CN113810394B - Service processing method, device, electronic equipment and storage medium - Google Patents

Service processing method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113810394B
CN113810394B CN202111032354.0A CN202111032354A CN113810394B CN 113810394 B CN113810394 B CN 113810394B CN 202111032354 A CN202111032354 A CN 202111032354A CN 113810394 B CN113810394 B CN 113810394B
Authority
CN
China
Prior art keywords
client
face image
current
server
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111032354.0A
Other languages
Chinese (zh)
Other versions
CN113810394A (en
Inventor
路双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202111032354.0A priority Critical patent/CN113810394B/en
Publication of CN113810394A publication Critical patent/CN113810394A/en
Application granted granted Critical
Publication of CN113810394B publication Critical patent/CN113810394B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Abstract

The application provides a service processing method, a device, electronic equipment and a storage medium, and belongs to the technical field of computer application. Wherein the method comprises the following steps: after acquiring a service request sent by a client, the server sends an image acquisition instruction to the client so that the client acquires a face image of a current service object; the server generates current verification data according to the face image acquired by the client; the server returns the current check data to the client so that the client displays the current check data; and the server processes the service request according to the verification data processing result returned by the client. Therefore, through the service processing method, the service request sent by the client is processed only when the effective face image is acquired, so that malicious requests of users are avoided, and the processing load of the server is reduced.

Description

Service processing method, device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer applications, and in particular, to a service processing method, a device, an electronic apparatus, and a storage medium.
Background
Since the 21 st century, technological development is becoming more and more advanced, and the Internet has been extended to the aspects of people's daily lives. Work, study, entertainment, etc. using the internet has been the norm of information society. The expansion of the application range of the Internet brings great convenience to the production and life of people, and meanwhile, great disadvantages are gradually exposed. For example, when people obtain various services through the internet, a large number of malicious requests can be sent through software, so that the processing burden of a server is excessive, and even normal use of a user can be affected.
In the related art, in order to avoid a large number of concurrent malicious requests, the validity of a service request is usually verified through a verification code verification mechanism when the service request sent by a user is obtained. However, with the continuous strong computer technology, the computer device can automatically identify the verification code issued by the server and automatically submit the identified verification code, so that the above verification method for verification codes cannot thoroughly avoid malicious requests of users.
Disclosure of Invention
The service processing method, the device, the electronic equipment and the storage medium are used for solving the problem that in the related technology, the method for verifying the validity of the service request through a verification code verification mechanism cannot thoroughly avoid malicious requests of users.
The service processing method provided by the embodiment of the application in one aspect comprises the following steps: after acquiring a service request sent by a client, a server sends an image acquisition instruction to the client so that the client acquires a face image of a current service object; the server generates current verification data according to the face image acquired by the client; the server returns the current check data to the client so that the client displays the current check data; and the server processes the service request according to the verification data processing result returned by the client.
In another aspect, a service processing apparatus provided in an embodiment of the present application includes: the sending module is used for sending an image acquisition instruction to the client after the server acquires the service request sent by the client so that the client acquires the face image of the current service object; the generation module is used for generating current verification data according to the face image acquired by the client; the return module is used for returning the current check data to the client by the server so that the client can display the current check data; and the processing module is used for processing the service request according to the verification data processing result returned by the client.
In still another aspect, an electronic device provided in an embodiment of the present application includes: a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the service processing method as described above when executing the program.
In a further aspect, a computer readable storage medium is provided, on which a computer program is stored, where the program is executed by a processor to implement a service processing method as described above.
In yet another aspect, the present application provides a computer program, which when executed by a processor, implements a service processing method according to an embodiment of the present application.
According to the service processing method, the device, the electronic equipment, the computer readable storage medium and the computer program, after the service request sent by the client is obtained through the server, an image acquisition instruction is sent to the client so that the client can acquire the face image of the current service object, current check data are generated according to the face image acquired by the client, the current check data are returned to the client so that the client can display the current check data, and further the service request is processed according to the check data processing result returned by the client. Therefore, when a service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, malicious requests of users are avoided, and the processing load of a server is reduced.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
fig. 1 is a flow chart of a service processing method according to an embodiment of the present application;
FIG. 2 is a flowchart of another service processing method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a service processing device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the like or similar elements throughout. The embodiments described below by referring to the drawings are exemplary and intended for the purpose of explaining the present application and are not to be construed as limiting the present application.
Aiming at the problem that in the related art, the method for verifying the validity of the service request through the verification code verification mechanism cannot thoroughly avoid the malicious request of the user, the embodiment of the application provides a service processing method.
According to the service processing method provided by the embodiment of the application, after the service request sent by the client is obtained through the server, an image acquisition instruction is sent to the client so that the client acquires the face image of the current service object, current check data is generated according to the face image acquired by the client, the current check data is returned to the client so that the client displays the current check data, and further the service request is processed according to the check data processing result returned by the client. Therefore, when a service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, malicious requests of users are avoided, and the processing load of a server is reduced.
The service processing method, apparatus, electronic device, storage medium and computer program provided in the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flow chart of a service processing method according to an embodiment of the present application.
As shown in fig. 1, the service processing method includes the steps of:
step 101, after obtaining a service request sent by a client, a server sends an image acquisition instruction to the client so that the client acquires a face image of a current service object.
The service request may include a login request, a payment request, a refresh request, etc. sent by the current service object through the client.
In this embodiment of the present application, after obtaining a service request sent by a client, a server may send an image acquisition instruction to the client, so as to control an image acquisition device in a terminal where the client is currently located, to acquire a face image of a current service object.
As a possible implementation manner, after the current service object responds to the image acquisition instruction through the client, that is, after agreeing to the client to acquire the face image of the current service object, the image acquisition device in the terminal where the client is currently located can be triggered to acquire the face image of the current service object, and the face contour is displayed at a proper position in the view finding interface of the terminal where the client is currently located, so that the current service object can adjust the shooting position and the gesture according to the face contour displayed in the view finding interface, thereby ensuring that an effective face image can be acquired.
Further, if the client does not acquire the valid face image, the service request sent by the client may be rejected. That is, in one possible implementation manner of the embodiment of the present application, after the step 101, the method may further include:
and if the server does not acquire the face image returned by the client, sending a prompt message for representing failure of service request response to the client so that the client displays the prompt message.
It should be noted that, in order to avoid malicious requests of illegal users, only when it is determined that the service request sent by the currently acquired client is sent by the current service object through the client, the service request sent by the client may be further processed.
Optionally, if the server acquires the face image returned by the client, it can determine that the current service object is sent by the client when the acquired service request is sent by the client, and then further processing can be performed on the acquired service request; if the server does not acquire the face image returned by the client, the server can determine that the acquired service request is likely to be a malicious request, namely, can reject the acquired service request, and sends a prompt message representing failure of service request response to the client, so that the client displays the prompt message and prompts the corresponding service object of the client to fail in service request response.
Step 102, the server generates current verification data according to the face image collected by the client.
In the embodiment of the present application, if the server acquires the face image acquired by the client, current verification data may be generated according to the acquired face image. When the face image collected by the client is obtained, the current verification policy, that is, the policy for generating the current verification data, can be selected according to the actual needs.
Optionally, when the face image of the current service object acquired by the client is acquired, a random verification policy unrelated to the face image acquired by the client may be used to generate current verification data, that is, the generated current verification data may be data such as numbers, letters, combinations of numbers and letters, pictures and the like unrelated to the face image acquired by the client, but is not limited thereto. In actual use, the current transaction data may be preset according to actual needs, which is not limited in this embodiment of the present application.
Optionally, when the face image of the current service object collected by the client is obtained, a verification policy related to the face image collected by the client may be further adopted to generate current verification data. For example, the face image collected by the client and other random images can be utilized to generate current verification data.
Further, when the verification strategy related to the face image collected by the client is adopted to generate the current verification data, the identification result of the collected face image can be used to generate the current verification data. That is, in one possible implementation manner of the embodiment of the present application, the step 102 may include:
the server identifies the face image acquired by the client to determine the character characteristics currently corresponding to the face image;
and the server generates current verification data according to the character characteristics currently corresponding to the face image.
Wherein the character features include at least one of the following features: gender, age, expression.
As a possible implementation manner, after the face image of the current service object acquired by the client is acquired, the acquired face image may be subjected to recognition processing through a face recognition algorithm to determine the character feature currently corresponding to the acquired face image, so as to generate current verification data according to the character feature currently corresponding to the identified face image.
Alternatively, the current verification data may be generated according to the gender characteristic corresponding to the identified face image. In one possible implementation manner of the embodiment of the present application, the gender feature corresponding to the identified face image currently may be used as the current verification data. For example, if the sex corresponding to the identified face image is "female", the generated current verification data may be the Chinese character "female", the english word "female", and the like.
Alternatively, the current verification data may be generated according to the age characteristic currently corresponding to the identified face image. In one possible implementation manner of the embodiment of the present application, the gender feature corresponding to the identified face image currently may be used as the current verification data. For example, if the age corresponding to the identified face image is "30", the generated current verification data may be the number "30", the Chinese character "thirty", the english word "thorty", etc.
Alternatively, the current verification data may be generated according to the expression feature currently corresponding to the identified face image. In one possible implementation form of the embodiment of the present application, the expression feature currently corresponding to the identified face image may be used as the inspection data; or generating corresponding expression image data by using the expression characteristics corresponding to the recognized face image at present, and randomly generating other expression image data to be used as the current verification data together. For example, if the expression corresponding to the identified face image is smile, the generated current verification data may be smile, etc; or, smiling expression image data and other expression image data such as difficult and tearing can be generated randomly, and the smiling expression image data and the other expression image data generated randomly are utilized to form current verification data together.
It should be noted that, the manner of generating the current verification data according to the character feature currently corresponding to the face image collected by the client may include, but is not limited to, the above-listed situations. In actual use, the current verification data generation mode can be preset according to actual needs, and the embodiment of the application is not limited to this.
And step 103, the server returns the current check data to the client so that the client displays the current check data.
In the embodiment of the application, after the server acquires the face image of the current service object acquired by the client and generates the current verification data, the current verification data can be returned to the client, so that the current service object can perform corresponding processing on the current verification data according to the current verification data displayed in the client.
As a possible implementation manner, when the server returns the current verification data to the client, the server may also return the processing rule of the preset current verification data to the client together, so that the current service object may process the current verification data according to the current verification data displayed in the client and the processing rule of the current verification data. The processing rule of the current check data may be related to the type of the current check data.
Optionally, if the current verification data is a chinese character, an english letter, a number, etc., the processing rule for the current verification data may be: "input current check data in corresponding input box"; if the current verification data is image data, the processing rule for the current verification data may be: "image data satisfying the condition is selected from the current verification data".
For example, if the current verification data is a plurality of expression image data, the processing rule for the current verification data may be: the "image with all expressions" smile "is selected from the following list of emotion image data.
The processing rule for the current check data may include, but is not limited to, the above-listed cases. In actual use, the processing rule of the current check data can be determined according to the actual needs and the type of the current check data, which is not limited in the embodiment of the present application.
And 104, the server processes the service request according to the verification data processing result returned by the client.
In this embodiment of the present application, after obtaining a result of processing check data by a current service object returned by a client, the server may determine, according to a preset rule for processing current check data, whether the result of processing check data returned by the client is correct, and perform corresponding processing on a service request sent by the client according to the determination result.
Optionally, if the processing result of the check data returned by the client accords with a preset processing rule of the current check data, that is, the processing result of the check data returned by the client is correct, the service request sent by the client can be responded; if the check data processing result returned by the client does not accord with the preset processing rule of the current check data, namely the check data processing result returned by the client is wrong, the service request sent by the client can be refused, and prompt information of 'verification data input error' is returned to the client.
Furthermore, if the verification data returned by the client is determined to be incorrect, the face image of the current service object can be acquired again, and the verification data return value client is generated again, so that the current service object can process new verification data again. That is, in one possible implementation manner of the embodiment of the present application, the step 104 may include:
and if the server determines that the check data processing result returned by the client is wrong, the server resends an image acquisition instruction to the client.
As a possible implementation manner, if the server determines that the verification data returned by the client is wrong in processing result, the image acquisition instruction can be sent to the client again, after the face image of the current service object acquired by the client is acquired, the verification data is generated again according to the face image acquired by the client, and the generated verification data is returned to the client, so that the current service object processes the verification data again until the fact that the verification data returned by the client is correct in processing result is determined.
According to the service processing method provided by the embodiment of the application, after the service request sent by the client is obtained through the server, an image acquisition instruction is sent to the client so that the client acquires the face image of the current service object, current check data is generated according to the face image acquired by the client, the current check data is returned to the client so that the client displays the current check data, and further the service request is processed according to the check data processing result returned by the client. Therefore, when a service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, malicious requests of users are avoided, and the processing load of a server is reduced.
In one possible implementation form of the present application, after the face image of the current service object collected by the client is obtained, data related to the identifier of the client may be obtained according to the identifier of the client, and current verification data may be generated according to the obtained data related to the identifier of the client, so as to further reduce the probability that the malicious request passes the verification.
The service processing method provided in the embodiment of the present application is further described below with reference to fig. 2.
Fig. 2 is a flowchart of another service processing method according to an embodiment of the present application.
As shown in fig. 2, the service processing method includes the steps of:
step 201, after obtaining a service request sent by a client, a server sends an image acquisition instruction to the client, so that the client acquires a face image of a current service object.
The specific implementation process and principle of the above step 201 may refer to the detailed description of the above embodiment, which is not repeated herein.
Step 202, the server obtains a target face image according to the identification of the client.
The identifier of the client may be an account number that the current service object has been registered and input in the client. The target face image refers to a face image which is stored in advance and is associated with the identification of the client, and can be a face image of the service object which is uploaded by the service object after registering an account in the client or a face image which is acquired and stored from an effective certificate uploaded by the service object.
It should be noted that, in one possible implementation form of the embodiment of the present application, when a service object uses a client for the first time, an account may be registered in the client as a client identifier of the service object, and during or after the registration of the account, the server may send an image acquisition instruction to the client, so that the client acquires a face image of the service object, and stores the face image of the service object acquired by the client in association with the identifier of the client corresponding to the service object, where the acquired face image is to be used as a target face image corresponding to the identifier of the client; or the server can send a personal information acquisition instruction to the client so that the service object can upload the effective identity document according to the prompt information displayed in the client, then the server can acquire the face image in the effective identity document by using the effective identity document uploaded by the service object returned by the client, and the acquired face image is associated with the identifier of the client corresponding to the service object and stored, namely the acquired face image is used as a target face image corresponding to the identifier of the client.
As a possible implementation manner, after the server acquires the face image of the current service object acquired and returned by the client, the server may acquire the target face image associated with the identifier of the client according to the identifier of the client input by the current service object in the client.
In step 203, when the server determines that the face image collected by the client matches the target face image, the server obtains each reference face image associated with the target face image.
In the embodiment of the application, after the server acquires the target face image, whether the face image acquired by the client is matched with the target face image or not can be judged, if so, the current service object can be determined as a legal user corresponding to the identification of the client, and the current verification data can be further generated; if the face image collected by the client is not matched with the target face image, it can be determined that the current service object is not a legal user corresponding to the identifier of the client, and the service request sent by the client can be refused.
As a possible implementation manner, the target face image may have one or more target face images, so that the identifier of one client may be commonly used by multiple service objects, that is, when the server determines that the face image collected by the client matches one of the target face images, it may determine that the current service object is a legal user corresponding to the identifier of the client. For example, when a user uses a certain shopping software, the user can upload the face image information of himself or herself and the family as the target face image corresponding to the identification of the registered client, so that both the user and the family can log in by using the identification of the registered client and use the shopping software.
It should be noted that, in one possible implementation form of the embodiment of the present application, a threshold of matching degree between a face image collected by a client and a target face image may be preset, so as to determine whether the face image collected by the client is matched with the target face image according to a relationship between the matching degree between the face image collected by the client and the target face image and the preset threshold.
Specifically, if the matching degree of the face image collected by the client and the target face image is greater than or equal to a preset threshold value, the face image collected by the client and the target face image can be determined to be matched; if the matching degree of the face image acquired by the client and the target face image is smaller than a preset threshold value, the fact that the face image acquired by the client is not matched with the target face can be determined.
In practical use, the threshold of matching degree between the face image collected by the client and the target face image may be preset according to the actual needs, which is not limited in the embodiment of the present application. For example, it may be 90%.
As a possible implementation manner, when determining that the face image collected by the client matches the target face image, the server may generate current verification data by using each reference face image associated with the target face image, so that each reference face image associated with the target face image may be obtained after determining that the face image collected by the client matches the target face image.
For example, if the client is an instant messaging application, the header data of the contact associated with the identifier of the client corresponding to the current service object, or the target face image of the contact, may be used to generate the current verification data, that is, each reference face image associated with the target face image, may be the header data of the contact associated with the identifier of the client corresponding to the current service object, or the target face image of the contact.
It should be noted that the above examples are only exemplary and should not be construed as limiting the present application. In actual use, the mode of acquiring each reference face image associated with the target face image may be preset according to actual needs, which is not limited in the embodiment of the present application.
Step 204, the server acquires a target reference face image for generating current verification data from the reference face images.
In the embodiment of the application, after the server acquires each reference face image associated with the target face image, a part of the reference face images can be selected from the acquired reference face images to serve as the target reference face image, and the target reference face image and the randomly generated image data are utilized to generate the current verification data.
As a possible implementation manner, one or more reference face images may be randomly selected from the acquired reference face images, and used as the target reference face image. For example, the client is an instant messaging application, and each reference face image is the head portrait data of each contact associated with the target face image, so that two reference face images can be randomly selected from the head portrait data of each contact to serve as the target reference face image.
Further, when the target face image is obtained from each reference face image, the target reference face image may be determined according to the relationship between each reference face image and the target face image, or the interactive data of the client identifier corresponding to each reference face image and the client identifier corresponding to the target face image. That is, in one possible implementation manner of the embodiment of the present application, the step 204 may include:
acquiring a target reference face image for generating current verification data from each reference face image according to the relation between each reference face image and the target face image;
or alternatively, the process may be performed,
acquiring a target reference face image for generating current verification data from each reference face image according to the current on-line state of each reference face image;
Or alternatively, the process may be performed,
and acquiring a target reference face image for generating current verification data from each reference face image according to the historical interaction frequency of each reference face image and the target face image.
Optionally, when the target reference face image is obtained from each reference face image, the target reference face image may be determined according to the relationship between the identifier of the client corresponding to the reference face image and the identifier of the client corresponding to the target face image. For example, the reference face image corresponding to the identifier of the client having a relatively close relationship with the target face image may be determined as the target reference face image according to the identifier of the client corresponding to each reference face image and the grouping information associated with the identifier of the client corresponding to the target face image.
For example, the client is an instant messaging application, each reference face image is header data corresponding to a contact associated with an identifier of the client corresponding to the target face image, and grouping information associated with the client corresponding to the target face image includes three groupings of "family, friends, and strangers", and then one or more reference face images may be randomly selected from each reference face image corresponding to the "family" grouping as the target reference face image.
Optionally, when the target reference face image is obtained from each reference face image, the target reference face image may be determined according to an online state of the identifier of the client corresponding to each reference face image. For example, one or more reference face images can be randomly selected from the reference face images with the current online state being online, and the reference face images can be used as target reference face images.
Optionally, when the target reference face image is obtained from each reference face image, the target reference face image may be determined according to the historical interaction frequency between the identifiers of the clients corresponding to each reference face image and the identifiers of the clients corresponding to the target face image. For example, one or more reference face images with highest historical interaction frequency of the identification of the client corresponding to the target face image may be determined as the target reference face image.
The manner of acquiring the target reference face image from each reference face image may include, but is not limited to, the above-listed cases. In actual use, the mode of acquiring the target reference face image can be preset according to actual needs, and the embodiment of the application is not limited to this.
Step 205, the server generates current verification data according to the target reference face image.
As a possible implementation manner, after determining the target reference face image, the server may generate current verification data according to the target reference face image. Alternatively, the target reference face image and the randomly generated image data may be utilized to jointly generate the current verification data.
For example, the target reference face image is the head image data of two contacts corresponding to the target face image, so that multiple face images (such as 3 faces) unfamiliar with the current service object can be randomly generated, or multiple non-face images of animals, plants, articles and the like can be randomly generated, and the two target reference images together form the current verification data.
And step 206, the server returns the current check data to the client so that the client displays the current check data.
And step 207, the server processes the service request according to the verification data processing result returned by the client.
The specific implementation and principles of the steps 206-207 may refer to the detailed description of the embodiments, and are not repeated here.
According to the service processing method provided by the embodiment of the application, after the service request sent by the client is acquired, an image acquisition instruction is sent to the client, so that the client acquires the face image of the current service object, and acquires the target face image according to the identification of the client, then when the face image acquired by the client is determined to be matched with the target face image, each reference face image associated with the target face image is acquired, and further, the target reference face image used for generating the current check data is acquired from each reference face image, and the current check data is generated according to the target reference face image, and then the current check data is returned to the client, and further, the service request is processed according to the check data processing result returned by the client. Therefore, when the face image of the current service object is acquired, the legitimacy of the current service object is further verified according to the matching degree of the face image acquired by the client and the target face image, and the current verification data is generated by utilizing the reference face image related to the target face image, so that the service request sent by the client is processed only when the effective face image is acquired, the legitimacy of the current service object can be verified, the malicious request of a user is further avoided, and the processing load of the server is reduced.
In order to implement the above embodiment, the present application further proposes a service processing apparatus.
Fig. 3 is a schematic structural diagram of a service processing device according to an embodiment of the present application.
As shown in fig. 3, the service processing device 30 includes:
the first sending module 31 is configured to send an image acquisition instruction to the client after the server acquires a service request sent by the client, so that the client acquires a face image of a current service object;
a generating module 32, configured to generate current verification data according to the face image acquired by the client by using the server;
a return module 33, configured to return the current verification data to the client by using the server, so that the client displays the current verification data;
and the processing module 34 is configured to process the service request according to a verification data processing result returned by the client.
In actual use, the service processing apparatus provided in the embodiments of the present application may be configured in any electronic device to perform the foregoing service processing method.
According to the service processing device provided by the embodiment of the application, after the service request sent by the client is obtained through the server, an image acquisition instruction is sent to the client so that the client acquires the face image of the current service object, current check data is generated according to the face image acquired by the client, the current check data is returned to the client so that the client displays the current check data, and further the service request is processed according to the check data processing result returned by the client. Therefore, when a service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, malicious requests of users are avoided, and the processing load of a server is reduced.
In one possible implementation form of the present application, the generating module 32 is specifically configured to:
the server identifies the face image acquired by the client to determine the character characteristics currently corresponding to the face image;
and the server generates current verification data according to the character characteristics currently corresponding to the face image.
Further, in another possible implementation form of the present application, the above object features include at least one of the following features: gender, age, expression.
Further, in still another possible implementation form of the present application, the generating module 32 is further configured to:
the server acquires a target face image according to the identification of the client;
when the server determines that the face image acquired by the client is matched with a target face image, acquiring each reference face image associated with the target face image;
the server acquires a target reference face image for generating current verification data from the reference face images;
and the server generates current check data according to the target reference face image.
Further, in still another possible implementation form of the present application, the generating module 32 is further configured to:
Acquiring a target reference face image for generating current verification data from each reference face image according to the relation between each reference face image and the target face image;
or alternatively, the process may be performed,
acquiring a target reference face image for generating current verification data from each reference face image according to the current on-line state of each reference face image;
or alternatively, the process may be performed,
and acquiring a target reference face image for generating current verification data from each reference face image according to the historical interaction frequency of each reference face image and the target face image.
In one possible implementation form of the present application, the service processing apparatus 30 further includes:
and the second sending module is used for sending a prompt message used for representing failure of service request response to the client if the server does not acquire the face image returned by the client, so that the client displays the prompt message.
In one possible implementation form of the present application, the processing module 34 is specifically configured to:
and if the server determines that the check data processing result returned by the client is wrong, the server resends an image acquisition instruction to the client.
It should be noted that the foregoing explanation of the embodiment of the service processing method shown in fig. 1 and 2 is also applicable to the service processing apparatus 30 of this embodiment, and will not be repeated here.
According to the service processing device provided by the embodiment of the application, after the service request sent by the client is acquired through the server, an image acquisition instruction is sent to the client so that the client acquires the face image of the current service object, the target face image is acquired according to the identification of the client, then when the face image acquired by the client is determined to be matched with the target face image, each reference face image associated with the target face image is acquired, further, the target reference face image used for generating the current check data is acquired from each reference face image, the current check data is generated according to the target reference face image, then the current check data is returned to the client, and further, the service request is processed according to the check data processing result returned by the client. Therefore, when the face image of the current service object is acquired, the legitimacy of the current service object is further verified according to the matching degree of the face image acquired by the client and the target face image, and the current verification data is generated by utilizing the reference face image related to the target face image, so that the service request sent by the client is processed only when the effective face image is acquired, the legitimacy of the current service object can be verified, the malicious request of a user is further avoided, and the processing load of the server is reduced.
In order to implement the above embodiment, the present application further proposes an electronic device.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
As shown in fig. 4, the electronic device 200 includes:
the memory 210 and the processor 220, the bus 230 connecting the different components (including the memory 210 and the processor 220), the memory 210 stores a computer program, and the processor 220 implements the service processing method described in the embodiments of the present application when executing the program.
Bus 230 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, micro channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 200 typically includes a variety of electronic device readable media. Such media can be any available media that is accessible by electronic device 200 and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 210 may also include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 240 and/or cache memory 250. The electronic device 200 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 260 may be used to read from or write to a non-removable, non-volatile magnetic media (not shown in FIG. 4, commonly referred to as a "hard disk drive"). Although not shown in fig. 4, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be coupled to bus 230 via one or more data medium interfaces. Memory 210 may include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of the embodiments of the present application.
Program/utility 280 having a set (at least one) of program modules 270 may be stored in, for example, memory 210, such program modules 270 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 270 generally perform the functions and/or methods in the embodiments described herein.
The electronic device 200 may also communicate with one or more external devices 290 (e.g., keyboard, pointing device, display 291, etc.), one or more devices that enable a user to interact with the electronic device 200, and/or any device (e.g., network card, modem, etc.) that enables the electronic device 200 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 292. Also, electronic device 200 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 293. As shown, network adapter 293 communicates with other modules of electronic device 200 over bus 230. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 200, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
The processor 220 executes various functional applications and data processing by running programs stored in the memory 210.
It should be noted that, the implementation process and the technical principle of the electronic device in this embodiment refer to the foregoing explanation of the service processing method in this embodiment, and are not repeated herein.
The electronic device provided by the embodiment of the application may execute the service processing method as described above, and after obtaining a service request sent by a client, send an image acquisition instruction to the client, so that the client acquires a face image of a current service object, generates current verification data according to the face image acquired by the client, and returns the current verification data to the client, so that the client displays the current verification data, and further processes the service request according to a verification data processing result returned by the client. Therefore, when a service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, malicious requests of users are avoided, and the processing load of a server is reduced.
To achieve the above embodiments, the present application also proposes a computer-readable storage medium.
Wherein the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the service processing method described in the embodiments of the present application.
In order to implement the above embodiments, an embodiment of a further aspect of the present application provides a computer program, which when executed by a processor, implements the service processing method described in the embodiments of the present application.
In alternative implementations, the present embodiments may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the consumer electronic device, partly on the consumer electronic device, as a stand-alone software package, partly on the consumer electronic device and partly on the remote electronic device or entirely on the remote electronic device or server. In the case of remote electronic devices, the remote electronic device may be connected to the consumer electronic device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external electronic device (e.g., connected through the internet using an internet service provider).
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (9)

1. A service processing method, comprising:
after acquiring a service request sent by a client, a server sends an image acquisition instruction to the client so that the client acquires a face image of a current service object;
the server generates current verification data according to the face image acquired by the client;
the server returns the current check data to the client so that the client displays the current check data; when the server returns the current check data to the client, the server also returns a preset processing rule for the current check data to the client, so that the current service object processes the current check data according to the current check data displayed in the client and the processing rule for the current check data to obtain a check data processing result;
The server processes the service request according to the verification data processing result returned by the client;
the server generates current verification data according to the face image acquired by the client, and the method comprises the following steps:
the server acquires a target face image according to the identification of the client;
when the server determines that the face image acquired by the client is matched with a target face image, acquiring each reference face image associated with the target face image;
the server acquires a target reference face image for generating current verification data from the reference face images;
and the server generates current check data according to the target reference face image.
2. The method of claim 1, wherein the server generating current verification data from the face image collected by the client comprises:
the server identifies the face image acquired by the client to determine the character characteristics currently corresponding to the face image;
and the server generates current verification data according to the character characteristics currently corresponding to the face image.
3. The method of claim 2, wherein the character features comprise at least one of the following features: gender, age, expression.
4. The method of claim 1, wherein the obtaining the target reference face image from the reference face images for generating the current verification data comprises:
acquiring a target reference face image for generating current verification data from each reference face image according to the relation between each reference face image and the target face image;
or alternatively, the process may be performed,
acquiring a target reference face image for generating current verification data from each reference face image according to the current on-line state of each reference face image;
or alternatively, the process may be performed,
and acquiring a target reference face image for generating current verification data from each reference face image according to the historical interaction frequency of each reference face image and the target face image.
5. The method of any of claims 1-4, wherein after sending the image acquisition instruction to the client, further comprising:
and if the server does not acquire the face image returned by the client, sending a prompt message for representing failure of service request response to the client so that the client displays the prompt message.
6. The method as claimed in any one of claims 1 to 4, wherein the server processes the service request according to the verification data processing result returned by the client, and the method comprises:
and if the server determines that the check data processing result returned by the client is wrong, the server resends an image acquisition instruction to the client.
7. A service processing apparatus, comprising:
the sending module is used for sending an image acquisition instruction to the client after the server acquires the service request sent by the client so that the client acquires the face image of the current service object;
the generation module is used for generating current verification data according to the face image acquired by the client;
the return module is used for returning the current check data to the client by the server so that the client can display the current check data; when the current check data is returned to the client, a preset processing rule for the current check data is returned to the client, so that the current service object processes the current check data according to the current check data displayed in the client and the processing rule for the current check data to obtain a check data processing result;
The processing module is used for processing the service request according to the verification data processing result returned by the client;
the server generates current verification data according to the face image acquired by the client, and the method comprises the following steps:
the server acquires a target face image according to the identification of the client;
when the server determines that the face image acquired by the client is matched with a target face image, acquiring each reference face image associated with the target face image;
the server acquires a target reference face image for generating current verification data from the reference face images;
and the server generates current check data according to the target reference face image.
8. An electronic device, comprising: memory, a processor and a program stored on the memory and executable on the processor, wherein the processor implements the service processing method according to any one of claims 1-6 when executing the program.
9. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the service processing method according to any one of claims 1-6.
CN202111032354.0A 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium Active CN113810394B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111032354.0A CN113810394B (en) 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111032354.0A CN113810394B (en) 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium
CN201910169192.1A CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201910169192.1A Division CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113810394A CN113810394A (en) 2021-12-17
CN113810394B true CN113810394B (en) 2023-06-06

Family

ID=67129629

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201910169192.1A Active CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium
CN202111032354.0A Active CN113810394B (en) 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201910169192.1A Active CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (2) CN109995761B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113011339A (en) * 2021-03-19 2021-06-22 支付宝(杭州)信息技术有限公司 User identity verification method and device and electronic equipment
CN113536270B (en) * 2021-07-26 2023-08-08 网易(杭州)网络有限公司 Information verification method, device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015062255A1 (en) * 2013-10-31 2015-05-07 Tencent Technology (Shenzhen) Company Limited Information processing method, device and system
CN106844492A (en) * 2016-12-24 2017-06-13 深圳云天励飞技术有限公司 A kind of method of recognition of face, client, server and system
CN108776791A (en) * 2018-06-07 2018-11-09 中国平安人寿保险股份有限公司 Client identity identifies method of calibration, device, computer equipment and storage medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592254A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Identifying code system based on image splicing
CN105024814B (en) * 2014-04-22 2019-02-05 腾讯科技(深圳)有限公司 A kind of verification method, server and system
CN104135671A (en) * 2014-07-25 2014-11-05 宁波创视信息技术有限公司 Television video content interactive question and answer method
JP6096161B2 (en) * 2014-10-15 2017-03-15 ソニー株式会社 Information processing apparatus and information processing method
CN105989263A (en) * 2015-01-30 2016-10-05 阿里巴巴集团控股有限公司 Method for authenticating identities, method for opening accounts, devices and systems
CN105025018B (en) * 2015-07-06 2016-09-07 国网山东寿光市供电公司 A kind of method carrying out safety verification in communication process
CN105184570A (en) * 2015-09-01 2015-12-23 百度在线网络技术(北京)有限公司 Information verification method and device
US9760700B2 (en) * 2015-12-03 2017-09-12 Google Inc. Image based CAPTCHA challenges
CN106169075A (en) * 2016-07-11 2016-11-30 北京小米移动软件有限公司 Auth method and device
CN108090405B (en) * 2016-11-23 2020-08-14 腾讯科技(深圳)有限公司 Face recognition method and terminal
CN107483423B (en) * 2017-08-04 2020-10-27 北京联合大学 User login verification method
CN107766713B (en) * 2017-10-18 2020-02-18 Oppo广东移动通信有限公司 Face template data entry control method and related product
CN107846424A (en) * 2017-12-26 2018-03-27 上海棠宝机器人有限公司 A kind of login validation method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015062255A1 (en) * 2013-10-31 2015-05-07 Tencent Technology (Shenzhen) Company Limited Information processing method, device and system
CN106844492A (en) * 2016-12-24 2017-06-13 深圳云天励飞技术有限公司 A kind of method of recognition of face, client, server and system
CN108776791A (en) * 2018-06-07 2018-11-09 中国平安人寿保险股份有限公司 Client identity identifies method of calibration, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN109995761B (en) 2021-10-19
CN113810394A (en) 2021-12-17
CN109995761A (en) 2019-07-09

Similar Documents

Publication Publication Date Title
US10839061B2 (en) Method and apparatus for identity authentication
KR101571741B1 (en) User-based identification system for social networks
WO2021175019A1 (en) Guide method for audio and video recording, apparatus, computer device, and storage medium
CN109993150B (en) Method and device for identifying age
US20150161613A1 (en) Methods and systems for authentications and online transactions
CN111343162B (en) System secure login method, device, medium and electronic equipment
US11106767B2 (en) Decentralized name verification using recursive attestation
CN110334144B (en) Message display method, device, computer equipment and storage medium
CN110247898B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
US8812668B2 (en) Enhanced human interactive proof (HIP) for accessing on-line resources
US11847584B2 (en) Systems and methods for automated identity verification
WO2018205468A1 (en) Biometric transaction processing method, electronic device and storage medium
WO2015106728A1 (en) Data processing method and system
CN113810394B (en) Service processing method, device, electronic equipment and storage medium
WO2022048170A1 (en) Method and apparatus for conducting human-machine conversation, computer device, and storage medium
CN110826036A (en) User operation behavior safety identification method and device and electronic equipment
CN113158156A (en) Service processing method, system, device, electronic equipment and storage medium
US20220058278A1 (en) Using machine learning to bypass activities of a secure document workflow based on recipient profile
CN111125656B (en) Service processing method and device and electronic equipment
US20220414193A1 (en) Systems and methods for secure adaptive illustrations
US20220058287A1 (en) Modifying elements of a secure document workflow based on change in profile of recipient
CA3142780A1 (en) Webpage access method, apparatus, computer device and storage medium
CN110690973B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
US20240048558A1 (en) Device authentication method, terminal device, server, and computer device
CN111064653B (en) Image exchange method, device and system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant