CN106998332A - Safe login method, device, storage medium and computer equipment - Google Patents

Safe login method, device, storage medium and computer equipment Download PDF

Info

Publication number
CN106998332A
CN106998332A CN201710318573.2A CN201710318573A CN106998332A CN 106998332 A CN106998332 A CN 106998332A CN 201710318573 A CN201710318573 A CN 201710318573A CN 106998332 A CN106998332 A CN 106998332A
Authority
CN
China
Prior art keywords
login
legal
logging
user terminal
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710318573.2A
Other languages
Chinese (zh)
Other versions
CN106998332B (en
Inventor
陈志新
陈晓丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dingfeng Cattle Technology Co Ltd
Original Assignee
Shenzhen Dingfeng Cattle Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Dingfeng Cattle Technology Co Ltd filed Critical Shenzhen Dingfeng Cattle Technology Co Ltd
Priority to CN201710318573.2A priority Critical patent/CN106998332B/en
Publication of CN106998332A publication Critical patent/CN106998332A/en
Application granted granted Critical
Publication of CN106998332B publication Critical patent/CN106998332B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Abstract

The present invention relates to a kind of safe login method, device, storage medium and computer equipment, wherein method includes:Logging request is verified when receiving logging request, if verifying successfully, returns and logs in banknote validation request;Characteristic of the user terminal according to the login object of login banknote validation request collection is received, determines whether login object is legal according to characteristic;If it is determined that login object is legal, then logged according to logging request, and return to the message logined successfully.The present invention to the legitimacy for logging in object by verifying, so as to prevent equipment from logging in, relative to being verified in the prior art using picture or picture validation code, technical scheme provided in an embodiment of the present invention is then safer, is difficult to be cracked;And the cost verified and produced using short message verification code in the prior art is saved, more effectively it can prevent equipment from logging in so as to log in safer.

Description

Safe login method, device, storage medium and computer equipment
Technical field
The present invention relates to network communication technology field, more particularly to a kind of safe login method, device, storage medium and Computer equipment.
Background technology
With the development of internet, the application of internet has been widely used the work in people, in life, such as people Can be logged in by equipment for surfing the net various websites, APP done shopping, work exchange etc., and traditional login mode is typically adopted Logged in username and password verification.However, internet brings us while facilitate, also allow criminal is organic can Multiply, some undesirables start with equipment for surfing the net automated log on and carry out violation operation, such as stepped on automatically by equipment for surfing the net Record website or APP seize a second murderous intention meeting, seize reward voucher, rush to purchase various bills or carry out machine and pour water.One side of these operations Face compromises the interests of normal users, while also reducing the experience of the Internet, applications.
Based on this, number of site and APP start to place obstacles logging in link, as one kind be requirement user in login it is defeated While access customer name and password, verified using picture or picture validation code, however, with the hair of picture recognition technology Exhibition, picture and picture validation code are also easy to be cracked, such as the Tensor Flow based on Google are verified to picture and picture Code is identified, or the HASH based on picture validation code uses Brute Force.Another is tested by short message verification code Card is logged in, still, for each log on request of user, is required for receiving short message verification code, its cost is higher, and if using The equipment for receiving short message verification code logs in the effect for not reaching even more then and preventing criminal from carrying out violation operation.
The content of the invention
Based on this, it is necessary to be situated between there is provided a kind of safe login method, device, storage the problem of for equipment automated log on Matter and computer equipment.
A kind of safe login method, methods described includes:
Logging request is verified when receiving logging request, if verifying successfully, returns and logs in banknote validation request;
Characteristic of the user terminal according to the login object for logging in banknote validation request collection is received, according to characteristic It is determined that whether log in object legal;
If it is determined that login object is legal, then logged according to logging request, and return to the message logined successfully.One wherein In embodiment, characteristic of the user terminal according to the login object for logging in banknote validation request collection is received, according to characteristic It is whether legal according to determination login object, including:
Receive view data of the user terminal according to the login object for logging in banknote validation request collection;
Face detection detection is carried out to view data, whether judge view data is single stereoscopic face image;
If it is determined that view data is single stereoscopic face image, it is determined that login object is legal, otherwise determine to log in object It is illegal.
In one of the embodiments, spy of the user terminal according to the login object for logging in banknote validation request collection is received Data are levied, determine whether login object is legal according to characteristic, including:
Receive view data of the user terminal according to the login object for logging in banknote validation request collection;
Face detection detection is carried out to view data, whether judge view data is single stereoscopic face image;
If it is determined that view data is single stereoscopic face image, then live body checking instruction is returned;
Receive the video data that user terminal verifies the login object of instruction acquisition according to live body;
Video data is analyzed and processed to obtain the face local data of login object;
If the face local data of login object and live body checking instruction match, it is determined that login object is legal, otherwise It is determined that it is illegal to log in object.
In one of the embodiments, Face detection detection is carried out to view data, whether judge view data is single Stereoscopic face image, including:
Face detection is carried out to view data, judges whether only include individual human face image in view data;
Whether if so, then carrying out 3D detections to individual human face image, it is stereo portrait to judge the individual human face image;
If, it is determined that view data is single stereoscopic face image, otherwise determines that view data is not single stereo man Face image.
In one of the embodiments, methods described also includes:
If returning to prompting message comprising multiple facial images or without facial image in view data;
Receive the view data that user terminal is resurveyed according to prompting message.
In one of the embodiments, logging request is verified when receiving logging request, including:
Logging request is obtained, logging request includes login username and password;
If login username and password and the log-on message of storage match, verify successfully.
A kind of secure login device, including:
Receiving module, for receiving logging request;
Correction verification module, for being verified to logging request;
Sending module, after being verified successfully for correction verification module, returns and logs in banknote validation request;
Receiving module is additionally operable to receive characteristic of the user terminal according to the login object for logging in banknote validation request collection According to;
Secure login device also includes:
Legal determining module, for determining whether login object is legal according to characteristic;
Login module, if determining that login object is legal for legal determining module, is logged according to logging request.
In one of the embodiments, legal determining module specifically for:
Receive view data of the user terminal according to the login object for logging in banknote validation request collection;
Face detection detection is carried out to view data, whether judge view data is single stereoscopic face image;
If it is determined that view data is single stereoscopic face image, it is determined that login object is legal, otherwise determine to log in object It is illegal.
A kind of computer-readable recording medium, is stored thereon with computer program, and the computer program is executed by processor The step of Shi Shixian methods as described above.
A kind of computer equipment, including memory, processor and storing can be run on a memory and on a processor Computer program, the step of realizing method as described above during computing device program.
Above-mentioned safe login method, device, storage medium and computer equipment, by being carried out to the legitimacy for logging in object Checking, so as to prevent equipment from logging in, relative to being verified in the prior art using picture or picture validation code, the present invention is implemented The technical scheme that example is provided is then safer, is difficult to be cracked;And save and tested in the prior art using short message verification code The cost demonstrate,proved and produced, can more effectively prevent that equipment from logging in so that log in safer.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of safe login method in one embodiment;
Fig. 2 is the schematic flow sheet of safe login method in one embodiment;
Fig. 3 is the schematic flow sheet of safe login method in one embodiment;
Fig. 4 is the structural representation of secure login device in one embodiment.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.
The embodiments of the invention provide a kind of safe login method, this method can apply to login service device, and Fig. 1 is one The schematic flow sheet of safe login method in individual embodiment, as shown in figure 1, this method may include steps of:
Step S101, is verified when receiving logging request to logging request, if verifying successfully, is returned and is logged in object Checking request;
Step S102, receives characteristic of the user terminal according to the login object for logging in banknote validation request collection, root Determine whether login object is legal according to this feature data;
Step S103, however, it is determined that login object is legal, then is logged according to logging request, and return to the message logined successfully.
In the present embodiment, when login service device gets logging request, it is necessary to be verified to logging request.Specifically , the information such as login username and password can be included in logging request, login service device then can be by login username and mouth Make and being matched with the log-on message of itself storage, if there is the letter matched with login username and password in log-on message Breath, then it represents that verify successfully, otherwise represents verification failure.
After login service device is verified successfully to logging request, the user terminal that login service device can also be logged in request Return and log in banknote validation request, wherein, user terminal refers to the intelligent slidings such as the smart mobile phone with camera device, tablet personal computer Dynamic terminal.In the present embodiment, verification condition can be carried by logging in banknote validation request, so that user terminal can root The correlated characteristic data for logging in object are gathered according to verification condition, login service device can then judge to log according to these characteristics Object is that equipment or live body are personal, so that it is determined that whether log in object legal.
Specifically, if it is determined that it is that live body is personal to log in object, then it represents that login object is legal, now, login service device It can then be logged according to logging request, and the message logined successfully is returned to user terminal;If it is determined that logging in object not It is that live body is personal, then logs in object and be likely to be equipment, it is determined that login object is illegal, and now, login service device is then refused Log in, and the message of login failure is returned to user terminal, so as to effectively prevent equipment from logging in.
In a specific embodiment, step S102 shown in Fig. 1 can also be realized by the following method, as shown in Fig. 2 tool Body can include:
Step S201, receives view data of the user terminal according to the login object for logging in banknote validation request collection;
In the present embodiment, verification condition can be carried in login banknote validation request, such as can be specifically logged on Server requirement user terminal provides the view data for logging in object, so that user terminal can be adopted according to the verification condition Collection logs in the view data of object, and is sent to login service device.
Step S202, carries out Face detection detection, whether judge view data is single stereoscopic face to the view data Image;
After login service device receives view data, Face detection can be carried out to the view data, judge the image Whether individual human face image is only included in data, if determining only to include individual human face figure in view data by Face detection Picture, then further in the view data individual human face image carry out 3D detections, with judge the individual human face image whether be Stereo portrait, using the photograph of planar picture, differently curved program during so as to effectively prevent that criminal from being logged in using equipment Piece is verified.
Step S203, however, it is determined that view data is single stereoscopic face image, it is determined that login object is legal, otherwise determines Log in object illegal.
If determining that the individual human face image is stereo portrait after 3D is detected, it is single that can determine view data Stereoscopic face image, now, login service device can consider that login object is legal, if determining the single people after 3D is detected Face image is not stereo portrait, then it is assumed that login object is illegal, so as to effectively prevent equipment from logging in.
In a specific embodiment, step S102 shown in Fig. 1 can also be realized by the following method, as shown in figure 3, tool Body can include:
Step S301, receives view data of the user terminal according to the login object for logging in banknote validation request collection;
Step S302, carries out Face detection detection, whether judge the view data is single stereo man to the view data Face image;
In embodiments of the present invention, step S301 and step S302 concrete methods of realizing is with embodiment of the method shown in Fig. 2 In step S201 and step S202, its implementing principle and technical effect is similar, and here is omitted.
Step S303, however, it is determined that view data is single stereoscopic face image, then return to live body checking instruction;
If specifically, determining that the individual human face image is stereo portrait after 3D is detected, picture number can be determined According to for single stereoscopic face image, now, in order to further improve the accuracy of judgement, login service device can be to user terminal Transmission live body checking instruction, live body checking instruction can be specifically that requirement login object does some random headworks, such as Shake the head, nod, stare or blink, so that video attack, the attack of improper action are prevented, further effectively to prevent from setting It is standby to log in.
Step S304, receives the video data that user terminal verifies the login object of instruction acquisition according to live body;
In the present embodiment, user terminal verifies that instruction acquisition logs in the video data of object according to live body, and will collection Video data transmission give login service device.
Step S305, is analyzed and processed to obtain the face local data of login object to video data;
Step S306, if the face local data of login object and live body checking instruction match, it is determined that log in object It is legal.
Login service device is received after video data, and the extraction of preset duration is carried out to the video data, and to extraction Data carry out the processing such as duplicate removal, so as to obtain face local data, are instructed if the face local data obtained verifies with live body Requirement match, then can determine log in object it is legal, otherwise determine log in object it is illegal.For example, if live body is tested Card instruction is that requirement login object does head shaking movement, if it is to shake the head dynamic that the face local data display obtained, which logs in object, Make, then it is assumed that the face local data of acquisition verifies that the requirement of instruction matches with live body;If the face local data obtained It is not to do head shaking movement that display, which logs in object, but is being nodded or other actions, then it is assumed that the face local data of acquisition The requirement for verifying instruction with live body is mismatched.
In still another embodiment of the process, can also be by accessing third-party server such as novel visual service platform (Face++), business's soup science and technology etc. is analyzed and processed to video data, and login service device then obtains the processing of third-party server As a result, judge whether login object is legal as stated above with reference to this result.
Further, in the above embodiment of the present invention, if determining not only to include in view data by Face detection Individual human face image, if that is, Face detection is found in view data comprising multiple facial images or without facial image, is logged in Server can return to prompting message to user terminal, so that user terminal can resurvey picture number according to prompting message According to, and the view data resurveyed is sent to login service device, login service device then can be according to Fig. 2 or Fig. 3 Method is verified that its implementing principle and technical effect is similar, and here is omitted.
The embodiment of the present invention additionally provides a kind of secure login device, and the secure login device can be arranged on login service Device end, as shown in figure 4, the secure login device 400 can include receiving module 401, correction verification module 402, sending module 403, Legal determining module 404 and login module 405.Wherein:
Receiving module 401, for receiving logging request, wherein, logging request includes login username and password.
Correction verification module 402, for being verified to logging request;
Sending module 403, banknote validation request is logged in for after correction verification module 402 is verified successfully, returning;
Therefore, receiving module 401 is additionally operable to, and receives user terminal according to the login object for logging in banknote validation request collection Characteristic;
Then secure login device also includes:
Legal determining module 404, for determining whether login object is legal according to characteristic;
Login module 405, if determining that login object is legal for legal determining module 404, is logged according to logging request;
Then sending module 403 is additionally operable to, and the message logined successfully is returned to user terminal.
In one embodiment, receiving module 401 is used for, and receives user terminal according to banknote validation is logged in and asks collection Log in the view data of object;Legal correction verification module 404 is then used for, and carries out Face detection detection to view data, judges image Whether data are single stereoscopic face image;If it is determined that view data is single stereoscopic face image, it is determined that log in object and close Method, otherwise determines that login object is illegal.
In one embodiment, receiving module 401 is used for, and receives user terminal according to banknote validation is logged in and asks collection Log in the view data of object;Legal correction verification module 404 is then used for, and carries out Face detection detection to view data, judges image Whether data are single stereoscopic face image;If it is determined that view data is single stereoscopic face image, then returns to live body checking and refer to Order;And receive the video data that user terminal verifies the login object of instruction acquisition according to live body;Video data is analyzed Handle to obtain the face local data of login object;If logging in face local data and the live body checking instruction phase of object Match somebody with somebody, it is determined that login object is legal, otherwise determine that login object is illegal.
In one embodiment, legal correction verification module 404 carries out Face detection detection to view data, judges view data Whether it is single stereoscopic face image, including:Face detection is carried out to view data, whether judged in view data only comprising single Individual facial image;Whether if so, then carrying out 3D detections to individual human face image, it is stereo portrait to judge individual human face image;If It is, it is determined that view data is single stereoscopic face image otherwise to determine that view data is not single stereoscopic face image.
In one embodiment, sending module 403 is additionally operable in view data comprising multiple facial images or without face During image, prompting message is returned;Receiving module 401 is additionally operable to receive the picture number that user terminal is resurveyed according to prompting message According to.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, and it can be arranged on login service device end, Computer program is stored thereon with, following steps can be realized when the computer program is executed by processor:Receiving login please Logging request is verified when asking, if verifying successfully, returns and logs in banknote validation request;User terminal is received according to login The characteristic of the login object of banknote validation request collection, determines whether login object is legal according to characteristic;If it is determined that Log in object legal, then logged according to logging request, and return to the message logined successfully.
In one embodiment, characteristic of the user terminal according to the login object for logging in banknote validation request collection is received According to, determine whether login object is legal according to characteristic, including:Receive user terminal and gathered according to banknote validation request is logged in Login object view data;Face detection detection is carried out to view data, whether judge view data is single stereo man Face image;If it is determined that view data is single stereoscopic face image, it is determined that login object is legal, otherwise determine to log in object not It is legal.
In one embodiment, characteristic of the user terminal according to the login object for logging in banknote validation request collection is received According to, determine whether login object is legal according to characteristic, including:Receive user terminal and gathered according to banknote validation request is logged in Login object view data;Face detection detection is carried out to view data, whether judge view data is single stereo man Face image;If it is determined that view data is single stereoscopic face image, then live body checking instruction is returned;User terminal is received according to work The video data of the login object of experience card instruction acquisition;Video data is analyzed and processed to obtain the face of login object Local data;If the face local data of login object and live body checking instruction match, it is determined that login object is legal, otherwise It is determined that it is illegal to log in object.
In one embodiment, Face detection detection is carried out to view data, whether judge view data is single solid Facial image, including:Face detection is carried out to view data, judges whether only include individual human face image in view data;If It is 3D detections then to be carried out to individual human face image, whether judge individual human face image is stereo portrait;If, it is determined that image Data are single stereoscopic face images, otherwise determine that view data is not single stereoscopic face image.
In one embodiment, if comprising multiple facial images or during without facial image in view data, returning to prompting Message;Receive the view data that user terminal is resurveyed according to prompting message.
In one embodiment, before logging request is received, including:Logging request is obtained, wherein, logging request includes Login username and password;If login username and password and the log-on message of storage match, verify successfully.
The embodiment of the present invention additionally provides a kind of computer equipment, and it can be arranged on login service device end, the computer Equipment can include first memory, first processor and store on the first memory and can be run on first processor Computer program, wherein, following steps can be realized during first processor configuration processor:To logging in when receiving logging request Request is verified, if verifying successfully, is returned and is logged in banknote validation request;Receive user terminal and asked according to banknote validation is logged in The characteristic of the login object of collection is sought, determines whether login object is legal according to characteristic;Closed if it is determined that logging in object Method, then log according to logging request, and returns to the message logined successfully.
In one embodiment, characteristic of the user terminal according to the login object for logging in banknote validation request collection is received According to, determine whether login object is legal according to characteristic, including:Receive user terminal and gathered according to banknote validation request is logged in Login object view data;Face detection detection is carried out to view data, whether judge view data is single stereo man Face image;If it is determined that view data is single stereoscopic face image, it is determined that login object is legal, otherwise determine to log in object not It is legal.
In one embodiment, characteristic of the user terminal according to the login object for logging in banknote validation request collection is received According to, determine whether login object is legal according to characteristic, including:Receive user terminal and gathered according to banknote validation request is logged in Login object view data;Face detection detection is carried out to view data, whether judge view data is single stereo man Face image;If it is determined that view data is single stereoscopic face image, then live body checking instruction is returned;User terminal is received according to work The video data of the login object of experience card instruction acquisition;Video data is analyzed and processed to obtain the face of login object Local data;If the face local data of login object and live body checking instruction match, it is determined that login object is legal, otherwise It is determined that it is illegal to log in object.
In one embodiment, Face detection detection is carried out to view data, whether judge view data is single solid Facial image, including:Face detection is carried out to view data, judges whether only include individual human face image in view data;If It is 3D detections then to be carried out to individual human face image, whether judge individual human face image is stereo portrait;If, it is determined that image Data are single stereoscopic face images, otherwise determine that view data is not single stereoscopic face image.
In one embodiment, if comprising multiple facial images or during without facial image in view data, returning to prompting Message;Receive the view data that user terminal is resurveyed according to prompting message.
In one embodiment, before logging request is received, including:Logging request is obtained, wherein, logging request includes Login username and password;If login username and password and the log-on message of storage match, verify successfully.
The embodiment of the present invention additionally provides a kind of user terminal, and the user terminal can include second memory, at second Manage device and be stored in the computer program that can be run on second memory and in second processor, wherein, second processor Following steps can be realized during configuration processor:
Logging request is sent to login service device, so that login service device is verified according to logging request;In this implementation In example, the information such as login username and password can be included in logging request.Login service device is received to verify into logging request The login banknote validation request returned after work(;According to the characteristic for logging in banknote validation request collection login object;To login Server sends characteristic, so that login service device determines whether login object is legal according to characteristic;Receive and log in clothes Business device determines to log in the legal rear message logined successfully returned of object.
The embodiment of the present invention is based on face recognition technology, and the method verified using live body prevents equipment from logging in, relative to existing Having in technology uses picture or picture validation code to be verified, and technical scheme provided in an embodiment of the present invention is then safer, no Easily it is cracked;And the cost verified and produced using short message verification code in the prior art is saved, can be more effectively Prevent equipment from logging in.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey Sequence upon execution, performs the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. a kind of safe login method, it is characterised in that including:
The logging request is verified when receiving logging request, if verifying successfully, returns and logs in banknote validation request;
Characteristic of the user terminal according to the login object of the login banknote validation request collection is received, according to the feature Data determine whether the login object is legal;
If it is determined that the login object is legal, then logged according to the logging request, and return to the message logined successfully.
2. safe login method according to claim 1, it is characterised in that the reception user terminal is logged according to described The characteristic of the login object of banknote validation request collection, determines whether the login object closes according to the characteristic Method, including:
Receive view data of the user terminal according to the login object of the login banknote validation request collection;
Face detection detection is carried out to described image data, whether judge described image data is single stereoscopic face image;
If it is determined that described image data are single stereoscopic face image, it is determined that the login object is legal, otherwise determine described Log in object illegal.
3. safe login method according to claim 1, it is characterised in that the reception user terminal is logged according to described The characteristic of the login object of banknote validation request collection, determines whether the login object closes according to the characteristic Method, including:
Receive view data of the user terminal according to the login object of the login banknote validation request collection;
Face detection detection is carried out to described image data, whether judge described image data is single stereoscopic face image;
If it is determined that described image data are single stereoscopic face image, then live body checking instruction is returned;
Receive the video data that the user terminal verifies the login object of instruction acquisition according to the live body;
The video data is analyzed and processed to obtain the face local data of login object;
If the face local data for logging in object matches with live body checking instruction, it is determined that the login object is legal, Otherwise determine that the login object is illegal.
4. the safe login method according to Claims 2 or 3, it is characterised in that described that pedestrian is entered to described image data Face detection and localization, whether judge described image data is single stereoscopic face image, including:
Face detection is carried out to described image data, judges whether only include individual human face image in described image data;
Whether if so, then carrying out 3D detections to the individual human face image, it is stereo portrait to judge the individual human face image;
If, it is determined that described image data are single stereoscopic face images, and it is not single vertical otherwise to determine described image data Body facial image.
5. safe login method according to claim 4, it is characterised in that also include:
If returning to prompting message comprising multiple facial images or without facial image in described image data;
Receive the view data that the user terminal is resurveyed according to the prompting message.
6. safe login method according to claim 1, it is characterised in that described to be stepped on to described when receiving logging request Record request is verified, including:
Logging request is obtained, the logging request includes login username and password;
If the login username and password and the log-on message of storage match, verify successfully.
7. a kind of secure login device, it is characterised in that including:
Receiving module, for receiving logging request;
Correction verification module, for being verified to the logging request;
Sending module, after being verified successfully for the correction verification module, returns and logs in banknote validation request;
The receiving module is additionally operable to receive spy of the user terminal according to the login object of the login banknote validation request collection Levy data;
The secure login device also includes:
Legal determining module, for determining whether the login object is legal according to the characteristic;
Login module, if determining that the login object is legal for the legal determining module, is stepped on according to the logging request Record.
8. secure login device according to claim 7, it is characterised in that the legal determining module specifically for:
Receive view data of the user terminal according to the login object of the login banknote validation request collection;
Face detection detection is carried out to described image data, whether judge described image data is single stereoscopic face image;
If it is determined that described image data are single stereoscopic face image, it is determined that the login object is legal, otherwise determine described Log in object illegal.
9. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program is located Manage and realized when device is performed such as the step of any one of claim 1~6 methods described.
10. a kind of computer equipment, including memory, processor and storage can be run on a memory and on a processor Computer program, it is characterised in that the side as described in any one of claim 1~6 is realized during the computing device described program The step of method.
CN201710318573.2A 2017-05-08 2017-05-08 Secure login method and device, storage medium and computer equipment Expired - Fee Related CN106998332B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710318573.2A CN106998332B (en) 2017-05-08 2017-05-08 Secure login method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710318573.2A CN106998332B (en) 2017-05-08 2017-05-08 Secure login method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN106998332A true CN106998332A (en) 2017-08-01
CN106998332B CN106998332B (en) 2020-06-30

Family

ID=59435675

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710318573.2A Expired - Fee Related CN106998332B (en) 2017-05-08 2017-05-08 Secure login method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN106998332B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508520A (en) * 2018-11-10 2019-03-22 南昌科悦企业管理咨询有限公司 A kind of Security Login System of computer
CN109948408A (en) * 2017-12-21 2019-06-28 三星电子株式会社 Activity test method and equipment
CN112165594A (en) * 2020-09-28 2021-01-01 平安普惠企业管理有限公司 Service handling method and device based on video communication and computer equipment
CN112818312A (en) * 2021-02-02 2021-05-18 江苏欧软信息科技有限公司 MES system login authentication method based on face recognition technology and MES system
US11971924B2 (en) 2017-12-21 2024-04-30 Samsung Electronics Co., Ltd. Liveness test method and apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1834986A (en) * 2005-03-15 2006-09-20 欧姆龙株式会社 Face authentication apparatus, contrl method and program, electronic device having the same, and program recording medium
CN105023010A (en) * 2015-08-17 2015-11-04 中国科学院半导体研究所 Face living body detection method and system
CN106101136A (en) * 2016-07-22 2016-11-09 飞天诚信科技股份有限公司 The authentication method of a kind of biological characteristic contrast and system
CN106203372A (en) * 2016-07-19 2016-12-07 奇酷互联网络科技(深圳)有限公司 Biopsy methods based on eyes, device and terminal unit
CN106302330A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 Auth method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1834986A (en) * 2005-03-15 2006-09-20 欧姆龙株式会社 Face authentication apparatus, contrl method and program, electronic device having the same, and program recording medium
CN106302330A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 Auth method, device and system
CN105023010A (en) * 2015-08-17 2015-11-04 中国科学院半导体研究所 Face living body detection method and system
CN106203372A (en) * 2016-07-19 2016-12-07 奇酷互联网络科技(深圳)有限公司 Biopsy methods based on eyes, device and terminal unit
CN106101136A (en) * 2016-07-22 2016-11-09 飞天诚信科技股份有限公司 The authentication method of a kind of biological characteristic contrast and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948408A (en) * 2017-12-21 2019-06-28 三星电子株式会社 Activity test method and equipment
CN109948408B (en) * 2017-12-21 2023-08-29 三星电子株式会社 Activity test method and apparatus
US11971924B2 (en) 2017-12-21 2024-04-30 Samsung Electronics Co., Ltd. Liveness test method and apparatus
CN109508520A (en) * 2018-11-10 2019-03-22 南昌科悦企业管理咨询有限公司 A kind of Security Login System of computer
CN112165594A (en) * 2020-09-28 2021-01-01 平安普惠企业管理有限公司 Service handling method and device based on video communication and computer equipment
CN112818312A (en) * 2021-02-02 2021-05-18 江苏欧软信息科技有限公司 MES system login authentication method based on face recognition technology and MES system

Also Published As

Publication number Publication date
CN106998332B (en) 2020-06-30

Similar Documents

Publication Publication Date Title
AU2019202631B2 (en) Toggling biometric authentication
US20200211121A1 (en) Credit-based claim settlement implementing method and device
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
CN104903904B (en) Bar code authentication for resource request
CN106779716B (en) Authentication method, device and system based on block chain account address
US9672523B2 (en) Generating barcode and authenticating based on barcode
CN106998332A (en) Safe login method, device, storage medium and computer equipment
US20150220933A1 (en) Methods and systems for making secure online payments
CN107729727B (en) Real-name authentication method and device for account
CN105553947A (en) Methods and devices for finding account back, protecting account security and preventing account theft
TW202008197A (en) Identity verification method and device and account information modification method and device
CN109784031B (en) Account identity verification processing method and device
CN104036557A (en) B/S architecture based distributed face recognition attendance system and attendance checking method thereof
JP6742907B2 (en) Identification and/or authentication system and method
CN107786487B (en) Information authentication processing method, system and related equipment
CN106453205A (en) Identity verification method and identity verification device
CN104184709A (en) Verification method, device, server, service data center and system
CN110247898B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
CN104639521A (en) Application safety verification method and system, application server and application client
CN108306886A (en) A kind of auth method, device and storage medium
CN107786491A (en) account number verification method and device
KR101027228B1 (en) User-authentication apparatus for internet security, user-authentication method for internet security, and recorded medium recording the same
CN111385272A (en) Weak password detection method and device
CN110647737B (en) Enterprise user security authentication method and device in warehouse receipt system and electronic equipment
CN108460263A (en) Information sharing method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200630

Termination date: 20210508