Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides an identity authentication method which can be applied to various scenes needing identity identification, such as a payment scene, an access control scene, a mobile terminal unlocking scene, a member login scene, an express delivery pickup scene and the like.
Fig. 1 is a flowchart of a first method of an identity authentication method according to an embodiment of the present application, where the method shown in fig. 1 at least includes the following steps:
102, acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related users are users assisting the users to be authenticated in identity authentication.
The method provided by the embodiment of the application can be applied to a server side, that is, the execution main body of the method can be the server.
In the embodiment of the present application, the first feature information and the second feature information may be any one of the following information:
facial features, iris features, fingerprint features, voice print features, and the like.
In the embodiment of the present application, the first biometric information and the second biometric information belong to the same kind of biometric information. For example, if the first biometric information is the iris feature, the second biometric information is also the iris feature; if the first biological characteristic information is the facial characteristic, the second biological characteristic information is also the facial characteristic.
In the embodiment of the application, the first biological characteristic information and the second biological characteristic information are biological characteristic information of the same kind, so that the collection of the biological characteristic information of the user to be authenticated and the biological characteristic information of the related user can be completed only by one biological characteristic information collection device, and the cost of the whole identity authentication system is reduced.
When the method provided by the embodiment of the application is adopted for identity authentication, the biological characteristic information of the user to be authenticated and the related user is generally acquired by biological characteristic acquisition equipment, then the acquired biological characteristic information is sent to a server, and the server performs identity authentication according to the acquired biological characteristic information.
Specifically, if the first biometric information and the second biometric information are fingerprint features, the biometric acquisition device is a fingerprint acquisition device, and acquires the fingerprint features of the user to be authenticated and the related user through the fingerprint acquisition device, and sends the acquired fingerprint features to the server.
If yes, the first biological characteristic information and the second biological characteristic information are iris characteristics or face characteristics, and the method may be that an image acquisition device acquires face images of a user to be authenticated and a related user, extracts the first biological characteristic information and the second biological characteristic information from the face images, and sends the first biological characteristic information and the second biological characteristic information to a server.
In a specific embodiment, if the first biometric information and the second biometric information are facial features or iris features, the image acquisition device may acquire an image including a user to be authenticated, send the acquired image to the server, and extract the first biometric information and the second biometric information by the server.
Specifically, in this case, the first biometric information and the second biometric information may be acquired by:
receiving an image of a user to be authenticated; detecting whether the image comprises other users except the user to be identified; if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
The method provided by the embodiment of the application is generally applicable to the situation that related users exist beside the user to be authenticated, so that after the image of the user to be authenticated is received, whether other users exist in the image is detected, if yes, the method provided by the embodiment of the application is adopted for identity authentication, and if not, the method can be switched to other methods for authenticating the identity of the user to be authenticated.
If the image of the user to be identified comprises a plurality of users, the user to be identified in the image is determined by the server conveniently, and when the camera is used for collecting the image, the face of the user to be identified can be placed in a specific area, and then the image is collected. Therefore, the face area of the user to be identified in the shot image is located in the specific area on the image, the server only needs to determine the user with the face located in the specific area on the image as the user to be identified, and other users located on the image are determined as related users of the user to be identified.
For ease of understanding, the following description will be given by way of example.
Fig. 2 shows an image acquired by the image acquisition device, where the image shown in fig. 2 includes a user a and a user B adjacent to the user a, if the face image of the user to be authenticated is placed in a specific area for acquisition, the face of the user to be authenticated in the obtained image is just placed on the left side of the image, it may be determined that the user a is the user to be authenticated, and since the user B is adjacent to the user a, the user B is determined as a relevant user of the user to be authenticated.
And 104, acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information.
In the embodiment of the present application, a correspondence between the biometric information and the identity information may be established in advance, and the correspondence may be stored in the server.
Specifically, before the step 102 is executed, identity information and corresponding biometric information of a plurality of users may be obtained, and then a correspondence between the biometric information and the identity information may be established and stored on the server.
In this way, when the method provided by the embodiment of the present application is executed, after the first biometric information and the second biometric information are acquired in step 102, the first biometric information may be matched with the correspondence stored in the server, and the first identity information corresponding to the first biometric information is determined; and matching the second biological characteristic information with the corresponding relation stored in the server to determine second identity information corresponding to the second biological characteristic information.
Since there may be users with similar first biometric information to the user to be authenticated, in step 104, the acquired first identity information is not necessarily the real identity information of the user to be authenticated, but only the suspected identity information of the user to be authenticated. Therefore, it is necessary to further verify whether the identity of the user to be authenticated is the first identity information through the subsequent steps of the present application.
And 106, performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information.
Specifically, the social relationship may be a couple relationship, a relativity relationship, a friend relationship, a co-worker relationship, or the like.
In this embodiment of the application, in the step 106, the identity of the user to be authenticated is authenticated, and whether the identity of the user to be authenticated is the first identity information is actually authenticated.
In step 106, the identity of the user to be authenticated is authenticated according to the first identity information and the social relationship between the first identity information and the second identity information, which includes at least two cases, which will be discussed below.
In the first case, according to the first identity information and the social relationship between the first identity information and the second identity information, identity authentication is performed on a user to be authenticated, and the method comprises the following steps (A), (B) and (C);
step (A), judging whether the first identity information and the second identity information have a social relationship;
if yes, setting the confidence coefficient of the user to be identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value;
the confidence degree intensity corresponding to the first preset value is higher than the confidence degree corresponding to the second preset value;
and (C) identifying the identity of the user to be identified according to the confidence.
Specifically, in the embodiment of the present application, social relationship information of the first identity information may be established in advance, and the identity information of each user having a social relationship with the first identity information is stored in the social relationship information.
Specifically, the determining whether the first identity information and the second identity information have a social relationship in step (a) includes:
acquiring each identity information in a social relation corresponding to the first identity information; matching the second identity information with each identity information; if the social relationship corresponding to the first identity information comprises identity information matched with the second identity information, determining that the first identity information and the second identity information have the social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
The social relationship information corresponding to the first identity information may be searched from the server, and then the second identity information is matched with each identity information in the social relationship information to search whether the second identity information exists in the social relationship information, if so, it is indicated that the social relationship exists between the first identity information and the second identity information, otherwise, it is indicated that the social relationship does not exist between the first identity information and the second identity information.
In the embodiment of the application, if it is determined that the first identity information and the second identity information have a social relationship, the confidence level of identifying the user to be identified as the first identity information may be considered to be higher, and at this time, the confidence level of identifying the user to be identified as the first identity information may be set to be a first preset value; if the first identity information and the second identity information do not have the social relationship, the confidence coefficient of the user to be identified as the first identity information is considered to be low, and at the moment, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value.
Specifically, in the step (C), the identity authentication of the user to be authenticated according to the confidence specifically includes:
according to the confidence coefficient, determining an identity verification mode adopted by the identity authentication of the user to be authenticated; and adopting a determined identity verification mode to identify the user to be identified.
Specifically, in a specific embodiment, if the confidence is the first preset value, the identity of the user to be authenticated may be authenticated by checking a set digit in the mobile phone number of the user to be authenticated; if the confidence is a second preset value, identifying the identity of the user to be identified by checking the mobile phone number of the user to be identified; wherein, the set digit is less than the digit of the mobile phone number.
The set digit can be any digit such as the first four digits, the second four digits, the first six digits and the like, and the digit is only required to be less than that of the mobile phone number.
In addition, in the embodiment of the application, if it is determined that the first identity information and the second identity information have a social relationship, it is also possible to directly identify the identity information of the user to be identified as the first identity information without adopting other identity verification methods to identify whether the identity information of the user to be identified is the first identity information.
For convenience of understanding, the following description will be given by way of example, and for convenience of description, an identity verification method adopted when the confidence coefficient is a first preset value is referred to as a first identity verification method, and an identity verification method adopted when the confidence coefficient is a second preset value is referred to as a second identity verification method.
For example, the obtained identity information of the user to be authenticated is "three-in-one", the obtained identity information of the related user is "four-in-one", and it is determined that "three-in-one" and "four-in-one" have a social relationship, at this time, in order to improve the accuracy of identity recognition, a first identity verification method is adopted to further verify whether the user to be authenticated is "three-in-one". At this time, the server can prompt the user to be authenticated to input the last four digits of the mobile phone number through the terminal equipment, then, the received last four digits of the mobile phone number are matched with the stored last four digits of the mobile phone number of Zhang III, and if the received last four digits of the mobile phone number are consistent with the stored last four digits of the mobile phone number of Zhang III, the identity information of the user to be authenticated can be considered to be Zhang III; if the two are not consistent, the user to be authenticated is not Zhang III.
For example, the obtained identity information of the user to be authenticated is "three-in-one", the obtained identity information of the related user is "four-in-one", and it is determined that "three-in-one" and "four-in-one" do not have a social relationship, at this time, in order to improve the accuracy of identity recognition, a second identity verification method is adopted to further verify whether the user to be authenticated is "three-in-one". At this time, the server can prompt the user to be authenticated to input the mobile phone number of the user to be authenticated through the terminal equipment, then, the received mobile phone number input by the user is matched with the stored mobile phone number of Zhang III, and if the received mobile phone number input by the user is consistent with the stored mobile phone number of Zhang III, the user to be authenticated can be regarded as Zhang III; if the two are not consistent, the user to be authenticated is not Zhang III.
Of course, the above two examples are only illustrative, and the content of the description is not to be construed as limiting the embodiments of the present application.
In the embodiment of the present application, the identity verification method may use a mobile phone number, and may also use a certificate number such as an identification number, and the specific selection of the identity verification method may be set according to an actual application scenario, and the specific identity verification methods are not listed one by one here.
In a second case, the identity authentication of the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information may further include the following steps (1), (2), and (3);
step (1), judging whether the first identity information and the second identity information have a social relationship;
if yes, setting confidence coefficient for identifying the user to be identified as the first identity information according to the social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value;
the confidence degree intensity corresponding to the second preset value corresponds to the confidence degree when the first identity information and the second identity information have social relations;
and (3) identifying the user to be identified according to the confidence coefficient.
In this case, the specific implementation process of step (1) is the same as that in case one, and the specific implementation process may refer to case one, which is not described herein again.
Wherein, the social relationship type in the step (2) may include: relatives, couples, friends, co-workers, etc.
Since the degree of closeness between the first identity information and the second identity information is different when the type of social relationship between the first identity information and the second identity information is different, for example, the degree of closeness of the relationship may be higher than that of the relationship of a friend, and the degree of closeness of the relationship of a friend is higher than that of a co-worker.
Therefore, in step (2), when there is a social relationship between the first identity information and the second identity information, the confidence level of identifying the user to be authenticated as the first identity information may be set according to the difference in the type of social relationship between the first identity information and the second identity information.
Specifically, if the type of the social relationship between the first identity information and the second identity information is a relationship or a couple relationship, the confidence level that the user to be authenticated is identified as the first identity information may be set as the confidence value a1If the type of the social relationship between the first identity information and the second identity information is a friendship, the confidence level of the user to be authenticated as the first identity information may be set as a confidence level value a2If the co-worker relationship is the social relationship type between the first identity information and the second identity information, the confidence level of the user to be authenticated as the first identity information can be set as the confidence level A3(ii) a Also, in the present embodiment, the confidence value A1Confidence value A2And a confidence value A3The intensity of the corresponding confidence coefficient is stronger than that of the corresponding confidence coefficient of the second preset value, and the confidence value A1Corresponding confidence intensity confidence value A2Corresponding confidence, confidence value A2The corresponding confidence intensity is stronger than the confidence value A3Corresponding toA confidence level.
In one embodiment, the confidence level if the user to be authenticated is identified as the first identity information is A1Then, the identity information of the user to be authenticated can be regarded as the first identity information; or, the last two digits of the mobile phone of the user to be authenticated can be adopted to verify whether the identity information of the user to be authenticated is the first identity information; if the confidence coefficient for identifying the user to be identified as the first identity information is A2Then, the user's identity hip-hop to be authenticated can be considered as the first identity information; or, the four digits behind the mobile phone of the user to be authenticated can be adopted to verify whether the identity information of the user to be authenticated is the first identity information; if the confidence coefficient for identifying the user to be identified as the first identity information is A3Then, the identity information of the user to be authenticated can be regarded as the first identity information; or, the identity information of the user to be authenticated is verified whether to be the first identity information or not by adopting the back six bits of the mobile phone of the user to be authenticated.
In the embodiment of the application, if the identity information of the user to be authenticated is verified to be the first identity information in a mobile phone number mode, the confidence coefficient is A1、A2、A3And when the confidence coefficient is the second preset value, the whole mobile phone number can be adopted to check whether the identity information of the user to be authenticated is the first identity information.
For ease of understanding, the following description will be given by way of example.
For example, the obtained identity information of the user to be authenticated is "zhang san", the obtained identity information of the related user is "liqi", and it is determined that "zhang san" and "liqi" have a social relationship, and it is determined that a couple relationship exists between "zhang san" and "liqi", at this time, the server may prompt the user to be authenticated to input the last two digits of the mobile phone number thereof through the terminal device, then, match the last two digits of the received mobile phone number with the last two digits of the stored mobile phone number of "zhang san", if the two digits are identical, the identity information of the user to be authenticated is considered as "zhang san", and if the two digits are not identical, the user to be authenticated may be considered as not "zhang san".
Continuing to use the above example, if the friendship between Zhang III and Li IV is determined, the server can prompt the user to be authenticated to input the last four digits of the mobile phone number through the terminal device, then match the last four digits of the received mobile phone number with the last four digits of the stored mobile phone number of Zhang III, if the two are consistent, the identity information of the user to be authenticated is determined to be Zhang III, and if the two are inconsistent, the user to be authenticated is determined not to be Zhang III.
Continuing to use the above example, if the co-worker relationship between Zhang III and Liqu is determined, the server can prompt the user to be authenticated to input the last six digits of the mobile phone number through the terminal device, then match the last four digits of the received mobile phone number with the last six digits of the stored mobile phone number of Zhang III, if the two digits are consistent, the identity information of the user to be authenticated is determined to be Zhang III, and if the two digits are not consistent, the user to be authenticated can be determined not to be Zhang III.
Of course, the above exemplary indication is exemplary, the adopted numbers are not necessarily the last two digits, the last four digits and the last six digits of the mobile phone number, and may be other digits at other positions, as long as the digits of the mobile phone number used in the co-workers relationship are greater than the digits of the mobile phone number corresponding to the friendship relationship, and the mobile phone number corresponding to the friendship relationship is located more than the mobile phone number corresponding to the couple or the relatives relationship.
Of course, besides using the mobile phone number to identify the identity information of the user to be identified, other methods such as an identity card number and the like can be used to identify whether the identity information of the user to be identified is the first identity information.
In the embodiment of the application, the identity information of the user to be authenticated is verified by using different identity verification modes according to different types of social relations between the first identity information and the second identity information, so that the identity verification mode is more flexibly selected, the user experience is improved, the complexity of identity verification is increased when the degree of closeness between the first identity information and the second identity information represented by the type of social relations between the first identity information and the second identity information is low, and the accuracy of identity authentication can be further improved.
According to the identity authentication method provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the second identity information is obtained according to the second biological characteristic information of the related user, and then whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Based on the methods shown in fig. 1 and fig. 2, the embodiment of the present application further provides an identity authentication method,
fig. 3 shows a flowchart of a second method of the identity authentication method provided in the embodiment of the present application, and for the method shown in fig. 3, differences from the methods shown in fig. 1 and fig. 2 are mainly introduced here, and reference may be made to the description of the corresponding embodiment in fig. 1 and fig. 2 for the same points, which are not repeated here. With respect to the method shown in fig. 3, the method at least comprises the following steps:
step 302, acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related users are users assisting the users to be authenticated in identity authentication.
In this step, the specific process of acquiring the first biometric information of the user to be authenticated and acquiring the second biometric information of the user related to the user to be authenticated is the same as the acquisition process of the embodiment corresponding to fig. 1 and fig. 2, and the specific acquisition process may refer to the description of the foregoing embodiment, and is not repeated here.
And step 304, acquiring corresponding first identity information according to the first biological characteristic information, and acquiring social relationship information corresponding to the first identity information.
In the embodiment of the application, the server stores the corresponding relationship between the biometric information and the identity information in advance, so that after the first biometric information of the user to be authenticated is acquired, the first biometric information can be matched with the corresponding relationship stored in advance to determine the first identity information corresponding to the first biometric information.
In addition, social relationship information corresponding to each identity information is stored in the server in advance, and after the first identity information corresponding to the first biological feature information is determined, the social relationship information corresponding to the first identity information is searched according to the first identity information.
Specifically, the social relationship information corresponding to the first identity information may be biometric information corresponding to each identity information having a social relationship with the first identity information.
And step 306, verifying the social relationship between the relevant user and the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information.
In step 306, the method for verifying the social relationship between the relevant user and the first identity information according to the second biometric information and the social relationship information corresponding to the first identity information specifically includes the following steps:
acquiring user information in social relationship information corresponding to the first identity information; matching the second biological characteristic information with the user information; and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
The user information refers to the biological feature information of each user having a social relationship with the first identity information.
And 308, performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user.
Specifically, in this embodiment of the application, in step 308, according to the first identity information and the social relationship between the first identity information and the relevant user, the identity authentication of the user to be authenticated may be implemented through the following processes:
if the first identity information and the related user have social relations, setting the confidence coefficient of the user to be identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree intensity corresponding to the first preset value is higher than the confidence degree corresponding to the second preset value; and authenticating the identity of the user to be authenticated according to the confidence.
Alternatively, in the step 308, the identity of the user to be authenticated is authenticated according to the first identity information and the social relationship between the first identity information and the relevant user, and the following processes may be further implemented:
if the first identity information and the related user have social relations, setting confidence coefficient for identifying the user to be identified as the first identity information according to the type of the social relations between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to a second preset value; and performing identity authentication on the user to be authenticated according to the confidence coefficient.
In addition, in the embodiment of the present application, the performing identity authentication on the user to be authenticated according to the confidence level includes:
according to the confidence coefficient, determining an identity verification mode adopted by the identity authentication of the user to be authenticated; and adopting a determined identity verification mode to identify the user to be identified.
Specifically, if the confidence is a first preset value, the identity of the user to be authenticated is authenticated by checking a set digit in the mobile phone number of the user to be authenticated; if the confidence is a second preset value, identifying the identity of the user to be identified by checking the mobile phone number of the user to be identified; wherein, the set digit is less than the digit of the mobile phone number.
Specifically, in the embodiment of the present application, the specific implementation process of each step is the same as that in the embodiment corresponding to fig. 1 and fig. 2, and the specific implementation process may refer to the implementation process in the embodiment corresponding to fig. 1 and fig. 2, and is not described herein again.
In order to facilitate understanding of the identity authentication method provided in the embodiments of the present application, the following description will be given by way of specific examples.
Fig. 4 is a flowchart illustrating a third method of an identity authentication method provided in an embodiment of the present application, where the method illustrated in fig. 4 at least includes the following steps:
step 402 receives an image of a user to be authenticated.
Besides the user to be authenticated, the image also comprises other users.
Step 404, determining the user to be authenticated and the related user of the user to be authenticated in the image.
Specifically, when image acquisition is performed, image acquisition may be performed only when the face of the user to be identified is located in the set acquisition region, and therefore, the server may directly determine the face image at the set position in the image as the face image of the user to be identified.
And determining other users except the user to be authenticated in the image as related users of the user to be authenticated.
Step 406, extracting the first facial feature information of the user to be identified and the second facial feature information of the related user from the image.
And step 408, acquiring corresponding first identity information according to the first facial feature information, and acquiring second identity information according to the second facial feature information.
And step 410, obtaining social relationship information corresponding to the first identity information.
Step 412, verifying whether the first identity information and the second identity information have a social relationship according to the second identity information and the social relationship information; if yes, go to step 414; otherwise, go to step 416;
step 414, setting the confidence coefficient of the user to be authenticated as the first identity information as a first preset value, and verifying whether the identity information of the user to be authenticated is the first identity information by adopting a first identity verification mode corresponding to the first preset value;
step 416, the confidence level that the user to be authenticated is authenticated as the first identity information is set as a second preset value, and whether the identity information of the user to be authenticated is the first identity information is verified in a second identity verification mode corresponding to the second preset value.
The first identity verification mode may be to verify several digits of the mobile phone number of the user to be authenticated, and the second identity verification mode may be to verify the whole mobile phone number of the user to be authenticated.
The specific implementation process of each step in the embodiment shown in fig. 4 may refer to the specific implementation process of each step in the embodiment corresponding to fig. 1 and fig. 2, and is not described herein again.
Fig. 5 is a flowchart of a fourth method of an identity authentication method according to an embodiment of the present application, where the method shown in fig. 5 at least includes the following steps:
step 502, receive the image of the user to be authenticated.
Besides the user to be authenticated, the image also comprises other users.
Step 504, determining the user to be authenticated and the related user of the user to be authenticated in the image.
Specifically, when image acquisition is performed, image acquisition may be performed only when the face of the user to be identified is located in the set acquisition region, and therefore, the server may directly determine the face image at the set position in the image as the face image of the user to be identified.
And determining other users except the user to be authenticated in the image as related users of the user to be authenticated.
Step 506, extracting first facial feature information of the user to be identified and second facial feature information of the related user from the image.
And step 508, acquiring corresponding first identity information according to the first facial feature information.
Step 510, obtaining social relationship information corresponding to the first identity information.
The social relationship information stores face feature information of each user having a social relationship with the first identity information.
Step 512, matching the second facial feature information with the facial feature information of each user in the social relationship information; if there is facial feature information matching the second facial feature information, go to step 514; otherwise, step 516 is performed.
Step 514, the confidence that the user to be authenticated is authenticated as the first identity information is set as a first preset value, and whether the identity information of the user to be authenticated is the first identity information is verified in a first identity verification mode corresponding to the first preset value.
Step 516, the confidence level of the user to be authenticated as the first identity information is set as a second preset value, and a second identity verification mode corresponding to the second preset value is adopted to verify whether the identity information of the user to be authenticated is the first identity information.
The specific implementation process of each step in the embodiment shown in fig. 5 may refer to the specific implementation process of each step in the embodiment corresponding to fig. 1 and fig. 2, and is not described herein again.
According to the identity authentication method provided by the embodiment of the application, corresponding first identity information is obtained according to first biological characteristic information of a user to be authenticated, social relationship information corresponding to the first identity information is obtained, then, according to second biological characteristic verification of a related user and the social relationship information corresponding to the first identity information, the social relationship between the first identity information and the related user is verified, and whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the related user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Corresponding to the above identity authentication method, based on the same idea, an identity authentication apparatus is further provided in the embodiments of the present application, where the apparatus is applicable to a server side, fig. 6 is a schematic diagram of a first module composition of the identity authentication apparatus provided in the embodiments of the present application, and the apparatus shown in fig. 6 includes:
a first obtaining module 61, configured to obtain first biometric information of a user to be authenticated, and obtain second biometric information of a user related to the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
a second obtaining module 62, configured to obtain corresponding first identity information according to the first biometric information, and obtain corresponding second identity information according to the second biometric information;
the first identification module 63 is configured to identify the user to be identified according to the first identity information and the social relationship between the first identity information and the second identity information.
Optionally, the first identifying module 63 is specifically configured to:
judging whether the first identity information and the second identity information have a social relationship or not; if so, setting the confidence coefficient that the user to be authenticated is authenticated as the first identity information as a first preset value; otherwise, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value; and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the first identifying module 63 is specifically configured to:
judging whether the first identity information and the second identity information have a social relationship or not; if so, setting confidence level for identifying the user to be identified as the first identity information according to the type of social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree corresponding to the second preset value is enhanced when the first identity information and the second identity information have social relations; and identifying the user to be identified according to the confidence coefficient.
Optionally, the first identifying module 63 is further specifically configured to:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient; and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the first identifying module 63 is further specifically configured to:
acquiring each identity information in the social relationship information corresponding to the first identity information; matching the second identity information with each identity information; if the social relationship corresponding to the first identity information includes identity information matched with the second identity information, determining that the first identity information and the second identity information have a social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
Optionally, the first obtaining module 61 is specifically configured to:
receiving the image of the user to be authenticated; detecting whether the image comprises other users besides the user to be identified; if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
The identity authentication device provided by the embodiment of the application acquires corresponding first identity information according to the first biological characteristic information of the user to be authenticated, acquires second identity information according to the second biological characteristic information of the related user, and then verifies whether the identity information of the user to be authenticated is the first identity information according to the social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Corresponding to the above identity authentication method, based on the same idea, an identity authentication apparatus is further provided in the embodiments of the present application, where the apparatus is applicable to a server side, fig. 7 is a schematic diagram of a second module composition of the identity authentication apparatus provided in the embodiments of the present application, and the apparatus shown in fig. 7 includes:
a third obtaining module 71, configured to obtain first biometric information of a user to be authenticated, and obtain second biometric information of a user related to the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
a fourth obtaining module 72, configured to obtain corresponding first identity information according to the first biometric information, and obtain social relationship information corresponding to the first identity information;
a verification module 73, configured to verify a social relationship between the relevant user and the first identity information according to the second biometric information and social relationship information corresponding to the first identity information;
the second authentication module 74 authenticates the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user.
Optionally, the verification module 73 is specifically configured to:
acquiring user information in the social relationship information corresponding to the first identity information; matching the second biological characteristic information with the user information; and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
Optionally, the second authentication module 74 is specifically configured to:
if the first identity information and the related user have a social relationship, setting the confidence coefficient that the user to be identified is identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the second authentication module 74 is specifically configured to:
if the first identity information and the related user have a social relationship, setting a confidence level for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the second authentication module 74 is further specifically configured to:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient; and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the third obtaining module 71 is specifically configured to:
receiving the image of the user to be authenticated; detecting whether the image comprises other users besides the user to be identified; if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
According to the identity authentication device provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the social relationship information corresponding to the first identity information is obtained, then, the social relationship between the first identity information and the relevant user is verified according to the second biological characteristic verification of the relevant user and the social relationship information corresponding to the first identity information, and whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the relevant user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Further, based on the methods shown in fig. 1 to fig. 5, an embodiment of the present application further provides an identity authentication apparatus, as shown in fig. 8.
The authentication device may vary greatly in configuration or performance and may include one or more processors 801 and memory 802, where the memory 802 may store one or more stored applications or data. Wherein the memory 802 may be a transient storage or a persistent storage. The application stored in memory 802 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for the identity authentication device. Still further, the processor 801 may be configured to communicate with the memory 802 to execute a series of computer-executable instructions in the memory 802 on the authentication device. The authentication apparatus may also include one or more power supplies 803, one or more wired or wireless network interfaces 804, one or more input-output interfaces 805, one or more keyboards 806, and the like.
In one particular embodiment, an authentication apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the authentication apparatus, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
and performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information.
Optionally, when executed, the computer-executable instructions perform authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information, including:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting the confidence coefficient that the user to be authenticated is authenticated as the first identity information as a first preset value; otherwise, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed, the computer-executable instructions perform authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information, including:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting confidence level for identifying the user to be identified as the first identity information according to the type of social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree corresponding to the second preset value is enhanced when the first identity information and the second identity information have social relations;
and identifying the user to be identified according to the confidence coefficient.
Optionally, when executed, the performing identity authentication on the user to be authenticated according to the confidence level includes:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction is executed, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the determining whether the first identity information and the second identity information have a social relationship when executed by computer-executable instructions comprises:
acquiring each identity information in the social relationship information corresponding to the first identity information;
matching the second identity information with each identity information;
if the social relationship corresponding to the first identity information includes identity information matched with the second identity information, determining that the first identity information and the second identity information have a social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
Optionally, the obtaining first biometric information of the user to be authenticated and obtaining second biometric information of a related user of the user to be authenticated, when the computer-executable instructions are executed, includes:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
According to the identity authentication device provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the second identity information is obtained according to the second biological characteristic information of the related user, and then whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
In one particular embodiment, an authentication apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the authentication apparatus, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying the social relationship between the related user and the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information;
and according to the first identity information and the social relationship between the first identity information and the related user, performing identity authentication on the user to be authenticated.
Optionally, when executed, the verifying the social relationship between the relevant user and the first identity information according to the second biometric information and the social relationship information corresponding to the first identity information includes:
acquiring user information in the social relationship information corresponding to the first identity information;
matching the second biological characteristic information with the user information;
and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
Optionally, when executed, the computer-executable instructions perform authentication on the user to be authenticated according to the first identity information and a social relationship between the first identity information and the related user, including:
if the first identity information and the related user have a social relationship, setting the confidence coefficient that the user to be identified is identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed, the computer executable instructions perform the authentication of the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user, including
If the first identity information and the related user have a social relationship, setting a confidence level for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed, the performing identity authentication on the user to be authenticated according to the confidence level includes:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction is executed, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set digit in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the obtaining first biometric information of the user to be authenticated and obtaining second biometric information of a related user of the user to be authenticated, when the computer-executable instructions are executed, includes:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
According to the identity authentication device provided by the embodiment of the application, the corresponding first identity information is obtained according to the first biological characteristic information of the user to be authenticated, the social relationship information corresponding to the first identity information is obtained, then, the social relationship between the first identity information and the relevant user is verified according to the second biological characteristic verification of the relevant user and the social relationship information corresponding to the first identity information, and whether the identity information of the user to be authenticated is the first identity information is verified according to the social relationship between the relevant user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Further, based on the methods shown in fig. 1 to fig. 5, in a specific embodiment, the storage medium is a usb disk, an optical disk, a hard disk, and the like, and the storage medium stores computer-executable instructions that, when executed by the processor, implement the following processes:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information, and acquiring corresponding second identity information according to the second biological characteristic information;
and performing identity authentication on the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information.
Optionally, when executed by a processor, the authenticating the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information includes:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting the confidence coefficient that the user to be authenticated is authenticated as the first identity information as a first preset value; otherwise, the confidence coefficient of the user to be identified as the first identity information is set as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed by a processor, the authenticating the user to be authenticated according to the first identity information and the social relationship between the first identity information and the second identity information includes:
judging whether the first identity information and the second identity information have a social relationship or not;
if so, setting confidence level for identifying the user to be identified as the first identity information according to the type of social relationship between the first identity information and the second identity information; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence degree corresponding to the second preset value is enhanced when the first identity information and the second identity information have social relations;
and identifying the user to be identified according to the confidence coefficient.
Optionally, when executed by a processor, the computer-executable instructions stored in the storage medium perform identity authentication on the user to be authenticated according to the confidence level, including:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction stored in the storage medium is executed by the processor, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set number of digits in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, determine whether the first identity information and the second identity information have a social relationship therebetween, including:
acquiring each identity information in the social relationship information corresponding to the first identity information;
matching the second identity information with each identity information;
if the social relationship corresponding to the first identity information includes identity information matched with the second identity information, determining that the first identity information and the second identity information have a social relationship; otherwise, determining that the first identity information and the second identity information do not have a social relationship.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, the acquiring first biometric information of the user to be authenticated and acquiring second biometric information of a user related to the user to be authenticated include:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
When executed by a processor, a computer executable instruction stored in a storage medium in the embodiment of the application acquires corresponding first identity information according to first biological characteristic information of a user to be authenticated and second identity information according to second biological characteristic information of a related user, and then verifies whether the identity information of the user to be authenticated is the first identity information according to a social relationship between the second identity information and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
Further, the present application provides a storage medium for storing computer-executable instructions, in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and the storage medium stores computer-executable instructions that, when executed by a processor, implement the following processes:
acquiring first biological characteristic information of a user to be authenticated and acquiring second biological characteristic information of a related user of the user to be authenticated; the related user is a user for assisting the user to be authenticated in identity authentication;
acquiring corresponding first identity information according to the first biological characteristic information and acquiring social relation information corresponding to the first identity information;
verifying the social relationship between the related user and the first identity information according to the second biological characteristic information and the social relationship information corresponding to the first identity information;
and according to the first identity information and the social relationship between the first identity information and the related user, performing identity authentication on the user to be authenticated.
Optionally, when executed by a processor, the verifying the social relationship between the relevant user and the first identity information according to the second biometric information and the social relationship information corresponding to the first identity information includes:
acquiring user information in the social relationship information corresponding to the first identity information;
matching the second biological characteristic information with the user information;
and if the matched user information exists, determining that the first identity information and the related user have a social relationship, otherwise, determining that the first identity information and the related user do not have the social relationship.
Optionally, when executed by a processor, the authenticating the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user includes:
if the first identity information and the related user have a social relationship, setting the confidence coefficient that the user to be identified is identified as the first identity information as a first preset value; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first preset value is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, authenticate the user to be authenticated according to the first identity information and the social relationship between the first identity information and the related user, including
If the first identity information and the related user have a social relationship, setting a confidence level for identifying the user to be identified as the first identity information according to the type of the social relationship between the first identity information and the related user; otherwise, setting the confidence coefficient of the user to be identified as the first identity information as a second preset value; the confidence corresponding to the first identity information and the related user having the social relationship is stronger than the confidence corresponding to the second preset value;
and performing identity authentication on the user to be authenticated according to the confidence coefficient.
Optionally, when executed by a processor, the computer-executable instructions stored in the storage medium perform identity authentication on the user to be authenticated according to the confidence level, including:
determining an identity verification mode adopted for identity authentication of the user to be authenticated according to the confidence coefficient;
and adopting the determined identity verification mode to carry out identity authentication on the user to be authenticated.
Optionally, when the computer executable instruction stored in the storage medium is executed by the processor, if the confidence is a first preset value, performing identity authentication on the user to be authenticated by checking a set number of digits in the mobile phone number of the user to be authenticated;
if the confidence is a second preset value, the identity of the user to be authenticated is authenticated by checking the mobile phone number of the user to be authenticated; wherein, the set digit is less than the digit of the mobile phone number.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, the acquiring first biometric information of the user to be authenticated and acquiring second biometric information of a user related to the user to be authenticated include:
receiving the image of the user to be authenticated;
detecting whether the image comprises other users besides the user to be identified;
if so, extracting first biological characteristic information of the user to be authenticated and second biological characteristic information of a related user of the user to be authenticated according to the image; wherein, the related users of the users to be authenticated are other users except the users to be authenticated in the image.
When executed by a processor, a computer executable instruction stored in a storage medium in the embodiment of the application acquires corresponding first identity information according to first biological characteristic information of a user to be authenticated and social relationship information corresponding to the first identity information, then verifies the social relationship between the first identity information and a related user according to second biological characteristic verification of the related user and the social relationship information corresponding to the first identity information, and verifies whether the identity information of the user to be authenticated is the first identity information according to the social relationship between the related user and the first identity information; therefore, after the first identity information of the user to be identified is identified, whether the identity information of the user to be identified is the first identity information is verified in an auxiliary mode through the social relationship, the problem of identity identification errors caused by similarity of user biological characteristic information can be solved, and the accuracy of identity identification is improved.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.