CN107786487B - Information authentication processing method, system and related equipment - Google Patents
Information authentication processing method, system and related equipment Download PDFInfo
- Publication number
- CN107786487B CN107786487B CN201610712437.7A CN201610712437A CN107786487B CN 107786487 B CN107786487 B CN 107786487B CN 201610712437 A CN201610712437 A CN 201610712437A CN 107786487 B CN107786487 B CN 107786487B
- Authority
- CN
- China
- Prior art keywords
- image information
- user
- information
- target
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/166—Detection; Localisation; Normalisation using acquisition arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses an information authentication processing method, an information authentication processing system and related equipment, wherein the method comprises the following steps: the client generates an account identification authentication request, acquires current image information of the target object according to the account identification authentication request, and sends the current image information to the server when detecting that the target object is a living object; when the server finds out user image information matched with the current image information in the user image information base, the target object is determined to be a legal user, an account number authority opening instruction is generated, target identity identification information corresponding to the matched user image information is obtained in the user image information base according to the account number authority opening instruction, a target account number bound with the target identity identification information is obtained, and the use authority of the target object to the target account number is opened. By adopting the method and the device, the authentication time can be shortened, and the user to which the account belongs can be accurately judged, so that the personal privacy and personal property of the stolen user can be guaranteed.
Description
Technical Field
The present invention relates to the field of internet technologies, and in particular, to an information authentication processing method, system, and related device.
Background
Instant Messaging (IM) is the most popular communication method on the internet at present, and various Instant communication software is developed endlessly; service providers are also offering more and more rich messaging service features and, therefore, more and more users are using instant messaging applications. Each user has one or more unique accounts of the instant messaging application, and the instant messaging application can be logged in through the accounts to realize various communication service functions.
However, various viruses exist in the internet at the same time, and some viruses can have the function of stealing numbers, that is, passwords corresponding to the accounts of the instant messaging application of the user are cracked by the viruses, so that the accounts can be utilized by illegal users. At present, the method for a user to retrieve his account is generally as follows: the user provides related information (such as friend account information) to the manual service center, and when the manual service center determines that the account belongs to the user according to the related information, the user right of using the account can be re-opened, that is, the user can successfully retrieve the own account. However, the manual service center is always based on manual analysis, so the analysis period may be relatively long, and it is likely that an illegal user has already obtained the private information and property information of a stolen user in the relatively long time period, thereby further causing the personal privacy and personal property of the stolen user to be unable to be guaranteed. And when the illegal user can also obtain the relevant information (such as friend account information) of the stolen user, the illegal user can also mention complaints to the manual service center through the relevant information, and at the moment, the manual service center can hardly accurately judge which user the account belongs to, so that the personal interests of the stolen user cannot be well protected.
Disclosure of Invention
Embodiments of the present invention provide an information authentication processing method, system, and related device, which can shorten authentication duration, and can accurately determine a user to which an account belongs, so that personal privacy and personal property of a stolen user can be guaranteed.
The first aspect of the present invention provides an information authentication processing method, including:
the client generates an account identification and authentication request and acquires the current image information of a target object according to the account identification and authentication request;
when the client detects that the target object is a living object, the current image information is sent to a server;
when the server searches user image information matched with the current image information in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
and the server acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account authority opening instruction, acquires a target account bound with the target identity identification information, and opens the use authority of the target object to the target account.
The second aspect of the present invention provides an information authentication processing method, including:
the client generates an account identification and authentication request and acquires the current image information of a target object according to the account identification and authentication request;
when the client detects that the target object is a living object, the current image information is sent to a server, so that the server determines that the target object is a legal user when searching out user image information matched with the current image information in a preset user image information base, acquires target identity identification information corresponding to the matched user image information in the user image information base, acquires a target account number bound with the target identity identification information, and opens the use authority of the target object on the target account number.
A third aspect of the present invention provides an information authentication processing method, including:
the server receives current image information of a target object sent by a client; the current image information is sent by the client when the target object is detected to be a living object;
when the server searches user image information matched with the current image information in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
and the server acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account authority opening instruction, acquires a target account bound with the target identity identification information, and opens the use authority of the target object to the target account.
A fourth aspect of the present invention provides a client, including:
the acquisition module is used for generating an account identification authentication request and acquiring the current image information of the target object according to the account identification authentication request;
and the sending module is used for sending the current image information to a server when the target object is detected to be a living object, so that the server determines that the target object is a legal user when searching out user image information matched with the current image information in a preset user image information base, acquires target identity identification information corresponding to the matched user image information in the user image information base, acquires a target account number bound with the target identity identification information, and opens the use authority of the target object on the target account number.
A fifth aspect of the present invention provides a server, comprising:
the receiving module is used for receiving the current image information of the target object sent by the client; the current image information is sent by the client when the target object is detected to be a living object;
the determining and generating module is used for determining the target object as a legal user and generating an account number authority opening instruction when the user image information matched with the current image information is found in a preset user image information base;
and the authority opening module is used for acquiring target identity identification information corresponding to the matched user image information in the user image information base according to the account authority opening instruction, acquiring a target account bound with the target identity identification information, and opening the use authority of the target object to the target account.
A sixth aspect of the present invention provides an information authentication processing system, including a client and a server, where the client is the client provided in the fourth aspect of the present invention, and the server is the server provided in the fifth aspect of the present invention.
The client side generates the account number identification and authentication request, collects the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server when the target object is detected to be a living object, so that the obtained current image information can be guaranteed to be the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a network architecture provided by an embodiment of the present invention;
fig. 2 is a schematic flowchart of an information authentication processing method according to an embodiment of the present invention;
fig. 3 is a timing diagram illustrating an information authentication processing method according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of another information authentication processing method according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of another information authentication processing method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a client according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a server according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of another client according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of another server provided in the embodiment of the present invention;
fig. 10 is a schematic structural diagram of an information authentication processing system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a network architecture according to an embodiment of the present invention is provided, where the network architecture may include a server and a plurality of clients, and each client may be connected to the server through a network. In a specific application scenario, when a user corresponding to any one of the clients in fig. 1 finds that an account of the user is stolen, the user may initiate an account identification and authentication request through the client, and the client may acquire current image information (i.e., a current front-face image) of the user according to the account identification and authentication request; when the client detects that the user is a living object (that is, the user does not use a photo or a video to enable the client to acquire the current image information, that is, the client acquires the current image information of the user), the client may send the current image information to a server; when the server finds out the user image information matched with the current image information in a preset user image information base, the server shows that the user binds the account of the user with personal information (such as an identity card head portrait and an identity card number of the user) in advance, and the server can determine that the user is a legal user and generate an account permission opening instruction; the server further acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account number permission opening instruction, acquires a target account number bound with the target identity identification information, and opens the use permission of the user on the target account number. Because this user only needs the face image of uploading oneself, the server can determine whether target account belongs to this user through this user's face image, consequently, the authentication duration is shorter to can make this user find back oneself stolen account number sooner, can obtain the guarantee with this user's personal privacy and personal property. And because the front face images of different users are different from each other, the user to which the account belongs can be accurately judged, and the personal benefits of the stolen user are further protected.
Fig. 2 is a schematic flow chart of an information authentication processing method according to an embodiment of the present invention, where the method includes:
s201, a client generates an account identification and authentication request and acquires current image information of a target object according to the account identification and authentication request;
specifically, the client may be a client corresponding to an instant messaging application, and the account requested to be authenticated by the account identification and authentication request may be an account of the instant messaging application. The specific application scenario may be as follows: when a user finds that the account of the instant messaging application of the user is stolen (namely the user cannot log in the account), the user can retrieve the account through the client, and at the moment, the client can generate an account identification authentication request according to the click operation of the user on an account authentication function key. After the client generates the account identification authentication request, the client can acquire the current image information of the target object according to the account identification authentication request. For example, the client may start a camera and notify a user that photographing is required to acquire user avatar information, so that the client may acquire the user avatar information (i.e., current image information of the target object) acquired by the camera.
Optionally, in order to avoid that an illegal user successfully performs account identification authentication due to the fact that current image information acquired by the camera is a photo or a video, the client may detect whether the target object is a living object, that is, whether the target object is a real person. The client can display the acquired current image information on a screen in real time, and can also display a preset moving track route on the screen, at the moment, the target object (such as a user) can make corresponding actions according to the preset moving track route, so that the client can capture the moving track route of the target object through a camera and judge whether the moving track route of the target object is the same as the preset moving track route; if the judgment result is yes, determining that the target object is a living object, namely, the target object is a real user, but not a photo or a video which cannot make a corresponding movement track route; if not, determining that the target object is not a living object, and displaying prompt information of authentication failure so as to prevent an illegal user from identifying and authenticating through an account by using a photo or a video containing a head portrait of the legal user. For example, the client may control a screen to display a preset movement track route as "nod down", and then the client tracks the movement track route of the nose of the target object to determine whether the target object performs the same action as "nod down", and if so, the target object is determined to be a living object, otherwise, the target object is determined not to be a living object. Optionally, the client may also determine whether the target object is a living object through some living detection algorithms, for example, the living detection algorithms may include: a living human face detection algorithm based on gray level co-occurrence matrix and wavelet analysis, an iris living detection algorithm based on convolutional neural network, and the like.
S202, when the client detects that the target object is a living object, the current image information is sent to a server;
specifically, when the client detects that the target object is a living object, the client may add the current image information to the account identification and authentication request, and send the account identification and authentication request carrying the current image information to a server, where the current image information may be a front view of the target object.
S203, when the server searches out user image information matched with the current image information in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
specifically, after the server receives an account identification authentication request carrying the current image information, the server may search, according to the account identification authentication request, whether user image information matched with the current image information exists in a preset user image information base, if the user image information matched with the current image information exists, it is determined that the target object is a valid user, and the server may further generate an account permission opening instruction, that is, the server is to retrieve the stolen account for the valid user.
S204, the server acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account permission opening instruction, acquires a target account bound with the target identity identification information, and opens the use permission of the target object to the target account;
specifically, the user image information base includes not only user image information corresponding to a plurality of legal users, but also identification information corresponding to the user image information (i.e., identification card information of each legal user, such as a user name, an identification card number, etc.), and further includes an account number (i.e., an account number of an instant messaging application of each legal user) bound to each identification information. Therefore, the server can obtain the target identity identification information corresponding to the matched user image information in the user image information base according to the account permission opening instruction, obtain the target account bound with the target identity identification information, and open the use permission of the target object to the target account. The process of opening the use permission may be: the server sends a password reset page to the client, so that the client can set a new password of the target account without an original password, and the target object (namely, a legal user) can continue to use the target account based on the new password (namely, the use permission of the target account is opened).
Preferably, before step S201, the server and the client may bind a corresponding account for the user together, and store information related to the bound account in the user image information base, where a specific process of pre-binding an account is as follows: the client can generate an account binding request corresponding to a target user, acquire user image information and identification object image information (such as positive and negative images of an identification card) of the target user according to the account binding request, and acquire input target user information (such as a name and an identification card number manually input by the target user); the client sends the account number requested to be bound, the user image information and the identity identification object image information of the target user and the target user information to the server; when the server detects that the user image information of the target user is matched with the identification object image information and the target user information is matched with the identification information in the identification object image information, the server binds the account number requested to be bound with the identification information; and the server stores the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account requested to be bound and the identity identification information in the user image information base. The target user information comprises a target user name and an identification number. Since a user can bind an account in advance through the client and the server, and store information related to the bound account in the user image information base, when the account of the user is stolen, the user can retrieve the account of the user through the steps S201 to S204.
The client side generates the account number identification and authentication request, collects the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server when the target object is detected to be a living object, so that the obtained current image information can be guaranteed to be the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Referring to fig. 3 again, a timing diagram of an information authentication processing method according to an embodiment of the present invention is shown, where the method includes:
s301, the client generates an account binding request corresponding to a target user, acquires user image information and identity identification object image information of the target user according to the account binding request, and acquires input target user information;
specifically, when a target user wants to perform security binding on an account of the target user, the target user can click an account binding function key in the client, so that the client can generate an account binding request corresponding to the target user, the client can further acquire user image information and identity object image information of the target user according to the account binding request, and acquire input target user information, wherein the target user information can include a target user name and an identity number. For example, when a target user wants to perform secure binding on an account of the target user, the target user may click an account binding function key in the client, so that the client may generate an account binding request corresponding to the target user, the client may further control a camera to acquire a current front-face image of the target user according to the account binding request, and display the acquired current front-face image on a terminal interface, and the client may store the acquired current front-face image (which is equivalent to that the target user performs self-shooting through the terminal); meanwhile, the client can also display prompt information for acquiring an identity card image (the identity card image is the image information of the identity identification object) on a terminal screen according to the account binding request, so that the target user can acquire a front image and a back image of the identity card through a camera of the terminal, and the client can acquire the front image and the back image of the identity card (namely acquire the image information of the identity identification object); the client can also display a target user information input box on a terminal screen according to the account binding request, and the target user can input a name and an identity card number (namely the target user information) in the displayed target user information input box, so that the client can acquire the input name and the input identity card number.
S302, the client sends the account number requested to be bound, the user image information and the identity identification object image information of the target user and the target user information to the server;
specifically, the client may further send the account requested to be bound by the account binding request, the acquired user image information and the acquired identification object image information of the target user, and the target user information to the server.
Optionally, before the step of sending, by the client, the account, the user image information of the target user, the identification object image information, and the target user information, which are requested to be bound, to the server, the client may further detect a first definition of the acquired user image information of the target user, and detect a second definition of the acquired identification object image information; when the first definition is smaller than a preset definition threshold value, re-acquiring the user image information of the target user; and when the second definition is smaller than the definition threshold value, the image information of the identity identification object is obtained again.
S303, when the server detects that the user image information of the target user is matched with the identification object image information and the target user information is matched with the identification information in the identification object image information, the server binds the account number requested to be bound with the identification information;
specifically, after the server receives the account number requested to be bound, the user image information of the target user, the identification object image information, and the target user information, the server may extract avatar information (such as a user avatar in an identification card) in the identification object image information, and determine whether the user image information of the target user matches the avatar information (i.e., determine whether the user image information of the target user is the same person); if the user image information of the target user is judged not to be matched with the head portrait information, sending account binding failure prompt information to the client; if the user image information of the target user is matched with the head portrait information, determining that the user image information of the target user is matched with the identification object image information, and further judging whether the target user name and the identification number are the same as the identification information in the identification object image information (namely judging whether the name input by the user is the same as the name in the identification card image and whether the identification number input by the user is the same as the identification number in the identification card image); if the identity identification information is judged not to be the same as the identity identification information, sending account binding failure prompt information to the client; and if the identification information is the same as the identification information, determining that the target user information is matched with the identification information in the identification object image information. Before judging whether the target user information is matched with the identity identification information in the identity identification object image information, the server can also judge whether the target user name in the target user information is matched with the identity identification number or not, namely, whether the name corresponding to the identity card number input by the user is the name input by the user or not is judged, if so, whether the target user information is matched with the identity identification information in the identity identification object image information is further judged, and if not, account binding failure prompt information can be directly sent to the client.
When the server detects that the user image information of the target user is matched with the identification object image information and the target user information is matched with the identification information in the identification object image information, the server can bind the account number requested to be bound with the identification information.
S304, the server stores the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account requested to be bound and the identity identification information in the user image information base;
specifically, since the server may store the user image information of the target user, the corresponding relationship between the user image information of the target user and the identification information, and the binding relationship between the account requested to be bound and the identification information in the user image information base, when the target user subsequently finds out the stolen account, the server may find out the user image information of the target user from the user image information base, further find out the identification information corresponding to the user image information of the target user, and further find out the account having the binding relationship with the identification information corresponding to the user image information of the target user, where the account is the account of the target user, that is, the target user may successfully find out the account of the target user.
The steps S301 to S304 are a preset account binding process, that is, the steps S301 to S304 may not be repeated after being executed once.
S305, the client generates an account identification authentication request and acquires the current image information of the target object according to the account identification authentication request;
the specific implementation manner of the step S305 may refer to S201 in the embodiment corresponding to fig. 2, which is not described herein again.
S306, the client displays a preset moving track route, acquires the moving track route of the target object, and judges whether the moving track route of the target object is the same as the preset moving track route;
specifically, after the client acquires the current image information of the target object, the client may display a preset movement track route in a terminal screen, acquire the movement track route of the target object, and determine whether the movement track route of the target object is the same as the preset movement track route. For example, the client may recognize a three-dimensional coordinate of a user (i.e., the target object) through a camera, the preset movement track route may be a movement track of a movable icon displayed on a terminal screen, that is, when the movable icon moves from a point a in the middle of the screen to a point B below the screen, the user may move his nose along with the movable icon according to the user image displayed on the screen, that is, the user performs a head nodding action, at this time, the client may track the movement track route of the user's nose according to the three-dimensional coordinate and determine whether the movement track route of the nose matches the movement track route of the movable icon, if yes, the user is determined as a living object, otherwise, it may be determined that the current image information of the target object is not based on an image captured by a real person, but may be current image information obtained by capturing a photograph or video. Of course, the preset movement track route is not limited to moving up and down, and may also be moving left and right, and may also be other movement tracks, which are not described herein again.
S307, if the judgment result is no, the client determines that the target object is not a living object, and displays prompt information of authentication failure;
specifically, if the determination in step S306 is negative, the client determines that the target object is not a living object, displays an authentication failure prompt message, and terminates the account identification authentication process. When the target object is not a living object, it may be that an illegal user wants to make the current image information obtained by the client similar to the front face image of the legal user through a photo or a video, so in this case, the client may directly display the authentication failure prompt information to prevent the illegal user from also obtaining the usage right of the target account.
S308, if the judgment result is yes, the client determines that the target object is a living object, and sends the current image information to a server;
specifically, if the determination in step S306 is yes, the client may determine that the target object is a living object, and send the current image information to the server;
s309, when the server searches out user image information matched with the current image information in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
s310, the server acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account permission opening instruction, acquires a target account bound with the target identity identification information, and opens the use permission of the target object to the target account;
the specific implementation manner of the steps S309 and S310 may refer to the steps S203 and S204 in the corresponding embodiment of fig. 2, which is not described herein again.
The client side generates the account number identification and authentication request, collects the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server when the target object is detected to be a living object, so that the obtained current image information can be guaranteed to be the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Referring to fig. 4 again, it is a schematic flow chart of another information authentication processing method provided in the embodiment of the present invention, where the method may include:
s401, a client generates an account number identification and authentication request and acquires current image information of a target object according to the account number identification and authentication request;
s402, when the client detects that the target object is a living object, the current image information is sent to a server, so that the server determines that the target object is a legal user when searching out user image information matched with the current image information in a preset user image information base, acquires target identity identification information corresponding to the matched user image information in the user image information base, acquires a target account number bound with the target identity identification information, and opens the use authority of the target object on the target account number.
The specific implementation manner of the steps S401 and S402 may refer to the steps S201 and S202 in the corresponding embodiment of fig. 2, which is not described herein again.
Optionally, before the step S401, the client may further generate an account binding request corresponding to a target user, acquire user image information and identity object image information of the target user according to the account binding request, and acquire the input target user information; and sending the account number requested to be bound, the user image information and the identity identification object image information of the target user and the target user information to the server, so that the server binds the account number requested to be bound with the identity identification information, and stores the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account number requested to be bound and the identity identification information in the user image information base.
The client side generates the account number identification and authentication request, collects the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server when the target object is detected to be a living object, so that the obtained current image information can be guaranteed to be the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Referring to fig. 5 again, it is a schematic flowchart of another information authentication processing method provided in the embodiment of the present invention, where the method may include:
s501, a server receives current image information of a target object sent by a client; the current image information is sent by the client when the target object is detected to be a living object;
s502, when the server searches out user image information matched with the current image information in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
s503, the server acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account permission opening instruction, acquires a target account bound with the target identity identification information, and opens the use permission of the target object to the target account.
The specific implementation manner of steps S501 to S503 may refer to steps S202 to S204 in the embodiment corresponding to fig. 2, which is not described herein again.
Optionally, before the step S501, the server may further receive an account, user image information of a target user, image information of an identity object, and target user information sent by the client; the account is an account requested to be bound when the client generates a binding request to the account; when the server detects that the user image information of the target user is matched with the identification object image information and the target user information is matched with the identification information in the identification object image information, binding the account with the identification information; the server further stores the user image information of the target user, the corresponding relation between the user image information of the target user and the identity information, and the binding relation between the account requested to be bound and the identity information in the user image information base.
The client side generates the account number identification and authentication request, collects the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server when the target object is detected to be a living object, so that the obtained current image information can be guaranteed to be the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Fig. 6 is a schematic structural diagram of a client according to an embodiment of the present invention. The client 1 may include: the system comprises a preset information acquisition module 11, a definition detection module 12, a sending module 13, an acquisition module 14, a route judgment module 15 and an object determination module 16;
the preset information acquisition module 11 is configured to generate an account binding request corresponding to a target user, acquire user image information and identity identification object image information of the target user according to the account binding request, and acquire input target user information;
the definition detection module 12 is configured to detect a first definition of the acquired user image information of the target user, and detect a second definition of the acquired image information of the identification object;
the preset information obtaining module 11 is further configured to obtain user image information of the target user again when the first definition is smaller than a preset definition threshold;
the preset information obtaining module 11 is further configured to obtain the image information of the identification object again when the second definition is smaller than the definition threshold.
The sending module 13 is configured to send the account requested to be bound, the user image information and the identification object image information of the target user, and the target user information to the server, so that the server binds the account requested to be bound and the identification information, and stores the user image information of the target user, a corresponding relationship between the user image information of the target user and the identification information, and a binding relationship between the account requested to be bound and the identification information in the user image information base.
The acquisition module 14 is configured to generate an account identification and authentication request, and acquire current image information of a target object according to the account identification and authentication request;
the route judging module 15 is configured to display a preset movement trajectory route, acquire the movement trajectory route of the target object, and judge whether the movement trajectory route of the target object is the same as the preset movement trajectory route;
the object determination module 16 is configured to determine that the target object is a living object if the route determination module 15 determines that the target object is a living object;
the object determining module 16 is further configured to determine that the target object is not a living object if the route determining module 15 determines that the target object is not a living object, and display an authentication failure prompt message.
The sending module 13 is further configured to send the current image information to a server when it is detected that the target object is a living object, so that the server determines that the target object is a valid user when finding user image information matched with the current image information in a preset user image information base, obtains target identity information corresponding to the matched user image information in the user image information base, obtains a target account number bound to the target identity information, and opens a use permission of the target object for the target account number.
The specific implementation manners of the preset information obtaining module 11, the definition detecting module 12, and the sending module 13 for sending the account number, the user image information of the target user, the identification object image information, and the target user information that are requested to be bound may refer to the steps S301 to S302 in the embodiment corresponding to fig. 3, which is not described herein again. The specific implementation manners of the acquisition module 14, the route judgment module 15, the object determination module 16, and the sending module 13 for sending the current image information may refer to the steps S305 to S308 in the embodiment corresponding to fig. 3, which is not described herein again.
The client 1 in the embodiment of the invention generates the account identification authentication request, collects the current image information of the target object according to the account identification authentication request, and can send the current image information to the server when detecting that the target object is a living object, thereby ensuring that the obtained current image information is the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Fig. 7 is a schematic structural diagram of a server according to an embodiment of the present invention. The server 2 may include: the system comprises a receiving module 21, a first judging module 22, a prompt message sending module 23, a second judging module 24, a matching determining module 25, a binding module 26, a storage module 27, a determining and generating module 28 and an authority opening module 29;
the receiving module 21 is further configured to receive an account, user image information of a target user, identification object image information, and target user information sent by the client; the account is an account requested to be bound when the client generates a binding request to the account; the target user information comprises a target user name and an identity identification number;
the first judging module 22 is configured to extract avatar information in the image information of the identity object, and judge whether the user image information of the target user matches the avatar information;
the prompt information sending module 23 is configured to send account binding failure prompt information to the client if the first determining module 22 determines that the user image information of the target user is not matched with the avatar information;
the second judging module 24 is configured to determine that the user image information of the target user matches the image information of the identification object if the first judging module 22 judges that the user image information of the target user matches the avatar information, and further judge whether the name and the identification number of the target user are the same as the identification information in the image information of the identification object;
the prompt information sending module 23 is further configured to send an account binding failure prompt information to the client if the second determining module 24 determines that the account binding failure prompt information is not the same as the identity information;
the matching determination module 25 is configured to determine that the target user information matches the identification information in the image information of the identification object if the second determination module 24 determines that the target user information and the identification information are the same as each other.
The binding module 26 is configured to bind the account with the identification information when it is detected that the user image information of the target user matches the identification object image information and the target user information matches the identification information in the identification object image information;
the storage module 27 is configured to store the user image information of the target user, the corresponding relationship between the user image information of the target user and the identification information, and the binding relationship between the account requested to be bound and the identification information in the user image information base.
The receiving module 21 is further configured to receive current image information of the target object sent by the client; the current image information is sent by the client when the target object is detected to be a living object;
the determining and generating module 28 is configured to determine that the target object is a valid user and generate an account number permission opening instruction when the user image information matched with the current image information is found in a preset user image information base;
the permission opening module 29 is configured to obtain, according to the account permission opening instruction, target identity identification information corresponding to the matched user image information in the user image information base, obtain a target account bound to the target identity identification information, and open a usage permission of the target object for the target account.
The specific implementation manners of the receiving module 21, the first determining module 22, the prompt information sending module 23, the second determining module 24, the matching determining module 25, the binding module 26, and the storage module 27 for receiving an account number, user image information of a target user, image information of an identity object, and target user information may refer to the steps S302 to S304 in the embodiment corresponding to fig. 3, which is not described herein again. The specific implementation manners of the receiving module 21, the determining and generating module 28, and the permission opening module 29 for receiving the current image information of the target object may refer to the steps S308 to S310 in the embodiment corresponding to fig. 3, and are not described herein again.
The client side in the embodiment of the invention generates the account number identification and authentication request, acquires the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server 2 when detecting that the target object is a living object, thereby ensuring that the acquired current image information is the real head portrait information. When the server 2 finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object to the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server 2 can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, the face image of each user is unique, the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Fig. 8 is a schematic structural diagram of another client according to an embodiment of the present invention. As shown in fig. 8, the client 1000 may include: at least one processor 1001, such as a CPU, at least one network interface 1004, a user interface 1003, memory 1005, at least one communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display) and a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a standard wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 8, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
In the client 1000 shown in fig. 8, the network interface 1004 is mainly used for connecting a server; the user interface 1003 is mainly used for providing an input interface for a user and acquiring data output by the user; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement
Generating an account identification authentication request, and acquiring current image information of a target object according to the account identification authentication request;
when the target object is detected to be a living object, the current image information is sent to a server, so that the server determines that the target object is a legal user when searching out user image information matched with the current image information in a preset user image information base, acquires target identity identification information corresponding to the matched user image information in the user image information base, acquires a target account number bound with the target identity identification information, and opens the use authority of the target object on the target account number.
In one embodiment, the processor 1001 further performs the steps of:
displaying a preset moving track route, acquiring the moving track route of the target object, and judging whether the moving track route of the target object is the same as the preset moving track route;
if the judgment result is yes, determining that the target object is a living object;
if not, determining that the target object is not a living object, and displaying prompt information of authentication failure.
In one embodiment, the processor 1001 further performs the steps of:
generating an account binding request corresponding to a target user, acquiring user image information and identity identification object image information of the target user according to the account binding request, and acquiring input target user information;
sending the account number requested to be bound, the user image information and the identity identification object image information of the target user and the target user information to the server, so that the server binds the account number requested to be bound with the identity identification information, and storing the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account number requested to be bound and the identity identification information in the user image information base.
In one embodiment, the processor 1001 further performs the steps of:
detecting a first definition of the acquired user image information of the target user and detecting a second definition of the acquired identification object image information;
when the first definition is smaller than a preset definition threshold value, re-acquiring the user image information of the target user;
and when the second definition is smaller than the definition threshold value, the image information of the identity identification object is obtained again.
The client side generates the account number identification and authentication request, collects the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server when the target object is detected to be a living object, so that the obtained current image information can be guaranteed to be the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Fig. 9 is a schematic structural diagram of another server according to an embodiment of the present invention. As shown in fig. 9, the server 2000 may include: at least one processor 2001, e.g., a CPU, at least one network interface 2004, a user interface 2003, a memory 2005, at least one communication bus 2002. The communication bus 2002 is used to implement connection communication between these components. The user interface 2003 may include a Display (Display) and a Keyboard (Keyboard), and the optional user interface 2003 may further include a standard wired interface and a standard wireless interface. The network interface 2004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). Memory 2005 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 2005 may optionally also be at least one memory device located remotely from the aforementioned processor 2001. As shown in fig. 9, the memory 2005, which is one type of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
In the server 2000 shown in fig. 9, the network interface 2004 is mainly used for connecting clients; the user interface 2003 is mainly used for providing an input interface for a user to acquire data output by the user; and processor 2001 may be used to invoke device control applications stored in memory 2005 to implement
Receiving current image information of a target object sent by a client; the current image information is sent by the client when the target object is detected to be a living object;
when the user image information matched with the current image information is found out in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
and acquiring target identity identification information corresponding to the matched user image information in the user image information base according to the account permission opening instruction, acquiring a target account bound with the target identity identification information, and opening the use permission of the target object to the target account.
In one embodiment, the processor 2001 further performs the steps of:
receiving an account number, user image information of a target user, image information of an identity identification object and target user information sent by the client; the account is an account requested to be bound when the client generates a binding request to the account;
when it is detected that the user image information of the target user is matched with the identification object image information and the target user information is matched with the identification information in the identification object image information, binding the account with the identification information;
and storing the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account requested to be bound and the identity identification information in the user image information base.
In one embodiment, the target user information includes a target user name and an identification number;
the processor 2001 also performs the following steps:
extracting head portrait information in the image information of the identity identification object, and judging whether the user image information of the target user is matched with the head portrait information;
if the user image information of the target user is judged not to be matched with the head portrait information, sending account binding failure prompt information to the client;
if the user image information of the target user is matched with the head portrait information, determining that the user image information of the target user is matched with the identification object image information, and further judging whether the name and the identification number of the target user are the same as the identification information in the identification object image information;
if the identity identification information is judged not to be the same as the identity identification information, sending account binding failure prompt information to the client;
and if the identification information is the same as the identification information, determining that the target user information is matched with the identification information in the identification object image information.
The client side generates the account number identification and authentication request, collects the current image information of the target object according to the account number identification and authentication request, and can send the current image information to the server when the target object is detected to be a living object, so that the obtained current image information can be guaranteed to be the real head portrait information. When the server finds out the user image information matched with the current image information in a preset user image information base, the target object can be determined to be a legal user, the target identity identification information corresponding to the matched user image information is obtained in the user image information base, the target account number bound with the target identity identification information is obtained, and the use permission of the target object for the target account number is opened. Therefore, the user only needs to upload the face image of the user, the server can determine whether the target account belongs to the user through the face image of the user, the authentication time is short, the user can quickly find back the stolen account, the personal privacy and personal property of the user can be guaranteed, and the face image of each user is unique, so that the user to which the account belongs can be accurately judged, and the personal interests of the stolen user are further protected.
Fig. 10 is a schematic structural diagram of an information authentication processing system according to an embodiment of the present invention, where the system may include a client 100 and a server 200, and the client 100 and the server 200 may be connected to each other through a network. The client 100 may specifically be the client 1 in the embodiment corresponding to fig. 6, and the server 200 may specifically be the server 2 in the embodiment corresponding to fig. 7, which is not described again in detail herein for specific implementation of the client 100 and the server 200; alternatively, the client 100 may specifically be the client 1000 in the embodiment corresponding to fig. 8, and the server 200 may specifically be the server 2000 in the embodiment corresponding to fig. 9, which is not described again in detail herein for specific implementations of the client 100 and the server 200.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.
Claims (23)
1. An information authentication processing method, characterized by comprising:
the client generates an account identification and authentication request and acquires the current image information of a target object according to the account identification and authentication request;
the client displays a preset moving track route, acquires the moving track route of the target object, and judges whether the moving track route of the target object is the same as the preset moving track route;
if the judgment result is yes, determining that the target object is a living object;
when the client detects that the target object is a living object, the current image information is sent to a server;
when the server searches user image information matched with the current image information in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
the server acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account authority opening instruction, acquires a target account bound with the target identity identification information, and opens the use authority of the target object to the target account;
the user image information base stores information related to the account number requested to be bound, the related information is that the server detects that the user image information of the target user is matched with the image information of the identification object, and the target user information is stored in the user image information base when being matched with the identification information in the identification object image information, the related information comprises user image information of the target user, a corresponding relation between the user image information of the target user and the identity information, and a binding relation between the account number requested to be bound and the identity information, the user image information is a front face image of the target user acquired in a pre-account binding process, the target user information is a target user name and an identification number which are input in the account pre-binding process.
2. The method according to claim 1, further comprising, before the step of sending the current image information to a server when the client detects that the target object is a living object:
and if the judgment result that whether the moving track route of the target object is the same as the preset moving track route is judged to be negative, determining that the target object is not a living object, and displaying an authentication failure prompt message.
3. The method of claim 1, wherein before the step of generating an account identification authentication request by the client and acquiring current image information of the target object according to the account identification authentication request, the method further comprises:
the client generates an account binding request corresponding to a target user, acquires user image information and identity identification object image information of the target user according to the account binding request, and acquires input target user information;
the client sends the account number requested to be bound, the user image information and the identity identification object image information of the target user and the target user information to the server;
when the server detects that the user image information of the target user is matched with the identification object image information and the target user information is matched with the identification information in the identification object image information, the server binds the account number requested to be bound with the identification information;
and the server stores the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account requested to be bound and the identity identification information in the user image information base.
4. The method of claim 3, wherein the target user information includes a target user name and an identification number;
before the step of binding the account requested to be bound with the identification information by the server when the server detects that the user image information of the target user matches with the identification object image information and the target user information matches with the identification information in the identification object image information, the method further includes:
the server extracts the head portrait information in the image information of the identity identification object and judges whether the user image information of the target user is matched with the head portrait information;
if the user image information of the target user is judged not to be matched with the head portrait information, sending account binding failure prompt information to the client;
if the user image information of the target user is matched with the head portrait information, determining that the user image information of the target user is matched with the identification object image information, and further judging whether the name and the identification number of the target user are the same as the identification information in the identification object image information;
if the identity identification information is judged not to be the same as the identity identification information, sending account binding failure prompt information to the client;
and if the identification information is the same as the identification information, determining that the target user information is matched with the identification information in the identification object image information.
5. The method of claim 3, further comprising, prior to the step of the client sending the account number, the user image information and the identification object image information of the target user, and the target user information for the requested binding to the server:
the client detects a first definition of the acquired user image information of the target user and detects a second definition of the acquired identification object image information;
when the first definition is smaller than a preset definition threshold value, re-acquiring the user image information of the target user;
and when the second definition is smaller than the definition threshold value, the image information of the identity identification object is obtained again.
6. An information authentication processing method, characterized by comprising:
the client generates an account identification and authentication request and acquires the current image information of a target object according to the account identification and authentication request;
the client displays a preset moving track route, acquires the moving track route of the target object, and judges whether the moving track route of the target object is the same as the preset moving track route;
if the judgment result is yes, determining that the target object is a living object;
when the client detects that the target object is a living object, the current image information is sent to a server, so that the server determines that the target object is a legal user when searching out user image information matched with the current image information in a preset user image information base, acquires target identity identification information corresponding to the matched user image information in the user image information base, acquires a target account number bound with the target identity identification information, and opens the use authority of the target object on the target account number;
the user image information base stores information related to the account number requested to be bound, the related information is that the server detects that the user image information of the target user is matched with the image information of the identification object, and the target user information is stored in the user image information base when being matched with the identification information in the identification object image information, the related information comprises user image information of the target user, a corresponding relation between the user image information of the target user and the identity information, and a binding relation between the account number requested to be bound and the identity information, the user image information is a front face image of the target user acquired in a pre-account binding process, the target user information is a target user name and an identification number which are input in the account pre-binding process.
7. The method of claim 6, wherein prior to the step of sending the current image information to a server when the client detects that the target object is a living object, further comprising:
and if the judgment result that whether the moving track route of the target object is the same as the preset moving track route is judged to be negative, determining that the target object is not a living object, and displaying an authentication failure prompt message.
8. The method of claim 6, wherein before the step of generating an account identification authentication request by the client and acquiring current image information of the target object according to the account identification authentication request, the method further comprises:
the client generates an account binding request corresponding to a target user, acquires user image information and identity identification object image information of the target user according to the account binding request, and acquires input target user information;
the client sends the account number requested to be bound, the user image information and the identity identification object image information of the target user and the target user information to the server, so that the server binds the account number requested to be bound and the identity identification information, and stores the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information and the binding relation between the account number requested to be bound and the identity identification information in the user image information base.
9. The method of claim 8, further comprising, prior to the step of the client sending the account number, the user image information and the identification object image information of the target user, and the target user information for the requested binding to the server:
the client detects a first definition of the acquired user image information of the target user and detects a second definition of the acquired identification object image information;
when the first definition is smaller than a preset definition threshold value, re-acquiring the user image information of the target user;
and when the second definition is smaller than the definition threshold value, the image information of the identity identification object is obtained again.
10. An information authentication processing method, characterized by comprising:
the server receives current image information of a target object sent by a client; the current image information is sent by the client when the target object is detected to be a living object, the living object is determined when a judgment result that whether a moving track route of the target object is the same as the preset moving track route is yes, and the moving track route of the target object is acquired according to the displayed preset moving track route;
when the server searches user image information matched with the current image information in a preset user image information base, determining that the target object is a legal user, and generating an account number authority opening instruction;
the server acquires target identity identification information corresponding to the matched user image information from the user image information base according to the account authority opening instruction, acquires a target account bound with the target identity identification information, and opens the use authority of the target object to the target account;
the user image information base stores information related to the account number requested to be bound, the related information is that the server detects that the user image information of the target user is matched with the image information of the identification object, and the target user information is stored in the user image information base when being matched with the identification information in the identification object image information, the related information comprises user image information of the target user, a corresponding relation between the user image information of the target user and the identity information, and a binding relation between the account number requested to be bound and the identity information, the user image information is a front face image of the target user acquired in a pre-account binding process, the target user information is a target user name and an identification number which are input in the account pre-binding process.
11. The method of claim 10, wherein before the server receives the current image information of the target object sent by the client, the method further comprises:
the server receives an account number, user image information of a target user, identification object image information and target user information sent by the client; the account is an account requested to be bound when the client generates a binding request to the account;
when the server detects that the user image information of the target user is matched with the identification object image information and the target user information is matched with the identification information in the identification object image information, the server binds the account with the identification information;
and the server stores the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account requested to be bound and the identity identification information in the user image information base.
12. The method of claim 11, wherein the target user information includes a target user name and an identification number;
before the step of binding the account requested to be bound with the identification information by the server when the server detects that the user image information of the target user matches with the identification object image information and the target user information matches with the identification information in the identification object image information, the method further includes:
the server extracts the head portrait information in the image information of the identity identification object and judges whether the user image information of the target user is matched with the head portrait information;
if the user image information of the target user is judged not to be matched with the head portrait information, sending account binding failure prompt information to the client;
if the user image information of the target user is matched with the head portrait information, determining that the user image information of the target user is matched with the identification object image information, and further judging whether the name and the identification number of the target user are the same as the identification information in the identification object image information;
if the identity identification information is judged not to be the same as the identity identification information, sending account binding failure prompt information to the client;
and if the identification information is the same as the identification information, determining that the target user information is matched with the identification information in the identification object image information.
13. A client, comprising:
the acquisition module is used for generating an account identification authentication request and acquiring the current image information of the target object according to the account identification authentication request;
the route judging module is used for displaying a preset moving track route, acquiring the moving track route of the target object and judging whether the moving track route of the target object is the same as the preset moving track route or not;
the object determining module is used for determining the target object as a living object if the route judging module judges that the target object is the living object;
the sending module is used for sending the current image information to a server when the target object is detected to be a living object, so that the server determines that the target object is a legal user when searching out user image information matched with the current image information in a preset user image information base, acquires target identity identification information corresponding to the matched user image information in the user image information base, acquires a target account number bound with the target identity identification information, and opens the use authority of the target object on the target account number;
the user image information base stores information related to the account number requested to be bound, the related information is that the server detects that the user image information of the target user is matched with the image information of the identification object, and the target user information is stored in the user image information base when being matched with the identification information in the identification object image information, the related information comprises user image information of the target user, a corresponding relation between the user image information of the target user and the identity information, and a binding relation between the account number requested to be bound and the identity information, the user image information is a front face image of the target user acquired in a pre-account binding process, the target user information is a target user name and an identification number which are input in the account pre-binding process.
14. The client according to claim 13, wherein the object determination module is further configured to determine that the target object is not a living object and display an authentication failure prompt message if the route determination module determines that the determination result of whether the movement trajectory route of the target object is the same as the preset movement trajectory route is negative.
15. The client of claim 13, further comprising:
the system comprises a preset information acquisition module, a display module and a display module, wherein the preset information acquisition module is used for generating an account binding request corresponding to a target user, acquiring user image information and identity identification object image information of the target user according to the account binding request and acquiring input target user information;
the sending module is further configured to send the account requested to be bound, the user image information and the identification object image information of the target user, and the target user information to the server, so that the server binds the account requested to be bound with the identification information, and stores the user image information of the target user, the corresponding relationship between the user image information of the target user and the identification information, and the binding relationship between the account requested to be bound and the identification information in the user image information base.
16. The client of claim 15, further comprising:
the definition detection module is used for detecting the first definition of the acquired user image information of the target user and detecting the second definition of the acquired identification object image information;
the preset information acquisition module is further configured to reacquire the user image information of the target user when the first definition is smaller than a preset definition threshold;
the preset information obtaining module is further configured to obtain the image information of the identification object again when the second definition is smaller than the definition threshold.
17. A server, comprising:
the receiving module is used for receiving the current image information of the target object sent by the client; the current image information is sent by the client when the target object is detected to be a living object, the living object is determined when a judgment result that whether a moving track route of the target object is the same as the preset moving track route is yes, and the moving track route of the target object is acquired according to the displayed preset moving track route;
the determining and generating module is used for determining the target object as a legal user and generating an account number authority opening instruction when the user image information matched with the current image information is found in a preset user image information base;
the authority opening module is used for acquiring target identity identification information corresponding to the matched user image information from the user image information base according to the account authority opening instruction, acquiring a target account bound with the target identity identification information, and opening the use authority of the target object to the target account;
the user image information base stores information related to the account number requested to be bound, the related information is that the server detects that the user image information of the target user is matched with the image information of the identification object, and the target user information is stored in the user image information base when being matched with the identification information in the identification object image information, the related information comprises user image information of the target user, a corresponding relation between the user image information of the target user and the identity information, and a binding relation between the account number requested to be bound and the identity information, the user image information is a front face image of the target user acquired in a pre-account binding process, the target user information is a target user name and an identification number which are input in the account pre-binding process.
18. The server of claim 17, further comprising:
the receiving module is also used for receiving the account number, the user image information of the target user, the image information of the identification object and the target user information sent by the client; the account is an account requested to be bound when the client generates a binding request to the account;
the binding module is used for binding the account with the identification information when the fact that the user image information of the target user is matched with the identification object image information is detected, and the target user information is matched with the identification information in the identification object image information;
and the storage module is used for storing the user image information of the target user, the corresponding relation between the user image information of the target user and the identity identification information, and the binding relation between the account number requested to be bound and the identity identification information in the user image information base.
19. The server of claim 18, wherein the target user information comprises a target user name and an identification number;
the server further comprises:
the first judgment module is used for extracting the head portrait information in the image information of the identity identification object and judging whether the user image information of the target user is matched with the head portrait information;
a prompt message sending module, configured to send an account binding failure prompt message to the client if the first determination module determines that the user image information of the target user does not match the avatar information;
a second judging module, configured to determine that the user image information of the target user matches the image information of the identification object if the first judging module judges that the user image information of the target user matches the avatar information, and further judge whether the name and the identification number of the target user are the same as the identification information in the image information of the identification object;
the prompt information sending module is further configured to send account binding failure prompt information to the client if the second determination module determines that the account binding failure prompt information is not the same as the identity identification information;
and the matching determination module is used for determining that the target user information is matched with the identity identification information in the identity identification object image information if the second judgment module judges that the target user information is the same as the identity identification information.
20. An information authentication processing system comprising a client and a server, wherein the client is the client according to any one of claims 13 to 16, and the server is the server according to any one of claims 17 to 19.
21. A client comprising a processor, a memory, a network interface;
the processor is connected to the memory and the network interface, respectively, wherein the network interface is used for connecting to a server, the memory is used for storing program codes, and the processor is used for calling the program codes to execute the method according to any one of claims 6 to 9.
22. A server comprising a processor, a memory, a network interface;
the processor is connected to the memory and the network interface, respectively, wherein the network interface is used for connecting a client, the memory is used for storing program codes, and the processor is used for calling the program codes to execute the method according to any one of claims 10-12.
23. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the method of any of claims 6-9, or claims 10-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610712437.7A CN107786487B (en) | 2016-08-24 | 2016-08-24 | Information authentication processing method, system and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610712437.7A CN107786487B (en) | 2016-08-24 | 2016-08-24 | Information authentication processing method, system and related equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107786487A CN107786487A (en) | 2018-03-09 |
CN107786487B true CN107786487B (en) | 2021-02-02 |
Family
ID=61388263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610712437.7A Active CN107786487B (en) | 2016-08-24 | 2016-08-24 | Information authentication processing method, system and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107786487B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109005104B (en) * | 2018-07-19 | 2021-05-14 | 腾讯科技(深圳)有限公司 | Instant messaging method, device, server and storage medium |
CN109345253A (en) | 2018-09-04 | 2019-02-15 | 阿里巴巴集团控股有限公司 | Resource transfers method, apparatus and system |
CN110609970B (en) * | 2019-08-29 | 2022-06-07 | 北京大米科技有限公司 | User identity identification method and device, storage medium and electronic equipment |
CN111414569B (en) * | 2020-02-18 | 2023-05-12 | 北京网聘咨询有限公司 | Efficient access control method for network recruitment search technology |
CN112968866B (en) * | 2021-01-28 | 2021-10-01 | 北京芯盾时代科技有限公司 | Method, device and system for binding user account information and user identity information |
CN113436353A (en) * | 2021-05-11 | 2021-09-24 | 西安艾润物联网技术服务有限责任公司 | Vehicle charging method and device based on voice interaction |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103384234B (en) * | 2012-05-04 | 2016-09-28 | 深圳市腾讯计算机系统有限公司 | Face identity authentication and system |
US20140007224A1 (en) * | 2012-06-29 | 2014-01-02 | Ning Lu | Real human detection and confirmation in personal credential verification |
CN105227316A (en) * | 2015-09-01 | 2016-01-06 | 深圳市创想一登科技有限公司 | Based on mobile Internet account login system and the method for facial image authentication |
CN105407098A (en) * | 2015-11-26 | 2016-03-16 | 小米科技有限责任公司 | Identity verification method and device |
-
2016
- 2016-08-24 CN CN201610712437.7A patent/CN107786487B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107786487A (en) | 2018-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107786487B (en) | Information authentication processing method, system and related equipment | |
US10587601B2 (en) | Automated identity assessment method and system | |
CN104468531B (en) | The authorization method of sensitive data, device and system | |
EP3256976B1 (en) | Toggling biometric authentication | |
CN108804884B (en) | Identity authentication method, identity authentication device and computer storage medium | |
CN105468950B (en) | Identity authentication method and device, terminal and server | |
TWI613564B (en) | Eye gaze authentication | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
US10693871B2 (en) | Account information obtaining method, terminal, server and system | |
EP2683131A1 (en) | Methods and systems for improving the accuracy performance of authentication systems | |
CN108306886B (en) | Identity authentication method, device and storage medium | |
JPWO2017170384A1 (en) | Biometric data processing apparatus, biometric data processing system, biometric data processing method, biometric data processing program, and storage medium for storing biometric data processing program | |
CN109902611B (en) | Target certificate detection method and device and terminal equipment | |
CN105407069B (en) | Living body authentication method, apparatus, client device and server | |
CN106998332B (en) | Secure login method and device, storage medium and computer equipment | |
US20180124034A1 (en) | Image based method, system and computer program product to authenticate user identity | |
CN105530230A (en) | Fingerprint authentication method, device and server | |
KR101654797B1 (en) | Interactive CAPTCHA System Resilient to Phishing Attacks | |
CN114821845B (en) | Card punching method and device | |
CN106097531B (en) | A kind of reserving method and mobile terminal and access control system applied to access control system | |
JPWO2018066426A1 (en) | Fake web page discrimination device, fake web page discrimination system, fake web page discrimination method and fake web page discrimination program | |
CN114567510A (en) | Login authentication method, device, equipment and storage medium | |
US11128620B2 (en) | Online verification method and system for verifying the identity of a subject | |
KR20220081980A (en) | Information processing system, information processing method, program, user interface | |
KR102721059B1 (en) | Device and method to authorize user based on video data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |