在下面的描述中闡述了很多具體細節以便於充分理解本發明。但是本發明能夠以很多不同於在此描述的其它方式來實施,本領域技術人員可以在不違背本發明內涵的情況下做類似推廣,因此本發明不受下面公開的具體實施的限制。
在本說明書一個或多個實施例中使用的用語是僅僅出於描述特定實施例的目的,而非旨在限制本說明書一個或多個實施例。在本說明書一個或多個實施例和所附申請專利範圍中所使用的單數形式的“一種”、“所述”和“該”也旨在包括多數形式,除非上下文清楚地表示其他含義。還應當理解,本說明書一個或多個實施例中使用的用語“及/或”是指並包含一個或多個相關聯的列出項目的任何或所有可能組合。
應當理解,儘管在本說明書一個或多個實施例中可能採用用語第一、第二、第三等來描述各種資訊,但這些資訊不應限於這些用語。這些用語僅用來將同一類型的資訊彼此區分開。例如,在不脫離本說明書一個或多個實施例範圍的情況下,第一也可以被稱為第二,類似地,第二也可以被稱為第一。取決於語境,如在此所使用的詞語“如果”可以被解釋成為“在……時”或“當……時”或“回應於確定”。
在本說明書一個或多個實施例中,提供了一種身份驗證方法及裝置、電腦設備和電腦儲存媒體,在下面的實施例中逐一進行詳細說明。
參見圖1,本說明書一個實施例提供了一種身份驗證的系統架構圖,包括網路102、註冊終端104、掃描終端106以及電腦設備108,其中,所述電腦設備108包括但不限於記憶體110、處理器112、通信介面114以及匯流排116。
所述網路102分別與所述註冊終端104、所述掃描終端106之間相互通信,所述網路102與所述電腦設備108通過所述通信介面114完成相互通信,所述掃描終端106與所述電腦設備108通過所述通信介面114完成相互通信。
所述處理器112、所述通信介面114和所述記憶體110通過所述匯流排116完成相互間的通信。
所述註冊終端104,被配置為向所述網路102傳送註冊資訊。
所述網路102,被配置為接受所述註冊終端104傳送的第一註冊資訊,並將所述第一註冊資訊通過所述通信介面114傳送至所述記憶體110中,還可以通過與展示設備通信後將所述第一註冊資訊經由展示設備處理後進行圖片展示。
所述掃描終端106,被配置為掃描經由展示設備處理後進行展示的圖片,然後將所述圖片通過所述通信介面114傳送至所述記憶體110中。
所述通信介面114,被配置為接收所述網路102的第一註冊資訊和所述掃描終端106的圖片,然後將所述第一註冊資訊和所述圖片傳送至所述記憶體110中。
所述通信介面114使得電腦設備108能夠經由一個或多個網路通信。這些網路的示例包括區域網路(LAN)、廣域網路(WAN)、個人區域網(PAN)或諸如網際網路的通信網路的組合。網路介面可以包括有線或無線的任何類型的網路介面(例如,網路介面卡(NIC))中的一個或多個,諸如IEEE802.11區域網路無線區域網路(WLAN)無線介面、全球微波互聯接入(Wi-MAX)介面、以太網介面、通用序列匯流排(USB)介面、蜂巢式網路介面、藍牙介面、近場通信(NFC)介面,等等。
所述記憶體110,被配置為儲存通信介面114通過匯流排116發送的第一註冊資訊和圖片以及儲存在記憶體110上並可在處理器112上運行的電腦指令。
所述處理器112,被配置為獲取儲存在記憶體110的第一註冊資訊和圖片後,執行儲存在記憶體110上的電腦指令,實現對所述待識別對象的驗證。
所述電腦設備108可以是任何類型的靜止或行動電腦設備,包括行動電腦或行動電腦設備(例如,平板電腦、個人數位助理、膝上型電腦、筆記型電腦、小筆電等)、行動電話(例如,智能手機)、可佩戴的電腦設備(例如,智能手錶、智能眼鏡等)或其他類型的行動設備,或者諸如桌上型電腦或PC的靜止電腦設備。
其中,處理器112可以執行圖2所示方法中的步驟。圖2是示出了說明書一個實施例提供的身份驗證方法的示意性流程圖,包括步驟202至步驟206。
步驟202:接收待識別影像。
本說明書一個或多個實施例中,所述待識別影像包括但不限於攜帶有文字、圖形或者特殊符號的影像。所述文字可以包括但不限於漢字、拼音、阿拉伯數位或其他各國語言符號等,所述影像可以包括但不限於平面影像、立體圖形或者幾何圖形等,可以是手繪圖形或製圖工具繪製的圖形等,所述特殊符號包括但不限於使用頻率較少且難以直接輸入的數學符號、單位符號、制表符號或者貨幣符號等。
本說明書一個或多個實施例中,接收待識別影像之前,還包括:
接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。
本說明書一個或多個實施例中,所述第一驗證資訊和所述第二驗證資訊包括但不限於身份驗證資訊,所述身份驗證是指在電腦及電腦網路系統中確認操作者身份的過程,從而確定該使用者是否具有對某種資源的存取和使用權限,進而使電腦和網路系統的存取策略能夠可靠、有效地執行,防止攻擊者假冒合法使用者獲得資源的存取權限,保證系統和資料的安全,以及授權存取者的合法利益,所述身份驗證資訊包括有關一個人身份的任何資料,這些資料能夠幫助識別某個人的身份,如姓名、指紋或其他生物特徵資料、電子郵件位址、住址、電話號碼或社會安全號碼等。
實際應用中,所述第一驗證資訊和所述第二驗證資訊相對應,例如若所述第一驗證資訊為某個人的身份證號碼,所述第二驗證資訊則可以為所述身份證號碼對應的真實姓名,或者若所述第一驗證資訊為某個人的手機號碼,所述第二驗證資訊則可以為所述手機號碼對應的實名認證姓名。
以所述第一驗證資訊為某個人的手機號碼“13456789999”,所述第二驗證資訊為所述手機號碼對應的實名認證姓名“小a”為例進行說明,接收並儲存待識別對象的第一驗證資訊和第二驗證資訊包括接收並儲存待識別對象的第一驗證資訊“13456789999”和第二驗證資訊“小a”。
步驟204:識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。
本說明書一個或多個實施例中,所述第一標識資訊包括但不限於所述待識別對象的手機號碼或郵件位址,所述第二標識資訊包括但不限於所述待識別對象的真實姓名或註冊帳號;或者所述第一標識資訊包括但不限於所述待識別對象的真實姓名或註冊帳號,所述第二標識資訊包括但不限於所述待識別對象的手機號碼或郵件位址。
所述第一標識資訊和所述第二標識資訊其中的一個為唯一識別所述待識別對象身份的資訊,所述唯一識別所述待識別對象身份的資訊包括但不限於所述待識別對象的手機號碼或郵件位址。
本說明書一個或多個實施例中,可以根據實際應用選擇第一標識資訊或者所述第二標識資訊為唯一識別所述待識別對象身份的資訊,本發明對此不作任何限定。
本說明書一個或多個實施例中,所述第一標識資訊和所述第二標識資訊不相同,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。例如若所述第一標識資訊包括所述待識別對象的手機號碼“13456789999”,所述第二標識資訊包括所述待識別對象的姓名“小a”,則手機號碼“13456789999”和姓名“小a”的組合就可以用於對待識別對象進行確認。
步驟206:若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。
本說明書一個或多個實施例中,首先識別出所述待識別影像中的第一標識資訊和第二標識資訊,若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。
以預存的所述第一驗證資訊為手機號碼,所述第二驗證資訊為所述手機號碼對應的實名認證姓名為例進行說明,參見表1。
表1
以表1可知,第一驗證資訊“13456789999”對應第二驗證資訊“小a”,第一驗證資訊“13433332222”對應第二驗證資訊“小b”,第一驗證資訊“13511112222”對應第二驗證資訊“小c”。
若識別出的所述待識別影像中的第一標識資訊為“13456789999”和第二標識資訊為“小a”,則可以確定所述第一標識資訊“13456789999”和所述第二標識資訊“小a”與預存的所述待識別對象的第一驗證資訊“13456789999”和第二驗證資訊“小a”相匹配,則確定所述待識別對象通過驗證。
若識別出的所述待識別影像中的第一標識資訊為“13456789999”和第二標識資訊為“小d”,則可以確定所述第一標識資訊“13456789999”和所述第二標識資訊“小d”與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則確定所述待識別對象未通過驗證。
本說明書一個或多個實施例中,所述身份驗證方法包括接收待識別影像;然後識別出所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認,並且所述第一標識資訊和所述第二標識資訊為能夠通過肉眼快速識別出的手機號碼或姓名等資訊;若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證,可以通過第一標識資訊和第二標識資訊相對應,採用資料之間的關聯對待識別對象進行身份確認可以保證身份驗證的準確性。
參見圖3,本說明書一個實施例提供了一種身份驗證方法,包括步驟302至步驟308。
步驟302:接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。
步驟304:根據預設的脫敏規則對所述第一驗證資訊或所述第二驗證資訊進行脫敏處理。
本說明書一個或多個實施例中,資訊脫敏是指對某些敏感資訊通過脫敏規則進行資訊變形,實現敏感隱私資訊的可靠保護。在涉及客戶安全資訊或者一些商業性敏感資訊的情況下,在不違反系統規則條件下,對真實資訊進行改造並提供測試使用,如客戶真實姓名或註冊帳號等個人資訊進行資訊脫敏。
以所述第一驗證資訊為姓名“木小a”為例,所述預設的脫敏規則可以包括對所述姓名的第一個字進行脫敏、對第二個字進行脫敏或對前兩個字進行脫敏,使得脫敏後的所述姓名為*小a、木*a或**a。
對所述第一驗證資訊或所述第二驗證資訊進行脫敏的過程中,可以根據實際需求設置脫敏規則和選擇需要脫敏的驗證資訊,本發明對此不作任何限定。
步驟306:識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。
步驟308:若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。
本說明書一個或多個實施例中,識別所述待識別影像中的第一標識資訊和第二標識資訊包括:
識別所述待識別影像中的第二標識資訊和脫敏後的第一標識資訊;
所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配包括:
所述第二標識資訊和脫敏後的第一標識資訊與預存的所述待識別對象的第二驗證資訊和根據預設的脫敏規則進行脫敏處理的第一驗證資訊相匹配。
以所述第一標識資訊為姓名“木小a”、所述預設的脫敏規則包括將第一標識資訊的第一個字變形為#為例,脫敏後的第一標識資訊為“#小a”。
以預存的所述第二驗證資訊為手機號碼,所述第一驗證資訊為脫敏後的所述手機號碼對應的實名認證姓名為例進行說明,參見表2。
表2
以表1可知,第一驗證資訊“#小a”對應第二驗證資訊“13456789999”,第一驗證資訊“#小b”對應第二驗證資訊“13433332222”,第一驗證資訊“#小c”對應第二驗證資訊“13511112222”。
若識別出的所述待識別影像中的脫敏後的第一標識資訊為“#小a”和第二標識資訊為“13456789999”,則可以確定所述第一標識資訊“#小a”和所述第二標識資訊“13456789999”與預存的所述待識別對象脫敏後的第一驗證資訊“#小a”和第二驗證資訊“13456789999”相匹配,則確定所述待識別對象通過驗證。
若識別出的所述待識別影像中的脫敏後的第一標識資訊為“#小d”和第二標識資訊為“13456789999”,則可以確定所述第一標識資訊“#小d”和所述第二標識資訊“13456789999”與預存的所述待識別對象脫敏後的第一驗證資訊和第二驗證資訊不匹配,則確定所述待識別對象未通過驗證。
本說明書一個或多個實施例中,在所述第一標識資訊為脫敏後的標識資訊的情況下,則所述第二標識資訊為可以唯一識別所述待識別對象身份的資訊。
本說明書一個或多個實施例中,識別所述待識別影像中的第一標識資訊和第二標識資訊包括:
識別所述待識別影像中的第一標識資訊和脫敏後的第二標識資訊;
所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配包括:
所述第一標識資訊和脫敏後的第二標識資訊與預存的所述待識別對象的第一驗證資訊和根據預設的脫敏規則進行脫敏處理的第二驗證資訊相匹配。
以所述第二標識資訊為姓名“木小b”、所述預設的脫敏規則包括將第二標識資訊的第一個字變形為*為例,脫敏後的第二標識資訊為“*小b”。
以預存的所述第一驗證資訊為身份證號,所述第二驗證資訊為脫敏後的所述身份證號對應的實名認證姓名為例進行說明,參見表3。
表3
以表1可知,第一驗證資訊“12345647899412”對應第二驗證資訊“#小a”,第一驗證資訊“11565648948634”對應第二驗證資訊“#小b”,第一驗證資訊“11565648948635”對應第二驗證資訊“#小c”。
若識別出的所述待識別影像中的脫敏後的第一標識資訊為“11565648948634”和第二標識資訊為“#小b”,則可以確定所述第一標識資訊“11565648948634”和所述第二標識資訊“#小b”與預存的所述待識別對象脫敏後的第一驗證資訊“11565648948634”和第二驗證資訊“#小b”相匹配,則確定所述待識別對象通過驗證。
若識別出的所述待識別影像中的脫敏後的第一標識資訊為“11565648948634”和第二標識資訊為“#小d”,則可以確定所述第一標識資訊“11565648948634”和所述第二標識資訊“#小d”與預存的所述待識別對象脫敏後的第一驗證資訊和第二驗證資訊不匹配,則確定所述待識別對象未通過驗證。
本說明書一個或多個實施例中,在所述第二標識資訊為脫敏後標識資訊的情況下,所述第一標識資訊為可以唯一識別所述待識別對象身份的資訊。
實際應用中,為了保證待識別對象身份驗證的準確性,不對可以唯一識別所述待識別對象身份的資訊進行脫敏。
本說明書一個或多個實施例中,所述身份驗證方法可以將預存的第一驗證資訊或第二驗證資訊進行脫敏,然後在對待識別對象進行身份驗證時,對識別出的第一標識資訊或第二標識資訊進行脫敏後與預存的第一驗證資訊或第二驗證資訊進行匹配,實現對待識別對象身份的驗證,採用對唯一識別所述待識別對象身份的資訊進行脫敏既可以保證資訊的安全性,又可以保證身份驗證的準確性。
參見圖4,本說明書一個實施例提供了一種身份驗證方法,包括步驟402至步驟408。
步驟402:接收待識別影像。
步驟404:識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。
步驟406:若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。
本說明書一個或多個實施例中,若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則所述待識別對象驗證失敗,發出驗證失敗提示。
所述驗證失敗提示包括但不限於短訊息提示、郵件提示或彈窗提示。
步驟408:執行對應的業務操作。
本說明書一個或多個實施例中,所述業務操作包括付款操作、退款操作或者修改密碼操作。
例如若所述業務操作為退款操作,確認所述待識別對象通過驗證後,則執行退款操作,可以實現將款項退至所述待識別對象帳戶。
本說明書一個或多個實施例中,所述身份驗證方法可以在完成身份驗證之後執行對應的操作,可以實現安全驗證以及執行操作雙重功能,極大的擴展了該方法的使用價值,並且待識別對象的身份驗證不通過的情況下可以給出提示資訊,提高使用者體驗效果。
參見圖5,將所述身份驗證方法應用在商戶使用支付寶進行收款中,所述驗證方法包括步驟502至步驟512。
步驟502:支付寶伺服端接收並儲存待識別對象小a的第一驗證資訊和第二驗證資訊。
本說明書一個或多個實施例中,所述第一驗證資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二驗證資訊可以包括所述待識別對象的註冊帳號“小牛vv”。
步驟504:付款使用者使用支付寶APP掃描列印出來的含有第一標識資訊和第二標識資訊的影像。
步驟506:採用影像識別演算法識別所述待識別影像中的第一標識資訊和第二標識資訊,並將所述第一標識資訊和所述第二標識資訊上傳至支付寶伺服端。
本說明書一個或多個實施例中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。
本說明書一個或多個實施例中,所述第一標識資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二標識資訊可以包括所述待識別對象的註冊帳號“小牛vv”。
步驟508:判斷所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象小a的第一驗證資訊和第二驗證資訊是否匹配,若是,則執行步驟510,若否,則執行步驟512。
本說明書一個或多個實施例中,以所述第一驗證資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二驗證資訊可以包括所述待識別對象的註冊帳號“小牛vv”;所述第一標識資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二標識資訊可以包括所述待識別對象的註冊帳號“小牛vv”為例進行說明,所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象小a為預先在支付寶伺服端註冊的待識別對象小a。
步驟510:付款使用者可以進行支付寶付款操作。
本說明書一個或多個實施例中,若確認所述待識別對象小a為預先在支付寶伺服端註冊的待識別對象小a,則付款使用者就可以向待識別對象小a進行支付寶付款。
步驟512:支付寶APP返回驗證失敗提示。
本說明書一個或多個實施例中,所述身份驗證方法可以在完成身份驗證之後執行對商戶的支付寶付款,通過採用商戶較為熟悉的email以及註冊帳戶等個人資訊進行註冊和驗證,避免商戶的收款資訊被替換或者篡改,保證了商戶收款以及付款使用者付款的安全性以及準確性,並且在身份驗證失敗的時候還會給出失敗提示,使用者體驗效果好。
參見圖6,本說明書一實施例提供了一種身份驗證裝置,包括:
接收模組602,被配置為接收待識別影像;
識別模組604,被配置為識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認;
第一判斷模組606,被配置為若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。
可選地,所述裝置還包括:
儲存模組,被配置為接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。
可選地,所述裝置還包括:
第一脫敏模組,被配置為根據預設的脫敏規則對所述第一驗證資訊進行脫敏處理。
可選地,所述識別模組604被配置為:
識別所述待識別影像中第二標識資訊和脫敏後的第一標識資訊;
所述第一判斷模組606被配置為:
所述第二標識資訊和脫敏後的第一標識資訊與預存的所述待識別對象的第二驗證資訊和脫敏後的第一驗證資訊相匹配。
可選地,所述裝置還包括:
第二脫敏模組,被配置為根據預設的脫敏規則對所述第二驗證資訊進行脫敏處理。
可選地,所述識別模組604被配置為:
識別所述待識別影像中的第一標識資訊和脫敏後的第二標識資訊;
所述第一判斷模組606被配置為:
所述第一標識資訊和脫敏後的第二標識資訊與預存的所述待識別對象的第一驗證資訊和脫敏後的第二驗證資訊相匹配。
可選地,所述第一標識資訊包括所述待識別對象的手機號碼或郵件位址。
可選地,所述第二標識資訊包括所述待識別對象的真實姓名或註冊帳號。
可選地,所述裝置還包括:
第二判斷模組,被配置為若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則所述待識別對象驗證失敗,發出驗證失敗提示。
可選地,所述驗證失敗提示包括短訊息提示、郵件提示或彈窗提示。
可選地,所述裝置還包括:
執行模組,被配置為執行對應的業務操作。
可選地,所述業務操作包括付款操作、退款操作或者修改密碼操作。
本說明書一個或多個實施例中,所述身份驗證裝置能夠通過掃描得到的兩個資料,採用所述兩個資料之間的關聯性對待識別對象進行身份確認可以保證身份驗證的準確性。
本說明書一個或多個實施例中的各個實施例均採用循序的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於裝置實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。
本發明一實施例還提供一種電腦可讀儲存媒體,其儲存有電腦指令,該指令被處理器執行時實現所述身份驗證方法的步驟。
上述為本實施例的一種電腦可讀儲存媒體的示意性方案。需要說明的是,該儲存媒體的技術方案與上述的身份驗證方法的技術方案屬同一構思,儲存媒體的技術方案未詳細描述的細節內容,均可以參見上述身份驗證方法的技術方案的描述。
上述對本說明書特定實施例進行了描述。其它實施例在所附申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在附圖中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多任務處理和平行處理也是可以的或者可能是有利的。
本發明實施例中所述支付涉及的技術載體,例如可以包括近場通信(Near Field Communication,NFC)、WIFI、3G/4G/5G、POS機刷卡技術、二維條碼讀碼技術、條碼讀碼技術、藍牙、紅外線、短訊息服務(Short Message Service,SMS)、多媒體訊息服務(Multimedia Message Service,MMS)等。
所述電腦指令包括電腦指令程式碼,所述電腦指令程式碼可以為程式碼原始碼形式、物件程式碼形式、可執行檔案或某些中間形式等。所述電腦可讀媒體可以包括:能夠攜帶所述電腦指令程式碼的任何實體或裝置、記錄媒體、隨身碟、行動硬碟、磁碟、光碟、電腦記憶體、唯讀記憶體(ROM,Read-Only Memory)、隨機存取記憶體(RAM,Random Access Memory)、電載波訊號、電信訊號以及軟體分發媒體等。需要說明的是,所述電腦可讀媒體包含的內容可以根據司法管轄區內立法和專利實踐的要求進行適當的增減,例如在某些司法管轄區,根據立法和專利實踐,電腦可讀媒體不包括電載波訊號和電信訊號。
需要說明的是,對於前述的各方法實施例,為了簡便描述,故將其都表述為一系列的動作組合,但是本領域技術人員應該知悉,本發明並不受所描述的動作順序的限制,因為依據本發明,某些步驟可以採用其它順序或者同時進行。其次,本領域技術人員也應該知悉,說明書中所描述的實施例均屬較佳實施例,所涉及的動作和模組並不一定都是本發明所必須的。
在上述實施例中,對各個實施例的描述都各有側重,某個實施例中沒有詳述的部分,可以參見其它實施例的相關描述。
以上公開的本發明較佳實施例只是用於幫助闡述本發明。可選實施例並沒有詳盡敘述所有的細節,也不限制該發明僅為所述的具體實施方式。顯然,根據本說明書的內容,可作很多的修改和變化。本說明書選取並具體描述這些實施例,是為了更好地解釋本發明的原理和實際應用,從而使所屬技術領域技術人員能很好地理解和利用本發明。本發明僅受申請專利範圍及其全部範圍和等效物的限制。In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can be implemented in many other ways than those described here, and those skilled in the art can make similar promotion without violating the connotation of the present invention, so the present invention is not limited by the specific implementation disclosed below. The terminology used in one or more embodiments of this specification is for the purpose of describing particular embodiments only, and is not intended to limit one or more embodiments of this specification. The singular forms "a", "said" and "the" used in the scope of one or more embodiments of the present specification and the appended patent applications are also intended to include most forms unless the context clearly indicates other meanings. It should also be understood that the term "and/or" used in one or more embodiments of this specification refers to and includes any or all possible combinations of one or more of the associated listed items. It should be understood that although the terms first, second, third, etc. may be used to describe various information in one or more embodiments of this specification, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of