CN113630369A - Identity authentication method, identity authentication device and storage medium - Google Patents

Identity authentication method, identity authentication device and storage medium Download PDF

Info

Publication number
CN113630369A
CN113630369A CN202010380720.0A CN202010380720A CN113630369A CN 113630369 A CN113630369 A CN 113630369A CN 202010380720 A CN202010380720 A CN 202010380720A CN 113630369 A CN113630369 A CN 113630369A
Authority
CN
China
Prior art keywords
vector
vector sequence
information
key
similarity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010380720.0A
Other languages
Chinese (zh)
Other versions
CN113630369B (en
Inventor
金春杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202010380720.0A priority Critical patent/CN113630369B/en
Publication of CN113630369A publication Critical patent/CN113630369A/en
Application granted granted Critical
Publication of CN113630369B publication Critical patent/CN113630369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides an identity authentication method, an identity authentication device and a storage medium, wherein the method comprises the following steps: acquiring and recording a vector sequence which is input by an input device and is used as key information in advance; the vector sequence used as the secret key is generated by the input equipment according to the operation process of the user on the input device for setting the secret key; receiving a vector sequence input by an input device as authentication information; the vector sequence as the authentication information is generated by the input equipment according to the operation process of the user on the input device for identity authentication; and calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information, and determining whether the user is successfully authenticated according to the similarity between the two. The invention can solve the problem of identity authentication in the application scene that the exact input information cannot be controlled.

Description

Identity authentication method, identity authentication device and storage medium
Technical Field
The invention relates to the technical field of video monitoring, in particular to an identity authentication method, an identity authentication device and a storage medium.
Background
In the video monitoring field, the identity authentication mode of a common network hard disk video recorder comprises the following steps: a string key (also known as a key), a graphical gesture key. The identity authentication modes in other fields are more abundant, such as the identity authentication modes of human faces, voiceprints, keys with additional time characteristics and the like.
Patent CN201410549163.5 discloses an identity authentication scheme, which uses a secret key with additional time characteristics to perform identity authentication, and the specific implementation process is as follows: comparing the input character string with the registration character string (namely the secret key), if the input character string and the registration character string are the same, further matching the time input feature model corresponding to the input character string with the time input feature model corresponding to the registration character string (namely the additional time feature), and if the matching is successful, determining that the authentication is successful.
In the above identity authentication scheme, the input character string is required to be an exact value, and the premise that the authentication is successful is that the input character string is the same as the registration character string, however, in some application scenarios, the user cannot ensure that the input information is an exact value, for example, when the user uses the PTZ joystick as an input device, when the user dials the PTZ joystick from the initial position to the right at a specific speed, the operation process triggers the PTZ joystick to generate a vector sequence, and when the user repeats the operation process, a new vector sequence generated by triggering the PTZ joystick again cannot be ensured to be consistent with the previous vector sequence, so that the identity authentication scheme cannot be used for identity authentication.
Disclosure of Invention
In view of the above, the present invention provides an identity authentication method, an identity authentication device, and a storage medium, which can solve the problem of identity authentication in an application scenario where accurate input information cannot be controlled.
In order to achieve the purpose, the invention provides the following technical scheme:
an identity authentication method comprising:
acquiring and recording a vector sequence which is input by an input device and is used as key information in advance; the vector sequence used as the secret key is generated by the input equipment according to the operation process of the user on the input device for setting the secret key;
receiving a vector sequence input by an input device as authentication information; the vector sequence as the authentication information is generated by the input equipment according to the operation process of the user on the input device for identity authentication;
and calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information, and determining whether the user is successfully authenticated according to the similarity between the two.
An identity authentication apparatus comprising: a processor, and a non-transitory computer readable storage medium connected to the processor by a bus;
the non-transitory computer readable storage medium storing one or more computer programs executable by the processor; the processor, when executing the one or more computer programs, implements the steps of:
acquiring and recording a vector sequence which is input by an input device and is used as key information in advance; the vector sequence used as the secret key is generated by the input equipment according to the operation process of the user on the input device for setting the secret key;
receiving a vector sequence input by an input device as authentication information; the vector sequence as the authentication information is generated by the input equipment according to the operation process of the user on the input device for identity authentication;
and calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information, and determining whether the user is successfully authenticated according to the similarity between the two.
A non-transitory computer readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps in the identity authentication method as described above.
According to the technical scheme, in the invention, the vector sequence which is input by the input equipment and is used as the secret key information is obtained in advance; when the user needs to perform identity authentication, the input device can generate a vector sequence serving as authentication information and input the vector sequence into the authentication device by executing an operation process for the identity authentication on the input device, and after the authentication device acquires the vector sequence, whether the user is successfully authenticated can be determined according to a similarity calculation result of the vector sequence and the recorded vector sequence serving as key information. In the application, the information for identity authentication input by the user is not required to be completely consistent with the stored key information, so that the problem of identity authentication in an application scene that the exact input information cannot be controlled can be solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present invention;
fig. 2 is a flowchart of an identity authentication method according to a second embodiment of the present invention;
fig. 3 is a flowchart of an identity authentication method according to a third embodiment of the present invention;
fig. 4 is a flowchart of an identity authentication method according to a fourth embodiment of the present invention;
fig. 5 is a flowchart of an identity authentication method according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of an identity authentication apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present invention, and as shown in fig. 1, the method mainly includes the following steps:
step 101, acquiring and recording a vector sequence which is input by an input device and used as key information in advance; the vector sequence as the key is generated by the input device according to the operation process of the user on the input device for setting the key.
The present embodiment is applicable to an authentication apparatus, which is connected to an input device and can receive various input information of a user from the input device.
In this embodiment, when a user needs to perform key setting, the input device may be operated based on the purpose of the key setting, so that the input device may generate a vector sequence according to an operation process of the user on the input device, and the input device inputs the vector sequence to the authentication apparatus, so that the authentication apparatus records the vector sequence as key information of the user, and performs identity authentication on the user subsequently.
Step 102, receiving a vector sequence which is input by an input device and is used as authentication information; the vector sequence as the authentication information is a vector sequence generated by the input device according to the operation process of the input device for identity authentication by the user.
In this embodiment, when the user needs to perform the identity authentication, the input device may be operated based on the purpose of the identity authentication, so that the input device may generate a vector sequence according to the operation process of the user on the input device, and the input device inputs the vector sequence to the authentication apparatus, so that the authentication apparatus performs the identity authentication on the user using the vector sequence and the previously recorded vector sequence as the key information.
And 103, calculating the similarity between the vector sequence serving as the authentication information and the vector sequence serving as the key information, and determining whether the user is successfully authenticated according to the similarity between the two.
In this embodiment, the user identity is determined according to the similarity between the vector sequence serving as the authentication information and the vector sequence serving as the key information, so that the problem of identity authentication when the input identity authentication information cannot be completely consistent with the key information can be solved.
As can be seen from the method shown in fig. 1, in this embodiment, a vector sequence input by an input device as key information is obtained and recorded in advance, and when a vector sequence input by an input device as authentication information is received, similarity calculation is performed between the vector sequence and the recorded vector sequence as key information, and whether authentication of a user is successful is determined according to the similarity between the vector sequence and the recorded vector sequence.
Referring to fig. 2, fig. 2 is a flowchart of an identity authentication method provided in the second embodiment of the present invention, and as shown in fig. 2, the method mainly includes the following steps:
step 2011, receiving a vector sequence as key information input by the input device; the vector sequence as the key information is generated by the input device according to the operation process of the user on the input device for setting the key.
Step 2012, receiving a vector sequence input by the input device as key confirmation information; the vector sequence as the key confirmation information is generated by the input equipment according to the operation process of the user on the input device for key confirmation.
Step 2013, calculating the similarity between the vector sequence as the key confirmation information and the vector sequence as the key information.
Step 2014, determining whether the similarity between the vector sequence as the key confirmation information and the vector sequence as the key information is greater than a preset threshold, if so, executing step 2015, otherwise, returning to step 2011 for execution.
Step 2015, recording the vector sequence as key information.
The above steps 2011 to 2015 are specific refinements of step 101 shown in fig. 1.
In this embodiment, the user may perform at least two key information inputs to ensure that the key setting is correct, the first time is to input the key information (implemented by step 2011), and the second time is to input the key confirmation information (implemented by step 2012), and if the key information and the key confirmation information are not similar enough (step 2013), the steps 2011 to step 2013 need to be repeatedly performed until the similarity between the key information and the key confirmation information reaches a certain threshold (i.e., a preset threshold). The purpose of this is, on one hand, to confirm the key information set by the user, and on the other hand, to further verify that the user can input the identity authentication information similar to the key information by operating the input device during the subsequent identity authentication.
Step 202, receiving a vector sequence which is input by an input device and is used as authentication information; the vector sequence as the authentication information is a vector sequence generated by the input device according to the operation process of the input device for identity authentication by the user.
Step 203, calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information, and determining whether the user is successfully authenticated according to the similarity between the two.
In this embodiment, the implementation principles of steps 202 to 203 are the same as those of steps 102 to 103 shown in fig. 1, and are not described again.
As can be seen from the method shown in fig. 2, in this embodiment, in addition to solving the problem of authentication in an application scenario in which exact input information cannot be controlled, by receiving a vector sequence as key information and a vector sequence as key confirmation information and performing similarity calculation, on one hand, key information input by a user can be confirmed, and on the other hand, authentication information that is input by the user through operation of an input device and is similar to the key information is verified.
Referring to fig. 3, fig. 3 is a flowchart of an identity authentication method provided by a third embodiment of the present invention, and as shown in fig. 3, the method mainly includes the following steps:
step 3011, receiving a vector sequence as key information input by an input device; the vector sequence as the key information is generated by the input device according to the operation process of the user on the input device for setting the key.
Step 3012, receiving a vector sequence as key confirmation information input by the input device; the vector sequence as the key confirmation information is generated by the input equipment according to the operation process of the user on the input device for key confirmation.
Step 3013, calculate a similarity between the vector sequence as the key confirmation information and the vector sequence as the key information.
Step 3014, determining whether the similarity between the vector sequence as the key confirmation information and the vector sequence as the key information is greater than a preset threshold, if so, executing step 3015, otherwise, returning to step 3011.
The above steps 3011 to 3014 are the same as the implementation principles of steps 2011 to 2014 shown in fig. 2, and are not described again.
Step 3015, record the vector sequence as the key information, and record a similarity between the vector sequence as the key confirmation information and the vector sequence as the key information as a first similarity.
In this embodiment, after determining that the similarity between the vector sequence as the key confirmation information and the vector sequence as the key information is greater than a preset threshold, it is determined that the key information and the key confirmation information are consistent, and the key setting is successful, at this time, in addition to recording the vector sequence as the key information for subsequent user authentication, the similarity between the vector sequence as the key confirmation information and the vector sequence as the key information is also recorded as a first similarity, and this first similarity may also be used for subsequent user authentication.
The above steps 3011 to 3015 are a detailed refinement of step 101 shown in fig. 1.
Step 302, receiving a vector sequence which is input by an input device and is used as authentication information; the vector sequence as the authentication information is a vector sequence generated by the input device according to the operation process of the input device for identity authentication by the user.
The above step 302 is the same as the step 102 shown in fig. 1 and the step 202 shown in fig. 2.
Step 3031, calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information;
step 3032, determining whether the similarity between the vector sequence as the authentication information and the vector sequence as the key information is not less than the first similarity, if so, determining that the user authentication is successful, otherwise, determining that the user authentication is failed.
The above steps 3031-3032 are detailed refinements of the step 103 shown in fig. 1 and the step 203 shown in fig. 2, wherein the step 3032 is one possible implementation method of "determining whether the user is successfully authenticated according to the similarity between the two steps" in the step 103 shown in fig. 1.
In this embodiment, the first similarity recorded by the authentication device in the key setting process of the user is used as a measurement threshold for determining whether the identity authentication information and the key information input by the user are consistent, and the similarity between the identity authentication information and the key information can be successfully authenticated only when the similarity between the identity authentication information and the key information reaches the similarity between the key information and the key confirmation information in the key setting process.
As can be seen from the method shown in fig. 3, in this embodiment, in addition to solving the problem of identity authentication in an application scenario in which exact input information cannot be controlled, by receiving a vector sequence as key information and a vector sequence as key confirmation information and performing similarity calculation, on one hand, the key information input by a user is confirmed, and on the other hand, identity authentication information that the user can input by operating an input device and is similar to the key information is verified; in addition, the embodiment also uses the first similarity to measure whether the user is successfully authenticated, so that the identity authentication accuracy can be improved.
Referring to fig. 4, fig. 4 is a flowchart of an identity authentication method according to a fourth embodiment of the present invention, and as shown in fig. 4, the method mainly includes the following steps:
step 4011, receiving a vector sequence as key information input by an input device; the vector sequence as the key information is generated by the input device according to the operation process of the user on the input device for setting the key.
Step 4012, receiving a vector sequence as key confirmation information input by the input device; the vector sequence as the key confirmation information is generated by the input equipment according to the operation process of the user on the input device for key confirmation.
Step 4013a, performing vector grouping on the vector sequence as the key confirmation information according to a preset time span, determining a representative vector of each group of vectors, and determining a vector sequence composed of the representative vectors of each group of vectors as the representative vector sequence of the vector sequence as the key confirmation information.
In this embodiment, the vectors in the vector sequence include operation action information (hereinafter, denoted by O) and time information (hereinafter, denoted by time); the time information is the time difference of the vector with respect to the first vector in the sequence of vectors. Therefore, the time information in the first vector in each vector sequence is 0.
The following is an example of vector grouping of the vector sequence as the key confirmation information according to a preset time span in this step:
assume that there are 5 vectors in the vector sequence as the key confirmation information, which are S1[ O [ ]1,time1]、S2[O2,time2]、……、S5[O5,time5]Wherein, time1 is 0s, time2 is 0.19s, time3 is 0.25s, time4 is 0.35s, time5 is 0.64s, and the predetermined time span is 0.2s, then 5 vectors in the vector sequence as the key confirmation information can be divided into the following three groups of vectors: a first set of vectors (S1, S2); a second set of vectors (S3, S4); a third set of vectors (NULL); and a fourth set of vectors (S5). NULL in the third set of vectors indicates that the third set of vectors is NULL.
In this embodiment, the operation action information may include at least one action parameter.
In this step 4013a, determining a representative vector of each group of vectors specifically includes the following steps:
s11, carrying out weighted average on each motion parameter contained in the operation motion information of the group of vectors to obtain a weighted average value of the motion parameter;
s12, determining a mapping value corresponding to the weighted average value of each action parameter according to the segmented mapping function set for each action parameter;
s13, a vector composed of the map values corresponding to the weighted average of the operation parameters is determined as a representative vector of the group of vectors.
In this embodiment, the input device may be a PTZ joystick. When the input device is a PTZ joystick, the operation parameters included in the operation motion information may include the following parameters: a vertical value P, a horizontal value T and a zoom multiple Z. Each vector in the sequence of vectors can be represented as [ O (P, T, Z), time ], or [ P, T, Z, time ].
In step S11, the weighted average of each motion parameter included in the operation motion information of the group of vectors to obtain the weighted average of the motion parameters may specifically include: the mean of P, the mean of T, and the mean of Z in the set of vectors are calculated, respectively.
Taking the above vector sequence S1[ O1, time1], S2[ O2, time2], … …, S5[ O5, time5] as the key confirmation information as an example, assuming that O1 is represented by (P1, T1, Z1) and O2 is represented by (P2, T2, Z2), … …, O5 are represented by (P5, T5, Z5), after grouping this vector sequence according to a preset time span, the average value of P, the average value of T, and the average value of Z of each group of vectors can be calculated, respectively, after grouping the vector sequence into a first group of vectors (S1, S2), a second group of vectors (S3, S4), a third group of vectors (NULL), and a fourth group of vectors (S5). Taking the first set of vectors (S1, S2) as an example, the average value of P in the set of vectors is (P1+ P2)/2; the average value of T is (T1+ T2)/2, and the average value of Z is (Z1+ Z2)/2.
In step S12, the segment mapping function set for each operation parameter is: the value range of the action parameter is divided into a plurality of sections, and each divided value range corresponds to a mapping function of a unique mapping value.
For example, the following segment mapping function may be set for the action parameter P, T, Z:
the segment mapping function set for the motion parameter P is
Figure BDA0002481863150000101
The segment mapping function set for the action parameter T is
Figure BDA0002481863150000102
For actionsThe piecewise mapping function set by the parameter Z is
Figure BDA0002481863150000103
In this embodiment, determining a mapping value corresponding to the weighted average value of each action parameter according to a piecewise mapping function set for the action parameter specifically includes: and determining the value range to which the weighted average value of the action parameter belongs, and determining the unique mapping value corresponding to the value range as the mapping value corresponding to the weighted average value of the action parameter.
For example, assuming that in the first set of vectors (S1, S2), the average value of P is 35, the average value of T is 10, and the average value of Z is 15, the average value 25 of P may be mapped to 1 according to the function f (P), the average value 10 of T may be mapped to 0 according to the function f (T), and the average value 15 of Z may be mapped to 1 according to the function f (Z). Thus, according to the above step S13, the representative vector of the first group of vectors (S1, S2) is (1, 0, 1).
Step 4013b, performing vector grouping on the vector sequence as the key information according to a preset time span, determining a representative vector of each group of vectors, and determining a vector sequence composed of the representative vectors of each group of vectors as the representative vector sequence of the vector sequence as the key information.
The implementation principle of this step 4013b is the same as that of the step 4012a, and is not described again.
Step 4013c determines a similarity between the representative vector sequence of the vector sequence as the key confirmation information and the representative vector sequence of the vector sequence as the key information, and determines the similarity as a similarity between the vector sequence as the key confirmation information and the vector sequence as the key information.
In this embodiment, the method for determining the similarity between the representative vector sequence of the vector sequence as the key confirmation information and the representative vector sequence of the vector sequence as the key information includes:
and if the representative vector sequence of the vector sequence as the key confirmation information is the same as the representative vector sequence of the vector sequence as the key information, determining that the similarity of the two is 1, otherwise, determining that the similarity of the two is 0.
The above steps 4013a to 4013c are specific refinements of step 2013 shown in fig. 2 and step 3013 shown in fig. 3.
Step 4014, determining whether the similarity between the vector sequence used as the key confirmation information and the vector sequence used as the key information is greater than a preset threshold, if yes, executing step 4015, otherwise, returning to step 4011 for execution.
And 4015, recording the vector sequence as the key information.
The above steps 4011 to 4015 are a detailed refinement of step 101 shown in fig. 1.
Step 402, receiving a vector sequence which is input by an input device and is used as authentication information; the vector sequence as the authentication information is a vector sequence generated by the input device according to the operation process of the input device for identity authentication by the user.
Step 4031, vector grouping is performed on the vector sequences as the authentication information according to a preset time span, representative vectors of each group of vectors are determined, and a vector sequence formed by the representative vectors of each group of vectors is determined as the representative vector sequence of the vector sequence as the key confirmation information.
The method for determining the representative vector of each group of vectors in step 4031 is the same as the method for determining the representative vector of each group of vectors in step 4013a, and the implementation principle is the same, and is not described again.
Step 4032, vector grouping is performed on the vector sequences as the key information according to a preset time span, representative vectors of each group of vectors are determined, and a vector sequence formed by the representative vectors of each group of vectors is determined as the representative vector sequence of the vector sequences as the key information.
The implementation principle of step 4032 is the same as that of step 4012a, and is not described again.
Step 4033, a similarity between the representative vector sequence of the vector sequence as the authentication information and the representative vector sequence of the vector sequence as the key information is determined, and the similarity is determined as a similarity between the vector sequence as the authentication information and the vector sequence as the key information.
In this embodiment, the method for determining the similarity between the representative vector sequence of the vector sequence as the authentication information and the representative vector sequence of the vector sequence as the key information includes:
and if the representative vector sequence of the vector sequence as the authentication information is the same as the representative vector sequence of the vector sequence as the key information, determining that the similarity of the two is 1, otherwise, determining that the similarity of the two is 0.
Step 4034, according to the similarity between the vector sequence as the authentication information and the vector sequence as the key information, determine whether the user is authenticated successfully.
The above steps 4031 to 4034 are a specific refinement of step 103 shown in fig. 1.
As can be seen from the method shown in fig. 4, in this embodiment, in addition to solving the problem of identity authentication in an application scenario in which exact input information cannot be controlled, when the similarity of two vector sequences is calculated, three steps of vector grouping, determining a representative vector of each group of vectors, and performing segmented mapping on the representative vector are adopted to perform segmented simplification and alignment on the two vector sequences, which is easy for engineering implementation.
Referring to fig. 5, fig. 5 is a flowchart of an identity authentication method according to a fifth embodiment of the present invention, and as shown in fig. 5, the method mainly includes the following steps:
step 5011, receiving a vector sequence which is input by an input device and is used as key information; the vector sequence as the key information is generated by the input device according to the operation process of the user on the input device for setting the key.
Step 5012, receiving a vector sequence which is input by the input device and used as key confirmation information; the vector sequence as the key confirmation information is generated by the input equipment according to the operation process of the user on the input device for key confirmation.
In step 5013a, for each vector Vi in the vector sequence as the key information, a correction vector in which the vector sequence as the key confirmation information corresponds to the time information in the vector Vi is determined.
In step 5013a, determining that the vector sequence as the key confirmation information corresponds to the correction vector of the time information in the vector Vi specifically includes:
s21, searching a vector with the same time information as the time information in the vector Vi in the vector sequence as the key confirmation information, if the vector is found, determining the found vector as a correction vector of the vector sequence as the key confirmation information corresponding to the time information in the vector Vi, otherwise, executing step S22;
s22, searching for a vector Sx whose time information is smaller than and closest to the time information in the vector Vi and another vector Sy whose time information is larger than and closest to the time information in the vector Vi from the vector sequence as the key confirmation information, if Sy is found, interpolating the vectors Sx and Sy according to the time information of the vector Vi to obtain a new vector, determining the new vector as a correction vector of the vector sequence as the key confirmation information corresponding to the time information in the vector Vi, otherwise, executing step S22;
s23, two vectors Sz1 and Sz2 having time information closest to the time information in the vector Vi are searched for in the vector sequence as the key confirmation information, a new vector is obtained by interpolating the vectors Sz1 and Sz2 based on the time information of the vector Vi, and the new vector is determined as a correction vector in which the vector sequence as the key confirmation information corresponds to the time information in the vector Vi.
In this embodiment, the operation action information includes at least one action parameter;
in step S22, the method for interpolating the vectors Sx and Sy according to the time information of the vector Vi to obtain a new vector may specifically include:
s22_ a, assuming that the time information of the vector Vi is timei, and the time information of the vectors Sx and Sy are time and time respectively;
s22_ b, calculating a first difference value of the timei and the timex, a second difference value of the timey and the timei, and a third difference value of the timey and the timex;
s22_ c, calculating a first product of the value of the motion parameter and a second difference in the vector Sx and a second product of the value of the motion parameter and the first difference in the vector Sy for each motion parameter included in the operation motion information; and adding the first product and the second product, and determining the quotient of the addition result and the third difference value as the value of the action parameter in the new vector.
Assuming that in the above step S22, the vector Sx is denoted as Sx (O (Px, Tx, Zx), time), the vector Sy is denoted as Sy (O (Py, Ty, Zy), time), the new vector is Fi, the time information time in Fi can be directly assigned as timei (i.e., assigned as the time information time in vector Vi), three action parameters in Fi: pi, Ti, Zi can be calculated by the following three formulas:
Figure BDA0002481863150000141
Figure BDA0002481863150000142
Figure BDA0002481863150000143
in the step S23, the method for interpolating the vectors Sz1 and Sz2 according to the time information of the vector Vi to obtain a new vector may specifically include:
s23_ a, assuming that the time information of the vector Vi is timei, the time information of the vectors Sz1 and Sz2 are timez1 and timez2, respectively;
s23_ b, calculating a fourth difference between timei and timez1, a fifth difference between timez2 and timei, and a sixth difference between timez2 and timez 1;
s23_ c, aiming at each action parameter included in the operation action information, calculating a third product of the value of the action parameter in the vector Sz1 and a fifth difference value and a fourth product of the value of the action parameter in the vector Sz2 and a fourth difference value; and adding the third product and the fourth product, and determining the quotient of the addition result and the sixth difference value as the value of the action parameter in the new vector.
Assuming that in the above step S23, the vector Sz1 is represented by Sz1(O (Pz1, Tz1, Zz1), and time z1), the vector Sz2 is represented by Sz2(O (Pz2, Tz2, Zz2), and time z2), the new vector is Fi, the time information time in Fi can be directly assigned as time i (i.e., as time information in vector Vi), and then three action parameters in Fi are: pi, Ti, Zi can be calculated by the following three formulas:
Figure BDA0002481863150000144
Figure BDA0002481863150000145
Figure BDA0002481863150000146
in step 5013b, a vector sequence including the determined correction vectors is determined as a correction vector sequence of the vector sequence as the key confirmation information.
In this case, the total number of vectors in the corrected vector sequence of the vector sequence as the key confirmation information coincides with the total number of vectors in the vector sequence as the key information.
In step 5013c, a similarity between the corrected vector sequence of the vector sequence as the key confirmation information and the vector sequence as the key information is determined, and the similarity is determined as a similarity between the vector sequence as the key confirmation information and the vector sequence as the key information.
In step 5013c, a method of determining similarity between the corrected vector sequence of the vector sequence as the key confirmation information and the vector sequence as the key information is specifically as follows:
s31, assuming that the correction vector sequence of the vector sequence B is F1, F2, … … and Fn, and the vector sequence as the key information is V1, V2, … … and Vn;
s32, calculating the Euclidean distance d1 power of F1 and V1, the Euclidean distance d2 power of F2 and V2, … … and the Euclidean distance dn power of Fn and Vn;
s33, an average value of the power 2 of d1, the power 2 of d2, the power 2 of … …, and dn is calculated, and the average value is determined as the similarity between the correction vector sequence of the vector sequence B and the vector sequence as the key information.
Here, it is assumed that the vector Vi is denoted by Vi (O (P)i-V,Ti-V,Zi-V) TIMEI), vector Fi is denoted as Fi (O (P)i-F,Ti-F,Zi-F) Timei), the euclidean distance di between Vi and Fi can be calculated using the following formula:
Figure BDA0002481863150000151
therefore, in step S33, the similarity D between the modified vector sequence of the vector sequence B and the vector sequence as the key information can be calculated by using the following formula:
Figure BDA0002481863150000152
the above steps 5013a to 5013c are specific refinements of step 2013 shown in fig. 2 and step 3013 shown in fig. 3.
In step 5014, it is determined whether the similarity between the vector sequence as the key confirmation information and the vector sequence as the key information is greater than a preset threshold, if yes, step 5015 is executed, otherwise, step 5011 is executed again.
Step 5015, recording the vector sequence as the key information.
The above steps 5011 to 5015 are specific refinements of the step 101 shown in fig. 1.
Step 502, receiving a vector sequence which is input by an input device and is used as authentication information; the vector sequence as the authentication information is a vector sequence generated by the input device according to the operation process of the input device for identity authentication by the user.
Step 5031 determines, for each vector Vi in the vector sequence as the key information, a correction vector in which the vector sequence as the authentication information corresponds to time information in the vector Vi.
The method for determining the correction vector corresponding to the time information in the vector Vi in the vector sequence as the authentication information in step 5031 is the same as the method for determining the correction vector corresponding to the time information in the vector Vi in the vector sequence as the key confirmation information in step 5013a, and the implementation principle is the same, and is not described again.
Step 5032 of determining a vector sequence composed of the determined correction vectors as a correction vector sequence of the vector sequence as the authentication information;
step 5033, determining a similarity between the corrected vector sequence of the vector sequence as the authentication information and the vector sequence as the key information, and determining the similarity as a similarity between the vector sequence as the authentication information and the vector sequence as the key information.
The method for determining the similarity between the correction vector sequence of the vector sequence as the authentication information and the vector sequence as the key information in step 5033 is the same as the method for determining the similarity between the correction vector sequence of the vector sequence as the key confirmation information and the vector sequence as the key information in step 5013c, and the implementation principle is the same, and is not repeated.
Step 5034, determining whether the user is authenticated successfully according to the similarity between the vector sequence as the authentication information and the vector sequence as the key information.
The above steps 5031 to 5034 are detailed refinements of the step 103 shown in fig. 1.
As can be seen from the method shown in fig. 5, in addition to solving the problem of identity authentication in an application scenario in which exact input information cannot be controlled, in the present embodiment, when calculating the similarity between the vector sequence as key authentication information or the vector sequence as authentication information and the vector sequence as key information, the vector sequence as key authentication information or the vector sequence as authentication information is corrected by an interpolation calculation method with reference to the vector sequence as key information, so that the corrected vector and the vector sequence as key information are subjected to similarity calculation, which is relatively simple to implement.
The identity authentication method provided by the embodiment of the present invention is described in detail above, and an identity authentication device is also provided by the embodiment of the present invention, which is described in detail below with reference to fig. 6.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an identity authentication apparatus according to an embodiment of the present invention, and as shown in fig. 6, the identity authentication apparatus includes: a processor 601, and a non-transitory computer readable storage medium 602 connected to the processor 601 through a bus;
the non-transitory computer readable storage medium 602 storing one or more computer programs executable by the processor 601; the processor 601, when executing the one or more computer programs, implements the steps of:
acquiring and recording a vector sequence which is input by an input device and is used as key information in advance; the vector sequence used as the secret key is generated by the input equipment according to the operation process of the user on the input device for setting the secret key;
receiving a vector sequence input by an input device as authentication information; the vector sequence as the authentication information is generated by the input equipment according to the operation process of the user on the input device for identity authentication;
and calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information, and determining whether the user is successfully authenticated according to the similarity between the two.
In the device shown in figure 6 of the drawings,
the processor 601, when acquiring and recording the vector sequence as the key information input by the input device, is configured to:
receiving a vector sequence which is input by an input device and is used as key information; the vector sequence as the key information is generated by the input equipment according to the operation process of the user on the input device for setting the key;
receiving a vector sequence which is input by an input device and is used as key confirmation information; the vector sequence serving as the key confirmation information is generated by the input equipment according to the operation process of the user on the input device for key confirmation;
and calculating the similarity between the vector sequence used as the key confirmation information and the vector sequence used as the key information, if the similarity between the vector sequence used as the key confirmation information and the vector sequence used as the key information is greater than a preset threshold value, recording the vector sequence used as the key information, and otherwise, acquiring and recording the vector sequence used as the key information input by the input device again.
In the device shown in figure 6 of the drawings,
the processor 601, when recording the vector sequence as the key information, further records a similarity between the vector sequence as the key confirmation information and the vector sequence as the key information as a first similarity;
the processor 601, when determining whether the user is successfully authenticated according to the similarity between the two, is configured to: if the similarity of the two is not less than the first similarity, the user authentication is determined to be successful, otherwise, the user authentication is determined to be failed.
In one embodiment of the present invention,
the vectors in the vector sequence comprise operation action information and time information; the time information is the time difference of the vector relative to the first vector in the vector sequence;
the processor 601, when calculating the similarity between the vector sequence a and the vector sequence as the key information, is configured to:
vector grouping is carried out on the vector sequence A according to a preset time span, representative vectors of each group of vectors are determined, and a vector sequence formed by the representative vectors of each group of vectors is determined as the representative vector sequence of the vector sequence A;
performing vector grouping on the vector sequence serving as the key information according to a preset time span, determining a representative vector of each group of vectors, and determining a vector sequence consisting of the representative vectors of each group of vectors as the representative vector sequence of the vector sequence serving as the key information;
determining similarity between a representative vector sequence of a vector sequence a and the representative vector sequence of the vector sequence as the key information, and determining the similarity as the similarity between the vector sequence a and the vector sequence as the key information;
wherein the vector sequence a is the vector sequence as the key confirmation information or the vector sequence as the authentication information.
In the device shown in figure 6 of the drawings,
the operation action information comprises at least one action parameter;
the processor 601, determining a representative vector of each group of vectors, includes:
carrying out weighted average on each action parameter contained in the operation action information of the group of vectors to obtain a weighted average value of the action parameters;
determining a mapping value corresponding to the weighted average value of each action parameter according to the segmented mapping function set for each action parameter;
and determining a vector consisting of mapping values corresponding to the weighted average values of the motion parameters as a representative vector of the group of vectors.
In the device shown in figure 6 of the drawings,
the input device is a PTZ rocker;
the action parameters include: an up-down direction value P, a left-right direction value T and a zoom multiple Z;
the processor 601, which performs weighted average on each motion parameter included in the operation motion information of the group of vectors to obtain a weighted average value of the motion parameter, includes: the mean of P, the mean of T, and the mean of Z in the set of vectors are calculated, respectively.
In the device shown in figure 6 of the drawings,
the segment mapping function set for each action parameter means: dividing the value range of the action parameter into a plurality of sections, and corresponding each divided value range to a mapping function of a unique mapping value;
the processor 601, according to the segment mapping function set for each motion parameter, determines a mapping value corresponding to the weighted average of the motion parameter, including: and determining the value range to which the weighted average value of the action parameter belongs, and determining the unique mapping value corresponding to the value range as the mapping value corresponding to the weighted average value of the action parameter.
In the device shown in figure 6 of the drawings,
the processor 601, when determining similarity between the representative vector sequence of the vector sequence a and the representative vector sequence of the vector sequence as the key information, is configured to:
and if the representative vector of the vector sequence A is the same as the representative vector sequence of the vector sequence as the key information, determining that the similarity of the two is 1, otherwise, determining that the similarity of the two is 0.
In a further embodiment of the present invention,
the vectors in the vector sequence comprise operation action information and time information; the time information is the time difference of the vector relative to the first vector in the vector sequence;
the processor 601, when calculating the similarity between the vector sequence B and the vector sequence as the key information, is configured to:
for each vector Vi in the vector sequence used as the key information, determining a correction vector of the vector sequence B corresponding to the time information in the vector Vi;
determining a vector sequence formed by the determined correction vectors as a correction vector sequence of the vector sequence B;
determining the similarity between the correction vector sequence of the vector sequence B and the vector sequence serving as the key information, and determining the similarity as the similarity between the vector sequence B and the vector sequence serving as the key information;
wherein the vector sequence B is the vector sequence as the key confirmation information or the vector sequence as the authentication information.
In the device shown in figure 6 of the drawings,
the processor 601, determining a modified vector of the vector sequence B corresponding to the time information in the vector Vi, includes:
searching a vector with the time information same as that in the vector Vi in the vector sequence B, if the vector is found, determining the searched vector as a correction vector of the vector sequence B corresponding to the time information in the vector Vi, otherwise,
searching a vector Sx with time information smaller than and closest to the time information in the vector Vi and another vector Sy with time information larger than and closest to the time information in the vector Vi in the vector sequence B, if Sy is found, carrying out interpolation calculation on the vectors Sx and Sy according to the time information of the vector Vi to obtain a new vector, determining the new vector as a correction vector of the vector sequence B corresponding to the time information in the vector Vi, otherwise,
two vectors Sz1 and Sz2 with time information closest to the time information in the vector Vi are searched in the vector sequence B, a new vector is obtained by interpolating the vectors Sz1 and Sz2 according to the time information of the vector Vi, and the new vector is determined as a correction vector of the vector sequence B corresponding to the time information in the vector Vi.
In the device shown in figure 6 of the drawings,
the operation action information comprises at least one action parameter;
the processor 601, when performing interpolation calculation on the vectors Sx and Sy according to the time information of the vector Vi to obtain a new vector, is configured to:
assuming that the time information of the vector Vi is timei, and the time information of the vectors Sx and Sy are timex and timey respectively;
calculating a first difference value of the timei and the timex, a second difference value of the timey and the timei, and a third difference value of the timey and the timex;
aiming at each action parameter included in the operation action information, calculating a first product of the value of the action parameter in the vector Sx and a second difference value and a second product of the value of the action parameter in the vector Sy and the first difference value; adding the first product and the second product, and determining the quotient of the addition result and the third difference value as the value of the action parameter in the new vector;
the processor 601, when interpolating the vectors Sz1 and Sz2 according to the time information of the vector Vi to obtain a new vector, is configured to:
assuming that the time information of the vector Vi is timei, the time information of the vectors Sz1 and Sz2 are timez1 and timez2, respectively;
calculating a fourth difference of timei from timez1, a fifth difference of timez2 from timei, and a sixth difference of timez2 from timez 1;
calculating a third product of the value of the action parameter in the vector Sz1 and a fifth difference value and a fourth product of the value of the action parameter in the vector Sz2 and a fourth difference value for each action parameter included in the operation action information; and adding the third product and the fourth product, and determining the quotient of the addition result and the sixth difference value as the value of the action parameter in the new vector.
In the device shown in figure 6 of the drawings,
the processor 601, when determining similarity between the modified vector sequence of the vector sequence B and the vector sequence as the key information, is configured to:
assuming that the modified vector sequence of the vector sequence B is F1, F2, … …, Fn, and the vector sequence as the key information is V1, V2, … …, Vn;
calculating the power 2 of the Euclidean distance d1 between F1 and V1, the power 2 of the Euclidean distance d2 between F2 and V2, … … and the power 2 of the Euclidean distance dn between Fn and Vn;
the average value of the power 2 of d1, the power 2 of d2, … …, and dn is calculated and determined as the similarity between the correction vector sequence of the vector sequence B and the vector sequence as the key information.
Embodiments of the present invention also provide a non-transitory computer readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps in the identity authentication method as shown in fig. 1, fig. 2, fig. 3, fig. 4, or fig. 5.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (14)

1. An identity authentication method, comprising:
acquiring and recording a vector sequence which is input by an input device and is used as key information in advance; the vector sequence used as the secret key is generated by the input equipment according to the operation process of the user on the input device for setting the secret key;
receiving a vector sequence input by an input device as authentication information; the vector sequence as the authentication information is generated by the input equipment according to the operation process of the user on the input device for identity authentication;
and calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information, and determining whether the user is successfully authenticated according to the similarity between the two.
2. The method of claim 1,
the method for acquiring and recording the vector sequence input by the input device as the key information comprises the following steps:
receiving a vector sequence which is input by an input device and is used as key information; the vector sequence as the key information is generated by the input equipment according to the operation process of the user on the input device for setting the key;
receiving a vector sequence which is input by an input device and is used as key confirmation information; the vector sequence serving as the key confirmation information is generated by the input equipment according to the operation process of the user on the input device for key confirmation;
and calculating the similarity between the vector sequence used as the key confirmation information and the vector sequence used as the key information, if the similarity between the vector sequence used as the key confirmation information and the vector sequence used as the key information is greater than a preset threshold value, recording the vector sequence used as the key information, and otherwise, acquiring and recording the vector sequence used as the key information input by the input device again.
3. The method of claim 2,
when recording the vector sequence as the key information, further recording the similarity between the vector sequence as the key confirmation information and the vector sequence as the key information as a first similarity;
the method for determining whether the user is successfully authenticated according to the similarity of the two comprises the following steps: if the similarity of the two is not less than the first similarity, the user authentication is determined to be successful, otherwise, the user authentication is determined to be failed.
4. The method of claim 2,
the vectors in the vector sequence comprise operation action information and time information; the time information is the time difference of the vector relative to the first vector in the vector sequence;
assuming that the vector sequence as the key confirmation information or the vector sequence as the authentication information is a vector sequence a, a method for calculating similarity between the vector sequence a and the vector sequence as the key information includes:
vector grouping is carried out on the vector sequence A according to a preset time span, representative vectors of each group of vectors are determined, and a vector sequence formed by the representative vectors of each group of vectors is determined as the representative vector sequence of the vector sequence A;
performing vector grouping on the vector sequence serving as the key information according to a preset time span, determining a representative vector of each group of vectors, and determining a vector sequence consisting of the representative vectors of each group of vectors as the representative vector sequence of the vector sequence serving as the key information;
and determining the similarity between the representative vector sequence of the vector sequence A and the representative vector sequence of the vector sequence serving as the key information, and determining the similarity as the similarity between the vector sequence A and the vector sequence serving as the key information.
5. The method of claim 4,
the operation action information comprises at least one action parameter;
determining a representative vector for each set of vectors, comprising:
carrying out weighted average on each action parameter contained in the operation action information of the group of vectors to obtain a weighted average value of the action parameters;
determining a mapping value corresponding to the weighted average value of each action parameter according to the segmented mapping function set for each action parameter;
and determining a vector consisting of mapping values corresponding to the weighted average values of the motion parameters as a representative vector of the group of vectors.
6. The method of claim 5,
the input device is a PTZ rocker;
the action parameters include: an up-down direction value P, a left-right direction value T and a zoom multiple Z;
carrying out weighted average on each motion parameter contained in the operation motion information of the group of vectors to obtain a weighted average value of the motion parameters, wherein the weighted average value comprises the following steps: the mean of P, the mean of T, and the mean of Z in the set of vectors are calculated, respectively.
7. The method of claim 5,
the segment mapping function set for each action parameter means: dividing the value range of the action parameter into a plurality of sections, and corresponding each divided value range to a mapping function of a unique mapping value;
determining a mapping value corresponding to the weighted average value of each action parameter according to the segmented mapping function set for the action parameter, wherein the mapping value comprises the following steps: and determining the value range to which the weighted average value of the action parameter belongs, and determining the unique mapping value corresponding to the value range as the mapping value corresponding to the weighted average value of the action parameter.
8. The method of claim 5,
the method for determining the similarity between the representative vector sequence of the vector sequence a and the representative vector sequence of the vector sequence as the key information comprises the following steps:
and if the representative vector of the vector sequence A is the same as the representative vector sequence of the vector sequence as the key information, determining that the similarity of the two is 1, otherwise, determining that the similarity of the two is 0.
9. The method of claim 2,
the vectors in the vector sequence comprise operation action information and time information; the time information is the time difference of the vector relative to the first vector in the vector sequence;
assuming that the vector sequence as the key confirmation information or the vector sequence as the authentication information is a vector sequence B, a method for calculating similarity between the vector sequence B and the vector sequence as the key information includes:
for each vector Vi in the vector sequence used as the key information, determining a correction vector of the vector sequence B corresponding to the time information in the vector Vi;
determining a vector sequence formed by the determined correction vectors as a correction vector sequence of the vector sequence B;
and determining the similarity between the correction vector sequence of the vector sequence B and the vector sequence serving as the key information, and determining the similarity as the similarity between the vector sequence B and the vector sequence serving as the key information.
10. The method of claim 9,
determining a correction vector of the vector sequence B corresponding to the time information in the vector Vi, comprising:
searching a vector with the time information same as that in the vector Vi in the vector sequence B, if the vector is found, determining the searched vector as a correction vector of the vector sequence B corresponding to the time information in the vector Vi, otherwise,
searching a vector Sx with time information smaller than and closest to the time information in the vector Vi and another vector Sy with time information larger than and closest to the time information in the vector Vi in the vector sequence B, if Sy is found, carrying out interpolation calculation on the vectors Sx and Sy according to the time information of the vector Vi to obtain a new vector, determining the new vector as a correction vector of the vector sequence B corresponding to the time information in the vector Vi, otherwise,
two vectors Sz1 and Sz2 with time information closest to the time information in the vector Vi are searched in the vector sequence B, a new vector is obtained by interpolating the vectors Sz1 and Sz2 according to the time information of the vector Vi, and the new vector is determined as a correction vector of the vector sequence B corresponding to the time information in the vector Vi.
11. The method of claim 10,
the operation action information comprises at least one action parameter;
the method for carrying out interpolation calculation on the vectors Sx and Sy according to the time information of the vector Vi to obtain a new vector comprises the following steps:
assuming that the time information of the vector Vi is timei, and the time information of the vectors Sx and Sy are timex and timey respectively;
calculating a first difference value of the timei and the timex, a second difference value of the timey and the timei, and a third difference value of the timey and the timex;
aiming at each action parameter included in the operation action information, calculating a first product of the value of the action parameter in the vector Sx and a second difference value and a second product of the value of the action parameter in the vector Sy and the first difference value; adding the first product and the second product, and determining the quotient of the addition result and the third difference value as the value of the action parameter in the new vector;
the method for interpolating the vectors Sz1 and Sz2 according to the time information of the vector Vi to obtain a new vector comprises the following steps:
assuming that the time information of the vector Vi is timei, the time information of the vectors Sz1 and Sz2 are timez1 and timez2, respectively;
calculating a fourth difference of timei from timez1, a fifth difference of timez2 from timei, and a sixth difference of timez2 from timez 1;
calculating a third product of the value of the action parameter in the vector Sz1 and a fifth difference value and a fourth product of the value of the action parameter in the vector Sz2 and a fourth difference value for each action parameter included in the operation action information; and adding the third product and the fourth product, and determining the quotient of the addition result and the sixth difference value as the value of the action parameter in the new vector.
12. The method of claim 9,
the method for determining the similarity between the modified vector sequence of the vector sequence B and the vector sequence as the key information comprises the following steps:
assuming that the modified vector sequence of the vector sequence B is F1, F2, … …, Fn, and the vector sequence as the key information is V1, V2, … …, Vn;
calculating the power 2 of the Euclidean distance d1 between F1 and V1, the power 2 of the Euclidean distance d2 between F2 and V2, … … and the power 2 of the Euclidean distance dn between Fn and Vn;
the average value of the power 2 of d1, the power 2 of d2, … …, and dn is calculated and determined as the similarity between the correction vector sequence of the vector sequence B and the vector sequence as the key information.
13. An identity authentication apparatus, comprising: a processor, and a non-transitory computer readable storage medium connected to the processor by a bus;
the non-transitory computer readable storage medium storing one or more computer programs executable by the processor; the processor, when executing the one or more computer programs, implements the steps of:
acquiring and recording a vector sequence which is input by an input device and is used as key information in advance; the vector sequence used as the secret key is generated by the input equipment according to the operation process of the user on the input device for setting the secret key;
receiving a vector sequence input by an input device as authentication information; the vector sequence as the authentication information is generated by the input equipment according to the operation process of the user on the input device for identity authentication;
and calculating the similarity between the vector sequence as the authentication information and the vector sequence as the key information, and determining whether the user is successfully authenticated according to the similarity between the two.
14. A non-transitory computer readable storage medium storing instructions which, when executed by a processor, cause the processor to perform the steps in the identity authentication method of any one of claims 1 to 12.
CN202010380720.0A 2020-05-08 2020-05-08 Identity authentication method, device and storage medium Active CN113630369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010380720.0A CN113630369B (en) 2020-05-08 2020-05-08 Identity authentication method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010380720.0A CN113630369B (en) 2020-05-08 2020-05-08 Identity authentication method, device and storage medium

Publications (2)

Publication Number Publication Date
CN113630369A true CN113630369A (en) 2021-11-09
CN113630369B CN113630369B (en) 2023-07-21

Family

ID=78377114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010380720.0A Active CN113630369B (en) 2020-05-08 2020-05-08 Identity authentication method, device and storage medium

Country Status (1)

Country Link
CN (1) CN113630369B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865527A (en) * 2023-02-20 2023-03-28 深圳鼎智通讯有限公司 Anti-attack method and system for POS machine

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018090183A1 (en) * 2016-11-15 2018-05-24 深圳达闼科技控股有限公司 Identity authentication method, terminal device, authentication server and electronic device
CN108710788A (en) * 2018-05-22 2018-10-26 上海众人网络安全技术有限公司 A kind of safety certifying method, device, terminal and storage medium
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium
CN110674480A (en) * 2019-10-11 2020-01-10 同盾控股有限公司 Behavior data processing method, device and equipment and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018090183A1 (en) * 2016-11-15 2018-05-24 深圳达闼科技控股有限公司 Identity authentication method, terminal device, authentication server and electronic device
CN108710788A (en) * 2018-05-22 2018-10-26 上海众人网络安全技术有限公司 A kind of safety certifying method, device, terminal and storage medium
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium
CN110674480A (en) * 2019-10-11 2020-01-10 同盾控股有限公司 Behavior data processing method, device and equipment and readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865527A (en) * 2023-02-20 2023-03-28 深圳鼎智通讯有限公司 Anti-attack method and system for POS machine
CN115865527B (en) * 2023-02-20 2023-04-25 深圳鼎智通讯有限公司 Anti-attack method and system for POS machine

Also Published As

Publication number Publication date
CN113630369B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN108235247B (en) Node positioning method and device
CN112465877B (en) Kalman filtering visual tracking stabilization method based on motion state estimation
CN109410266A (en) Stereo Matching Algorithm based on four mould Census transformation and discrete disparity search
CN112533209A (en) Black product identification method and black product identification device
KR20150127503A (en) Service providing system and method for recognizing object, apparatus and computer readable medium having computer program recorded therefor
CN113630369A (en) Identity authentication method, identity authentication device and storage medium
US9317904B2 (en) Image processing system and image processing method
KR20210088437A (en) Image recognition method and apparatus, computer readable storage medium
US11983160B2 (en) Apparatus and method for providing sensor data based on blockchain
CN116958267B (en) Pose processing method and device, electronic equipment and storage medium
KR102170031B1 (en) Method, Recording medium and Blockchain system for confirming blockchain transaction using location information
CN112287429B (en) Building target area determination method and device, computer equipment and storage medium
CN111882494A (en) Pose graph processing method and device, computer equipment and storage medium
CN115527244B (en) Fingerprint image matching method and device, computer equipment and storage medium
CN111401197B (en) Picture risk identification method, device and equipment
CN108563692A (en) A kind of target duplicate checking method and device
CN104915941A (en) Method and apparatus for calculating parallax
CN112653995B (en) User identity recognition method and device and computer readable storage medium
CN114495180A (en) Fingerprint matching method, chip and equipment
Zhang et al. Frequent pattern-based trajectory completion
CN112270739B (en) Indoor area confirmation method and device based on two dimensions, terminal and storage medium
CN115100442B (en) Target matching method, target and part matching method and related equipment
CN108734249B (en) Encrypted code output method and device for communication between screen and camera
JPH06318253A (en) Distance measuring method using stereo matching
KR101836739B1 (en) Method and apparatus for authenticating user of mobile device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant