprising at least several width character images of width good friend's image when detecting that user needs to carry out authentication or several personages of at least one section good friend's video recording record a video;The verifying requirement for obtaining verifying scene requires to execute and identifies that the identification of good friend is operated from several width character images or several personages video recording at least once according to verifying;When detecting that user identifies all good friends from several width character images or several personages video recording every time, then determine that subscriber authentication passes through.The embodiment of the present invention confirms the identity of active user by verifying the social networks of user account, it does not need user and reserves the privacy information of oneself to verify identity, identity is verified by social networks, excludes the problem of identity is falsely used, it is further provided the safety of authentication.
Description
Technical field
The present invention relates to identity validation technology field more particularly to a kind of auth methods based on social relations and dress
It sets.
Background technique
With the development of network technology and universal, network social intercourse is increasingly becoming a part indispensable in people's life.
The user account of one social software is often connected to most social networks of the user, and user account is not merely one
The logging on authentication of a social software, even more the human connection resource and wealth of the user.Therefore, the safety of user account increasingly by
To attention.
Current authentication mode, such as password, recognition of face, fingerprint recognition require people and reserve these information
Whether (typing) gets off, check in carrying out verification process consistent with reserved information, completes authentication with this, it was demonstrated that when
Before the people that is verified and reserve these passwords, face, fingerprint people be the same person, still, by reserved password, face,
Fingerprint verifies identity, after these unavoidable leakage of information, is brought and verifies by other people, it will identity is caused to be falsely used
The problem of.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of authentications based on social relations
Method and device, it is intended to solve to verify identity by reserved password, face, fingerprint in the prior art, it is unavoidable these
It after leakage of information, is brought and verifies by other people, it will the problem of causing identity to be falsely used.
Technical scheme is as follows:
A kind of auth method based on social relations, which comprises
When detecting that user needs to carry out authentication, several width figure maps comprising at least width good friend's image are obtained
Several personages video recording of picture or at least one section good friend's video recording;
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several according to verifying
A personage's video recording identifies the identification operation of good friend;
When detecting that user identifies all good friends from several width character images or several personages video recording every time,
Then determine that subscriber authentication passes through.
Optionally, described when detecting that user needs to carry out authentication, it obtains comprising at least width good friend's image
Before several width character images or several personages video recording of at least one section good friend's video recording, comprising:
Several good friends that user binds in advance are obtained, and obtain user in advance to the label of several good friends setting.
Optionally, the verifying scene includes general scene and stringent scene, when the verifying scene is general scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or
Several personages video recording identifies the identification operation of good friend, comprising:
Obtaining verifying scene is general scene, then executes and once know from several width character images or several everybody object video recordings
Not Chu good friend identification operation;
And the scene of good friend, which is recorded a video, to be identified to user.
Optionally, described to detect that user identifies from several width character images or several personages video recording every time
When all good friends, then after determining that subscriber authentication passes through, comprising:
When detecting that user does not identify good friend from several width character images or several personages video recording, decision verification
Do not pass through;
And user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to user good friend, obtain user
The recognition result of good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
Optionally, the verifying scene includes general scene and stringent scene, when the verifying scene is stringent scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or
Several personages video recording identifies the identification operation of good friend, comprising:
When to obtain verifying scene be stringent scene, if according to verifying require to execute at least twice from several width character images or
Dry personage's video recording identifies the identification operation of good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
Optionally, described to detect that user identifies from several width character images or several personages video recording every time
When all good friends, then determine that subscriber authentication passes through, comprising:
When detect user every time from several width character images or several personages video recording in identify all good friends, then
Determine to be verified for the first time;
Detect that the corresponding video recording of scene and several strange video recordings by user identification good friend are sent out when being verified for the first time
User good friend is given, the recognition result of user good friend is obtained, and is recorded a video to the identification process of user good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
Optionally, the recognition result for obtaining user good friend, and after recording a video to the identification process of user good friend, also
Include:
The video recording for obtaining the identification process of user good friend, by the video recording of the identification process of user good friend and several strange records
Good friend as being sent to user good friend;
The recognition result of the good friend of user good friend is obtained, if the good friend's of user good friend correctly identifies user good friend place
Video recording, then determine that the authentication of user good friend passes through.
Further embodiment of this invention additionally provides a kind of authentication means based on social relations, and described device includes extremely
A few processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
A processor executes, so that at least one described processor is able to carry out above-mentioned auth method based on social relations.
Another embodiment of the present invention additionally provides a kind of non-volatile computer readable storage medium storing program for executing, described non-volatile
Computer-readable recording medium storage has computer executable instructions, and the computer executable instructions are by one or more processors
When execution, one or more of processors may make to execute above-mentioned auth method based on social relations.
Another embodiment of the invention provides a kind of computer program product, and the computer program product includes depositing
The computer program on non-volatile computer readable storage medium storing program for executing is stored up, the computer program includes program instruction, works as institute
When stating program instruction and being executed by processor, the processor is made to execute above-mentioned auth method based on social relations.
The utility model has the advantages that the invention discloses a kind of auth method based on social relations and devices, compared to existing
Technology, the embodiment of the present invention confirm the identity of active user by verifying the social networks of user account, it is pre- not to need user
It stays the privacy information of oneself to verify identity, verifies identity by social networks, exclude the problem of identity is falsely used, further mention
For the safety of authentication.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of flow chart of auth method preferred embodiment based on social relations of the present invention;
Fig. 2 is a kind of hardware structural diagram of authentication means preferred embodiment based on social relations of the present invention.
Specific embodiment
To make the purpose of the present invention, technical solution and effect clearer, clear and definite, below to the present invention further specifically
It is bright.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.Below
The embodiment of the present invention is introduced in conjunction with attached drawing.
Referring to Fig. 1, Fig. 1 is a kind of process of auth method preferred embodiment based on social relations of the present invention
Figure.As shown in Figure 1, itself comprising steps of
Step S100, when detecting that user needs to carry out authentication, if obtaining comprising at least width good friend's image
Several personages video recording of dry width character image or at least one section good friend's video recording;
Step S200, the verifying requirement for obtaining verifying scene, requires to execute at least once from several width personages according to verifying
Image or several personages video recording identify the identification operation of good friend;
Step S300, when detect user every time from several width character images or several personages video recording in identify institute
When having good friend, then determine that subscriber authentication passes through.
When it is implemented, user passes through application software by mobile client, it usually needs carry out authentication.But it is existing
Authentication need reserved privacy information to be easy to appear identity when reserved privacy information is leaked and falsely use.
When user needs to carry out authentication in the embodiment of the present invention, need to recognize acquaintance, wherein acquaintance refers to user
Good friend in application software, good friend include but is not limited to the social relationships such as household, colleague, classmate.If user provides from system
Several width images or several video recordings in, identify good friend, then it is assumed that the current people for carrying out authentication is me, determines to use
Family identity passes through.
Under some stringent scenes, it can also identify that the process of good friend is recorded a video to user, user is identified to the record of good friend
As mixing other several online strange video recordings, user good friend is issued together, if user good friend recognizes the current identity that carries out and tests
The people of card is me, then is verified, further increases security verified.
For example, recognizing good friend from 4 cardons, and can be videoed during recognizing people;Need to recognize numerical digit difference pass
The good friend (such as household, classmate, colleague) of system, the numerical digit good friend intimate with verifying customer relationship is initiated will receive verifying, together
Sample recognizes the good friend for initiating verifying under the premise of videoeding from 4 cardons.
When user initiates authentication, need there are multiple personages from several width character images or personage's video recording
Video recording recognizes oneself one or the numerical digit good friend that has relationship different as choosing figure, according to the verifying requirement under different scenes, uses
Family will do it one to the operation for recognizing good friend for several times, selects from multiple recognize a good friend in figure every time, such as in new equipment
Upper logon account needs user to recognize multidigit good friend, and only needed on the original equipment being commonly used recently user recognize 1 it is good
Friend, and can be videoed in verification process;After user is just confirming one or numerical digit good friend, verifying will be passed through.
In further carrying out example, when detecting that user needs to carry out authentication, it is good comprising an at least width to obtain
Before several width character images of friendly image or several personages video recording of at least one section good friend's video recording, comprising:
Several good friends that user binds in advance are obtained, and obtain user in advance to the label of several good friends setting.
When it is implemented, user needs the good friend that quantity is no less than 1 in mobile client, user and good friends can
To be confirmed each other social relationships, social relationships can be confirmed by way of labelling, wherein label include household, it is same
Thing, classmate etc., part relations can be analyzed to obtain by data, be such as with the company of some contact person it is same, school is same
One etc..
User can determine cohesion by label, when carrying out authentication, when being sent to good friend and identifying, may be selected
The high good friend of cohesion sends image or video recording to be identified.Wherein judge that the intimate degree of user is high, there is other set algorithm, such as
According to the relational tags that the two users paste to other side, the frequency of both sides' connection, if mobile phone contact, if updated to other side
A series of Social behaviors of crossing data etc.. obtain intimate degree.Remarks: the mobile client product itself has certain society
Hand over function: such as, user can send messaging chat between good friend as wechat;Can also as using cell phone address book,
Check and improve the contact data of good friend, the information such as name, phone, work, address.
Further, verifying scene includes general scene and stringent scene, when the verifying scene is general scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or
Several personages video recording identifies the identification operation of good friend, comprising:
Obtaining verifying scene is general scene, then executes and once know from several width character images or several everybody object video recordings
Not Chu good friend identification operation;
And the scene of good friend, which is recorded a video, to be identified to user.
When it is implemented, verifying scene includes general scene and stringent scene, general scene, which refers to, does not have that security requirement
High scene, the application scenarios not comprising privacy of user, stringent scene refer to the application of the privacy of user such as bank account
Scene.
Under general scene, such as authentication is carried out on commonly used equipment, at this time Exactly-once from several width (preferably
4 width or 9 width) identification operation that a good friend is found out in image or several (preferably 4 or 9) personages video recording, and to user
The scene of identification good friend is recorded a video.
Further, when detect user every time from several width character images or several personages video recording in identify institute
When having good friend, then after determining that subscriber authentication passes through, comprising:
When detecting that user does not identify good friend from several width character images or several personages video recording, decision verification
Do not pass through;
And user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to user good friend, obtain user
The recognition result of good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
When it is implemented, then needing to verify again when user's checking fails, user is identified that the scene of good friend is corresponding at this time
Several strange video recordings of video recording mixing are sent to user good friend, the recognition result of user good friend are obtained, if user good friend correctly knows
Not Chu video recording where user, then determine that subscriber authentication passes through, if where user good friend cannot correctly identify user
Video recording, then determine subscriber authentication fail.
Further, verifying scene includes general scene and stringent scene, when the verifying scene is stringent scene,
The verifying requirement for obtaining verifying scene, according to verifying require to execute at least once from several width character images or
Several personages video recording identifies the identification operation of good friend, comprising:
When to obtain verifying scene be stringent scene, if according to verifying require to execute at least twice from several width character images or
Dry personage's video recording identifies the identification operation of good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
When it is implemented, under stringent scene, video recording of the user when recognizing good friend, i.e., above user in verification process
It can videoed, the good friends of the user can be sent to, in different society relationship, will receive record in the high good friend of intimate degree
Picture.
Under stringent scene, it is also necessary to which good friends verify user video recording, if good friends, which confirm just to calculate, passes through verifying.Stringent field
Scape is for example in new equipment logon account, if good friend's negligible amounts of user, such as only one or two, user recognizes at this time
After intact friend, need to wait the verifying of good friend, and if user has multidigit good friend, for example have more than 10, then may user only
It need to just confirm 5 good friends, so that it may by verifying, without waiting for good friend's verifying;For another example, as long as on common original equipment
Recognizing 1 good friend can complete to verify, if user admits one's mistake, recognize 1 or 2 good friends again it would be possible that may require that more,
If less more good friends, it is necessary to good friend be waited to verify.Similarly, when verifying does not pass through (just not confirming good friend), such as
Good friend's verifying twice has been initiated all not over third time also may require that user waits good friend to verify.
It needs that good friend is waited to verify video recording described in i.e. stringent scene, can be used as a kind of when user's social relationships not that
A kind of means of supplementing out economy in the case where abundant (i.e. good friend's quantity is few).Certainly, some to need the authentications industry such as real name verification
In scene of being engaged in, for example bank remotely opens an account, then can force to need to have to pass through the video recording that good friend verifies the user;It is letter above
Single citing, because the adaptable scene of authentication is many, different business activity may be to the good friend's quantity recognized, and is
The no verifying for having to pass through good friend, may all have any different.
Further, when detect user every time from several width character images or several personages video recording in identify institute
When having good friend, then determine that subscriber authentication passes through, comprising:
When detect user every time from several width character images or several personages video recording in identify all good friends, then
Determine to be verified for the first time;
Detect that the corresponding video recording of scene and several strange video recordings by user identification good friend are sent out when being verified for the first time
User good friend is given, the recognition result of user good friend is obtained, and is recorded a video to the identification process of user good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
Detect that user identifies from several width character images or several personages video recording every time when it is implemented, working as
All good friends then determine to be verified for the first time, and when detecting that first time is verified, user is identified that the scene of good friend is corresponding
Video recording and several strange video recordings are sent to user good friend.
If good friend's quantity is more than 20, cohesion therein higher 20 are chosen, in every kind of relationship as far as possible at least
Contain a higher good friend of cohesion;
If being less than 20, all good friends receive video recording, and good friends need from several width personages video recording, wherein more
Kind, which is selected, only has the video recording figure for being the user in figure, the user is recognized, if identification process is to have numerical digit good friend just to confirm
The video recording of the user, then subscriber authentication passes through.
Further, the recognition result of user good friend is obtained, and after recording a video to the identification process of user good friend, is also wrapped
It includes:
The video recording for obtaining the identification process of user good friend, by the video recording of the identification process of user good friend and several strange records
Good friend as being sent to user good friend;
The recognition result of the good friend of user good friend is obtained, if the good friend's of user good friend correctly identifies user good friend place
Video recording, then determine that the authentication of user good friend passes through.
When it is implemented, user good friend can videoed during recognizing people under stringent scene, wherein this records a video, i.e. good friend
It recognizes the picture of the user Shi Beilu, its good friend can be issued, is i.e. the good friends of user good friend will receive video recording, and with same side
Formula also demonstrates the identity reality for participating in the good friend of verifying with this from the video recording for selecting good friend in figure is selected;
This should be the transmittance process of an authentication, and first user actively initiates verifying, and good friend receives video recording rear side
The user is helped to complete verifying, this is the authentication for initiating active the user of verifying;And help initiates user and completes verifying
Good friend be equivalent to and passively initiated verifying because by picture has been recorded, " good friend of good friend " verifies " good friend ", this
It is the authentication to " good friend ", and so on, " good friend of good friend " also can be by carry out authentication;
So being more like a process for transmitting, in addition to that user that verifying is initiated in active is tested because business needs
Card, other participate in the good friend of verifying, are all verified " unconsciously ", the transmitting of this authentication, it will a circle one
Circle is spread out, so that entire circle of friends and friends of friends' ring border all keep authenticity.
It is obstructed out-of-date to verify, i.e., when not recognized by good friend, the user for initiating verifying need to carry out stringenter verifying, if you need to
It recognizes that the number of good friend's video recording increases (video recording for needing to recognize more good friends), needs to be recognized by greater number of good friend with this
After the video recording of oneself, verifying could be passed through.
In some other embodiments, if if there is digital subscriber good friend does not recognize user, the identity of the user
Verifying does not pass through, and can videoed during recognizing people, and wherein this records a video, i.e. good friend's picture for recognizing the user Shi Beilu, can send out
Its good friend is given, i.e. the good friends of user good friend will receive video recording, and in the same way, from selecting the record for selecting good friend in figure
Picture also demonstrates the identity reality for participating in the good friend of verifying with this.User under the process such as above-mentioned stringent scene that execute later
The authentication process itself of good friend is identical, and details are not described herein again.
By above method implementation it is found that the embodiment of the invention provides a kind of auth method based on social relations,
User is recognized by allowing good friend, and whether my this mode is as authentication;By selecting in figure from multiple, good friend is recognized
The mode of video recording figure verified;It records a video in verification process to user, and its last video recording figure is made
One of choosing figure when verifying is initiated for its good friend;By allow user recognize numerical digit different society relationship good friend video recording, as
Verify one of Rule of judgment;It records a video in authentication procedures, by its numerical digit, intimate good friend is recognized;Good friend is recognizing
When the video recording of user, process can be videoed, and the good friends which can also issue good friend recognize, recognize the body of its good friend
Part authenticity, prevents identity from being falsely used, improves the safety of authentication.
Another embodiment of the present invention provides a kind of authentication means based on social relations, as shown in Fig. 2, device 10 wraps
It includes:
One or more processors 110 and memory 120 are introduced in Fig. 2 by taking a processor 110 as an example, are located
Reason device 110 can be connected with memory 120 by bus or other modes, in Fig. 2 for being connected by bus.
Processor 110 is used for the various control logics of finishing device 10, can be general processor, Digital Signal Processing
Device (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA), single-chip microcontroller, ARM (Acorn RISC
) or other programmable logic device, discrete gate or transistor logic, discrete hardware component or these components Machine
Any combination.In addition, processor 110 can also be any conventional processors, microprocessor or state machine.Processor 110 can also
To be implemented as calculating the combination of equipment, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more micro- places
Manage device combination DSP core or any other this configuration.
Memory 120 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey
Sequence, non-volatile computer executable program and module, such as the authentication based on social relations in the embodiment of the present invention
The corresponding program instruction of method.Processor 110 is by running the non-volatile software program being stored in memory 120, instruction
And unit, thereby executing the various function application and data processing of device 10, i.e. base in realization above method embodiment
In the auth method of social networks.
Memory 120 may include storing program area and storage data area, wherein storing program area can store operation dress
It sets, application program required at least one function;Storage data area, which can be stored, uses created data etc. according to device 10.
It can also include nonvolatile memory in addition, memory 120 may include high-speed random access memory, for example, at least one
A disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 120 can
Choosing includes the memory remotely located relative to processor 110, these remote memories can pass through network connection to device 10.
The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
One or more unit is stored in memory 120, when being executed by one or more processor 110, is held
Auth method based on social relations in the above-mentioned any means embodiment of row, for example, executing in Fig. 1 described above
Method and step S100 to step S300.
The embodiment of the invention provides a kind of non-volatile computer readable storage medium storing program for executing, computer readable storage medium is deposited
Computer executable instructions are contained, which is executed by one or more processors, for example, executing above retouch
Method and step S100 to step S300 in the Fig. 1 stated.
As an example, non-volatile memory medium can include that read-only memory (ROM), programming ROM (PROM), electricity can
Programming ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory can include as external high speed
The random access memory (RAM) of buffer memory.By illustrate it is beautiful unrestricted, RAM can with such as synchronous random access memory (SRAM),
Dynamic ram, (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM
(ESDRAM), many forms of Synchlink DRAM (SLDRAM) and directly Rambus (Lan Basi) RAM (DRRAM) etc
It obtains.The disclosed memory assembly or memory of operating environment described herein be intended to include these and/or it is any
Other are suitble to one or more of the memory of type.
Another embodiment of the invention provides a kind of computer program product, and computer program product includes being stored in
Computer program on non-volatile computer readable storage medium storing program for executing, computer program include program instruction, when program instruction quilt
When processor executes, the processor is made to execute the auth method based on social relations of above method embodiment.For example,
Execute the method and step S100 to step S300 in Fig. 1 described above.
Embodiments described above is only schematical, wherein as illustrated by the separation member unit can be or
It may not be and be physically separated, component shown as a unit may or may not be physical unit, it can
It is in one place, or may be distributed over multiple network units.Can select according to actual needs part therein or
Person's whole module achieves the purpose of the solution of this embodiment.
By the description of above embodiment, those skilled in the art can be understood that each embodiment can be by
Software adds the mode of general hardware platform to realize, naturally it is also possible to pass through hardware realization.Based on this understanding, above-mentioned technology
Scheme substantially in other words can be embodied in the form of software products the part that the relevant technologies contribute, the computer
Software product can reside in computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions to
So that a computer electronic equipment (can be personal computer, server or network electronic devices etc.) executes each reality
The method for applying certain parts of example or embodiment.
Among other things, such as " can ', " energy ", " possibility " or " can be with " etc conditional statement unless in addition specific
Ground is stated or is otherwise understood in context as used, is otherwise generally intended to convey particular implementation energy
Including (however other embodiments do not include) special characteristic, element and/or operation.Therefore, such conditional statement is generally
It is not intended to imply that feature, element and/or operation are all needed one or more embodiments or one anyway
Or multiple embodiments must include for determining these features, element in the case where being with or without student's input or prompt
And/or the logic whether operation is included or will be performed in any particular implementation.
The content described in the present description and drawings herein includes being capable of providing body based on social relations
The example of part verification method and device.Certainly, can not for description the disclosure various features purpose come describe element and/
Or the combination that each of method is envisioned that, it can be appreciated that, many other combinations and displacement of disclosed feature
It is possible., it will thus be apparent that can be made without departing from the scope or spirit of the present disclosure to the disclosure
Various modifications.In addition, or in alternative solution, the considerations of other embodiments of the disclosure are to the specification and drawings and such as
It may be obvious in the practice of the disclosure presented herein.It is intended that proposed in the specification and drawings
Example is considered illustrative and not restrictive in all respects.Although using specific term herein, it
Used and be not used in the purpose of limitation in general and descriptive sense.
Claims (10)
1. a kind of auth method based on social relations, it is characterised in that, the described method includes:
When detecting that user needs to carry out authentication, obtain comprising at least several width character images of width good friend's image or
Several personages video recording of at least one section good friend's video recording;
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several individuals according to verifying
Object video recording identifies the identification operation of good friend;
When detecting that user identifies all good friends from several width character images or several personages video recording every time, then sentence
Determine subscriber authentication to pass through.
2. auth method based on social relations according to claim 1, which is characterized in that described to detect use
When family needs to carry out authentication, obtaining includes at least several width character images of width good friend's image or at least one section of good friend's record
Before several personages video recording of picture, comprising:
Several good friends that user binds in advance are obtained, and obtain user in advance to the label of several good friends setting.
3. auth method based on social relations according to claim 1, which is characterized in that the verifying scene includes
General scene and stringent scene, when the verifying scene is general scene,
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several according to verifying
A personage's video recording identifies the identification operation of good friend, comprising:
Obtaining verifying scene is general scene, then executes and once identify from several width character images or several everybody object video recordings
The identification operation of one good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
4. auth method based on social relations according to claim 3, which is characterized in that described to detect user
When identifying all good friends from several width character images or several personages video recording every time, then determine that subscriber authentication is logical
Later, comprising:
When detecting that user does not identify good friend from several width character images or several personages video recording, decision verification is obstructed
It crosses;
And user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to user good friend, obtain user good friend
Recognition result;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
5. auth method based on social relations according to claim 1, which is characterized in that the verifying scene packet
General scene and stringent scene are included, when the verifying scene is stringent scene,
The verifying requirement for obtaining verifying scene, requires to execute at least once from several width character images or several according to verifying
A personage's video recording identifies the identification operation of good friend, comprising:
Obtain verifying scene be stringent scene when, according to verifying require execute at least twice from several width character images or several
Personage's video recording identifies the identification operation of good friend;
And the scene of good friend, which is recorded a video, to be identified to user.
6. auth method based on social relations according to claim 5, which is characterized in that described to detect use
When all good friends are identified from several width character images or several personages video recording every time in family, then subscriber authentication is determined
Pass through, comprising:
When detect user every time from several width character images or several personages video recording in identify all good friends, then determine
It is verified for the first time;
When detecting that first time is verified, user is identified that the corresponding video recording of scene of good friend and several strange video recordings are sent to
User good friend, obtains the recognition result of user good friend, and records a video to the identification process of user good friend;
If user good friend correctly identifies the video recording where user, determine that subscriber authentication passes through.
7. auth method based on social relations according to claim 6, which is characterized in that the acquisition user is good
The recognition result of friend, and after recording a video to the identification process of user good friend, further includes:
The video recording of the identification process of user good friend and several strange video recordings are sent out in the video recording for obtaining the identification process of user good friend
Give the good friend of user good friend;
The recognition result of the good friend of user good friend is obtained, if the record of the good friend of user good friend correctly identified where user good friend
Picture then determines that the authentication of user good friend passes through.
8. a kind of authentication means based on social relations, which is characterized in that described device includes at least one processor;With
And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
It manages device to execute, so as to be able to carry out claim 1-7 described in any item based on social relations at least one described processor
Auth method.
9. a kind of non-volatile computer readable storage medium storing program for executing, which is characterized in that the non-volatile computer readable storage medium
Matter is stored with computer executable instructions, when which is executed by one or more processors, may make institute
It states one or more processors perform claim and requires the described in any item auth methods based on social relations of 1-7.
10. a kind of computer program product, which is characterized in that the computer program product includes being stored in non-volatile calculating
Computer program on machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is processed
When device executes, the processor perform claim is made to require the described in any item auth methods based on social relations of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910526738.4A CN110177042A (en) | 2019-06-18 | 2019-06-18 | A kind of auth method based on social relations and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910526738.4A CN110177042A (en) | 2019-06-18 | 2019-06-18 | A kind of auth method based on social relations and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110177042A true CN110177042A (en) | 2019-08-27 |
Family
ID=67698458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910526738.4A Pending CN110177042A (en) | 2019-06-18 | 2019-06-18 | A kind of auth method based on social relations and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110177042A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120291107A1 (en) * | 2007-06-01 | 2012-11-15 | Piliouras Teresa C | Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation |
CN104883367A (en) * | 2015-05-20 | 2015-09-02 | 吴振祎 | Method for auxiliary verification login, system, and application client |
CN105468948A (en) * | 2015-12-09 | 2016-04-06 | 广州广电运通金融电子股份有限公司 | Method for identifying identity through social relation |
CN105930765A (en) * | 2016-02-29 | 2016-09-07 | 中国银联股份有限公司 | Payment method and device |
-
2019
- 2019-06-18 CN CN201910526738.4A patent/CN110177042A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120291107A1 (en) * | 2007-06-01 | 2012-11-15 | Piliouras Teresa C | Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation |
CN104883367A (en) * | 2015-05-20 | 2015-09-02 | 吴振祎 | Method for auxiliary verification login, system, and application client |
CN105468948A (en) * | 2015-12-09 | 2016-04-06 | 广州广电运通金融电子股份有限公司 | Method for identifying identity through social relation |
CN105930765A (en) * | 2016-02-29 | 2016-09-07 | 中国银联股份有限公司 | Payment method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11301555B2 (en) | Authentication system | |
US10812485B1 (en) | Wearable device-based user authentication | |
CN205015915U (en) | Management system by oneself stays | |
US8490157B2 (en) | Authentication—circles of trust | |
CN106325562B (en) | Devices, systems, and methods for registering and verifying handwritten signature and achieved to hand-written information | |
CN103118031B (en) | Log in method and the electronic equipment of application account | |
CN108038687B (en) | Transaction method based on voice recognition, server and computer-readable storage medium | |
CN106331178B (en) | A kind of information sharing method and mobile terminal | |
CN105468948A (en) | Method for identifying identity through social relation | |
CN107864144A (en) | Obtain method and device, computer installation and the storage medium of dynamic password | |
CN104092653B (en) | Data processing method and system | |
CN107870997A (en) | Management method, device, display device and the storage medium of conference board written matter | |
CN108429745A (en) | The authentication method and Verification System of login, webpage login method and system | |
CN107612880A (en) | One kind applies access method and device | |
CN107038509A (en) | Self-service registration-management system | |
CN110266738A (en) | Identification authentication method and device based on multi-biological characteristic | |
CN108241999A (en) | A kind of generation method of invoice information, apparatus and system | |
CN109005104A (en) | A kind of instant communicating method, device, server and storage medium | |
CN109697779A (en) | A kind of access control method and relevant apparatus | |
CN107358120A (en) | Document edit method and device, terminal device and computer-readable recording medium | |
CN110166634A (en) | User identity assists in identifying method, apparatus, equipment and readable storage medium storing program for executing | |
CN109714708A (en) | APP punch card method, device, equipment and storage medium based on location information | |
CN105871900A (en) | Identity authentication method and system | |
CN106295423A (en) | A kind of method for exhibiting data and client | |
CN106489155A (en) | Double factor authentication method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190827 |