CN105590043A - Authentication method, device and system - Google Patents

Authentication method, device and system Download PDF

Info

Publication number
CN105590043A
CN105590043A CN201410567734.8A CN201410567734A CN105590043A CN 105590043 A CN105590043 A CN 105590043A CN 201410567734 A CN201410567734 A CN 201410567734A CN 105590043 A CN105590043 A CN 105590043A
Authority
CN
China
Prior art keywords
acquisition parameters
terminal device
authentication
facial image
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410567734.8A
Other languages
Chinese (zh)
Other versions
CN105590043B (en
Inventor
廖晨
王进
张东蕊
许灿冲
张�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410567734.8A priority Critical patent/CN105590043B/en
Publication of CN105590043A publication Critical patent/CN105590043A/en
Application granted granted Critical
Publication of CN105590043B publication Critical patent/CN105590043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

An authentication method comprises the following steps of transmitting at least one first shooting parameter to a terminal device when a service processing request sent from the terminal device is received, and controlling a shooting device to acquire a face image for an authentication user by the terminal device according to the first shooting parameter; receiving the face image sent from the terminal device, matching a second shooting parameter of the face image with the first shooting parameter, and simultaneously matching the face image with a preset face image; and determining whether the authentication of the user is passed or not according to a matching result. Further, the invention also provides an authentication device and system. With the above authentication method, device and system, the safety of the authentication based on face recognition can be improved.

