CN108494959A - A kind of data inspection method based on twin check - Google Patents

A kind of data inspection method based on twin check Download PDF

Info

Publication number
CN108494959A
CN108494959A CN201810220832.2A CN201810220832A CN108494959A CN 108494959 A CN108494959 A CN 108494959A CN 201810220832 A CN201810220832 A CN 201810220832A CN 108494959 A CN108494959 A CN 108494959A
Authority
CN
China
Prior art keywords
electronic equipment
user
target user
information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810220832.2A
Other languages
Chinese (zh)
Other versions
CN108494959B (en
Inventor
王随州
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Quantum Data Technology Co.,Ltd.
Original Assignee
Dongguan Huarui Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Huarui Electronic Technology Co Ltd filed Critical Dongguan Huarui Electronic Technology Co Ltd
Priority to CN202011178211.6A priority Critical patent/CN112367432B/en
Priority to CN201810220832.2A priority patent/CN108494959B/en
Publication of CN108494959A publication Critical patent/CN108494959A/en
Application granted granted Critical
Publication of CN108494959B publication Critical patent/CN108494959B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • G06F18/232Non-hierarchical techniques
    • G06F18/2321Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions
    • G06F18/23213Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/14Vascular patterns

Abstract

The present invention relates to mobile internet technical fields, disclose a kind of data inspection method based on twin check, and this method includes:What whether electronic equipment detection target user triggered a certain data checks operation;If triggering, electronic device prompts target user inputs the corresponding verification information of the data;Electronic equipment judges whether the verification information passes through;If being verified, electronic equipment obtains the networked information of the target user by the designated user in the currently running social networking application of the electronic equipment;Electronic equipment determines that the actual attribute information of the target user, the actual attribute information are used to indicate the identity type of the target user according to the networked information;Electronic equipment judges whether the actual attribute information is consistent with the target property information that the target user has prestored;If consistent, electronic equipment determines that the target user verifies successfully, and exports a certain data.Implement the embodiment of the present invention, Information Security can be improved.

Description

A kind of data inspection method based on twin check
Technical field
The present invention relates to mobile internet technical field more particularly to a kind of data inspection methods based on twin check.
Technical field
With the rapid development of mobile Internet in recent years, user can more and more be related to data in life, and In order to ensure the data safety of user, generally require to verify user information when user needs to check data, with determination Whether the user has the permission for checking data.
In practice, it has been found that existing user information verification is typically limited to monomer information, such as verification input by user Information (can be username and password) etc., but monomer information is easy to be stolen by others, it is relatively low so as to cause Information Security.
Invention content
The embodiment of the invention discloses a kind of data inspection method based on twin check, for improving Information Security.
Wherein, a kind of data inspection method based on twin check, the method includes:
What whether electronic equipment detection target user triggered a certain data checks operation;
If triggering, the electronic device prompts target user inputs the corresponding verification information of the data;
The electronic equipment judges whether the verification information of target user's input is verified;
If being verified, the electronic equipment passes through the contact in the currently running target social networking application of the electronic equipment People obtains the networked information of the target user;
The electronic equipment determines the actual attribute information of the target user, the practical category according to the networked information Property information be used to indicate the identity type of the target user;
The electronic equipment judges whether the actual attribute information is believed with the objective attribute target attribute that the target user has prestored Breath is consistent;
If consistent, the electronic equipment determines that the target user verifies successfully, and exports a certain data.
As an alternative embodiment, in the embodiment of the present invention, whether the electronic equipment detection target user touches That sends out data a certain checks operation, including:
The electronic equipment detect the electronic equipment currently whether export a certain data check verification interface;
If so, whether the electronic equipment detection electronic equipment occurs first and gets rid of action event, if the electronics Equipment occurs first to get rid of action event, detects the wearable device that the electronic equipment is wirelessly connected the second whipping whether occurs and make thing Part judges that first whipping gets rid of direction of action as what event included if the wearable device, which occurs second, gets rid of action event F1 and second whipping as event include whether get rid of direction of action F2 identical, if identical, judge that first whipping is made The whipping that event includes makees the difference DELTA T that the whipping that initial time T1 includes as event with second whipping makees initial time T2 Whether it is less than the whipping that the first predetermined threshold value and first whipping include as event and makees duration t1 and described second and gets rid of Whether the difference DELTA t that the whipping that action event includes makees duration t2 is less than the second predetermined threshold value, if the difference DELTA T is small It is less than the second predetermined threshold value in the first predetermined threshold value and the difference DELTA t, then electronic equipment detection target user's triggering A certain data check operation.
As another optional embodiment, in the embodiment of the present invention, judge that the target is used in the electronic equipment After the verification information of family input is verified and the electronic equipment passes through the currently running mesh of the electronic equipment Before contact person in mark social networking application obtains the networked information of the target user, the method further includes:
The electronic equipment reads preset multiple and different social networking application mark from the wearable device;
The electronic equipment identifies that belong to the electronic equipment current from the plurality of different social networking application mark The social networking application of the social networking application of operation identifies;
The electronic equipment identifies using frequently for target user from the currently running social networking application of the electronic equipment The highest a certain social networking application of rate is as target social networking application;
The electronic equipment obtains the contact person in the target social networking application.
As another optional embodiment, in the embodiment of the present invention, it is social that the electronic equipment obtains the target After contact person in and the electronic equipment passes through in the currently running target social networking application of the electronic equipment Before designated user obtains the networked information of the target user, the method further includes:
The electronic equipment judges whether the target user is live body user, if the target user is live body user, The target user is obtained by the designated user in the currently running target social networking application of the electronic equipment described in executing Networked information the step of;
Wherein, the electronic equipment judges whether the target user is that live body user includes:
The electronic equipment starts the camera built in the electronic equipment, passes through the built-in camera pair of startup The face area of the target user is identified, and judges the target according to the face area of the target user identified Whether user blinks whithin a period of time, if so, determining that the target user is live body user;
Wherein, the built-in camera is the rotatable camera of two axis.
As another optional embodiment, in the embodiment of the present invention, the built-in camera shooting by startup The face area of the target user is identified in head, including:
The electronic equipment carries out surrounding scanning by the built-in camera of startup, and described in scanning determination After the face area of target user, the electronic equipment determines the location parameter of itself, is then adjusted according to the location parameter The whole built-in camera shooting area, so that the shooting area after adjustment is always maintained at the face for covering the target user Portion region.
As another optional embodiment, in the embodiment of the present invention, the electronic equipment is according to the location parameter The built-in camera shooting area is adjusted, so that the shooting area after adjustment is always maintained at the covering target user Face area, including:
When the electronic equipment is overlooked or looked up, the electronic equipment obtains pitching by the location parameter Angle, the pitch angle is indicating angle that the electronic equipment deviates downward or upward;
The electronic equipment calculates the adjustment angle of the built-in camera according to the pitch angle using following formula;
The electronic equipment is according to the shooting angle for adjusting the angle the adjustment built-in camera, so that shooting Region is always maintained at the face area for covering the target user;
Or,
Wherein, the described (Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) It is described for the coordinate of the shooting areaFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area The angle in domain, the m are the length of the camera, the dxFor the face area of the camera and the target user Vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
As another optional embodiment, in the embodiment of the present invention, the electronic equipment passes through the electronic equipment Designated user in currently running target social networking application obtains the networked information of the target user, including:
The electronic equipment reads the contact person in the currently running target social networking application of the electronic equipment;
The electronic equipment obtains contact person and points out information to the attribute of the target user, and the attribute points out information i.e. For the networked information of the target user.
As another optional embodiment, in the embodiment of the present invention, the electronic equipment is according to the networked information Determine the actual attribute information of the target user, including:
It is first general to point out each candidate attribute information of each user of information initializing according to the attribute for the electronic equipment Rate, each user include the contact person in the target user and the target social networking application;
Between the first probability and each user of the electronic equipment according to each candidate attribute information of each user Attribute points out the second probability that relationship iterates to calculate each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the electronic equipment exports each candidate category of each user when iteration ends The third probability of property information;
For the target user, the electronic equipment is using the highest candidate attribute information of third probability as the target The actual attribute information of user, the target user belong to each user.
As another optional embodiment, in the embodiment of the present invention, the calculating process of first probability is:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint The quantity of the contact person of what value.
As another optional embodiment, in the embodiment of the present invention, the calculating process of second probability is:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j When, the βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, institute State βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
In the embodiment of the present invention, when electronic equipment determines that the verification information of target user's input is verified, electronic equipment The networked information of target user can be also obtained, and determines the actual attribute information of target user according to networked information, the practical category Property information be used to indicate the identity type of target user, only when electronic equipment determines that actual attribute information and target user are pre- When the target property information deposited is consistent, electronic equipment just can determine whether that target user verifies successfully, so the present invention is in addition to using list Except body information, networked information has also been used, has improved Information Security.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of flow diagram of the data inspection method based on twin check disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of another data inspection method based on twin check disclosed by the embodiments of the present invention;
Fig. 3 is the flow diagram of another data inspection method based on twin check disclosed by the embodiments of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on this Embodiment in invention, every other reality obtained by those of ordinary skill in the art without making creative efforts Example is applied, shall fall within the protection scope of the present invention.
It should be noted that the term " comprising " and " having " of the embodiment of the present invention and their any deformation, it is intended that Be to cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or equipment not Those of be necessarily limited to clearly to list step or unit, but may include not listing clearly or for these processes, side The intrinsic other steps of method, product or equipment or unit.
The embodiment of the invention discloses a kind of data inspection method based on twin check, for improving Information Security. Attached drawing is combined below to be described in detail.
Embodiment one
Referring to Fig. 1, Fig. 1 is a kind of flow of data inspection method based on twin check disclosed by the embodiments of the present invention Schematic diagram.It may comprise steps of as shown in Figure 1, being somebody's turn to do the data inspection method based on twin check:
What 101, whether electronic equipment detection target user triggered a certain data checks operation, if triggering, execution step 102;Conversely, continuing to execute step 101.
In the embodiment of the present invention, too busy to get away cell phone that electronic equipment can be people in work, life more, Mobile tablet, wearable device (such as smartwatch), personal digital assistant (Personal Digital Assistant, PDA), The various equipment such as mobile internet device (Mobile Internet Device, MID), television set;Wherein, electronic equipment can be with It supports to include but not limited to following network technology:Global system for mobile communications (Global System for Mobile Communications, GSM), General Packet Radio Service (General Packet Radio Service, GPRS), code point Multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (W-CDMA), CDMA2000, IMT are mono- Carrier wave (IMT Single Carrier), enhanced data rates for gsm evolution (Enhanced Data Rates for GSM Evolution, EDGE), Long Term Evolution (Long-Term Evolution, LTE), senior long term evolution technology, time-division it is long Phase evolution technology (Time-Division LTE, TD-LTE), high performance radio LAN (High Performance Radio Local Area Network, HiperLAN), high performance radio wide area network (HiperWAN), local multiple spot distribute Business (Local Multipoint Distribution Service, LMDS), full micro-wave access global inter communication (WiMAX), purple Bee agreement (ZigBee), bluetooth, orthogonal frequency division multiplexi (OFDM), large capacity space-division multiple access (HC-SDMA), general shifting Dynamic telecommunication system (UMTS), Universal Mobile Telecommunications System time division duplex (UMTS-TDD), evolved high-speed packet access (HSPA +), TD SDMA (TD-SCDMA), evolution data optimization (EV-DO), Digital Enhanced Cordless Communications (DECT) and Other.
As an alternative embodiment, in the embodiment of the present invention, whether electronic equipment detection target user triggers certain The mode of operation of checking of one data may include:
Whether electronic equipment detection electronic equipment currently exports checking for a certain data and verifies interface, if electronic equipment is current Do not export a certain data checks that verification interface, electronic equipment can terminate this flow;
If electronic equipment currently exports checking for a certain data and verifies interface, whether electronic equipment can detect electronic equipment Occur first and get rid of action event, if electronic equipment, which occurs first, gets rid of action event, electronic equipment can detect electronics and set Whether the standby wearable device (such as smartwatch or Intelligent bracelet) for being wirelessly connected (such as WiFi or bluetooth), which occurs the second whipping, is made thing Part, if wearable device, which occurs second, gets rid of action event, electronic equipment may determine that the whipping that the first whipping includes as event is made Direction F1 and the second whipping get rid of whether direction of action F2 is identical, if identical, electronic equipment may determine that as what event included The whipping that one whipping includes as event makees the difference that the whipping that initial time T1 and the second whipping include as event makees initial time T2 Whether the whipping for including as event less than the first predetermined threshold value and the first whipping makees duration t1 and the second whipping to value Δ T Whether the difference DELTA t that the whipping for including as event makees duration t2 is less than the second predetermined threshold value, if difference DELTA T is less than first Predetermined threshold value and difference DELTA t are less than the second predetermined threshold value, and idea equipment can detect electronic equipment with wearable device simultaneously Occur it is identical get rid of action event, for example, the wrist of a certain arm can wear the wearable device being wirelessly connected with electronic equipment, And the palm of the arm can hold electronic equipment and carry out whipping, electronic equipment correspondingly can detect electronic equipment with Wearable device occur simultaneously it is identical get rid of action event, and then electronic equipment can accurately detect that target user's triggering is a certain Data check operation.
As an alternative embodiment, when to detect that electronic equipment occurs with wearable device simultaneously identical for electronic equipment Get rid of action event after, electronic equipment can also detect whether to collect the palm print characteristics for the palm for holding electronic equipment, such as Fruit detects to collect the palm print characteristics for the palm for holding electronic equipment, and electronic equipment can notify wearable device acquisition wrist quiet Arteries and veins characteristics of image, and electronic equipment can verify the collected wrist vein image feature of wearable device whether with hold electronics The wrist vein image feature for the same user that the palm print characteristics of the palm of equipment are mutually bound matches, if matched, electronics Equipment can detect electronic equipment and wearable device simultaneously by same user occur it is identical get rid of action event, electronics is set at this time It is standby to detect that target user triggered a certain data checks operation.This embodiment can be improved significantly and detect mesh Mark user triggers the accuracy for checking operation of a certain data.
As an alternative embodiment, electronic equipment collects the side of the palm print characteristics for the palm for holding electronic equipment Formula may include:
Electronic equipment can obtain the video of one section of palmprint image about the palm for holding electronic equipment, from the section about Palmprint image sequence is extracted in the video of palmprint image, which includes multiframe palmprint image;
Electronic equipment extracts palm print characteristics data from the multiframe palmprint image, is carried according to from the multiframe palmprint image The palm print characteristics data taken, to obtain the palm print characteristics data for palmprint match.
Specifically, electronic equipment can be by the palmmprint extracted from each frame palmprint image in the multiframe palmprint image spy Data are levied, are matched respectively with the palm print characteristics data to prestore, it is special to obtain the palmmprint extracted from each frame palmprint image Multiple palm print characteristics data subsets in data, with the palm print characteristics Data Matching to prestore are levied, then, electronic equipment is according to multiple Palm print characteristics data subset, to obtain the palm print characteristics data for palmprint match.
To extract palm print characteristics data instance from two frame palmprint images, electronic equipment will be carried from the two frames palmprint image The palm print characteristics data taken are matched with the palm print characteristics data to prestore respectively, and acquisition is extracted from each frame palmprint image Palm print characteristics data in, with two palm print characteristics the data subset A and B of palm print characteristics Data Matching that prestore, subsequent electronics Equipment obtains the palm print characteristics data for palmprint match according to palm print characteristics data subset A and B.
Wherein, electronic equipment can be obtained according to following at least one mode according to multiple palm print characteristics data subsets Palm print characteristics data for palmprint match:
A) using the union of multiple palm print characteristics data subsets as the palm print characteristics data for palmprint match.For example, the palm Line characteristic subset A include palm print characteristics data { a, b, c, d }, palm print characteristics data subset B include palm print characteristics data c, D, e, f }, then by the union { a, b, c, d, e, f } of palm print characteristics data subset A and B as the palm print characteristics for palmprint match Data.
B) using in multiple palm print characteristics data subsets number of repetition reach the palm print characteristics data of pre-determined number as using In the palm print characteristics data of palmprint match.Such as palm print characteristics data subset A includes palm print characteristics data { a, b, c, d }, palmmprint Characteristic subset B include palm print characteristics data { a, b, e, f }, palm print characteristics data subset C include palm print characteristics data a, c, G, h }, when pre-determined number is 2, palm print characteristics data { a, b, c } number of repetition in palm print characteristics data subset A, B, C reaches Pre-determined number 2, then by palm print characteristics data { a, b, c } as the palm print characteristics data for palmprint match.
C) by the sequence of the number of repetition in multiple palm print characteristics data subsets preceding predetermined number palm print characteristics data As the palm print characteristics data for palmprint match.Such as palm print characteristics data subset A include palm print characteristics data a, b, c, D }, palm print characteristics data subset B includes palm print characteristics data { a, b, e, f }, and palm print characteristics data subset C includes palm print characteristics number Include palm print characteristics data { a, b, i, j } according to { a, c, g, h }, palm print characteristics data subset D, when predetermined number is 3, described The sequence of number of repetition is { a, b, c } in preceding 3 palm print characteristics data in four palm print characteristics data subset ABCD, then will be four The sequence of number of repetition is used as in preceding 3 palm print characteristics data { a, b, c } for palmmprint in a palm print characteristics data subset ABCD Matched palm print characteristics data.
Wherein, pre-determined number and predetermined number can according to the types of the palm print characteristics data specifically for personal recognition, The parameters such as accuracy, the accuracy of personal recognition are configured.The type of palm print characteristics data includes but not limited to:Blur direction Energy feature, Gray-level co-occurrence, palmmprint line structural characteristics, image phase and direction character etc..Implement the above embodiment, it can Accurately to identify palm print characteristics.
As an alternative embodiment, the mode of wearable device acquisition wrist vein image feature may include:
Acquire wrist vein infrared image;
Area-of-interest is intercepted to the wrist vein infrared image of acquisition, the area-of-interest being truncated to is filtered using mean value Wave method is filtered, and carries out gray processing, normalization, and carry out at contrast enhancing using the method that histogram stretches Reason;
Wrist vein image feature extraction is carried out to pretreated image;
Wherein, can be to the wrist vein infrared image interception area-of-interest to acquisition:
The background for getting rid of the wrist vein infrared image of acquisition, writes down the coordinate of wrist vein and background point of interface, so Region within interception is had a common boundary afterwards is as pending picture;
Centered on being taken at random on pending image a bit, to intercept an image block as area-of-interest for the length of side.
Wherein, implement the above embodiment, can accurately identify wrist vein image feature.
As an alternative embodiment, electronic equipment detects electronic equipment with wearable device simultaneously by same user Occur it is identical get rid of action event after, electronic equipment can obtain the location information of electronic equipment, and electronic equipment can be with Notify the location information of wearable device acquisition wearable device, further, electronic equipment may determine that the position letter of electronic equipment Whether breath matches with the location information of wearable device, if it does, electronic equipment can detect that target user triggers certain at this time One data check operation.This implementation, which can be improved more significantly, detects that target user triggered a certain data checks behaviour The accuracy of work.
102, electronic device prompts target user inputs the corresponding verification information of the data.
As an alternative embodiment, electronic equipment can detect whether electronic equipment connects wireless headset, if Detect that electronic equipment is not connected with wireless headset, electronic equipment may be used word or voice mode and directly prompt target user defeated Enter the corresponding verification information of the data;Wherein, verification information may include user's name and password or verification information can also It is that physiological characteristic informations, the embodiment of the present invention such as fingerprint feature information, vocal print feature information, iris feature information are not construed as limiting.
If detecting that electronic equipment connects wireless headset, electronic equipment notice wireless headset detection wireless headset is currently No just to be worn by validated user, if wireless headset detects that wireless headset is currently just being worn by validated user, electronic equipment can To prompt target user to input the corresponding verification information of the data by wireless headset.
Wherein, wireless headset detects that wireless headset just may include currently by the mode that validated user is worn:
Can be arranged in wireless headset be capacitance type sensor reference sensor and condition adjudgement sensor, wherein The position being isolated with external environment is arranged in wireless headset in reference sensor, to avoid external object close to when to benchmark sense The capacitance of device has an impact.Further, wireless headset can pre-save the production line testing capacitor value of reference sensor With the production line testing capacitor value of condition adjudgement sensor, for example, can by the production line testing capacitor value of reference sensor and The production line testing capacitor value of condition adjudgement sensor is pre-stored in the memory in earphone.When wireless headset is switched on, Detect the capacitance of reference sensor and condition adjudgement sensor;And according to the reference sensor capacitance detected and in advance The production line testing capacitor value of the reference sensor first preserved determines influence ginseng of the environment to the capacitance of capacitance type sensor Number;Wherein, environment includes to the affecting parameters of the capacitance of capacitance type sensor:Temperature is to the capacitance of capacitance type sensor The impact factor of impact factor and humidity to the capacitance of capacitance type sensor.Further, wireless headset can be according to environment To the affecting parameters of the capacitance of capacitance type sensor, the condition adjudgement sensor capacitance value detected and the state pre-saved The production line testing capacitor value for judging sensor, judges the wearing state of wireless headset.Wherein, judge the wearing shape of wireless headset State is specially:The condition adjudgement preserved in the affecting parameters and memory of the capacitance of capacitance type sensor is sensed according to environment The production line testing capacitor value of device, calculates the capacitance of condition adjudgement sensor, then judges that the condition adjudgement detected passes The capacitance of sensor whether be more than calculated corresponding capacitance and predetermined threshold value and, if it is, judging wireless ear Machine is wearing state, otherwise judges that wireless headset is non-wearing state.Wherein, this embodiment by the way that benchmark is arranged due to being passed Sensor detects the variation of environment, then on the basis of the detection of reference sensor application state judges that sensor carries out wireless headset The judgement of wearing state, so as to efficiently solve erroneous judgement of the capacitance type sensor to wireless headset wearing state.
Further, after wireless headset determines wireless headset as wearing state, wireless headset can send out verification Sound, and verification sound is collected by microphone by wireless headset and passes through the reflected reflected sound of duct, wireless headset root The duct pore model of the duct is picked out based on signal characteristic according to reflected reflected sound, and can be known by wireless headset Whether the duct pore model of the duct does not match with the duct pore model of the preset validated user of electronic equipment, if phase Match, wireless headset detects that wireless headset is currently just being worn by validated user.Due to everyone duct pore model (also known as ear Road pore structure construction) all it is unique, aforesaid way can reduce the complexity of identification calculating, while improve calculating Speed and accuracy.
103, electronic equipment judges whether the verification information of target user's input is verified, if target user's input is tested It is not verified to demonstrate,prove information, return to step 102;If the verification information of target user's input is verified, step 104- steps are executed Rapid 106.
In the embodiment of the present invention, as previously described, electronic equipment can prompt target user by wireless headset The corresponding verification information of the data is inputted, correspondingly, electronic equipment may determine that target user is tested by what wireless headset inputted Whether card information is verified.
As an alternative embodiment, in the embodiment of the present invention, microphone and drop can be provided on electronic equipment The signal inputted from main microphon is compared with the signal inputted from secondary microphone and is made an uproar to eliminate by noise cancellation circuit, the Dolby circuit Sound;Microphone, receiver and electric contact piece can also be provided on the wireless headset, and wireless headset can be embedded in electronic equipment And it is electrically connected by the circuit of corresponding electric contact piece and electronic equipment.When wireless headset is detached with electronic equipment, nothing The microphone of line earphone becomes the main microphon of electronic equipment, and the microphone of electronic equipment becomes the secondary Mike of electronic equipment Wind;When wireless headset is embedded in electronic equipment, main microphon and secondary microphone are exchanged.In other words, an electronic equipment only needs Want a MIC that can realize the decrease of noise functions conversed wireless headset.
104, electronic equipment obtains target user by the contact person in the currently running target social networking application of electronic equipment Networked information.
In the embodiment of the present invention, the currently running target social networking application of electronic equipment in addition to include microblogging, wechat, QQ it Outside, it can also include the Rich Media for gathering the functions such as group chat, net cast, channel K songs, game on line, online video display and being integrated Social networking application.
As an alternative embodiment, in the embodiment of the present invention, electronic equipment is currently running by electronic equipment The networked information that designated user in target social networking application obtains target user may include:
Electronic equipment reads the contact person in the currently running target social networking application of electronic equipment;
Electronic equipment obtains contact person and points out information to the attribute of target user, and it is target user which, which points out information, Networked information.
In the embodiment of the present invention, when the currently running target social networking application of electronic equipment is set group chat, net cast, frequency When Rich Media's social networking application that the functions such as road K songs, game on line, online video display are integrated, electronic equipment can read to be located at and be somebody's turn to do The contact person in a certain channel in Rich Media's social networking application, as the contact person in currently running target social networking application.Its In, following manner may be used to determine a certain channel in Rich Media's social networking application, i.e., in electronic equipment:Electronic equipment can be with The a certain channel in Rich Media's social networking application is determined according to the data attribute of above-mentioned a certain data binding.For example, when above-mentioned When the data attribute of a certain data binding is music attribute, electronic equipment can determine in Rich Media's social networking application and music Related a certain channel;When the data attribute of above-mentioned a certain data binding is video attribute, electronic equipment can determine the richness A certain channel related with video in media social networking application.Contact person changes at random under this mode, so as to carry The safety of high follow-up authentication.
105, electronic equipment determines the actual attribute information of target user according to networked information, which is used for Indicate the identity type of target user.
As an alternative embodiment, in the embodiment of the present invention, electronic equipment determines that target is used according to networked information The actual attribute information at family may include:
Electronic equipment points out the first probability of each candidate attribute information of each user of information initializing, each user according to attribute Including the contact person in target user and target social networking application;
Electronic equipment is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Relationship iterates to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, electronic equipment exports each candidate attribute letter of each user when iteration ends The third probability of breath;
For target user, electronic equipment is using the highest candidate attribute information of third probability as the practical category of target user Property information, target user belong to above-mentioned each user.
As an alternative embodiment, in the embodiment of the present invention, the calculating process of above-mentioned first probability is:
Above-mentioned first probability is calculated as follows:
Wherein, Wi,jFor the first probability of the candidate attribute information j of user i;
Wherein, the number for the contact person that the candidate attribute information of user i is j is pointed out in the contact person that count (j) is user i Amount;
Wherein,The candidate attribute information that user i is pointed out in contact person for user i is any value The quantity of contact person.
As an alternative embodiment, in the embodiment of the present invention, the calculating process of above-mentioned second probability is:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
Wherein, Vi,jFor the second probability of the candidate attribute information j of user i;
Wherein, α is iterative rate control parameter, and α is constant, and α is used to adjust the speed of iterative calculation;
Wherein, βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also When j, βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, βkTake Two numerical value, the first numerical value are more than the second value;
Wherein, m is the total quantity of all types attribute information;
Wherein, n be user i contact person in user i have attribute point out relationship contact person quantity.
106, electronic equipment judges whether the actual attribute information is consistent with the target property information that target user has prestored; If consistent, step 107 is executed;If inconsistent, terminate this flow.
107, electronic equipment determines that target user verifies successfully, and exports above-mentioned a certain data.
In the method described in Fig. 1, when terminal determines that the verification information of target user's input is verified, terminal can also The networked information of target user is obtained, and determines the actual attribute information of target user according to networked information, actual attribute letter The identity type for indicating target user is ceased, only when terminal determines the target that actual attribute information has prestored with target user When attribute information is consistent, terminal just can determine whether that target user verifies successfully, so the present invention other than using monomer information, is gone back Networked information has been used, Information Security is improved.
Embodiment two
Referring to Fig. 2, Fig. 2 is the stream of another data inspection method based on twin check disclosed by the embodiments of the present invention Journey schematic diagram.It may comprise steps of as shown in Fig. 2, being somebody's turn to do the data inspection method based on twin check:
What 201, whether electronic equipment detection target user triggered a certain data checks operation, if triggering, execution step 202;Conversely, continuing to execute step 201.
In the embodiment of the present invention, the realization method of step 201 can refer to above-mentioned steps 101, and the embodiment of the present invention is not made It repeats.
202, electronic device prompts target user inputs the corresponding verification information of the data.
In the embodiment of the present invention, the realization method of step 202 can refer to above-mentioned steps 102, and the embodiment of the present invention is not made It repeats.
203, electronic equipment judges whether the verification information of target user's input is verified, if target user's input is tested It is not verified to demonstrate,prove information, return to step 202;If the verification information of target user's input is verified, step 204- steps are executed Rapid 210.
204, electronic equipment reads preset multiple and different social networking application mark from wearable device.
205, electronic equipment is identified from multiple and different social networking application marks belongs to the currently running society of electronic equipment Hand over the social networking application mark of application.
In the embodiment of the present invention, the currently running target social networking application of electronic equipment in addition to include microblogging, wechat, QQ it Outside, it can also include the Rich Media for gathering the functions such as group chat, net cast, channel K songs, game on line, online video display and being integrated Social networking application.
206, electronic equipment identifies the frequency of use of target user most from the currently running social networking application of electronic equipment High a certain social networking application is as target social networking application.
207, electronic equipment obtains the contact person in target social networking application.
In the embodiment of the present invention, when the currently running target social networking application of electronic equipment is set group chat, net cast, frequency When Rich Media's social networking application that the functions such as road K songs, game on line, online video display are integrated, electronic equipment can read to be located at and be somebody's turn to do The contact person in a certain channel in Rich Media's social networking application, as the contact person in currently running target social networking application.
208, electronic equipment obtains target user by the contact person in the currently running target social networking application of electronic equipment Networked information.
As an alternative embodiment, in the embodiment of the present invention, electronic equipment is currently running by electronic equipment The networked information that designated user in target social networking application obtains target user may include:
Electronic equipment reads the contact person in the currently running target social networking application of electronic equipment;
Electronic equipment obtains contact person and points out information to the attribute of target user, and it is target user which, which points out information, Networked information.
209, electronic equipment determines the actual attribute information of target user according to networked information, which is used for Indicate the identity type of target user.
As an alternative embodiment, in the embodiment of the present invention, electronic equipment determines that target is used according to networked information The actual attribute information at family may include:
Electronic equipment points out the first probability of each candidate attribute information of each user of information initializing, each user according to attribute Including the contact person in target user and target social networking application;
Electronic equipment is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Relationship iterates to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, electronic equipment exports each candidate attribute letter of each user when iteration ends The third probability of breath;
For target user, electronic equipment is using the highest candidate attribute information of third probability as the practical category of target user Property information, target user belong to above-mentioned each user.
As an alternative embodiment, in the embodiment of the present invention, the calculating process of above-mentioned first probability is:
Above-mentioned first probability is calculated as follows:
Wherein, Wi,jFor the first probability of the candidate attribute information j of user i;
Wherein, the number for the contact person that the candidate attribute information of user i is j is pointed out in the contact person that count (j) is user i Amount;
Wherein,The candidate attribute information that user i is pointed out in contact person for user i is any value The quantity of contact person.
As an alternative embodiment, in the embodiment of the present invention, the calculating process of above-mentioned second probability is:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
Wherein, Vi,jFor the second probability of the candidate attribute information j of user i;
Wherein, α is iterative rate control parameter, and α is constant, and α is used to adjust the speed of iterative calculation;
Wherein, βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also When j, βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, βkTake Two numerical value, the first numerical value are more than the second value;
Wherein, m is the total quantity of all types attribute information;
Wherein, n be user i contact person in user i have attribute point out relationship contact person quantity.
210, electronic equipment judges whether the actual attribute information is consistent with the target property information that target user has prestored; If consistent, step 211 is executed;If inconsistent, terminate this flow.
211, electronic equipment determines that target user verifies successfully, and exports above-mentioned a certain data.
In the method described in Fig. 2, when terminal determines that the verification information of target user's input is verified, terminal can also The networked information of target user is obtained, and determines the actual attribute information of target user according to networked information, actual attribute letter The identity type for indicating target user is ceased, only when terminal determines the target that actual attribute information has prestored with target user When attribute information is consistent, terminal just can determine whether that target user verifies successfully, so the present invention other than using monomer information, is gone back Networked information has been used, Information Security is improved.
Embodiment three
Referring to Fig. 3, Fig. 3 is the stream of another data inspection method based on twin check disclosed by the embodiments of the present invention Journey schematic diagram.It may comprise steps of as shown in figure 3, being somebody's turn to do the data inspection method based on twin check:
What 301, whether electronic equipment detection target user triggered a certain data checks operation, if triggering, execution step 302;Conversely, continuing to execute step 301.
In the embodiment of the present invention, the realization method of step 301 can refer to above-mentioned steps 101, and the embodiment of the present invention is not made It repeats.
302, electronic device prompts target user inputs the corresponding verification information of the data.
In the embodiment of the present invention, the realization method of step 302 can refer to above-mentioned steps 102, and the embodiment of the present invention is not made It repeats.
303, electronic equipment judges whether the verification information of target user's input is verified, if target user's input is tested It is not verified to demonstrate,prove information, return to step 302;If the verification information of target user's input is verified, step 304- steps are executed Rapid 308.
304, electronic equipment reads preset multiple and different social networking application mark from wearable device.
305, electronic equipment is identified from multiple and different social networking application marks belongs to the currently running society of electronic equipment Hand over the social networking application mark of application.
In the embodiment of the present invention, the currently running target social networking application of electronic equipment in addition to include microblogging, wechat, QQ it Outside, it can also include the Rich Media for gathering the functions such as group chat, net cast, channel K songs, game on line, online video display and being integrated Social networking application.
306, electronic equipment identifies the frequency of use of target user most from the currently running social networking application of electronic equipment High a certain social networking application is as target social networking application.
307, electronic equipment obtains the contact person in target social networking application.
In the embodiment of the present invention, when the currently running target social networking application of electronic equipment is set group chat, net cast, frequency When Rich Media's social networking application that the functions such as road K songs, game on line, online video display are integrated, electronic equipment can read to be located at and be somebody's turn to do The contact person in a certain channel in Rich Media's social networking application, as the contact person in currently running target social networking application.
308, electronic equipment judges whether target user is live body user, if target user is live body user, executes step 309- steps 311;Conversely, terminating this flow.
Wherein, electronic equipment judges whether target user is that live body user may include:
Electronic equipment starts the camera built in electronic equipment, by the built-in camera of startup to the face of target user Portion region is identified, and judges whether target user blinks whithin a period of time according to the face area of the target user identified Eye, if so, determining that target user is live body user;If not, it is determined that target user is non-living body user;
Wherein, built-in camera is the rotatable camera of two axis.
As an alternative embodiment, electronic equipment by the built-in camera of startup to the face of target user Region, which is identified, may include:
Electronic equipment carries out surrounding scanning by the built-in camera of startup, and determines the face of target user in scanning Behind portion region, electronic equipment determines the location parameter of itself, and built-in camera shooting is then adjusted according to the location parameter Region, so that the shooting area after adjustment is always maintained at the face area of coverage goal user.
As an alternative embodiment, electronic equipment adjusts built-in camera shooting area according to the location parameter Domain may include so that the shooting area after adjustment is always maintained at the face area of coverage goal user:
When electronic equipment is overlooked or is looked up, electronic equipment obtains pitch angle, the pitching by the location parameter Angle is indicating angle that electronic equipment deviates downward or upward;
Electronic equipment calculates the adjustment angle of built-in camera according to the pitch angle using following formula;
Electronic equipment adjusts the shooting angle of built-in camera according to the adjustment angle, so that shooting area is protected always Hold the face area of coverage goal user;
Or,
Wherein, (Xworld, Zworld) be target user face area coordinate, (Xcamera, Zcamera) it is shooting area Coordinate,For pitch angle, φ is to adjust the angle, and θ is the angle of shooting area, and m is the length of camera, dxFor camera with The vertical range of the face area of target user, dzFor the horizontal distance of camera and the face area of target user.
309, electronic equipment obtains target user by the contact person in the currently running target social networking application of electronic equipment Networked information.
As an alternative embodiment, in the embodiment of the present invention, electronic equipment is currently running by electronic equipment The networked information that designated user in target social networking application obtains target user may include:
Electronic equipment reads the contact person in the currently running target social networking application of electronic equipment;
Electronic equipment obtains contact person and points out information to the attribute of target user, and it is target user which, which points out information, Networked information.
310, electronic equipment determines the actual attribute information of target user according to networked information, which is used for Indicate the identity type of target user.
As an alternative embodiment, in the embodiment of the present invention, electronic equipment determines that target is used according to networked information The actual attribute information at family may include:
Electronic equipment points out the first probability of each candidate attribute information of each user of information initializing, each user according to attribute Including the contact person in target user and target social networking application;
Electronic equipment is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Relationship iterates to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, electronic equipment exports each candidate attribute letter of each user when iteration ends The third probability of breath;
For target user, electronic equipment is using the highest candidate attribute information of third probability as the practical category of target user Property information, target user belong to above-mentioned each user.
As an alternative embodiment, in the embodiment of the present invention, the calculating process of above-mentioned first probability is:
Above-mentioned first probability is calculated as follows:
Wherein, Wi,jFor the first probability of the candidate attribute information j of user i;
Wherein, the number for the contact person that the candidate attribute information of user i is j is pointed out in the contact person that count (j) is user i Amount;
Wherein,The candidate attribute information that user i is pointed out in contact person for user i is the connection of any value It is the quantity of people.
As an alternative embodiment, in the embodiment of the present invention, the calculating process of above-mentioned second probability is:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
Wherein, Vi,jFor the second probability of the candidate attribute information j of user i;
Wherein, α is iterative rate control parameter, and α is constant, and α is used to adjust the speed of iterative calculation;
Wherein, βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also When j, βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, βkTake Two numerical value, the first numerical value are more than the second value;
Wherein, m is the total quantity of all types attribute information;
Wherein, n be user i contact person in user i have attribute point out relationship contact person quantity.
311, electronic equipment judges whether the actual attribute information is consistent with the target property information that target user has prestored; If consistent, step 312 is executed;If inconsistent, terminate this flow.
312, electronic equipment determines that target user verifies successfully, and exports above-mentioned a certain data.
In the method described in Fig. 3, when terminal determines that the verification information of target user's input is verified, terminal can also The networked information of target user is obtained, and determines the actual attribute information of target user according to networked information, actual attribute letter The identity type for indicating target user is ceased, only when terminal determines the target that actual attribute information has prestored with target user When attribute information is consistent, terminal just can determine whether that target user verifies successfully, so the present invention other than using monomer information, is gone back Networked information has been used, Information Security is improved.

Claims (10)

1. a kind of data inspection method based on twin check, which is characterized in that the method includes:
What whether electronic equipment detection target user triggered a certain data checks operation;
If triggering, the electronic device prompts target user inputs the corresponding verification information of the data;
The electronic equipment judges whether the verification information of target user's input is verified;
If being verified, the electronic equipment is obtained by the contact person in the currently running target social networking application of the electronic equipment Take the networked information of the target user;
The electronic equipment determines the actual attribute information of the target user, the actual attribute letter according to the networked information Cease the identity type for indicating the target user;
The electronic equipment judges the target property information one whether the actual attribute information has prestored with the target user It causes;
If consistent, the electronic equipment determines that the target user verifies successfully, and exports a certain data.
2. data inspection method according to claim 1, which is characterized in that whether the electronic equipment detection target user The operation of checking of a certain data is triggered, including:
The electronic equipment detect the electronic equipment currently whether export a certain data check verification interface;
If so, whether the electronic equipment detection electronic equipment occurs first and gets rid of action event, if the electronic equipment Occur first to get rid of action event, detect the wearable device that the electronic equipment is wirelessly connected and whether occur second and get rid of action event, If the wearable device, which occurs second, gets rid of action event, judge first whipping as event include get rid of direction of action F1 with Second whipping as event include whether get rid of direction of action F2 identical, if identical, judge that described first gets rid of action event Including whipping make the whipping that initial time T1 and second whipping include as event make initial time T2 difference DELTA T whether The whipping for including as event less than the first predetermined threshold value and first whipping makees duration t1 and second whipping work Whether the difference DELTA t that the whipping that event includes makees duration t2 is less than the second predetermined threshold value, if the difference DELTA T is less than the One predetermined threshold value and the difference DELTA t are less than the second predetermined threshold value, then electronic equipment detection target user's triggering is a certain Data check operation.
3. data inspection method according to claim 2, which is characterized in that judge that the target is used in the electronic equipment After the verification information of family input is verified and the electronic equipment passes through the currently running mesh of the electronic equipment Before contact person in mark social networking application obtains the networked information of the target user, the method further includes:
The electronic equipment reads preset multiple and different social networking application mark from the wearable device;
The electronic equipment identifies that belonging to the electronic equipment currently runs from the plurality of different social networking application mark Social networking application social networking application mark;
The electronic equipment identifies the frequency of use of target user most from the currently running social networking application of the electronic equipment High a certain social networking application is as target social networking application;
The electronic equipment obtains the contact person in the target social networking application.
4. data inspection method according to claim 3, which is characterized in that it is social that the electronic equipment obtains the target After contact person in and the electronic equipment passes through in the currently running target social networking application of the electronic equipment Before designated user obtains the networked information of the target user, the method further includes:
The electronic equipment judges whether the target user is live body user, if the target user is live body user, executes The connection that the target user is obtained by the designated user in the currently running target social networking application of the electronic equipment The step of net information;
Wherein, the electronic equipment judges whether the target user is that live body user includes:
The electronic equipment starts the camera built in the electronic equipment, by the built-in camera of startup to described The face area of target user is identified, and judges the target user according to the face area of the target user identified Whether blink whithin a period of time, if so, determining that the target user is live body user;
Wherein, the built-in camera is the rotatable camera of two axis.
5. data inspection method according to claim 4, which is characterized in that the built-in camera shooting by startup The face area of the target user is identified in head, including:
The electronic equipment carries out surrounding scanning by the built-in camera of startup, and determines the target in scanning After the face area of user, the electronic equipment determines the location parameter of itself, then according to the location parameter to adjust Built-in camera shooting area is stated, so that the shooting area after adjustment is always maintained at the facial regions for covering the target user Domain.
6. data inspection method according to claim 5, which is characterized in that the electronic equipment is according to the location parameter The built-in camera shooting area is adjusted, so that the shooting area after adjustment is always maintained at the covering target user Face area, including:
When the electronic equipment is overlooked or looked up, the electronic equipment obtains pitch angle, institute by the location parameter Pitch angle is stated to indicate angle that the electronic equipment deviates downward or upward;
The electronic equipment calculates the adjustment angle of the built-in camera according to the pitch angle using following formula;
The electronic equipment is according to the shooting angle for adjusting the angle the adjustment built-in camera, so that shooting area It is always maintained at the face area for covering the target user;
Or,
Wherein, the described (Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) for institute The coordinate of shooting area is stated, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area Angle, the m are the length of the camera, the dxIt hangs down for the face area of the camera and the target user Straight distance, the dzFor the horizontal distance of the camera and the face area of the target user.
7. data inspection method according to claim 6, which is characterized in that the electronic equipment passes through the electronic equipment Designated user in currently running target social networking application obtains the networked information of the target user, including:
The electronic equipment reads the contact person in the currently running target social networking application of the electronic equipment;
The electronic equipment obtains contact person and points out information to the attribute of the target user, and it is institute that the attribute, which points out information, State the networked information of target user.
8. data inspection method according to claim 7, which is characterized in that the electronic equipment is according to the networked information Determine the actual attribute information of the target user, including:
The electronic equipment points out the first probability of each candidate attribute information of each user of information initializing, institute according to the attribute It includes the contact person in the target user and the target social networking application to state each user;
The electronic equipment is according to the attribute between the first probability and each user of each candidate attribute information of each user The relationship of pointing out iterates to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the electronic equipment exports each candidate attribute letter of each user when iteration ends The third probability of breath;
For the target user, the electronic equipment is using the highest candidate attribute information of third probability as the target user Actual attribute information, the target user belongs to each user.
9. data inspection method according to claim 8, which is characterized in that the calculating process of first probability is:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact person that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i Quantity;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is any value Contact person quantity.
10. data inspection method according to claim 9, which is characterized in that the calculating process of second probability is:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j, institute State βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, the βkIt takes Second value, first numerical value are more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
CN201810220832.2A 2018-03-16 2018-03-16 Data viewing method based on double verification Active CN108494959B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011178211.6A CN112367432B (en) 2018-03-16 2018-03-16 Data viewing method based on double verification
CN201810220832.2A CN108494959B (en) 2018-03-16 2018-03-16 Data viewing method based on double verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810220832.2A CN108494959B (en) 2018-03-16 2018-03-16 Data viewing method based on double verification

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202011178211.6A Division CN112367432B (en) 2018-03-16 2018-03-16 Data viewing method based on double verification

Publications (2)

Publication Number Publication Date
CN108494959A true CN108494959A (en) 2018-09-04
CN108494959B CN108494959B (en) 2021-02-02

Family

ID=63339832

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810220832.2A Active CN108494959B (en) 2018-03-16 2018-03-16 Data viewing method based on double verification
CN202011178211.6A Expired - Fee Related CN112367432B (en) 2018-03-16 2018-03-16 Data viewing method based on double verification

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202011178211.6A Expired - Fee Related CN112367432B (en) 2018-03-16 2018-03-16 Data viewing method based on double verification

Country Status (1)

Country Link
CN (2) CN108494959B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138638A (en) * 2019-05-16 2019-08-16 恒安嘉新(北京)科技股份公司 A kind of processing method and processing device of network flow
CN112367432A (en) * 2018-03-16 2021-02-12 卓中朝 Data viewing method based on double verification

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216887A (en) * 2008-01-04 2008-07-09 浙江大学 An automatic computer authentication method for photographic faces and living faces
CN105847127A (en) * 2016-05-04 2016-08-10 腾讯科技(深圳)有限公司 User attribute information determination method and server
CN104967627B (en) * 2015-07-14 2016-09-07 深圳益强信息科技有限公司 A kind of information query method based on management backstage and system
CN105933215A (en) * 2016-07-09 2016-09-07 东莞市华睿电子科技有限公司 Chat message withdraw control method based on instant messaging
CN105302463B (en) * 2015-10-23 2017-11-17 广东欧珀移动通信有限公司 The control method and user terminal of a kind of application program

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9230285B2 (en) * 2011-12-01 2016-01-05 At&T Intellectual Property I, L.P. Method and apparatus for providing a social event opportunity notification
CN104751032A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Authentication method and authentication device
CN107145771B (en) * 2017-04-11 2021-03-16 北京小米移动软件有限公司 Application program unlocking method and device and terminal
CN108494959B (en) * 2018-03-16 2021-02-02 深圳市极信智联科技有限公司 Data viewing method based on double verification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216887A (en) * 2008-01-04 2008-07-09 浙江大学 An automatic computer authentication method for photographic faces and living faces
CN104967627B (en) * 2015-07-14 2016-09-07 深圳益强信息科技有限公司 A kind of information query method based on management backstage and system
CN105302463B (en) * 2015-10-23 2017-11-17 广东欧珀移动通信有限公司 The control method and user terminal of a kind of application program
CN105847127A (en) * 2016-05-04 2016-08-10 腾讯科技(深圳)有限公司 User attribute information determination method and server
CN105933215A (en) * 2016-07-09 2016-09-07 东莞市华睿电子科技有限公司 Chat message withdraw control method based on instant messaging

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367432A (en) * 2018-03-16 2021-02-12 卓中朝 Data viewing method based on double verification
CN110138638A (en) * 2019-05-16 2019-08-16 恒安嘉新(北京)科技股份公司 A kind of processing method and processing device of network flow
CN110138638B (en) * 2019-05-16 2021-07-27 恒安嘉新(北京)科技股份公司 Network traffic processing method and device

Also Published As

Publication number Publication date
CN112367432B (en) 2021-11-26
CN108494959B (en) 2021-02-02
CN112367432A (en) 2021-02-12

Similar Documents

Publication Publication Date Title
Sun et al. Accelerometer-based speed-adaptive gait authentication method for wearable IoT devices
AU2019200642B2 (en) Bio leash for user authentication
US10114935B2 (en) Technologies for login pattern based multi-factor authentication
US20170227995A1 (en) Method and system for implicit authentication
Lin et al. A new non-intrusive authentication method based on the orientation sensor for smartphone users
US10042995B1 (en) Detecting authority for voice-driven devices
WO2019192235A1 (en) User identity authentication method and system based on mobile device
US9160730B2 (en) Continuous authentication confidence module
CN105049709B (en) A kind of big visual angle camera control method and user terminal
US20190130168A1 (en) System, method and apparatus for multi-modal biometric authentication and liveness detection
CN108830062A (en) Face identification method, mobile terminal and computer readable storage medium
ITTO20101069A1 (en) AUTHENTICATION PROCEDURE FOR USERS FOR ACCESS TO AN UNSURPUTABLE MOBILE USER TERMINAL MOBILE USER TERMINAL.
Witte et al. Context-aware mobile biometric authentication based on support vector machines
CN108206892B (en) Method and device for protecting privacy of contact person, mobile terminal and storage medium
Gu et al. Wione: one-shot learning for environment-robust device-free user authentication via commodity wi-fi in man–machine system
CN109033779A (en) A kind of unlock authentication method, wearable device and computer readable storage medium
Lv et al. Wii: Device-free passive identity identification via WiFi signals
CN108494959A (en) A kind of data inspection method based on twin check
CN110062379A (en) Identity identifying method based on channel state information under a kind of human body behavior scene
Wang et al. Continuous user authentication by contactless wireless sensing
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN108174012A (en) A kind of authority control method and mobile terminal
CN107527036A (en) A kind of Environmental security detection method, terminal and computer-readable recording medium
Lin et al. A novel non-intrusive user authentication method based on touchscreen of smartphones
CN106714163A (en) Gesture behavior authentication model constructing method and system based on posture change

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200825

Address after: No.23 Hetian Road, Longgang District, Shenzhen City, Guangdong Province

Applicant after: Zhuo Zhongchao

Address before: 523073, room 35, No. three, Lane 403, Dongguan, Xiping, Guangdong

Applicant before: DONGGUAN HUARUI ELECTRONIC TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210105

Address after: 518000 c3112, block C, West Xintian Century Business Center, Shixia community, Fubao street, Futian District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Jixin Zhilian Technology Co.,Ltd.

Address before: No.23 Hetian Road, Longgang District, Shenzhen City, Guangdong Province

Applicant before: Zhuo Zhongchao

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230412

Address after: 518000 c3112, block C, West Xintian Century Business Center, Shixia community, Fubao street, Futian District, Shenzhen City, Guangdong Province

Patentee after: Shenzhen Quantum Data Technology Co.,Ltd.

Address before: 518000 c3112, block C, West Xintian Century Business Center, Shixia community, Fubao street, Futian District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen Jixin Zhilian Technology Co.,Ltd.

TR01 Transfer of patent right