CN108446638B - Identity authentication method and device, storage medium and electronic equipment - Google Patents

Identity authentication method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN108446638B
CN108446638B CN201810236469.3A CN201810236469A CN108446638B CN 108446638 B CN108446638 B CN 108446638B CN 201810236469 A CN201810236469 A CN 201810236469A CN 108446638 B CN108446638 B CN 108446638B
Authority
CN
China
Prior art keywords
user
structured light
code
head
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810236469.3A
Other languages
Chinese (zh)
Other versions
CN108446638A (en
Inventor
陈岩
方攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810236469.3A priority Critical patent/CN108446638B/en
Publication of CN108446638A publication Critical patent/CN108446638A/en
Application granted granted Critical
Publication of CN108446638B publication Critical patent/CN108446638B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/06Decision making techniques; Pattern matching strategies

Abstract

The application discloses an identity authentication method, an identity authentication device, a storage medium and an electronic device, wherein the identity authentication method is applied to the electronic device and comprises the following steps: acquiring continuous frame structured light images of the head of a user by using a structured light module; judging whether the user is a living body according to the continuous frame structured light image; if yes, acquiring a digital password input by the user and biological characteristic information of the user, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics; generating a code to be verified according to the digital password and the biological characteristic information; the user is authenticated according to the code to be authenticated, so that static authentication and dynamic authentication can be combined, biological authentication and digital authentication are combined, the user authentication is realized from multiple dimensions, the method is simple, and the safety is high.

Description

Identity authentication method and device, storage medium and electronic equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to an identity authentication method and apparatus, a storage medium, and an electronic device.
Background
The popularization rate of the mobile terminal in the current society is very high, great convenience is brought to people due to the convenience of the mobile terminal, the life ways of communication, payment and the like of people are changed, and the mobile terminal permeates into every corner.
However, since many private information of the user, such as photos, short messages, and mails, are often stored in the mobile terminal, how to ensure the security of the private information is a key research problem for manufacturers of various terminals. At present, most mobile terminals need to perform identity authentication when being started or unlocked, and a user can be allowed to use the terminal only when the authentication is passed, a common authentication method is digital password authentication, that is, the user needs to input a 4-digit number, then the terminal can judge whether the number is the same as a locally stored designated number, and the terminal considers that the identity authentication is passed only under the same condition. The mode of verifying by the digital password is too simple, leakage risks are easy to occur, and the security is low.
Disclosure of Invention
The embodiment of the application provides an identity authentication method, an identity authentication device, a storage medium and electronic equipment, which can realize identity authentication of a user from multiple dimensions.
The embodiment of the application provides an identity authentication method, which is applied to electronic equipment and comprises the following steps:
acquiring continuous frame structured light images of the head of a user by using a structured light module;
judging whether the user is a living body according to the continuous frame structured light image;
if yes, acquiring the digital password input by the user and biological characteristic information of the user, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics;
generating a code to be verified according to the digital password and the biological characteristic information;
and performing identity authentication on the user according to the code to be authenticated.
The embodiment of the present application further provides an identity authentication apparatus, which is applied to an electronic device, and includes:
the first acquisition module is used for acquiring continuous frame structured light images of the head of a user by using the structured light module;
the judging module is used for judging whether the user is a living body according to the continuous frame structured light image;
the second acquisition module is used for acquiring the digital password input by the user and the biological characteristic information of the user if the digital password input by the user and the biological characteristic information of the user are the same, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics;
the generating module is used for generating a code to be verified according to the digital password and the biological characteristic information;
and the verification module is used for verifying the identity of the user according to the code to be verified.
The embodiment of the application also provides a storage medium, wherein a plurality of instructions are stored in the storage medium, and the instructions are suitable for being loaded by a processor to execute any one of the identity verification methods.
An embodiment of the present application further provides an electronic device, which includes a processor and a memory, where the processor is electrically connected to the memory, the memory is used to store instructions and data, and the processor is used in any one of the steps of the identity authentication method.
The method, the device, the storage medium and the electronic equipment are applied to the electronic equipment, a continuous frame structured light image of the head of a user is obtained through a structured light module, whether the user is a living body is judged according to the continuous frame structured light image, if yes, a digital password input by the user and biological feature information of the user are obtained, the biological feature information comprises at least one of fingerprint features, voiceprint features, face features and iris features, a code to be verified is generated according to the digital password and the biological feature information, and the user is authenticated according to the code to be verified, so that static verification and dynamic verification can be combined, the biological verification and the digital verification are combined, the user authentication is achieved from multiple dimensions, the method is simple, and safety is high.
Drawings
The technical solution and other advantages of the present application will become apparent from the detailed description of the embodiments of the present application with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of an identity authentication method according to an embodiment of the present application.
Fig. 2 is another schematic flow chart of an identity verification method according to an embodiment of the present application.
FIG. 3 is a schematic view of an in-vivo detection interface provided in an embodiment of the present application.
Fig. 4 is a schematic diagram of a user rotation trajectory according to an embodiment of the present application.
Fig. 5 is a schematic diagram of the rotation angles formed at the positions S1 and S2 provided in the embodiments of the present application.
Fig. 6 is a schematic structural diagram of an authentication device according to an embodiment of the present application.
Fig. 7 is a schematic structural diagram of the determining module 20 according to an embodiment of the present disclosure.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides an identity authentication method, an identity authentication device, a storage medium and electronic equipment.
An identity authentication method is applied to electronic equipment and comprises the following steps: acquiring continuous frame structured light images of the head of a user by using a structured light module; judging whether the user is a living body according to the continuous frame structured light image; if yes, acquiring a digital password input by the user and biological characteristic information of the user, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics; generating a code to be verified according to the digital password and the biological characteristic information; and performing identity authentication on the user according to the code to be authenticated.
As shown in fig. 1, fig. 1 is a schematic flow chart of an authentication method provided in the embodiment of the present application, which is applied to an electronic device, and the specific flow may be as follows:
101. a continuous frame structured light image of the head of the user is acquired with the structured light module.
In this embodiment, when the electronic device is turned on or unlocked, the structured light module is activated. The structured light module is used for emitting and shooting structured light, and the structured light is a set of projection light rays with known spatial directions and can comprise point structured light, line structured light, multi-line structured light, surface structured light and the like.
For example, the structured light module includes a structured light projector and a camera, and the step 101 may specifically include:
projecting the structured light outwards through the structured light projector and prompting a user to rotate the head;
and acquiring the structured light image projected by the head of the user within a preset time length through the camera to obtain a continuous frame structured light image.
In this embodiment, the structured light projector may be some type of projection device or instrument that projects a light spot, light slit, grating, grid, or speckle onto the head of a user. The preset time period may be set manually, for example, 10s in consideration of the rotational speed and the reaction time of the user.
102. It is determined whether the user is a living body based on the continuous frame structured light image, and if so, the following step 103 is executed, and if not, the execution returns to the step 101.
In this embodiment, in order to prevent a lawbreaker from being able to normally pass the biometric authentication even with the help of an inactive object such as a user photograph, a recorded voice, a copied fingerprint, etc., it may be determined whether the user is a living body before the authentication.
For example, the step 102 may specifically include:
and 1-1, generating corresponding three-dimensional coordinates of the head according to each frame of structured light image.
In the embodiment, the structured light is projected to the surface of the head of the user and then modulated by the height of the head, and the modulated structured light is collected by the camera and transmitted to the background for analysis and calculation to obtain the three-dimensional surface shape data of the head. The modulation mode can be divided into two categories of time modulation and space modulation, the most common method in the time modulation method is a flight time method, the flight time of the light pulse in the space is recorded by the method, the surface shape information of the head of a user is calculated through the flight time, the space modulation method is that the properties of the phase, the light intensity and the like of a structured light field are changed after being modulated by the height of the head, the three-dimensional surface shape information of the head can be obtained according to the change of the properties, and then the three-dimensional coordinates of each point on the head are obtained.
And 1-2, calculating the rotation angle according to the three-dimensional coordinates corresponding to any two frames of structured light images.
In this embodiment, considering that the variation range of the head center point is usually very small when the head of the person rotates, when the rotation angle is calculated, for any two frames of structured light images, the head center point of one frame of the structured light images can be used as the vertex of the included angle, and another representative other point (such as the nose tip or the mouth corner) is selected from each frame of the structured light images, and the corresponding rotation angle is obtained according to the included angle between the point and the vertex of the included angle in the two frames of the structured light images.
1-3, when the preset angle is included in the rotation angle, determining that the user is a living body.
In this embodiment, the preset angle may be set manually, and may be one or more angles, for example, considering that when the head of the person turns left or right, the head of the person usually rotates ninety degrees from the middle to the forward direction or the reverse direction, so that when the head of the user completes one unidirectional rotation, the rotation angle ranges from 0 ° to 90 °, and for this phenomenon, one or more angles may be selected as the preset angle, for example, the preset angle may include 30 °, 50 ° and 60 °.
103. And acquiring the digital password input by the user and the biological characteristic information of the user, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics.
In this embodiment, the numeric code may be manually input through a code interface, or may be input through voice. The user may be prompted to enter a digital password and to obtain user fingerprint characteristics via a fingerprint detector, and/or user voiceprint characteristics via a microphone, and/or user facial or iris characteristics via a camera
104. And generating a code to be verified according to the digital password and the biological characteristic information.
For example, the step 104 may specifically include:
acquiring a character string corresponding to the biological characteristic information;
combining and converting the character string and the digital password to obtain a converted character string;
and generating a corresponding two-dimensional code as a code to be verified according to the converted character string.
In this embodiment, the biometric information may be processed by using an MD5(Message Digest MD5, fifth edition) Algorithm to obtain a corresponding MD5 value (i.e. a character string), and in general, the calculated MD5 value is fixed for data of any length. The combination method can be set artificially, such as integral combination, that is, a character string (or a numeric code) is directly inserted into the back of a numeric code (or a character string) to form a long character string, or cross combination, that is, each character in the character string (or the numeric code) and each character in the numeric code (or the character string) are combined into a long character string in a cross insertion manner, and the like.
105. And performing identity authentication on the user according to the code to be authenticated.
For example, the step 105 may specifically include:
matching the code to be verified with a preset verification code;
if the matching is successful, determining that the user identity authentication is passed;
if the matching fails, accumulating the failure times, and determining the corresponding waiting time according to the failure times;
and returning to execute the operation of acquiring the digital password input by the user and the biological characteristic information of the user after the waiting time length is reached.
In this embodiment, the more the accumulated failure times, the higher the possibility that the user is an illegal user, so the accumulated failure times may be set in proportion to the waiting time, that is, the more the accumulated failure times, the longer the waiting time for inputting the password and acquiring the biometric information next time, thereby prolonging the time for the illegal user to break the password as much as possible and improving the security.
As can be seen from the above, the authentication method provided in this embodiment is applied to an electronic device, and is implemented by using a structured light module to obtain a continuous frame structured light image of a head of a user, and determining whether the user is a living body according to the continuous frame structured light image, if so, obtaining a digital password input by the user and biometric information of the user, where the biometric information includes at least one of a fingerprint feature, a voiceprint feature, a face feature, and an iris feature, then generating a code to be authenticated according to the digital password and the biometric information, and authenticating the user according to the code to be authenticated, so that static authentication and dynamic authentication can be combined, and biometric authentication and digital authentication are combined, thereby implementing authentication of the user from multiple dimensions, and the method is simple and high in security.
In this embodiment, the description will be made from the perspective of the authentication apparatus, and in particular, the detailed description will be made by taking an example in which the authentication apparatus is integrated in an electronic device.
Referring to fig. 2, an identity authentication method may specifically include the following processes:
201. the electronic equipment projects the structured light outwards through the structured light projector, prompts the head of a user to rotate, and then obtains a structured light image projected by the head of the user in a preset time through the camera to obtain a continuous frame structured light image.
For example, referring to fig. 3, when the electronic device is turned on or unlocked, an interactive interface may be generated, and an action prompt box may be displayed on the interactive interface to prompt the user to rotate the head, such as pan the head, and then, within a preset time period, such as 10s, the camera of the electronic device may obtain the structured light image projected on the head in real time, and simultaneously display the structured light image in the preview box, so that the user may see the structured light image.
202. The electronic equipment generates corresponding three-dimensional coordinates of the head according to each frame of structured light image, and calculates the rotation angle according to the corresponding three-dimensional coordinates of any two frames of structured light images.
For example, referring to fig. 4 and fig. 5, if the head of the user rotates from the position facing the electronic device to the position facing the electronic device, that is, from the position S1 to the position S4, if three-dimensional coordinates of two positions, i.e., the center point O and the nose tip N of the head, are selected to perform rotation angle calculation, and the coordinates of the two positions at the position S (i) are O (i) and N (i), i ∈ [1, 4], respectively, for any two frames of structured light images, such as the structured light images captured at the positions S1 and S2, the rotation angle α may be rrin1O 1N2 or rrin1O 2N 2.
203. The electronic device detects whether the rotation angle includes a preset angle, if so, the user is determined to be a living body, and the following step 204 is executed, and if not, the user is prompted to rotate again.
204. The electronic equipment acquires the digital password input by the user and the biological characteristic information of the user, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics.
For example, the preset angles may be 30 °, 40 ° and 60 °, and when the calculated rotation angle α includes the three angles, the user may be considered as a living body, thereby performing dynamic authentication, and at this time, the user may be prompted to input a digital password, and a fingerprint feature of the user may be acquired by a fingerprint detector, and/or a voiceprint feature of the user may be acquired by a microphone, and/or a face feature or an iris feature of the user may be acquired by a camera, etc., for static authentication.
205. The electronic equipment acquires the character string corresponding to the biological characteristic information, and performs combined conversion on the character string and the digital password to obtain a converted character string.
For example, if the biometric information is a voiceprint feature, in this case, the voiceprint feature can be processed by using the MD5 algorithm to obtain a corresponding MD5 value (i.e., a character string), which is assumed to be adddbds 7852, and in this case, if the input numeric password is 1234, the converted character string may be 1a2d3f4d bds7852 after the processing is performed in a cross-combination manner.
206. The electronic device generates a corresponding two-dimensional code according to the converted character string, and the two-dimensional code is used as a code to be verified, and matches the code to be verified with a preset verification code, if the matching is successful, it is determined that the user identity verification is passed, and if the matching is failed, the following step 207 is executed.
207. The electronic device accumulates the failure times, determines a corresponding waiting time according to the failure times, and returns to execute the step 204 when the waiting time is reached.
For example, the accumulated failure times may be set to be proportional to the waiting time, that is, the more the accumulated failure times, the longer the waiting time for inputting the password and acquiring the biometric information next time, for example, after 1 failure, the waiting time may be 15s, after two failures, the waiting time may be 30s, and so on.
As can be seen from the above, the identity authentication method provided in this embodiment is applied to an electronic device, where the electronic device may project structured light to the outside through a structured light projector, and prompt a user to rotate the head, then obtain a structured light image projected by the user head within a preset time period through a camera, obtain continuous frame structured light images, then generate corresponding three-dimensional coordinates of the head according to each frame of structured light image, and calculate a rotation angle according to the corresponding three-dimensional coordinates of any two frame of structured light images, then detect whether the rotation angle includes a preset angle, if so, determine that the user is a living body, and obtain a digital password input by the user and biometric information of the user, where the biometric information includes at least one of a fingerprint feature, a voiceprint feature, a face feature, and an iris feature, then obtain a character string corresponding to the biometric information, and the character string and the digital password are combined and converted to obtain a converted character string, then, a corresponding two-dimensional code is generated according to the converted character string and is used as a code to be verified, the code to be verified is matched with a preset verification code, if the matching is successful, the user identity verification is determined to be passed, if the matching is failed, the failure times are accumulated, the corresponding waiting time is determined according to the failure times, and after the waiting time is reached, the operation of obtaining the digital password input by the user and the biological characteristic information of the user is returned to be executed, so that the static verification and the dynamic verification can be combined, the biological verification and the digital verification are combined, the identity verification of the user is realized from multiple dimensions, the method is simple, and the safety is high.
According to the method described in the foregoing embodiment, the embodiment will be further described from the perspective of an authentication apparatus, which may be specifically implemented as an independent entity, or may be implemented by being integrated in an electronic device, such as a terminal, where the terminal may include a mobile phone, a tablet computer, and the like.
Referring to fig. 6, fig. 6 specifically describes an authentication apparatus provided in the embodiment of the present application, which is applied to an electronic device, and the authentication apparatus may include: a first obtaining module 10, a judging module 20, a second obtaining module 30, a generating module 40 and a verifying module 50, wherein:
(1) first acquisition module 10
A first acquiring module 10 for acquiring successive frames of structured light images of the head of the user using the structured light module.
In this embodiment, when the electronic device is turned on or unlocked, the structured light module is activated. The structured light module is used for emitting and shooting structured light, and the structured light is a set of projection light rays with known spatial directions and can comprise point structured light, line structured light, multi-line structured light, surface structured light and the like.
For example, the structured light module may include a structured light projector and a camera, and the first obtaining module 10 may be specifically configured to:
projecting the structured light outwards through the structured light projector and prompting a user to rotate the head;
and acquiring the structured light image projected by the head of the user within a preset time length through the camera to obtain a continuous frame structured light image.
In this embodiment, the structured light projector may be some type of projection device or instrument that projects a light spot, light slit, grating, grid, or speckle onto the head of a user. The preset time period may be set manually, for example, 10s in consideration of the rotational speed and the reaction time of the user.
(2) Judging module 20
And a judging module 20, configured to judge whether the user is a living body according to the continuous frame structured light image.
In this embodiment, in order to prevent the lawbreaker from passing the biometric verification normally by means of the user's photograph, recorded voice, copied fingerprint, and other non-living objects, the determining module 20 may determine whether the user is a living body before the verification.
For example, referring to fig. 7, the determining module 20 may specifically include:
a generating unit 21 for generating corresponding three-dimensional coordinates of the head from each frame of the structured light image.
In the embodiment, the structured light is projected to the surface of the head of the user and then modulated by the height of the head, and the modulated structured light is collected by the camera and transmitted to the background for analysis and calculation to obtain the three-dimensional surface shape data of the head. The modulation mode can be divided into two categories of time modulation and space modulation, the most common method in the time modulation method is a flight time method, the flight time of the light pulse in the space is recorded by the method, the surface shape information of the head of a user is calculated through the flight time, the space modulation method is that the properties of the phase, the light intensity and the like of a structured light field are changed after being modulated by the height of the head, the three-dimensional surface shape information of the head can be obtained according to the change of the properties, and then the three-dimensional coordinates of each point on the head are obtained.
And the calculating unit 22 is used for calculating the rotation angle according to the three-dimensional coordinates corresponding to any two frames of structured light images.
In this embodiment, considering that the variation range of the head center point is usually very small when the head of the person rotates, when the rotation angle is calculated, for any two frames of structured light images, the head center point of one frame of the structured light images can be used as the vertex of the included angle, and another representative other point (such as the nose tip or the mouth corner) is selected from each frame of the structured light images, and the corresponding rotation angle is obtained according to the included angle between the point and the vertex of the included angle in the two frames of the structured light images.
A determination unit 23 for determining that the user is a living body when a preset angle is included in the rotation angle.
In this embodiment, the preset angle may be set manually, and may be one or more angles, for example, considering that when the head of the person turns left or right, the head of the person usually rotates ninety degrees from the middle to the forward direction or the reverse direction, so that when the head of the user completes one unidirectional rotation, the rotation angle ranges from 0 ° to 90 °, and for this phenomenon, one or more angles may be selected as the preset angle, for example, the preset angle may include 30 °, 50 ° and 60 °.
(3) Second acquisition module 30
The second obtaining module 30 is configured to, if yes, obtain the digital password input by the user and biometric information of the user, where the biometric information includes at least one of a fingerprint feature, a voiceprint feature, a face feature, and an iris feature.
In this embodiment, the numeric code may be manually input through a code interface, or may be input through voice. The user may be prompted to enter a digital password and to obtain user fingerprint characteristics via a fingerprint detector, and/or user voiceprint characteristics via a microphone, and/or user facial or iris characteristics via a camera
(4) Generating module 40
The generating module 40 is used for generating a code to be verified according to the digital password and the biological characteristic information;
for example, the generating module 40 may specifically be configured to:
acquiring a character string corresponding to the biological characteristic information;
combining and converting the character string and the digital password to obtain a converted character string;
and generating a corresponding two-dimensional code as a code to be verified according to the converted character string.
In this embodiment, the biometric information may be processed by using an MD5(Message Digest MD5, fifth edition) Algorithm to obtain a corresponding MD5 value (i.e. a character string), and in general, the calculated MD5 value is fixed for data of any length. The combination method can be set artificially, such as integral combination, that is, a character string (or a numeric code) is directly inserted into the back of a numeric code (or a character string) to form a long character string, or cross combination, that is, each character in the character string (or the numeric code) and each character in the numeric code (or the character string) are combined into a long character string in a cross insertion manner, and the like.
(5) Authentication module 50
And the verification module 50 is configured to perform identity verification on the user according to the to-be-verified code.
For example, the verification module 50 may be specifically configured to:
matching the code to be verified with a preset verification code;
if the matching is successful, determining that the user identity authentication is passed;
if the matching fails, accumulating the failure times, and determining the corresponding waiting time according to the failure times;
and returning to execute the operation of acquiring the digital password input by the user and the biological characteristic information of the user after the waiting time length is reached.
In this embodiment, the more the accumulated failure times, the higher the possibility that the user is an illegal user, so the accumulated failure times may be set in proportion to the waiting time, that is, the more the accumulated failure times, the longer the waiting time for inputting the password and acquiring the biometric information next time, thereby prolonging the time for the illegal user to break the password as much as possible and improving the security.
In a specific implementation, the above units may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and the specific implementation of the above units may refer to the foregoing method embodiments, which are not described herein again.
As can be seen from the above description, the authentication apparatus provided in this embodiment is applied to an electronic device, where the first obtaining module 10 obtains a continuous frame structured light image of a head of a user by using a structured light module, the determining module 20 determines whether the user is a living body according to the continuous frame structured light image, if so, the second obtaining module 30 obtains a digital password input by the user and biometric information of the user, where the biometric information includes at least one of a fingerprint feature, a voiceprint feature, a face feature, and an iris feature, the generating module 40 then generates a code to be authenticated according to the digital password and the biometric information, the authenticating module 50 authenticates the user according to the code to be authenticated, so that static authentication and dynamic authentication can be combined, biometric authentication and digital authentication are combined, authentication of the user can be achieved from multiple dimensions, and the method is simple, the safety is high.
In addition, the embodiment of the application also provides electronic equipment which can be equipment such as a smart phone and a tablet computer. As shown in fig. 8, the electronic device 900 includes a processor 901, a memory 902, a display 903, and a control circuit 904. The processor 901 is electrically connected to the memory 902, the display 903, and the control circuit 904.
The processor 901 is a control center of the electronic device 900, connects various parts of the whole electronic device by using various interfaces and lines, executes various functions of the electronic device and processes data by running or loading an application program stored in the memory 902 and calling the data stored in the memory 902, thereby performing overall monitoring of the electronic device.
In this embodiment, the processor 901 in the electronic device 900 loads instructions corresponding to processes of one or more application programs into the memory 902 according to the following steps, and the processor 901 runs the application programs stored in the memory 902, so as to implement various functions:
acquiring continuous frame structured light images of the head of a user by using a structured light module;
judging whether the user is a living body according to the continuous frame structured light image;
if yes, acquiring a digital password input by the user and biological characteristic information of the user, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics;
generating a code to be verified according to the digital password and the biological characteristic information;
and performing identity authentication on the user according to the code to be authenticated.
Memory 902 may be used to store applications and data. The memory 902 stores applications containing instructions executable in the processor. The application programs may constitute various functional modules. The processor 901 executes various functional applications and data processing by running an application program stored in the memory 902.
The display 903 may be used to display information input by or provided to the user as well as various graphical user interfaces of the terminal, which may be comprised of images, text, icons, video, and any combination thereof.
The control circuit 904 is electrically connected to the display 903, and is configured to control the display 903 to display information.
In some embodiments, as shown in fig. 8, electronic device 900 further comprises: a radio frequency circuit 905, an input unit 906, an audio circuit 907, a sensor 908, and a power supply 909. The processor 901 is electrically connected to the rf circuit 905, the input unit 906, the audio circuit 907, the sensor 908, and the power source 909.
The radio frequency circuit 905 is configured to receive and transmit radio frequency signals, so as to establish wireless communication with a network device or other electronic devices through wireless communication, and receive and transmit signals with the network device or other electronic devices.
The input unit 906 may be used to receive input numbers, character information, or user characteristic information (e.g., a fingerprint), and to generate keyboard, mouse, joystick, optical, or trackball signal inputs related to user settings and function control. The input unit 906 may include a fingerprint recognition module.
The audio circuit 907 may provide an audio interface between the user and the terminal through a speaker, microphone, or the like.
The electronic device 900 may also include at least one sensor 908, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel according to the brightness of ambient light, and a proximity sensor that may turn off the display panel and/or the backlight when the terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal, detailed description is omitted here.
The power supply 909 is used to supply power to the various components of the electronic device 900. In some embodiments, the power source 909 may be logically connected to the processor 901 through a power management system, so that functions of managing charging, discharging, and power consumption management are realized through the power management system.
Although not shown in fig. 8, the electronic device 900 may further include a camera, a bluetooth module, etc., which are not described in detail herein.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor. To this end, the present invention provides a storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to execute the steps in any one of the authentication methods provided by the embodiments of the present invention.
Wherein the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium can execute the steps in any of the authentication methods provided in the embodiments of the present invention, the beneficial effects that can be achieved by any of the authentication methods provided in the embodiments of the present invention can be achieved, which are detailed in the foregoing embodiments and will not be described again here.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
In summary, although the present application has been described with reference to the preferred embodiments, the above-described preferred embodiments are not intended to limit the present application, and those skilled in the art can make various changes and modifications without departing from the spirit and scope of the present application, so that the scope of the present application shall be determined by the appended claims.

Claims (7)

1. An identity authentication method is applied to an electronic device, wherein a structured light module is arranged in the electronic device, the structured light module is used for emitting and shooting structured light, the structured light is a set of projection light rays in a spatial direction, the structured light module comprises a structured light projector and a camera, and the identity authentication method comprises the following steps:
starting the structured light module when the electronic equipment is started or unlocked;
projecting structured light outwards through a structured light projector, and prompting a user to rotate the head, wherein the structured light is modulated by the height of the head after being projected to the surface of the head of the user;
acquiring structured light modulated by the head of a user within a preset time length through a camera to obtain a continuous frame structured light image, and displaying the structured light image in a preview frame, wherein the preset time length is set according to the rotating speed and the reaction time of the user;
judging whether the user is a living body according to the continuous frame structured light image;
if yes, acquiring the digital password input by the user and biological characteristic information of the user, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics;
acquiring a character string corresponding to the biological characteristic information, performing integral combination or cross combination on the character string and the digital password to obtain a converted character string, and generating a corresponding two-dimensional code as a code to be verified according to the converted character string;
matching the code to be verified with a preset verification code;
if the matching of the code to be verified and a preset verification code fails, accumulating failure times, and determining corresponding waiting time according to the accumulated failure times, wherein the more the accumulated failure times are, the longer the corresponding waiting time is;
and returning to execute the operation of acquiring the digital password input by the user and the biological characteristic information of the user after the waiting time is up.
2. The method according to claim 1, wherein the determining whether the user is a living body according to the continuous frame structured light image comprises:
generating corresponding head three-dimensional coordinates according to each frame of structured light image;
calculating a rotation angle according to the head three-dimensional coordinates corresponding to any two frames of structured light images;
and when the rotation angle comprises a preset angle, determining that the user is a living body.
3. The identity authentication method according to claim 1 or 2, wherein after matching the to-be-authenticated code with a preset authentication code, the method further comprises:
and if the code to be verified is successfully matched with a preset verification code, determining that the user identity verification is passed.
4. An identity authentication device is applied to an electronic device, wherein a structured light module is arranged in the electronic device, the structured light module is used for emitting and shooting structured light, the structured light is a set of projection light rays in a space direction, and the structured light module comprises a structured light projector and a camera, and the identity authentication device comprises:
the first acquisition module is used for starting the structured light module when the electronic equipment is started or unlocked, projecting structured light outwards through a structured light projector and prompting a user to rotate the head of the user, wherein the structured light is projected to the surface of the head of the user and then modulated by the height of the head of the user, the structured light modulated by the head of the user within a preset time length is acquired through a camera to obtain a continuous frame structured light image, and the structured light image is displayed in a preview frame, and the preset time length is set according to the rotating speed and the reaction time of the user;
the judging module is used for judging whether the user is a living body according to the continuous frame structured light image;
the second acquisition module is used for acquiring the digital password input by the user and the biological characteristic information of the user if the digital password input by the user and the biological characteristic information of the user are the same, wherein the biological characteristic information comprises at least one of fingerprint characteristics, voiceprint characteristics, face characteristics and iris characteristics;
the generating module is used for acquiring a character string corresponding to the biological characteristic information, integrally combining or cross-combining the character string and the digital password to obtain a converted character string, and generating a corresponding two-dimensional code as a code to be verified according to the converted character string;
the verification module is used for matching the code to be verified with a preset verification code;
if the matching of the code to be verified and a preset verification code fails, accumulating failure times, and determining corresponding waiting time according to the accumulated failure times, wherein the more the accumulated failure times are, the longer the corresponding waiting time is;
and returning to execute the operation of acquiring the digital password input by the user and the biological characteristic information of the user after the waiting time is up.
5. The identity authentication device according to claim 4, wherein the determining module specifically comprises:
the generating unit is used for generating corresponding three-dimensional coordinates of the head according to each frame of structured light image;
the calculating unit is used for calculating a rotating angle according to the three-dimensional coordinates corresponding to any two frames of structured light images;
a determining unit, configured to determine that the user is a living body when the rotation angle includes a preset angle.
6. A storage medium having stored therein a plurality of instructions adapted to be loaded by a processor to perform the method of authentication of any of claims 1 to 3.
7. An electronic device comprising a processor and a memory, the processor being electrically connected to the memory, the memory being configured to store instructions and data, the processor being configured to perform the steps of the identity verification method of any one of claims 1 to 3.
CN201810236469.3A 2018-03-21 2018-03-21 Identity authentication method and device, storage medium and electronic equipment Expired - Fee Related CN108446638B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810236469.3A CN108446638B (en) 2018-03-21 2018-03-21 Identity authentication method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810236469.3A CN108446638B (en) 2018-03-21 2018-03-21 Identity authentication method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN108446638A CN108446638A (en) 2018-08-24
CN108446638B true CN108446638B (en) 2021-08-24

Family

ID=63196304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810236469.3A Expired - Fee Related CN108446638B (en) 2018-03-21 2018-03-21 Identity authentication method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN108446638B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109473107B (en) * 2018-12-03 2020-12-22 厦门快商通信息技术有限公司 Text semi-correlation voiceprint recognition method and system
CN109635906A (en) * 2018-12-07 2019-04-16 深圳市集虹鼎源科技有限公司 Two-dimensional code generation method and device
WO2020125773A1 (en) * 2018-12-20 2020-06-25 云丁网络技术(北京)有限公司 Identity confirmation method and system
CN110276192A (en) * 2019-06-25 2019-09-24 重庆市农业机械化学校 A kind of computer based approaches to IM
CN110348197A (en) * 2019-07-12 2019-10-18 陈虎 A kind of intelligent service system
CN110443088B (en) * 2019-07-30 2021-08-31 腾讯科技(深圳)有限公司 Graphic code checking method and device, computer equipment and storage medium
CN110738503B (en) * 2019-10-21 2022-09-09 支付宝(杭州)信息技术有限公司 Identity verification method and device
CN110808966A (en) * 2019-10-23 2020-02-18 天津华来科技有限公司 Identity information generation method and device and storage medium
WO2021128038A1 (en) * 2019-12-25 2021-07-01 深圳雾芯科技有限公司 Apparatus for recognizing user and system for recognizing user
CN112462983A (en) * 2020-12-17 2021-03-09 中国农业银行股份有限公司 Non-contact input equipment and method for determining character input value

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069340A (en) * 2015-07-27 2015-11-18 玉林师范学院 Examination paper secrecy system capable of synchronously controlling physical identification password and biological characteristic identification password and method thereof
CN105574518A (en) * 2016-01-25 2016-05-11 北京天诚盛业科技有限公司 Method and device for human face living detection
CN106780856A (en) * 2016-11-18 2017-05-31 金陵科技学院 Remote controlled finger-print puzzle lock and its method for unlocking based on Internet of Things

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104112152A (en) * 2013-10-30 2014-10-22 北京安捷天盾科技发展有限公司 Two-dimensional code generation device, human image identification device and identity verification device
CN103646201A (en) * 2013-12-09 2014-03-19 东南大学 Verification method achieved by combining human faces with identities
CN104966069A (en) * 2015-06-30 2015-10-07 大丰云润科技有限公司 Door lock
CN105187217A (en) * 2015-09-16 2015-12-23 成都三零凯天通信实业有限公司 Dual-factor identity authentication method and apparatus thereof
CN107182218A (en) * 2015-12-31 2017-09-19 深圳先进技术研究院 A kind of authentication method and device
CN105844747A (en) * 2016-03-25 2016-08-10 国网福建省电力有限公司 Station entrance identity authentication method based on two-dimensional code
CN105912986B (en) * 2016-04-01 2019-06-07 北京旷视科技有限公司 A kind of biopsy method and system
CN105913527B (en) * 2016-05-03 2019-06-18 武汉睿和智云科技有限公司 Visitor's two dimensional code intelligent verification system and verification method based on cell cloud
US20180034812A1 (en) * 2016-07-26 2018-02-01 Eyelock Llc Systems and methods of illumination control for biometric capture and liveness detection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069340A (en) * 2015-07-27 2015-11-18 玉林师范学院 Examination paper secrecy system capable of synchronously controlling physical identification password and biological characteristic identification password and method thereof
CN105574518A (en) * 2016-01-25 2016-05-11 北京天诚盛业科技有限公司 Method and device for human face living detection
CN106780856A (en) * 2016-11-18 2017-05-31 金陵科技学院 Remote controlled finger-print puzzle lock and its method for unlocking based on Internet of Things

Also Published As

Publication number Publication date
CN108446638A (en) 2018-08-24

Similar Documents

Publication Publication Date Title
CN108446638B (en) Identity authentication method and device, storage medium and electronic equipment
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
CN107506634B (en) Data display method and device, storage medium and terminal
CN107742072B (en) Face recognition method and mobile terminal
US10878070B2 (en) Method of controlling a terminal based on motion of the terminal, terminal therefore, and storage medium
CN112613475B (en) Code scanning interface display method and device, mobile terminal and storage medium
CN109117635B (en) Virus detection method and device for application program, computer equipment and storage medium
CN110059686B (en) Character recognition method, device, equipment and readable storage medium
US10691785B1 (en) Authentication of a user device comprising spatial trigger challenges
US20160294823A1 (en) Displaying content based on device orientation
US20210201001A1 (en) Facial Recognition Method and Apparatus
EP3175325B1 (en) Reflection-based control activation
EP3579137A1 (en) Touch response method and device
CN113515987B (en) Palmprint recognition method, palmprint recognition device, computer equipment and storage medium
CN111241499A (en) Application program login method, device, terminal and storage medium
CN111062725B (en) Face payment method, device and system and computer readable storage medium
CN111695509A (en) Identity authentication method, identity authentication device, machine readable medium and equipment
CN111586279B (en) Method, device and equipment for determining shooting state and storage medium
CN111079119B (en) Verification method, device, equipment and storage medium
CN112989299A (en) Interactive identity recognition method, system, device and medium
CN210691314U (en) Access control system and login device based on in vivo detection
CN115495169B (en) Data acquisition and page generation methods, devices, equipment and readable storage medium
CN111128115A (en) Information verification method and device, electronic equipment and storage medium
CN114724311B (en) Cabinet opening method, device and equipment for storage cabinet and computer readable storage medium
CN115329309A (en) Verification method, verification device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210824

CF01 Termination of patent right due to non-payment of annual fee