Description

Auth method, Apparatus and system
Technical field
The present invention relates to field of computer technology, relate in particular to a kind of auth method, install and beSystem.
Background technology
Recognition of face is a kind of bio-identification skill that the face feature information based on people is carried out identificationArt. The image that contains face with video camera or camera collection or video flowing, and automatically in image, examineSurvey and track human faces, and then the face detecting is carried out to a series of correlation techniques of face, conventionally alsoBe called Identification of Images, face recognition. Recognition of face is as a kind of mode of authentication, at presentBe widely used in government, army, bank, social welfare report barrier, ecommerce, safe defence, moveThe fields such as moving payment.
But there is certain potential safety hazard in the existing identity validation technology based on recognition of face, afterThe one-sided receiving terminal apparatus face recognition result of station server, and lack between front end recognition of face softwareWeary mutual interlock, is subject to current face recognition algorithms existing limitation in antagonism cheating, and malice is usedFamily can be by adopting all nonconventional approaches to break through or walking around recognition of face software, will be by multipleIllegal means (as: obtained static photograph, video intercepting, taken on the sly etc. by social networks) is obtainedThe face image of validated user directly sends to the mode of server to complete authentication, and and then involutoryMethod user's individual privacy or property safety threaten.
Summary of the invention
In view of this, the invention provides a kind of auth method, Apparatus and system, can improve based onThe security of the authentication of recognition of face.
A kind of auth method that the embodiment of the present invention provides, comprising: send out when receiving terminal deviceSend Business Processing request time, at least one first acquisition parameters is handed down to described terminal device, makeDescribed terminal device control filming apparatus is taken parameter acquisition for authentication according to described firstUser's facial image; Receive the described facial image that described terminal device sends, by described face figureThe second acquisition parameters of picture mates with described the first acquisition parameters, simultaneously by described facial image withPreset facial image mates; Determine according to matching result whether described user tests by described identityCard.
Another auth method that the embodiment of the present invention provides, comprising: send business to serverProcess request; Receive at least one first acquisition parameters that described server issues; Control filming apparatusFacial image according to described the first shooting parameter acquisition for the user of authentication, and send to instituteState server, so that described server is by the second acquisition parameters of described facial image and described first countTake the photograph parameter and mate, described facial image is mated with preset facial image simultaneously, and according toMatching result determines that whether described user is by described authentication.
The another kind of auth method that the embodiment of the present invention provides, comprising: terminal device is to serverSend Business Processing request; In the time receiving described Business Processing request, described server is by least oneIndividual the first acquisition parameters is handed down to described terminal device; Described terminal device receive issue described firstAcquisition parameters, controls filming apparatus and takes the user of parameter acquisition for authentication according to described firstFacial image, and return to described server; Described server receives the described facial image returning,The second acquisition parameters of described facial image is mated with described the first acquisition parameters, simultaneously by instituteState facial image and mate with preset facial image, and whether determine described user according to matching resultBy described authentication.
A kind of authentication means that the embodiment of the present invention provides, runs on server, comprising: issueModule, in the time receiving the Business Processing request of terminal device transmission, by least one first countTake the photograph parameter and be handed down to described terminal device, make described terminal device control filming apparatus according to describedOne acquisition parameters collection is for the user's of authentication facial image; Receiver module, for receivingState the described facial image that terminal device sends; Matching module, for what receive described receiver moduleThe second acquisition parameters of described facial image with described in issue described the first acquisition parameters that module issues and enterRow coupling is mated described facial image simultaneously with preset facial image; Authentication module, forDetermine that according to the matching result of described matching module whether described user is by described authentication.
Another authentication means that the embodiment of the present invention provides, runs on terminal device, comprising:Sending module, for sending Business Processing request to server; Receiver module, for receiving described clothesAt least one first acquisition parameters that business device issues; Acquisition module, for controlling filming apparatus according to instituteState described first of receiver module reception and take the face figure of parameter acquisition for the user of authenticationPicture; Described sending module, also for described facial image is sent to described server, so that described inServer mates the second acquisition parameters of described facial image with described the first acquisition parameters, withIn time, mates described facial image with preset facial image, and determines described use according to matching resultWhether family is by described authentication.
A kind of authentication system that the embodiment of the present invention provides, comprising: terminal device and server;Wherein said terminal device, for sending Business Processing request to described server; Described server,For in the time receiving described Business Processing request, described at least one first acquisition parameters is handed down toTerminal device; Described terminal device, also for receiving described the first acquisition parameters issuing, controls and clapsTake the photograph device and take the facial image of parameter acquisition for the user of authentication according to described first, and returnReturn to described server; Described server, also for receiving the described facial image returning, described in inciting somebody to actionThe second acquisition parameters of facial image mates with described the first acquisition parameters, simultaneously by described faceImage mates with preset facial image, and determines according to matching result whether described user passes through instituteState authentication.
Auth method, Apparatus and system that the embodiment of the present invention provides, utilize different shooting ginsengsThe facial image collecting under several has this characteristic of different features, establishes receiving terminal each timeWhen Business Processing request that preparation is sent, at least one first acquisition parameters is handed down to this terminal device,Receive that this terminal device sends according to this first facial image of taking the user of parameter acquisition, shouldThe second acquisition parameters of facial image mates with this first acquisition parameters, simultaneously by this facial imageMate with preset facial image; Determine that according to matching result whether this user is by this authentication,Realize the mutual interlock of background server and front end recognition of face software, changed traditional backstage clothesThe business one-sided receiving terminal apparatus face recognition result of device and easily by malicious user by photo, videoDeng the situation of cheating mode deception, make up current face recognition algorithms existing in antagonism cheatingLimitation, thus can not increase extra hardware supported and increase under the prerequisite of hardware use cost,Improve the security of the authentication based on recognition of face.
For above and other object of the present invention, feature and advantage can be become apparent, cited below particularlyPreferred embodiment, and coordinate appended graphicly, be described in detail below.
Brief description of the drawings
Fig. 1 is the schematic diagram of a kind of authentication system provided by the invention;
Fig. 2 shows a kind of structured flowchart of terminal device;
Fig. 3 shows a kind of structured flowchart of server;
The flow chart of the auth method that Fig. 4 provides for first embodiment of the invention;
The flow chart of the auth method that Fig. 5 provides for second embodiment of the invention;
The flow chart of the auth method that Fig. 6 provides for third embodiment of the invention;
The flow chart of the auth method that Fig. 7 provides for fourth embodiment of the invention;
The flow chart of the auth method that Fig. 8 provides for fifth embodiment of the invention;
The flow chart of the auth method that Fig. 9 provides for sixth embodiment of the invention;
The structural representation of the authentication means that Figure 10 provides for seventh embodiment of the invention;
The structural representation of the authentication means that Figure 11 provides for eighth embodiment of the invention;
Figure 12 shows for the structure of the authentication means that ninth embodiment of the invention and the tenth embodiment provideIntention.
Detailed description of the invention
Technological means and the merit taked for realizing predetermined goal of the invention for further setting forth the present inventionEffect, below in conjunction with accompanying drawing and preferred embodiment, to according to the specific embodiment of the present invention, structure,Feature and effect thereof, be described in detail as follows.
The schematic diagram of the authentication system that Fig. 1 provides for the embodiment of the present invention. As shown in Figure 1,This authentication system comprises: terminal device 100 and server 200. Terminal device 100 and server200 are arranged in wireless network or cable network, carry out data friendship by this wireless network or cable networkMutually. In server 200, preset facial feature database, this facial feature database is used for storing endThe account number of end equipment and corresponding user preset thereof for the preset facial image of authentication or from thisThe face characteristic parameter of extracting in preset facial image. Understandably, facial feature database also canBe configured in other servers.
Terminal device 100 can comprise the smart mobile phone that is equipped with camera head to have camera function, flatPlate computer, E-book reader, MP3 player (MovingPictureExpertsGroupAudioLayerIII, dynamic image expert compression standard audio frequency aspect 3), MP4 (MovingPictureExpertsGroupAudioLayerIV, dynamic image expert compression standard audio frequency aspect 4) player, above-kneeType pocket computer, desktop computer computer, vehicle-mounted computer, all-in-one etc.
Terminal device 100, for sending Business Processing request to server 200; Server 200, usesIn in the time receiving this Business Processing request, at least one first acquisition parameters is handed down to terminal device100; Terminal device 100, also for receiving this first acquisition parameters issuing, controls filming apparatus and pressesFacial image according to this first shooting parameter acquisition for the user of authentication, and return to server200; Server 200, also for receiving this facial image returning, by the second count of this facial imageTake the photograph parameter and mate with this first acquisition parameters, this facial image and preset facial image are entered simultaneouslyRow coupling, and determine that according to matching result whether this user is by this authentication.
Supposing to pay this application scenarios is example, and server is receiving the payment of smart mobile phone transmissionWhen request, by one group of first acquisition parameters (be assumed to little f-number, open white balance, high-resolution)Be handed down to smart mobile phone, make smart mobile phone call preset recognition of face routine interface control cameraAccording to little f-number, unlatching white balance, high-resolution acquisition user's facial image. Server receivesSmart mobile phone send this facial image, by the second acquisition parameters of this facial image with issue firstAcquisition parameters mates, to judge this facial image and little f-number, to open white balance, high-resolutionThe matching degree that rate etc. require, simultaneously by the preset face in this facial image and facial feature databaseImage mates, and obtains the matching degree of the two, then according to this matching degree and this facial imageWhether with the matching degree of this preset facial image, comprehensively passing judgment on this user can be by authentication.
Fig. 2 shows a kind of structured flowchart of terminal device. As shown in Figure 2, terminal device 100 wrapsDraw together memory 102, storage control 104, one or more (only illustrating one in figure) processor 106,Peripheral Interface 108, radio-frequency module 110, locating module 112, photographing module 114, audio-frequency module 116,Display screen 118 and key-press module 120. These assemblies are by one or more communication bus/signalThe mutual communication of line 122.
Understandable, the structure shown in Fig. 2 is only signal, and terminal device 100 also can comprise and compares Fig. 2Shown in more or assembly still less, or have and configurations different shown in Fig. 2. Institute in Fig. 2The each assembly showing can adopt hardware, software or its combination to realize.
Memory 102 can be used for storing software program and module, as the identity in the embodiment of the present inventionVerification method, programmed instruction/module that Apparatus and system is corresponding, processor 102 is stored in by operationSoftware program in memory 104 and module, thus various function application and data processing carried out,Realize above-mentioned auth method.
Memory 102 can comprise high speed random access memory, also can comprise nonvolatile memory, as oneIndividual or multiple magnetic storage devices, flash memory or other non-volatile solid state memories. At someIn example, memory 102 can further comprise the memory with respect to processor 106 long-range settings,These remote memories can be connected to terminal device 100 by network. The example of above-mentioned network comprise butBe not limited to internet, intranet, LAN, mobile radio communication and combination thereof. Processor 106And other possible assemblies can enter the access of memory 102 under the control of storage control 104OK.
Various input/output devices are coupled to CPU and memory 102 by Peripheral Interface 108. ProcessVarious softwares in device 106 run memories 102, instruction are to carry out the various merits of terminal device 100Can and carry out data processing.
In certain embodiments, Peripheral Interface 108, processor 106 and storage control 104 canIn one single chip, realize. In some other example, they can be respectively realized by chip independently.
Radio-frequency module 110, for receiving and sending electromagnetic wave, is realized the mutual of electromagnetic wave and the signal of telecommunicationConversion, thus carry out communication with communication network or other equipment. Radio-frequency module 110 can comprise variousExisting for carrying out the component of these functions, for example, antenna, RF transceiver, numeral letterNumber processor, encrypt/decrypt chip, subscriber identity module (SIM) card, memory etc. Radio frequencyModule 110 can be carried out communication or logical as internet, intranet, wireless network with diverse networkCross wireless network and other equipment carries out communication. Above-mentioned wireless network can comprise cellular telephone networks,WLAN or Metropolitan Area Network (MAN). Above-mentioned wireless network can use various communication standards, agreement andTechnology, includes, but are not limited to global system for mobile communications (GlobalSystemforMobileCommunication, GSM), enhancement mode mobile communication technology (EnhancedDataGSMEnvironment, EDGE), Wideband CDMA Technology (widebandcodedivisionmultipleAccess, W-CDMA), CDMA (Codedivisionaccess, CDMA), time-division are manyLocation technology (timedivisionmultipleaccess, TDMA), bluetooth, adopting wireless fidelity technology (Wireless,Fidelity, WiFi) (as the standard IEEE 802.11a of IEEE-USA, IEEE802.11b, IEEE802.11g and/or IEEE802.11n), the networking telephone (VoiceoverinternetProtocal, VoIP), worldwide interoperability for microwave access (WorldwideInteroperabilityforMicrowaveAccess, Wi-Max), other agreements for mail, instant messaging and short message, and anyThe communications protocol that other are suitable, even can comprise those current agreements being developed not yet.
Locating module 112 is for obtaining the current location of terminal device 100. The reality of locating module 112Example includes but not limited to GPS (GPS), based on WLAN or mobile communicationThe location technology of net.
Photographing module 114 is for taking pictures or video. Photo or the video taken can be storedTo memory 102, and can send by radio-frequency module 110.
Audio-frequency module 116 provides COBBAIF to user, and it can comprise one or more microphones,Individual or multiple loudspeakers and voicefrequency circuit. Voicefrequency circuit receives sound number from Peripheral Interface 108According to, voice data is converted to telecommunications breath, telecommunications breath is transferred to loudspeaker. Loudspeaker ceases telecommunicationsChange the sound wave that can hear into people's ear. Voicefrequency circuit also receives telecommunications breath from microphone, by the signal of telecommunicationBe converted to voice data, and by data transmission in network telephony in Peripheral Interface 108 further to locateReason. Voice data can obtain from memory 102 or by radio-frequency module 110. In addition sound,Audio data also can be stored in memory 102 or by radio-frequency module 110 and send. OneIn a little examples, audio-frequency module 116 also can comprise that an earphone broadcasts hole, for establishing to earphone or otherThe standby COBBAIF that provides.
Display screen 118 provides an output interface between terminal device 100 and user. Particularly,Display screen 118 is to the output of user's display video, and the content of these video outputs can comprise word, figureShape, video and any combination thereof. Some Output rusults are corresponding to some user interface object. EnterOne step ground, display screen 118 also can provide an inputting interface between terminal device 100 and user,For receiving user's input, such as user's the gesture operation such as click, slip, so that user interfaceObject is made response to these users' input. The technology that detects user input can be based on resistance-type,Condenser type or other any possible touch control detection technology. The instantiation of display screen 118 comprisesBut be not limited to liquid crystal display or light emitting polymer display.
The interface that key-press module 120 provides user to input to terminal device 100 equally, Yong HukeWith by pressing different buttons so that terminal device 100 is carried out different functions.
Fig. 3 shows a kind of structured flowchart of server. As shown in Figure 3, server 200 comprises:Memory 201, processor 202 and mixed-media network modules mixed-media 203.
Be appreciated that the structure shown in Fig. 3 is only signal, server 200 also can comprise than in Fig. 2Shown in more or assembly still less, or have and configurations different shown in Fig. 3. Shown in Fig. 3Each assembly can adopt hardware, software or its combination to realize. In addition, the clothes in the embodiment of the present inventionBusiness device can also comprise the server of multiple concrete difference in functionalitys.
Memory 201 can be used for storing software program and module, as the identity in the embodiment of the present inventionVerification method, programmed instruction/module that Apparatus and system is corresponding, processor 202 is stored in by operationSoftware program in memory 201 and module, thus various function application and data processing carried out,Realize the auth method in the embodiment of the present invention. Memory 201 can comprise random storage at a high speedDevice, also can comprise nonvolatile memory, as one or more magnetic storage device, flash memory orOther non-volatile solid state memories of person. In some instances, memory 201 can further comprise phaseFor the memory of processor 202 long-range settings, these remote memories can be connected to by networkServer 200. Further, above-mentioned software program and module also can comprise: service module 221 withAnd operating system 222. Wherein operating system 222, for example, can be LINUX, UNIX, WINDOWS,It can comprise various for example, for management system task (memory management, memory device control, power supply pipeReason etc.) component software and/or driving, and can with various hardware or the mutual communication of component software, therebyThe running environment of other component softwares is provided. Service module 221 operates in the basis of operating system 222Upper, and the request of monitoring automatic network by the network service of operating system 222, complete according to requestCorresponding data processing, and return to result to client. That is to say service module 221 useIn providing services on the Internet to client.
Mixed-media network modules mixed-media 203 is for receiving and send network signal. Above-mentioned network signal can comprise wirelessSignal or wire signal. In an example, above-mentioned network signal is cable network signal. Now,Mixed-media network modules mixed-media 203 can comprise the elements such as processor, random access memory, converter, crystal oscillator.
The first embodiment
The flow chart of the auth method that Fig. 4 provides for first embodiment of the invention. The present embodiment is carriedThe auth method of confession can, by the server 200 shown in Fig. 1, be realized the identity based on recognition of faceChecking. As shown in Figure 4, the method comprises:
Step S11, when receive terminal device send Business Processing request time, by least one firstAcquisition parameters is handed down to this terminal device, makes this terminal device control filming apparatus according to this first countTake the photograph the facial image of parameter acquisition for the user of authentication;
The Business Processing request that server 200 receiving terminal apparatus 100 send, this Business Processing requestIn can comprise: the account number of the service identification of pending business and terminal device 100. Wherein, terminalThe account number of equipment 100 is preferably user's account of application client preset in terminal device 100Number, for example: instant messaging application client (as micro-letter client), financial applications clientThe user of end (as Alipay client) logins account number.
Particularly, terminal device 100 sends to the Business Processing request of server 200 to can be used for to clothesPreset sensitive traffic is processed in 200 requests of business device. This preset sensitive traffic is owing to relating to individual subscriberPrivacy or property safety are (for example: login, E-Payment, password amendment, transfer virtual unit, realityThing or virtual assets consumption etc.), need to carry out authentication to terminal device 100, and only have when wholeEnd equipment 100 identity verifications by time, server 200 just can process with this Business Processing request in wrapBusiness corresponding to service identification containing.
In the time of Business Processing request that receiving terminal apparatus 100 sends, server 200 confirms that identity testsCard task is triggered, and at least one first acquisition parameters is handed down to terminal device 100, and terminal is establishedStandby 100 control filming apparatus tests for identity according to this at least one the first shooting parameter acquisition issuingThe user's of card facial image.
In order to promote the shooting effect and the function of expanding camera head of camera head, camera head is generalAll possess and have many kinds of parameters, facilitate software and user to take as required different characteristics and different-stylePicture. This acquisition parameters specifically can be, but not limited to comprise: resolution ratio, f-number, white balance,Speed (InternationalStandardsOrganization, ISO), BLC etc. Can manageXie Di, the facial image collecting under different acquisition parameters has different features, such as: apertureBe worth when smaller, picture is brighter, otherwise picture is darker; When resolution ratio is smaller, pictureDefinition is lower, otherwise definition is higher.
In the present embodiment, in server 200, can preset multiple alternative acquisition parameters, when receivingWhen Business Processing request that terminal device 100 sends, server 200 is from preset alternative acquisition parametersIn random determine at least one acquisition parameters, be handed down to terminal device 100 as the first acquisition parameters. ItsIn alternative acquisition parameters can be the existing or following camera head that may exist the primary institute havingHaving the set of acquisition parameters, can be also the set of multiple appointment acquisition parameters of user preset, firstAcquisition parameters can be one or more in random this alternative acquisition parameters determined of server 200With any combination of acquisition parameters.
In other embodiment, the first acquisition parameters is also corresponding with the model of terminal device 100One or more acquisition parameters.
Step S12, receives this facial image that this terminal device sends, by the shooting ginseng of this facial imageNumber mates with the acquisition parameters issuing before, this facial image and preset facial image is entered simultaneouslyRow coupling;
In server 200, preset facial feature database, this facial feature database is used for storing endThe account number of end equipment and corresponding user preset thereof for the preset facial image of authentication or from thisThe face characteristic parameter of extracting in preset facial image. Understandably, facial feature database also canBe configured in other servers.
The first acquisition parameters that terminal device 100 reception servers 200 issue, preset by callingRecognition of face API (ApplicationProgrammingInterface, application programming interface) refers toMake camera head according to this first shooting parameter acquisition user's facial image, and by this face gatheringImage sends to server 200.
Server 200 extract on the one hand this facial image that terminal device 100 sends with this first countTake the photograph the second acquisition parameters corresponding to parameter, this second acquisition parameters and this first acquisition parameters are compared, obtain the absolute value of the difference of the two. Extract on the other hand the face characteristic ginseng in this facial imageNumber, and the terminal device 100 comprising in this Business Processing request sending according to terminal device 100Account number is searched the face in the preset facial image corresponding with account from this facial feature databaseCharacteristic parameter, then will store in the face characteristic parameter in this facial image and facial feature databaseThis preset facial image in face characteristic parameter mate, obtain the matching degree of the two.
Step S13, determines that according to matching result whether this user is by this authentication.
The second acquisition parameters in the facial image that server 200 integrated terminal equipment 100 send with underFace characteristic parameter in absolute value and the facial image of the difference of the first acquisition parameters of sending out and presetThe matching degree of the face characteristic parameter in facial image, according to preset algorithm, calculates acquisition and is used for commentingSentence this user's the whether legal reference value of identity, and determine in the time that this reference value is greater than preset threshold valueThis user is by authentication.
The auth method that the embodiment of the present invention provides, utilizes to collect under different acquisition parametersFacial image has this characteristic of different features, receives the business that terminal device sends each timeWhile processing request, at least one first acquisition parameters is handed down to this terminal device, receives this terminal and establishPreparation send according to this first facial image of user of taking parameter acquisition, by the of this facial imageTwo acquisition parameters mate with this first acquisition parameters, simultaneously by this facial image and preset face figurePicture mates; Determine that according to matching result this user, whether by this authentication, has realized backstageThe mutual interlock of server and front end recognition of face software, has changed traditional background server one-sidedReceiving terminal apparatus face recognition result and easily by malicious user by cheating modes such as photos, videoThe situation of deception, has made up current face recognition algorithms existing limitation in antagonism cheating, fromAnd can not increase extra hardware supported and increase under the prerequisite of hardware use cost, improve based on peopleThe security of the authentication of face identification.
The second embodiment
The flow chart of the auth method that Fig. 5 provides for second embodiment of the invention. The present embodiment is carriedThe auth method of confession can, by the server 200 shown in Fig. 1, be realized the identity based on recognition of faceChecking. As shown in Figure 5, the method comprises:
Step S21, in the time receiving the Business Processing request of terminal device transmission, from alternative acquisition parametersIn random determine at least one acquisition parameters, be handed down to this terminal device as the first acquisition parameters, makeMust this terminal device control filming apparatus first take the user of parameter acquisition for authentication according to thisFacial image;
In this Business Processing request, can comprise: the service identification of pending business and terminal device 100Account number. Wherein, the account number of terminal device 100 is preferably application preset in terminal device 100The user account of program client, for example: instant messaging application client (as micro-letter client),The user of financial applications client (as Alipay client) logins account number.
Particularly, terminal device 100 sends to the Business Processing request of server 200 to can be used for to clothesPreset sensitive traffic is processed in 200 requests of business device. This preset sensitive traffic is owing to relating to individual subscriberPrivacy or property safety are (for example: login, E-Payment, password amendment, transfer virtual unit, realityThing or virtual assets consumption etc.), need to carry out authentication to terminal device 100, and only have when wholeEnd equipment 100 identity verifications by time, server 200 just can process with this Business Processing request in wrapBusiness corresponding to service identification containing.
In order to promote the shooting effect and the function of expanding camera head of camera head, camera head is generalAll possess and have many kinds of parameters, facilitate software and user to take as required different characteristics and different-stylePicture. This acquisition parameters specifically can be, but not limited to comprise: resolution ratio, f-number, white balance,Speed, BLC etc. Understandably, the face figure collecting under different acquisition parametersPicture has different features, such as: when f-number is smaller, picture is brighter, on the contrary pictureDarker; When resolution ratio is smaller, image sharpness is lower, otherwise definition is higher.
In the present embodiment, in server 200, can preset acquisition parameters database, many for storingIndividual alternative acquisition parameters and each self-corresponding value thereof, when the business place that receives terminal device 100 and sendWhen reason request, multiple these alternative bats that server 200 is stored from this preset acquisition parameters databaseTake the photograph random definite at least one acquisition parameters in parameter, be handed down to terminal device as the first acquisition parameters100, make terminal device 100 control filming apparatus according to this at least one first acquisition parameters issuingGather the facial image for the user of authentication. Wherein alternative acquisition parameters can be existing orThe set of the following primary all acquisition parameters that have of camera head institute that may exist can be also useThe set of multiple appointment acquisition parameters that preset at family, the first acquisition parameters can be this alternative acquisition parametersIn any combination of one or more different acquisition parameters.
Wherein, the method for definite this first acquisition parameters further can comprise the following steps at random:
The first step: issue this first acquisition parameters to terminal device 100 while judging last authenticationTime and the difference of current system time whether be less than preset numerical value;
Particularly, server 200 obtains and last the user of terminal device 100 is carried out to authenticationTime issue time from this first acquisition parameters to terminal device 100 (be referred to as below: the last time issuesThis first acquisition parameters time), and itself and current system time are compared, to judge the poor of the twoWhether value is less than preset numerical value. Understandably, no matter whether be proved to be successful, as long as server 200Receive the facial image that terminal device 100 sends, be just considered as having carried out an authentication.
Second step: if not, determine at least one and last identity at random from alternative acquisition parametersThis first count that the unduplicated acquisition parameters of this issuing when checking the first acquisition parameters issues as thisTake the photograph parameter;
If 200 last times of server issue the difference of this first acquisition parameters time and current system timeBe more than or equal to preset value, be handed down to the acquisition parameters of terminal device 100 according to the last time, fromIn preset alternative acquisition parameters, determine at random that at least one and the last acquisition parameters issuing do not repeatThis first acquisition parameters of issuing as this of acquisition parameters.
The 3rd step: if so, random definite at least one acquisition parameters conduct from alternative acquisition parametersThis first acquisition parameters.
If 200 last times of server issue the difference of this first acquisition parameters time and current system timeBe less than this preset value, from alternative acquisition parameters, determine at random that at least one acquisition parameters is as treatingThis issuing the first acquisition parameters.
Understandably, the quantity of this issuing each time the first acquisition parameters can be fixed, clothesBusiness device 200 can be determined and from alternative acquisition parameters, determine how many acquisition parameters according to the quantity of specifyingAs the first acquisition parameters. The quantity of this preferably, issuing each time the first acquisition parameters is dynamicChange, server 200 can in preset number range, determine at random that this issues this firstThe quantity of acquisition parameters.
For instance, suppose when the last time is carried out authentication to the user of terminal device 100 serviceThe time that device 200 issues the first acquisition parameters to terminal device 100 is 8:20, and preset value is 5 pointsClock, alternative acquisition parameters comprises: resolution ratio, f-number, white balance, speed, BLC,The first acquisition parameters that last time issues is: resolution ratio and f-number.
In the time receiving the Business Processing request that terminal device 100 sends, server 200 obtains currentSystem time, and judgement is last issues this first acquisition parameters time 8:20 and current system timeWhether the time interval is less than 5 minutes.
If the current system time is 8:22, due to the last time issue this first acquisition parameters time 8:20 withThe time interval of current system time 8:22 is within 2 minutes, to be less than preset 5 minutes, server 200From alternative acquisition parameters, the random acquisition parameters of determining at least one non-resolution ratio and f-number is as theOne acquisition parameters (as: speed, BLC) is handed down to terminal device 100.
If the current system time is 9:00, due to the last time issue this first acquisition parameters time 8:20 withThe time interval of current system time 9:00 is within 60 minutes, to be greater than preset 5 minutes, server 200From alternative acquisition parameters, random definite at least one acquisition parameters is as the first acquisition parameters, and this is first years oldIn acquisition parameters, can comprise acquisition parameters (as: f-number, speed, backlight that the last time issuesCompensation) be handed down to terminal device 100.
Like this, in the time that the time interval of twice authentication is less than preset numerical value, be terminal device100 issue not the first acquisition parameters repeating with the acquisition parameters issuing for the first time, realize and dynamically issue theOne acquisition parameters, can effectively reduce malicious user by clap again validated user according to different acquisition parametersThe mode that facial image carrys out repeated authentication cracks the possibility of authentication, thereby improves authenticationSecurity.
Step S22, receives this facial image that this terminal device sends, and extracts in this facial image and is somebody's turn to doThe second acquisition parameters that the first acquisition parameters is corresponding, calculates respectively this second acquisition parameters and this first one by oneThe absolute value of the difference of acquisition parameters;
The first acquisition parameters that terminal device 100 reception servers 200 issue, preset by callingRecognition of face API instruction camera head is according to this first facial image of taking parameter acquisition user, andThis facial image gathering is sent to server 200. Server 200 extracts terminal device 100 and sendsThis facial image in second acquisition parameters corresponding with this first acquisition parameters, calculate one by one respectively thisThe absolute value of the difference of two acquisition parameters and this first acquisition parameters.
Step S23, extract the face characteristic parameter in this facial image simultaneously, by this facial imageFace characteristic ginseng in this preset facial image of storing in face characteristic parameter and facial feature databaseNumber mates, and obtains the matching degree of the two;
In server 200, preset facial feature database, this facial feature database is used for storing endThe account number of end equipment and corresponding user preset thereof for the preset facial image of authentication or from thisThe face characteristic parameter of extracting in preset facial image. Understandably, facial feature database also canBe configured in other servers. This Business Processing that server 200 sends according to terminal device 100 pleaseThe account number of the terminal device 100 comprising in asking is searched and account pair from this facial feature databaseFace characteristic parameter in the preset facial image of answering, by the facial image sending from terminal device 100The face characteristic parameter of middle extraction is mated with the face characteristic parameter in this preset facial image, obtainsGet the matching degree of the two.
Step S24, from weights database lookup first weights corresponding with the absolute value of each this difference respectivelyAnd second weights corresponding with this matching degree;
In server 200, can preset weights database, wherein store the first different acquisition parametersWith absolute value and each self-corresponding weights thereof of the difference of the second acquisition parameters, and different face characteristicThe matching degree of parameter and corresponding weights thereof. Wherein the absolute value of this difference is larger, and these first weights moreLittle, this matching degree is less, and these second weights are less.
Step S25, absolute value to each this difference, each these first weights, this matching degree and this secondWeights are weighted summation, and the value obtaining after weighted sum and preset threshold value are compared;
Server 200 is according to preset algorithm, absolute value to each this difference, respectively these first weights,This matching degree and this second weights are weighted summation, in the hope of for the identity of passing judgment on this user beingNo legal reference value, and by this reference value and preset preset comparing.
Step S26, in the time that the value obtaining after this weighted sum is greater than this preset threshold value, determines this userBy this authentication.
In the time that this reference value obtaining after this weighted sum is greater than this preset threshold value, determine that this user is logicalCross this authentication; When this reference value obtaining after this weighted sum is less than or equal to this preset threshold valueTime, determine that this user is not by this authentication.
For instance, suppose that the first acquisition parameters issuing comprises: f-number F1, parameter value is V1;Speed ISO1, parameter value is V2, second in the facial image that terminal device 100 sends taken ginsengNumber comprises: f-number F2, and parameter value is V3; Speed ISO2, parameter value is V4. This face figureFace in this preset facial image of storing in face characteristic parameter in picture and facial feature databaseThe matching degree of characteristic parameter is M, and this preset threshold value is T. Server 200 calculates respectively f-numberThe absolute value of the difference of F1 and f-number F2 | V1-V3|, speed ISO1 and speed ISO2's is poorThe absolute value of value | V2-V4|. Obtain by searching this weights database: | weights Q1 that V1-V3| is corresponding,| the weights Q3 that the weights Q2 that V2-V4| is corresponding and matching degree M are corresponding, then does weighted sum fortuneCalculation S=(| V1-V3|*Q1+|V2-V4|*Q2+M*Q3), the value of S and T are compared, as S >When T, determine that the user of terminal device 100, by authentication, in the time of S≤T, determines terminal device100 user is by authentication.
If determine, the user of user terminal 100 is by authentication, and server 200 is according to receptionService identification in Business Processing request is processed corresponding business. If determine, this user does not test by identityCard, server 200 refusals are processed business corresponding to service identification. Further, server 200Also can during not by authentication, send information to user terminal 100 definite this user, withThe subscriber authentication failure of reminding subscriber terminal 100.
The auth method that the embodiment of the present invention provides, utilizes to collect under different acquisition parametersFacial image has this characteristic of different features, receives the business that terminal device sends each timeWhile processing request, at least one first acquisition parameters is handed down to this terminal device, receives this terminal and establishPreparation send according to this first facial image of user of taking parameter acquisition, by the of this facial imageTwo acquisition parameters mate with this first acquisition parameters, simultaneously by this facial image and preset face figurePicture mates; Determine that according to matching result this user, whether by this authentication, has realized backstageThe mutual interlock of server and front end recognition of face software, has changed traditional background server one-sidedReceiving terminal apparatus face recognition result and easily by malicious user by cheating modes such as photos, videoThe situation of deception, has made up current face recognition algorithms existing limitation in antagonism cheating, fromAnd can not increase extra hardware supported and increase under the prerequisite of hardware use cost, improve based on peopleThe security of the authentication of face identification. In addition determine at least by random from alternative acquisition parameters,An acquisition parameters, as the first acquisition parameters, can be realized acquisition parameters ground and dynamically issue, and improves maliceUser cracks the difficulty of acquisition parameters, further improves the security of checking.
The 3rd embodiment
The flow chart of the auth method that Fig. 6 provides for third embodiment of the invention. The present embodiment is carriedThe auth method of confession can, by the server 200 shown in Fig. 1, be realized the identity based on recognition of faceChecking. As shown in Figure 6, the method comprises:
Step S31, in the time receiving the Business Processing request of terminal device transmission, obtains this terminal deviceModel, obtain at least one corresponding acquisition parameters according to this model, under the first acquisition parametersIssue this terminal device, make this terminal device control filming apparatus according to this first shooting parameter acquisitionBe used for the user's of authentication facial image;
In the Business Processing request that terminal device 100 sends, can comprise: the service identification of pending businessAnd the account number of terminal device 100. Wherein, the account number of terminal device 100 is preferably terminal deviceThe user account of preset application client in 100, for example: instant messaging application clientThe user of (as micro-letter client), financial applications client (as Alipay client) logins accountNumber. This Business Processing request can be used for processing preset sensitive traffic to server 200 requests. This is pre-The sensitive traffic of putting due to relate to individual subscriber privacy or property safety (for example: login, pay by mails,Password amendment, transfer virtual unit, material object or virtual assets consumption etc.), need to be to terminal device 100Carry out authentication, and only have in the time that terminal device 100 identity verifications pass through just meeting of server 200Process the business corresponding with the service identification comprising in this Business Processing request.
In order to promote the shooting effect and the function of expanding camera head of camera head, camera head is generalAll possess and have many kinds of parameters, facilitate software and user to take as required different characteristics and different-stylePicture. This acquisition parameters specifically can be, but not limited to comprise: resolution ratio, f-number, white balance,Speed, BLC etc. Understandably, the face figure collecting under different acquisition parametersPicture has different features, such as: when f-number is smaller, picture is brighter, on the contrary pictureDarker; When resolution ratio is smaller, image sharpness is lower, otherwise definition is higher.
In server 200, preset acquisition parameters database, can be used for storing the model of each terminal device,At least one acquisition parameters that this model is corresponding, and the each self-corresponding value of each acquisition parameters. Can manageXie Di, this acquisition parameters database also can be deployed in other servers.
In the time receiving the Business Processing request that terminal device 100 sends, server 200 is confirmed identityValidation task is triggered, and is used to indicate terminal device 100 reports its model to terminal device 100 transmissionsReport instruction, receiving terminal apparatus 100 reports the type of the terminal device 100 that instruction returns according to thisNumber, from this acquisition parameters database, search the acquisition parameters corresponding with this model according to this model, andThis acquisition parameters finding is handed down to terminal device 100 as the first acquisition parameters. Be eventually like thisEnd equipment 100 issues the acquisition parameters corresponding with the model of terminal device 100, can prevent because taking ginsengCount the authentication failure of not mating with the model of terminal device 100 and cause, improve the suitable of this methodBy property, make simultaneously malicious user only understand validated user use terminal device model beforePut and just may crack authentication, thereby strengthened the difficulty that cracks of authentication, can improve identityThe security of checking.
For further improving the security of authentication, server 200 further can be by from this shootingThe all acquisition parameters corresponding with this model that find in parameter database are as alternative acquisition parameters,And therefrom determine at random that at least one acquisition parameters is handed down to terminal device 100 as the first acquisition parameters.Wherein random method and the second embodiment that determines at least one acquisition parameters from this alternative acquisition parametersSimilar, repeat no more herein.
Step S32, receives this facial image that this terminal device sends, and extracts in this facial image and is somebody's turn to doThe second acquisition parameters that the first acquisition parameters is corresponding, calculates respectively this second acquisition parameters and this first one by oneThe absolute value of the difference of acquisition parameters;
Step S33, extract the face characteristic parameter in this facial image simultaneously, by this facial imageFace characteristic ginseng in this preset facial image of storing in face characteristic parameter and facial feature databaseNumber mates, and obtains the matching degree of the two;
Step S34, from weights database lookup first weights corresponding with the absolute value of each this difference respectivelyAnd second weights corresponding with this matching degree;
Step S35, absolute value to each this difference, each these first weights, this matching degree and this secondWeights are weighted summation, and the value obtaining after weighted sum and preset threshold value are compared;
Step S36, in the time that the value obtaining after this weighted sum is greater than this preset threshold value, determines this userBy this authentication.
Step S32 to step S36 can be with reference to the step S22 in the second embodiment to step S26Hold, repeat no more herein.
The auth method that the embodiment of the present invention provides, utilizes to collect under different acquisition parametersFacial image has this characteristic of different features, receives the business that terminal device sends each timeWhile processing request, at least one first acquisition parameters is handed down to this terminal device, receives this terminal and establishPreparation send according to this first facial image of user of taking parameter acquisition, by the of this facial imageTwo acquisition parameters mate with this first acquisition parameters, simultaneously by this facial image and preset face figurePicture mates; Determine that according to matching result this user, whether by this authentication, has realized backstageThe mutual interlock of server and front end recognition of face software, has changed traditional background server one-sidedReceiving terminal apparatus face recognition result and easily by malicious user by cheating modes such as photos, videoThe situation of deception, has made up current face recognition algorithms existing limitation in antagonism cheating, fromAnd can not increase extra hardware supported and increase under the prerequisite of hardware use cost, improve based on peopleThe security of the authentication of face identification.
The 4th embodiment
The flow chart of the auth method that Fig. 7 provides for fourth embodiment of the invention. The present embodiment is carriedThe auth method of confession can, by the terminal device 100 shown in Fig. 1, be realized the body based on recognition of facePart checking. As shown in Figure 7, the method comprises:
Step S401, sends Business Processing request to server;
In this Business Processing request, can comprise: the service identification of pending business and terminal device 100Account number. Wherein, the account number of terminal device 100 is preferably application preset in terminal device 100The user account of program client, for example: instant messaging application client (as micro-letter client),The user of financial applications client (as Alipay client) logins account number.
Particularly, terminal device 100 sends to the Business Processing request of server 200 to can be used for to clothesPreset sensitive traffic is processed in 200 requests of business device. This preset sensitive traffic is owing to relating to individual subscriberPrivacy or property safety are (for example: login, E-Payment, password amendment, transfer virtual unit, realityThing or virtual assets consumption etc.), need to carry out authentication to terminal device 100, and only have when wholeEnd equipment 100 identity verifications by time, server 200 just can process with this Business Processing request in wrapBusiness corresponding to service identification containing.
Step S403, receives at least one first acquisition parameters that this server issues;
Understandably, in order to promote the shooting effect and the function of expanding camera head of camera head,Camera head generally all possesses and has many kinds of parameters, facilitates software and user to take as required Bu Tong specialThe picture of point and different-style. This acquisition parameters specifically can be, but not limited to comprise: resolution ratio, apertureValue, white balance, speed, BLC etc. Understandably, under different acquisition parameters, adoptCollection to facial image there is different features, such as: when f-number is smaller, picture is brighter,Otherwise picture is darker; When resolution ratio is smaller, image sharpness is lower, on the contrary definitionHigher.
Step S405, controls filming apparatus is used for authentication use according to this first shooting parameter acquisitionThe facial image at family, and send to this server, so that this server is by the second count of this facial imageTake the photograph parameter and mate with this first acquisition parameters, this facial image and preset facial image are entered simultaneouslyRow coupling, and determine that according to matching result whether this user is by this authentication.
Terminal device 100 calls preset recognition of face API, according to this first acquisition parameters pair issuingThe corresponding acquisition parameters of configuration camera head is configured, and receives the shooting instruction that user triggers, and controlsThis filming apparatus takes according to this first acquisition parameters the picture that this shooting instruction is pointed to, to gather this useThe facial image at family, the transmission instruction then triggering according to this user sends this facial image gatheringGive server 200.
The auth method that the embodiment of the present invention provides, utilizes to collect under different acquisition parametersFacial image has this characteristic of different features, after the Business Processing request sending each time, and rootThis first shooting parameter acquisition of at least one issuing according to server the first acquisition parameters control filming apparatusUser's facial image, sends to this server by this facial image, so that this server can be according to thisThe second acquisition parameters of facial image and the matching result of this first acquisition parameters, and this facial imageWith the matching result of preset facial image, determine that whether this user is by this authentication, after having realizedThe mutual interlock of station server and front end recognition of face software, has changed traditional background server folk prescriptionFace receiving terminal apparatus face recognition result and easily by malicious user by cheating sides such as photos, videoThe situation of formula deception, has made up current face recognition algorithms existing limitation in antagonism cheating,Thereby can not increase extra hardware supported and increase under the prerequisite of hardware use cost, improve based onThe security of the authentication of recognition of face.
The 5th embodiment
The flow chart of the auth method that Fig. 8 provides for fifth embodiment of the invention. The present embodiment is carriedThe auth method of confession can, by the terminal device 100 shown in Fig. 1, be realized the body based on recognition of facePart checking. As shown in Figure 8, different from the 4th embodiment, at step S401 and step S403Between also comprise:
Step S502, receives the instruction that reports of this server transmission, reports instruction, by terminal according to thisThe model of equipment reports this server, so that this server obtains at least one of correspondence according to this modelIndividual acquisition parameters is as this first acquisition parameters.
The auth method that the embodiment of the present invention provides, utilizes to collect under different acquisition parametersFacial image has this characteristic of different features, after the Business Processing request sending each time, and rootThis first shooting parameter acquisition of at least one issuing according to server the first acquisition parameters control filming apparatusUser's facial image, sends to this server by this facial image, so that this server can be according to thisThe second acquisition parameters of facial image and the matching result of this first acquisition parameters, and this facial imageWith the matching result of preset facial image, determine that whether this user is by this authentication, after having realizedThe mutual interlock of station server and front end recognition of face software, has changed traditional background server folk prescriptionFace receiving terminal apparatus face recognition result and easily by malicious user by cheating sides such as photos, videoThe situation of formula deception, has made up current face recognition algorithms existing limitation in antagonism cheating,Thereby can not increase extra hardware supported and increase under the prerequisite of hardware use cost, improve based onThe security of the authentication of recognition of face.
The 6th embodiment
The flow chart of the auth method that Fig. 9 provides for sixth embodiment of the invention. The present embodiment is carriedThe auth method of confession can be by the terminal device 100 and server 200 shown in Fig. 1, realize based onThe authentication of recognition of face. As shown in Figure 9, the method comprises:
Step S61, terminal device sends Business Processing request to server;
In this Business Processing request, can comprise: the service identification of pending business and terminal device 100Account number. Wherein, the account number of terminal device 100 is preferably application preset in terminal device 100The user account of program client, for example: instant messaging application client (as micro-letter client),The user of financial applications client (as Alipay client) logins account number.
Particularly, terminal device 100 sends to the Business Processing request of server 200 to can be used for to clothesPreset sensitive traffic is processed in 200 requests of business device. This preset sensitive traffic is owing to relating to individual subscriberPrivacy or property safety are (for example: login, E-Payment, password amendment, transfer virtual unit, realityThing or virtual assets consumption etc.), need to carry out authentication to terminal device 100, and only have when wholeEnd equipment 100 identity verifications by time, server 200 just can process with this Business Processing request in wrapBusiness corresponding to service identification containing.
Step S62, in the time receiving this Business Processing request, this server is by least one the first shootingParameter is handed down to this terminal device;
In the time receiving this Business Processing request, server 200 confirms that authentication task is triggered,At least one first acquisition parameters is handed down to terminal device 100, terminal device 100 is controlled and takenDevice is the face for the user of authentication according to this at least one the first shooting parameter acquisition issuingImage.
In order to promote the shooting effect and the function of expanding camera head of camera head, camera head is generalAll possess and have many kinds of parameters, facilitate software and user to take as required different characteristics and different-stylePicture. This acquisition parameters specifically can be, but not limited to comprise: resolution ratio, f-number, white balance,Speed, BLC etc. Understandably, the face figure collecting under different acquisition parametersPicture has different features, such as: when f-number is smaller, picture is brighter, on the contrary pictureDarker; When resolution ratio is smaller, image sharpness is lower, otherwise definition is higher.
In the present embodiment, in server 200, can preset acquisition parameters database, many for storingIndividual alternative acquisition parameters and each self-corresponding value thereof, when the business place that receives terminal device 100 and sendWhen reason request, multiple these alternative bats that server 200 is stored from this preset acquisition parameters databaseTake the photograph random definite at least one acquisition parameters in parameter, be handed down to terminal device as the first acquisition parameters100, make terminal device 100 control filming apparatus according to this at least one first acquisition parameters issuingGather the facial image for the user of authentication. Wherein alternative acquisition parameters can be existing orThe set of the following primary all acquisition parameters that have of camera head institute that may exist can be also useThe set of multiple appointment acquisition parameters that preset at family, the first acquisition parameters can be this alternative acquisition parametersIn any combination of one or more different acquisition parameters.
Wherein, the method for definite this first acquisition parameters specifically can comprise at random:
The first step: issue this first acquisition parameters to terminal device 100 while judging last authenticationTime and the difference of current system time whether be less than preset numerical value;
Particularly, server 200 obtains and last the user of terminal device 100 is carried out to authenticationTime issue time from this first acquisition parameters to terminal device 100 (be referred to as below: the last time issuesThis first acquisition parameters time), and itself and current system time are compared, to judge the poor of the twoWhether value is less than preset numerical value. Understandably, no matter whether be proved to be successful, as long as server 200Receive the facial image that terminal device 100 sends, be just considered as having carried out an authentication.
Second step: if not, determine at least one and last identity at random from alternative acquisition parametersThis first count that the unduplicated acquisition parameters of this issuing when checking the first acquisition parameters issues as thisTake the photograph parameter;
If 200 last times of server issue the difference of this first acquisition parameters time and current system timeBe more than or equal to preset value, be handed down to the acquisition parameters of terminal device 100 according to the last time, fromIn preset alternative acquisition parameters, determine at random that at least one and the last acquisition parameters issuing do not repeatThis first acquisition parameters of issuing as this of acquisition parameters.
The 3rd step: if so, random definite at least one acquisition parameters conduct from alternative acquisition parametersThis first acquisition parameters.
If 200 last times of server issue the difference of this first acquisition parameters time and current system timeBe less than this preset value, from alternative acquisition parameters, determine at random that at least one acquisition parameters is as treatingThis issuing the first acquisition parameters.
Understandably, the quantity of this issuing each time the first acquisition parameters can be fixed, clothesBusiness device 200 can be determined and from alternative acquisition parameters, determine how many acquisition parameters according to the quantity of specifyingAs the first acquisition parameters. The quantity of this preferably, issuing each time the first acquisition parameters is dynamicChange, server 200 can in preset number range, determine at random that this issues this firstThe quantity of acquisition parameters.
For instance, suppose when the last time is carried out authentication to the user of terminal device 100 serviceThe time that device 200 issues the first acquisition parameters to terminal device 100 is 8:20, and preset value is 5 pointsClock, alternative acquisition parameters comprises: resolution ratio, f-number, white balance, speed, BLC,The first acquisition parameters that last time issues is: resolution ratio and f-number.
In the time receiving the Business Processing request that terminal device 100 sends, server 200 obtains currentSystem time, and judgement is last issues this first acquisition parameters time 8:20 and current system timeWhether the time interval is less than 5 minutes.
If the current system time is 8:22, due to the last time issue this first acquisition parameters time 8:20 withThe time interval of current system time 8:22 is within 2 minutes, to be less than preset 5 minutes, server 200From alternative acquisition parameters, the random acquisition parameters of determining at least one non-resolution ratio and f-number is as theOne acquisition parameters (as: speed, BLC) is handed down to terminal device 100.
If the current system time is 9:00, due to the last time issue this first acquisition parameters time 8:20 withThe time interval of current system time 9:00 is within 60 minutes, to be greater than preset 5 minutes, server 200From alternative acquisition parameters, random definite at least one acquisition parameters is as the first acquisition parameters, and this is first years oldIn acquisition parameters, can comprise acquisition parameters (as: f-number, speed, backlight that the last time issuesCompensation) be handed down to terminal device 100.
Like this, in the time that the time interval of twice authentication is less than preset numerical value, be terminal device100 issue not the first acquisition parameters repeating with the acquisition parameters issuing for the first time, realize and dynamically issue theOne acquisition parameters, can effectively reduce malicious user by clap again validated user according to different acquisition parametersThe mode that facial image carrys out repeated authentication cracks the possibility of authentication, thereby improves authenticationSecurity.
In other embodiment, this preset acquisition parameters database also can be used for storing each terminal deviceModel, at least one acquisition parameters that this model is corresponding, and the each self-corresponding value of each acquisition parameters.Server 200 can obtain the model of terminal device 100, according to this model from this acquisition parameters databaseIn search the acquisition parameters corresponding with this model, and using this acquisition parameters finding as the first shootingParameter is handed down to terminal device 100. Like this for terminal device 100 issues and the type of terminal device 100Number corresponding acquisition parameters, can prevent from not mating and leading with the model of terminal device 100 because of acquisition parametersThe authentication failure causing, the applicability of raising this method makes malicious user only understand simultaneouslyUnder the prerequisite of the model of the terminal device that validated user uses, just may crack authentication, thereby improveThe security of authentication.
For further improving the security of authentication, server further can be according to terminal device 100This model reporting is obtained all acquisition parameters corresponding with this model as alternative acquisition parameters, and fromIn random determine that at least one acquisition parameters is handed down to terminal device 100 as the first acquisition parameters.
Step S63, this terminal device receives this first acquisition parameters issuing, control filming apparatus according toThis first shooting parameter acquisition is used for the user's of authentication facial image, and returns to this server;
Terminal device 100 calls preset recognition of face API, according to this first acquisition parameters pair issuingThe corresponding acquisition parameters of configuration camera head is configured, and receives the shooting instruction that user triggers, and controlsThis filming apparatus takes according to this first acquisition parameters the picture that this shooting instruction is pointed to, to gather this useThe facial image at family, the transmission instruction then triggering according to this user sends this facial image gatheringGive server 200.
Step S64, this server receives this facial image returning, and takes second of this facial imageParameter is mated with this first acquisition parameters, this facial image and preset facial image is carried out simultaneouslyCoupling, and determine that according to matching result whether this user is by this authentication.
In server 200, preset facial feature database and weights database, these face characteristic dataStorehouse is for the preset people for authentication of the account number of storage terminal equipment and the user preset of correspondence thereofFace image or the face characteristic parameter of extracting from this preset facial image. This weights database is used for depositingStore up absolute value and each self-corresponding power thereof of the difference of the first different acquisition parameters and the second acquisition parametersValue, and the matching degree of different face characteristic parameters and corresponding weights thereof. Wherein this difference is absoluteBe worth greatlyr, these first weights are less, and this matching degree is less, and these second weights are less. Understandably,This facial feature database and weights database are also configurable in other servers.
First, server 200 extracts the second count corresponding with this first acquisition parameters in this facial imageTake the photograph parameter, calculate one by one the respectively absolute value of the difference of this second acquisition parameters and this first acquisition parameters.Meanwhile, the terminal device 100 comprising in this Business Processing request sending according to terminal device 100Account number is searched the face in the preset facial image corresponding with account from this facial feature databaseCharacteristic parameter, by the face characteristic parameter of extracting the facial image sending from terminal device 100 and thisFace characteristic parameter in preset facial image is mated, and obtains the matching degree of the two.
Then, server 200 is corresponding with the absolute value of each this difference respectively from this weights database lookupThe first weights and second weights corresponding with this matching degree; Absolute value to each this difference, respectively shouldThe first weights, this matching degree and this second weights are weighted summation, and will after weighted sum, obtainValue and preset threshold value compare; When the value obtaining after this weighted sum is greater than this preset threshold valueTime, determine that this user is by this authentication; When the value obtaining after this weighted sum is less than or equal to thisWhen preset threshold value, determine that this user is by this authentication.
For instance, suppose that the first acquisition parameters issuing comprises: f-number F1, parameter value is V1;Speed ISO1, parameter value is V2, second in the facial image that terminal device 100 sends taken ginsengNumber comprises: f-number F2, and parameter value is V3; Speed ISO2, parameter value is V4. This face figureFace in this preset facial image of storing in face characteristic parameter in picture and facial feature databaseThe matching degree of characteristic parameter is M, and this preset threshold value is T. Server 200 calculates respectively f-numberThe absolute value of the difference of F1 and f-number F2 | V1-V3|, speed ISO1 and speed ISO2's is poorThe absolute value of value | V2-V4|. Obtain by searching this weights database: | weights Q1 that V1-V3| is corresponding,| the weights Q3 that the weights Q2 that V2-V4| is corresponding and matching degree M are corresponding, then does weighted sum fortuneCalculation S=(| V1-V3|*Q1+|V2-V4|*Q2+M*Q3), the value of S and T are compared, as S >When T, determine that the user of terminal device 100, by authentication, in the time of S≤T, determines terminal device100 user is by authentication.
If determine, the user of user terminal 100 is by authentication, and server 200 is according to receptionService identification in Business Processing request is processed corresponding business. If determine, this user does not test by identityCard, server 200 refusals are processed business corresponding to service identification. Further, server 200Also can during not by authentication, send information to user terminal 100 definite this user, withThe subscriber authentication failure of reminding subscriber terminal 100.
The auth method that the embodiment of the present invention provides, utilizes to collect under different acquisition parametersFacial image has this characteristic of different features, and server receives terminal device transmission each timeBusiness Processing request time, at least one first acquisition parameters is handed down to this terminal device, receive shouldTerminal device send according to this first facial image of user of taking parameter acquisition, by this face figureThe second acquisition parameters of picture mates with this first acquisition parameters, simultaneously by this facial image and presetFacial image mates; Determine that according to matching result this user, whether by this authentication, realizesThe mutual interlock of background server and front end recognition of face software, changed traditional background serverOne-sided receiving terminal apparatus face recognition result and easily by malicious user by works such as photo, videosThe situation that fraud mode is cheated, has made up current face recognition algorithms existing limitation in antagonism cheatingProperty, thereby can not increase extra hardware supported and increase under the prerequisite of hardware use cost, improveThe security of the authentication based on recognition of face.
The 7th embodiment
The structural representation of the authentication means that Figure 10 provides for seventh embodiment of the invention. This enforcementThe authentication means that example provides can run in the server 200 shown in Fig. 1, for realizingState the auth method in embodiment. As shown in figure 10, authentication means 30 comprises:
Issue module 31, in the time receiving the Business Processing request of terminal device transmission, will be at leastFirst acquisition parameters is handed down to this terminal device, make this terminal device control filming apparatus according toThis first shooting parameter acquisition is for the user's of authentication facial image;
Receiver module 32, this facial image sending for receiving this terminal device;
Matching module 33, for the second acquisition parameters of this facial image that receiver module 32 is received withIssue this first acquisition parameters that module 31 issues and mate, simultaneously by this facial image and preset peopleFace image mates;
Authentication module 34, for determining according to the matching result of this matching module 33 whether this user passes throughThis authentication.
The present embodiment is to each Implement of Function Module of authentication means 30 detailed process of function separately,Refer to the particular content of above-mentioned Fig. 1 to middle description embodiment illustrated in fig. 9, repeat no more herein.
The 8th embodiment
The structural representation of the authentication means that Figure 11 provides for eighth embodiment of the invention. This enforcementThe authentication means that example provides can run in the server 200 shown in Fig. 1, for realizingState the auth method in embodiment. As shown in figure 11, authentication means 40 comprises:
Issue module 31, in the time receiving the Business Processing request of terminal device transmission, will be at leastFirst acquisition parameters is handed down to this terminal device, make this terminal device control filming apparatus according toThis first shooting parameter acquisition is for the user's of authentication facial image;
Receiver module 32, this facial image sending for receiving this terminal device;
Matching module 33, for the second acquisition parameters of this facial image that receiver module 32 is received withIssue this first acquisition parameters that module 31 issues and mate, simultaneously by this facial image and preset peopleFace image mates;
Authentication module 34, for determining according to the matching result of this matching module 33 whether this user passes throughThis authentication.
Preferably, issuing module 31 comprises:
Determining unit 311, for determining at random at least one acquisition parameters from alternative acquisition parameters, doesBe that the first acquisition parameters is handed down to this terminal device.
Judge module 312, issues this first count to this terminal device when judging last authenticationWhether take the photograph the time of parameter and the time interval of current system time is less than preset numerical value;
Determining unit 311, if be also judged as NO for judge module 45, from alternative acquisition parametersThe random unduplicated bat of this first acquisition parameters issuing while determining at least one and last authenticationTake the photograph this first acquisition parameters that parameter issues as this.
Preferably, issuing module 31 also comprises:
Acquiring unit 313, for obtaining the model of this terminal device, obtains correspondence extremely according to this modelA few acquisition parameters, is handed down to this terminal device as the first acquisition parameters.
Preferably, matching module 33 comprises:
Extraction unit 331, for extracting the second count that this facial image is corresponding with this first acquisition parametersTake the photograph parameter;
Computing unit 332, for calculating one by one the poor of respectively this second acquisition parameters and this first acquisition parametersThe absolute value of value;
Extraction unit 331, also for extracting the face characteristic parameter of this facial image;
Matching unit 333, for by face characteristic parameter and the facial feature database of this facial imageFace characteristic parameter in this preset facial image of middle storage is mated, and obtains the matching degree of the two.
Preferably, authentication module 34 comprises:
Search unit 341, for corresponding with the absolute value of each this difference respectively from weights database lookupThe first weights and second weights corresponding with this matching degree, wherein the absolute value of this difference is larger, shouldThe first weights are less, and this matching degree is less, and these second weights are less;
Computing unit 342, for the absolute value to each this difference, respectively these first weights, this matching degree withAnd these second weights are weighted summation, and the value obtaining after weighted sum and preset threshold value are carried outRelatively;
Authentication unit 343, when being greater than this preset threshold value when the value obtaining after this weighted sum, reallyFixed this user is by this authentication.
The present embodiment is to each Implement of Function Module of authentication means 40 detailed process of function separately,Refer to the particular content of above-mentioned Fig. 1 to middle description embodiment illustrated in fig. 9, repeat no more herein.
The authentication means that seventh embodiment of the invention and the 8th embodiment provide, utilizes different batsTake the photograph the facial image collecting under parameter and there is this characteristic of different features, receive end each timeEnd equipment send Business Processing request time, at least one first acquisition parameters is handed down to this terminal and establishesStandby, receive that this terminal device sends according to this first facial image of taking the user of parameter acquisition,The second acquisition parameters of this facial image is mated with this first acquisition parameters, simultaneously by this faceImage mates with preset facial image; Determine that according to matching result whether this user is by this identityChecking, has realized the mutual interlock of background server and front end recognition of face software, has changed traditionalThe one-sided receiving terminal apparatus face recognition result of background server and easily by malicious user by shineThe situation of the cheating mode such as sheet, video deception, has made up current face recognition algorithms in antagonism cheatingExisting limitation, thus can not increase extra hardware supported and increase hardware use costUnder prerequisite, improve the security of the authentication based on recognition of face.
The 9th embodiment
Figure 12 shows for the structure of the authentication means that ninth embodiment of the invention and the tenth embodiment provideIntention. The authentication means that the present embodiment provides can run on the terminal device 100 shown in Fig. 1In, for realizing the auth method of above-described embodiment. As shown in figure 12, authentication means50 comprise:
Sending module 51, for sending Business Processing request to server;
Receiver module 52, at least one first acquisition parameters issuing for receiving this server;
Acquisition module 53, this first shooting ginseng receiving according to receiver module 52 for controlling filming apparatusNumber gathers the facial image for the user of authentication;
Sending module 51, also for this facial image is sent to this server, so that this server willThe second acquisition parameters of this facial image mates with this first acquisition parameters, simultaneously by this face figurePicture mates with preset facial image, and determines that according to matching result whether this user is by this identityChecking.
The present embodiment is to each Implement of Function Module of authentication means 50 detailed process of function separately,Refer to the particular content of above-mentioned Fig. 1 to middle description embodiment illustrated in fig. 9, repeat no more herein.
The tenth embodiment
The authentication means that the present embodiment provides can run in the terminal device 100 shown in Fig. 1,For realizing the auth method of above-described embodiment. Different from the 9th embodiment:
Receiver module 52, also for receiving the instruction that reports of this server transmission;
Sending module 51, also reports instruction for this reception according to this receiver module, by terminal deviceModel report this server so that this server obtains at least one corresponding bat according to this modelTake the photograph parameter as this first acquisition parameters.
The present embodiment is to each Implement of Function Module of authentication means 50 detailed process of function separately,Refer to the particular content of above-mentioned Fig. 1 to middle description embodiment illustrated in fig. 9, repeat no more herein.
The authentication means that ninth embodiment of the invention and the tenth embodiment provide, utilizes different batsTake the photograph the facial image collecting under parameter and there is this characteristic of different features, in the industry sending each timeBusiness is processed after request, and at least one issuing according to server the first acquisition parameters control filming apparatus shouldFirst takes parameter acquisition user's facial image, and this facial image is sent to this server, so thatThis server can be according to the second acquisition parameters of this facial image the knot that mates with this first acquisition parametersReally, and the matching result of this facial image and preset facial image, determine that whether this user is by being somebody's turn to doAuthentication, has realized the mutual interlock of background server and front end recognition of face software, has changed biographySystem the one-sided receiving terminal apparatus face recognition result of background server and easily passed through by malicious userThe situation of the cheating mode such as photo, video deception, has made up current face recognition algorithms in antagonism cheatingUpper existing limitation, thus can not increase extra hardware supported and increase hardware use costPrerequisite under, improve the security of authentication based on recognition of face.
It should be noted that, each embodiment in this description all adopts the mode of going forward one by one to describe, everyWhat individual embodiment stressed is all and the difference of other embodiment, identical between each embodimentSimilar part mutually referring to. For device class embodiment, due to itself and embodiment of the methodSubstantially similar, so description is fairly simple, relevant part referring to the part explanation of embodiment of the method isCan.
It should be noted that, in this article, the relational terms such as the first and second grades is only usedAn entity or operation are separated with another entity or operating space, and not necessarily requirement orImply the relation or the order that between these entities or operation, there are any this reality. And, term" comprise ", " comprising " or its any other variant be intended to contain comprising of nonexcludability, thereby make bagProcess, method, article or the device of drawing together a series of key elements not only comprise those key elements, but also bagDraw together other key elements of clearly not listing, or be also included as this process, method, article orInstall intrinsic key element. In the situation that there is no more restrictions, limited by statement " comprising ... "Key element, and be not precluded within and comprise in the process, method, article of key element or device and also existing in additionIdentical element.
One of ordinary skill in the art will appreciate that to realize all or part of step of above-described embodiment passableComplete by hardware, also can carry out the hardware that instruction is relevant by program and complete, program can depositBe stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be read-only storage,Disk or CD etc.
Above, be only preferred embodiment of the present invention, not the present invention is done any pro formaRestriction, although the present invention discloses as above with preferred embodiment, but be not in order to limit the present invention,Any those skilled in the art, are not departing within the scope of technical solution of the present invention, when utilizingThe technology contents of above-mentioned announcement is made a little change or is modified to the equivalent embodiment of equivalent variations, in every caseBe not depart from technical solution of the present invention content, according to technical spirit of the present invention, above embodiment doneAny simple modification, equivalent variations and modification, all still belong in the scope of technical solution of the present invention.

Claims (18)

1. an auth method, is characterized in that, described method comprises:
In the time receiving the Business Processing request of terminal device transmission, by least one the first acquisition parametersBe handed down to described terminal device, described terminal device control filming apparatus is taken according to described firstParameter acquisition is for the user's of authentication facial image;
Receive the described facial image that described terminal device sends, take second of described facial imageParameter is mated with described the first acquisition parameters, simultaneously by described facial image and preset facial imageMate;
Determine that according to matching result whether described user is by described authentication.
2. method according to claim 1, is characterized in that, described by least one first countTaking the photograph parameter is handed down to described terminal device and comprises:
Random definite at least one acquisition parameters from alternative acquisition parameters, under the first acquisition parametersIssue described terminal device.
3. method according to claim 2, is characterized in that, described method also comprises:
While judging last authentication, issue the time of described the first acquisition parameters to described terminal deviceWhether be less than preset numerical value with the time interval of current system time;
If not, from alternative acquisition parameters, determine at least one and last authentication at present at randomDescribed the first shooting ginseng that the unduplicated acquisition parameters of described the first acquisition parameters of sending out issues as thisNumber.
4. method according to claim 1, is characterized in that, described by least one first countTaking the photograph parameter is handed down to described terminal device and also comprises:
Obtain the model of described terminal device;
Obtain at least one corresponding acquisition parameters according to described model, issue as the first acquisition parametersGive described terminal device.
5. method according to claim 1, is characterized in that, described by described facial imageThe second parameter acquisition parameters mates and comprises with described the first acquisition parameters:
Extract the second acquisition parameters corresponding with described the first acquisition parameters in described facial image, one by oneCalculate the absolute value of the difference of each described the second acquisition parameters and described the first acquisition parameters.
6. method according to claim 5, is characterized in that, described by described facial image withPreset facial image mates and comprises:
Extract the face characteristic parameter in described facial image;
Described pre-by what store in the face characteristic parameter in described facial image and facial feature databaseThe face characteristic parameter of putting in facial image is mated, and obtains the matching degree of the two.
7. method according to claim 6, is characterized in that, described definite according to matching resultWhether described user comprises by described authentication:
From weights database lookup respectively first weights corresponding with the absolute value of each described difference and withThe second weights that described matching degree is corresponding, the absolute value of wherein said difference is larger, described the first weightsLess, described matching degree is less, and described the second weights are less;
Absolute value to each described difference, each described the first weights, described matching degree and described secondWeights are weighted summation, and the value obtaining after weighted sum and preset threshold value are compared;
In the time that the value obtaining after described weighted sum is greater than described preset threshold value, determine that described user is logicalCross described authentication.
8. an auth method, is characterized in that, described method comprises:
Send Business Processing request to server;
Receive at least one first acquisition parameters that described server issues;
Control filming apparatus and take the face of parameter acquisition for the user of authentication according to described firstImage, and send to described server, so that described server is taken second of described facial imageParameter is mated with described the first acquisition parameters, simultaneously by described facial image and preset facial imageMate, and determine that according to matching result whether described user is by described authentication.
9. method according to claim 8, is characterized in that, described to server transmission businessBetween at least one first acquisition parameters that processing request and the described server of described reception issue, comprising:
Receive the instruction that reports that described server sends, report instruction according to described, by terminal deviceModel reports described server, so that described server obtains at least one of correspondence according to described modelIndividual acquisition parameters is as described the first acquisition parameters.
10. an auth method, is characterized in that, described method comprises:
Terminal device sends Business Processing request to server;
In the time receiving described Business Processing request, described server is by least one the first acquisition parametersBe handed down to described terminal device;
Described terminal device receives described the first acquisition parameters issuing, and controls filming apparatus according to describedFirst takes the facial image of parameter acquisition for the user of authentication, and returns to described server;
Described server receives the described facial image returning, and takes ginseng by second of described facial imageNumber mates with described the first acquisition parameters, described facial image and preset facial image is entered simultaneouslyRow coupling, and determine that according to matching result whether described user is by described authentication.
11. 1 kinds of authentication means, run on server, it is characterized in that, described device comprises:
Issue module, in the time receiving the Business Processing request of terminal device transmission, by least oneIndividual the first acquisition parameters is handed down to described terminal device, make described terminal device control filming apparatus byTake the facial image of parameter acquisition for the user of authentication according to described first;
Receiver module, the described facial image sending for receiving described terminal device;
Matching module, for the second acquisition parameters of described facial image that described receiver module is receivedIssue described the first acquisition parameters that module issues and mate with described, simultaneously by described facial imageMate with preset facial image;
Authentication module, for determining according to the matching result of described matching module whether described user passes throughDescribed authentication.
12. devices according to claim 11, is characterized in that, described in issue module and comprise:
Determining unit, for determining at random at least one acquisition parameters from alternative acquisition parameters, asThe first acquisition parameters is handed down to described terminal device;
Judging unit, issues described first to described terminal device when judging last authenticationWhether the time interval of the time of acquisition parameters and current system time is less than preset numerical value;
Described determining unit, if be also judged as NO for described judge module, from alternative acquisition parametersIn random described the first acquisition parameters issuing while determining at least one and last authentication do not repeatDescribed the first acquisition parameters of issuing as this of acquisition parameters.
13. devices according to claim 11, is characterized in that, described in issue module and also comprise:
Acquiring unit, for obtaining the model of described terminal device, obtains corresponding according to described modelAt least one acquisition parameters, is handed down to described terminal device as the first acquisition parameters.
14. devices according to claim 11, is characterized in that, described matching module comprises:
Extraction unit, for extract described facial image corresponding with described the first acquisition parameters secondAcquisition parameters;
Computing unit, for calculating one by one each described the second acquisition parameters and described the first acquisition parametersThe absolute value of difference;
Described extraction unit, also for extracting the face characteristic parameter of described facial image;
Matching unit, for by face characteristic parameter and the facial feature database of described facial imageFace characteristic parameter in the described preset facial image of middle storage is mated, and obtains the coupling of the twoDegree.
15. devices according to claim 14, is characterized in that, described authentication module comprises:
Search unit, for corresponding with the absolute value of each described difference respectively from weights database lookupThe first weights and second weights corresponding with described matching degree, the absolute value of wherein said difference is larger,Described the first weights are less, and described matching degree is less, and described the second weights are less;
Computing unit, for the absolute value to each described difference, each described the first weights, described couplingDegree and described the second weights are weighted summation, and by the value obtaining after weighted sum and preset thresholdValue compares;
Authentication unit, in the time that the value obtaining after described weighted sum is greater than described preset threshold value,Determine that described user is by described authentication.
16. 1 kinds of authentication means, run on terminal device, it is characterized in that, described device bagDraw together:
Sending module, for sending Business Processing request to server;
Receiver module, at least one first acquisition parameters issuing for receiving described server;
Acquisition module, described the first shooting receiving according to described receiver module for controlling filming apparatusParameter acquisition is for the user's of authentication facial image;
Described sending module, also for described facial image is sent to described server, so that described inServer mates the second acquisition parameters of described facial image with described the first acquisition parameters, withIn time, mates described facial image with preset facial image, and determines described use according to matching resultWhether family is by described authentication.
17. devices according to claim 16, is characterized in that,
Described receiver module, also for receiving the instruction that reports of described server transmission;
Described sending module also reports instruction described in receiving according to described receiver module, will be eventuallyThe model of end equipment reports described server, so that described server obtains correspondence according to described modelAt least one acquisition parameters as described the first acquisition parameters.
18. 1 kinds of authentication systems, is characterized in that, described system comprises: terminal device and clothesBusiness device;
Wherein said terminal device, for sending Business Processing request to described server;
Described server, in the time receiving described Business Processing request, by least one first countTake the photograph parameter and be handed down to described terminal device;
Described terminal device, also for receiving described the first acquisition parameters issuing, controls filming apparatusFacial image according to described the first shooting parameter acquisition for the user of authentication, and return to instituteState server;
Described server, also for receiving the described facial image returning, by of described facial imageTwo acquisition parameters mate with described the first acquisition parameters, simultaneously by described facial image and preset peopleFace image mates, and determines that according to matching result whether described user is by described authentication.
CN201410567734.8A 2014-10-22 2014-10-22 Identity verification method, device and system Active CN105590043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410567734.8A CN105590043B (en) 2014-10-22 2014-10-22 Identity verification method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410567734.8A CN105590043B (en) 2014-10-22 2014-10-22 Identity verification method, device and system

Publications (2)

Publication Number Publication Date
CN105590043A true CN105590043A (en) 2016-05-18
CN105590043B CN105590043B (en) 2020-07-07

Family

ID=55929619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410567734.8A Active CN105590043B (en) 2014-10-22 2014-10-22 Identity verification method, device and system

Country Status (1)

Country Link
CN (1) CN105590043B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022043A (en) * 2016-05-23 2016-10-12 南京甄视智能科技有限公司 System architecture of biological characteristic recognition business processing platform and implementation method
CN107368817A (en) * 2017-07-26 2017-11-21 湖南云迪生物识别科技有限公司 Face identification method and device
CN107633163A (en) * 2016-07-19 2018-01-26 百度在线网络技术(北京)有限公司 Login method and device based on recognition of face
CN108599957A (en) * 2018-04-16 2018-09-28 Oppo广东移动通信有限公司 Authentication method, information collecting device, authenticating device and Verification System
CN108875331A (en) * 2017-08-01 2018-11-23 北京旷视科技有限公司 Face unlocking method, device and system and storage medium
CN108932621A (en) * 2017-05-26 2018-12-04 北京京东尚科信息技术有限公司 security verification method and device
CN109326058A (en) * 2018-08-29 2019-02-12 中国建设银行股份有限公司 Identification check method, apparatus, terminal and readable medium based on wisdom automatic teller machine
CN110213522A (en) * 2019-05-27 2019-09-06 腾讯科技(深圳)有限公司 A kind of video data handling procedure, device and relevant device
WO2019223149A1 (en) * 2018-05-23 2019-11-28 平安科技(深圳)有限公司 Security authentication method, authentication server and computer readable storage medium
US20200117790A1 (en) * 2017-10-20 2020-04-16 CPMasterpiece Co. Ltd Authentication system, request apparatus, response apparatus, request method, and response method
CN111046370A (en) * 2019-11-26 2020-04-21 苏宁云计算有限公司 Identity verification method, device and system
CN111931153A (en) * 2020-10-16 2020-11-13 腾讯科技(深圳)有限公司 Identity verification method and device based on artificial intelligence and computer equipment
CN111931149A (en) * 2020-08-10 2020-11-13 深圳世间乐见科技有限公司 Face authentication method and device, computer equipment and storage medium
WO2021135638A1 (en) * 2019-12-31 2021-07-08 支付宝(杭州)信息技术有限公司 Method and apparatus for detecting whether image is tampered with, and electronic device
CN113158893A (en) * 2021-04-20 2021-07-23 北京嘀嘀无限科技发展有限公司 Target identification method and system
CN113971840A (en) * 2021-10-22 2022-01-25 支付宝(杭州)信息技术有限公司 Method and device for preventing image injection attack
WO2022022493A1 (en) * 2020-07-30 2022-02-03 北京嘀嘀无限科技发展有限公司 Image authenticity determination method and system
CN115798023A (en) * 2023-02-13 2023-03-14 成都睿瞳科技有限责任公司 Face identification authentication method and device, storage medium and processor

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002229955A (en) * 2001-02-02 2002-08-16 Matsushita Electric Ind Co Ltd Information terminal device and authentication system
CN1968357A (en) * 2005-11-14 2007-05-23 欧姆龙株式会社 Authentication apparatus and method
CN102289468A (en) * 2011-07-22 2011-12-21 北京航空航天大学 Method for acquiring and recording photo information in camera
CN102422286A (en) * 2009-03-11 2012-04-18 香港浸会大学 Automatic and semi-automatic image classification, annotation and tagging through the use of image acquisition parameters and metadata
CN103475818A (en) * 2013-09-03 2013-12-25 小米科技有限责任公司 Shooting method and device and terminal device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002229955A (en) * 2001-02-02 2002-08-16 Matsushita Electric Ind Co Ltd Information terminal device and authentication system
CN1968357A (en) * 2005-11-14 2007-05-23 欧姆龙株式会社 Authentication apparatus and method
CN102422286A (en) * 2009-03-11 2012-04-18 香港浸会大学 Automatic and semi-automatic image classification, annotation and tagging through the use of image acquisition parameters and metadata
CN102289468A (en) * 2011-07-22 2011-12-21 北京航空航天大学 Method for acquiring and recording photo information in camera
CN103475818A (en) * 2013-09-03 2013-12-25 小米科技有限责任公司 Shooting method and device and terminal device

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022043A (en) * 2016-05-23 2016-10-12 南京甄视智能科技有限公司 System architecture of biological characteristic recognition business processing platform and implementation method
CN107633163A (en) * 2016-07-19 2018-01-26 百度在线网络技术(北京)有限公司 Login method and device based on recognition of face
CN108932621A (en) * 2017-05-26 2018-12-04 北京京东尚科信息技术有限公司 security verification method and device
CN108932621B (en) * 2017-05-26 2022-01-28 北京京东尚科信息技术有限公司 Security verification method and device
CN107368817A (en) * 2017-07-26 2017-11-21 湖南云迪生物识别科技有限公司 Face identification method and device
CN107368817B (en) * 2017-07-26 2020-02-21 湖南云迪生物识别科技有限公司 Face recognition method and device
CN108875331A (en) * 2017-08-01 2018-11-23 北京旷视科技有限公司 Face unlocking method, device and system and storage medium
US20200117790A1 (en) * 2017-10-20 2020-04-16 CPMasterpiece Co. Ltd Authentication system, request apparatus, response apparatus, request method, and response method
CN108599957A (en) * 2018-04-16 2018-09-28 Oppo广东移动通信有限公司 Authentication method, information collecting device, authenticating device and Verification System
WO2019223149A1 (en) * 2018-05-23 2019-11-28 平安科技(深圳)有限公司 Security authentication method, authentication server and computer readable storage medium
CN109326058A (en) * 2018-08-29 2019-02-12 中国建设银行股份有限公司 Identification check method, apparatus, terminal and readable medium based on wisdom automatic teller machine
CN110213522B (en) * 2019-05-27 2021-07-27 腾讯科技(深圳)有限公司 Video data processing method and device and related equipment
CN110213522A (en) * 2019-05-27 2019-09-06 腾讯科技(深圳)有限公司 A kind of video data handling procedure, device and relevant device
CN111046370A (en) * 2019-11-26 2020-04-21 苏宁云计算有限公司 Identity verification method, device and system
WO2021135638A1 (en) * 2019-12-31 2021-07-08 支付宝(杭州)信息技术有限公司 Method and apparatus for detecting whether image is tampered with, and electronic device
WO2022022493A1 (en) * 2020-07-30 2022-02-03 北京嘀嘀无限科技发展有限公司 Image authenticity determination method and system
CN111931149A (en) * 2020-08-10 2020-11-13 深圳世间乐见科技有限公司 Face authentication method and device, computer equipment and storage medium
CN111931149B (en) * 2020-08-10 2024-07-23 深圳世间乐见科技有限公司 Face authentication method and device, computer equipment and storage medium
CN111931153A (en) * 2020-10-16 2020-11-13 腾讯科技(深圳)有限公司 Identity verification method and device based on artificial intelligence and computer equipment
WO2022222957A1 (en) * 2021-04-20 2022-10-27 北京嘀嘀无限科技发展有限公司 Method and system for identifying target
CN113158893A (en) * 2021-04-20 2021-07-23 北京嘀嘀无限科技发展有限公司 Target identification method and system
CN113971840A (en) * 2021-10-22 2022-01-25 支付宝(杭州)信息技术有限公司 Method and device for preventing image injection attack
CN115798023A (en) * 2023-02-13 2023-03-14 成都睿瞳科技有限责任公司 Face identification authentication method and device, storage medium and processor
CN115798023B (en) * 2023-02-13 2023-04-18 成都睿瞳科技有限责任公司 Face identification authentication method and device, storage medium and processor

Also Published As

Publication number Publication date
CN105590043B (en) 2020-07-07

Similar Documents

Publication Publication Date Title
CN105590043A (en) Authentication method, device and system
US8405729B2 (en) System and method for pairing hand-held devices utilizing a front-facing camera
KR101730357B1 (en) Apparatus and method for connecting access point in portable terminal
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN105281906A (en) Safety authentication method and device
CN110069229B (en) Screen sharing method, mobile terminal and computer readable storage medium
CN104935744A (en) Verification code display method, verification code display device and mobile terminal
CN106657528A (en) Incoming call management method and device
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN103731810A (en) Access point sharing method and device
KR20150122637A (en) Utilizations and applications of near field communications in mobile device management and security
CN111339572A (en) Method and system for verifying integrity of cloud data, terminal device and storage medium
CN104683104B (en) The method, apparatus and system of authentication
CN107948093A (en) Adjust the method and device that network speed is applied in terminal device
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN103974216A (en) Information processing method and electronic equipment
CN108959960B (en) Method, device and computer readable storage medium for preventing privacy disclosure
CN104010065A (en) Telephone processing method and device
CN104426685A (en) Information management method and apparatus
CN104239790B (en) Treatment method of virus and device
CN109711198B (en) Application management method, mobile terminal and storage medium
CN107172076B (en) Security verification method, mobile terminal and server side
CN110022600A (en) Adjusting method, device, storage medium and the mobile terminal of driving current
CN202503545U (en) Account security application system
CN109660470A (en) A kind of data traffic management-control method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant