CN105871905B - Authentication method and device - Google Patents

Authentication method and device Download PDF

Info

Publication number
CN105871905B
CN105871905B CN201610357773.4A CN201610357773A CN105871905B CN 105871905 B CN105871905 B CN 105871905B CN 201610357773 A CN201610357773 A CN 201610357773A CN 105871905 B CN105871905 B CN 105871905B
Authority
CN
China
Prior art keywords
face
information
user
photograph album
photo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610357773.4A
Other languages
Chinese (zh)
Other versions
CN105871905A (en
Inventor
张涛
汪平仄
张旭华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610357773.4A priority Critical patent/CN105871905B/en
Publication of CN105871905A publication Critical patent/CN105871905A/en
Application granted granted Critical
Publication of CN105871905B publication Critical patent/CN105871905B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • G06V40/169Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • G06V40/173Classification, e.g. identification face re-identification, e.g. recognising unknown faces across different face tracks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The disclosure is directed to a kind of authentication method and devices, are related to field of communication technology.The described method includes: obtaining user's request of user;According to the face information of user described in user's request;The face information is authenticated using face photograph album;When the face information passes through certification, executes the user and request corresponding operation.In the disclosure, in the user's request for getting user, by obtaining user's face information, and face information is authenticated using face photograph album, determine whether that executing user requests corresponding operation, on the one hand on the other hand avoiding user from remembering username and password bring trouble reduces the risk of leakage of user information;In addition, authenticated in the disclosure face photograph album used be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face information registering in advance, it is user-friendly.

Description

Authentication method and device
Technical field
This disclosure relates to field of communication technology more particularly to a kind of authentication method and device.
Background technique
With the prevalence of intelligent terminal, people often will do it various need in routine use intelligent terminal The operation to be authenticated, such as Account Logon, unlock operation etc..But in the prior art, user is in the certification for carrying out aforesaid operations When, it generallys use keyboard input and realizes.On the one hand this login mode needs user to remember username and password, on the other hand, There are bigger risk of leakage.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of authentication method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of authentication method is provided, which comprises
Obtain user's request of user;
According to the face information of user described in user's request;
The face information is authenticated using face photograph album;
When the face information passes through certification, executes the user and request corresponding operation.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
According to a kind of implementation of disclosure first aspect, the face of the user according to user's request Hole information, comprising:
The photo for the user that the front camera of acquisition terminal device is shot;
Alternatively, the face information of the user according to user's request, comprising:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the face information of the user;
The face information is obtained from the authentication information.
In above-mentioned implementation, terminal device can set camera by it to shoot to obtain face information, and service Device then can obtain face information by the authentication information that receiving terminal apparatus is sent, so that the authentication method both can be with It completes, can also complete on the server on the terminal device.
It is described that the face information is carried out using face photograph album according to another implementation of disclosure first aspect Certification, comprising:
The face information that will acquire is compared with the photo in the face photograph album;When the face information with it is described Photo in face photograph album compares successfully, it is determined that the face information passes through certification;
Alternatively, described authenticate the face information using face photograph album, comprising:
The face information is sent to the server for being stored with the face photograph album;Receive recognizing for the server return Response message is demonstrate,proved, the authentication response information is used to indicate whether the face information passes through certification.
In the implementation of the disclosure, certification can both be authenticated by terminal local, can also be carried out by server Certification.
According to another implementation of disclosure first aspect, the face information that will acquire and the face phase Photo in volume compares, comprising:
Photo in the face information that will acquire and the N number of photograph album set in the face photograph album compares, the N For positive integer.
In this implementation, the photograph in the face information that will acquire and the N number of photograph album set in the face photograph album Piece compares, and without being compared with all photograph albums in face photograph album, on the one hand can save comparison time, on the other hand It is also possible that the only corresponding user of setting photograph album can pass through certification.
According to another implementation of disclosure first aspect, the N number of photograph album set photo as according to photograph album Quantity is from the N number of photograph album for when more to arranging less, coming foremost.
Since in user's face photograph album, the number of pictures of usual user is more, therefore can according to above-mentioned setting Guarantee the photograph album that user can be compared in comparison.
According to another implementation of disclosure first aspect, the face information that will acquire and the face phase Photo in volume compares, comprising:
It obtains face and compares instruction;
When getting the face and comparing instruction, photo in the face information that will acquire and the face photograph album into Row comparison.
According to another implementation of disclosure first aspect, the acquisition face compares instruction, comprising:
Obtain the finger print information of the user;
The finger print information is authenticated;
When finger print information certification passes through, generates the face and compare instruction.
In the implementation of the disclosure, first the finger print information of user can also be authenticated, only when finger print identifying is logical It is out-of-date, face authentification of message is just carried out, duplicate protection is on the one hand played, on the other hand, avoids unnecessary face authentification of message Process alleviates the workload of terminal device or server.
According to another implementation of disclosure first aspect, the finger print information for obtaining the user, comprising:
The finger print information of the user is obtained using the fingerprint sensor of terminal device;
Alternatively, the finger print information for obtaining the user, comprising:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the finger print information of the user;
The finger print information is obtained from the authentication information.
According to another implementation of disclosure first aspect, user request include logging request, de-registration request, Information change request, unlocking request or access local file request.
According to the second aspect of an embodiment of the present disclosure, a kind of authentication device is provided, described device includes:
First obtains module, and the user for obtaining user requests;
Second obtains module, the face information for the user according to user's request;
Authentication module, for being authenticated using face photograph album to the face information;
Processing module requests corresponding operation for when the face information passes through certification, executing the user.
According to a kind of implementation of disclosure second aspect, described second obtains module, is used for:
The photo for the user that the front camera of acquisition terminal device is shot;
Alternatively, described second obtains module, it is used for:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the face information of the user;
The face information is obtained from the authentication information.
According to another implementation of disclosure second aspect, the authentication module is used for:
The face information that will acquire is compared with the photo in the face photograph album;When the face information with it is described Photo in face photograph album compares successfully, it is determined that the face information passes through certification;
Alternatively, the authentication module, is used for:
The face information is sent to the server for being stored with the face photograph album;Receive recognizing for the server return Response message is demonstrate,proved, the authentication response information is used to indicate whether the face information passes through certification.
According to another implementation of disclosure second aspect, the authentication module is used for:
Photo in the face information that will acquire and the N number of photograph album set in the face photograph album compares, the N For positive integer.
According to another implementation of disclosure second aspect, the N number of photograph album set photo as according to photograph album Quantity is from the N number of photograph album for when more to arranging less, coming foremost.
According to another implementation of disclosure second aspect, the authentication module is used for:
It obtains face and compares instruction;
When getting the face and comparing instruction, photo in the face information that will acquire and the face photograph album into Row comparison.
According to another implementation of disclosure second aspect, described second obtains module, is also used to:
Obtain the finger print information of the user;
The authentication module, is also used to: the finger print information authenticated,
When finger print information certification passes through, generates the face and compare instruction.
According to another implementation of disclosure second aspect, described second obtains module, is used for:
The finger print information of the user is obtained using the fingerprint sensor of terminal device;
Alternatively, described second obtains module, it is used for:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the finger print information of the user;
The finger print information is obtained from the authentication information.
According to another implementation of disclosure second aspect, user request include logging request, de-registration request, Information change request, unlocking request or access local file request.
According to the third aspect of an embodiment of the present disclosure, a kind of authentication device is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Obtain user's request of user;
According to the face information of user described in user's request;
The face information is authenticated using face photograph album;
When the face information passes through certification, executes the user and request corresponding operation.
The technical scheme provided by this disclosed embodiment can include the following benefits:
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is application scenario diagram shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of authentication method shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of authentication method shown according to an exemplary embodiment.
Fig. 3 a is a kind of terminal interface schematic diagram shown according to an exemplary embodiment.
Fig. 4 is a kind of flow chart of authentication method shown according to an exemplary embodiment.
Fig. 5 is a kind of flow chart of authentication method shown according to an exemplary embodiment.
Fig. 6 is a kind of flow chart of authentication method shown according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of authentication device shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of authentication device shown according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of authentication device shown according to an exemplary embodiment.
Figure 10 is a kind of block diagram of authentication device shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
For the ease of the description of embodiment, below first simply introduce the application scenarios of embodiment in the disclosure.Fig. 1 is The application scenario diagram shown according to another exemplary embodiment, referring to Fig. 1, which includes terminal device 100 and server 200, terminal device 100 include but is not limited to be smart phone, smartwatch, Intelligent bracelet, tablet computer etc..
The application scenarios of the disclosure include following two kinds of situations:
The first situation, user carry out local authentication, such as the certification carried out when solution lock screen, access local file.This When, terminal device 100 obtains the authentication information of user, and authenticates to the authentication information of user.
Second case, user carry out server authentication, such as the certification carried out when login account, cancellation account.At this point, Terminal device 100 sends authentication information to server 200, is authenticated by server 200.
It should be noted that the apparatus described above type is only for example, the disclosure to this with no restriction.
Fig. 2 is a kind of flow chart of authentication method shown according to an exemplary embodiment, as shown in Fig. 2, the authenticating party Terminal device or server of the method suitable for aforementioned scene, comprising the following steps:
In step s 11, user's request of user is obtained.
Wherein, user's request includes but is not limited to logging request, de-registration request, information change request, unlocking request or visit Ask that local file is requested.
In step s 12, according to the face information of user request user.
Wherein, face information may include an at least photo, preferably include multiple pictures.
In step s 13, face information is authenticated using face photograph album.
Face photograph album is at least one photograph album obtained according to face division, and the photo for including in each photograph album is same The photo of people, the photo in face photograph album are the photo for containing face.
In step S14, when face certification passes through, executes user and request corresponding operation.
For example, then executing permission user login operation when user's request is logging request.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
Fig. 3 is a kind of flow chart of authentication method shown according to an exemplary embodiment, as shown in figure 3, the authenticating party Terminal device of the method in the first situation aforementioned scene, comprising the following steps:
In the step s 21, user's request of user is obtained.
Wherein, user's request is local user's request that user generates on the terminal device, such as unlocking request, access Local file request etc..
Step S21 may include: the button operation or slip instruction in response to user, generate user's request.
In the present embodiment, the producing method of user's request in step S21 is different from general user and requests generation side Formula, such as it is to be generated by the modes such as the first button or the first slip instruction that general user, which requests producing method, wherein first Button can be common login button (for supplying into account and password), the first slip instruction can be horizontally slip instruction, Slide up and down instruction etc..And user's request in the present embodiment is generated by the second button or the second slip instruction, the Two buttons can be newly-increased button (for acquiring the face information of user), the second slip instruction can for setting starting point, Terminal or slip instruction by predetermined position.The user's request generated by the second button or the second slip instruction can trigger Subsequent face authentification of message step.
Such as terminal interface shown in Fig. 3 a has the first button A and the second button B simultaneously, the first button when the user clicks When, account number cipher input interface is jumped to, when the user clicks when the second button, jumps to facial information acquisition interface.
It in step S22, is requested in response to user, obtains the photograph for the user that the front camera of terminal device is shot Piece.
In one implementation, terminal device generates user in response to the button operation or slip instruction of user and asks It asks;Terminal device opens the shooting that camera carries out the photo of user, shoots an at least photo.
In another implementation, terminal device generates user in response to the button operation or slip instruction of user and asks It asks;Terminal device generates shooting button, and perhaps prompting frame is shone after sensing that user clicks shooting button or prompting frame Piece shooting.
In step S23, face information and the photo in face photograph album that will acquire are compared;When face information with Photo in face photograph album compares successfully, it is determined that face information executes step S24 by certification;Otherwise, step S25 is executed.
In one possible implementation, the face information that will acquire is compared with the photo in face photograph album, Include:
Photo in the face information that will acquire and the N number of photograph album set in face photograph album compares, and N is positive whole Number.
In this implementation, the photograph in the face information that will acquire and the N number of photograph album set in the face photograph album Piece compares, and without being compared with all photograph albums in face photograph album, on the one hand can save comparison time, on the other hand It is also possible that the only corresponding user of setting photograph album can pass through certification.
In one implementation, N number of photograph album of setting can for according to number of pictures in photograph album from when more to arranging less, The N number of photograph album for coming foremost, since in user's face photograph album, the number of pictures of usual user is more, therefore according to Above-mentioned setting can guarantee the photograph album that user can be compared in comparison.In another implementation, setting is N number of Photograph album can be all photograph albums in face photograph album.In another implementation, N number of photograph album of setting can also be that user exists Open N number of photograph album specified when face authentification of message function.
Further, this method can also include: that terminal device gets asking for user's unlatching face authentification of message function When asking, user is prompted to select the photograph album for carrying out face authentification of message;The mark for N number of photograph album that user specifies is received, is saved The mark for N number of photograph album that user specifies.
When the similarity of a photo in any photo and face photograph album in face information is more than preset value, really The photo determined in face information and face photograph album compares success;Otherwise, it determines face information is compared with the photo in face photograph album Failure.
In alternatively possible implementation, the photo in the face information that will acquire and face photograph album is carried out pair Than, comprising:
Face information is sent to the server for being stored with face photograph album;The authentication response information that server returns is received, Authentication response information is used to indicate whether terminal device authentication passes through.
In this implementation, the mode that server carries out face authentification of message can carry out face information with terminal device The mode of certification is identical.
Further, before step S23, this method further include:
Obtain face photograph album.
In the disclosure, obtaining face photograph album includes: that terminal device uploads onto the server user picture;Server according to Facial parts in user picture classify to photo, generate face photograph album according to classification results;Terminal device passes through synchronization Obtain the face photograph album in server.Wherein, server can carry out photo using the good neural network model of precondition Classification classifies to photo using modes such as clusters, is not described herein.
Wherein the user picture in terminal device can be what user shot in daily life, therefore terminal device will be used Family photo upload is to server, either one step completed, is also possible to complete several times.
In step s 24, it executes user and requests corresponding operation.
For example, then executing the unlock operation of terminal device when user's request is unlocking request.
Further, after step S24, can also generate to operate and successfully prompt, operate successfully prompt can be play frame, Auditory tone cues operate successfully prompt and are also possible to the modes such as the page after passing directly to operate successfully.
In step s 25, authentification failure prompt is generated.
Wherein, authentification failure prompt, which can be, plays frame, auditory tone cues, and operation failure prompt is also possible to directly return to operation Request interface.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
Fig. 4 is a kind of flow chart of authentication method shown according to an exemplary embodiment, as shown in figure 4, the authenticating party Terminal device of the method in the first situation aforementioned scene be with Fig. 3 difference of method provided, at the same to The finger print information at family is authenticated, method includes the following steps:
In step S31, user's request of user is obtained.
Wherein, the producing method of user's request omits detailed description as described in step S21 herein.
In step s 32, it requests in response to user, is believed using the fingerprint that the fingerprint sensor of terminal device obtains user Breath.
In step S33, the photo for the user that the front camera of terminal device is shot is obtained.
Wherein, step S32 and step S33 do not have sequencing.
In step S34, finger print information is authenticated.
Wherein, carrying out certification to finger print information may include: to compare finger print information and fingerprint register information, with true Determine whether finger print information passes through certification.
It before finger print identifying, needs to carry out the registration of user fingerprints information, obtains fingerprint register information, such as refer to user Line information is acquired and saves.
In step s 35, it when finger print information certification passes through, generates face and compares instruction.
When finger print information certification does not pass through, authentification failure is prompted.
In the present embodiment, first the finger print information of user is authenticated, only when finger print identifying passes through, just carries out face On the one hand authentification of message plays duplicate protection, on the other hand, avoid unnecessary face authentification of message process, alleviate terminal The workload of equipment.
In step S36, face information and the photo in face photograph album that terminal device will acquire are compared;Face to face Photo in hole information and face photograph album compares success, it is determined that face information executes step S37 by certification;Otherwise, it executes Step S38.
Wherein, step S36 is identical as step S23, omits detailed description herein.
In step S37, executes user and request corresponding operation.
Wherein, step S37 is identical as step S24, omits detailed description herein.
In step S38, authentification failure prompt is generated.
Wherein, step S38 is identical as step S25, omits detailed description herein.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
Fig. 5 is a kind of flow chart of authentication method shown according to an exemplary embodiment, as shown in figure 5, the authenticating party Terminal device and server of the method in the second case aforementioned scene, comprising the following steps:
Step S41: for terminal device in the user's request for getting user, terminal device is for shooting using front camera The photo at family obtains the face information of user.
In one implementation, terminal device generates user in response to the button operation or slip instruction of user and asks It asks;Terminal device opens the shooting that camera carries out the photo of user, shoots an at least photo.
In another implementation, terminal device generates user in response to the button operation or slip instruction of user and asks It asks;Terminal device generates shooting button, and perhaps prompting frame is shone after sensing that user clicks shooting button or prompting frame Piece shooting.
In the present embodiment, the producing method of user's request in step S41 is different from general user and requests generation side Formula, such as it is to be generated by the modes such as the first button or the first slip instruction that general user, which requests producing method, wherein first Button can be common login button (for supplying into account and password), the first slip instruction can be horizontally slip instruction, Slide up and down instruction etc..And user's request in the present embodiment is generated by the second button or the second slip instruction, the Two buttons can be newly-increased button (for acquiring the face information of user), the second slip instruction can for setting starting point, Terminal or slip instruction by predetermined position.The user's request generated by the second button or the second slip instruction can trigger Subsequent face authentification of message step.
In step S42, terminal device sends user's request to server and authentication information, authentication information include user's Face information.
In one possible implementation, authentication information is a part of user's request, and terminal device is sent out to server User is sent to request.
In alternatively possible implementation, terminal device sends user's request to server, and server receives user After request, response is sent to terminal device, is extremely taken with the authentication information that prompt terminal equipment sends the face information including user Business device.
Wherein, user's request includes but is not limited to logging request, de-registration request, information change request etc., is asked for example, logging in Ask the request that can be user login services device account.
In step S43, server is according to the face information of user request user.
Wherein, it may include: the authentication information directly acquired in user's request that server, which obtains the face information of user, from Face information is obtained in authentication information;Alternatively, the authentication information for the face information including user that receiving terminal apparatus is sent, from Face information is obtained in authentication information.
In step S44, face information and the photo in face photograph album that server will acquire are compared;Work as face Photo in information and face photograph album compares success, it is determined that face information executes step S45 by certification;Otherwise, step is executed Rapid S46.
In the present embodiment, the face information that will acquire is compared with the photo in face photograph album, comprising:
Photo in the face information that will acquire and the N number of photograph album set in face photograph album compares, and N is positive whole Number.
In this implementation, the photograph in the face information that will acquire and the N number of photograph album set in the face photograph album Piece compares, and without being compared with all photograph albums in face photograph album, on the one hand can save comparison time, on the other hand It is also possible that the only corresponding user of setting photograph album can pass through certification.
In one implementation, N number of photograph album of setting can for according to number of pictures in photograph album from when more to arranging less, The N number of photograph album for coming foremost, since in user's face photograph album, the number of pictures of usual user is more, therefore according to Above-mentioned setting can guarantee the photograph album that user can be compared in comparison.In another implementation, setting is N number of Photograph album can be all photograph albums in face photograph album.In another implementation, N number of photograph album of setting can also be that user exists Open N number of photograph album specified when face authentification of message function.
Further, this method can also include: that server gets the request that user opens face authentification of message function When, it sends and instructs to terminal, which is used to indicate user and selects photograph album for carrying out face authentification of message;Terminal is received to set The mark of the standby specified N number of photograph album returned, saves the mark for N number of photograph album that user specifies.
When the similarity of a photo in any photo and face photograph album in face information is more than preset value, really The photo determined in face information and face photograph album compares success;Otherwise, it determines face information is compared with the photo in face photograph album Failure.
Further, authentication information further includes user identifier, and server selects corresponding ground hole photograph album according to user identifier The face information of user is authenticated.The user identifier can be the user identifier with terminal device binding, or be buffered in In terminal device, because without the dynamic input of user hand.
Further, before step S44, this method further include:
Server obtains face photograph album.
In the disclosure, it includes: that terminal device uploads onto the server user picture that server, which obtains face photograph album,;Service Device classifies to photo according to the facial parts in user picture, generates face photograph album, the face photograph album according to classification results It is associated with user identifier.Wherein, server can classify to photo using the good neural network model of precondition, this In do not repeat them here.
Wherein the user picture in terminal device can be what user shot in daily life, therefore terminal device will be used Family photo upload is to server, either one step completed, is also possible to complete several times.
In step S45, server executes user and requests corresponding operation.
For example, then executing permission user login operation when user's request is logging request.
Further, after step S45, it can also operate to terminal device transmission and successfully prompt, terminal device receives Display operation successfully prompts afterwards, and operating successfully prompt can be bullet frame, auditory tone cues, operates successfully prompt and is also possible to directly turn The modes such as the page to after operating successfully.
In step S46, server sends authentification failure prompt to terminal device.
Terminal device shows that authentification failure prompts after receiving, authentification failure prompt, which can be, plays frame, auditory tone cues, and certification is lost Prompt is lost to be also possible to pass directly to the modes such as the page of request.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
Fig. 6 is a kind of flow chart of authentication method shown according to an exemplary embodiment, as shown in fig. 6, the authenticating party Terminal device and server of the method in the second case aforementioned scene be with Fig. 5 difference of method provided, The finger print information of user is authenticated simultaneously, comprising the following steps:
In step s 51, in the user's request for getting user, terminal device is obtained terminal device using fingerprint sensor Take the finger print information at family;And terminal device obtains the face information of user using the photo of front camera shooting user.
Wherein, the producing method of user's request omits detailed description as described in step S41 herein.
In step S52, terminal device sends user's request to server and authentication information, authentication information include user's Face information.
In one possible implementation, step S52 includes: that terminal device carries out local authentication to finger print information, only When certification passes through, user's request and authentication information are sent to server.
In alternatively possible implementation, step S52 includes: that terminal device sends user's request to server and recognizes Information is demonstrate,proved, authentication information further includes finger print information;Server authenticates the finger print information of authentication information, when finger print information is recognized It when card passes through, generates face and compares instruction, so that server executes subsequent operation.
In above two implementation, when finger print information certification does not pass through, authentification failure is prompted.
In the present embodiment, first the finger print information of user is authenticated, only when finger print identifying passes through, just carries out face On the one hand authentification of message plays duplicate protection, on the other hand, avoid unnecessary face authentification of message process, alleviate service The workload of device.
In step S53, server is according to the face information of user request user.
Wherein, it may include: the authentication information directly acquired in user's request that server, which obtains the face information of user, from Face information is obtained in authentication information;Alternatively, the authentication information for the face information including user that receiving terminal apparatus is sent, from Face information is obtained in authentication information.
In step S54, face information and the photo in face photograph album that server will acquire are compared;Work as face Photo in information and face photograph album compares success, it is determined that face information executes step S55 by certification;Otherwise, step is executed Rapid S56.
Wherein, step S54 is identical as step S44, omits detailed description herein.
In step S55, server executes user and requests corresponding operation.
Wherein, step S55 is identical as step S45, omits detailed description herein.
In step S56, server sends authentification failure prompt to terminal device.
Wherein, step S56 is identical as step S46, omits detailed description herein.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
Fig. 7 is a kind of block diagram of authentication device shown according to an exemplary embodiment, which can be terminal A part of equipment or terminal device, as shown in fig. 7, device includes:
First obtains module 601, and the user for obtaining user requests;
Second obtains module 602, for the face information according to user request user;
Authentication module 603, for being authenticated using face photograph album to face information;
Processing module 604 requests corresponding operation for when face information passes through certification, executing user.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
Optionally, second module 602 is obtained, is used for:
The photo for the user that the front camera of acquisition terminal device is shot.
Optionally, authentication module 603 are used for:
The face information that will acquire is compared with the photo in face photograph album;When in face information and face photograph album Photo compares successfully, it is determined that face information passes through certification;
Alternatively, authentication module 603, is used for:
Face information is sent to the server for being stored with face photograph album;The authentication response information that server returns is received, Authentication response information is used to indicate whether face information passes through certification.
Optionally, authentication module 603 are used for:
Photo in the face information that will acquire and the N number of photograph album set in face photograph album compares, and N is positive whole Number.
Wherein, the N number of photograph album set number of pictures as according to photograph album comes the N number of of foremost from when more to arranging less Photograph album.
Optionally, authentication module 603 are used for:
It obtains face and compares instruction;
When getting face comparison instruction, face information and the photo in face photograph album that will acquire are compared.
Optionally, second module 602 is obtained, is also used to:
Obtain the finger print information of user;
Authentication module 603, is also used to: finger print information authenticated,
When finger print information certification passes through, generates face and compare instruction.
Optionally, second module 602 is obtained, is used for:
The finger print information of user is obtained using the fingerprint sensor of terminal device.
Wherein, user's request includes logging request, de-registration request, information change request, unlocking request or the local text of access Part request.
Fig. 8 is a kind of block diagram of authentication device shown according to an exemplary embodiment, which can be service A part of device or server, as shown in figure 8, device includes:
First obtains module 701, and the user for obtaining user requests;
Second obtains module 702, for the face information according to user request user;
Authentication module 703, for being authenticated using face photograph album to face information;
Processing module 704 requests corresponding operation for when face information passes through certification, executing user.
In the disclosure, in the user's request for getting user, by obtaining user's face information, and face phase is used Volume authenticates face information, determines whether that executing user requests corresponding operation, on the one hand avoids user from remembering and uses On the other hand name in an account book and password bring trouble reduce the risk of leakage of user information;It is used in addition, being authenticated in the disclosure Face photograph album be the daily shooting of user or this upload photograph album after, system automatically generated, do not need user and carry out face in advance Information registering, it is user-friendly.
Optionally, second module 702 is obtained, is used for:
The authentication information that receiving terminal apparatus is sent, authentication information includes the face information of user;
Face information is obtained from authentication information.
Optionally, authentication module 703 are used for:
The face information that will acquire is compared with the photo in face photograph album;When in face information and face photograph album Photo compares successfully, it is determined that face information passes through certification.
Optionally, authentication module 703 are used for:
Photo in the face information that will acquire and the N number of photograph album set in face photograph album compares, and N is positive whole Number.
Wherein, the N number of photograph album set number of pictures as according to photograph album comes the N number of of foremost from when more to arranging less Photograph album.
Optionally, authentication module 703 are used for:
It obtains face and compares instruction;
When getting face comparison instruction, face information and the photo in face photograph album that will acquire are compared.
Optionally, second module 702 is obtained, is also used to:
Obtain the finger print information of user;
Authentication module 703, is also used to: finger print information authenticated,
When finger print information certification passes through, generates face and compare instruction.
Optionally, second module 701 is obtained, is used for:
The authentication information that receiving terminal apparatus is sent, authentication information includes the finger print information of user;
Finger print information is obtained from authentication information.
Wherein, user's request includes logging request, de-registration request, information change request, unlocking request or the local text of access Part request.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 9 is a kind of block diagram of authentication device 900 shown according to an exemplary embodiment.For example, authentication device 900 can To be mobile terminal.
Referring to Fig. 9, authentication device 900 may include following one or more components: processing component 902, memory 904, Electric power assembly 906, multimedia component 908, audio component 910, the interface 912 of input/output (I/O), sensor module 914, And communication component 916.
The integrated operation of the usually control authentication device 900 of processing component 902, such as with display, call, data are logical Letter, camera operation and record operate associated operation.Processing component 902 may include one or more processors 920 to hold Row instruction, to perform all or part of the steps of the methods described above.In addition, processing component 902 may include one or more moulds Block, convenient for the interaction between processing component 902 and other assemblies.For example, processing component 902 may include multi-media module, with Facilitate the interaction between multimedia component 908 and processing component 902.
Memory 904 is configured as storing various types of data to support the operation in equipment 900.These data are shown Example includes the instruction of any application or method for operating in authentication device 900, contact data, telephone directory number According to, message, picture, video etc..Memory 904 can by any kind of volatibility or non-volatile memory device or they Combination realize, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable Programmable read only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, quick flashing Memory, disk or CD.
Electric power assembly 906 provides electric power for the various assemblies of authentication device 900.Electric power assembly 906 may include power supply pipe Reason system, one or more power supplys and other with for authentication device 900 generate, manage, and distribute the associated component of electric power.
Multimedia component 908 includes the screen of one output interface of offer between the authentication device 900 and user. In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touches Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding The boundary of movement, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, Multimedia component 908 includes a front camera and/or rear camera.When authentication device 900 is in operation mode, as clapped When taking the photograph mode or video mode, front camera and/or rear camera can receive external multi-medium data.It is each preposition Camera and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 910 is configured as output and/or input audio signal.For example, audio component 910 includes a Mike Wind (MIC), when authentication device 900 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone It is configured as receiving external audio signal.The received audio signal can be further stored in memory 904 or via logical Believe that component 916 is sent.In some embodiments, audio component 910 further includes a loudspeaker, is used for output audio signal.
I/O interface 912 provides interface between processing component 902 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 914 includes one or more sensors, for providing the state of various aspects for authentication device 900 Assessment.For example, sensor module 914 can detecte the state that opens/closes of authentication device 900, the relative positioning of component, example As the component be authentication device 900 display and keypad, sensor module 914 can also detect authentication device 900 or The position change of 900 1 components of authentication device, the existence or non-existence that user contacts with authentication device 900, authentication device 900 The temperature change in orientation or acceleration/deceleration and authentication device 900.Sensor module 914 may include proximity sensor, be configured For detecting the presence of nearby objects without any physical contact.Sensor module 914 can also include optical sensor, Such as CMOS or ccd image sensor, for being used in imaging applications.In some embodiments, which may be used also To include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 916 is configured to facilitate the communication of wired or wireless way between authentication device 900 and other equipment. Authentication device 900 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.Show at one In example property embodiment, communication component 916 receives broadcast singal or broadcast from external broadcasting management system via broadcast channel Relevant information.In one exemplary embodiment, the communication component 916 further includes near-field communication (NFC) module, short to promote Cheng Tongxin.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, authentication device 900 can be by one or more application specific integrated circuit (ASIC), number Word signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 904 of instruction, above-metioned instruction can be executed by the processor 920 of authentication device 900 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is held by the processor of device When row, so that device enough executes a kind of authentication method, which comprises
Obtain user's request of user;
According to the face information of user described in user's request;
The face information is authenticated using face photograph album;
When the face information passes through certification, executes the user and request corresponding operation.
According to a kind of implementation of the disclosure, the face information of the user according to user's request, Include:
The photo for the user that the front camera of acquisition terminal device is shot.
It is described that the face information is authenticated using face photograph album according to another implementation of the disclosure, it wraps It includes:
The face information that will acquire is compared with the photo in the face photograph album;When the face information with it is described Photo in face photograph album compares successfully, it is determined that the face information passes through certification;
Alternatively, described authenticate the face information using face photograph album, comprising:
The face information is sent to the server for being stored with the face photograph album;Receive recognizing for the server return Response message is demonstrate,proved, the authentication response information is used to indicate whether the face information passes through certification.
Photo according to disclosure another kind implementation, in the face information that will acquire and the face photograph album It compares, comprising:
Photo in the face information that will acquire and the N number of photograph album set in the face photograph album compares, the N For positive integer.
According to another implementation of the disclosure, the N number of photograph album set as according to photograph album number of pictures from more To the N number of photograph album for when few arrangement, coming foremost.
Photograph according to another implementation of the disclosure, in the face information that will acquire and the face photograph album Piece compares, comprising:
It obtains face and compares instruction;
When getting the face and comparing instruction, photo in the face information that will acquire and the face photograph album into Row comparison.
According to another implementation of the disclosure, the acquisition face compares instruction, comprising:
Obtain the finger print information of the user;
The finger print information is authenticated;
When finger print information certification passes through, generates the face and compare instruction.
According to another implementation of the disclosure, the finger print information for obtaining the user, comprising:
The finger print information of the user is obtained using the fingerprint sensor of terminal device.
According to another implementation of the disclosure, user's request includes logging request, de-registration request, information change Request, unlocking request or access local file request.
Figure 10 is a kind of block diagram of authentication device 1900 shown according to an exemplary embodiment.For example, device 1900 can To be provided as a server.Referring to Fig.1 0, it further comprises one or more places that device 1900, which includes processing component 1922, Manage device and memory resource represented by a memory 1932, for store can by the instruction of the execution of processing component 1922, Such as application program.The application program stored in memory 1932 may include it is one or more each correspond to one The module of group instruction.In addition, processing component 1922 is configured as executing instruction, to execute authentication method, which comprises
Obtain user's request of user;
According to the face information of user described in user's request;
The face information is authenticated using face photograph album;
When the face information passes through certification, executes the user and request corresponding operation.
According to a kind of implementation of the disclosure, the face information of the user according to user's request, Include:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the face information of the user;
The face information is obtained from the authentication information.
It is described that the face information is authenticated using face photograph album according to another implementation of the disclosure, it wraps It includes:
The face information that will acquire is compared with the photo in the face photograph album;When the face information with it is described Photo in face photograph album compares successfully, it is determined that the face information passes through certification.
Photograph according to another implementation of the disclosure, in the face information that will acquire and the face photograph album Piece compares, comprising:
Photo in the face information that will acquire and the N number of photograph album set in the face photograph album compares, the N For positive integer.
According to another implementation of the disclosure, the N number of photograph album set as according to photograph album number of pictures from more To the N number of photograph album for when few arrangement, coming foremost.
Photograph according to another implementation of the disclosure, in the face information that will acquire and the face photograph album Piece compares, comprising:
It obtains face and compares instruction;
When getting the face and comparing instruction, photo in the face information that will acquire and the face photograph album into Row comparison.
According to another implementation of the disclosure, the acquisition face compares instruction, comprising:
Obtain the finger print information of the user;
The finger print information is authenticated;
When finger print information certification passes through, generates the face and compare instruction.
According to another implementation of the disclosure, the finger print information for obtaining the user, comprising:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the finger print information of the user;
The finger print information is obtained from the authentication information.
According to another implementation of the disclosure, user's request includes logging request, de-registration request, information change Request, unlocking request or access local file request.
Device 1900 can also include that a power supply module 1926 be configured as the power management of executive device 1900, and one Wired or wireless network interface 1950 is configured as device 1900 being connected to network and input and output (I/O) interface 1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (14)

1. a kind of authentication method, which is characterized in that the described method includes:
Obtain user's request of user;
According to the face information of user described in user's request;
The face information is authenticated using face photograph album;
When the face information passes through certification, executes the user and request corresponding operation;
Wherein, face photograph album is at least one photograph album for obtaining the user picture of the daily shooting of user according to face division, often The photo for including in a photograph album is the photo of the same person, and the photo in face photograph album is the photo containing face;
It is wherein, described that the face information is authenticated using face photograph album, comprising:
The face information that will acquire is compared with the photo in the face photograph album;When the face information and the face Photo in photograph album compares successfully, it is determined that the face information passes through certification;
Alternatively, described authenticate the face information using face photograph album, comprising:
The face information is sent to the server for being stored with the face photograph album;The certification that the server returns is received to ring Information is answered, the authentication response information is used to indicate whether the face information passes through certification;The authentication response information is institute The face information that server will acquire is stated to compare with the photo in the face photograph album, when the face information with it is described What the photo in face photograph album was fed back when comparing successfully;
Wherein, the face information that will acquire is compared with the photo in the face photograph album, comprising: will acquire The photo in N number of photograph album set in the face information and the face photograph album compares, the N number of photograph album set as According to number of pictures in photograph album from the N number of photograph album for when more to arranging less, coming foremost, the N is positive integer.
2. the method according to claim 1, wherein the face of the user according to user's request Hole information, comprising:
The photo for the user that the front camera of acquisition terminal device is shot;
Alternatively, the face information of the user according to user's request, comprising:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the face information of the user;
The face information is obtained from the authentication information.
3. the method according to claim 1, wherein the face information that will acquire and the face photograph album In photo compare, further includes:
It obtains face and compares instruction;
When getting the face and comparing instruction, the photo in the face information that will acquire and the face photograph album is carried out pair Than.
4. according to the method described in claim 3, it is characterized in that, the acquisition face compares instruction, comprising:
Obtain the finger print information of the user;
The finger print information is authenticated;
When finger print information certification passes through, generates the face and compare instruction.
5. according to the method described in claim 4, it is characterized in that, the finger print information for obtaining the user, comprising:
The finger print information of the user is obtained using the fingerprint sensor of terminal device;
Alternatively, the finger print information for obtaining the user, comprising:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the finger print information of the user;
The finger print information is obtained from the authentication information.
6. method according to any one of claims 1 to 5, which is characterized in that user's request includes logging request, note Pin request, information change request, unlocking request or access local file request.
7. a kind of authentication device, which is characterized in that described device includes:
First obtains module, and the user for obtaining user requests;
Second obtains module, the face information for the user according to user's request;
Authentication module, for being authenticated using face photograph album to the face information;
Processing module requests corresponding operation for when the face information passes through certification, executing the user;
Wherein, face photograph album is at least one photograph album for obtaining the user picture of the daily shooting of user according to face division, often The photo for including in a photograph album is the photo of the same person, and the photo in face photograph album is the photo containing face
Wherein, the authentication module, is used for:
The face information that will acquire is compared with the photo in the face photograph album;When the face information and the face Photo in photograph album compares successfully, it is determined that the face information passes through certification;
Alternatively, the authentication module, is used for:
The face information is sent to the server for being stored with the face photograph album;The certification that the server returns is received to ring Information is answered, the authentication response information is used to indicate whether the face information passes through certification;The authentication response information is institute The face information that server will acquire is stated to compare with the photo in the face photograph album, when the face information with it is described What the photo in face photograph album was fed back when comparing successfully;
Wherein, the face information that will acquire is compared with the photo in the face photograph album, comprising: will acquire The photo in N number of photograph album set in face information and the face photograph album compares, the N number of photograph album set as according to For number of pictures from the N number of photograph album for when more to arranging less, coming foremost, the N is positive integer in photograph album.
8. device according to claim 7, which is characterized in that described second obtains module, is used for:
The photo for the user that the front camera of acquisition terminal device is shot;
Alternatively, described second obtains module, it is used for:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the face information of the user;
The face information is obtained from the authentication information.
9. device according to claim 7, which is characterized in that the authentication module is used for:
It obtains face and compares instruction;
When getting the face and comparing instruction, the photo in the face information that will acquire and the face photograph album is carried out pair Than.
10. device according to claim 9, which is characterized in that described second obtains module, is also used to:
Obtain the finger print information of the user;
The authentication module, is also used to: the finger print information authenticated,
When finger print information certification passes through, generates the face and compare instruction.
11. device according to claim 10, which is characterized in that described second obtains module, is used for:
The finger print information of the user is obtained using the fingerprint sensor of terminal device;
Alternatively, described second obtains module, it is used for:
The authentication information that receiving terminal apparatus is sent, the authentication information includes the finger print information of the user;
The finger print information is obtained from the authentication information.
12. according to the described in any item devices of claim 7 to 11, which is characterized in that user request include logging request, De-registration request, information change request, unlocking request or access local file request.
13. a kind of authentication device, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Obtain user's request of user;
According to the face information of user described in user's request;
The face information is authenticated using face photograph album;
When the face information passes through certification, executes the user and request corresponding operation;
Wherein, face photograph album is at least one photograph album for obtaining the user picture of the daily shooting of user according to face division, often The photo for including in a photograph album is the photo of the same person, and the photo in face photograph album is the photo containing face;
It is wherein, described that the face information is authenticated using face photograph album, comprising:
The face information that will acquire is compared with the photo in the face photograph album;When the face information and the face Photo in photograph album compares successfully, it is determined that the face information passes through certification;
Alternatively, described authenticate the face information using face photograph album, comprising:
The face information is sent to the server for being stored with the face photograph album;The certification that the server returns is received to ring Information is answered, the authentication response information is used to indicate whether the face information passes through certification;The authentication response information is institute The face information that server will acquire is stated to compare with the photo in the face photograph album, when the face information with it is described What the photo in face photograph album was fed back when comparing successfully;
Wherein, the face information that will acquire is compared with the photo in the face photograph album, comprising: will acquire The photo in N number of photograph album set in face information and the face photograph album compares, the N number of photograph album set as according to For number of pictures from the N number of photograph album for when more to arranging less, coming foremost, the N is positive integer in photograph album.
14. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium includes at least one finger It enables, when at least one instruction is executed by processor, perform claim requires the described in any item authentication methods of 1-6.
CN201610357773.4A 2016-05-26 2016-05-26 Authentication method and device Active CN105871905B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610357773.4A CN105871905B (en) 2016-05-26 2016-05-26 Authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610357773.4A CN105871905B (en) 2016-05-26 2016-05-26 Authentication method and device

Publications (2)

Publication Number Publication Date
CN105871905A CN105871905A (en) 2016-08-17
CN105871905B true CN105871905B (en) 2019-09-13

Family

ID=56641233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610357773.4A Active CN105871905B (en) 2016-05-26 2016-05-26 Authentication method and device

Country Status (1)

Country Link
CN (1) CN105871905B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407780A (en) * 2016-09-08 2017-02-15 北京小米移动软件有限公司 Application running method and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779179A (en) * 2012-06-29 2012-11-14 华为终端有限公司 Method and terminal for associating information
CN103581110A (en) * 2012-07-19 2014-02-12 纽海信息技术(上海)有限公司 Face recognition login shopping system and face recognition login shopping method
CN105447150A (en) * 2015-11-26 2016-03-30 小米科技有限责任公司 Face album based music playing method and apparatus, and terminal device
CN105488495A (en) * 2016-01-05 2016-04-13 上海川织金融信息服务有限公司 Identity identification method and system based on combination of face characteristics and device fingerprint

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4606997B2 (en) * 2005-11-07 2011-01-05 富士フイルム株式会社 Printing method and printing apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779179A (en) * 2012-06-29 2012-11-14 华为终端有限公司 Method and terminal for associating information
CN103581110A (en) * 2012-07-19 2014-02-12 纽海信息技术(上海)有限公司 Face recognition login shopping system and face recognition login shopping method
CN105447150A (en) * 2015-11-26 2016-03-30 小米科技有限责任公司 Face album based music playing method and apparatus, and terminal device
CN105488495A (en) * 2016-01-05 2016-04-13 上海川织金融信息服务有限公司 Identity identification method and system based on combination of face characteristics and device fingerprint

Also Published As

Publication number Publication date
CN105871905A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN104992091B (en) Access the method, apparatus and storage medium of terminal
US9912660B2 (en) Apparatus for authenticating pairing of electronic devices and associated methods
US8364131B2 (en) Method and apparatus for providing caller recognition based on biometric data and biometric mobile device address book
CN105513179B (en) Method for unlocking, device and smart lock
WO2017031888A1 (en) Fingerprint recognition method and device
CN105654302B (en) Payment method and device
CN105631254B (en) Unlocking method and tripper
US10515224B2 (en) Method, device and storage medium for printing information
US20130290229A1 (en) Gripping-feature learning authentication system and gripping-feature learning authentication method
CN105791309B (en) A kind of method, apparatus and system executing business processing
WO2019047066A1 (en) Unmanned aerial vehicle access method and device
CN104391712B (en) Closedown method and device
CN105468767A (en) Method and device for acquiring calling card information
WO2017201874A1 (en) Method and apparatus for prompting loss of terminal
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN107205198B (en) Microphone unlocking method and device
CN106600768A (en) Intelligent door lock authentication method, device and terminal
KR100725771B1 (en) Apparatus and method of face recognition and authentication for a mobile terminal
CN108319419A (en) Start the method and device of application
CN107168821A (en) Data back up method and device
CN106331337B (en) The starting method and device of terminal peripheral hardware
CN105871905B (en) Authentication method and device
CN107993192A (en) Certificate image bearing calibration, device and equipment
CN106533918A (en) User addition prompting method and apparatus
CN109657443A (en) Determine the method and device of access right

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant