CN110311788A - Auth method, device, electronic equipment and readable medium - Google Patents

Auth method, device, electronic equipment and readable medium Download PDF

Info

Publication number
CN110311788A
CN110311788A CN201910577146.5A CN201910577146A CN110311788A CN 110311788 A CN110311788 A CN 110311788A CN 201910577146 A CN201910577146 A CN 201910577146A CN 110311788 A CN110311788 A CN 110311788A
Authority
CN
China
Prior art keywords
data
user information
target object
feedback data
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910577146.5A
Other languages
Chinese (zh)
Inventor
颜文靖
张思维
阙成涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN201910577146.5A priority Critical patent/CN110311788A/en
Publication of CN110311788A publication Critical patent/CN110311788A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The disclosure provides a kind of auth method, device, electronic equipment and readable medium, this method comprises: obtaining the user information of the target object of client identification;Being extracted based on the user information puts question to data to be sent to the client;The client end response is received in the feedback data for puing question to data;Authentication is carried out to the target object according to the feedback data and the user information and background user information, wherein auth method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.Auth method, device, electronic equipment and the readable medium of the disclosure, it is generated by user information and puts question to data, and authentication is carried out in the feedback data for puing question to data and the user information according to response, it can be improved the suitability, accuracy and reliability of auth method.

Description

Auth method, device, electronic equipment and readable medium
Technical field
This disclosure relates to field of computer technology more particularly to a kind of auth method, device, electronic equipment and calculating Machine readable medium.
Background technique
In the scene for needing to verify identity, it usually needs carry out In vivo detection.In the related technology, for In vivo detection Scheme usually has: the modes such as online picture In vivo detection, video In vivo detection, motion information detection, offline infrared In vivo detection.
However, the relevant technologies are overly dependent upon the surface features analysis of sound, video, gradually develop in digital synthesis technology The testing result of today, such as technology of changing face, the relevant technologies will lose its validity.In addition, partly depending in the related technology Three-dimensional face information, for acquiring the depth camera higher cost of three-dimensional information, and chip performance is more demanding, causes its general And degree is lower, is unable to satisfy on commonly used equipment the demand that (such as mobile phone) carries out authentication.
Therefore, it is necessary to a kind of new auth method, device, electronic equipment and computer-readable mediums.
Above- mentioned information are only used for reinforcing the understanding to the background of the disclosure, therefore it disclosed in the background technology part It may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
In view of this, the disclosure provides a kind of auth method, device, electronic equipment and computer-readable medium, lead to It crosses user information and generates enquirement data, and carry out body in the feedback data for puing question to data and the user information according to response Part verifying, can be improved the suitability, accuracy and reliability of auth method.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
According to the first aspect of the embodiments of the present disclosure, a kind of auth method is proposed, this method comprises: obtaining client The user information of the target object of mark;Being extracted based on the user information puts question to data to be sent to the client;Receive institute Client end response is stated in the feedback data for puing question to data;According to the feedback data and the user information to the target Object carries out authentication, wherein auth method includes that inquiry logic verifying, reaction time verifying and facial characteristics are tested Card.
In a kind of exemplary embodiment of the disclosure, the method also includes: according to enquirement data and described anti- Present the answer reaction time of target object described in data acquisition;If the answer reaction time is greater than the normal of the enquirement data Reaction time, then authentication result is not pass through.
In a kind of exemplary embodiment of the disclosure, the method also includes: if the answer reaction time is greater than institute The normal reaction time for puing question to data is stated, then suspicious finger is determined according to the answer reaction time and the normal reaction time Number;If the suspicious index is greater than suspicious threshold value, authentication result is not pass through.
In a kind of exemplary embodiment of the disclosure, is generated based on the user information and data is putd question to be sent to the visitor Family end includes: at least one the first enquirement video randomly selected under same label from enquirement video database;According to described User information filters out at least one second enquirement video from least one described enquirement video, to generate the enquirement number According to;The enquirement data are sent to the client.
In a kind of exemplary embodiment of the disclosure, the feedback data includes voice feedback data;Wherein, according to institute Stating feedback data and the user information and carrying out authentication to the target object includes: to carry out to the voice feedback data Speech recognition, to generate text feedback data;The text feedback data is carried out content with the user information to compare and patrol It collects and compares, to carry out authentication to the target object.
In a kind of exemplary embodiment of the disclosure, the feedback data includes video feed data;Wherein, according to institute Stating feedback data and carrying out authentication to the target object with the user information includes: to mention from the video feed data It takes image information and carries out Face datection, to obtain at least one facial image;Table is carried out at least one described facial image Feelings identification, with the expression type of the determination face;When the expression type is first kind expression, it is based on the user information Generating the update different from the enquirement data puts question to data to be sent to the client;The client end response is received in described The update feedback data for puing question to data is updated, and according to the update feedback data and the user information to the target object Carry out authentication.
In a kind of exemplary embodiment of the disclosure, the method also includes: obtain client includes target object Face video information;At least one image is extracted from the video information;Face is carried out at least one described image Detection;When not detecting face, the video information of the face comprising the target object of client is obtained again.
According to the second aspect of an embodiment of the present disclosure, a kind of authentication means are proposed, which includes: acquisition of information mould Block obtains the user information of the target object of client;Data transmission blocks are putd question to, user is based on the user information and mentions Ask that data are sent to the client;Feedback data receiving module, for receiving the client end response in the enquirement data Feedback data;Authentication module, for being carried out according to the feedback data and the user information to the target object Authentication, wherein auth method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
According to the third aspect of an embodiment of the present disclosure, a kind of electronic equipment is proposed, which includes: one or more Processor;Storage device, for storing one or more programs;When one or more of programs are by one or more of places It manages device to execute, so that one or more of processors realize auth method described in any of the above embodiments.
According to a fourth aspect of embodiments of the present disclosure, it proposes a kind of computer-readable medium, is stored thereon with computer journey Sequence, which is characterized in that auth method as described in any one of the above embodiments is realized when described program is executed by processor.
According to disclosure some embodiments provide auth method, device, electronic equipment and computer-readable medium, It is generated according to user information and puts question to data and send it to client, can be adapted to according to the generation of user information with the user Enquirement data;By that data will be putd question to be sent to client, the interaction with target object can be realized;Receiving client After feedback data in response to puing question to data, authentication can be carried out to target object based on feedback data and user information, Improve the accuracy and reliability of authentication.The auth method of the disclosure is generated by user information and puts question to data, And authentication is carried out in the feedback data for puing question to data and the user information according to response, it can be improved authentication Suitability, accuracy and the reliability of method.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited It is open.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.Drawings discussed below is only some embodiments of the present disclosure, For those of ordinary skill in the art, without creative efforts, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is the system block diagram of a kind of auth method and device shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of auth method shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of the auth method shown according to another exemplary embodiment.
Fig. 4 is a kind of flow chart of the auth method shown according to another exemplary embodiment.
Fig. 5 is a kind of block diagram of authentication means shown according to an exemplary embodiment.
Fig. 6 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Fig. 7 is that a kind of computer readable storage medium schematic diagram is shown according to an exemplary embodiment.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will be comprehensively and complete It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure Same or similar part, thus repetition thereof will be omitted.
Described feature, structure or characteristic can be incorporated in one or more embodiments in any suitable manner In.In the following description, many details are provided to provide and fully understand to embodiments of the present invention.However, It will be appreciated by persons skilled in the art that technical solution of the present invention can be practiced and omit it is one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy each aspect of the present invention.
Attached drawing is only schematic illustrations of the invention, and identical appended drawing reference indicates same or similar part in figure, because And repetition thereof will be omitted.Some block diagrams shown in the drawings not necessarily must with it is physically or logically independent Entity is corresponding.These functional entitys can be realized using software form, or in one or more hardware modules or integrated electricity These functional entitys are realized in road, or these function are realized in heterogeneous networks and/or processor device and/or microcontroller device It can entity.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and step, nor It must be executed by described sequence.For example, the step of having can also decompose, and the step of having can merge or part merges, Therefore the sequence actually executed is possible to change according to the actual situation.
Example embodiment of the present invention is described in detail with reference to the accompanying drawing.
Fig. 1 is the system block diagram of a kind of auth method and device shown according to an exemplary embodiment.
Server 105 can be to provide the server of various services, such as utilize terminal device 101,102,103 to user The authentication system operated provides the back-stage management server (merely illustrative) supported.Back-stage management server can be with Analyze etc. processing to data such as the authentication requests received, and by processing result (such as authentication result -- only For example) feed back to terminal device.
Server 105 can for example obtain the user information of the target object of client;Server 105 can be for example based on described User information, which is extracted, puts question to data to be sent to the client;Server 105 can for example receive the client end response in described Put question to the feedback data of data.Server 105 can be for example according to the feedback data and the user information to the target pair As carrying out authentication, wherein auth method includes that inquiry logic verifying, reaction time verifying and facial characteristics are tested Card.
Server 105 can be the server of an entity, also may be, for example, that multiple servers form, in server 105 A part can will execute authentication order for obtaining for example as the authentication task submission system in the disclosure Task;And a part in server 105 can also be for example as the authentication system in the disclosure, for obtaining client The user information of the target object at end;Being extracted based on the user information puts question to data to be sent to the client;Receive institute Client end response is stated in the feedback data for puing question to data;According to the feedback data and the user information to the target Object carries out authentication, wherein auth method includes that inquiry logic verifying, reaction time verifying and facial characteristics are tested Card.
According to the auth method and device of the disclosure, generated by user information and put question to data, and according to response in The feedback data for puing question to data and the user information carry out authentication, can be improved the adaptation of living body authentication Property, accuracy and reliability.
Fig. 2 is a kind of flow chart of auth method shown according to an exemplary embodiment.The embodiment of the present disclosure mentions The auth method of confession can by arbitrarily having an execution of the electronic equipment of calculation processing ability, such as terminal device 101,102, 103 and/or server 105 be illustrated so that server executes the method as an example in the following embodiments, but this It is open that it's not limited to that.Auth method 20 may include step S202 to S208.
As shown in Fig. 2, obtaining the user information of the target object of client in step S202.
Wherein, the client such as mobile phone, the computer configured with camera can be used for shooting video information.It can be according to visitor It is corresponding that the mark (such as user user name) used when logging in the client at family end extracts its from User Information Database User information.User information can be such as, but not limited to name, age, the Chinese zodiac, birthplace, ownership place, registration cell-phone number, registration Mailbox, pre-set close breath information-preserving etc..The corresponding use of user's unique identification that user information can be bound according to client identification Family information obtains the corresponding user of the user for example, can extract from the customer data base of server-side according to user's unique identification Information.
In one embodiment, the video information of the face comprising target object of client can also be obtained;From the view At least one image is extracted in frequency information;Face datection is carried out at least one described image;When not detecting face, then The video information of the secondary face comprising the target object for obtaining client.It wherein, can be in visitor when obtaining video information again Family end shows voice messaging or text information, includes described to obtain again to prompt the target object face camera It can succeed when the video information of the face of target object.
In one embodiment, also In vivo detection can be carried out to the target object according to the video information, with verifying Whether the target object is true man.Biopsy method can be such as, but not limited to: motion information detection method, three-dimensional structure Light biopsy method, offline near-infrared biopsy method etc..For example, face-image letter can be extracted based on the video information Breath, to verify whether the target object is living object.Specifically, the video information can be split, it is more to obtain A image;Face datection is carried out to described multiple images, to obtain multiple facial images;Detect the mesh of the multiple facial image Cursor position point;The target is verified according to the variation track of the source location of the multiple facial image and the action command Whether object is living object.Wherein, it is detected by the motion information of the source location to facial image.For example, if Command information is blink, includes eye position information in source location.Multiple facial images are sorted with time shaft.Can by pair Than the variation track of eye position information in multiple facial images, whether the variation track reserved with blink instruction is consistent, to test Demonstrate,prove whether the target object is living object.
In step S204, is extracted based on the user information and data is putd question to be sent to the client.
Wherein, it puts question to data to be used to put question to user, and receives the answer of user feedback.
In one embodiment, put question to data may be, for example, video format enquirement data, and can by client into Row is played to put question to user.For example, the enquirement video with pervasive degree can be recorded in advance.Put question to the subject of question of video can example Such as with the age, the Chinese zodiac, birthplace, ownership place, registration cell-phone number, registration mailbox, pre-set close breath essential information information-preserving It is related.The question formulation for puing question to video may be, for example, closed enquirement, for example, age-related question formulation may be, for example: Does is your age 30 years old? by using the question formulation of closed enquirement, the answer of user feedback is "Yes" or "no", It can reduce the difficulty of the answer of processing user feedback, and then help to improve recognition accuracy.The enquirement data of the application are simultaneously Be not limited with the enquirement data of video format, can be also the enquirement data of written form or audio form, and can by Client is shown to put question to user.
In one embodiment, can from put question to be randomly selected in video database at least one under same label first mention Ask video;At least one second enquirement video is filtered out from least one described enquirement video according to the user information, with Generate the enquirement data;The enquirement data are sent to the client.Wherein, multiple first can be prerecorded and put question to view Frequency collects.First in video set can be putd question to put question to the same label of video configuration for every one first.For example, can be recorded by same personnel Multiple first put question to video, and can record for the personnel multiple first put question to the same label of video configuration;It can be different personnel The the first enquirement video set recorded configures different labels.In another example the subject of question putd question in video under each label Can be it is identical, i.e., shaped like: " your age is 30 years old? " the problem of corresponding one first enquirement under each label Video.
In one embodiment, it puts question in each video in video database, may include mentioning on a small quantity after enquirement It asks dynamic video when personnel's silencing, client can be made when playing enquirement video, make to audit online true to nature.
Second enquirement its subject of question of video that screening obtains is matched with user information.For example, it is described at least Include in one enquirement video: problem 1, " your age is 30 years old? ", problem 2, " your Chinese zodiac is mouse? ", problem 3 " your birthplace is Beijing? " if lacking the birthplace information of the user in the user information of a certain user, in life At the user enquirement data when, problem 3 corresponding first can be deleted and put question to video, and by problem 1 and problem 2 corresponding first Put question to video as at least one the second enquirement video.
In step S206, the client end response is received in the feedback data for puing question to data.
Wherein, feedback data can be user when operating client progress authentication, put question to the content of data in viewing When the information fed back.Client can include the video of the face of active user by recording as feedback data, can also pass through The acoustic information of user's answer is recorded as feedback data, or even also can receive user and made by the text information that client inputs For the feedback data, the disclosure is not construed as limiting the acquisition form of feedback data.
In step S208, identity is carried out to the target object with the user information according to the feedback data and is tested Card, wherein auth method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
Wherein, it is whether consistent with user information that feedback data can be compared, if so, authentication result passes through, otherwise not Pass through.
In one embodiment, the method, which may also include that, obtains institute according to the enquirement data and the feedback data State the answer reaction time of target object;If described reply the reaction time greater than the normal reaction time threshold for puing question to data Value, then authentication result is not pass through.Wherein, replying the reaction time is to learn the content for puing question to data from target object Afterwards, to the time answered a question.Reaction time threshold value can rule of thumb data be configured.For example, collecting normal response feelings Multiple feedback data under condition, and the reaction time for replying in multiple feedback data is counted, further according in multiple video datas The reaction time for replying determines reaction time threshold value.If target object is not living object, answer in answer to a question Reaction time will be longer.The present embodiment can be judged by the length in the answer reaction time of target object target object whether be Living object.
In one embodiment, if the method may also include that the answer reaction time is greater than the enquirement data Normal reaction time threshold then determines suspicious index according to the answer reaction time and the normal reaction time threshold;If The suspicious index is greater than suspicious threshold value, then authentication result is not pass through.Wherein, suspicious index can be calculated according to the following formula: Suspicious index=answer reaction time-normal reaction time threshold.Suspicious threshold value is to judge whether the identity of target object can be with Relaxation index.When suspicious index is greater than suspicious threshold value, it is believed that the answer reaction time is noticeably greater than the normal reaction time, confirms institute The authentication result for stating target object is not pass through.
In one embodiment, the feedback data may include voice feedback data;Can to the voice feedback data into Row speech recognition, to generate text feedback data;By the text feedback data and the user information carry out content compare with Logic compares, to carry out authentication to the target object.Wherein, voice feedback data can answer "Yes", "No" for user Audio-frequency information.Can by speech recognition to text feedback data and user information carry out content and compare to compare with logic to test Whether the answer for demonstrate,proving target object is correct.
In one embodiment, the feedback data may include video feed data;It can be from the video feed data It extracts image and carries out Face datection, to obtain at least one facial image;Expression is carried out at least one described facial image Identification, with the expression type of the determination face;It is raw based on the user information when the expression type is first kind expression Data are putd question to be sent to the client at the update different from the enquirement data;Receive the client end response in it is described more The new update feedback data for puing question to data, and according to the updates feedback data and the user information to the target object into Row authentication.Wherein, video feed data can record facial state of the target object when answering.Expression Recognition algorithm can be known Other expression is for example glad, it is angry, surprised, fear, sadness etc..First kind expression refers to that target object in answer to a question, only exists Be easy the expression betrayed when being intended in the presence of deception, such as fear, is surprised etc..When expression type is first kind expression, to mesh It marks whether object is that target user holds the suspicious attitude, data can be putd question to mention target object again by sending to update again It asks.And described update puts question to the subject of question of data can be different from enquirement data above-mentioned.
According to the auth method that disclosure embodiment provides, is generated according to user information and put question to data and sent out It send to client, the enquirement data that can be adapted to according to the generation of user information with the user;By that data will be putd question to be sent to Client can be realized the interaction with target object;Client end response is being received after the feedback data for puing question to data, it can Authentication is carried out to target object based on feedback data and user information, improves the accuracy and reliability of authentication. The auth method of the disclosure is generated by user information and puts question to data, and according to response in the feedback coefficient for puing question to data Authentication is carried out according to the user information, can be improved the suitability, accuracy and reliability of auth method.
It will be clearly understood that the present disclosure describes how to form and use particular example, but the principle of the disclosure is not limited to These exemplary any details.On the contrary, the introduction based on disclosure disclosure, these principles can be applied to many other Embodiment.
Fig. 3 is a kind of flow chart of the auth method shown according to another exemplary embodiment.Auth method 30 may include step S302 to S318.
As shown in figure 3, in step s 302, obtaining the image information and user information of the face comprising target object.Its In, can by client receive image information, for example, client obtain comprising target object face video information after, It therefrom intercepts multiple and includes the picture of face, and be integrated into image information.User information be, for example, current target object wish into The registration information of user of row verifying, backstage user information database (associated with the identity coding of user accurate my information) Middle acquisition can inquiry message.
In step s 304, Face datection is carried out to image information.Wherein, the face in Face datection detectable image into Row source location.
In step S306, judge whether to detect face.If so, executing step S308, otherwise it re-execute the steps S304。
In step S308, prompt information is sent to client.Prompt information is informed for being shown to target object It will carry out enquirement verification by true man's line.
In step s310, the video set of a certain personnel's version is randomly choosed.Wherein, multiple personnel's versions can be prerecorded Enquirement video set, subject of question may include the basic question information such as year, the Chinese zodiac, ownership place, birthplace.In each enquirement video In, it also may include that (user plays a small amount of dynamic video putd question to when personnel's silencing when answering, and makes to audit online and force after enquirement Very).Put question to video in propose the problem of can be alternative closed question, such as: " your age is 30 years old? ", return Answering option includes: "Yes", "no".
In step S312, according to user information with video set generation for the enquirement video subset of target object, and Randomly choosing at least one in enquirement video subset puts question to video to be sent to client.Wherein, the enquirement in video subset is putd question to Content can be the question information to match with user information.Meanwhile it can also be generated to put question in video subset according to user information and mentioned Ask the model answer of content.For example, age of user is 30 years old in user information.Put question to a certain enquirement for puing question to video in sub-video Content are as follows: " your age is 30 years old? ", then corresponding model answer of enquirement video are as follows: "Yes".Model answer can be used for Logic in step S316 compares.
In step S314, the feedback data of client is received.Wherein, feedback data is to put question to regard in response at least one The feedback data of frequency.
In step S316, logic checking is carried out to user information and feedback data, to generate authentication result.Its In, feedback data may include the voice messaging that target object is answered.It can be by being identified to voice messaging, to obtain text lattice The feedback data of formula.
In step S318, judge whether the answer reaction time in feedback data is less than normal reaction time threshold, with Carry out reaction time verifying.If so,
In step s 320, Expression Recognition is carried out based on feedback information and obtains expression type, and whether judge expression type For first kind expression, to complete facial signature verification.
In step S322, logic-based verification result, reaction time verification result and facial characteristics verification result are raw At authentication result.
In one embodiment, if logic checking result, reaction time verification result, in facial characteristics verification result at least Have one for by when, can confirm authentication result be pass through.In another example (such as being related in the stronger business scenario of privacy Important operations such as financial contact, bank card binding etc.), if logic checking result, reaction time verification result, facial characteristics are verified Result is to pass through, and can confirm that authentication result is to pass through.
In one embodiment, logic checking result, reaction time verification result, facial characteristics verification result can be inputted mind Through network model, to confirm verification result according to the output of neural network model.
In one embodiment, if logic checking result, reaction time verification result, in facial characteristics verification result at least One verification result is not pass through, and can calculate suspicious index according at least one verification result, be greater than in suspicious index suspicious When threshold value, confirmation authentication result is not pass through.
For example, reaction time verification result is not pass through with facial characteristics verification result if logic checking result is to pass through, Reaction time suspicious index can be calculated according to the mode for replying reaction time-normal reaction time threshold;For first kind table Multiple expressions in feelings assign the suspicious index of expression, the suspicious index of expression to determine current label type.It can be by the reaction time Suspicious index is added the final suspicious index to determine target object with the suspicious index of expression.It is greater than in final suspicious index suspicious When threshold value, confirmation authentication result is not pass through, and otherwise authentication result is to pass through.Wherein, small in final suspicious index When being equal to suspicious threshold value, the update different from the enquirement data can be also generated based on the user information, data is putd question to send To the client;Receive the client end response in it is described update put question to data update feedback data, and according to it is described more New feedback data and the user information carry out authentication to the target object.
Fig. 4 is a kind of flow chart of the auth method shown according to another exemplary embodiment.
As shown in figure 4, above-mentioned steps S318 may further include following steps in the embodiment of the present invention.
In step S3182, speech recognition is carried out to acquired video, obtains the text information in video.
In step S3184, is extracted in text information and obtain user's answer information.Wherein, text information may include Interfere text, such as the redundant information etc. that the misrecognition of environmental noise, user are answered.Interference information can be rejected by extracting, It obtains user and answers information.
In step S3186, the accurate information in person of user is extracted in user information database.
In step S3188, answers user to information and be compared with my accurate information, detection information similarity, with Authentication is carried out to the user.
According to the auth method that disclosure embodiment provides, target pair is obtained by closed question question formulation The voice messaging of elephant, and logic verify is carried out based on voice messaging of the user information to target object, it is able to verify that target object Identity.
According to disclosure embodiment provide auth method, by inform target object will carry out true line into Row, which is putd question to, to be verified, and can be applied pressure to the target object of improper identity, effectively be rejected cheating user, increase authentication Accuracy.
According to the auth method that disclosure embodiment provides, the registration information and back-end data of user can be passed through Whether the relevant identity for puing question to test-target object is target user.
It, can also be by replying reaction time test-target object according to the auth method that disclosure embodiment provides Identity whether be living object, enhance the reliability of inspection result.
It will be appreciated by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as by centre Manage the computer program that device CPU is executed.When the computer program is executed by central processor CPU, execute what the disclosure provided Above-mentioned function defined by the above method.The program can store in a kind of computer readable storage medium, the storage Medium can be read-only memory, disk or CD etc..
Further, it should be noted that above-mentioned attached drawing is only the place according to included by the method for disclosure exemplary embodiment Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these The time sequencing of reason.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 5 is a kind of block diagram of authentication means shown according to an exemplary embodiment.Referring to Fig. 5, authentication Device 50 may include: data obtaining module 502, put question to data transmission blocks 504, feedback data receiving module 506 and body Part authentication module 508.
In the authentication means, data obtaining module 502 can be used for obtaining the user of the target object of client identification Information.
In one embodiment, data obtaining module 502 can also be used in the face comprising target object for obtaining client Video information;At least one image is extracted from the video information;Face datection is carried out at least one described image;? When not detecting face, the video information of the face comprising the target object of client is obtained again.
In one embodiment, data obtaining module 502 can also be used according to the video information to the target object In vivo detection is carried out, to verify whether the target object is true man.Biopsy method can be such as, but not limited to: movement letter Cease detection method, three-dimensional structure light biopsy method, offline near-infrared biopsy method etc..
It puts question to data transmission blocks 504 to can be used for extracting enquirement data based on the user information and is sent to the client End.
In one embodiment, data transmission blocks 504 is putd question to can be used for from enquirement video database randomly selecting together At least one first enquirement video under one label;It is filtered out from least one described enquirement video according to the user information At least one second enquirement video, to generate the enquirement data;The enquirement data are sent to the client.
Feedback data receiving module 506 can be used for receiving the client end response in the feedback data for puing question to data.
Authentication module 508 can be used for carrying out the target object according to the feedback data and the user information Authentication, wherein auth method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
In one embodiment, authentication module 508 can be used for being obtained according to the enquirement data and the feedback data Take the answer reaction time of the target object;If described reply the reaction time greater than the normal reaction time for puing question to data Threshold value, then authentication result is not pass through.
In one embodiment, if authentication module 508 can be used for the answer reaction time greater than the enquirement number According to normal reaction time threshold, then suspicious finger is determined according to the answer reaction time and the normal reaction time threshold Number;If the suspicious index is greater than suspicious threshold value, authentication result is not pass through.
In one embodiment, the feedback data may include voice feedback data.Authentication module 508 can be used for pair The voice feedback data carry out speech recognition, to generate text feedback data;By the text feedback data and the user Information carries out content comparison and logic, to carry out authentication to the target object.
In one embodiment, the feedback data may include video feed data.Authentication module 508 can be used for from Image is extracted in the video feed data and carries out Face datection, to obtain at least a facial image;To it is described at least one Facial image carries out Expression Recognition, with the tag types of the determination face;When the expression type is first kind expression, then Generating the update different from the enquirement data based on the user information puts question to data to be sent to the client;Described in reception Client end response is believed in the update feedback data for updating enquirement data, and according to the update feedback data and the user Breath carries out authentication to the target object.
According to the authentication means that disclosure embodiment provides, is generated according to user information and put question to data and sent out It send to client, the enquirement data that can be adapted to according to the generation of user information with the user;By that data will be putd question to be sent to Client can be realized the interaction with target object;Client end response is being received after the feedback data for puing question to data, it can Based on feedback data and user information verifying target object whether be living object, improve authentication accuracy and Reliability.The auth method of the disclosure is generated by user information and puts question to data, and according to response in the enquirement data Feedback data and the user information carry out authentication, can be improved the suitability of auth method, accuracy with can By property.
Fig. 6 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
The electronic equipment 200 of this embodiment according to the disclosure is described referring to Fig. 6.The electronics that Fig. 6 is shown Equipment 200 is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in fig. 6, electronic equipment 200 is showed in the form of universal computing device.The component of electronic equipment 200 can wrap It includes but is not limited to: at least one processing unit 210, at least one storage unit 220, (including the storage of the different system components of connection Unit 220 and processing unit 210) bus 230, display unit 240 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 210 Row, so that the processing unit 210 executes described in this specification above-mentioned electronic prescription circulation processing method part according to this The step of disclosing various illustrative embodiments.For example, the processing unit 210 can be executed such as Fig. 2, Fig. 3, shown in Fig. 4 The step of.
The storage unit 220 may include the readable medium of volatile memory cell form, such as random access memory Unit (RAM) 2201 and/or cache memory unit 2202 can further include read-only memory unit (ROM) 2203.
The storage unit 220 can also include program/practical work with one group of (at least one) program module 2205 Tool 2204, such program module 2205 includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 200 can also be with one or more external equipments 300 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 200 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 200 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 250.Also, electronic equipment 200 can be with By network adapter 260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.Network adapter 260 can be communicated by bus 230 with other modules of electronic equipment 200.It should Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 200, including but unlimited In: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and number According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server or network equipment etc.) executes the above method according to disclosure embodiment.
Fig. 7 schematically shows a kind of computer readable storage medium schematic diagram in disclosure exemplary embodiment.
Refering to what is shown in Fig. 7, describing the program product for realizing the above method according to embodiment of the present disclosure 400, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, the program product of the disclosure is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by one When the equipment executes, so that the computer-readable medium implements function such as: obtaining the user information of the target object of client; Being extracted based on the user information puts question to data to be sent to the client;The client end response is received in the enquirement data Feedback data;Authentication is carried out to the target object according to the feedback data and the user information, wherein identity Verification method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, it can also Uniquely it is different from one or more devices of the present embodiment with carrying out corresponding change.The module of above-described embodiment can be merged into One module, can also be further split into multiple submodule.
By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implemented according to the disclosure The technical solution of example can be embodied in the form of software products, which can store in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a calculating equipment (can To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present disclosure.
It is particularly shown and described the exemplary embodiment of the disclosure above.It should be appreciated that the present disclosure is not limited to Detailed construction, set-up mode or implementation method described herein;On the contrary, disclosure intention covers included in appended claims Various modifications and equivalence setting in spirit and scope.

Claims (10)

1. a kind of auth method characterized by comprising
Obtain the user information of the target object of client identification;
Being extracted based on the user information puts question to data to be sent to the client;
The client end response is received in the feedback data for puing question to data;
Authentication is carried out to the target object according to the feedback data and the user information, wherein authentication side Method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
2. the method as described in claim 1, which is characterized in that further include:
The answer reaction time of the target object is obtained according to the enquirement data and the feedback data;
If described reply the reaction time greater than the normal reaction time threshold for puing question to data, authentication result is obstructed It crosses.
3. method according to claim 2, which is characterized in that further include:
If described reply the reaction time greater than the normal reaction time threshold for puing question to data, when reacting according to the answer Between with the normal reaction time threshold determine suspicious index;
If the suspicious index is greater than suspicious threshold value, authentication result is not pass through.
4. the method as described in claim 1, which is characterized in that put question to data to be sent to based on user information generation described Client includes:
At least one first enquirement video under same label is randomly selected from enquirement video database;
At least one second enquirement video is filtered out from least one described enquirement video according to the user information, to generate The enquirement data;
The enquirement data are sent to the client.
5. the method as described in claim 1, which is characterized in that the feedback data includes voice feedback data;Wherein, according to The feedback data carries out authentication to the target object with the user information
Speech recognition is carried out to the voice feedback data, to generate text feedback data;
The text feedback data and the user information carried out content compare to compare with logic, with to the target object into Row authentication.
6. the method as described in claim 1, which is characterized in that the feedback data includes video feed data;Wherein, according to The feedback data carries out authentication to the target object with the user information
Image information is extracted from the video feed data and carries out Face datection, to obtain at least one facial image;
Expression Recognition is carried out at least one described facial image, with the expression type of the determination face;
When the expression type is first kind expression, the update different from the enquirement data is generated based on the user information Data are putd question to be sent to the client;
The client end response is received in the update feedback data for updating enquirement data, and according to the update feedback data Authentication is carried out to the target object with the user information.
7. the method as described in claim 1, which is characterized in that further include:
Obtain the video information of the face comprising target object of client;
At least one image is extracted from the video information;
Face datection is carried out at least one described image;
When not detecting face, the video information of the face comprising the target object of client is obtained again.
8. a kind of authentication means characterized by comprising
Data obtaining module obtains the user information of the target object of client identification;
Data transmission blocks are putd question to, user is based on user information extraction and data is putd question to be sent to the client;
Feedback data receiving module, for receiving the client end response in the feedback data for puing question to data;
Authentication module carries out identity to the target object for verifying according to the feedback data and the user information Verifying, wherein auth method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
9. a kind of electronic equipment characterized by comprising
One or more processors;And
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-7.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed The method as described in any in claim 1-7 is realized when device executes.
CN201910577146.5A 2019-06-28 2019-06-28 Auth method, device, electronic equipment and readable medium Pending CN110311788A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910577146.5A CN110311788A (en) 2019-06-28 2019-06-28 Auth method, device, electronic equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910577146.5A CN110311788A (en) 2019-06-28 2019-06-28 Auth method, device, electronic equipment and readable medium

Publications (1)

Publication Number Publication Date
CN110311788A true CN110311788A (en) 2019-10-08

Family

ID=68079308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910577146.5A Pending CN110311788A (en) 2019-06-28 2019-06-28 Auth method, device, electronic equipment and readable medium

Country Status (1)

Country Link
CN (1) CN110311788A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888864A (en) * 2019-11-27 2020-03-17 北京国腾联信科技有限公司 Automatic user data collection method and device
CN111861240A (en) * 2020-07-27 2020-10-30 深圳前海微众银行股份有限公司 Suspicious user identification method, device, equipment and readable storage medium
CN112637282A (en) * 2020-12-08 2021-04-09 平安普惠企业管理有限公司 Information pushing method and device, computer equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035649A (en) * 2009-09-29 2011-04-27 国际商业机器公司 Authentication method and device
CN106332054A (en) * 2016-10-20 2017-01-11 广东欧珀移动通信有限公司 Method and device for identifying verification in data migration
CN106453206A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verification method and identity verification device
CN106503522A (en) * 2016-10-31 2017-03-15 王福玲 A kind of interactive mode reality people's identity verification scheme based on multimedia messages
US20190066696A1 (en) * 2017-08-29 2019-02-28 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for verifying information
CN109473108A (en) * 2018-12-15 2019-03-15 深圳壹账通智能科技有限公司 Auth method, device, equipment and storage medium based on Application on Voiceprint Recognition
CN109543011A (en) * 2018-10-16 2019-03-29 深圳壹账通智能科技有限公司 Question and answer data processing method, device, computer equipment and storage medium
CN109815665A (en) * 2018-12-25 2019-05-28 深圳供电局有限公司 Identity identifying method and system, electronic equipment, computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035649A (en) * 2009-09-29 2011-04-27 国际商业机器公司 Authentication method and device
CN106453206A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verification method and identity verification device
CN106332054A (en) * 2016-10-20 2017-01-11 广东欧珀移动通信有限公司 Method and device for identifying verification in data migration
CN106503522A (en) * 2016-10-31 2017-03-15 王福玲 A kind of interactive mode reality people's identity verification scheme based on multimedia messages
US20190066696A1 (en) * 2017-08-29 2019-02-28 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for verifying information
CN109543011A (en) * 2018-10-16 2019-03-29 深圳壹账通智能科技有限公司 Question and answer data processing method, device, computer equipment and storage medium
CN109473108A (en) * 2018-12-15 2019-03-15 深圳壹账通智能科技有限公司 Auth method, device, equipment and storage medium based on Application on Voiceprint Recognition
CN109815665A (en) * 2018-12-25 2019-05-28 深圳供电局有限公司 Identity identifying method and system, electronic equipment, computer readable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888864A (en) * 2019-11-27 2020-03-17 北京国腾联信科技有限公司 Automatic user data collection method and device
CN110888864B (en) * 2019-11-27 2022-08-23 北京国腾联信科技有限公司 Automatic user data collection method and device
CN111861240A (en) * 2020-07-27 2020-10-30 深圳前海微众银行股份有限公司 Suspicious user identification method, device, equipment and readable storage medium
CN112637282A (en) * 2020-12-08 2021-04-09 平安普惠企业管理有限公司 Information pushing method and device, computer equipment and storage medium
CN112637282B (en) * 2020-12-08 2023-02-03 平安普惠企业管理有限公司 Information pushing method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
Warden Speech commands: A dataset for limited-vocabulary speech recognition
US20230188521A1 (en) Secure authorization for access to private data in virtual reality
Labayen et al. Online student authentication and proctoring system based on multimodal biometrics technology
CN107077847B (en) Enhancement of key phrase user identification
US10158633B2 (en) Using the ability to speak as a human interactive proof
Liu et al. User evaluation of lightweight user authentication with a single tri-axis accelerometer
Pooyandeh et al. Cybersecurity in the AI-Based metaverse: A survey
US20150347734A1 (en) Access Control Through Multifactor Authentication with Multimodal Biometrics
Blanco‐Gonzalo et al. Performance evaluation of handwritten signature recognition in mobile environments
CN110311788A (en) Auth method, device, electronic equipment and readable medium
Laraba et al. Dance performance evaluation using hidden Markov models
CN101506828A (en) Media identification
CN109887187A (en) A kind of pickup processing method, device, equipment and storage medium
CN106971009A (en) Speech data library generating method and device, storage medium, electronic equipment
Griswold-Steiner et al. Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication
Saeed New directions in behavioral biometrics
El Saddik et al. A novel biometric system for identification and verification of haptic users
CN104965589A (en) Human living body detection method and device based on human brain intelligence and man-machine interaction
Gupta et al. A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes
CN112351047B (en) Double-engine based voiceprint identity authentication method, device, equipment and storage medium
US11928682B2 (en) Methods and systems for generating a unique signature based on user movements in a three-dimensional space
Morrison-Smith et al. Mmgatorauth: a novel multimodal dataset for authentication interactions in gesture and voice
CN115906028A (en) User identity verification method and device and self-service terminal
CN109472518A (en) Sales behavior evaluation method and device, medium and electronic equipment based on block chain
US11462117B2 (en) Creating lesson asset information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: Jingdong Digital Technology Holding Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20191008

RJ01 Rejection of invention patent application after publication