one or more embodiments of this specification, the first may also be referred to as the second, and similarly, the second may also be referred to as the first. Depending on the context, the word "if" as used herein can be interpreted as "when" or "when..." or "responsive to certainty". In one or more embodiments of this specification, an identity verification method and device, computer equipment, and computer storage media are provided, which will be described in detail in the following embodiments. Referring to FIG. 1, an embodiment of the present specification provides an identity verification system architecture diagram, including a network 102, a registration terminal 104, a scanning terminal 106, and a computer device 108, where the computer device 108 includes but is not limited to the memory 110 , Processor 112, communication interface 114 and bus 116. The network 102 communicates with the registration terminal 104 and the scanning terminal 106 respectively. The network 102 and the computer device 108 communicate with each other through the communication interface 114. The scanning terminal 106 communicates with The computer device 108 communicates with each other through the communication interface 114. The processor 112, the communication interface 114 and the memory 110 communicate with each other through the bus 116. The registration terminal 104 is configured to send registration information to the network 102. The network 102 is configured to accept the first registration information transmitted by the registration terminal 104, and transmit the first registration information to the memory 110 through the communication interface 114, and may also display After the device communicates, the first registration information is processed by the display device to display pictures. The scanning terminal 106 is configured to scan a picture processed by a display device for display, and then transmit the picture to the memory 110 through the communication interface 114. The communication interface 114 is configured to receive the first registration information of the network 102 and the picture of the scanning terminal 106, and then transmit the first registration information and the picture to the memory 110. The communication interface 114 enables the computer device 108 to communicate via one or more networks. Examples of these networks include a combination of a local area network (LAN), a wide area network (WAN), a personal area network (PAN), or a communication network such as the Internet. The network interface may include one or more of any type of network interface (eg, a network interface card (NIC)), wired or wireless, such as an IEEE 802.11 local area network wireless local area network (WLAN) wireless interface, Global microwave interconnection access (Wi-MAX) interface, Ethernet interface, universal serial bus (USB) interface, cellular network interface, Bluetooth interface, near field communication (NFC) interface, etc. The memory 110 is configured to store the first registration information and pictures sent by the communication interface 114 through the bus 116 and computer instructions stored on the memory 110 and executable on the processor 112. The processor 112 is configured to obtain the first registration information and pictures stored in the memory 110, and execute computer instructions stored in the memory 110 to implement verification of the object to be identified. The computer device 108 may be any type of stationary or mobile computer device, including a mobile computer or mobile computer device (eg, tablet computer, personal digital assistant, laptop computer, notebook computer, small laptop, etc.), mobile phone (Eg, smartphone), wearable computer equipment (eg, smart watches, smart glasses, etc.) or other types of mobile devices, or stationary computer equipment such as desktop computers or PCs. The processor 112 may execute the steps in the method shown in FIG. 2. FIG. 2 is a schematic flowchart illustrating an identity verification method provided by an embodiment of the specification, including steps 202 to 206. Step 202: Receive the image to be recognized. In one or more embodiments of this specification, the images to be recognized include, but are not limited to, images carrying text, graphics, or special symbols. The text may include, but is not limited to, Chinese characters, Pinyin, Arabic numerals, or other national language symbols, etc., the image may include but is not limited to flat images, three-dimensional graphics or geometric graphics, etc., may be hand-drawn graphics or graphics drawn by drawing tools, etc. The special symbols include, but are not limited to, mathematical symbols, unit symbols, tabulation symbols, or currency symbols that are used less frequently and are difficult to input directly. In one or more embodiments of this specification, before receiving the image to be recognized, the method further includes: receiving and storing first verification information and second verification information of the object to be identified, wherein the first verification information and the second verification Information corresponds. In one or more embodiments of this specification, the first verification information and the second verification information include but are not limited to identity verification information. The identity verification refers to confirming the identity of the operator in the computer and computer network system Process to determine whether the user has access and use rights to a certain resource, so that the access strategy of the computer and network system can be reliably and effectively implemented, preventing an attacker from impersonating a legitimate user to gain access to the resource Authority, guarantee the security of the system and data, and the legitimate interests of authorized accessors. The identity verification information includes any information about a person’s identity, which can help identify a person’s identity, such as name, fingerprint, or other biometric data , Email address, residential address, telephone number or social security number, etc. In practical applications, the first verification information corresponds to the second verification information, for example, if the first verification information is a person's ID number, the second verification information may be the ID number The corresponding real name, or if the first verification information is a person's mobile phone number, the second verification information may be the real name verification name corresponding to the mobile phone number. Taking the first verification information as a person's mobile phone number "13456789999", and the second verification information as the real-name authentication name "小a" corresponding to the mobile phone number as an example for description, receiving and storing the first The first verification information and the second verification information include receiving and storing the first verification information "13456789999" and the second verification information "small a" of the object to be identified. Step 204: Identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified. In one or more embodiments of this specification, the first identification information includes but is not limited to the mobile phone number or email address of the object to be identified, and the second identification information includes but is not limited to the true of the object to be identified Name or registered account number; or the first identification information includes but not limited to the real name or registered account number of the object to be identified, and the second identification information includes but not limited to the mobile phone number or mail address of the object to be identified . One of the first identification information and the second identification information is information that uniquely identifies the identity of the object to be identified, and the information that uniquely identifies the identity of the object to be identified includes, but is not limited to, information of the object to be identified Mobile phone number or email address. In one or more embodiments of this specification, the first identification information or the second identification information may be selected according to actual applications as information that uniquely identifies the identity of the object to be identified, and the present invention does not make any limitation on this. In one or more embodiments of this specification, the first identification information and the second identification information are different, and the combination of the first identification information and the second identification information is used to confirm the object to be identified. For example, if the first identification information includes the mobile phone number "13456789999" of the object to be identified, and the second identification information includes the name "small a" of the object to be identified, the mobile phone number "13456789999" and the name "small The combination of "a" can be used to confirm the object to be identified. Step 206: If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, confirm that the object to be identified passes verification. In one or more embodiments of this specification, the first identification information and the second identification information in the image to be recognized are first identified, if the first identification information and the second identification information are If the first verification information and the second verification information of the identified object match, it is confirmed that the object to be identified passes verification. Taking the pre-stored first verification information as a mobile phone number and the second verification information as a real-name authentication name corresponding to the mobile phone number as an example for description, see Table 1. Table 1 According to Table 1, the first verification information "13456789999" corresponds to the second verification information "small a", the first verification information "13433332222" corresponds to the second verification information "small b", and the first verification information "13511112222" corresponds to the second verification Information "small c". If the identified first identification information in the image to be identified is "13456789999" and the second identification information is "small a", then the first identification information "13456789999" and the second identification information ""Smalla" matches the pre-stored first verification information "13456789999" and the second verification information "small a" of the object to be identified, and it is determined that the object to be identified passes verification. If the identified first identification information in the image to be identified is "13456789999" and the second identification information is "small d", the first identification information "13456789999" and the second identification information ""D" does not match the pre-stored first verification information and second verification information of the object to be identified, it is determined that the object to be identified has not passed verification. In one or more embodiments of this specification, the identity verification method includes receiving an image to be identified; and then identifying the first identification information and the second identification information in the image to be identified, wherein the first identification information and The combination of the second identification information is used to confirm the object to be identified, and the first identification information and the second identification information are information such as a mobile phone number or name that can be quickly identified by the naked eye; if the first If the identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, it is confirmed that the object to be identified passes the verification, and the first identification information and the second identification can be passed Corresponding to the information, using the association between the data to confirm the identity of the identified object can ensure the accuracy of identity verification. Referring to FIG. 3, an embodiment of the present specification provides an identity verification method, including steps 302 to 308. Step 302: Receive and store first verification information and second verification information of the object to be identified, wherein the first verification information corresponds to the second verification information. Step 304: Desensitize the first verification information or the second verification information according to a preset desensitization rule. In one or more embodiments of this specification, information desensitization refers to deforming certain sensitive information through desensitization rules to achieve reliable protection of sensitive private information. In the case of customer safety information or some commercially sensitive information, without violating system rules, the real information is transformed and provided for test use, such as desensitization of personal information such as the customer's real name or registered account. Taking the first verification information as the name "木小a" as an example, the preset desensitization rule may include desensitizing the first word of the name, desensitizing the second word, or desensitizing The first two words are desensitized, so that the name after desensitization is *小a, 木*a or **a. In the process of desensitizing the first verification information or the second verification information, a desensitization rule can be set according to actual needs and the verification information that needs to be desensitized can be selected, which is not limited in the present invention. Step 306: Identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified. Step 308: If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, confirm that the object to be identified passes verification. In one or more embodiments of this specification, identifying the first identification information and the second identification information in the image to be identified includes: identifying the second identification information and the desensitized first identification information in the image to be identified Matching the first identification information and the second identification information with the pre-stored first verification information and second verification information of the object to be identified includes: the second identification information and the desensitized first identification The information matches the pre-stored second verification information of the object to be identified and the first verification information that is desensitized according to a preset desensitization rule. Taking the first identification information as the name "木小a", the preset desensitization rule includes changing the first word of the first identification information to # as an example, and the first identification information after desensitization is "#小a". The pre-stored second verification information is a mobile phone number, and the first verification information is a real-name authentication name corresponding to the desensitized mobile phone number as an example for description, see Table 2. Table 2 According to Table 1, the first verification information "#小a" corresponds to the second verification information "13456789999", the first verification information "#小b" corresponds to the second verification information "13433332222", and the first verification information "#小c" Corresponding to the second verification information "13511112222". If the identified first identification information in the image to be identified after desensitization is "#小a" and the second identification information is "13456789999", then the first identification information "#小a" and If the second identification information "13456789999" matches the pre-stored first verification information "#小a" and the second verification information "13456789999" after the object to be identified is desensitized, it is determined that the object to be identified passes verification . If the identified first identification information in the image to be identified after desensitization is "#小d" and the second identification information is "13456789999", then the first identification information "#小d" and If the second identification information "13456789999" does not match the pre-stored first verification information and second verification information after the object to be identified is desensitized, it is determined that the object to be identified has not passed verification. In one or more embodiments of this specification, in the case where the first identification information is desensitized identification information, the second identification information is information that can uniquely identify the identity of the object to be identified. In one or more embodiments of this specification, identifying the first identification information and the second identification information in the image to be identified includes: identifying the first identification information and the desensitized second identification information in the image to be identified Matching the first identification information and the second identification information with the pre-stored first verification information and second verification information of the object to be identified includes: the first identification information and the desensitized second identification The information matches the pre-stored first verification information of the object to be recognized and the second verification information that is desensitized according to a preset desensitization rule. Taking the second identification information as the name "木小b", the preset desensitization rule includes changing the first word of the second identification information into *, and the second identification information after desensitization is " *Little b". Taking the pre-stored first verification information as an ID number and the second verification information as the real-name authentication name corresponding to the desensitized ID number as an example for description, see Table 3. table 3 According to Table 1, the first verification information "12345647899412" corresponds to the second verification information "#小a", the first verification information "11565648948634" corresponds to the second verification information "#小b", and the first verification information "11565648948635" corresponds to the first 2. Verification information "#小c". If the identified first identification information in the image to be identified after desensitization is "11565648948634" and the second identification information is "#小b", then the first identification information "11565648948634" and the If the second identification information "#小b" matches the pre-stored first verification information "11565648948634" and the second verification information "#小b" after the object to be identified is desensitized, it is determined that the object to be identified passes verification . If the identified first identification information in the image to be identified after desensitization is "11565648948634" and the second identification information is "#小d", then the first identification information "11565648948634" and the If the second identification information "#小d" does not match the pre-stored first verification information and second verification information after the object to be identified is desensitized, it is determined that the object to be identified has not passed verification. In one or more embodiments of this specification, in the case where the second identification information is desensitized identification information, the first identification information is information that can uniquely identify the identity of the object to be identified. In practical applications, in order to ensure the accuracy of the identity verification of the object to be identified, the information that can uniquely identify the identity of the object to be identified is not desensitized. In one or more embodiments of the present specification, the identity verification method may desensitize the pre-stored first verification information or second verification information, and then, when performing identity verification on the object to be identified, the identified first identification information After the second identification information is desensitized, it is matched with the pre-stored first verification information or second verification information to realize the verification of the identity of the object to be identified. Desensitization of the information that uniquely identifies the identity of the object The security of information can also guarantee the accuracy of identity verification. Referring to FIG. 4, an embodiment of the present specification provides an identity verification method, including steps 402 to 408. Step 402: Receive the image to be recognized. Step 404: Identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified. Step 406: If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, confirm that the object to be identified passes verification. In one or more embodiments of this specification, if the first identification information and the second identification information do not match the pre-stored first verification information and second verification information of the object to be identified, the to-be-identified Object verification fails, a verification failure prompt is issued. The verification failure prompt includes but is not limited to a short message prompt, an email prompt, or a pop-up prompt. Step 408: Perform the corresponding business operation. In one or more embodiments of this specification, the business operations include payment operations, refund operations, or password modification operations. For example, if the business operation is a refund operation, after confirming that the object to be identified is verified, a refund operation is performed, and the money can be refunded to the account of the object to be identified. In one or more embodiments of this specification, the identity verification method can perform the corresponding operation after completing the identity verification, and can achieve the dual functions of security verification and execution operation, greatly expanding the use value of the method, and the object to be identified If the identity verification fails, you can give prompt information to improve the user experience. Referring to FIG. 5, the identity verification method is applied to merchants using Alipay for payment collection. The verification method includes steps 502 to 512. Step 502: The Alipay server receives and stores the first verification information and the second verification information of the object a to be identified. In one or more embodiments of this specification, the first verification information may include the mail address "713289@qq.com" of the object to be identified, and the corresponding second verification information may include the object to be identified Registered account "小牛vv". Step 504: The payment user uses the Alipay APP to scan the printed image containing the first identification information and the second identification information. Step 506: Identify the first identification information and the second identification information in the image to be identified by using an image recognition algorithm, and upload the first identification information and the second identification information to the Alipay server. In one or more embodiments of this specification, the combination of the first identification information and the second identification information is used to confirm the object to be identified. In one or more embodiments of this specification, the first identification information may include the mail address "713289@qq.com" of the object to be identified, and the corresponding second identification information may include the object to be identified Registered account "小牛vv". Step 508: Determine whether the first identification information and the second identification information match the pre-stored first verification information and the second verification information of the object to be identified a, if yes, perform step 510, if not, Then step 512 is performed. In one or more embodiments of this specification, the first verification information may include the mail address "713289@qq.com" of the object to be identified, and the corresponding second verification information may include the to-be-identified The registered account of the object is "Maverick vv"; the first identification information may include the mail address of the object to be identified "713289@qq.com", and the corresponding second identification information may include the object to be identified The registered account "小牛vv" is used as an example for description. If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, then confirm that The object a to be identified is a object a to be registered in the Alipay server in advance. Step 510: The payment user can perform the Alipay payment operation. In one or more embodiments of this specification, if it is confirmed that the object a to be identified is the object a to be identified registered in the Alipay server in advance, then the payment user can pay Alipay to the object a to be identified. Step 512: Alipay APP returns a verification failure prompt. In one or more embodiments of this specification, the identity verification method can perform Alipay payment to merchants after completing identity verification. Registration and verification can be avoided by using personal information such as emails and registered accounts that are more familiar to merchants, to avoid merchants’ receipts. The payment information is replaced or tampered, which ensures the security and accuracy of the merchant's collection and payment by the payment user, and will also give a failure prompt when the identity verification fails, and the user experience is good. Referring to FIG. 6, an embodiment of the present specification provides an identity verification device, including: a receiving module 602 configured to receive an image to be recognized; an identifying module 604 configured to recognize a first identifier in the to-be-identified image Information and second identification information, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified; the first judgment module 606 is configured to: if the first identification information and If the second identification information matches the pre-stored first verification information and second verification information of the object to be identified, it is confirmed that the object to be identified passes verification. Optionally, the device further includes: a storage module configured to receive and store the first verification information and the second verification information of the object to be identified, wherein the first verification information and the second verification information are related correspond. Optionally, the device further includes: a first desensitization module configured to desensitize the first verification information according to a preset desensitization rule. Optionally, the identification module 604 is configured to: identify the second identification information in the image to be identified and the first identification information after desensitization; the first judgment module 606 is configured to: the first The second identification information and the desensitized first identification information match the pre-stored second verification information of the object to be identified and the desensitized first verification information. Optionally, the device further includes: a second desensitization module configured to desensitize the second verification information according to a preset desensitization rule. Optionally, the identification module 604 is configured to: identify the first identification information in the image to be identified and the second identification information after desensitization; the first judgment module 606 is configured to: The first identification information and the desensitized second identification information match the pre-stored first verification information of the object to be recognized and the desensitized second verification information. Optionally, the first identification information includes a mobile phone number or mail address of the object to be identified. Optionally, the second identification information includes the real name or registered account of the object to be identified. Optionally, the device further includes: a second judgment module configured to: if the first identification information and the second identification information and the pre-stored first verification information and second verification of the object to be identified If the information does not match, the verification of the object to be identified fails, and a verification failure prompt is issued. Optionally, the verification failure prompt includes a short message prompt, an email prompt, or a pop-up prompt. Optionally, the device further includes: an execution module configured to perform the corresponding business operation. Optionally, the business operation includes a payment operation, a refund operation, or a password modification operation. In one or more embodiments of the present specification, the identity verification device can ensure the accuracy of identity verification by using the correlation between the two data to confirm the identity of the identified object by scanning the two data. Each of the one or more embodiments in this specification is described in a sequential manner. The same or similar parts between the various embodiments can be referred to each other. Each embodiment focuses on the differences from other embodiments. Office. In particular, for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant part can be referred to the description of the method embodiment. An embodiment of the present invention also provides a computer-readable storage medium that stores computer instructions that implement the steps of the identity verification method when executed by a processor. The above is a schematic solution of a computer-readable storage medium of this embodiment. It should be noted that the technical solution of the storage medium is the same as the technical solution of the above-mentioned identity verification method. For details of the technical solution of the storage medium that are not described in detail, refer to the description of the technical solution of the above-mentioned identity verification method. The foregoing describes specific embodiments of the present specification. Other embodiments are within the scope of the attached patent application. In some cases, the actions or steps described in the scope of the patent application may be performed in a different order than in the embodiment and still achieve the desired result. In addition, the processes depicted in the drawings do not necessarily require the particular order shown or sequential order to achieve the desired results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous. The technical carriers involved in the payment in the embodiments of the present invention may include, for example, Near Field Communication (Near Field Communication, NFC), WIFI, 3G/4G/5G, POS card swipe technology, two-dimensional barcode reading technology, barcode reading code Technology, Bluetooth, infrared, Short Message Service (SMS), Multimedia Message Service (MMS), etc. The computer instructions include computer instruction code. The computer instruction code may be in the form of source code of the code, in the form of object code, executable file, or some intermediate form. The computer-readable medium may include: any entity or device capable of carrying the computer instruction code, a recording medium, a flash drive, a mobile hard disk, a magnetic disk, an optical disc, a computer memory, and a ROM (Read, Read Only Memory) -Only Memory), Random Access Memory (RAM, Random Access Memory), electrical carrier signals, telecommunication signals, software distribution media, etc. It should be noted that the content contained in the computer-readable medium can be appropriately increased or decreased according to the requirements of legislation and patent practice in jurisdictions. For example, in some jurisdictions, according to legislation and patent practice, computer-readable media Does not include electrical carrier signals and telecommunications signals. It should be noted that, for the convenience of description, the foregoing method embodiments are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the sequence of actions described. Because according to the invention, certain steps can be performed in other orders or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention. In the above embodiments, the description of each embodiment has its own emphasis. For a part that is not detailed in an embodiment, you can refer to the related descriptions of other embodiments. The above disclosed preferred embodiments of the present invention are only used to help illustrate the present invention. The alternative embodiments do not exhaustively describe all the details, nor limit the invention to the specific embodiments described. Obviously, according to the content of this specification, many modifications and changes can be made. This specification selects and specifically describes these embodiments in order to better explain the principle and practical application of the present invention, so that those skilled in the art can well understand and use the present invention. The present invention is only limited by the scope of the patent application and its full scope and equivalents.