WO2016029853A1 - 一种身份认证方法、终端设备,及系统 - Google Patents

一种身份认证方法、终端设备,及系统 Download PDF

Info

Publication number
WO2016029853A1
WO2016029853A1 PCT/CN2015/088131 CN2015088131W WO2016029853A1 WO 2016029853 A1 WO2016029853 A1 WO 2016029853A1 CN 2015088131 W CN2015088131 W CN 2015088131W WO 2016029853 A1 WO2016029853 A1 WO 2016029853A1
Authority
WO
WIPO (PCT)
Prior art keywords
dimensional code
biometric information
terminal device
information
user
Prior art date
Application number
PCT/CN2015/088131
Other languages
English (en)
French (fr)
Inventor
姚龙洋
范张群
欧阳文
赵润乾
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2016029853A1 publication Critical patent/WO2016029853A1/zh
Priority to US15/431,238 priority Critical patent/US20170161750A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/213Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
    • G06F18/2135Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods based on approximation criteria, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/77Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
    • G06V10/7715Feature extraction, e.g. by transforming the feature space, e.g. multi-dimensional scaling [MDS]; Mappings, e.g. subspace methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/197Matching; Classification

Definitions

  • the present invention relates to the field of computer technologies, and in particular, to an identity authentication method, a terminal device, and a system.
  • Identity authentication is the process of confirming the identity of an operator on a computer network.
  • the information in the computer network including the user's identity information, is represented by a specific set of numbers.
  • the computer can only recognize the user's digital identity, and all authorizations to the user are also authorized for the user's digital identity.
  • identity authentication technology is to solve this problem, as the first to protect network assets At the gateway, identity authentication plays a pivotal role.
  • the payment process is: for web page (WEB) scan code payment or offline scan code payment, start the WeChat QR code payment function on the mobile terminal, scan the generated commodity transaction 2
  • WEB web page
  • the dimension code can be completed by entering the payment password for identity authentication and payment confirmation.
  • the low-level support required by the above process includes: the association between the mobile client and the bank card account, as follows: the pre-complete mobile client and the bank card account are associated, the second merchant terminal generates the transaction QR code, and then the mobile client reads the Transaction of the two-dimensional code, the processed transaction QR code and the input transaction voucher are processed to generate a transaction message and sent to the payment platform, and finally the payment platform processes the transaction message and forwards it to the bank transaction system to complete the transaction.
  • the above two-dimensional code payment method needs to scan the two-dimensional code, and the user also needs to input the payment password to wait for verification, and the operation steps are many, and the identity authentication efficiency is low.
  • the embodiment of the invention provides an identity authentication method, a terminal device, and a system, which are used to reduce the operation steps of identity authentication and improve the efficiency of identity authentication.
  • An authentication method includes:
  • the terminal device After receiving the two-dimensional code scanning instruction, the terminal device scans the two-dimensional code
  • the terminal device After receiving the two-dimensional code scanning instruction, the terminal device automatically starts the biometric information acquiring function, and acquires biometric information of the user currently operating the terminal device;
  • a terminal device comprising:
  • program unit being stored in the memory and executed by the processor, the program unit comprising:
  • An instruction receiving unit configured to receive a two-dimensional code scanning instruction
  • a scanning unit configured to scan the two-dimensional code after the instruction receiving unit receives the two-dimensional code scanning instruction
  • a biometric acquiring unit configured to automatically enable a biometric information acquiring function after the instruction receiving unit receives the two-dimensional code scanning instruction, and acquire biometric information of a user currently operating the terminal device;
  • an authentication unit configured to perform identity authentication on the biometric information, and determine whether the user has an operation authority corresponding to the two-dimensional code.
  • An identity authentication system includes: a terminal device and a server communicably connected;
  • the terminal device is a terminal device provided by an embodiment of the present invention, and the terminal device The device sends the two-dimensional code and the biometric information to the server;
  • the server is configured to perform identity authentication on the biometric information, and determine whether the user has an operation authority corresponding to the two-dimensional code.
  • the embodiment of the present invention has the following advantages: after receiving the two-dimensional code scanning instruction, the terminal device performs an instruction to scan the two-dimensional code to obtain a two-dimensional code; the two-dimensional code has various operations.
  • the command may require authentication; at this time, the terminal automatically starts the biometric information acquisition function, and the biometric information of the user who is currently operating the terminal device can be obtained, that is, the information that can be used to authenticate the user identity can be automatically obtained, so that The step of saving the user to input the verification code or the password and the like again is realized, thereby realizing one-button operation, reducing the operation steps of the identity authentication, and improving the efficiency of the identity authentication.
  • FIG. 1 is a schematic flowchart of a method according to an embodiment of the present invention.
  • FIG. 2A is a schematic diagram of an application scenario according to an embodiment of the present invention.
  • FIG. 2B is a schematic diagram of an application scenario according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a process of binding a face according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an identity authentication process according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a process for preprocessing a face image according to an embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of a sub-sample space training sub-process according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of a face recognition sub-invention according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of a process of detecting a two-dimensional code according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of a process of identifying a two-dimensional code according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 12 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 13 is a schematic structural diagram of a system according to an embodiment of the present invention.
  • FIG. 14 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 15 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • An embodiment of the present invention provides an identity authentication method, as shown in FIG. 1 , including:
  • the terminal device scans the two-dimensional code after receiving the two-dimensional code scanning instruction
  • the two-dimensional code scanning instruction is a trigger condition for triggering execution of scanning the two-dimensional code, and is input by the user, for example, an application that enters the terminal device needs to perform two-dimensional code scanning, and the user inputs the two-dimensional code.
  • the scanning instruction; the two-dimensional code may be a picture inside the terminal device, or may be a two-dimensional code printed or displayed on other media other than the terminal device, which is not limited in the embodiment of the present invention. If the two-dimensional code is inside the terminal device, the scanning software can be used; if the two-dimensional code is printed or displayed on other media other than the terminal device, the rear device of the terminal device can usually be controlled by the application program. The camera scans to obtain the QR code.
  • the terminal device After receiving the foregoing two-dimensional code scanning instruction, the terminal device automatically starts the biometric information acquiring function, and acquires biometric information of the user currently operating the terminal device;
  • the biometric information is information for authenticating a user.
  • the biometric information is biometric information that can be used to uniquely identify the user's identity, such as: face, fingerprint, iris, sound, etc., alone or in combination. Since the biometric information acquisition kinetic energy is automatically activated, and the operation of scanning the two-dimensional code is performed simultaneously, the biometric information of the user who is currently operating the terminal device can be obtained, that is, the biometric information that can be used for authenticating the user can be automatically obtained. information.
  • the terminal device after receiving the two-dimensional code scanning instruction, performs an instruction to scan the two-dimensional code to obtain a two-dimensional code;
  • the two-dimensional code may have various operational instructions, and may require authentication;
  • the biometric information acquisition function is automatically enabled, the biometric information of the user who is currently operating the terminal device can be obtained, that is, information that can be used to authenticate the user identity can be automatically obtained, thereby saving the user from inputting the verification code or password again.
  • the steps of information thereby achieving one-click operation, reducing the operational steps of identity authentication, and improving the efficiency of identity authentication.
  • the security of the identity authentication is improved.
  • the step of identity authentication may be directly performed locally on the terminal device; or the terminal may serve as an information collection device, the step of identity authentication is completed on the server side, and the identity authentication is completed by the server.
  • the identity authentication result may be fed back to the terminal device, or may not be fed back to the terminal device, but may return the operation result after executing the operation instruction corresponding to the two-dimensional code; the operation after determining the authentication result may be according to the specific application.
  • the embodiment of the present invention is not limited. The method is as follows: performing identity authentication on the biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code, including:
  • the biometric information is authenticated by the locally stored biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code; or, the identity authentication is
  • the server side is completed, the scanned two-dimensional code and the biometric information are sent to the server, and the server performs identity authentication on the biometric information to determine whether the user has an operation authority corresponding to the two-dimensional code.
  • the scanning of the two-dimensional code may fail, in particular, the acquisition of the biometric information may fail; the failure to scan the two-dimensional code needs to be prompted, and the failure to acquire the biometric information does not belong to the user's need to operate the scanning QR code instruction. Step, but because the biometric information needs to be used for identity authentication, the biometric information failure also needs to be prompted, and is ready to obtain the next information, as follows: if the scanning of the two-dimensional code fails, or obtain the current operation of the terminal device The user's biometric information failed.
  • the above methods also include:
  • the prompt information acquisition fails, and it is prompted to re-acquire the QR code information and the biometric information.
  • the embodiment of the present invention may perform the encryption processing on the two-dimensional code information and the biometric information, as follows: Before sending the scanned two-dimensional code and the biometric information to the server, the method further includes:
  • the scanned two-dimensional code and the biometric information are encapsulated into an encrypted message.
  • biometric information there are many types of biometric information that can be used to identify a user's identity. Any selection does not affect the implementation of the embodiments of the present invention. At present, the methods that are more commonly used and achieve lower cost are mainly face recognition technology, iris recognition technology, and fingerprint recognition technology. It can be implemented on the basis of the existing hardware devices, and can be implemented as a preferred solution in the embodiment of the present invention, as follows:
  • the biometric information includes: facial image information or iris information
  • the automatically opening the biometric information acquiring function, and acquiring the biometric information of the user currently operating the terminal device includes: automatically scanning the terminal device when scanning the two-dimensional code
  • the front camera acquires face image information or iris information currently located in front of the above terminal device.
  • the above embodiment can be used on a terminal currently having a front camera, for example, a mobile phone with a front camera and a rear camera.
  • the rear camera captures a two-dimensional code while the front camera captures a face image, which is very convenient and fast. .
  • acquiring the biometric information of the user currently operating the terminal device comprises: automatically turning on the fingerprint sensor, at the input interface button of the two-dimensional code scanning instruction Collect fingerprints.
  • Some terminal devices have the function of fingerprint recognition, and the fingerprint sensor can collect fingerprint information.
  • the attendance device can collect fingerprints at the button of the user inputting the two-dimensional code scanning instruction, so that one-touch operation can also be realized. Very convenient and fast.
  • a schematic diagram of an application scenario includes: a mobile terminal 201 having a front camera 203 and a rear camera 202, a user 205 located at a side of the front camera 203 of the mobile terminal 201, and located at The two-dimensional code 204 on the side of the rear camera 202.
  • the front camera 203 can scan the user 205 that is currently operating the mobile terminal 201.
  • the image scanning of the two-dimensional code and the face can synchronously bind the two-dimensional code information and the face image information sampled by the user's face data.
  • the rear camera acquires the two-dimensional code image
  • the front camera acquires the face image
  • the mobile terminal sends the extracted feature data packaged from the two-dimensional code image and the face image to the server for synchronization information processing and Identity authentication, different usage scenarios can achieve different functions according to the application results.
  • the specific functions of the present invention are not limited.
  • FIG. 2B is a schematic diagram of another application scenario according to an embodiment of the present invention.
  • the difference compared with FIG. 2A is the manner of acquiring biological information on the user side.
  • the user side includes a user's finger 206, and the finger 206 has a fingerprint.
  • the fingerprint sensor 207 acquires the fingerprint of the user's finger 206.
  • the two-dimensional code is scanned and the fingerprint of the finger that the user performs the scanning two-dimensional code operation is acquired, and the two-dimensional code information can be synchronously bound.
  • user fingerprint information thereby enhancing the security of identity authentication, improving the user experience in the identity authentication and information confirmation of the mobile platform, and further improving the convenience in application fields such as mobile payment and user login.
  • the rear camera acquires the two-dimensional code image
  • the fingerprint sensor acquires the fingerprint information
  • the mobile terminal sends the extracted feature data from the two-dimensional code image and the fingerprint information to the package.
  • the server performs synchronous information processing and identity authentication, and different usage scenarios can implement different functions according to application results.
  • Both the fingerprint recognition technology and the face recognition technology are in the category of data image recognition.
  • the recognition of the face image is exemplified, and the fingerprint recognition can be omitted from reference to the execution.
  • A1 The user logs in to the application by using an account, determines whether the account has been bound to a face, or whether it needs to reset the face binding. When no face is bound or a new face binding needs to be set, follow-up is performed. Process;
  • A2 Turn on the front camera
  • A3 prompt the user to pose in front
  • the above steps A1-A3 mainly belong to the stage of collecting the face image constraint.
  • the face is required to face the front camera without large area occlusion, and no exaggerated expression.
  • A4 collecting a face image
  • A5 Perform a face detection algorithm to find the face position
  • A6 Determine whether the collected face image belongs to a valid frame, if yes, enter A7, otherwise enter A4;
  • A7 Determine whether 5 valid frames have been collected, if it is entering A8, otherwise enter A4;
  • A8 prompt the user to complete the acquisition
  • the above A4-A8 for the face acquisition stage, the front camera collects 5 frames of face images, and requires each frame of the image to be valid, that is, the face detection algorithm can be used to clearly detect the face.
  • A9 upload 5 frames of face images to the server
  • step A9 may not be performed, and subsequent steps performed by the server are implemented on the terminal device side.
  • A10 The server performs a face image preprocessing subroutine
  • A11 The server executes a sample space training sub-process
  • the main functions of the above steps A9-A11 are: uploading 5 frames of face images to the server, and the server performs the face image pre-processing sub-flow and the sample space training sub-flow to classify the 5 frames of faces into the feature database.
  • A12 Binding the above five frames of face feature data to the specified account, and returning binding completion information to the terminal device;
  • A13 The terminal displays the binding success information.
  • the main functions of the above steps A12-A13 are: binding the five frames of facial feature data to the account on the server, and prompting the user to bind successfully.
  • the rear camera is aimed at the two-dimensional code, and the front camera is aimed at the human face;
  • B5 determining whether the face and the two-dimensional code are detected; if yes, entering B7, otherwise entering B6;
  • the above B1-B6 are: face image acquisition stage: the face detection and the two-dimensional code detection algorithm are used to determine whether the frame is a valid frame, and if it is invalid, the frame is discarded.
  • B7 Encapsulating the face image and the two-dimensional code information into an encrypted message and sending the message to the server;
  • B8 The server decrypts the message, and extracts the face image and the two-dimensional code information
  • the above B7-B11 is: data transmission and face recognition stage: the two-dimensional code information and the facial feature data are encrypted by using the user key and sent to the server, and the server performs data decryption and information restoration through the user ID, and executes in the feature database.
  • the face feature data is compared and judged, and the identity authentication is performed. If the face information matching the facial feature data obtained through the information restoration cannot be obtained from the feature database, the recognition failure information is returned, and if the information is obtained from the feature database. If the face information matched by the obtained facial feature data is restored, the account corresponding to the matched face information is returned.
  • the above B12-B13 is: if the face information matching the facial feature data is obtained, then the judgment is made. Whether the account corresponding to the matching face information and the account to be logged in are the same, if not the same, the verification failure message is prompted.
  • the server reads the two-dimensional code information, and performs corresponding processing according to the application program and the content of the two-dimensional code information.
  • the above step B14 is: determining whether the face information bound to the account to be logged in is the same as the face information matching the facial feature data. If the identity is the same, that is, the identity authentication is passed, the server is different according to the two-dimensional code information.
  • the application scenario makes a different response. For example, for the mobile WeChat platform payment application, the server processes the merchandise purchase payment process; for the WeChat webpage login on the PC (personal computer) side, completes the login response of the server to the WEB page; for the attendance registration application, the server The attendance information is determined according to the two-dimensional code information, the attendance person is determined according to the identity authentication result, and the attendance database is updated.
  • a flowchart for preprocessing the face image includes the following steps:
  • C1 normalize the face image to an image of 128*128;
  • steps C1-C2 are: image pre-processing stage, normalizing the image and eliminating noise by histogram equalization.
  • steps C3-C4 are: face detection stage, and face detection is performed by the YCbCr skin color model.
  • C6 Converts the face image to a grayscale image.
  • the above steps C5-C6 are: calibrating and intercepting the face portion, and converting the color image into a grayscale image.
  • the sample space training sub-flow can be executed to generate a new feature projection matrix. And update the face feature library:
  • D1 input a face image training sample set
  • steps D1-D2 are: an image pre-processing stage, specifically: the newly added face image is vectorized, and the two-dimensional face image of size m ⁇ n is changed into a column vector having a dimension of m ⁇ n. Finally, the newly added face and the original face image in the feature library constitute the N face vector x 1 , x 2 ,..., x N .
  • This step may specifically be: calculating an average vector of all faces in the sample space:
  • the step may be: calculating a row direction covariance matrix of the sample space according to the following formula:
  • the above two steps may be: performing eigenvalue decomposition on the row direction covariance matrix C, selecting the largest of the top eigen values among all the n eigenvalues, and ensuring that the sum of the d eigenvalues occupies all n More than 95% of the eigenvalues.
  • D7 forming a row direction projection feature matrix by using the feature vectors corresponding to the plurality of row direction feature values
  • the step may be that the d feature vectors corresponding to the d feature values form a row direction projection feature matrix Z.
  • the step may be: calculating a column direction covariance matrix of the sample space according to the following formula:
  • D11 forming a column direction projection feature matrix by using the feature vectors corresponding to the plurality of column direction feature values
  • the above D9-D11 is similar to D5-D7 and is used to calculate the projection feature matrix X in the column direction.
  • D12 Updating the feature library by using the bidirectional projection feature matrix.
  • the step is specifically: updating the feature database by using the row direction projection feature matrix Z and the column direction projection feature matrix X.
  • the sub-flowchart for face recognition specifically includes the following steps:
  • E2 projecting the face image recognition sample on the row direction projection feature matrix and the column direction projection feature matrix
  • the above steps E1-E3 are: inputting the image to be recognized, combining the projection matrices X and Z obtained by the two-dimensional principal component analysis of the row direction and the column direction, and simultaneously projecting the face image to be recognized onto the two matrices, thereby obtaining a row.
  • E4 calculating an Euclidean distance of the feature matrix in the feature matrix and the feature library
  • E4-E5 as above: calculating the Euclidean distance with all the features of the feature matrix library feature matrix and the minimum distance d min to obtain an image corresponding to G min.
  • E6 determining whether the minimum distance is greater than or equal to a given threshold; if the minimum distance is greater than or equal to a given threshold, enter E8, otherwise enter E7;
  • the above E6-E8 is: determining whether the minimum distance is greater than or equal to the threshold. If it is greater than or equal to, the recognition is completed and the corresponding image is returned; if not, the identification failure information is returned.
  • the flow chart for detecting the two-dimensional code includes the following steps:
  • the OTSU Maximum Inter-Class Variance Method
  • maximum variance threshold method is used for the two-dimensional code image to perform grayscale binarization processing
  • the median filtering method replaces the gray value of the neighboring pixels of a certain pixel point.
  • the value of the pixel is noise reduced to eliminate the noise introduced during image acquisition.
  • F3 Canny operator (a multi-level edge detection algorithm) edge enhancement detection
  • the Max-Min difference method and the Canny edge extraction operator are used to comprehensively enhance the edge of the QR code.
  • F4 filtering projection positioning
  • the flow chart for identifying the two-dimensional code includes the following steps:
  • the information recognition for the two-dimensional code mainly adopts the error correction decoding recognition algorithm of the RS based on the BM iterative algorithm.
  • the above G1-G2 may be specifically: using the Berlekamp-Massey algorithm to perform data adjoint polynomial calculation according to the collected two-dimensional code image data, iteratively solving the polynomial coefficients of the existing error position, and constructing the position coordinate data;
  • G4 Determine whether there is an error; if it exists, enter G5, otherwise enter G7;
  • the above G3-G4 may specifically be: using the Froney algorithm to calculate the root of the polynomial of the error position coordinate value, and performing recognition and error correction determination according to the obtained value, and directly outputting the two-dimensional code information if there is no error. Otherwise, continue to step G5;
  • G5 Display the wrong value and the wrong position
  • G6 Determine whether the error exceeds the error correction range, if yes, enter G8, otherwise enter G9;
  • the above G5-G9 is specifically: displaying an error value and an error value according to the error correction identification information, and performing decoding error correction threshold judgment, and outputting the information recognized by the two-dimensional code after correcting the error code according to the Reed-Solomon algorithm of the linear block code.
  • the implementation scheme proposed by the embodiment of the present invention combines two-dimensional code and face recognition to realize synchronous identity authentication, which is faster and safer than the previous identity authentication method. Because the solution of the embodiment of the present invention is an identity authentication method, it is not only applied to WeChat mobile payment and PC-side login, and is not limited to a certain application, and since the application of the two-dimensional code on the mobile end has become popular, the present technology It can also be applied to a wide range of fields such as attendance records and access control systems.
  • the embodiment of the invention is based on the dual camera simultaneous shooting function.
  • the rear camera scans the two-dimensional code
  • the front camera is used for face recognition, and the facial feature data is collected.
  • the facial feature data information exists as an identity authentication data
  • the two-dimensional code specifies an application or a program sub-module that accepts the identity authentication result.
  • the embodiment of the invention further provides a terminal device, as shown in FIG. 10, comprising:
  • the instruction receiving unit 1001 is configured to receive a two-dimensional code scan instruction
  • the scanning unit 1002 is configured to scan the two-dimensional code after the instruction receiving unit 1001 receives the two-dimensional code scanning instruction;
  • the biometrics acquiring unit 1003 is configured to automatically enable the biometric information acquiring function after the instruction receiving unit 1001 receives the two-dimensional code scanning instruction, and acquire biometric information of the user currently operating the terminal device;
  • the authentication unit 1004 is configured to perform identity authentication on the biometric information to determine whether the user has an operation authority corresponding to the two-dimensional code.
  • the two-dimensional code scanning instruction is a trigger condition for triggering execution of scanning the two-dimensional code, and is input by the user, for example, an application that enters the terminal device needs to perform two-dimensional code scanning, and the user inputs the two-dimensional code.
  • the scanning instruction; the two-dimensional code may be a picture inside the terminal device, or may be a two-dimensional code printed or displayed on other media other than the terminal device, which is not limited in the embodiment of the present invention. If the two-dimensional code is inside the terminal device, the scanning software can be used; if the two-dimensional code is printed or displayed on other media other than the terminal device, the rear device of the terminal device can usually be controlled by the application program. The camera scans to obtain the QR code.
  • the biometric information is information for authenticating a user.
  • the biometric information is biometric information that can be used to uniquely identify the user's identity, such as: face, fingerprint, iris, sound, etc., alone or in combination. Since the biometric information acquisition kinetic energy is automatically activated, and the operation of scanning the two-dimensional code is performed simultaneously, the biometric information of the user who is currently operating the terminal device can be obtained, that is, the biometric information that can be used for authenticating the user can be automatically obtained. information.
  • the terminal device after receiving the two-dimensional code scanning instruction, performs an instruction to scan the two-dimensional code to obtain a two-dimensional code;
  • the two-dimensional code may have various operational instructions, and may require authentication;
  • the biometric information acquisition function is automatically enabled, the biometric information of the user who is currently operating the terminal device can be obtained, that is, information that can be used to authenticate the user identity can be automatically obtained, thereby saving the user from inputting the verification code or password again.
  • the steps of information thereby achieving one-click operation, reducing the operational steps of identity authentication, and improving the efficiency of identity authentication.
  • the security of the identity authentication is improved.
  • the step of identity authentication may be directly performed locally on the terminal device; or the terminal may serve as an information collection device, the step of identity authentication is completed on the server side, and the identity authentication is completed by the server.
  • the identity authentication result may be fed back to the terminal device, or may not be fed back to the terminal device, but may return the operation result after executing the operation instruction corresponding to the two-dimensional code; the operation after determining the authentication result may be according to the specific application.
  • the embodiment of the present invention is not limited.
  • the authenticating unit 1004 is configured to perform identity authentication on the biometric information by using the locally stored biometric information to determine whether the user has the corresponding two-dimensional code.
  • the operation authority or, in the case that the identity authentication is completed on the server side, the authentication unit 1004 is configured to send the scanned two-dimensional code and the biometric information to the server, so that the server performs the biometric information on the biometric information.
  • the identity authentication determines whether the user has the operation authority corresponding to the above two-dimensional code.
  • the foregoing terminal device further includes:
  • the prompting unit 1101 is configured to: if the scanning unit 1002 fails to scan the two-dimensional code, or the biometric acquiring unit 1003 fails to acquire the biometric information of the user currently operating the terminal device, the prompt information acquisition fails, and the user needs to reacquire the two-dimensional Code information and biometric information.
  • the embodiment of the present invention may perform the encryption processing on the two-dimensional code information and the biometric information, as follows. Further, as shown in FIG. 12, the terminal device further includes:
  • the encryption encapsulating unit 1201 is configured to encapsulate the scanned two-dimensional code and the biometric information into an encrypted message before the authenticating unit 1004 transmits the scanned two-dimensional code and the biometric information to the server.
  • biometric information there are many types of biometric information that can be used to identify a user's identity. Any selection does not affect the implementation of the embodiments of the present invention. At present, the methods that are more commonly used and achieve lower cost are mainly face recognition technology, iris recognition technology, and fingerprint recognition technology. It can be implemented on the basis of the existing hardware devices, and can be implemented as a preferred solution in the embodiment of the present invention, as follows:
  • the biometric information includes: face image information or iris information;
  • the biometric acquiring unit 1003 is configured to automatically open the front camera of the terminal device to obtain the face image information or the iris information currently located in front of the terminal device when the scanning unit 1002 scans the two-dimensional code.
  • the above embodiment can be used on a terminal currently having a front camera, for example, a mobile phone with a front camera and a rear camera.
  • the rear camera captures a two-dimensional code while the front camera captures a face image, which is very convenient and fast. .
  • the biometric information includes: fingerprint information;
  • the biometric acquiring unit 1003 is configured to automatically turn on the fingerprint sensor, and collect the fingerprint at the input interface button of the two-dimensional code scanning instruction.
  • Some terminal devices have the function of fingerprint recognition, and the fingerprint sensor can collect fingerprint information.
  • the attendance device can collect fingerprints at the button of the user inputting the two-dimensional code scanning instruction, so that one-touch operation can also be realized. Very convenient and fast.
  • the embodiment of the present invention further provides an identity authentication system, as shown in FIG. 13, comprising: a terminal device 1301 and a server 1302 that are communicably connected;
  • the terminal device 1301 is the terminal device 1301 provided by the embodiment of the present invention, and the terminal device 1301 sends the two-dimensional code and the biometric information to the server 1302.
  • the server 1302 is configured to perform identity authentication on the biometric information to determine whether the user has an operation authority corresponding to the two-dimensional code.
  • the terminal device after receiving the two-dimensional code scanning instruction, performs an instruction to scan the two-dimensional code to obtain a two-dimensional code;
  • the two-dimensional code may have various operational instructions, and may require authentication;
  • the biometric information acquisition function is enabled, the biometric information of the user who is currently operating the terminal device can be obtained, that is, the information that can be used to authenticate the user identity can be automatically obtained, which can save the user to input the verification code or the password again.
  • the steps to achieve one-click operation reduce the operational steps of identity authentication, and improve the efficiency of identity authentication.
  • the embodiment of the present invention further provides another terminal device, as shown in FIG. 14, comprising: a receiver 1401, a transmitter 1402, a processor 1403, and a memory 1404;
  • the processor 1403 is configured to perform control: after receiving the two-dimensional code scanning instruction, scanning the two-dimensional code; after receiving the two-dimensional code scanning instruction, automatically opening the biometric information acquiring function to obtain the current operation of the terminal. Biometric information of the user of the device; performing identity authentication on the biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code.
  • the two-dimensional code scanning instruction is a trigger condition for triggering execution of scanning the two-dimensional code, and is input by the user, for example, an application that enters the terminal device needs to perform two-dimensional code scanning, and the user inputs the two-dimensional code.
  • the scanning instruction; the two-dimensional code may be a picture inside the terminal device, or may be a two-dimensional code printed or displayed on other media other than the terminal device, which is not limited in the embodiment of the present invention. If the two-dimensional code is inside the terminal device, it can be realized by using scanning software; if the two-dimensional code is printed or displayed on the non-terminal device On other media, the two-dimensional code can usually be scanned by the application controlling the rear camera of the terminal device.
  • the biometric information is information for authenticating a user.
  • the biometric information is biometric information that can be used to uniquely identify the user's identity, such as: face, fingerprint, iris, sound, etc., alone or in combination. Since the biometric information acquisition kinetic energy is automatically activated, and the operation of scanning the two-dimensional code is performed simultaneously, the biometric information of the user who is currently operating the terminal device can be obtained, that is, the biometric information that can be used for authenticating the user can be automatically obtained. information.
  • the terminal device after receiving the two-dimensional code scanning instruction, performs an instruction to scan the two-dimensional code to obtain a two-dimensional code;
  • the two-dimensional code may have various operational instructions, and may require authentication;
  • the biometric information acquisition function is automatically enabled, the biometric information of the user who is currently operating the terminal device can be obtained, that is, information that can be used to authenticate the user identity can be automatically obtained, thereby saving the user from inputting the verification code or password again.
  • the steps of information thereby achieving one-click operation, reducing the operational steps of identity authentication, and improving the efficiency of identity authentication.
  • the security of the identity authentication is improved.
  • the step of identity authentication may be directly performed locally on the terminal device; or the terminal may serve as an information collection device, the step of identity authentication is completed on the server side, and the identity authentication is completed by the server.
  • the identity authentication result may be fed back to the terminal device, or may not be fed back to the terminal device, but may return the operation result after executing the operation instruction corresponding to the two-dimensional code; the operation after determining the authentication result may be according to the specific application.
  • the embodiment of the present invention is not limited.
  • the processor 1403 is configured to perform control: performing identity authentication on the biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code, including: when the identity authentication is completed locally at the terminal device, Performing identity authentication on the biometric information by using the locally stored biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code; or, if the identity authentication is completed on the server side, sending a scan to the server.
  • the above two-dimensional code and the biometric information described above enable the server to perform identity authentication on the biometric information, and determine Whether the above user has the operation authority corresponding to the above two-dimensional code.
  • the scanning of the two-dimensional code may fail, in particular, the acquisition of the biometric information may fail; the failure to scan the two-dimensional code needs to be prompted, and the failure to acquire the biometric information does not belong to the user's need to operate the scanning QR code instruction. Step, but because the biometric information needs to be used for identity authentication, the biometric information failure also needs to be prompted, and is ready to obtain the next information, as follows: if the scanning of the two-dimensional code fails, or obtain the current operation of the terminal device The user's biometric information fails.
  • the processor 1403 is further configured to control execution: the prompt information acquisition fails, and prompts that the two-dimensional code information and the biometric information need to be re-acquired.
  • the embodiment of the present invention may perform encryption processing on the two-dimensional code information and the biometric information, as follows: before transmitting the scanned two-dimensional code and the biometric information to the server, the processor 1403 further For controlling execution: encapsulating the above-mentioned two-dimensional code obtained by scanning and the above biometric information into an encrypted message.
  • biometric information there are many types of biometric information that can be used to identify a user's identity. Any selection does not affect the implementation of the embodiments of the present invention. At present, the methods that are more commonly used and achieve lower cost are mainly face recognition technology, iris recognition technology, and fingerprint recognition technology. It can be implemented on the basis of the existing hardware devices, and can be implemented as a preferred solution in the embodiment of the present invention, as follows:
  • the processor 1403 is configured to perform control: when scanning the two-dimensional code, automatically open the front camera of the terminal device to obtain the person currently located in front of the terminal device Face image information or iris information.
  • the above embodiment can be used on a terminal currently having a front camera, for example, a mobile phone with a front camera and a rear camera.
  • the rear camera captures a two-dimensional code while the front camera captures a face image, which is very convenient and fast. .
  • the processor 1403 is configured to control execution: automatically open the fingerprint sensor, and collect the fingerprint at the input interface button of the two-dimensional code scanning instruction.
  • Some terminal devices have the function of fingerprint recognition, and the fingerprint sensor can collect fingerprint information.
  • the attendance device can collect fingerprints at the button of the user inputting the two-dimensional code scanning instruction, so that one-touch operation can also be realized. Very convenient and fast.
  • the embodiment of the present invention further provides another terminal device.
  • FIG. 15 for the convenience of description, only parts related to the embodiment of the present invention are shown. If the specific technical details are not disclosed, refer to the method of the embodiment of the present invention. section.
  • the terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal is a mobile phone as an example:
  • FIG. 15 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 1510 , a memory 1520 , an input unit 1530 , a display unit 1540 , a sensor 1550 , an audio circuit 1560 , a wireless fidelity (WiFi) module 1570 , and a processor 1580 .
  • RF radio frequency
  • the RF circuit 1510 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processing is processed by the processor 1580. In addition, the data designed for the uplink is sent to the base station.
  • RF circuit 1510 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 1510 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • E-mail Short Messaging Service
  • the memory 1520 can be used to store software programs and modules, and the processor 1580 passes The software programs and modules stored in the memory 1520 are executed to perform various functional applications and data processing of the mobile phone.
  • the memory 1520 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1520 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1530 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 1530 may include a touch panel 1531 and other input devices 1532.
  • the touch panel 1531 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1531 or near the touch panel 1531. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 1531 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1580 is provided and can receive commands from the processor 1580 and execute them.
  • the touch panel 1531 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1530 may also include other input devices 1532.
  • other input devices 1532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1540 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 1540 can include a display panel 1541.
  • the display panel 1541 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1531 may cover the display panel 1541. After the touch panel 1531 detects a touch operation on or near the touch panel 1531, the touch panel 1531 transmits to the processor 1580 to determine the type of the touch event, and then the processor 1580 according to the touch event. Type in display A corresponding visual output is provided on the display panel 1541.
  • touch panel 1531 and the display panel 1541 are used as two independent components to implement the input and input functions of the mobile phone in FIG. 15, in some embodiments, the touch panel 1531 and the display panel 1541 may be integrated. Realize the input and output functions of the phone.
  • the handset may also include at least one type of sensor 1550, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1541 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1541 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 1560, a speaker 1561, and a microphone 1562 can provide an audio interface between the user and the handset.
  • the audio circuit 1560 can transmit the converted electrical data of the received audio data to the speaker 1561, and convert it into a sound signal output by the speaker 1561.
  • the microphone 1562 converts the collected sound signal into an electrical signal, and the audio circuit 1560. After receiving, it is converted into audio data, and then processed by the audio data output processor 1580, sent to, for example, another mobile phone via the RF circuit 1510, or outputted to the memory 1520 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1570 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 15 shows the WiFi module 1570, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 1580 is a control center for the handset that connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1520, and invoking data stored in the memory 1520, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • processor 1580 One or more processing units may be included; preferably, the processor 1580 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, etc., and the modem processor is mainly Handle wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1580.
  • the handset also includes a power source 1590 (such as a battery) that supplies power to the various components.
  • a power source 1590 such as a battery
  • the power source can be logically coupled to the processor 1580 via a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the processor 1580 included in the terminal further has the following functions:
  • the processor 1580 is configured to perform control: after receiving the two-dimensional code scanning instruction, scanning the two-dimensional code; after receiving the two-dimensional code scanning instruction, automatically opening the biometric information acquiring function to obtain the current operation of the terminal. Biometric information of the user of the device; performing identity authentication on the biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code.
  • the two-dimensional code scanning instruction is a trigger condition for triggering execution of scanning the two-dimensional code, and is input by the user, for example, an application that enters the terminal device needs to perform two-dimensional code scanning, and the user inputs the two-dimensional code.
  • the scanning instruction; the two-dimensional code may be a picture inside the terminal device, or may be a two-dimensional code printed or displayed on other media other than the terminal device, which is not limited in the embodiment of the present invention. If the two-dimensional code is inside the terminal device, the scanning software can be used; if the two-dimensional code is printed or displayed on other media other than the terminal device, the terminal device can usually be controlled by the application program. Set the camera to scan to get the QR code.
  • the biometric information is information for authenticating a user.
  • the biometric information is biometric information that can be used to uniquely identify the user's identity, such as: face, fingerprint, iris, sound, etc., alone or in combination. Since the biometric information acquisition kinetic energy is automatically activated, and the operation of scanning the two-dimensional code is performed simultaneously, the biometric information of the user who is currently operating the terminal device can be obtained, that is, the biometric information that can be used for authenticating the user can be automatically obtained. information.
  • the terminal device after receiving the two-dimensional code scanning instruction, performs an instruction to scan the two-dimensional code to obtain a two-dimensional code;
  • the two-dimensional code may have various operational instructions, and may require authentication;
  • the biometric information acquisition function is automatically enabled, the biometric information of the user who is currently operating the terminal device can be obtained, that is, information that can be used to authenticate the user identity can be automatically obtained, thereby saving the user from inputting the verification code or password again.
  • the steps of information thereby achieving one-click operation, reducing the operational steps of identity authentication, and improving the efficiency of identity authentication.
  • the security of the identity authentication is improved.
  • the step of identity authentication may be directly performed locally on the terminal device; or the terminal may serve as an information collection device, the step of identity authentication is completed on the server side, and the identity authentication is completed by the server.
  • the identity authentication result may be fed back to the terminal device, or may not be fed back to the terminal device, but may return the operation result after executing the operation instruction corresponding to the two-dimensional code; the operation after determining the authentication result may be according to the specific application.
  • the embodiment of the present invention is not limited.
  • the processor 1580 is configured to perform control: performing identity authentication on the biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code, including: when the identity authentication is completed locally at the terminal device, Performing identity authentication on the biometric information by using the locally stored biometric information to determine whether the user has the operation authority corresponding to the two-dimensional code; or, if the identity authentication is completed on the server side, sending a scan to the server.
  • the above two-dimensional code and the biometric information enable the server to perform identity authentication on the biometric information to determine whether the user has an operation authority corresponding to the two-dimensional code.
  • the scanning of the two-dimensional code may fail, in particular, the acquisition of the biometric information may fail; the failure to scan the two-dimensional code needs to be prompted, and the failure to acquire the biometric information does not belong to the user's need to operate the scanning QR code instruction. Step, but because the biometric information needs to be used for identity authentication, the biometric information failure also needs to be prompted, and is ready to obtain the next information, as follows: if the scanning of the two-dimensional code fails, or obtain the current operation of the terminal device The user's biometric information fails.
  • the processor 1580 is further used to control execution: the prompt information acquisition fails, and the prompt is required. Re-acquire QR code information and biometric information.
  • the embodiment of the present invention may perform encryption processing on the two-dimensional code information and the biometric information, as follows: before transmitting the scanned two-dimensional code and the biometric information to the server, the processor 1580 further For controlling execution: encapsulating the above-mentioned two-dimensional code obtained by scanning and the above biometric information into an encrypted message.
  • biometric information there are many types of biometric information that can be used to identify a user's identity. Any selection does not affect the implementation of the embodiments of the present invention. At present, the methods that are more commonly used and achieve lower cost are mainly face recognition technology, iris recognition technology, and fingerprint recognition technology. It can be implemented on the basis of the existing hardware devices, and can be implemented as a preferred solution in the embodiment of the present invention, as follows:
  • the processor 1580 is configured to perform control: when scanning the two-dimensional code, automatically open the front camera of the terminal device to obtain the person currently located in front of the terminal device Face image information or iris information.
  • the above embodiment can be used on a terminal currently having a front camera, for example, a mobile phone with a front camera and a rear camera.
  • the rear camera captures a two-dimensional code while the front camera captures a face image, which is very convenient and fast. .
  • the processor 1580 is configured to control execution: automatically open the fingerprint sensor, and collect the fingerprint at the input interface button of the two-dimensional code scanning instruction.
  • Some terminal devices have the function of fingerprint recognition, and the fingerprint sensor can collect fingerprint information.
  • the attendance device can collect fingerprints at the button of the user inputting the two-dimensional code scanning instruction, so that one-touch operation can also be realized. Very convenient and fast.
  • each unit included is only divided according to functional logic, but is not limited to the foregoing division, as long as the corresponding function can be implemented;
  • the names are also for convenience of distinction from each other and are not intended to limit the scope of protection of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Artificial Intelligence (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Human Computer Interaction (AREA)
  • Evolutionary Computation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Biomedical Technology (AREA)
  • Data Mining & Analysis (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Biology (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本发明公开了一种身份认证方法、终端设备及系统,其中所述方法包括以下步骤:终端设备在接收到二维码扫描指令后,扫描二维码(101);上述终端设备在接收到上述二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作上述终端设备的用户的生物特征信息(102);对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限(103)。终端执行扫描二维码的指令获得二维码,此时终端自动开启生物特征信息获取功能,则可以获得当前正在操作终端设备的用户的生物特征信息,即是可以自动获取到可以用于认证用户身份的信息,这样可以节省用户再次输入验证码或者密码等信息的步骤,从而实现一键式操作,减少身份认证的操作步骤,提高身份认证的效率。

Description

一种身份认证方法、终端设备,及系统
本申请要求于2014年8月26日提交中国专利局、申请号为201410425691.X、发明名称为“一种身份认证方法、终端设备,及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及计算机技术领域,特别涉及一种身份认证方法、终端设备,及系统。
背景技术
身份认证是在计算机网络中确认操作者身份的过程。计算机网络中的信息,包括用户的身份信息,都是用一组特定的数字来表示的,计算机只能识别用户的数字身份,所有对用户的授权也是针对用户数字身份的授权。如何保证以数字身份进行操作的操作者就是这个数字身份合法拥有者,也就是说保证操作者的物理身份与数字身份相对应,身份认证技术就是为了解决这个问题,作为防护网络资产的第一道关口,身份认证有着举足轻重的作用。
以移动端微信平台二维码支付为例,支付流程为:针对网页(WEB)扫码支付或线下扫码支付,在移动端启动微信的二维码支付功能,扫描已生成的商品交易二维码,通过输入支付密码进行身份认证及支付确认,即可完成支付。
以上流程需要的低层支持包括:移动客户端与银行卡账户的关联,具体如下:预先完成移动客户端和银行卡账户相关联,其次商户终端生成交易二维码,然后移动客户端读取所述交易二维码,将读取的交易二维码以及输入的交易凭证经过处理生成交易报文发往支付平台,最后支付平台将所述交易报文进行处理并转发到银行交易系统完成交易。
以上二维码支付方法,需要扫描二维码,用户还要输入支付密码等待验证,操作步骤多,身份认证效率较低。
发明内容
本发明实施例提供了一种身份认证方法、终端设备,及系统,用于减少身份认证的操作步骤,提高身份认证的效率。
一种身份认证方法,包括:
终端设备在接收到二维码扫描指令后,扫描二维码;
所述终端设备在接收到所述二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作所述终端设备的用户的生物特征信息;
对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限。
一种终端设备,包括:
处理器;
存储器;及
程序单元,所述程序单元存储在所述存储器中并由所述处理器执行,所述程序单元包括:
指令接收单元,用于接收二维码扫描指令;
扫描单元,用于在所述指令接收单元接收到二维码扫描指令后,扫描二维码;
生物特征获取单元,用于在所述指令接收单元接收到二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作所述终端设备的用户的生物特征信息;
认证单元,用于对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限。
一种身份认证系统,包括:以可通信方式连接的终端设备和服务器;
所述终端设备为本发明实施实例提供的终端设备,并且所述终端 设备向所述服务器发送二维码以及生物特征信息;
所述服务器,用于对所述生物特征信息进行身份认证,确定用户是否具有对应所述二维码的操作权限。
从以上技术方案可以看出,本发明实施例具有以下优点:终端设备在收到二维码扫描指令后,会执行扫描二维码的指令获得二维码;二维码会具有各种操作的指令,可能需要认证;此时终端自动开启生物特征信息获取功能,则可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息,这样可以节省用户再次输入验证码或者密码等信息的步骤,从而实现一键式操作,减少身份认证的操作步骤,提高身份认证的效率。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例方法流程示意图;
图2A为本发明实施例应用场景示意图;
图2B为本发明实施例应用场景示意图;
图3为本发明实施例人脸绑定流程示意图;
图4为本发明实施例身份认证流程示意图;
图5为本发明实施例人脸图像预处理流程示意图;
图6为本发明实施例人脸样本空间训练子流程示意图;
图7为本发明实施例人脸识别子示意图;
图8为本发明实施例二维码检测流程示意图;
图9为本发明实施例二维码识别流程示意图;
图10为本发明实施例终端设备的结构示意图;
图11为本发明实施例终端设备的结构示意图;
图12为本发明实施例终端设备的结构示意图;
图13为本发明实施例系统结构示意图;
图14为本发明实施例终端设备的结构示意图;
图15为本发明实施例终端设备的结构示意图。
具体实施方式
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
本发明实施例提供了一种身份认证方法,如图1所示,包括:
101:终端设备在接收到二维码扫描指令后,扫描二维码;
在本发明实施例中,二维码扫描指令是触发执行扫描二维码的触发条件,由用户输入,例如,进入终端设备的应用程序,需要进行二维码扫描,则由用户输入二维码扫描指令;二维码可以是终端设备内部的图片,也可以是印制或显示于非所述终端设备的其他介质上的二维码,本发明实施例对此不予限定。若二维码在终端设备内部,则使用扫描软件就可以实现;如果二维码印制或显示于非所述终端设备的其他介质上,则通常可以通过应用程序控制所述终端设备的后置摄像头来扫描获得该二维码。
102:上述终端设备在接收到上述二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作上述终端设备的用户的生物特征信息;
在本发明实施例中,生物特征信息是用于对用户进行身份认证的信息。具体的,生物特征信息为可以用于唯一标识用户身份的生物特征信息,例如:人脸、指纹、虹膜、声音等等,单独或者组合。由于生物特征信息获取动能是自动启动的,与扫描二维码的操作同时进行,因此可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息。
103:对上述生物特征信息进行身份认证,确定上述用户是否具 有对应上述二维码的操作权限。
在本发明实施例中,终端设备在收到二维码扫描指令后,会执行扫描二维码的指令获得二维码;二维码会具有各种操作的指令,可能需要认证;此时终端自动开启生物特征信息获取功能,则可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息,这样可以节省用户再次输入验证码或者密码等信息的步骤,从而实现一键式操作,减少身份认证的操作步骤,提高身份认证的效率。另外,因为通过获取当前操作上述终端设备的用户的生物特征信息,来进行用户的身份验证,提高了身份认证的安全性。
可选地,在本发明实施例中,身份认证的步骤可以是在终端设备本地直接完成的;或者,终端可以作为信息的采集设备,身份认证的步骤在服务器一侧完成,由服务器完成身份认证的情况下,身份认证结果可以反馈给终端设备,也可以不反馈给终端设备,而是在执行二维码对应的操作指令以后返回操作结果;在确定认证结果以后的操作,可以根据具体的应用场景及需要进行任意设定,本发明实施例不予限定。具体如下:对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限,包括:
在身份认证是在终端设备本地完成的情况下,通过本地存储的生物特征信息对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限;或者,在身份认证是在服务器一侧完成的情况下,向服务器发送扫描得到的上述二维码以及上述生物特征信息,使上述服务器对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限。
由于扫描二维码有可能失败,特别是生物特征信息的获取可能会发生失败的情况;扫描二维码失败需要提示可以理解,生物特征信息获取失败本来不属于用户需要操作扫描二维码指令的步骤,但是由于需要使用生物特征信息进行身份认证,所以生物特征信息失败也需要进行提示,并且准备下一次获取这些信息,具体如下:若扫描二维码失败,或者,获取当前操作上述终端设备的用户的生物特征信息失败, 上述方法还包括:
提示信息获取失败,并提示需要重新获取二维码信息和生物特征信息。
由于二维码信息和生物特征信息需要在网络上发送,特别是生物特征信息涉及用户的隐私信息,需要较高的安全性。为了提高信息安全性,本发明实施例可以对二维码信息和生物特征信息进行加密处理,具体如下:向服务器发送扫描得到的上述二维码以及上述生物特征信息之前,上述方法还包括:
将扫描得到的上述二维码以及上述生物特征信息封装成加密报文。
可以用于标识用户身份的生物特征信息的种类很多,任意选取都不会影响本发明实施例的实现,目前较为常用并且实现成本较低的方式主要有人脸识别技术、虹膜识别技术以及指纹识别技术,可以在目前已有的硬件设备基础之上实现,可以作为本发明实施例优选考虑的实现方案,具体如下:
如果上述生物特征信息包括:人脸图像信息或者虹膜信息;上述自动开启生物特征信息获取功能,获取当前操作上述终端设备的用户的生物特征信息包括:在扫描二维码时,自动开启上述终端设备的前置摄像头获取当前位于上述终端设备前的人脸图像信息或者虹膜信息。
以上实施例可以用于目前具有前置摄像头的终端上,例如:具有前置摄像头以及后置摄像头的手机,后置摄像头在拍摄二维码的同时,前置摄像头拍摄人脸图像,非常方便快捷。
如果上述生物特征信息包括:指纹信息;上述自动开启生物特征信息获取功能,获取当前操作上述终端设备的用户的生物特征信息包括:自动开启指纹传感器,在上述二维码扫描指令的输入接口按钮处采集指纹。
有一些终端设备具有指纹识别的功能,也具有指纹传感器可以采集指纹信息,例如:考勤设备,则可以在用户输入二维码扫描指令的按钮处采集指纹,这样也可以实现一键式操作,也非常方便快捷。
以下实施例将以具有前置摄像头和后置摄像头的移动终端为例,对本发明实施例涉及到的各部分进行举例说明。
如图2A所示,为本发明实施例的应用场景示意图,包括:具有前置摄像头203和后置摄像头202的移动终端201,位于移动终端201的前置摄像头203一侧的用户205,以及位于后置摄像头202一侧的二维码204。
用户205在操作移动终端201进行二维码扫描时,后置摄像头202扫描二维码204的同时,前置摄像头203可以扫描到当前正在操作移动终端201的用户205。
通过以上图2A的示意可以获知:在具有前后双摄像头的移动终端上,对二维码与人脸进行图像扫描,可以同步绑定二维码信息与用户脸部数据采样的人脸图像信息,从而增强身份认证的安全性,改善移动平台在身份认证和信息确认方面的用户体验,进一步提高在移动支付、用户登录等应用领域的便捷性。另外,后置摄像头获取二维码图像,前置摄像头获取人脸图像,移动终端将从二维码图像和人脸图像两者中提取采集到的特征数据封装发送给服务器,进行同步信息处理和身份认证,不同的使用场景根据应用结果可实现不同的功能。具体的功能本发明实施例不做限定。
如图2B所示,为本发明实施例的另一应用场景示意图,与图2A相比的区别在于用户一侧的生物信息获取方式。在图2B中,用户一侧包括,用户的手指206,手指206有指纹,手指在接触移动终端201的屏幕上的指纹传感器207时,指纹传感器207会获取到用户的手指206的指纹。
通过以上图2B的示意可以获知,在具有后置摄像头以及指纹传感器的移动终端上,对二维码扫描并且获取到用户执行扫描二维码操作的手指的指纹,可以同步绑定二维码信息与用户指纹信息,从而增强身份认证的安全性,改善移动平台的身份认证和信息确认方面的用户体验,进一步提高在移动支付、用户登录等应用领域的便捷性。另外,后置摄像头获取二维码图像,指纹传感器获取指纹信息,移动终端将从二维码图像和指纹信息中提取采集到的特征数据封装发送给 服务器,进行同步信息处理和身份认证,不同的使用场景根据应用结果可实现不同的功能。具体的功能本发明实施例不做限定。指纹识别技术和人脸识别技术均数据图像识别的范畴,在后续实施例中以人脸图像的识别进行举例说明,指纹识别可以参照执行不再一一赘述。
以下实施例,将对本发明实施例涉及到的各部分进行举例说明。
一、如图3所示,为人脸绑定流程图,该流程属于身份认证前的信息处理流程:
A1:用户使用账号登录应用程序,判断所述账号是否已经绑定人脸或者是否需要重新设定人脸绑定,在没有绑定人脸或者需要设定新的人脸绑定时,执行后续流程;
A2:开启前置摄像头;
A3:提示用户摆正面部姿态;
以上A1-A3步骤主要属于采集人脸图像约束阶段,在对用户进行人脸拍照时,要求人脸正对前置摄像头且无大面积遮挡,无夸张表情。
A4:采集人脸图像;
A5:执行人脸检测算法,找出人脸位置;
A6:确定采集的人脸图像是否属于有效帧,如果是,进入A7,否则进入A4;
A7:确定是否已采集5个有效帧,如果是进入A8,否则进入A4;
A8:提示用户采集完成;
以上A4-A8:为人脸采集阶段,前置摄像头采集5帧人脸图像,并要求每帧图像有效,即可以利用人脸检测算法清晰检测出人脸。
A9:上传5帧人脸图像至服务器;
如果身份认证在终端设备本地实现,可以不用执行步骤A9,且后续由服务器执行的步骤均在终端设备一侧实现。
A10:服务器执行人脸图像预处理子流程;
A11:服务器执行样本空间训练子流程;
以上步骤A9-A11主要功能是:将5帧人脸图像上传至服务器,服务器执行人脸图像预处理子流程和样本空间训练子流程将5帧人脸归入特征数据库。
A12:将上述5帧人脸特征数据与指定账号进行绑定,并向终端设备返回绑定完成信息;
A13:终端显示绑定成功信息。
以上步骤A12-A13的主要功能是:在服务器上将这5帧人脸特征数据与账号进行绑定,并提示用户绑定成功。
二、如图4所示,为身份认证的流程图,具体如下:
B1:进入移动端应用程序,启动双摄像头同时拍摄功能;
B2:后置摄像头对准二维码,前置摄像头对准人脸;
B3:按下拍摄按钮,同时获取人脸图像和二维码图像;
B4:执行人脸检测算法和二维码检测算法;
B5:判断是否检测到人脸和二维码;如果是,进入B7,否则进入B6;
B6:提示信息获取失败,要求再次拍摄;
以上B1-B6为:人脸图像获取阶段:利用人脸检测和二维码检测算法判断本帧是否为有效帧,若无效则丢弃该帧。
B7:将人脸图像、二维码信息封装成加密报文发送至服务器;
B8:服务器解密报文,提取人脸图像与二维码信息;
B9:执行人脸图像预处理子流程,获取返回信息;
B10:执行人脸识别子流程,获取返回信息;
B11:判断是否识别成功;如果是,进入B12,否则进入B13;
以上B7-B11为:数据传输与人脸识别阶段:将二维码信息与脸部特征数据使用用户密钥加密后送至服务器,服务器通过用户ID进行数据解密及信息还原,在特征数据库中执行脸部特征数据比对判断,进行身份认证,若从特征数据库中无法得到与经由信息还原得到的脸部特征数据匹配的人脸信息,则返回识别失败信息,若从特征数据库中得到与经由信息还原得到的脸部特征数据匹配的人脸信息,则返回所匹配的人脸信息对应的账号。
B12:识别所匹配的人脸信息对应的账号是否是需要验证的账号;
B13:提示验证失败;
以上B12-B13为:若得到与脸部特征数据匹配的人脸信息,则判 断所匹配的人脸信息对应的账号和欲登录的账号是否相同,若不相同则提示验证失败信息。
B14:服务器读取二维码信息,根据应用程序和二维码信息内容作出相应的处理。
以上步骤B14为:确定与待登录账号绑定的人脸信息与获得与脸部特征数据匹配的人脸信息是否相同,如果若相同,即身份认证通过,服务器根据二维码信息,针对不同的应用场景做出不同的响应。例如,对于移动端微信平台支付应用程序,服务器处理商品购买支付流程;对于在PC(personal computer,个人计算机)端的微信网页版登录,完成服务器对WEB页面的登录响应;对于考勤登记应用程序,服务器根据二维码信息确定考勤人员签到信息,根据身份认证结果确定考勤者,更新考勤数据库。
三、如图5所示,为人脸图像预处理的流程图,包括如下步骤:
C1:使人脸图像归一化为128*128的图像;
C2:使用直方图均衡化以消除噪音干扰;
以上步骤C1-C2为:图像预处理阶段,归一化图像并通过直方图均衡消除噪音。
C3:将人脸图像的RGB颜色空间转换为YCbCr颜色空间;
C4:在已经建立的YCbCr肤色模型上进行基于肤色的人脸检测;
以上步骤C3-C4为:人脸检测阶段,通过YCbCr肤色模型进行人脸检测。
C5:标定和截取人脸;
C6:将人脸图像转换到灰度图。
以上步骤C5-C6为:标定和截取人脸部分,并将彩色图像转变为灰度图像。
四、如图6所示,为人脸样本空间训练子流程图,每当有新的人脸图像需要添加进人脸特征库时,可以执行样本空间训练子流程,以生成新的特征投影矩阵,并更新人脸特征库:
D1:输入人脸图像训练样本集;
D2:将人脸图像向量化;
以上步骤D1-D2是:图像预处理阶段,具体可以是:将新添加的人脸图像向量化,使大小为m×n的二维人脸图像变成维数为m×n的列向量。最终,新添加的人脸与特征库中原有的人脸图像构成N个人脸向量x1,x2,...,xN
D3:计算人脸样本空间的平均人脸向量;
本步骤具体可以是:计算样本空间中所有人脸的平均向量:
Figure PCTCN2015088131-appb-000001
D4:计算样本空间的行方向协方差矩阵;
本步骤具体可以是:根据以下公式计算样本空间的行方向协方差矩阵:
Figure PCTCN2015088131-appb-000002
D5:对行方向协方差矩阵进行特征值分解;
D6:选取最大的多个行方向特征值;
以上两个步骤更具体地,可以是:对行方向协方差矩阵C进行特征值分解,选取所有的n个特征值中最大的前d个特征值,保证这d个特征值之和占全部n个特征值和的95%以上。
D7:用所述多个行方向特征值对应的特征向量构成行方向投影特征矩阵;
本步骤具体可以是:将d个特征值对应的d个特征向量构成行方向投影特征矩阵Z。
D8:计算样本空间的列方向协方差矩阵;
本步骤具体可以是:根据以下公式计算样本空间的列方向协方差矩阵:
Figure PCTCN2015088131-appb-000003
D9:对列方向协方差矩阵进行特征值分解;
D10:选取最大的多个列方向特征值;
D11:用所述多个列方向特征值对应的特征向量构成列方向投影特征矩阵;
以上D9-D11与D5-D7类似,用于计算出列方向投影特征矩阵X。
D12:利用双方向投影特征矩阵更新特征库。
本步骤具体为:利用行方向投影特征矩阵Z与列方向投影特征矩阵X更新特征数据库。
五、如图7所示,为人脸识别(样本测试)子流程图,具体包括如下步骤:
E1:输入人脸图像识别样本;
E2:将人脸图像识别样本在行方向投影特征矩阵和列方向投影特征矩阵上投影;
E3:获得人脸图像识别样本的特征矩阵;
以上步骤E1-E3为:输入待识别图像,结合行方向和列方向的二维主成分分析所得的投影矩阵X和Z,将待识别人脸图像同时投影到这两个矩阵上,从而得到行方向和列方向同时降维的特征矩阵:C'=ZTAX,其中A为表示人脸图像样本的矩阵。
E4:计算该特征矩阵和特征库中的特征矩阵的欧氏距离;
E5:获得最小欧式距离;
以上E4-E5为:计算该特征矩阵与特征库中的所有特征矩阵的欧氏距离,并获得最小距离dmin对应的图像Gmin
E6:确定最小距离是否大于等于给定阈值;如果最小距离大于或等于给定阈值,进入E8,否则进入E7;
E7:返回识别失败信息;
E8:返回识别成功信息,并返回最小距离对应的图像。
以上E6-E8为:判断最小距离是否大于等于阈值,若大于等于,则识别完成并返回对应图像;若小于,则返回识别失败信息。
六,如图8所示,为二维码检测的流程图,包括如下步骤:
F1:最大化方差阈值二值化处理;
针对二维码图像使用OTSU(最大类间方差法)最大方差阈值法进行灰度图二值化处理;
F2:中值滤波降噪;
中值滤波方法依据某个像素点的相邻像素的灰度中值来代替该 像素的值降噪,以消除采集图像过程中引入到的噪声。
F3:Canny算子(一个多级边缘检测算法)边缘增强检测;
用Max-Min差分方法和Canny边缘提取算子对二维码边缘进行综合处理增强;
F4:滤波投影定位;
利用投影法滤除一些不规则、孤立的噪声,尽可能保留候选目标区域,初步确定二维码的候选位置;
F5:多项式曲线定位矫正;
选择特定的多项式曲线在二维方向上与每条畸变线进行拟合,然后求出矫正函数,再利用其实现图像的矫正。
七,如图9所示,为二维码识别的流程图,包括如下步骤:
针对二维码的信息识别主要采用基于BM迭代算法的RS的纠错译码识别算法。
G1:计算伴随多项式;
G2:利用BM迭代算法求解错误位置多项式系数,构建多项式位置;
以上G1-G2具体可以为:根据采集到的二维码图像数据使用Berlekamp-Massey算法进行数据伴随多项式计算,迭代求解出存在的错误位置的多项式系数,并构建位置坐标数据;
G3:利用FORNEY算法计算错误位置多项式的根
G4:确定是否存在误差;如果存在,进入G5,否则进入G7;
以上G3-G4具体可以为:利用Froney算法计算错误位置坐标值多项式的根,根据得到的数值进行识别纠错判断,若没有错误则直接输出二维码信息。否则,继续步骤G5;
G5:显示错误数值和错误位置;
G6:确定误差是否超出纠错范围,如果是,进入G8,否则进入G9;
G7:解码输出。
G8:部分解码纠错输出。
G9:纠正错误解码输出。
以上G5-G9具体为:根据纠错识别信息显示错误数值和错误数值,并进行解码纠错阈值判断,根据线性分组码的Reed-Solomon算法纠正误码后,输出二维码识别到的信息。
本发明实施例提出的实现方案结合了二维码与人脸识别,实现同步身份认证,较之以往的身份认证方式更加快捷、安全。因为本发明实施例方案是身份认证方法,所以其不仅仅应用于微信移动支付和PC端登录,不局限于某一种应用程序之上,并且由于二维码在移动端的应用已经普及,本技术还可以极其广泛地应用于例如考勤记录、门禁系统等多个领域。
另外,本发明实施例基于双摄像头同时拍摄功能,当后置摄像头扫描二维码的同时,利用前置摄像头进行人脸识别,采集到脸部特征数据。一般情况下,脸部特征数据信息作为一种身份认证数据而存在,二维码指定了接受身份认证结果的应用程序或程序子模块。
本发明实施例还提供了一种终端设备,如图10所示,包括:
指令接收单元1001,用于接收二维码扫描指令;
扫描单元1002,用于在上述指令接收单元1001接收到二维码扫描指令后,扫描二维码;
生物特征获取单元1003,用于在上述指令接收单元1001接收到二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作上述终端设备的用户的生物特征信息;
认证单元1004,用于对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限。
在本发明实施例中,二维码扫描指令是触发执行扫描二维码的触发条件,由用户输入,例如,进入终端设备的应用程序,需要进行二维码扫描,则由用户输入二维码扫描指令;二维码可以是终端设备内部的图片,也可以是印制或显示于非所述终端设备的其他介质上的二维码,本发明实施例对此不予限定。若二维码在终端设备内部,则使用扫描软件就可以实现;如果二维码印制或显示于非所述终端设备的其他介质上,则通常可以通过应用程序控制所述终端设备的后置摄像头来扫描获得该二维码。
在本发明实施例中,生物特征信息是用于对用户进行身份认证的信息。具体的,生物特征信息为可以用于唯一标识用户身份的生物特征信息,例如:人脸、指纹、虹膜、声音等等,单独或者组合。由于生物特征信息获取动能是自动启动的,与扫描二维码的操作同时进行,因此可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息。
在本发明实施例中,终端设备在收到二维码扫描指令后,会执行扫描二维码的指令获得二维码;二维码会具有各种操作的指令,可能需要认证;此时终端自动开启生物特征信息获取功能,则可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息,这样可以节省用户再次输入验证码或者密码等信息的步骤,从而实现一键式操作,减少身份认证的操作步骤,提高身份认证的效率。另外,因为通过获取当前操作上述终端设备的用户的生物特征信息,来进行用户的身份验证,提高了身份认证的安全性。
可选地,在本发明实施例中,身份认证的步骤可以是在终端设备本地直接完成的;或者,终端可以作为信息的采集设备,身份认证的步骤在服务器一侧完成,由服务器完成身份认证的情况下,身份认证结果可以反馈给终端设备,也可以不反馈给终端设备,而是在执行二维码对应的操作指令以后返回操作结果;在确定认证结果以后的操作,可以根据具体的应用场景及需要进行任意设定,本发明实施例不予限定。具体如下:在身份认证是在终端设备本地完成的情况下,上述认证单元1004,用于通过本地存储的生物特征信息对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限;或者,在身份认证是在服务器一侧完成的情况下,上述认证单元1004,用于向服务器发送扫描得到的上述二维码以及上述生物特征信息,使上述服务器对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限。
由于扫描二维码有可能失败,特别是生物特征信息的获取可能会发生失败的情况;扫描二维码失败需要提示可以理解,生物特征信息 获取失败本来不属于用户需要操作扫描二维码指令的步骤,但是由于需要使用生物特征信息进行身份认证,所以生物特征信息失败也需要进行提示,并且准备下一次获取这些信息,具体如下:进一步地,如图11所示,上述终端设备还包括:
提示单元1101,用于若扫描单元1002扫描二维码失败,或者,上述生物特征获取单元1003获取当前操作上述终端设备的用户的生物特征信息失败,提示信息获取失败,并提示需要重新获取二维码信息和生物特征信息。
由于二维码信息和生物特征信息需要在网络上发送,特别是生物特征信息涉及用户的隐私信息,需要较高的安全性。为了提高信息安全性,本发明实施例可以对二维码信息和生物特征信息进行加密处理,具体如下:进一步地,如图12所示,上述终端设备还包括:
加密封装单元1201,用于在上述认证单元1004向服务器发送扫描得到的上述二维码以及上述生物特征信息之前,将扫描得到的上述二维码以及上述生物特征信息封装成加密报文。
可以用于标识用户身份的生物特征信息的种类很多,任意选取都不会影响本发明实施例的实现,目前较为常用并且实现成本较低的方式主要有人脸识别技术、虹膜识别技术以及指纹识别技术,可以在目前已有的硬件设备基础之上实现,可以作为本发明实施例优选考虑的实现方案,具体如下:
可选地,上述生物特征信息包括:人脸图像信息或者虹膜信息;
上述生物特征获取单元1003,用于在上述扫描单元1002扫描二维码时,自动开启上述终端设备的前置摄像头获取当前位于上述终端设备前的人脸图像信息或者虹膜信息。
以上实施例可以用于目前具有前置摄像头的终端上,例如:具有前置摄像头以及后置摄像头的手机,后置摄像头在拍摄二维码的同时,前置摄像头拍摄人脸图像,非常方便快捷。
可选地,上述生物特征信息包括:指纹信息;
上述生物特征获取单元1003,用于自动开启指纹传感器,在上述二维码扫描指令的输入接口按钮处采集指纹。
有一些终端设备具有指纹识别的功能,也具有指纹传感器可以采集指纹信息,例如:考勤设备,则可以在用户输入二维码扫描指令的按钮处采集指纹,这样也可以实现一键式操作,也非常方便快捷。
本发明实施例还提供了一种身份认证系统,如图13所示,包括:以可通信方式连接的终端设备1301和服务器1302;
其中,上述终端设备1301为本发明实施例提供的终端设备1301,并且终端设备1301向服务器1302发送二维码以及生物特征信息;
上述服务器1302,用于对上述生物特征信息进行身份认证,确定用户是否具有对应上述二维码的操作权限。
本发明实施例中,终端设备在收到二维码扫描指令后,会执行扫描二维码的指令获得二维码;二维码会具有各种操作的指令,可能需要认证;此时终端自动开启生物特征信息获取功能,则可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息,这样可以节省用户再次输入验证码或者密码等信息的步骤,从而实现一键式操作,减少身份认证的操作步骤,提高身份认证的效率。
如图14所示,本发明实施例还提供了另一种终端设备,如图14所示,包括:接收器1401、发射器1402、处理器1403以及存储器1404;
其中,处理器1403,用于控制执行:在接收到二维码扫描指令后,扫描二维码;在接收到上述二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作上述终端设备的用户的生物特征信息;对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限。
在本发明实施例中,二维码扫描指令是触发执行扫描二维码的触发条件,由用户输入,例如,进入终端设备的应用程序,需要进行二维码扫描,则由用户输入二维码扫描指令;二维码可以是终端设备内部的图片,也可以是印制或显示于非所述终端设备的其他介质上的二维码,本发明实施例对此不予限定。若二维码在终端设备内部,则使用扫描软件就可以实现;如果二维码印制或显示于非所述终端设备的 其他介质上,则通常可以通过应用程序控制所述终端设备的后置摄像头来扫描获得该二维码。
在本发明实施例中,生物特征信息是用于对用户进行身份认证的信息。具体的,生物特征信息为可以用于唯一标识用户身份的生物特征信息,例如:人脸、指纹、虹膜、声音等等,单独或者组合。由于生物特征信息获取动能是自动启动的,与扫描二维码的操作同时进行,因此可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息。
在本发明实施例中,终端设备在收到二维码扫描指令后,会执行扫描二维码的指令获得二维码;二维码会具有各种操作的指令,可能需要认证;此时终端自动开启生物特征信息获取功能,则可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息,这样可以节省用户再次输入验证码或者密码等信息的步骤,从而实现一键式操作,减少身份认证的操作步骤,提高身份认证的效率。另外,因为通过获取当前操作上述终端设备的用户的生物特征信息,来进行用户的身份验证,提高了身份认证的安全性。
可选地,在本发明实施例中,身份认证的步骤可以是在终端设备本地直接完成的;或者,终端可以作为信息的采集设备,身份认证的步骤在服务器一侧完成,由服务器完成身份认证的情况下,身份认证结果可以反馈给终端设备,也可以不反馈给终端设备,而是在执行二维码对应的操作指令以后返回操作结果;在确定认证结果以后的操作,可以根据具体的应用场景及需要进行任意设定,本发明实施例不予限定。具体如下:处理器1403,用于控制执行:对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限,包括:在身份认证是在终端设备本地完成的情况下,通过本地存储的生物特征信息对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限;或者,在身份认证是在服务器一侧完成的情况下,向服务器发送扫描得到的上述二维码以及上述生物特征信息,使上述服务器对上述生物特征信息进行身份认证,确定 上述用户是否具有对应上述二维码的操作权限。
由于扫描二维码有可能失败,特别是生物特征信息的获取可能会发生失败的情况;扫描二维码失败需要提示可以理解,生物特征信息获取失败本来不属于用户需要操作扫描二维码指令的步骤,但是由于需要使用生物特征信息进行身份认证,所以生物特征信息失败也需要进行提示,并且准备下一次获取这些信息,具体如下:若扫描二维码失败,或者,获取当前操作上述终端设备的用户的生物特征信息失败,上述处理器1403,还用于控制执行:提示信息获取失败,并提示需要重新获取二维码信息和生物特征信息。
由于二维码信息和生物特征信息需要在网络上发送,特别是生物特征信息涉及用户的隐私信息,需要较高的安全性。为了提高信息安全性,本发明实施例可以对二维码信息和生物特征信息进行加密处理,具体如下:向服务器发送扫描得到的上述二维码以及上述生物特征信息之前,上述处理器1403,还用于控制执行:将扫描得到的上述二维码以及上述生物特征信息封装成加密报文。
可以用于标识用户身份的生物特征信息的种类很多,任意选取都不会影响本发明实施例的实现,目前较为常用并且实现成本较低的方式主要有人脸识别技术、虹膜识别技术以及指纹识别技术,可以在目前已有的硬件设备基础之上实现,可以作为本发明实施例优选考虑的实现方案,具体如下:
如果上述生物特征信息包括:人脸图像信息或者虹膜信息;上述处理器1403,用于控制执行:在扫描二维码时,自动开启上述终端设备的前置摄像头获取当前位于上述终端设备前的人脸图像信息或者虹膜信息。
以上实施例可以用于目前具有前置摄像头的终端上,例如:具有前置摄像头以及后置摄像头的手机,后置摄像头在拍摄二维码的同时,前置摄像头拍摄人脸图像,非常方便快捷。
如果上述生物特征信息包括:指纹信息;上述处理器1403,用于控制执行:自动开启指纹传感器,在上述二维码扫描指令的输入接口按钮处采集指纹。
有一些终端设备具有指纹识别的功能,也具有指纹传感器可以采集指纹信息,例如:考勤设备,则可以在用户输入二维码扫描指令的按钮处采集指纹,这样也可以实现一键式操作,也非常方便快捷。
本发明实施例还提供了另一种终端设备,如图15所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该终端设备可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以终端为手机为例:
图15示出的是与本发明实施例提供的终端相关的手机的部分结构的框图。参考图15,手机包括:射频(Radio Frequency,RF)电路1510、存储器1520、输入单元1530、显示单元1540、传感器1550、音频电路1560、无线保真(wireless fidelity,WiFi)模块1570、处理器1580、以及电源1590等部件。本领域技术人员可以理解,图15中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图15对手机的各个构成部件进行具体的介绍:
RF电路1510可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1580处理;另外,将设计上行的数据发送给基站。通常,RF电路1510包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1510还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器1520可用于存储软件程序以及模块,处理器1580通过运 行存储在存储器1520的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1520可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1520可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元1530可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1530可包括触控面板1531以及其他输入设备1532。触控面板1531,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1531上或在触控面板1531附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1531可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1580,并能接收处理器1580发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1531。除了触控面板1531,输入单元1530还可以包括其他输入设备1532。具体地,其他输入设备1532可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元1540可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1540可包括显示面板1541,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1541。进一步的,触控面板1531可覆盖显示面板1541,当触控面板1531检测到在其上或附近的触摸操作后,传送给处理器1580以确定触摸事件的类型,随后处理器1580根据触摸事件的类型在显 示面板1541上提供相应的视觉输出。虽然在图15中,触控面板1531与显示面板1541是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1531与显示面板1541集成而实现手机的输入和输出功能。
手机还可包括至少一种传感器1550,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1541的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1541和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路1560、扬声器1561,传声器1562可提供用户与手机之间的音频接口。音频电路1560可将接收到的音频数据转换后的电信号,传输到扬声器1561,由扬声器1561转换为声音信号输出;另一方面,传声器1562将收集的声音信号转换为电信号,由音频电路1560接收后转换为音频数据,再将音频数据输出处理器1580处理后,经RF电路1510以发送给比如另一手机,或者将音频数据输出至存储器1520以便进一步处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块1570可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图15示出了WiFi模块1570,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器1580是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1520内的软件程序和/或模块,以及调用存储在存储器1520内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1580 可包括一个或多个处理单元;优选的,处理器1580可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1580中。
手机还包括给各个部件供电的电源1590(比如电池),优选的,电源可以通过电源管理系统与处理器1580逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
在本发明实施例中,该终端所包括的处理器1580还具有以下功能:
其中,处理器1580,用于控制执行:在接收到二维码扫描指令后,扫描二维码;在接收到上述二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作上述终端设备的用户的生物特征信息;对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限。
在本发明实施例中,二维码扫描指令是触发执行扫描二维码的触发条件,由用户输入,例如,进入终端设备的应用程序,需要进行二维码扫描,则由用户输入二维码扫描指令;二维码可以是终端设备内部的图片,也可以是印制或显示于非所述终端设备的其他介质上的二维码,本发明实施例对此不予限定。若二维码在终端设备内部,则使用扫描软件就可以实现;如果二维码印制或显示于非所述终端设备的其他介质上,则可以通常可以通过应用程序控制所述终端设备的后置摄像头来扫描获得该二维码。
在本发明实施例中,生物特征信息是用于对用户进行身份认证的信息。具体的,生物特征信息为可以用于唯一标识用户身份的生物特征信息,例如:人脸、指纹、虹膜、声音等等,单独或者组合。由于生物特征信息获取动能是自动启动的,与扫描二维码的操作同时进行,因此可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息。
在本发明实施例中,终端设备在收到二维码扫描指令后,会执行扫描二维码的指令获得二维码;二维码会具有各种操作的指令,可能需要认证;此时终端自动开启生物特征信息获取功能,则可以获得当前正在操作终端设备的用户的生物特征信息,也即是可以自动获取到可以用于认证用户身份的信息,这样可以节省用户再次输入验证码或者密码等信息的步骤,从而实现一键式操作,减少身份认证的操作步骤,提高身份认证的效率。另外,因为通过获取当前操作上述终端设备的用户的生物特征信息,来进行用户的身份验证,提高了身份认证的安全性。
可选地,在本发明实施例中,身份认证的步骤可以是在终端设备本地直接完成的;或者,终端可以作为信息的采集设备,身份认证的步骤在服务器一侧完成,由服务器完成身份认证的情况下,身份认证结果可以反馈给终端设备,也可以不反馈给终端设备,而是在执行二维码对应的操作指令以后返回操作结果;在确定认证结果以后的操作,可以根据具体的应用场景及需要进行任意设定,本发明实施例不予限定。具体如下:处理器1580,用于控制执行:对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限,包括:在身份认证是在终端设备本地完成的情况下,通过本地存储的生物特征信息对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限;或者,在身份认证是在服务器一侧完成的情况下,向服务器发送扫描得到的上述二维码以及上述生物特征信息,使上述服务器对上述生物特征信息进行身份认证,确定上述用户是否具有对应上述二维码的操作权限。
由于扫描二维码有可能失败,特别是生物特征信息的获取可能会发生失败的情况;扫描二维码失败需要提示可以理解,生物特征信息获取失败本来不属于用户需要操作扫描二维码指令的步骤,但是由于需要使用生物特征信息进行身份认证,所以生物特征信息失败也需要进行提示,并且准备下一次获取这些信息,具体如下:若扫描二维码失败,或者,获取当前操作上述终端设备的用户的生物特征信息失败,上述处理器1580,还用于控制执行:提示信息获取失败,并提示需 要重新获取二维码信息和生物特征信息。
由于二维码信息和生物特征信息需要在网络上发送,特别是生物特征信息涉及用户的隐私信息,需要较高的安全性。为了提高信息安全性,本发明实施例可以对二维码信息和生物特征信息进行加密处理,具体如下:向服务器发送扫描得到的上述二维码以及上述生物特征信息之前,上述处理器1580,还用于控制执行:将扫描得到的上述二维码以及上述生物特征信息封装成加密报文。
可以用于标识用户身份的生物特征信息的种类很多,任意选取都不会影响本发明实施例的实现,目前较为常用并且实现成本较低的方式主要有人脸识别技术、虹膜识别技术以及指纹识别技术,可以在目前已有的硬件设备基础之上实现,可以作为本发明实施例优选考虑的实现方案,具体如下:
如果上述生物特征信息包括:人脸图像信息或者虹膜信息;上述处理器1580,用于控制执行:在扫描二维码时,自动开启上述终端设备的前置摄像头获取当前位于上述终端设备前的人脸图像信息或者虹膜信息。
以上实施例可以用于目前具有前置摄像头的终端上,例如:具有前置摄像头以及后置摄像头的手机,后置摄像头在拍摄二维码的同时,前置摄像头拍摄人脸图像,非常方便快捷。
如果上述生物特征信息包括:指纹信息;上述处理器1580,用于控制执行:自动开启指纹传感器,在上述二维码扫描指令的输入接口按钮处采集指纹。
有一些终端设备具有指纹识别的功能,也具有指纹传感器可以采集指纹信息,例如:考勤设备,则可以在用户输入二维码扫描指令的按钮处采集指纹,这样也可以实现一键式操作,也非常方便快捷。
值得注意的是,上述终端设备实施例中,所包括的各个单元只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的具体名称也只是为了便于相互区分,并不用于限制本发明的保护范围。
另外,本领域普通技术人员可以理解实现上述各方法实施例中的 全部或部分步骤是可以通过程序来指令相关的硬件完成,相应的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明实施例揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。

Claims (13)

  1. 一种身份认证方法,其特征在于,包括:
    终端设备在接收到二维码扫描指令后,扫描二维码;
    所述终端设备在接收到所述二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作所述终端设备的用户的生物特征信息;
    对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限。
  2. 根据权利要求1所述方法,其特征在于,对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限,包括:
    通过本地存储的生物特征信息对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限;或者,向服务器发送扫描得到的所述二维码以及所述生物特征信息,使所述服务对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限。
  3. 根据权利要求2所述方法,其特征在于,向服务器发送扫描得到的所述二维码以及所述生物特征信息之前,所述方法还包括:
    将扫描得到的所述二维码以及所述生物特征信息封装成加密报文。
  4. 根据权利要求1所述方法,其特征在于,若扫描二维码失败,或者,获取当前操作所述终端设备的用户的生物特征信息失败,所述方法还包括:
    提示信息获取失败,并提示需要重新获取二维码信息和生物特征信息。
  5. 根据权利要求1至4任意一项所述方法,其特征在于,所述生物特征信息包括:人脸图像信息或者虹膜信息;所述自动开启生物特征信息获取功能,获取当前操作所述终端设备的用户的生物特征信息包括:
    在扫描二维码时,自动开启所述终端设备的前置摄像头获取当前位于所述终端设备前的人脸图像信息或者虹膜信息。
  6. 根据权利1至4任意一项所述方法,其特征在于,所述生物特征信息包括:指纹信息;所述自动开启生物特征信息获取功能,获取当前操作所述终端设备的用户的生物特征信息包括:
    自动开启指纹传感器,在所述二维码扫描指令的输入接口按钮处采集指纹。
  7. 一种终端设备,其特征在于,包括:
    处理器;
    存储器;及
    程序单元,所述程序单元存储在所述存储器中并由所述处理器执行,所述程序单元包括:指令接收单元,用于接收二维码扫描指令;
    扫描单元,用于在所述指令接收单元接收到二维码扫描指令后,扫描二维码;
    生物特征获取单元,用于在所述指令接收单元接收到二维码扫描指令后,自动开启生物特征信息获取功能,获取当前操作所述终端设备的用户的生物特征信息;
    认证单元,用于对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限。
  8. 根据权利要求7所述终端设备,其特征在于,
    所述认证单元用于通过本地存储的生物特征信息对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限;或者,所述认证单元用于向服务器发送扫描得到的所述二维码以及所述生物特征信息,使所述服务对所述生物特征信息进行身份认证,确定所述用户是否具有对应所述二维码的操作权限。
  9. 根据权利要求8所述终端设备,其特征在于,所述程序单元包括还包括:
    加密封装单元,用于在所述认证单元向服务器发送扫描得到的所述二维码以及所述生物特征信息之前,将扫描得到的所述二维码以及 所述生物特征信息封装成加密报文。
  10. 根据权利要求7所述终端设备,其特征在于,所述程序单元包括还包括:
    提示单元,用于若扫描单元扫描二维码失败,或者,所述生物特征获取单元获取当前操作所述终端设备的用户的生物特征信息失败,提示信息获取失败,并提示需要重新获取二维码信息和生物特征信息。
  11. 根据权利要求7至10任意一项所述终端设备,其特征在于,所述生物特征信息包括:人脸图像信息或者虹膜信息;
    所述生物特征获取单元,用于在所述扫描单元扫描二维码时,自动开启所述终端设备的前置摄像头获取当前位于所述终端设备前的人脸图像信息或者虹膜信息。
  12. 根据权利7至10任意一项所述终端设备,其特征在于,所述生物特征信息包括:指纹信息;
    所述生物特征获取单元,用于自动开启指纹传感器,在所述二维码扫描指令的输入接口按钮处采集指纹。
  13. 一种身份认证系统,包括:以可通信方式连接的终端设备和服务器,其特征在于;
    所述终端设备为权利要求8至12任意一项的终端设备,并且所述终端设备向所述服务器发送二维码以及生物特征信息;
    所述服务器,用于对所述生物特征信息进行身份认证,确定用户是否具有对应所述二维码的操作权限。
PCT/CN2015/088131 2014-08-26 2015-08-26 一种身份认证方法、终端设备,及系统 WO2016029853A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/431,238 US20170161750A1 (en) 2014-08-26 2017-02-13 Identity Authentication Method, Terminal Device And System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410425691.X 2014-08-26
CN201410425691.XA CN104184589B (zh) 2014-08-26 2014-08-26 一种身份认证方法、终端设备,及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/431,238 Continuation US20170161750A1 (en) 2014-08-26 2017-02-13 Identity Authentication Method, Terminal Device And System

Publications (1)

Publication Number Publication Date
WO2016029853A1 true WO2016029853A1 (zh) 2016-03-03

Family

ID=51965354

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/088131 WO2016029853A1 (zh) 2014-08-26 2015-08-26 一种身份认证方法、终端设备,及系统

Country Status (3)

Country Link
US (1) US20170161750A1 (zh)
CN (1) CN104184589B (zh)
WO (1) WO2016029853A1 (zh)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124283A (zh) * 2016-11-30 2018-06-05 无锡华润矽科微电子有限公司 一种射频数据传输方法及系统
WO2018113803A1 (en) * 2016-12-23 2018-06-28 Aducid S.R.O. Multi-factor authentication method
CN110070661A (zh) * 2019-06-10 2019-07-30 北京意锐新创科技有限公司 适用于楼宇的门禁系统
CN111630827A (zh) * 2018-01-22 2020-09-04 苹果公司 基于数据的视觉表示的具有认证的安全登录
CN112328992A (zh) * 2020-11-10 2021-02-05 上海亿为科技有限公司 基于人工智能的人体检测方法及云服务器
CN113435275A (zh) * 2021-06-15 2021-09-24 武汉北大高科软件股份有限公司 一种特定区域出入管控终端
CN115632798A (zh) * 2022-11-28 2023-01-20 湖南大学 基于智能合约的电子证照认证溯源方法、系统及相关设备
CN116597551A (zh) * 2023-06-21 2023-08-15 厦门万安智能有限公司 一种基于私有云的智能楼宇访问管理系统

Families Citing this family (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10977650B2 (en) * 2013-10-30 2021-04-13 Tencent Technology (Shenzhen) Company Limited Information transmission method, apparatus and system
EP3066612B1 (en) * 2013-11-07 2019-01-02 Scantrust SA Two dimensional barcode and method of authentication of such barcode
CN104184589B (zh) * 2014-08-26 2018-09-07 重庆邮电大学 一种身份认证方法、终端设备,及系统
CN104378759A (zh) * 2014-12-04 2015-02-25 福建星网锐捷网络有限公司 一种用户实名认证方法及系统
CN104601333A (zh) * 2015-02-11 2015-05-06 浙江中烟工业有限责任公司 一种基于人机特征的二维码远程认证方法
WO2016141561A1 (zh) * 2015-03-11 2016-09-15 北京释码大华科技有限公司 虹膜身份认证附件及系统
CN105069389B (zh) * 2015-07-27 2017-10-31 福建联迪商用设备有限公司 二维码分块解码方法及系统
KR101635396B1 (ko) * 2015-08-10 2016-07-01 조준호 전자 상거래 방법
CN105515946B (zh) * 2015-12-02 2019-12-13 广东小天才科技有限公司 一种添加联系人方法与系统
CN105608756A (zh) * 2015-12-29 2016-05-25 南京航空航天大学 一种基于微信公众平台的人脸识别签到方法
CN106936975B (zh) * 2015-12-29 2020-02-21 宇龙计算机通信科技(深圳)有限公司 二维码识别方法、装置及移动终端
CN106056187B (zh) * 2016-06-13 2019-02-12 中检溯源科技有限公司 一种产品销售激活查询防伪标签
US10536464B2 (en) * 2016-06-22 2020-01-14 Intel Corporation Secure and smart login engine
CN106910057B (zh) * 2016-06-23 2021-03-23 创新先进技术有限公司 移动终端及移动终端侧的安全认证方法和装置
WO2018013180A1 (en) * 2016-07-15 2018-01-18 Hewlett-Packard Development Company, L.P. Hint-based queries
CN106446735B (zh) * 2016-08-30 2018-11-23 江苏先云信息技术有限公司 一种安全存折的条码信息存取系统
CN114791927A (zh) * 2016-09-27 2022-07-26 华为技术有限公司 一种数据分析方法和装置
CN106330464B (zh) * 2016-10-26 2019-04-23 上海众人网络安全技术有限公司 一种身份认证方法、设备及系统
CN107026836B (zh) 2016-10-28 2020-03-06 阿里巴巴集团控股有限公司 一种业务实现方法和装置
CN106603913A (zh) * 2016-12-12 2017-04-26 于平 景观留影拍照系统
CN106657114B (zh) * 2016-12-30 2019-11-01 金蝶软件(中国)有限公司 一种激活产品用户的实现方法及系统
CN108510296B (zh) * 2017-02-27 2022-01-28 阿里巴巴集团控股有限公司 一种业务功能的启动、处理方法、客户端及服务器
CN108806025A (zh) * 2017-05-03 2018-11-13 腾讯科技(深圳)有限公司 实现访客临时访问的门禁授权方法及装置
CN107122979A (zh) * 2017-05-23 2017-09-01 珠海市魅族科技有限公司 信息处理方法及装置、计算机装置及计算机可读存储介质
CN107274188A (zh) * 2017-06-21 2017-10-20 联想(北京)有限公司 支付数据的验证方法及装置
CN107292623A (zh) * 2017-07-12 2017-10-24 安徽博森互联网科技有限公司 一种移动支付系统
CN107341532A (zh) * 2017-07-20 2017-11-10 世旼伟德(无锡)机械制造有限公司 一种焊接溯源管理系统及其管理方法
CN107609449B (zh) * 2017-09-07 2020-07-28 广州杰赛科技股份有限公司 识别码的校验方法、系统和共享自行车
CN107944241A (zh) * 2017-11-20 2018-04-20 珠海市魅族科技有限公司 扫码方法及装置、计算机装置和计算机可读存储介质
JP7030493B2 (ja) * 2017-11-30 2022-03-07 キヤノン株式会社 画像処理装置、画像処理方法およびプログラム
CN107833054B (zh) * 2017-12-11 2019-05-28 飞天诚信科技股份有限公司 一种蓝牙金融卡及其工作方法
CN108133165A (zh) * 2018-01-16 2018-06-08 深圳市爱克信智能股份有限公司 一种二维码读卡器加密方法
CN108362365A (zh) * 2018-01-18 2018-08-03 英华达(上海)科技有限公司 具有识别用户功能的体重计及其识别用户的方法
CN108451032A (zh) * 2018-03-02 2018-08-28 深圳市舜宝科技有限公司 一种具有指纹识别功能的电子烟系统
US10817706B2 (en) * 2018-05-01 2020-10-27 Universal City Studios Llc System and method for facilitating throughput using facial recognition
WO2019210487A1 (zh) * 2018-05-03 2019-11-07 华为技术有限公司 一种基于人脸识别的支付方法、装置及终端
CN109165701B (zh) * 2018-08-27 2024-01-19 深圳鑫粤知识产权服务有限公司 签到名帖打印方法、装置、设备及系统
CN110891040A (zh) * 2018-09-07 2020-03-17 上海金荣翔企业发展有限公司 一种基于互联网的信息发送及接收方法、系统及一种包装体
CN109214160A (zh) * 2018-09-14 2019-01-15 温州科技职业学院 一种计算机网络身份验证系统及方法、计算机程序
CN109214344A (zh) * 2018-09-16 2019-01-15 刘兴丹 一种云端及时性验证人脸识别及关联的方法、装置
CN109325333B (zh) * 2018-09-24 2021-11-12 申朴信息技术(上海)股份有限公司 一种双识别登录、支付的方法、装置
CN109255620B (zh) * 2018-09-28 2023-09-08 努比亚技术有限公司 加密支付方法、移动终端及计算机可读存储介质
CN109409895A (zh) * 2018-09-29 2019-03-01 深圳先牛信息技术有限公司 一种融合虹膜识别和人脸识别的支付装置及支付方法
CN109409249A (zh) * 2018-09-30 2019-03-01 联想(北京)有限公司 信息处理方法及电子设备
SG11202103587YA (en) * 2018-10-12 2021-05-28 Nec Corp Information processing apparatus
CN109376644A (zh) * 2018-10-17 2019-02-22 深圳市智滴科技有限公司 一种基于人脸识别的监护方法以及系统
CN109472587B (zh) * 2018-10-23 2022-03-29 汪海彬 一种移动支付方法及系统
CN110175827A (zh) * 2018-11-06 2019-08-27 广东小天才科技有限公司 一种无人商店支付方法及可穿戴设备
CN110175835A (zh) * 2018-11-06 2019-08-27 广东小天才科技有限公司 一种基于可穿戴设备的扫码支付方法及可穿戴设备
CN109522695A (zh) * 2018-11-30 2019-03-26 努比亚技术有限公司 应用程序登录方法、电脑端、移动终端、系统及存储介质
CN109558718A (zh) * 2018-11-30 2019-04-02 努比亚技术有限公司 应用程序登录方法、电脑端、移动终端、系统及存储介质
CN109801173A (zh) * 2018-12-14 2019-05-24 平安普惠企业管理有限公司 基于生物特征识别的业绩管理方法、装置和计算机设备
CN111401489A (zh) * 2018-12-28 2020-07-10 金联汇通信息技术有限公司 智能门锁的控制方法、装置及电子设备
CN109624546A (zh) * 2019-01-26 2019-04-16 台州市袋码科技有限公司 二维码贴纸、带有二维码的台历以及附加信息处理方法
CN110046867A (zh) * 2019-02-28 2019-07-23 惠州学院 人脸识别点名装置及方法
JP7218634B2 (ja) * 2019-03-19 2023-02-07 株式会社デンソーウェーブ 端末装置
CN110046532A (zh) * 2019-04-25 2019-07-23 深圳左邻永佳科技有限公司 一卡通二维码生成和读取方法
CN110163633A (zh) * 2019-04-25 2019-08-23 江苏大学 一种共享单车的二维码防伪认证方法及租车方法
CN111881708A (zh) * 2019-05-03 2020-11-03 爱唯秀股份有限公司 人脸识别系统
CN110148262A (zh) * 2019-05-20 2019-08-20 江苏大学 一种基于人脸识别的第三方汽车租赁管理系统及汽车启动授权方法
CN110412212A (zh) * 2019-06-04 2019-11-05 苏州格目软件技术有限公司 一种基于影像与成分分析的水生生物监测系统及工作方法
CN110970132B (zh) * 2019-11-01 2023-06-16 广东炬海科技股份有限公司 一种基于移动护理的病情预警系统
CN111080923A (zh) * 2019-11-26 2020-04-28 中国建设银行股份有限公司 一种金融设备的身份认证方法和装置
CN111091012A (zh) * 2019-11-27 2020-05-01 深圳市智微智能软件开发有限公司 条码机条码生成方法及相关产品
CN111222116A (zh) * 2019-12-28 2020-06-02 北京太坦科技有限公司 一种智能终端
CN111177696A (zh) * 2019-12-28 2020-05-19 北京太坦科技有限公司 智能终端开机认证方法
CN111460842A (zh) * 2020-03-31 2020-07-28 北京金和网络股份有限公司 二维码处理方法、装置、存储介质及用户终端
CN112165751B (zh) * 2020-08-20 2022-07-12 安徽极光照明工程有限公司 一种基于微信小程序的灯光控制系统
CN112365618A (zh) * 2020-10-19 2021-02-12 北京全路通信信号研究设计院集团有限公司 一种基于人脸识别和二维码测温考勤系统及方法
CN112328993B (zh) * 2020-11-10 2022-09-13 上海亿为科技有限公司 基于工业互联网的人体检测方法及云服务器
CN112766433B (zh) * 2020-12-30 2024-02-27 盛泰光电科技股份有限公司 一种产品自动追溯系统
CN113609540A (zh) * 2021-08-03 2021-11-05 深圳市闪联信息技术有限公司 一种电子设备的usb接口可信管理方法及系统
CN114022966A (zh) * 2021-09-30 2022-02-08 福建数博讯信息科技有限公司 一种实名制平台与人脸识别设备间的校时方法
CN113888817A (zh) * 2021-11-05 2022-01-04 德明通讯(上海)股份有限公司 一种支持人脸识别的pos机系统及方法
CN114726553B (zh) * 2022-06-07 2022-10-28 深圳市永达电子信息股份有限公司 一种基于二维码的自动认证方法及装置
CN115471937B (zh) * 2022-09-23 2024-04-19 广州浩传网络科技有限公司 一种档案管理装置及使用方法
CN116776909B (zh) * 2023-08-28 2023-11-03 四川星点网络技术有限公司 一种瓶盖二维码溯源系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130332365A1 (en) * 2008-12-22 2013-12-12 Mastercard International Incorporated Methods and systems for biometric verification
CN103956006A (zh) * 2014-05-14 2014-07-30 金陵科技学院 高安全性便携式收付款装置
CN103955823A (zh) * 2014-05-14 2014-07-30 金陵科技学院 一种高安全性便携式收付款方法
CN104184589A (zh) * 2014-08-26 2014-12-03 重庆邮电大学 一种身份认证方法、终端设备,及系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100905675B1 (ko) * 2007-08-13 2009-07-03 한국전자통신연구원 지문인식 장치 및 방법
CN101482948A (zh) * 2008-01-07 2009-07-15 唐红波 基于二维码实现手机支付的方法
CN103268549A (zh) * 2013-04-24 2013-08-28 徐明亮 一种基于人脸特征的移动支付验证系统
CN103501413B (zh) * 2013-10-14 2017-01-25 Tcl移动通信科技(宁波)有限公司 利用前置摄像头控制后置摄像头对焦及拍照的方法及系统
CN103914901B (zh) * 2014-03-27 2017-12-29 惠州Tcl移动通信有限公司 一种开锁方法及开锁系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130332365A1 (en) * 2008-12-22 2013-12-12 Mastercard International Incorporated Methods and systems for biometric verification
CN103956006A (zh) * 2014-05-14 2014-07-30 金陵科技学院 高安全性便携式收付款装置
CN103955823A (zh) * 2014-05-14 2014-07-30 金陵科技学院 一种高安全性便携式收付款方法
CN104184589A (zh) * 2014-08-26 2014-12-03 重庆邮电大学 一种身份认证方法、终端设备,及系统

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124283A (zh) * 2016-11-30 2018-06-05 无锡华润矽科微电子有限公司 一种射频数据传输方法及系统
WO2018113803A1 (en) * 2016-12-23 2018-06-28 Aducid S.R.O. Multi-factor authentication method
CN111630827A (zh) * 2018-01-22 2020-09-04 苹果公司 基于数据的视觉表示的具有认证的安全登录
US11636192B2 (en) 2018-01-22 2023-04-25 Apple Inc. Secure login with authentication based on a visual representation of data
CN110070661A (zh) * 2019-06-10 2019-07-30 北京意锐新创科技有限公司 适用于楼宇的门禁系统
CN112328992A (zh) * 2020-11-10 2021-02-05 上海亿为科技有限公司 基于人工智能的人体检测方法及云服务器
CN112328992B (zh) * 2020-11-10 2022-09-13 上海亿为科技有限公司 基于人工智能的人体检测方法及云服务器
CN113435275A (zh) * 2021-06-15 2021-09-24 武汉北大高科软件股份有限公司 一种特定区域出入管控终端
CN115632798A (zh) * 2022-11-28 2023-01-20 湖南大学 基于智能合约的电子证照认证溯源方法、系统及相关设备
CN116597551A (zh) * 2023-06-21 2023-08-15 厦门万安智能有限公司 一种基于私有云的智能楼宇访问管理系统

Also Published As

Publication number Publication date
CN104184589A (zh) 2014-12-03
CN104184589B (zh) 2018-09-07
US20170161750A1 (en) 2017-06-08

Similar Documents

Publication Publication Date Title
WO2016029853A1 (zh) 一种身份认证方法、终端设备,及系统
US11568411B2 (en) Facial recognition-based payment method, apparatus, and terminal
CN107944325B (zh) 一种扫码方法、扫码装置及移动终端
EP3374916B1 (en) Facial profile modification for hands free transactions
US9049983B1 (en) Ear recognition as device input
CN108551519B (zh) 一种信息处理方法、装置、存储介质及系统
CN108038393B (zh) 一种应用程序隐私保护方法、移动终端
WO2015003522A1 (zh) 人脸识别方法、装置和移动终端
CN109255620B (zh) 加密支付方法、移动终端及计算机可读存储介质
WO2019011109A1 (zh) 权限控制方法及相关产品
US20210406893A1 (en) Systems and methods for providing multi-factor authentication for vehicle transactions
CN108075899B (zh) 一种身份验证方法、移动终端和计算机可读存储介质
CN107730260B (zh) 一种实现二维码支付的方法、设备和终端
US10867202B2 (en) Method of biometric authenticating using plurality of camera with different field of view and electronic apparatus thereof
CN109544172B (zh) 一种显示方法及终端设备
US20230021413A1 (en) Voice Payment Method and Electronic Device
JP2021099878A (ja) 制御システム、制御方法、プログラム
US20240078550A1 (en) Systems and methods for providing multi-factor authentication for vehicle transactions
CN107545163B (zh) 解锁控制方法及相关产品
CN107330314A (zh) 基于生物特征的授权方法、移动终端及可读存储介质
CN108604267A (zh) 具有指纹验证的用户界面元件
CN110929238B (zh) 一种信息处理方法及设备
US20120151575A1 (en) Apparatus and method for certificating security in portable terminal
CN107644159B (zh) 人脸识别方法及相关产品
CN110837630B (zh) 登录方法、图像处理方法和电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15834906

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 17.07.2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15834906

Country of ref document: EP

Kind code of ref document: A1