CN109165488B - Identity authentication method and device - Google Patents

Identity authentication method and device Download PDF

Info

Publication number
CN109165488B
CN109165488B CN201810777329.7A CN201810777329A CN109165488B CN 109165488 B CN109165488 B CN 109165488B CN 201810777329 A CN201810777329 A CN 201810777329A CN 109165488 B CN109165488 B CN 109165488B
Authority
CN
China
Prior art keywords
user
identity information
identity
authenticated
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810777329.7A
Other languages
Chinese (zh)
Other versions
CN109165488A (en
Inventor
方涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201810777329.7A priority Critical patent/CN109165488B/en
Priority to CN202111311689.6A priority patent/CN113961900A/en
Publication of CN109165488A publication Critical patent/CN109165488A/en
Application granted granted Critical
Publication of CN109165488B publication Critical patent/CN109165488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Abstract

The embodiment of the application provides an identity authentication method and an identity authentication device, which are applied to the field of identity identification, and the method comprises the following steps: acquiring first biological characteristic information of a user to be authenticated and second biological characteristic information of a related user for assisting the user to be authenticated in identity authentication; acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information; and according to the first identity information and the social relationship between the first identity information and the second identity information, identity authentication is carried out on the user to be authenticated.

Description

Identity authentication method and device
Technical Field
The present application relates to the field of identity recognition, and in particular, to an identity authentication method and apparatus.
Background
With the rapid development of information technology, identity recognition using biometric information such as irises, fingerprints, and faces has been widely applied in various application scenarios, such as payment scenarios, express pickup scenarios, and membership login scenarios.
Currently, in the prior art, when identity recognition is performed using biometric information in each application scenario, the identity information of a user is generally recognized by pre-establishing a correspondence between the biometric information and the identity information and then matching the acquired biometric information of the user with the pre-established correspondence. However, when biometric information is similar between some users, identification using the method in the prior art may result in identification errors.
Therefore, it is desirable to provide an identity authentication method to improve the accuracy of identity recognition.
Disclosure of Invention
The embodiment of the application aims to provide an identity authentication method and device, wherein first identity information of a user to be authenticated is obtained through first biological characteristic information of the user to be authenticated, and then whether the identity information of the user to be authenticated is the first identity information is verified according to the identified social relationship between second identity information of related users and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
the embodiment of the application provides an identity authentication method, which comprises the following steps:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
and according to the first identity information and the social relationship between the first identity information and the second identity information, performing identity authentication on the user to be authenticated.
The embodiment of the application also provides an identity authentication method, which comprises the following steps:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying the social relationship between the relevant user and the first identity information according to the second biological feature information and the social relationship information corresponding to the first identity information;
and according to the first identity information and the social relationship between the first identity information and the related user, performing identity authentication on the user to be authenticated.
An embodiment of the present application further provides an identity authentication apparatus, including:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
the second acquisition module acquires corresponding first identity information according to the first biological characteristic information and acquires corresponding second identity information according to the second biological characteristic information;
and the first identification module is used for identifying the identity of the user to be identified according to the first identity information and the social relationship between the first identity information and the second identity information.
An embodiment of the present application further provides an identity authentication apparatus, including:
the third acquisition module is used for acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
the fourth acquisition module acquires corresponding first identity information according to the first biological characteristic information and acquires social relation information corresponding to the first identity information;
the verification module verifies the social relationship between the relevant user and the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information;
and the second authentication module is used for authenticating the identity of the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user.
An embodiment of the present application further provides an identity authentication apparatus, including:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
and according to the first identity information and the social relationship between the first identity information and the second identity information, performing identity authentication on the user to be authenticated.
An embodiment of the present application further provides an identity authentication apparatus, including:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying the social relationship between the relevant user and the first identity information according to the second biological feature information and the social relationship information corresponding to the first identity information;
and according to the first identity information and the social relationship between the first identity information and the related user, performing identity authentication on the user to be authenticated.
Embodiments of the present application further provide a storage medium for storing computer-executable instructions, where the computer-executable instructions, when executed, implement the following processes:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
and according to the first identity information and the social relationship between the first identity information and the second identity information, performing identity authentication on the user to be authenticated.
Embodiments of the present application further provide a storage medium for storing computer-executable instructions, where the computer-executable instructions, when executed, implement the following processes:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying the social relationship between the relevant user and the first identity information according to the second biological feature information and the social relationship information corresponding to the first identity information;
and according to the first identity information and the social relationship between the first identity information and the related user, performing identity authentication on the user to be authenticated.
According to the technical scheme in the embodiment, the first identity information is obtained through the first biological characteristic information of the user to be identified, and then whether the identity information of the user to be identified is the first identity information is verified according to the identified social relationship between the second identity information of the related user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of a first method of an identity authentication method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an image including a user to be authenticated and a related user collected in the identity authentication method according to the embodiment of the present application;
fig. 3 is a flowchart of a second method of an identity authentication method according to an embodiment of the present application;
FIG. 4 is a flow chart of a third method of identity authentication provided in an embodiment of the present application;
fig. 5 is a flowchart of a fourth method of an identity authentication method according to an embodiment of the present application;
fig. 6 is a schematic diagram illustrating a first module of an authentication apparatus according to an embodiment of the present disclosure;
fig. 7 is a schematic diagram illustrating a second module of an authentication apparatus according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of an identity authentication apparatus according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides an identity authentication method which can be applied to various scenes needing identity identification, such as a payment scene, an access control scene, a mobile terminal unlocking scene, a member login scene, an express delivery pickup scene and the like.
Fig. 1 is a flowchart of a first method of an identity authentication method according to an embodiment of the present application, where the method shown in fig. 1 at least includes the following steps:
102, acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related users are users assisting the users to be authenticated in identity authentication.
The method provided by the embodiment of the application can be applied to a server side, that is, the execution main body of the method can be the server.
In the embodiment of the present application, the first feature information and the second feature information may be any one of the following information:
facial features, iris features, fingerprint features, voice print features, and the like.
In the embodiment of the present application, the first biometric information and the second biometric information belong to the same kind of biometric information. For example, if the first biometric information is the iris feature, the second biometric information is also the iris feature; if the first biological characteristic information is the facial characteristic, the second biological characteristic information is also the facial characteristic.
In the embodiment of the application, the first biological characteristic information and the second biological characteristic information are biological characteristic information of the same kind, so that the collection of the biological characteristic information of the user to be authenticated and the biological characteristic information of the related user can be completed only by one biological characteristic information collection device, and the cost of the whole identity authentication system is reduced.
When the method provided by the embodiment of the application is adopted for identity authentication, the biological characteristic information of the user to be authenticated and the related user is generally acquired by biological characteristic acquisition equipment, then the acquired biological characteristic information is sent to a server, and the server performs identity authentication according to the acquired biological characteristic information.
Specifically, if the first biometric information and the second biometric information are fingerprint features, the biometric acquisition device is a fingerprint acquisition device, and acquires the fingerprint features of the user to be authenticated and the related user through the fingerprint acquisition device, and sends the acquired fingerprint features to the server.
If yes, the first biological characteristic information and the second biological characteristic information are iris characteristics or face characteristics, and the method may be that an image acquisition device acquires face images of a user to be authenticated and a related user, extracts the first biological characteristic information and the second biological characteristic information from the face images, and sends the first biological characteristic information and the second biological characteristic information to a server.
In a specific embodiment, if the first biometric information and the second biometric information are facial features or iris features, the image acquisition device may acquire an image including a user to be authenticated, send the acquired image to the server, and extract the first biometric information and the second biometric information by the server.
Specifically, in this case, the first biometric information and the second biometric information may be acquired by:
receiving an image of a user to be authenticated; detecting whether the image comprises other users except the user to be identified; if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
The method provided by the embodiment of the application is generally applicable to the situation that related users exist beside the user to be authenticated, so that after the image of the user to be authenticated is received, whether other users exist in the image is detected, if yes, the method provided by the embodiment of the application is adopted for identity authentication, and if not, the method can be switched to other methods for authenticating the identity of the user to be authenticated.
If the image of the user to be identified comprises a plurality of users, the user to be identified in the image is determined by the server conveniently, and when the camera is used for collecting the image, the face of the user to be identified can be placed in a specific area, and then the image is collected. Therefore, the face area of the user to be identified in the shot image is located in the specific area on the image, the server only needs to determine the user with the face located in the specific area on the image as the user to be identified, and other users located on the image are determined as related users of the user to be identified.
For ease of understanding, the following description will be given by way of example.
Fig. 2 shows an image acquired by the image acquisition device, where the image shown in fig. 2 includes a user a and a user B adjacent to the user a, if the face image of the user to be authenticated is placed in a specific area for acquisition, the face of the user to be authenticated in the obtained image is just placed on the left side of the image, it may be determined that the user a is the user to be authenticated, and since the user B is adjacent to the user a, the user B is determined as a relevant user of the user to be authenticated.
And 104, acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information.
In the embodiment of the present application, a correspondence between the biometric information and the identity information may be established in advance, and the correspondence may be stored in the server.
Specifically, before the step 102 is executed, identity information and corresponding biometric information of a plurality of users may be obtained, and then a correspondence between the biometric information and the identity information may be established and stored on the server.
In this way, when the method provided by the embodiment of the present application is executed, after the first biometric information and the second biometric information are acquired in step 102, the first biometric information may be matched with the correspondence stored in the server, and the first identity information corresponding to the first biometric information is determined; and matching the second biological characteristic information with the corresponding relation stored in the server to determine second identity information corresponding to the second biological characteristic information.
Since there may be users with similar first biometric information to the user to be authenticated, in step 104, the acquired first identity information is not necessarily the real identity information of the user to be authenticated, but only the suspected identity information of the user to be authenticated. Therefore, it is necessary to further verify whether the identity of the user to be authenticated is the first identity information through the subsequent steps of the present application.
And 106, performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information.
Specifically, the social relationship may be a couple relationship, a relativity relationship, a friend relationship, a co-worker relationship, or the like.
In this embodiment of the application, in the step 106, the identity of the user to be authenticated is authenticated, and whether the identity of the user to be authenticated is the first identity information is actually authenticated.
In step 106, the identity of the user to be authenticated is authenticated according to the first identity information and the social relationship between the first identity information and the second identity information, which includes at least two cases, which will be discussed below.
In the first case, according to the first identity information and the social relationship between the first identity information and the second identity information, identity authentication is performed on a user to be authenticated, and the method comprises the following steps (A), (B) and (C);
step (A), judging whether the first identity information and the second identity information have a social relationship;
if yes, setting the confidence coefficient of the user to be identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value;
the confidence degree intensity corresponding to the first preset value is higher than the confidence degree corresponding to the second preset value;
and (C) identifying the identity of the user to be identified according to the confidence.
Specifically, in the embodiment of the present application, social relationship information of the first identity information may be established in advance, and the identity information of each user having a social relationship with the first identity information is stored in the social relationship information.
Specifically, the determining whether the first identity information and the second identity information have a social relationship in step (a) includes:
acquiring each identity information in a social relation corresponding to the first identity information; matching the second identity information with each identity information; if the social relationship corresponding to the first identity information comprises identity information matched with the second identity information, determining that the first identity information and the second identity information have the social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
The social relationship information corresponding to the first identity information may be searched from the server, and then the second identity information is matched with each identity information in the social relationship information to search whether the second identity information exists in the social relationship information, if so, it is indicated that the social relationship exists between the first identity information and the second identity information, otherwise, it is indicated that the social relationship does not exist between the first identity information and the second identity information.
In the embodiment of the application, if it is determined that the first identity information and the second identity information have a social relationship, the confidence level of identifying the user to be identified as the first identity information may be considered to be higher, and at this time, the confidence level of identifying the user to be identified as the first identity information may be set to be a first preset value; if the first identity information and the second identity information do not have the social relationship, the confidence coefficient of the user to be identified as the first identity information is considered to be low, and at the moment, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value.
Specifically, in the step (C), the identity authentication of the user to be authenticated according to the confidence specifically includes:
according to the confidence coefficient, determining an identity verification mode adopted by the identity authentication of the user to be authenticated; and adopting a determined identity verification mode to identify the user to be identified.
Specifically, in a specific embodiment, if the confidence is the first preset value, the identity of the user to be authenticated may be authenticated by checking a set digit in the mobile phone number of the user to be authenticated; if the confidence is a second preset value, identifying the identity of the user to be identified by checking the mobile phone number of the user to be identified; wherein, the set digit is less than the digit of the mobile phone number.
The set digit can be any digit such as the first four digits, the second four digits, the first six digits and the like, and the digit is only required to be less than that of the mobile phone number.
In addition, in the embodiment of the application, if it is determined that the first identity information and the second identity information have a social relationship, it is also possible to directly identify the identity information of the user to be identified as the first identity information without adopting other identity verification methods to identify whether the identity information of the user to be identified is the first identity information.
For convenience of understanding, the following description will be given by way of example, and for convenience of description, an identity verification method adopted when the confidence coefficient is a first preset value is referred to as a first identity verification method, and an identity verification method adopted when the confidence coefficient is a second preset value is referred to as a second identity verification method.
For example, the obtained identity information of the user to be authenticated is "three-in-one", the obtained identity information of the related user is "four-in-one", and it is determined that "three-in-one" and "four-in-one" have a social relationship, at this time, in order to improve the accuracy of identity recognition, a first identity verification method is adopted to further verify whether the user to be authenticated is "three-in-one". At this time, the server can prompt the user to be authenticated to input the last four digits of the mobile phone number through the terminal equipment, then, the received last four digits of the mobile phone number are matched with the stored last four digits of the mobile phone number of Zhang III, and if the received last four digits of the mobile phone number are consistent with the stored last four digits of the mobile phone number of Zhang III, the identity information of the user to be authenticated can be considered to be Zhang III; if the two are not consistent, the user to be authenticated is not Zhang III.
For example, the obtained identity information of the user to be authenticated is "three-in-one", the obtained identity information of the related user is "four-in-one", and it is determined that "three-in-one" and "four-in-one" do not have a social relationship, at this time, in order to improve the accuracy of identity recognition, a second identity verification method is adopted to further verify whether the user to be authenticated is "three-in-one". At this time, the server can prompt the user to be authenticated to input the mobile phone number of the user to be authenticated through the terminal equipment, then, the received mobile phone number input by the user is matched with the stored mobile phone number of Zhang III, and if the received mobile phone number input by the user is consistent with the stored mobile phone number of Zhang III, the user to be authenticated can be regarded as Zhang III; if the two are not consistent, the user to be authenticated is not Zhang III.
Of course, the above two examples are only illustrative, and the content of the description is not to be construed as limiting the embodiments of the present application.
In the embodiment of the present application, the identity verification method may use a mobile phone number, and may also use a certificate number such as an identification number, and the specific selection of the identity verification method may be set according to an actual application scenario, and the specific identity verification methods are not listed one by one here.
In a second case, the identity authentication of the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information may further include the following steps (1), (2), and (3);
step (1), judging whether the first identity information and the second identity information have a social relationship;
if yes, setting confidence coefficient for identifying the user to be identified as the first identity information according to the social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value;
the confidence degree intensity corresponding to the second preset value corresponds to the confidence degree when the first identity information and the second identity information have social relations;
and (3) identifying the user to be identified according to the confidence coefficient.
In this case, the specific implementation process of step (1) is the same as that in case one, and the specific implementation process may refer to case one, which is not described herein again.
Wherein, the social relationship type in the step (2) may include: relatives, couples, friends, co-workers, etc.
Since the degree of closeness between the first identity information and the second identity information is different when the type of social relationship between the first identity information and the second identity information is different, for example, the degree of closeness of the relationship may be higher than that of the relationship of a friend, and the degree of closeness of the relationship of a friend is higher than that of a co-worker.
Therefore, in step (2), when there is a social relationship between the first identity information and the second identity information, the confidence level of identifying the user to be authenticated as the first identity information may be set according to the difference in the type of social relationship between the first identity information and the second identity information.
Specifically, if the type of the social relationship between the first identity information and the second identity information is a relationship or a couple relationship, the confidence level that the user to be authenticated is identified as the first identity information may be set as the confidence value a1If the type of the social relationship between the first identity information and the second identity information is a friendship, the confidence level of the user to be authenticated as the first identity information may be set as a confidence level value a2If the co-worker relationship is the social relationship type between the first identity information and the second identity information, the confidence level of the user to be authenticated as the first identity information can be set as the confidence level A3(ii) a Also, in the present embodiment, the confidence value A1Confidence value A2And a confidence value A3The intensity of the corresponding confidence coefficient is stronger than that of the corresponding confidence coefficient of the second preset value, and the confidence value A1Corresponding confidence intensity confidence value A2Corresponding confidence, confidence value A2The corresponding confidence intensity is stronger than the confidence value A3Corresponding toA confidence level.
In one embodiment, the confidence level if the user to be authenticated is identified as the first identity information is A1Then, the identity information of the user to be authenticated can be regarded as the first identity information; or, the last two digits of the mobile phone of the user to be authenticated can be adopted to verify whether the identity information of the user to be authenticated is the first identity information; if the confidence coefficient for identifying the user to be identified as the first identity information is A2Then, the user's identity hip-hop to be authenticated can be considered as the first identity information; or, the four digits behind the mobile phone of the user to be authenticated can be adopted to verify whether the identity information of the user to be authenticated is the first identity information; if the confidence coefficient for identifying the user to be identified as the first identity information is A3Then, the identity information of the user to be authenticated can be regarded as the first identity information; or, the identity information of the user to be authenticated is verified whether to be the first identity information or not by adopting the back six bits of the mobile phone of the user to be authenticated.
In the embodiment of the application, if the identity information of the user to be authenticated is verified to be the first identity information in a mobile phone number mode, the confidence coefficient is A1、A2、A3And when the confidence coefficient is the second preset value, the whole mobile phone number can be adopted to check whether the identity information of the user to be authenticated is the first identity information.
For ease of understanding, the following description will be given by way of example.
For example, the obtained identity information of the user to be authenticated is "zhang san", the obtained identity information of the related user is "liqi", and it is determined that "zhang san" and "liqi" have a social relationship, and it is determined that a couple relationship exists between "zhang san" and "liqi", at this time, the server may prompt the user to be authenticated to input the last two digits of the mobile phone number thereof through the terminal device, then, match the last two digits of the received mobile phone number with the last two digits of the stored mobile phone number of "zhang san", if the two digits are identical, the identity information of the user to be authenticated is considered as "zhang san", and if the two digits are not identical, the user to be authenticated may be considered as not "zhang san".
Continuing to use the above example, if the friendship between Zhang III and Li IV is determined, the server can prompt the user to be authenticated to input the last four digits of the mobile phone number through the terminal device, then match the last four digits of the received mobile phone number with the last four digits of the stored mobile phone number of Zhang III, if the two are consistent, the identity information of the user to be authenticated is determined to be Zhang III, and if the two are inconsistent, the user to be authenticated is determined not to be Zhang III.
Continuing to use the above example, if the co-worker relationship between Zhang III and Liqu is determined, the server can prompt the user to be authenticated to input the last six digits of the mobile phone number through the terminal device, then match the last four digits of the received mobile phone number with the last six digits of the stored mobile phone number of Zhang III, if the two digits are consistent, the identity information of the user to be authenticated is determined to be Zhang III, and if the two digits are not consistent, the user to be authenticated can be determined not to be Zhang III.
Of course, the above exemplary indication is exemplary, the adopted numbers are not necessarily the last two digits, the last four digits and the last six digits of the mobile phone number, and may be other digits at other positions, as long as the digits of the mobile phone number used in the co-workers relationship are greater than the digits of the mobile phone number corresponding to the friendship relationship, and the mobile phone number corresponding to the friendship relationship is located more than the mobile phone number corresponding to the couple or the relatives relationship.
Of course, besides using the mobile phone number to identify the identity information of the user to be identified, other methods such as an identity card number and the like can be used to identify whether the identity information of the user to be identified is the first identity information.
In the embodiment of the application, the identity information of the user to be authenticated is verified by using different identity verification modes according to different types of social relations between the first identity information and the second identity information, so that the identity verification mode is more flexibly selected, the user experience is improved, the complexity of identity verification is increased when the degree of closeness between the first identity information and the second identity information represented by the type of social relations between the first identity information and the second identity information is low, and the accuracy of identity authentication can be further improved.
According to the identity authentication method provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the second identity information is obtained according to the second biological characteristic information of the related user, and then whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Based on the methods shown in fig. 1 and fig. 2, the embodiment of the present application further provides an identity authentication method,
fig. 3 shows a flowchart of a second method of the identity authentication method provided in the embodiment of the present application, and for the method shown in fig. 3, differences from the methods shown in fig. 1 and fig. 2 are mainly introduced here, and reference may be made to the description of the corresponding embodiment in fig. 1 and fig. 2 for the same points, which are not repeated here. With respect to the method shown in fig. 3, the method at least comprises the following steps:
step 302, acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related users are users assisting the users to be authenticated in identity authentication.
In this step, the specific process of acquiring the first biometric information of the user to be authenticated and acquiring the second biometric information of the user related to the user to be authenticated is the same as the acquisition process of the embodiment corresponding to fig. 1 and fig. 2, and the specific acquisition process may refer to the description of the foregoing embodiment, and is not repeated here.
And step 304, acquiring corresponding first identity information according to the first biological characteristic information, and acquiring social relationship information corresponding to the first identity information.
In the embodiment of the application, the server stores the corresponding relationship between the biometric information and the identity information in advance, so that after the first biometric information of the user to be authenticated is acquired, the first biometric information can be matched with the corresponding relationship stored in advance to determine the first identity information corresponding to the first biometric information.
In addition, social relationship information corresponding to each identity information is stored in the server in advance, and after the first identity information corresponding to the first biological feature information is determined, the social relationship information corresponding to the first identity information is searched according to the first identity information.
Specifically, the social relationship information corresponding to the first identity information may be biometric information corresponding to each identity information having a social relationship with the first identity information.
And step 306, verifying the social relationship between the relevant user and the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information.
In step 306, the method for verifying the social relationship between the relevant user and the first identity information according to the second biometric information and the social relationship information corresponding to the first identity information specifically includes the following steps:
acquiring user information in social relationship information corresponding to the first identity information; matching the second biological characteristic information with the user information; and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
The user information refers to the biological feature information of each user having a social relationship with the first identity information.
And 308, performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user.
Specifically, in this embodiment of the application, in step 308, according to the first identity information and the social relationship between the first identity information and the relevant user, the identity authentication of the user to be authenticated may be implemented through the following processes:
if the first identity information and the related user have social relations, setting the confidence coefficient of the user to be identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree intensity corresponding to the first preset value is higher than the confidence degree corresponding to the second preset value; and authenticating the identity of the user to be authenticated according to the confidence.
Alternatively, in the step 308, the identity of the user to be authenticated is authenticated according to the first identity information and the social relationship between the first identity information and the relevant user, and the following processes may be further implemented:
if the first identity information and the related user have social relations, setting confidence coefficient for identifying the user to be identified as the first identity information according to the type of the social relations between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to a second preset value; and performing identity authentication on the user to be authenticated according to the confidence coefficient.
In addition, in the embodiment of the present application, the performing identity authentication on the user to be authenticated according to the confidence level includes:
according to the confidence coefficient, determining an identity verification mode adopted by the identity authentication of the user to be authenticated; and adopting a determined identity verification mode to identify the user to be identified.
Specifically, if the confidence is a first preset value, the identity of the user to be authenticated is authenticated by checking a set digit in the mobile phone number of the user to be authenticated; if the confidence is a second preset value, identifying the identity of the user to be identified by checking the mobile phone number of the user to be identified; wherein, the set digit is less than the digit of the mobile phone number.
Specifically, in the embodiment of the present application, the specific implementation process of each step is the same as that in the embodiment corresponding to fig. 1 and fig. 2, and the specific implementation process may refer to the implementation process in the embodiment corresponding to fig. 1 and fig. 2, and is not described herein again.
In order to facilitate understanding of the identity authentication method provided in the embodiments of the present application, the following description will be given by way of specific examples.
Fig. 4 is a flowchart illustrating a third method of an identity authentication method provided in an embodiment of the present application, where the method illustrated in fig. 4 at least includes the following steps:
step 402 receives an image of a user to be authenticated.
Besides the user to be authenticated, the image also comprises other users.
Step 404, determining the user to be authenticated and the related user of the user to be authenticated in the image.
Specifically, when image acquisition is performed, image acquisition may be performed only when the face of the user to be identified is located in the set acquisition region, and therefore, the server may directly determine the face image at the set position in the image as the face image of the user to be identified.
And determining other users except the user to be authenticated in the image as related users of the user to be authenticated.
Step 406, extracting the first facial feature information of the user to be identified and the second facial feature information of the related user from the image.
And step 408, acquiring corresponding first identity information according to the first facial feature information, and acquiring second identity information according to the second facial feature information.
And step 410, obtaining social relationship information corresponding to the first identity information.
Step 412, verifying whether the first identity information and the second identity information have a social relationship according to the second identity information and the social relationship information; if yes, go to step 414; otherwise, go to step 416;
step 414, setting the confidence coefficient of the user to be authenticated as the first identity information as a first preset value, and verifying whether the identity information of the user to be authenticated is the first identity information by adopting a first identity verification mode corresponding to the first preset value;
step 416, the confidence level that the user to be authenticated is authenticated as the first identity information is set as a second preset value, and whether the identity information of the user to be authenticated is the first identity information is verified in a second identity verification mode corresponding to the second preset value.
The first identity verification mode may be to verify several digits of the mobile phone number of the user to be authenticated, and the second identity verification mode may be to verify the whole mobile phone number of the user to be authenticated.
The specific implementation process of each step in the embodiment shown in fig. 4 may refer to the specific implementation process of each step in the embodiment corresponding to fig. 1 and fig. 2, and is not described herein again.
Fig. 5 is a flowchart of a fourth method of an identity authentication method according to an embodiment of the present application, where the method shown in fig. 5 at least includes the following steps:
step 502, receive the image of the user to be authenticated.
Besides the user to be authenticated, the image also comprises other users.
Step 504, determining the user to be authenticated and the related user of the user to be authenticated in the image.
Specifically, when image acquisition is performed, image acquisition may be performed only when the face of the user to be identified is located in the set acquisition region, and therefore, the server may directly determine the face image at the set position in the image as the face image of the user to be identified.
And determining other users except the user to be authenticated in the image as related users of the user to be authenticated.
Step 506, extracting first facial feature information of the user to be identified and second facial feature information of the related user from the image.
And step 508, acquiring corresponding first identity information according to the first facial feature information.
Step 510, obtaining social relationship information corresponding to the first identity information.
The social relationship information stores face feature information of each user having a social relationship with the first identity information.
Step 512, matching the second facial feature information with the facial feature information of each user in the social relationship information; if there is facial feature information matching the second facial feature information, go to step 514; otherwise, step 516 is performed.
Step 514, the confidence that the user to be authenticated is authenticated as the first identity information is set as a first preset value, and whether the identity information of the user to be authenticated is the first identity information is verified in a first identity verification mode corresponding to the first preset value.
Step 516, the confidence level of the user to be authenticated as the first identity information is set as a second preset value, and a second identity verification mode corresponding to the second preset value is adopted to verify whether the identity information of the user to be authenticated is the first identity information.
The specific implementation process of each step in the embodiment shown in fig. 5 may refer to the specific implementation process of each step in the embodiment corresponding to fig. 1 and fig. 2, and is not described herein again.
According to the identity authentication method provided by the embodiment of the application, corresponding first identity information is obtained according to first biological characteristic information of a user to be authenticated, social relationship information corresponding to the first identity information is obtained, then, according to second biological characteristic verification of a related user and the social relationship information corresponding to the first identity information, the social relationship between the first identity information and the related user is verified, and whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the related user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Corresponding to the above identity authentication method, based on the same idea, an identity authentication apparatus is further provided in the embodiments of the present application, where the apparatus is applicable to a server side, fig. 6 is a schematic diagram of a first module composition of the identity authentication apparatus provided in the embodiments of the present application, and the apparatus shown in fig. 6 includes:
a first obtaining module 61, configured to obtain first biometric information of a user to be authenticated, and obtain second biometric information of a user related to the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
a second obtaining module 62, configured to obtain corresponding first identity information according to the first biometric information, and obtain corresponding second identity information according to the second biometric information;
the first identification module 63 is configured to identify the user to be identified according to the first identity information and the social relationship between the first identity information and the second identity information.
Optionally, the first identifying module 63 is specifically configured to:
judging whether the first identity information and the second identity information have a social relationship or not; if so, setting the confidence coefficient that the user to be authenticated is authenticated as the first identity information as a first preset value; otherwise, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value; and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the first identifying module 63 is specifically configured to:
judging whether the first identity information and the second identity information have a social relationship or not; if so, setting confidence level for identifying the user to be identified as the first identity information according to the type of social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree corresponding to the second preset value is enhanced when the first identity information and the second identity information have social relations; and identifying the user to be identified according to the confidence coefficient.
Optionally, the first identifying module 63 is further specifically configured to:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient; and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the first identifying module 63 is further specifically configured to:
acquiring each identity information in the social relationship information corresponding to the first identity information; matching the second identity information with each identity information; if the social relationship corresponding to the first identity information includes identity information matched with the second identity information, determining that the first identity information and the second identity information have a social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
Optionally, the first obtaining module 61 is specifically configured to:
receiving the image of the user to be authenticated; detecting whether the image comprises other users besides the user to be identified; if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
The identity authentication device provided by the embodiment of the application acquires corresponding first identity information according to the first biological characteristic information of the user to be authenticated, acquires second identity information according to the second biological characteristic information of the related user, and then verifies whether the identity information of the user to be authenticated is the first identity information according to the social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Corresponding to the above identity authentication method, based on the same idea, an identity authentication apparatus is further provided in the embodiments of the present application, where the apparatus is applicable to a server side, fig. 7 is a schematic diagram of a second module composition of the identity authentication apparatus provided in the embodiments of the present application, and the apparatus shown in fig. 7 includes:
a third obtaining module 71, configured to obtain first biometric information of a user to be authenticated, and obtain second biometric information of a user related to the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
a fourth obtaining module 72, configured to obtain corresponding first identity information according to the first biometric information, and obtain social relationship information corresponding to the first identity information;
a verification module 73, configured to verify a social relationship between the relevant user and the first identity information according to the second biometric information and social relationship information corresponding to the first identity information;
the second authentication module 74 authenticates the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user.
Optionally, the verification module 73 is specifically configured to:
acquiring user information in the social relationship information corresponding to the first identity information; matching the second biological characteristic information with the user information; and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
Optionally, the second authentication module 74 is specifically configured to:
if the first identity information and the related user have a social relationship, setting the confidence coefficient that the user to be identified is identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the second authentication module 74 is specifically configured to:
if the first identity information and the related user have a social relationship, setting a confidence level for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the second authentication module 74 is further specifically configured to:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient; and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the third obtaining module 71 is specifically configured to:
receiving the image of the user to be authenticated; detecting whether the image comprises other users besides the user to be identified; if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
According to the identity authentication device provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the social relationship information corresponding to the first identity information is obtained, then, the social relationship between the first identity information and the relevant user is verified according to the second biological characteristic verification of the relevant user and the social relationship information corresponding to the first identity information, and whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the relevant user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Further, based on the methods shown in fig. 1 to fig. 5, an embodiment of the present application further provides an identity authentication apparatus, as shown in fig. 8.
The authentication device may vary greatly in configuration or performance and may include one or more processors 801 and memory 802, where the memory 802 may store one or more stored applications or data. Wherein the memory 802 may be a transient storage or a persistent storage. The application stored in memory 802 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for the identity authentication device. Still further, the processor 801 may be configured to communicate with the memory 802 to execute a series of computer-executable instructions in the memory 802 on the authentication device. The authentication apparatus may also include one or more power supplies 803, one or more wired or wireless network interfaces 804, one or more input-output interfaces 805, one or more keyboards 806, and the like.
In one particular embodiment, an authentication apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the authentication apparatus, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
and performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information.
Optionally, when executed, the computer-executable instructions perform authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information, including:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting the confidence coefficient that the user to be authenticated is authenticated as the first identity information as a first preset value; otherwise, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed, the computer-executable instructions perform authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information, including:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting confidence level for identifying the user to be identified as the first identity information according to the type of social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree corresponding to the second preset value is enhanced when the first identity information and the second identity information have social relations;
and identifying the user to be identified according to the confidence coefficient.
Optionally, when executed, the performing identity authentication on the user to be authenticated according to the confidence level includes:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction is executed, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the determining whether the first identity information and the second identity information have a social relationship when executed by computer-executable instructions comprises:
acquiring each identity information in the social relationship information corresponding to the first identity information;
matching the second identity information with each identity information;
if the social relationship corresponding to the first identity information includes identity information matched with the second identity information, determining that the first identity information and the second identity information have a social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
Optionally, the obtaining first biometric information of the user to be authenticated and obtaining second biometric information of a related user of the user to be authenticated, when the computer-executable instructions are executed, includes:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
According to the identity authentication device provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the second identity information is obtained according to the second biological characteristic information of the related user, and then whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
In one particular embodiment, an authentication apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the authentication apparatus, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying the social relationship between the related user and the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information;
and according to the first identity information and the social relationship between the first identity information and the related user, performing identity authentication on the user to be authenticated.
Optionally, when executed, the verifying the social relationship between the relevant user and the first identity information according to the second biometric information and the social relationship information corresponding to the first identity information includes:
acquiring user information in the social relationship information corresponding to the first identity information;
matching the second biological characteristic information with the user information;
and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
Optionally, when executed, the computer-executable instructions perform authentication on the user to be authenticated according to the first identity information and a social relationship between the first identity information and the related user, including:
if the first identity information and the related user have a social relationship, setting the confidence coefficient that the user to be identified is identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed, the computer executable instructions perform the authentication of the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user, including
If the first identity information and the related user have a social relationship, setting a confidence level for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed, the performing identity authentication on the user to be authenticated according to the confidence level includes:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction is executed, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the obtaining first biometric information of the user to be authenticated and obtaining second biometric information of a related user of the user to be authenticated, when the computer-executable instructions are executed, includes:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
According to the identity authentication device provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the social relationship information corresponding to the first identity information is obtained, then, the social relationship between the first identity information and the relevant user is verified according to the second biological characteristic verification of the relevant user and the social relationship information corresponding to the first identity information, and whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the relevant user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Further, based on the methods shown in fig. 1 to fig. 5, in a specific embodiment, the storage medium is a usb disk, an optical disk, a hard disk, and the like, and the storage medium stores computer-executable instructions that, when executed by the processor, implement the following processes:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
and performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information.
Optionally, when executed by a processor, the authenticating the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information includes:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting the confidence coefficient that the user to be authenticated is authenticated as the first identity information as a first preset value; otherwise, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed by a processor, the authenticating the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information includes:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting confidence level for identifying the user to be identified as the first identity information according to the type of social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree corresponding to the second preset value is enhanced when the first identity information and the second identity information have social relations;
and identifying the user to be identified according to the confidence coefficient.
Optionally, when executed by a processor, the computer-executable instructions stored in the storage medium perform identity authentication on the user to be authenticated according to the confidence level, including:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction stored in the storage medium is executed by the processor, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set number of digits in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, determine whether the first identity information and the second identity information have a social relationship therebetween, including:
acquiring each identity information in the social relationship information corresponding to the first identity information;
matching the second identity information with each identity information;
if the social relationship corresponding to the first identity information includes identity information matched with the second identity information, determining that the first identity information and the second identity information have a social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, the acquiring first biometric information of the user to be authenticated and acquiring second biometric information of a user related to the user to be authenticated include:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
When executed by a processor, a computer executable instruction stored in a storage medium in the embodiment of the application acquires corresponding first identity information according to first biological characteristic information of a user to be authenticated and second identity information according to second biological characteristic information of a related user, and then verifies whether the identity information of the user to be authenticated is the first identity information according to a social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Further, the present application provides a storage medium for storing computer-executable instructions, in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and the storage medium stores computer-executable instructions that, when executed by a processor, implement the following processes:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying the social relationship between the related user and the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information;
and according to the first identity information and the social relationship between the first identity information and the related user, performing identity authentication on the user to be authenticated.
Optionally, when executed by a processor, the verifying the social relationship between the relevant user and the first identity information according to the second biometric information and the social relationship information corresponding to the first identity information includes:
acquiring user information in the social relationship information corresponding to the first identity information;
matching the second biological characteristic information with the user information;
and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
Optionally, when executed by a processor, the authenticating the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user includes:
if the first identity information and the related user have a social relationship, setting the confidence coefficient that the user to be identified is identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, authenticate the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user, including
If the first identity information and the related user have a social relationship, setting a confidence level for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed by a processor, the computer-executable instructions stored in the storage medium perform identity authentication on the user to be authenticated according to the confidence level, including:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction stored in the storage medium is executed by the processor, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set number of digits in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, the acquiring first biometric information of the user to be authenticated and acquiring second biometric information of a user related to the user to be authenticated include:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
When executed by a processor, a computer executable instruction stored in a storage medium in the embodiment of the application acquires corresponding first identity information according to first biological characteristic information of a user to be authenticated and social relationship information corresponding to the first identity information, then verifies the social relationship between the first identity information and a related user according to second biological characteristic verification of the related user and the social relationship information corresponding to the first identity information, and verifies whether the identity information of the user to be authenticated is the first identity information according to the social relationship between the related user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (21)

1. An identity authentication method comprising:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
according to the first identity information and the judgment result of whether the first identity information and the second identity information have social relation, performing identity authentication on the user to be authenticated so as to authenticate whether the identity of the user to be authenticated is the first identity information;
the performing identity authentication on the user to be authenticated according to the first identity information and the judgment result of whether the social relationship exists between the first identity information and the second identity information comprises:
if the first identity information and the second identity information have a social relationship, determining the confidence of the user to be authenticated as the first identity information;
and performing identity authentication on the user to be authenticated according to the confidence.
2. The method of claim 1, wherein the authenticating the user to be authenticated according to the first identity information and the determination result of whether the first identity information and the second identity information have a social relationship includes:
if the first identity information and the second identity information have a social relationship, setting the confidence coefficient of the user to be authenticated as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be authenticated as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence.
3. The method of claim 1, wherein the authenticating the user to be authenticated according to the first identity information and the determination result of whether the first identity information and the second identity information have a social relationship includes:
if the first identity information and the second identity information have a social relationship, setting confidence for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be authenticated as the first identity information as a second preset value; when the first identity information and the second identity information have social relations, the corresponding confidence degree strength is higher than the confidence degree corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence.
4. The method according to claim 2 or 3, wherein the authenticating the user to be authenticated according to the confidence level comprises:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
5. The method according to claim 4, wherein if the confidence is a first preset value, the identity of the user to be authenticated is authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, performing identity authentication on the user to be authenticated in a mode of verifying the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
6. The method of claim 2 or 3, further comprising:
acquiring each identity information in the social relationship information corresponding to the first identity information;
matching the second identity information with each identity information;
if the social relationship corresponding to the first identity information has identity information matched with the second identity information, determining that the first identity information and the second identity information have a social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
7. The method of claim 1, wherein the obtaining first biometric information of a user to be authenticated and obtaining second biometric information of a related user of the user to be authenticated comprises:
receiving an image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
8. An identity authentication method comprising:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying whether the related user has a social relationship with the first identity information according to the second biological feature information and the social relationship information corresponding to the first identity information;
according to the first identity information and a verification result of whether the first identity information and the related user have a social relationship, performing identity authentication on the user to be authenticated so as to authenticate whether the identity of the user to be authenticated is the first identity information;
the performing identity authentication on the user to be authenticated according to the first identity information and the verification result of whether the social relationship exists between the first identity information and the related user comprises:
if the first identity information and the related user have a social relationship, determining the confidence degree that the user to be identified is the first identity information;
and performing identity authentication on the user to be authenticated according to the confidence.
9. The method of claim 8, wherein the verifying whether the relevant user has a social relationship with the first identity information according to the second biometric information and the social relationship information corresponding to the first identity information comprises:
acquiring user information in social relationship information corresponding to the first identity information;
matching the second biological characteristic information with the user information;
and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
10. The method of claim 8 or 9, wherein the authenticating the user to be authenticated according to the first identity information and a verification result of whether the first identity information and the related user have a social relationship includes:
if the first identity information and the related user have a social relationship, setting the confidence coefficient that the user to be identified is identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be authenticated as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence.
11. The method of claim 8 or 9, wherein the authenticating the user to be authenticated according to the first identity information and the verification result of whether the first identity information and the related user have a social relationship comprises authenticating the user to be authenticated according to the first identity information and the verification result of whether the first identity information and the related user have a social relationship
If the first identity information and the related user have social relations, setting confidence level for identifying the user to be identified as the first identity information according to the type of the social relations between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be authenticated as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence.
12. An authentication apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
the second acquisition module acquires corresponding first identity information according to the first biological characteristic information and acquires corresponding second identity information according to the second biological characteristic information;
the first identification module is used for identifying the identity of the user to be identified according to the first identity information and the judgment result of whether the first identity information and the second identity information have social relation so as to identify whether the identity of the user to be identified is the first identity information;
the first identification module is used for determining the confidence degree of the user to be identified as the first identity information if the first identity information and the second identity information have a social relationship; and performing identity authentication on the user to be authenticated according to the confidence.
13. The apparatus of claim 12, the first authentication module to:
if the first identity information and the second identity information have a social relationship, setting the confidence coefficient of the user to be authenticated as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be authenticated as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value; and performing identity authentication on the user to be authenticated according to the confidence.
14. The apparatus of claim 12, the first authentication module to:
if the first identity information and the second identity information have a social relationship, setting confidence for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be authenticated as the first identity information as a second preset value; when the first identity information and the second identity information have social relations, the corresponding confidence degree strength is higher than the confidence degree corresponding to the second preset value; and performing identity authentication on the user to be authenticated according to the confidence.
15. The apparatus of claim 13 or 14, the first authentication module further to:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient; and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
16. An authentication apparatus comprising:
the third acquisition module is used for acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
the fourth acquisition module acquires corresponding first identity information according to the first biological characteristic information and acquires social relation information corresponding to the first identity information;
the verification module verifies whether the related user has a social relationship with the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information;
the second identification module is used for identifying the identity of the user to be identified according to the first identity information and the verification result of whether the social relationship exists between the first identity information and the related user so as to identify whether the identity of the user to be identified is the first identity information;
the second identification module is used for determining the confidence degree of the user to be identified as the first identity information if the first identity information and the related user have social relations; and performing identity authentication on the user to be authenticated according to the confidence.
17. The apparatus of claim 16, wherein the verification module is specifically configured to:
acquiring user information in social relationship information corresponding to the first identity information; matching the second biological characteristic information with the user information; and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
18. An identity authentication device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
according to the first identity information and the judgment result of whether the first identity information and the second identity information have social relation, performing identity authentication on the user to be authenticated so as to authenticate whether the identity of the user to be authenticated is the first identity information;
the performing identity authentication on the user to be authenticated according to the first identity information and the verification result of whether the social relationship exists between the first identity information and the related user comprises:
if the first identity information and the related user have a social relationship, determining the confidence degree that the user to be identified is the first identity information;
and performing identity authentication on the user to be authenticated according to the confidence.
19. An identity authentication device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying whether the related user has a social relationship with the first identity information according to the second biological feature information and the social relationship information corresponding to the first identity information;
according to the first identity information and a verification result of whether the first identity information and the related user have a social relationship, performing identity authentication on the user to be authenticated so as to authenticate whether the identity of the user to be authenticated is the first identity information;
the performing identity authentication on the user to be authenticated according to the first identity information and the verification result of whether the social relationship exists between the first identity information and the related user comprises:
if the first identity information and the related user have a social relationship, determining the confidence degree that the user to be identified is the first identity information;
and performing identity authentication on the user to be authenticated according to the confidence.
20. A storage medium storing computer-executable instructions that, when executed, implement the following:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
according to the first identity information and the judgment result of whether the first identity information and the second identity information have social relation, performing identity authentication on the user to be authenticated so as to authenticate whether the identity of the user to be authenticated is the first identity information;
the performing identity authentication on the user to be authenticated according to the first identity information and the judgment result of whether the social relationship exists between the first identity information and the second identity information comprises:
if the first identity information and the second identity information have a social relationship, determining the confidence of the user to be authenticated as the first identity information;
and performing identity authentication on the user to be authenticated according to the confidence.
21. A storage medium storing computer-executable instructions that, when executed, implement the following:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying whether the related user has a social relationship with the first identity information according to the second biological feature information and the social relationship information corresponding to the first identity information;
according to the first identity information and a verification result of whether the first identity information and the related user have a social relationship, performing identity authentication on the user to be authenticated so as to authenticate whether the identity of the user to be authenticated is the first identity information;
the performing identity authentication on the user to be authenticated according to the first identity information and the verification result of whether the social relationship exists between the first identity information and the related user comprises:
if the first identity information and the related user have a social relationship, determining the confidence degree that the user to be identified is the first identity information;
and performing identity authentication on the user to be authenticated according to the confidence.
CN201810777329.7A 2018-07-16 2018-07-16 Identity authentication method and device Active CN109165488B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810777329.7A CN109165488B (en) 2018-07-16 2018-07-16 Identity authentication method and device
CN202111311689.6A CN113961900A (en) 2018-07-16 2018-07-16 Identity authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810777329.7A CN109165488B (en) 2018-07-16 2018-07-16 Identity authentication method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202111311689.6A Division CN113961900A (en) 2018-07-16 2018-07-16 Identity authentication method and device

Publications (2)

Publication Number Publication Date
CN109165488A CN109165488A (en) 2019-01-08
CN109165488B true CN109165488B (en) 2021-10-22

Family

ID=64897935

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111311689.6A Pending CN113961900A (en) 2018-07-16 2018-07-16 Identity authentication method and device
CN201810777329.7A Active CN109165488B (en) 2018-07-16 2018-07-16 Identity authentication method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202111311689.6A Pending CN113961900A (en) 2018-07-16 2018-07-16 Identity authentication method and device

Country Status (1)

Country Link
CN (2) CN113961900A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056114A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 Business card content identification method and business card content identification device
CN107250949A (en) * 2015-02-11 2017-10-13 谷歌公司 Based on the method, system and the medium that have inanimate object recommendation computerization service in user environment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009094372A1 (en) * 2008-01-22 2009-07-30 Authentium, Inc. System and method for protecting data accessed through a network connection
CN103399896B (en) * 2013-07-19 2019-08-23 广州华多网络科技有限公司 The method and system of incidence relation between identification user
CN104850213B (en) * 2014-02-13 2020-03-20 索尼公司 Wearable electronic device and information processing method for wearable electronic device
CN105447433B (en) * 2014-09-01 2020-01-31 阿里巴巴集团控股有限公司 identity registration method and device
CN104951072A (en) * 2015-06-18 2015-09-30 广东欧珀移动通信有限公司 Application control method and terminal equipment
CN107392137B (en) * 2017-07-18 2020-09-08 艾普柯微电子(上海)有限公司 Face recognition method and device
CN108038360B (en) * 2017-11-15 2020-07-21 维沃移动通信有限公司 Operation mode switching method and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107250949A (en) * 2015-02-11 2017-10-13 谷歌公司 Based on the method, system and the medium that have inanimate object recommendation computerization service in user environment
CN106056114A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 Business card content identification method and business card content identification device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
An Analytical Comparison of Social Network Measures;Joshua D.Guzman等;《网页在线公开:https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6797923》;20140414;第1-11页 *
Trust Analysis on Social Networks for Identifying Authenticated Users;Cinu C Kiliroor等;《网页在线公开:https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8029308》;20170619;第1-5页 *

Also Published As

Publication number Publication date
CN113961900A (en) 2022-01-21
CN109165488A (en) 2019-01-08

Similar Documents

Publication Publication Date Title
US10366275B2 (en) Method and device for improving fingerprint template, and terminal device
JP6636922B2 (en) Personal authentication using human biometrics
CN106446816B (en) Face recognition method and device
RU2589344C2 (en) Method, apparatus and system of authentication based on biological characteristics
US10812479B2 (en) Authenticating a user via multiple biometric inputs
US11244199B2 (en) User identity determining method, apparatus, and device
CN111506889B (en) User verification method and device based on similar user group
CN104050406A (en) Method and terminal equipment for carrying out authentication through fingerprint combinations
US10552596B2 (en) Biometric authentication
CN111581625A (en) User identity identification method and device and electronic equipment
WO2020220212A1 (en) Biological feature recognition method and electronic device
CN105205365B (en) Registration and authentication method and device for biological characteristic information
WO2018227584A1 (en) Method, device, and equipment for fingerprint recognition
US10410095B2 (en) Method and system for identifying a payment card design
CN109165488B (en) Identity authentication method and device
US10902106B2 (en) Authentication and authentication mode determination method, apparatus, and electronic device
US10719690B2 (en) Fingerprint sensor and method for processing fingerprint information
CN112836612A (en) Method, device and system for user real-name authentication
CN110321758B (en) Risk management and control method and device for biological feature recognition
KR20220137871A (en) Method and system for fingerprint authentication and enrollment using secure storage of templates
CN117079259A (en) Electronic card identification method and device, electronic equipment and storage medium
CN114005435A (en) Method, device, equipment, medium and program product for responding voice information
CN112784233A (en) Identity verification method and device
CN116052287A (en) Living body detection method, living body detection device, storage medium and electronic equipment
CN116681443A (en) Payment method and device based on biological recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40002571

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant