CN110247898A - Auth method, device, medium and electronic equipment - Google Patents

Auth method, device, medium and electronic equipment Download PDF

Info

Publication number
CN110247898A
CN110247898A CN201910434967.3A CN201910434967A CN110247898A CN 110247898 A CN110247898 A CN 110247898A CN 201910434967 A CN201910434967 A CN 201910434967A CN 110247898 A CN110247898 A CN 110247898A
Authority
CN
China
Prior art keywords
authentication
user terminal
camera
video
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910434967.3A
Other languages
Chinese (zh)
Other versions
CN110247898B (en
Inventor
蒋旭昂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910434967.3A priority Critical patent/CN110247898B/en
Publication of CN110247898A publication Critical patent/CN110247898A/en
Priority to PCT/CN2019/117696 priority patent/WO2020233009A1/en
Application granted granted Critical
Publication of CN110247898B publication Critical patent/CN110247898B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to field of face identification, a kind of auth method, device, medium and electronic equipment are disclosed.This method comprises: returning to protocol information to user terminal when the authentication request for receiving user terminal;When receiving the instruction for receiving protocol information, the pixel value of user terminal camera is obtained;The total duration of video recording is determined according to the pixel value of camera and whether starts double authentication;The video of camera a length of total duration in background record of user terminal is indicated according to pre-defined rule, as authentication information, wherein, when determining the double authentication of starting, the user terminal that also will acquire is according to the received double authentication information of instruction as authentication information;Receive the identity document information of user terminal;Identity-based verification information and identity document information determine that the identity of user is legal.Under the method, the safety of authentication is improved, balance when realizing the safety and authentication of authentication between resource consumption.

Description

Auth method, device, medium and electronic equipment
Technical field
The present invention relates to technical field of face recognition, in particular to a kind of auth method, device, medium and electronics are set It is standby.
Background technique
User identity legitimate verification is one of indispensable link in many network services, and therefore, user identity closes Method verifying is the emphasis of network safety filed.
In the prior art, the software that user runs in using terminal, for example, the App on mobile phone terminal When (Application, application program) or small routine open the operation such as specific transactions to make requests, often using fingerprint or The mode of person's signature verifies user identity, but in this manner, identifies that the accuracy rate of user identity is lower, risk is larger; In addition, verifying user identity can also be by calling the camera of terminal to carry out, for example, mobile phone front camera to Family carries out recognition of face, so that whether verify user identity legal, under this mode, the resources such as storage, bandwidth of consumption of recording a video It is more, higher cost.
Summary of the invention
In order to solve or at least partly solve above-mentioned technical problem, the purpose of the present invention is to provide a kind of authentications Method, apparatus, medium and electronic equipment.
According to the one side of the application, a kind of auth method is provided, which comprises
When receiving the authentication request from user terminal, it includes subscriber authentication means that Xiang Suoshu user terminal, which returns, Protocol information, wherein subscriber authentication means in the protocol information include video recording;
In response to receiving the instruction of the receiving protocol information from the user terminal, taking the photograph for the user terminal is obtained As the pixel value of head;
The total duration of video recording is determined according to the pixel value of the camera and whether starts double authentication;
In the case where determining the double authentication of starting, indicate the camera of the user terminal rear according to pre-defined rule The video of platform a length of total duration when recording, and indicate that the user terminal receives double authentication information from the user, The authentication video and the double authentication information that the user terminal returns are obtained, as authentication information;
In the case where determination does not start double authentication, indicate that the camera of the user terminal exists according to pre-defined rule The video of a length of total duration when background record obtains the authentication video that the user terminal returns, as authentication Information;
Receive the identity document information that the user terminal uploads;
Determine that the identity of the user is legal based on the authentication information and the identity document information.
According to the another aspect of the application, a kind of authentication means are provided, described device includes:
Return module is configured as when receiving the authentication request from user terminal, and Xiang Suoshu user terminal returns to packet The protocol information of the means containing subscriber authentication;
Module is obtained, is configured to respond to receive the instruction of the receiving protocol information from the user terminal, Obtain the pixel value of the camera of the user terminal;
Whether the first determining module is configured as determining the total duration of video recording according to the pixel value of the camera and open Move double authentication;
Indicating module, be configured as determine start double authentication in the case where, indicated according to pre-defined rule described in The video of the camera of user terminal a length of total duration in background record, and it is from the user to indicate that the user terminal receives Double authentication information obtains the authentication video and the double authentication information that the user terminal returns, as Authentication information;And
In the case where determination does not start double authentication, indicate that the camera of the user terminal exists according to pre-defined rule The video of a length of total duration when background record obtains the authentication video that the user terminal returns, as authentication Information;
Receiving module is configured as receiving the identity document information that the user terminal uploads;
Second determining module is configured as determining the use based on the authentication information and the identity document information The identity at family is legal.
According to the another aspect of the application, a kind of computer-readable program medium is provided, computer program is stored with Instruction makes computer execute foregoing method when the computer program instructions are computer-executed.
According to the another aspect of the application, a kind of electronic equipment is provided, the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is by the processing When device executes, foregoing method is realized.
The technical solution that the embodiment of the present invention provides can include the following benefits:
For auth method provided by the present invention, this method comprises: being tested when receiving the identity from user terminal Card request, Xiang Suoshu user terminal return to the protocol information comprising subscriber authentication means, wherein the use in the protocol information Authentication means in family include video recording;In response to receiving the instruction of the receiving protocol information from the user terminal, obtain Take the pixel value of the camera of the user terminal;The total duration of video recording is determined according to the pixel value of the camera and whether is opened Move double authentication;In the case where determining the double authentication of starting, taking the photograph for the user terminal is indicated according to pre-defined rule As the video of head a length of total duration in background record, and indicate that the user terminal receives double identity from the user and tests Information is demonstrate,proved, the authentication video and the double authentication information that the user terminal returns is obtained, believes as authentication Breath;In the case where determination does not start double authentication, indicate the camera of the user terminal on backstage according to pre-defined rule The video of a length of total duration when recording obtains the authentication video that the user terminal returns, as authentication information; Receive the identity document information that the user terminal uploads;Institute is determined based on the authentication information and the identity document information The identity for stating user is legal.
Under the method, due to having used the mode of video record to carry out authentication, the safety of authentication is improved, Simultaneously by determining video recording total duration according to the pixel value of camera and whether starting the movement of double authentication, realize The balance when safety and authentication of authentication between resource consumption.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited Invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of application scenarios schematic diagram of auth method shown according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of auth method shown according to an exemplary embodiment;
Fig. 3 is the details flow chart of the step 230 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 4 is the flow chart of the pre-defined rule of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 5 is the details flow chart of the step 270 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 6 is a kind of block diagram of authentication means shown according to an exemplary embodiment;
Fig. 7 is that a kind of electronic equipment for realizing above-mentioned auth method shown according to an exemplary embodiment shows Example block diagram;
Fig. 8 is shown according to an exemplary embodiment a kind of for realizing the computer-readable of above-mentioned auth method Storage medium.
Specific embodiment
Here will the description is performed on the exemplary embodiment in detail, the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function Energy entity, not necessarily must be corresponding with physically or logically independent entity.
The disclosure provides firstly a kind of auth method.So-called authentication herein refers to the body provided user Whether part information carries out legitimacy verifies genuine and believable with the identity information for determining user.Method of the invention can be fixed on respectively Kind of terminal, for example, server, the physical infrastructure of cloud computing, smart phone, tablet computer, desktop computer, laptop, Any terminal that there is operation processing function and can be communicated with external equipment such as iPad, self-service terminal.
Fig. 1 is a kind of application scenarios schematic diagram of auth method shown according to an exemplary embodiment.Such as Fig. 1 institute Show, the mobile terminal including user, i.e. the implementation terminal of smart phone 110 and the disclosure, i.e. server 120.Server 120 with can be connected with smart phone 110 by the communication link being made of network facilities such as cellular network, backbone networks, from And complete the transmitting of data and information.Architectural framework between smart phone 110 and server 120 can be C/S (Client/ Server, client/server) framework, it is also possible to B/S (Brower/Server, browser/server) framework.User exists Server 120 is accessed by using the browser or App (Application, application program) being mounted on smart phone 110 When, if it is desired that the certain business (for example pay, transfer accounts etc. operation) provided with server 120, may just may require that carry out body Part verifying uses specific business, common authentication side to ensure that user account is not stolen or determines that user is qualified Formula can be the modes such as on-line signature, fingerprint authentication, video verification, these modes require user using smart phone 110 to Server 120 submits the information for verifying identity, for example, this mode of video verification just needs user to use smart phone Then the videos of 110 recording users upload onto the server 120.
Fig. 2 is a kind of flow chart of auth method shown according to an exemplary embodiment.As shown in Fig. 2, including Following steps:
Step 210, when receiving the authentication request from user terminal, it includes user identity that Xiang Suoshu user terminal, which returns, The protocol information of verifying means.
Wherein, the subscriber authentication means in the protocol information include video recording.
Protocol information and its subscriber authentication means for being included all are the texts with the forms such as text, symbol record Information.
Authentication request is the Internet request that user terminal is sent to local terminal, be can be based on various Internet protocols Request, such as can be the request under HTTP/HTTPS agreement.
It in one embodiment, include service identification in the authentication request from user terminal received, it is described to work as The authentication request from user terminal is received, Xiang Suoshu user terminal, which returns to the agreement comprising subscriber authentication means, to be believed Breath, comprising:
When receiving the authentication request from user terminal, the business mark for including in the authentication request is obtained Know;
It is corresponding with the service identification using preset service identification and the acquisition of subscriber authentication means mapping table Subscriber authentication means;
It, will be described in the case where including video recording in the subscriber authentication means corresponding with the service identification of acquisition Preset protocol information template is added in subscriber authentication means, obtains the protocol information comprising subscriber authentication means;
The protocol information comprising subscriber authentication means is returned to the user terminal.
In one embodiment, Xiang Suoshu user terminal returns to the specific side of the protocol information comprising subscriber authentication means Formula is for example to can be use to the user terminal return recording page of the protocol information comprising subscriber authentication means The Web page that HTML5 language is write.
In one embodiment, Xiang Suoshu user terminal returns to the specific side of the protocol information comprising subscriber authentication means Formula is the link for being directed toward protocol information to be record in the page, when user exists to user terminal return recording Webpage User terminal clicks the link, the accessible page that record the protocol information comprising subscriber authentication means.
Step 220, in response to receiving the instruction for receiving the protocol information from the user terminal, the use is obtained The pixel value of the camera at family end.
In one embodiment, user can trigger to send to local terminal and receive in the movement that user terminal receives the protocol information The instruction of the protocol information.
For example, user can click the controls such as button when user terminal receives the protocol information;When local terminal listens to accordingly The movement of control is equivalent to obtain the instruction of the receiving protocol information from the user terminal.
In one embodiment, user communicate by the application installed in user terminal with local terminal, described in receiving and coming from The instruction of the receiving protocol information of user terminal can trigger the pixel value of the camera of the application reading user terminal and return It is back to local terminal.
For example, the system of user terminal provides Camera.getParameters () interface, which provides acquisition and sets The approach of standby camera parameter, comprising calling the instruction of the interface in the application of user terminal installation, when receiving from described The instruction of the receiving protocol information of user terminal, can execute the instruction for calling the interface, to obtain setting for interface return Standby camera parameter, wherein camera parameter includes the pixel value of camera.
In one embodiment, user is communicated by the application installed in user terminal with local terminal, and in installation, this is answered user terminal Used time, the pixel value of the mark of the user terminal and camera can be sent to local terminal, and by local terminal by the user terminal Mark is corresponding with the pixel value of camera to be stored into database, is carried in each instruction from user terminal that local terminal receives There is the mark of user terminal, the instruction in response to receiving the receiving protocol information from the user terminal obtains institute State the pixel value of the camera of user terminal, comprising:
In response to receiving the instruction of the receiving protocol information from the user terminal, the use in described instruction is obtained The mark at family end;
The database is inquired, the pixel value of the camera of storage corresponding with the mark of the user terminal is obtained.
In one embodiment, user communicate by the application installed in user terminal with local terminal, described in receiving and coming from The instruction of the receiving protocol information of user terminal can trigger the application and read the model of the user terminal and be back to local terminal, The pixel value of the camera for obtaining the user terminal, comprising:
When the model for getting the user terminal, pass through preset user terminal model and camera pixel value corresponding relationship Table obtains camera pixel value corresponding with the model of the user terminal, the pixel value of the camera as the user terminal.
In one embodiment, user is communicated by the application installed in user terminal with local terminal, which can read use The file information of family end storage, the instruction in response to receiving the receiving protocol information from the user terminal, is obtained Take the pixel value of the camera of the user terminal, comprising: believe in response to receiving the receiving agreement from the user terminal The instruction of breath, Xiang Suoshu user terminal obtain the request of the resolution ratio of the photo of user terminal storage;It receives the user terminal and returns to it The resolution ratio of the photo of storage;According to the resolution ratio, the pixel value of the camera of the user terminal is determined.
For example, can determine the camera shooting of the user terminal if the resolution ratio of the photo received is 3000 × 4000 The pixel value of head is 12,000,000 pixels.
Step 230, it determines the total duration of video recording according to the pixel value of the camera and whether starts double identity and test Card.
Double authentication is additional authentication mode on the basis of video recording.
In one embodiment, double authentication are as follows: Xiang Suoshu user terminal sends suggestion voice and indicates information, indicates institute The user for stating user terminal makes predetermined action.
It opens one's mouth, blink, putting head etc. for example, predetermined action can be.
In one embodiment, step 230 is carried out especially by following manner:
Pixel value and following formula based on the camera determine the total duration of video recording:
Wherein, ToutTotal duration for the video recording determined, P are the pixel value of camera, PrefFor the first default camera Pixel a reference value, Tref1For the first scheduled duration, Tref2For the second scheduled duration, wherein Tref2Less than or equal to Tref1
In the case where P is greater than or equal to the second default camera pixel a reference value, determination does not start double authentication, Wherein, the described second default camera pixel a reference value is less than the first default camera pixel a reference value;
In the case where P is less than the second default camera pixel a reference value, determines and start double authentication.
The advantage of this embodiment is that, on the one hand, it is less than or equal to preset camera pixel in the pixel value of camera In the case where a reference value, for the pixel value of the duration and camera that make video recording in inverse relation, i.e. camera pixel value is smaller, determines The total duration of video recording out is higher, and for the different pixel values of camera, the total duration of the video recording of acquisition is different, so that The authentication video comprising richer information can be obtained by promoting the total duration of video recording when camera pixel value is smaller, It ensure that the reliability and safety of authentication;It on the other hand, is more than preset camera shooting head portrait in the pixel value of camera In the case where plain a reference value, by making the total duration for the video recording determined be maintained at fixed value, it can guarantee authentication Reliability simultaneously so that video recording total duration it is sufficiently small, so as to reduce the consumption of the resources such as bandwidth, memory space, in addition, In the case where the pixel value of camera is sufficiently low, i.e. the clarity of the identity video of camera shooting is unable to satisfy safety verification In the case where needing, by starting double authentication, the safety of authentication can be improved to a certain extent.
Refering to what is shown in Fig. 3, the details flow chart of the step 230 of an embodiment is shown, specifically includes the following steps:
Step 231, in the case where the pixel value of camera reaches the first predetermined pixel value threshold value, when by preset first Length does not start double authentication as the total duration and determination recorded a video.
First duration can be arbitrary duration, for example can be 10 minutes.
Step 232, less than the first predetermined pixel value threshold value and it is greater than or equal to the second predetermined picture in the pixel value of camera In the case where element value threshold value, using preset second duration as the total duration of video recording and determination does not start double authentication.
Wherein, second duration is greater than the first duration.
Step 233, in the case where the pixel value of camera is less than the second predetermined pixel value threshold value, when by preset third The long total duration as video recording and the determining double authentication of starting, wherein the third duration is greater than the second duration.
Wherein, the third duration is greater than the second duration.
It can be learnt from the present embodiment: be selected as the size relation of the total duration of video recording are as follows: third duration > second The first duration of duration >, and the size relation for the corresponding required camera pixel value of total duration for being selected as video recording is third Duration < the second duration the first duration of <, it can be seen that, with the increase of the camera pixel value of the user terminal of acquisition, choosing The total duration for the video recording selected out is shorter and shorter.
Therefore, the advantage of this embodiment is that, video recording duration is distinguished using predetermined pixel value threshold value, ensure that When the pixel value of camera is lower, can be regarded by promoting video recording duration to obtain the authentication comprising richer information Frequently, while in the case where the pixel value very little of camera, also to start double authentication, ensure that the reliable of authentication Property and safety.
Step 240, in the case where determining the double authentication of starting, taking the photograph for the user terminal is indicated according to pre-defined rule As the video of head a length of total duration in background record, and indicate that the user terminal receives double identity from the user and tests Information is demonstrate,proved, the authentication video and the double authentication information that the user terminal returns is obtained, believes as authentication Breath.
In one embodiment, the user terminal is smart phone, and the camera of the user terminal is front camera.
In one embodiment, double authentication information is integrated into institute according to instruction for the received user of the user terminal The action message of authentication video is stated, it is described to indicate the camera of the user terminal in background record duration according to pre-defined rule It for the video of the total duration, and indicates that the user terminal receives double authentication information from the user, obtains the use The authentication video and the double authentication information that family end returns, as authentication information, comprising: according to pre- set pattern It then indicates the video of camera a length of total duration in background record of the user terminal, and indicates that the user terminal receives Double authentication information from the user, the user terminal return is obtained in a manner of video flowing includes double authentication The authentication video of information, as authentication information.
The advantage of this embodiment is that by the way that the data of authentication video and double authentication information are combined simultaneously It is received together, avoids and individually receive two item datas, reduce resource consumption.
In one embodiment, the mode for receiving the authentication video that the user terminal returns is in the user terminal After camera is recorded a video, the entire authentication video that the video recording that the user terminal returns obtains is received.
Pre-defined rule is mode of the camera in background record video for indicating the user terminal.
In one embodiment, pre-defined rule includes:
Obtain current time and two random numbers;
Biggish random number is determined in described two random numbers, as the first random number, and by lesser random number As the second random number;
Since current time, every the period that number of seconds is first random number, the camera shooting of the user terminal is indicated Head carries out the video record for the difference that number of seconds is first random number and the second random number, until the overall length for the video recorded Degree reaches the total duration.
The advantage of this embodiment is that indicating the feelings of the user terminal starting camera video recording in one time of random selection Under condition, a random time is selected to terminate to record a video, can further decrease and be led since user grasps the video recording time started in advance It causes a possibility that record screen cheating occur, further improves the authenticity of the authentication video of acquisition, improve identity The legitimacy and safety of verifying.
In one embodiment, the acquisition current time and two random numbers, comprising:
It obtains current time and appoints and take a random number;
It is obtained in the range of being greater than the first predetermined random number threshold value with the absolute value of the difference of the random number another random Number.
The advantage of this embodiment is that guaranteeing two random numbers obtained by the distance between two random numbers of limitation Be at a distance sufficiently large so that it is sufficiently large that the starting camera obtained according to two random numbers, which is carried out continuously the video time of recording, , it ensure that the reliability and safety for obtaining video recording to a certain extent.
In one embodiment, the pre-defined rule includes:
In response to receiving the instruction of the receiving protocol information from the user terminal, current time and two are obtained Random number, wherein described two random numbers are the integer less than the second predetermined random number threshold value;
Appoint in described two random numbers and takes a random number as third random number, it is random using another random number as the 4th Number;
Since the current time, every the period that number of seconds is the third random number, the user terminal is indicated Camera records the video for the period that number of seconds is the 4th random number, until when the length for the video recorded reaches described It is long;
The video that the user terminal is recorded a video within all 4th random numbers corresponding period is as identity Verify video.
The advantage of this embodiment is that since the recording time interval of authentication video and recording duration are all random , improve the confidence level of the authentication video of acquisition.
Step 250, in the case where determination does not start double authentication, the user terminal is indicated according to pre-defined rule The video of camera a length of total duration in background record obtains the authentication video that the user terminal returns, as Authentication information.
Due to not needing to start double authentication, it is possible to which the authentication video for only returning to user terminal is as body Part verification information, wherein the camera for being used to indicate the user terminal used in this step carries out the mode of video record With the specific implementation of pre-defined rule above-mentioned can it is identical, can also be different, details are not described herein.
Step 260, the identity document information that the user terminal uploads is received.
The identity document information that user uploads can be that the full face of resident identification card or the photo of passport etc. are various It can determine that the information of user's facial image.
Step 270, determine that the identity of the user is legal based on the authentication information and the identity document information.
In one embodiment, step 270 specific steps as shown in figure 5, step 270 specifically includes the following steps:
Step 271, in the case where the authentication information includes double authentication information, it is based on two gravidity Whether the identity that part verification information verifies the user is legal.
In one embodiment, double authentication information is blink movement, described based on the double authentication letter Whether the identity that breath verifies the user is legal, comprising:
Determine indicate the user terminal receive double authentication information from the user time and blink movement when Between it is whether consistent;
If so, determining that the identity for verifying the user based on the double authentication information is legal;
If not, determining that the identity for verifying the user based on the double authentication information is illegal.
Step 272, if so, determining the body of the user based on the authentication video and the identity document information Part is legal.
When the double authentication information of user has passed through verifying, it is therefore necessary to be verified for authentication video.
Step 273, in the case where the authentication information does not include double authentication information, it is based on the identity Verifying video and the identity document information determine that the identity of the user is legal.
In one embodiment, described that the user is determined based on the authentication information and the identity document information Identity it is legal, comprising: the authentication video is divided into frame, obtains multiple images frame;Judge to wrap in the picture frame being divided into Whether the number of the consistent picture frame of face in the face contained and the identity document information is greater than predetermined image frame number threshold Value;If it is, determining that the identity of the user is legal.
The mode that authentication video is divided into picture frame can be by way of calling the tools such as Opencv, MATLAB To realize.
In one embodiment, described that the user is determined based on the authentication information and the identity document information Identity it is legal, comprising: the authentication video is divided into frame, obtains multiple images frame;Judge in the picture frame being divided into Whether the number of the consistent picture frame of face in face and the identity document information is greater than predetermined image frame number threshold value;Such as Fruit is, it is determined that the identity of the user is legal.
In one embodiment, the face judged in face and the identity document information in the picture frame being divided into Whether the number of consistent picture frame is greater than predetermined image frame number threshold value
For each picture frame in the picture frame being divided into, judge whether the face of the picture frame is believed with the identity document Face in breath is consistent;
Obtain the number having recorded with the picture frame of the consistent face of face in the identity document information;
Judge whether the number is greater than predetermined image frame number threshold value.
Whether the face of movement images frame can pass through with the consistent concrete mode of face in the identity document information It is carried out using the mode of trained neural network model, for example convolutional neural networks model can be used to carry out the ratio of face It is right;It can also be carried out by way of calling existing application programming interface.
The advantage of this embodiment is that then obtaining and having recorded by the judgement that all picture frames are carried out with face alignment With the number of the picture frame of the consistent face of face in the identity document information so that the legitimacy of authentication video is more It can be protected.
In one embodiment, judge that face is consistent with the face in the identity document information in the picture frame being divided into The number of picture frame whether be greater than predetermined image frame number threshold value and include:
Since the first picture frame being divided into, judge each picture frame face whether in the identity document information Face is consistent;
Obtain the number of the consistent picture frame of face in the face having determined that and the identity document information;
When the number is greater than predetermined image frame number threshold value, then terminate to judge, and determine face in the picture frame that is divided into It is greater than predetermined image frame number threshold value with the number of the consistent picture frame of face in the identity document information.
Due to that in some cases, can confirm the face in the picture frame being divided into without judging all picture frames Whether it is greater than predetermined image frame number threshold value with the number of the consistent picture frame of face in the identity document information, so this Embodiment improves the legal efficiency of identity for verifying the user to a certain extent, reduces computing cost.
In one embodiment, described that the user is determined based on the authentication video and the identity document information Identity it is legal, comprising:
The authentication video is divided into frame, obtains multiple images frame;It obtains in face and the identity document information The consistent picture frame of face number, as the first number;The number for obtaining all picture frames being divided into, as the second number Mesh;Determine the ratio of first number Yu second number;If the ratio is greater than predetermined ratio threshold value, it is determined that described The identity of user is legal.
Since the factors such as record screen time difference may cause the number for the picture frame for being divided into different authentication videos Difference, the advantage of this embodiment is that, by the number of the consistent picture frame of face in face and the identity document information and The relative size relationship of the number of all picture frames improves authentication as determining the legal standard of the identity of user When reasonability and accuracy.
In one embodiment, described that the user is determined based on the authentication video and the identity document information Identity it is legal, comprising:
The authentication video is divided into frame, obtains multiple images frame;
Appoint in the range of being less than predetermined five random number threshold and takes a random number, it is pre- being less than as the 5th random number Appoint in the range of fixed 6th random number threshold and take a random number, as the 6th random number;
In the multiple images frame according to time-sequencing, the picture frame for being ordered as the 5th random number is extracted;
Since the picture frame for being ordered as the 5th random number, one is obtained every the picture frame that number is the 6th random number A picture frame;
Under the face in all picture frames extracted and the face unanimous circumstances in the identity document information, really The identity of the fixed user is legal.
The advantage of this embodiment is that picture frame is extracted by way of random sampling to verify whether user identity closes Method reduces calculation amount, so that the efficiency for carrying out authentication to user is improved, simultaneously because the process for extracting picture frame is complete It carries out at random entirely, can guarantee the safety of authentication.
Fig. 4 is the flow chart of the pre-defined rule of the embodiment shown in corresponding embodiment according to fig. 2.As shown in figure 4, including Following steps:
Step 410, current time and a random number are obtained.
In one embodiment, random number obtains within a predetermined range.Such as the preset range can for [0, 100]。
Step 420, it calculates the current time and number of seconds is the sum of the period of the random number, as the starting use The camera at family end starts the time recorded a video.
For example, current time is 20:18:09, and the random number obtained is 85, due to 85=00:01:25, then obtaining The camera of the starting user terminal start the time 20:19:34 to record a video.
Step 430, when the camera that current time reaches the starting user terminal starts the time recorded a video, The video recording of a length of total duration when the camera of the user terminal starts to carry out is indicated, to obtain authentication video.
The advantage of this embodiment is that since the time for indicating that the camera of the user terminal starts to record a video is basis Random number determines, thereby indicate that the time that the camera of the user terminal starts to record a video is random.It does so It is advantageous in that, avoids since user grasps record screen cheating caused by the video recording time started in advance, for example intermediary is on behalf of recognizing Card carries out the illegal acts such as personation certification by other people, improves the authenticity of the authentication video of acquisition.
The disclosure additionally provides a kind of authentication means, is the device of the invention embodiment below.
Fig. 6 is a kind of block diagram of authentication means shown according to an exemplary embodiment.As shown in fig. 6, the identity Verifying device 600 includes:
Return module 610 is configured as when receiving the authentication request from user terminal, and Xiang Suoshu user terminal returns Protocol information comprising subscriber authentication means.
Module 620 is obtained, is configured to respond to receive the finger of the receiving protocol information from the user terminal It enables, obtains the pixel value of the camera of the user terminal.
First determining module 630 is configured as determining the total duration of video recording according to the pixel value of the camera and is The no double authentication of starting.
Indicating module 640 is configured as indicating institute according to pre-defined rule in the case where determining the double authentication of starting The video of camera a length of total duration in background record of user terminal is stated, and indicates that the user terminal is received from user Double authentication information, obtain the authentication video and the double authentication information that the user terminal returns, make For authentication information;And
In the case where determination does not start double authentication, indicate that the camera of the user terminal exists according to pre-defined rule The video of a length of total duration when background record obtains the authentication video that the user terminal returns, as authentication Information.
Receiving module 650 is configured as receiving the identity document information that the user terminal uploads.
Second determining module 660 is configured as determining institute based on the authentication information and the identity document information The identity for stating user is legal.
According to the third aspect of the disclosure, a kind of electronic equipment that can be realized above-mentioned auth method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
The electronic equipment 700 of this embodiment according to the present invention is described referring to Fig. 7.The electronics that Fig. 7 is shown Equipment 700 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in fig. 7, electronic equipment 700 is showed in the form of universal computing device.The component of electronic equipment 700 can wrap It includes but is not limited to: at least one above-mentioned processing unit 710, at least one above-mentioned storage unit 720, the different system components of connection The bus 730 of (including storage unit 720 and processing unit 710).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 710 Row, so that various according to the present invention described in the execution of the processing unit 710 above-mentioned " embodiment method " part of this specification The step of illustrative embodiments.
Storage unit 720 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 721 and/or cache memory unit 722, it can further include read-only memory unit (ROM) 723.
Storage unit 720 can also include program/utility 724 with one group of (at least one) program module 725, Such program module 725 includes but is not limited to: operating system, one or more application program, other program modules and It may include the realization of network environment in program data, each of these examples or certain combination.
Bus 730 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 700 can also be with one or more external equipments 900 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 700 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 700 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 750.Also, electronic equipment 700 can be with By network adapter 760 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.As shown, network adapter 760 is communicated by bus 730 with other modules of electronic equipment 700. It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 700, including but not Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is additionally provided, being stored thereon with can be real The program product of existing this specification above method.In some possible embodiments, various aspects of the invention can also be real It is now a kind of form of program product comprising program code, when described program product is run on the terminal device, the journey Sequence code is each according to the present invention described in above-mentioned " illustrative methods " part of this specification for executing the terminal device The step of kind illustrative embodiments.
Refering to what is shown in Fig. 8, describing the program product for realizing the above method of embodiment according to the present invention 800, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and change can executed without departing from the scope.The scope of the present invention is limited only by the attached claims.

Claims (10)

1. a kind of auth method, which is characterized in that the described method includes:
When receiving the authentication request from user terminal, Xiang Suoshu user terminal returns to the association comprising subscriber authentication means Discuss information, wherein the subscriber authentication means in the protocol information include video recording;
In response to receiving the instruction of the receiving protocol information from the user terminal, the camera of the user terminal is obtained Pixel value;
The total duration of video recording is determined according to the pixel value of the camera and whether starts double authentication;
In the case where determining the double authentication of starting, indicate that the camera of the user terminal is recorded on backstage according to pre-defined rule The video of a length of total duration when processed, and indicate that the user terminal receives double authentication information from the user, it obtains The authentication video and the double authentication information that the user terminal returns, as authentication information;
In the case where determination does not start double authentication, indicate the camera of the user terminal on backstage according to pre-defined rule The video of a length of total duration when recording obtains the authentication video that the user terminal returns, as authentication information;
Receive the identity document information that the user terminal uploads;
Determine that the identity of the user is legal based on the authentication information and the identity document information.
2. the method according to claim 1, wherein described determine video recording according to the pixel value of the camera Total duration and whether start double authentication, comprising:
In the case where the pixel value of camera reaches the first predetermined pixel value threshold value, using preset first duration as video recording Total duration and determination do not start double authentication;
Camera pixel value less than the first predetermined pixel value threshold value and be greater than or equal to the second predetermined pixel value threshold value feelings Under condition, using preset second duration as the total duration of video recording and determination does not start double authentication, wherein when described second It is long to be greater than the first duration;
In the case where the pixel value of camera is less than the second predetermined pixel value threshold value, using preset third duration as video recording Total duration simultaneously determines the double authentication of starting, wherein the third duration is greater than the second duration.
3. the method according to claim 1, wherein described determine video recording according to the pixel value of the camera Total duration and whether start double authentication, comprising:
Pixel value and following formula based on the camera determine the total duration of video recording:
Wherein, ToutTotal duration for the video recording determined, P are the pixel value of camera, PrefFor the first default camera pixel A reference value, Tref1For the first scheduled duration, Tref2For the second scheduled duration, wherein Tref2Less than or equal to Tref1
In the case where P is greater than or equal to the second default camera pixel a reference value, determination does not start double authentication, In, the second default camera pixel a reference value is less than the first default camera pixel a reference value;
In the case where P is less than the second default camera pixel a reference value, determines and start double authentication.
4. the method according to claim 1, wherein the pre-defined rule includes:
Obtain current time and a random number;
It calculates the current time and number of seconds is the sum of the period of the random number, as the camera for starting the user terminal Start the time recorded a video;
When the camera that current time reaches the starting user terminal starts the time recorded a video, the user is indicated The video recording of the camera at end a length of total duration when starting to carry out, to obtain authentication video.
5. the method according to claim 1, wherein the pre-defined rule includes:
Obtain current time and two random numbers;
Biggish random number is determined in described two random numbers, as the first random number, and using lesser random number as Second random number;
Since current time, every the period that number of seconds is first random number, indicate the camera of the user terminal into Row number of seconds is the video record of the difference of first random number and the second random number, until the total length for the video recorded reaches To the total duration.
6. the method according to claim 1, wherein described be based on the authentication information and the identity card Part information determines that the identity of the user is legal, comprising:
In the case where the authentication information includes double authentication information, tested based on the double authentication information Whether the identity for demonstrate,proving the user is legal;
If so, determining that the identity of the user is legal based on the authentication video and the identity document information;
In the case where the authentication information does not include double authentication information, it is based on the authentication video and institute It states identity document information and determines that the identity of the user is legal.
7. according to the method described in claim 6, it is characterized in that, described be based on the authentication information and the identity card Part information determines that the identity of the user is legal, comprising:
The authentication video is divided into frame, obtains multiple images frame;
Judge the number of the consistent picture frame of face in the face for including in the picture frame being divided into and the identity document information Whether predetermined image frame number threshold value is greater than;
If it is, determining that the identity of the user is legal.
8. a kind of authentication means, which is characterized in that described device includes:
Return module is configured as when receiving the authentication request from user terminal, and Xiang Suoshu user terminal is returned comprising using The protocol information of family authentication means;
Module is obtained, is configured to respond to receive the instruction of the receiving protocol information from the user terminal, obtains The pixel value of the camera of the user terminal;
First determining module is configured as determining the total duration of video recording according to the pixel value of the camera and whether starts two Authentication again;
Indicating module is configured as indicating the user according to pre-defined rule in the case where determining the double authentication of starting The video of the camera at end a length of total duration in background record, and it is from the user double to indicate that the user terminal receives Authentication information obtains the authentication video and the double authentication information that the user terminal returns, as identity Verification information;And
In the case where determination does not start double authentication, indicate the camera of the user terminal on backstage according to pre-defined rule The video of a length of total duration when recording obtains the authentication video that the user terminal returns, as authentication information;
Receiving module is configured as receiving the identity document information that the user terminal uploads;
Second determining module is configured as determining the user's based on the authentication information and the identity document information Identity is legal.
9. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer journey When sequence instruction is computer-executed, computer is made to execute method according to any one of claim 1 to 7.
10. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is held by the processor When row, method as described in any one of claim 1 to 7 is realized.
CN201910434967.3A 2019-05-23 2019-05-23 Identity verification method, identity verification device, identity verification medium and electronic equipment Active CN110247898B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910434967.3A CN110247898B (en) 2019-05-23 2019-05-23 Identity verification method, identity verification device, identity verification medium and electronic equipment
PCT/CN2019/117696 WO2020233009A1 (en) 2019-05-23 2019-11-12 Identity authentication method and apparatus, computing device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910434967.3A CN110247898B (en) 2019-05-23 2019-05-23 Identity verification method, identity verification device, identity verification medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110247898A true CN110247898A (en) 2019-09-17
CN110247898B CN110247898B (en) 2021-11-19

Family

ID=67884934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910434967.3A Active CN110247898B (en) 2019-05-23 2019-05-23 Identity verification method, identity verification device, identity verification medium and electronic equipment

Country Status (2)

Country Link
CN (1) CN110247898B (en)
WO (1) WO2020233009A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020233009A1 (en) * 2019-05-23 2020-11-26 平安普惠企业管理有限公司 Identity authentication method and apparatus, computing device, and storage medium

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113343850B (en) * 2021-06-07 2022-08-16 广州市奥威亚电子科技有限公司 Method, device, equipment and storage medium for checking video character information
CN114390323B (en) * 2022-01-04 2023-12-01 亿咖通(湖北)技术有限公司 Vehicle-mounted image transmission method and electronic equipment
CN114745521B (en) * 2022-04-06 2023-02-03 英才(广州)在线教育科技有限公司 Video recording device for novel remote online education

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320950A (en) * 2015-11-23 2016-02-10 天津大学 A video human face living body detection method
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN105787428A (en) * 2016-01-08 2016-07-20 上海交通大学 Method for lip feature-based identity authentication based on sparse coding
CN105871900A (en) * 2016-05-24 2016-08-17 邵军利 Identity authentication method and system
CN105989263A (en) * 2015-01-30 2016-10-05 阿里巴巴集团控股有限公司 Method for authenticating identities, method for opening accounts, devices and systems
CN106911630A (en) * 2015-12-22 2017-06-30 上海仪电数字技术股份有限公司 Terminal and the authentication method and system of identity identifying method, terminal and authentication center
US20180019994A1 (en) * 2016-07-18 2018-01-18 Samsung Electronics Co., Ltd. Method of authenticating user and electronic device supporting the same
CN107748876A (en) * 2017-11-06 2018-03-02 杭州有盾网络科技有限公司 Face vivo identification method, device and mobile terminal based on mobile terminal
CN107895158A (en) * 2017-12-07 2018-04-10 朱明君 A kind of mobile terminal that target can be identified
CN108021892A (en) * 2017-12-06 2018-05-11 上海师范大学 A kind of human face in-vivo detection method based on extremely short video
CN108763897A (en) * 2018-05-22 2018-11-06 平安科技(深圳)有限公司 Method of calibration, terminal device and the medium of identity legitimacy
CN108875461A (en) * 2017-05-16 2018-11-23 深圳市祈飞科技有限公司 A kind of human face in-vivo detection method and device
US20180365512A1 (en) * 2017-06-20 2018-12-20 Nvidia Corporation Equivariant landmark transformation for landmark localization
CN109783338A (en) * 2019-01-02 2019-05-21 深圳壹账通智能科技有限公司 Recording method, device and computer equipment based on business information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110247898B (en) * 2019-05-23 2021-11-19 平安普惠企业管理有限公司 Identity verification method, identity verification device, identity verification medium and electronic equipment

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989263A (en) * 2015-01-30 2016-10-05 阿里巴巴集团控股有限公司 Method for authenticating identities, method for opening accounts, devices and systems
CN105320950A (en) * 2015-11-23 2016-02-10 天津大学 A video human face living body detection method
CN106911630A (en) * 2015-12-22 2017-06-30 上海仪电数字技术股份有限公司 Terminal and the authentication method and system of identity identifying method, terminal and authentication center
CN105787428A (en) * 2016-01-08 2016-07-20 上海交通大学 Method for lip feature-based identity authentication based on sparse coding
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN105871900A (en) * 2016-05-24 2016-08-17 邵军利 Identity authentication method and system
US20180019994A1 (en) * 2016-07-18 2018-01-18 Samsung Electronics Co., Ltd. Method of authenticating user and electronic device supporting the same
CN108875461A (en) * 2017-05-16 2018-11-23 深圳市祈飞科技有限公司 A kind of human face in-vivo detection method and device
US20180365512A1 (en) * 2017-06-20 2018-12-20 Nvidia Corporation Equivariant landmark transformation for landmark localization
CN107748876A (en) * 2017-11-06 2018-03-02 杭州有盾网络科技有限公司 Face vivo identification method, device and mobile terminal based on mobile terminal
CN108021892A (en) * 2017-12-06 2018-05-11 上海师范大学 A kind of human face in-vivo detection method based on extremely short video
CN107895158A (en) * 2017-12-07 2018-04-10 朱明君 A kind of mobile terminal that target can be identified
CN108763897A (en) * 2018-05-22 2018-11-06 平安科技(深圳)有限公司 Method of calibration, terminal device and the medium of identity legitimacy
CN109783338A (en) * 2019-01-02 2019-05-21 深圳壹账通智能科技有限公司 Recording method, device and computer equipment based on business information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020233009A1 (en) * 2019-05-23 2020-11-26 平安普惠企业管理有限公司 Identity authentication method and apparatus, computing device, and storage medium

Also Published As

Publication number Publication date
WO2020233009A1 (en) 2020-11-26
CN110247898B (en) 2021-11-19

Similar Documents

Publication Publication Date Title
US9083687B2 (en) Multi-device behavioral fingerprinting
CN110247898A (en) Auth method, device, medium and electronic equipment
CN107077551B (en) Scalable authentication process selection based on sensor input
JP2022532677A (en) Identity verification and management system
CN107707970B (en) A kind of electronic contract signature method, system and terminal
US20160269411A1 (en) System and Method for Anonymous Biometric Access Control
CN106487762B (en) user identity recognition method, identity recognition application client and server
US20190236249A1 (en) Systems and methods for authenticating device users through behavioral analysis
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
JP2018092122A (en) Method and apparatus for user authentication
US20160132866A1 (en) Device, system, and method for creating virtual credit card
US10635887B2 (en) Manual signature authentication system and method
CN105592014B (en) A kind of trusted terminal verification method, device
IL257013A (en) System and method for validating authorship of an electronic signature session
CN107038784B (en) Safe verification method and device
US20170103397A1 (en) Video identification method and computer program product thereof
CN109039990A (en) The method and device of behavior verifying is carried out based on identifying code
CN109670413A (en) Face living body verification method and device
US10970370B2 (en) Method and system for creating a strong authentication for a user using a portable electronic device
US20130106916A1 (en) Drag and drop human authentication
CN109977839A (en) Information processing method and device
CN109934191A (en) Information processing method and device
CN110324314A (en) User registering method and device, storage medium, electronic equipment
WO2015103970A1 (en) Method, apparatus and system for authenticating user
US10270771B1 (en) Mid-session live user authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 201, room 518000, building A, No. 1, front Bay Road, Qianhai Shenzhen Guangdong Shenzhen Hong Kong cooperation zone (Qianhai business secretary)

Applicant after: Pingan Pu Hui Enterprise Management Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A

Applicant before: Pingan Pu Hui Enterprise Management Co., Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant