CN109726636A - User ID authentication method and device, storage medium and electronic equipment - Google Patents

User ID authentication method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN109726636A
CN109726636A CN201811447615.3A CN201811447615A CN109726636A CN 109726636 A CN109726636 A CN 109726636A CN 201811447615 A CN201811447615 A CN 201811447615A CN 109726636 A CN109726636 A CN 109726636A
Authority
CN
China
Prior art keywords
data information
validation task
validation
user
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811447615.3A
Other languages
Chinese (zh)
Inventor
耿方
王申
梁宵
杜悦琨
张玮
孟媛媛
张梦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201811447615.3A priority Critical patent/CN109726636A/en
Publication of CN109726636A publication Critical patent/CN109726636A/en
Pending legal-status Critical Current

Links

Abstract

Purpose of this disclosure is to provide a kind of user ID authentication method and device, storage medium and electronic equipment, the safety to solve the problems, such as subscriber authentication process in the related technology is not high enough.The user ID authentication method is applied to client, comprising: sends subscriber authentication request;The validation task group requested in response to the subscriber authentication is received, the validation task group includes at least one first kind validation task and at least one second class validation task;It captures user and executes first data information of at least one first kind validation task and the second data information of at least one second class validation task;Send first data information and second data information;And provide the result that the reference data information and first data information and second data information in the verification library according to server-side received verify the user identity.

Description

User ID authentication method and device, storage medium and electronic equipment
Technical field
This disclosure relates to technical field of information processing, and in particular, to a kind of user ID authentication method and device, storage Medium and electronic equipment.
Background technique
With the development of science and technology, more and more biological characteristics are applied to subscriber authentication.For example, fingerprint, iris, The biological characteristics such as face.For example, more and more come the technology for carrying out subscriber authentication by shooting user's face action Logining, unlocking, pay the bill etc. in environment applied to various clients, provides convenience for user.
However, there is very big security risk in this subscriber authentication mode.For example, some criminals can be with By 3D modeling, by face key point location and automation face dynamic technique, the static state of photo is changed to dynamic, realization is blinked Eye, smile, eyebrow raise up, the first-class movement of left/right rotation, cause non-user operation subscriber authentication pass through, gently then reveal Identity information is heavy then can lose property and money.
Summary of the invention
Purpose of this disclosure is to provide a kind of user ID authentication method and device, storage medium and electronic equipment, with solution The certainly not high enough problem of the safety of subscriber authentication process in the related technology.
To achieve the goals above, in a first aspect, the embodiment of the present disclosure provides a kind of user ID authentication method, the side Method is applied to client, which comprises
Send subscriber authentication request;
The validation task group requested in response to the subscriber authentication is received, the validation task group includes at least one First kind validation task and at least one second class validation task;
Capture user execute at least one first kind validation task the first data information and it is described at least one the Second data information of two class validation tasks;
Send first data information and second data information;And
Reference data information in the verification library according to server-side that receives and first data information and institute are provided State the result that the second data information verifies the user identity.
Optionally, the first kind validation task includes face action validation task and the second class validation task Including limb action validation task.
Optionally, first data information is the first image/video letter that user executes the face action validation task Breath, second data information are the second image/video information that the user executes the limb action validation task.
Second aspect, the embodiment of the present disclosure provide a kind of user ID authentication method, and the method is applied to server-side, institute The method of stating includes:
In response to the subscriber authentication request received, validation task group, the validation task are obtained from verification library Group includes at least one first kind validation task and at least one second class validation task;
Send the validation task group;
Receive the user that captures execute at least one first kind validation task the first data information and it is described extremely Second data information of a few second class validation task;
According in the verification library reference data information and first data information and second data information, test Demonstrate,prove the user identity.
Optionally, the reference data information includes the first reference data information and the second reference data information, and The reference data information according in the verification library and first data information and second data information verify institute State user identity, comprising:
The first reference data information is compared with first data information;
The second reference data information is compared with second data information;And
In the first reference data information the second reference data consistent and described with first data information and institute It states under the second data information unanimous circumstances, the user passes through authentication.
Optionally, the first kind validation task includes face action validation task and the second class validation task Including limb action validation task.
Optionally, the verification library includes multiple first kind validation tasks and multiple second class validation tasks, and with institute State the corresponding multiple first reference data information of multiple first kind validation tasks, and with the multiple second class validation task pair The multiple second reference data information answered.
The third aspect, the embodiment of the present disclosure provide a kind of subscriber authentication device, and described device is applied to client, institute Stating device includes:
First sending module, for sending subscriber authentication request;
First receiving module, for receiving the validation task group in response to subscriber authentication request, the verifying Task groups include at least one first kind validation task and at least one second class validation task;
Trapping module executes the first data information and the institute of at least one first kind validation task for capturing user State the second data information of at least one the second class validation task;
First sending module is also used to send first data information and second data information;And
Display module, for providing the reference data information and described first in the verification library according to server-side received Data information and second data information verify the result of the user identity.
Optionally, the first kind validation task includes face action validation task and the second class validation task Including limb action validation task.
Optionally, first data information is the first image/video letter that user executes the face action validation task Breath, second data information are the second image/video information that the user executes the limb action validation task.
Fourth aspect, the embodiment of the present disclosure provide a kind of subscriber authentication device, and described device is applied to server-side, institute Stating device includes:
Module is obtained, for requesting to obtain validation task group from verification library in response to the subscriber authentication received, The validation task group includes at least one first kind validation task and at least one second class validation task;
Second sending module, for sending the validation task group;
Second receiving module, execute at least one first kind validation task for receiving the user captured first Second data information of data information and at least one second class validation task;And
Authentication module, for according to the reference data information and first data information and described in the verification library Two data informations verify the user identity.
Optionally, the reference data information includes the first reference data information and the second reference data information, and The authentication module is used for:
The first reference data information is compared with first data information;
The second reference data information is compared with second data information;And
In the first reference data information the second reference data consistent and described with first data information and institute It states under the second data information unanimous circumstances, the user passes through authentication.
Optionally, the first kind validation task includes face action validation task and the second class validation task Including limb action validation task.
Optionally, described device further include:
The verification library, the verification library include multiple first kind validation tasks and multiple second class validation tasks, and Multiple first reference data information corresponding with the multiple first kind validation task and with the multiple second class validation task Corresponding multiple second reference data information.
5th aspect, the embodiment of the present disclosure provide a kind of computer readable storage medium, are stored thereon with computer program, The step of any one of first aspect the method is realized when the program is executed by processor.
6th aspect, the embodiment of the present disclosure provide a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;And
Processor, for executing the computer program in the memory, to realize any one of first invention institute The step of stating method.
7th aspect, the embodiment of the present disclosure provide a kind of computer readable storage medium, are stored thereon with computer program, The step of any one of second aspect the method is realized when the program is executed by processor.
Eighth aspect, the embodiment of the present disclosure provide a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;And
Processor, for executing the computer program in the memory, to realize any one of second aspect institute The step of stating method.
Above-mentioned technical proposal sends subscriber authentication request by client, asks in response to the subscriber authentication Server-side is asked to obtain validation task group at random from verification library, the user of client executes the validation task group and by client The data information that user executes the validation task group is sent back into server-side, server-side according to the reference number in verification library it is believed that Breath and first data information and second data information verify the result of the user identity.
Through the above technical solutions, appointing since the user of client needs to be performed simultaneously the verifying that at least two obtain at random It is engaged in and only user identity, therefore high degree just can be confirmed in the case where two kinds of validation tasks are all verified in server-side On improve the security level of subscriber authentication process, improve and crack difficulty and complexity.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is a kind of method flow diagram of user ID authentication method shown according to an exemplary embodiment.
Fig. 2 is a kind of method flow diagram of user ID authentication method shown according to an exemplary embodiment.
Fig. 3 is a kind of method signaling diagram of user ID authentication method shown according to an exemplary embodiment.
Fig. 4 is a kind of block diagram of subscriber authentication device shown according to an exemplary embodiment.
Fig. 5 is a kind of block diagram of subscriber authentication device shown according to an exemplary embodiment.
Fig. 6 is the schematic diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Fig. 7 is the schematic diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
Fig. 1 is a kind of method flow diagram of user ID authentication method shown according to an exemplary embodiment, such as Fig. 1 institute Show, the method is applied to the application of the smart machines such as client, such as smart phone, tablet computer and wearable device Program (APP), the method may include:
Step S11 sends subscriber authentication request.
For example, the use of the client can be sent to server-side when user attempts unlock client or logins client Family authentication request.
Step S12, receives the validation task group requested in response to the subscriber authentication, and the validation task group can be with Including at least one first kind validation task and at least one second class validation task.
Optionally, the first kind validation task may include face action validation task and second class verifying Task includes limb action validation task.For example, face action validation task can be that user is required to complete blink, smile, eyebrow Hair raises up, left and right rotary head, one or more of face actions such as shake the head.Limb action validation task can be to require user complete One or more of limb actions such as number, word are write on paper at the singlehanded gesture of left hand or the right hand, hand book. Above-mentioned example is merely illustrative non-limiting example, and the protection scope of the disclosure is without being limited thereto.
Step S13, capture user execute at least one first kind validation task the first data information and it is described extremely Second data information of a few second class validation task.
Specifically, client can capture institute by trapping module (such as preposition and rear camera of smart phone) The first data information and second data information are stated, such as first data are captured by the front camera of smart phone Information, while second data information is captured by the rear camera of smart phone.Optionally, first data information The first image/video information of the face action validation task can be executed for user, second data information can be institute State the second image/video information that user executes the limb action validation task.
Step S14 sends first data information and second data information.
For example, sending first data information and second data information to server-side.
Step 15, the reference data information and first data letter in the verification library according to server-side received are provided Breath and second data information verify the result of the user identity.
For example, it receives the result of the verifying user identity from server-side and is presented at the client, such as Show that result and/or voice play the result on the screen of smart machine.Optionally, the case where subscriber authentication passes through Under, output is verified and continues subsequent operation;In the unacceptable situation of subscriber authentication, exports authentication failed and prompt Authentication is carried out again, returns to step S11.
Above-mentioned technical proposal sends subscriber authentication request by client, asks in response to the subscriber authentication Server-side is asked to obtain validation task group at random from verification library, the user of client executes the validation task group and by client The data information that user executes the validation task group is sent back into server-side, server-side according to the reference number in verification library it is believed that Breath and first data information and second data information verify the result of the user identity.
Through the above technical solutions, appointing since the user of client needs to be performed simultaneously the verifying that at least two obtain at random It is engaged in and only user identity, therefore high degree just can be confirmed in the case where two kinds of validation tasks are all verified in server-side On improve the security level of subscriber authentication process, improve and crack difficulty and complexity.
Fig. 2 is a kind of method flow diagram of user ID authentication method shown according to an exemplary embodiment, such as Fig. 2 institute To show, the method is applied to server-side, such as server etc., the method may include:
Step S21 is requested in response to the subscriber authentication received, and validation task group is obtained from verification library, described Validation task group includes at least one first kind validation task and at least one second class validation task.
Specifically, server confirms the client body after receiving the subscriber authentication request from client After part, validation task group can be obtained from verification library, the validation task group may include that the verifying of at least one first kind is appointed Business and at least one second class validation task.For example, the validation task group may include the N number of first kind verifying formed at random Task and M the second class validation tasks, wherein N and M is positive integer.
Optionally, the verification library can be stored in advance at the server-side, and the verification library may include multiple A kind of validation task and multiple second class validation tasks, and multiple first ginsengs corresponding with the multiple first kind validation task Examine data information, and multiple second reference data information corresponding with the multiple second class validation task.
Optionally, the first kind validation task may include face action validation task and second class verifying Task includes limb action validation task.For example, face action validation task can be that user is required to complete blink, smile, eyebrow Hair raises up, left and right rotary head, one or more of face actions such as shake the head.Limb action validation task can be to require user complete One or more of limb actions such as number, word are write on paper at the singlehanded gesture of left hand or the right hand, hand book. Accordingly, the first reference data information may include the registration facial image information of user of the client and pre-stored Blink, smile, eyebrow raises up, left and right rotary head, the face actions such as shake the head information.Second reference data information may include left hand Or the singlehanded gesture of the right hand, hand write the information of the specified limb action such as number, word with book on paper.
Step S22 sends the validation task group.
For example, the validation task group is sent to the client.
Step S23 receives the first data information that the user captured executes at least one first kind validation task With the second data information of at least one second class validation task.
Optionally, first data information can execute the first image view of the face action validation task for user Frequency information, second data information can execute the second image/video letter of the limb action validation task for the user Breath.
Step S24 is counted according to the reference data information and first data information and described second in the verification library It is believed that breath, verifies the user identity.
Optionally, the reference data information may include the first reference data information and the second reference data information, And the reference data information according in the verification library and first data information and second data information, it tests The user identity is demonstrate,proved, may include:
The first reference data information is compared with first data information;
The second reference data information is compared with second data information;And
In the first reference data information the second reference data consistent and described with first data information and institute It states under the second data information unanimous circumstances, the user passes through authentication.
Specifically, server-side can verify the first data information, i.e., image recognition goes out executes in the first data information Face action is compared with task face action and is compared with the facial image information of the registration user of the client, Confirm whether the first data information is effective.At the same time, server-side can also verify the second data information, i.e. image recognition goes out The limb action executed in two data informations is compared with task limb action, and whether the second data information of confirmation is effective.? Both in effective situation, return is verified to client and continues subsequent operation;Otherwise, subscriber authentication is obstructed It crosses, export authentication failed and prompts to carry out authentication again, return to step S21.
Above-mentioned technical proposal sends subscriber authentication request by client, asks in response to the subscriber authentication Server-side is asked to obtain validation task group at random from verification library, the user of client executes the validation task group and by client The data information that user executes the validation task group is sent back into server-side, server-side according to the reference number in verification library it is believed that Breath and first data information and second data information verify the result of the user identity.
Through the above technical solutions, appointing since the user of client needs to be performed simultaneously the verifying that at least two obtain at random It is engaged in and only user identity, therefore high degree just can be confirmed in the case where two kinds of validation tasks are all verified in server-side On improve the security level of subscriber authentication process, improve and crack difficulty and complexity.
Fig. 3 is a kind of method signaling diagram of user ID authentication method shown according to an exemplary embodiment, such as Fig. 3 institute Show, the interactive process between user 30, client 40 and server-side 50 is as follows:
Step S31, user 30 triggers the user's checking at client 40, such as unlocks or login the visitor of smart machine Family end APP.
Step S32, client 40 can star subscriber authentication process.
Step S33, client 40 for example can send server-side 50 for subscriber authentication request by exit passageway.
Step S34, server-side 50 can first confirm APP identity, obtain verifying from verification library then in response to the request Task groups.For example, validation task group may include the action sequence that first kind validation task is blink, rotary head to the right, with And second class validation task be on paper write " 6923 " alphabetical sequence.Also, the validation task group is sent out in step S35 Give client 40.
Step S36 starts trapping module at client 40 and the validation task is presented to user.For example, driving simultaneously Dynamic front camera and rear camera, and screen is shown and/or voice plays the validation task.
Step S37, user 30 execute the validation task.For example, front camera is directed at face, according to validation task Group takes turns doing the movement of blink, rotary head to the right.At the same time, the mistake that pen writes " 6923 " on paper is held with rear camera shooting Journey.
Step S38, client 40 capture the first data information and the second data information.For example, the preposition of client 40 is taken the photograph The second image/video information that the first image/video information and rear camera shot as head is shot is wanted according to service end interface It asks, server-side 50, i.e. step S39 is sent to by exit passageway.
Step S40, server-side 50 can be according to the reference data information and the verifying of the first, second data information in verification library The user identity.For example, server-side 50 can verify the first data information, i.e. image recognition goes out in the first image/video information The face action of execution and blink, rotary head to the right compare and by the first image/video information facial characteristics with should The facial image information of the registration user of client compares, and whether the first data information of confirmation is effective, such as only in the two It compares equal unanimous circumstances and confirms that the first data information is effective.At the same time, server-side 50 can also verify the second data information, I.e. image recognition goes out the limb action executed in the second image/video information and compares with " 6923 ", confirms the second data information Whether effectively, such as under the number and " 6923 " unanimous circumstances of identifying in the second image/video information confirm the Two data informations are effective.Optionally, server-side 50 can under the first data information and all effective situation of the second data information, It determines that subscriber authentication passes through and returns and is verified result to client 40, i.e. step S41.Later, in step S42, visitor Family end 40 is presented (such as screen is shown or voice plays) described verification result and continues subsequent operation;Otherwise, server-side 50 is true Determine subscriber authentication and do not pass through and send to send result to client 40, client 40 exports subscriber authentication and do not pass through Result and prompt carry out authentication again, return to step S32.
Using such technical solution, front camera and rear camera are used when subscriber authentication simultaneously.Pass through The combination of same time face and hand corresponding actions mentions significantly so that criminal is difficult to carry out modeling simultaneously to break through The high safety of authentication.
Fig. 4 is a kind of block diagram of subscriber authentication device shown according to an exemplary embodiment, as shown in figure 4, The subscriber authentication device 10 is applied to client, the apparatus may include:
First sending module 101, for sending subscriber authentication request.
First receiving module 102, it is described to test for receiving the validation task group in response to subscriber authentication request Demonstrate,proving task groups includes at least one first kind validation task and at least one second class validation task.
Trapping module 103 executes the first data information of at least one first kind validation task for capturing user With the second data information of at least one second class validation task.For example, the trapping module 103 may include that intelligence is set Standby preposition and rear camera.
First sending module 101 is also used to send first data information and second data information.And
Display module 104, for providing reference data information in the verification library according to server-side received and described First data information and second data information verify the result of the user identity.
Optionally, the first kind validation task may include face action validation task and second class verifying Task may include limb action validation task.
Optionally, first data information can execute the first image view of the face action validation task for user Frequency information, second data information can execute the second image/video letter of the limb action validation task for the user Breath.
Fig. 5 is a kind of block diagram of subscriber authentication device shown according to an exemplary embodiment, as shown in figure 5, The subscriber authentication device 20 is applied to server-side, the apparatus may include:
Module 201 is obtained, obtains validation task from verification library for the subscriber authentication request in response to receiving Group, the validation task group include at least one first kind validation task and at least one second class validation task.
Second sending module 202, for sending the validation task group.
Second receiving module 203 executes at least one first kind validation task for receiving the user captured Second data information of the first data information and at least one second class validation task.And
Authentication module 204, for according in the verification library reference data information and first data information and institute The second data information is stated, the user identity is verified.
Optionally, the reference data information may include the first reference data information and the second reference data information, And the authentication module is used for:
The first reference data information is compared with first data information;
The second reference data information is compared with second data information;And
In the first reference data information the second reference data consistent and described with first data information and institute It states under the second data information unanimous circumstances, the user passes through authentication.
Optionally, the first kind validation task may include face action validation task and second class verifying Task may include limb action validation task.
Optionally, described device can also include:
The verification library, the verification library may include multiple first kind validation tasks and multiple second class validation tasks, And multiple first reference data information corresponding with the multiple first kind validation task and with the multiple second class verify The corresponding multiple second reference data information of task.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
The embodiment of the present disclosure provides a kind of computer readable storage medium, is stored thereon with computer program, the program quilt The step of user ID authentication method for being applied to client is realized when processor executes.
The embodiment of the present disclosure provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;And
Processor, for executing the computer program in the memory, to be applied to client described in realization The step of user ID authentication method.
The embodiment of the present disclosure provides a kind of computer readable storage medium, is stored thereon with computer program, the program quilt The step of user ID authentication method for being applied to server-side is realized when processor executes.
The embodiment of the present disclosure provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;And
Processor, for executing the computer program in the memory, to be applied to server-side described in realization The step of user ID authentication method.
Fig. 6 is the block diagram of a kind of electronic equipment 70 shown according to an exemplary embodiment.As shown in fig. 6, the electronics is set Standby 70 may include: processor 701, memory 702.The electronic equipment 70 can also include multimedia component 703, input/defeated One or more of (I/O) interface 704 and communication component 705 out.
Wherein, processor 701 is used to control the integrated operation of the electronic equipment 70, to complete above-mentioned subscriber authentication All or part of the steps in method.Memory 702 is for storing various types of data to support in the electronic equipment 70 Operation, these data for example may include the instruction of any application or method for operating on the electronic equipment 70, And the relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video etc..The memory 702 can be realized by any kind of volatibility or non-volatile memory device or their combination, such as static random is deposited Access to memory (Static Random Access Memory, abbreviation SRAM), electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), erasable programmable Read-only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM), programmable read only memory (Programmable Read-Only Memory, abbreviation PROM), and read-only memory (Read-Only Memory, referred to as ROM), magnetic memory, flash memory, disk or CD.Multimedia component 703 may include screen and audio component.Wherein Screen for example can be touch screen, and audio component is used for output and/or input audio signal.For example, audio component may include One microphone, microphone is for receiving external audio signal.The received audio signal can be further stored in storage Device 702 is sent by communication component 705.Audio component further includes at least one loudspeaker, is used for output audio signal.I/O Interface 704 provides interface between processor 701 and other interface modules, other above-mentioned interface modules can be keyboard, mouse, Button etc..These buttons can be virtual push button or entity button.Communication component 705 is set for the electronic equipment 70 with other Wired or wireless communication is carried out between standby.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near Field Communication, abbreviation NFC), 2G, 3G or 4G or they one or more of combination, therefore corresponding communication Component 705 may include: Wi-Fi module, bluetooth module, NFC module.
In one exemplary embodiment, electronic equipment 70 can be by one or more application specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device, Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array (Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member Part is realized, for executing above-mentioned user ID authentication method.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of above-mentioned user ID authentication method is realized when program instruction is executed by processor.For example, the computer-readable storage Medium can be the above-mentioned memory 702 including program instruction, and above procedure instruction can be held by the processor 701 of electronic equipment 70 Row is to complete above-mentioned user ID authentication method.
Fig. 7 is the block diagram of a kind of electronic equipment 80 shown according to an exemplary embodiment.For example, electronic equipment 80 can be with It is provided as a server.Referring to Fig. 7, electronic equipment 80 includes processor 801, and quantity can be one or more, and Memory 802, for storing the computer program that can be executed by processor 801.The computer program stored in memory 802 can With include it is one or more each correspond to one group of instruction module.In addition, processor 801 can be configured as and hold Row computer program, to execute above-mentioned user ID authentication method.
In addition, electronic equipment 80 can also include power supply module 803 and communication component 804, which can be by It is configured to execute the power management of electronic equipment 80, which can be configured as the communication for realizing electronic equipment 80, For example, wired or wireless communication.In addition, the electronic equipment 80 can also include input/output (I/O) interface 805.Electronic equipment 80 can operate based on the operating system for being stored in memory 802, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM etc..
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of above-mentioned user ID authentication method is realized when program instruction is executed by processor.For example, the computer-readable storage Medium can be the above-mentioned memory 802 including program instruction, and above procedure instruction can be held by the processor 801 of electronic equipment 80 Row is to complete above-mentioned user ID authentication method.
Above-mentioned technical proposal sends subscriber authentication request by client, asks in response to the subscriber authentication Server-side is asked to obtain validation task group at random from verification library, the user of client executes the validation task group and by client The data information that user executes the validation task group is sent back into server-side, server-side according to the reference number in verification library it is believed that Breath and first data information and second data information verify the result of the user identity.
Through the above technical solutions, appointing since the user of client needs to be performed simultaneously the verifying that at least two obtain at random It is engaged in and only user identity, therefore high degree just can be confirmed in the case where two kinds of validation tasks are all verified in server-side On improve the security level of subscriber authentication process, improve and crack difficulty and complexity.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, can be combined in any appropriate way, in order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (18)

1. a kind of user ID authentication method, which is characterized in that the method is applied to client, which comprises
Send subscriber authentication request;
Receive the validation task group requested in response to the subscriber authentication, the validation task group include at least one first Class validation task and at least one second class validation task;
First data information of capture user's execution at least one first kind validation task and at least one described second class Second data information of validation task;
Send first data information and second data information;And
Reference data information in the verification library according to server-side that receives and first data information and described the are provided Two data informations verify the result of the user identity.
2. the method according to claim 1, wherein the first kind validation task includes that face action verifying is appointed Business and the second class validation task include limb action validation task.
3. according to the method described in claim 2, it is characterized in that, first data information is that user's execution face is dynamic Make the first image/video information of validation task, second data information is that the user executes the limb action verifying times Second image/video information of business.
4. a kind of user ID authentication method, which is characterized in that the method is applied to server-side, which comprises
In response to the subscriber authentication request received, validation task group, the validation task group packet are obtained from verification library Include at least one first kind validation task and at least one second class validation task;
Send the validation task group;
Receive the first data information and described at least one that the user captured executes at least one first kind validation task Second data information of a second class validation task;
According in the verification library reference data information and first data information and second data information, verify institute State user identity.
5. according to the method described in claim 4, it is characterized in that, the reference data information includes the first reference data information And second reference data information and the reference data information according in the verification library and first data information With second data information, the user identity is verified, comprising:
The first reference data information is compared with first data information;
The second reference data information is compared with second data information;And
In the first reference data information the second reference data consistent and described with first data information and described the Under two data information unanimous circumstances, the user passes through authentication.
6. according to the method described in claim 5, it is characterized in that, the first kind validation task includes that face action verifying is appointed Business and the second class validation task include limb action validation task.
7. according to the method described in claim 6, it is characterized in that, the verification library includes multiple first kind validation tasks and more A second class validation task, and multiple first reference data information corresponding with the multiple first kind validation task, and Multiple second reference data information corresponding with the multiple second class validation task.
8. a kind of subscriber authentication device, which is characterized in that described device is applied to client, and described device includes:
First sending module, for sending subscriber authentication request;
First receiving module, for receiving the validation task group in response to subscriber authentication request, the validation task Group includes at least one first kind validation task and at least one second class validation task;
Trapping module, for capture user execute at least one first kind validation task the first data information and it is described extremely Second data information of a few second class validation task;
First sending module is also used to send first data information and second data information;And
Display module, for providing reference data information and first data in the verification library according to server-side received Information and second data information verify the result of the user identity.
9. device according to claim 8, which is characterized in that the first kind validation task includes that face action verifying is appointed Business and the second class validation task include limb action validation task.
10. device according to claim 9, which is characterized in that first data information is that user executes the face The first image/video information of validation task is acted, second data information is that the user executes the limb action verifying Second image/video information of task.
11. a kind of subscriber authentication device, which is characterized in that described device is applied to server-side, and described device includes:
Module is obtained, obtains validation task group from verification library for requesting in response to the subscriber authentication received, it is described Validation task group includes at least one first kind validation task and at least one second class validation task;
Second sending module, for sending the validation task group;
Second receiving module executes the first data of at least one first kind validation task for receiving the user captured Second data information of information and at least one second class validation task;And
Authentication module, for being counted according to the reference data information and first data information and described second in the verification library It is believed that breath, verifies the user identity.
12. device according to claim 11, which is characterized in that the reference data information include the first reference number it is believed that Breath and the second reference data information and the authentication module are used for:
The first reference data information is compared with first data information;
The second reference data information is compared with second data information;And
In the first reference data information the second reference data consistent and described with first data information and described the Under two data information unanimous circumstances, the user passes through authentication.
13. device according to claim 12, which is characterized in that the first kind validation task includes face action verifying Task and the second class validation task include limb action validation task.
14. device according to claim 13, which is characterized in that described device further include:
The verification library, the verification library include multiple first kind validation tasks and multiple second class validation tasks, and with institute State corresponding multiple first reference data information of multiple first kind validation tasks and corresponding with the multiple second class validation task Multiple second reference data information.
15. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of any one of claim 1-3 the method is realized when execution.
16. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;And
Processor, for executing the computer program in the memory, to realize described in any one of claim 1-3 The step of method.
17. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of any one of claim 4-7 the method is realized when execution.
18. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;And
Processor, for executing the computer program in the memory, to realize described in any one of claim 4-7 The step of method.
CN201811447615.3A 2018-11-29 2018-11-29 User ID authentication method and device, storage medium and electronic equipment Pending CN109726636A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811447615.3A CN109726636A (en) 2018-11-29 2018-11-29 User ID authentication method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811447615.3A CN109726636A (en) 2018-11-29 2018-11-29 User ID authentication method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN109726636A true CN109726636A (en) 2019-05-07

Family

ID=66295311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811447615.3A Pending CN109726636A (en) 2018-11-29 2018-11-29 User ID authentication method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN109726636A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111292087A (en) * 2020-01-20 2020-06-16 北京沃东天骏信息技术有限公司 Identity verification method and device, computer readable medium and electronic equipment
CN114500044A (en) * 2022-01-25 2022-05-13 特斯联科技集团有限公司 Data verification method and device, storage medium and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348619A (en) * 2013-07-31 2015-02-11 联想(北京)有限公司 Identity verifying method and terminal device
CN105701392A (en) * 2015-12-31 2016-06-22 联想(北京)有限公司 Information processing method and electronic equipment
CN105930816A (en) * 2016-05-05 2016-09-07 上海聚虹光电科技有限公司 Iris identification system based on virtual reality device
US20170372415A1 (en) * 2013-12-26 2017-12-28 Tencent Technology (Shenzhen) Company Limited Method, terminal, server and system for information registration
CN108022102A (en) * 2017-12-04 2018-05-11 阿里巴巴集团控股有限公司 A kind of auth method, device and equipment
CN108108610A (en) * 2018-01-02 2018-06-01 联想(北京)有限公司 Auth method, electronic equipment and readable storage medium storing program for executing
WO2018133282A1 (en) * 2017-01-19 2018-07-26 华为技术有限公司 Dynamic recognition method and terminal device
CN108446664A (en) * 2018-03-30 2018-08-24 广东华电网维信息科技有限公司 A kind of indentity identifying method and device based on recognition of face
CN108881142A (en) * 2017-12-01 2018-11-23 北京旷视科技有限公司 User ID authentication method, device and onboard system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348619A (en) * 2013-07-31 2015-02-11 联想(北京)有限公司 Identity verifying method and terminal device
US20170372415A1 (en) * 2013-12-26 2017-12-28 Tencent Technology (Shenzhen) Company Limited Method, terminal, server and system for information registration
CN105701392A (en) * 2015-12-31 2016-06-22 联想(北京)有限公司 Information processing method and electronic equipment
CN105930816A (en) * 2016-05-05 2016-09-07 上海聚虹光电科技有限公司 Iris identification system based on virtual reality device
WO2018133282A1 (en) * 2017-01-19 2018-07-26 华为技术有限公司 Dynamic recognition method and terminal device
CN108881142A (en) * 2017-12-01 2018-11-23 北京旷视科技有限公司 User ID authentication method, device and onboard system
CN108022102A (en) * 2017-12-04 2018-05-11 阿里巴巴集团控股有限公司 A kind of auth method, device and equipment
CN108108610A (en) * 2018-01-02 2018-06-01 联想(北京)有限公司 Auth method, electronic equipment and readable storage medium storing program for executing
CN108446664A (en) * 2018-03-30 2018-08-24 广东华电网维信息科技有限公司 A kind of indentity identifying method and device based on recognition of face

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111292087A (en) * 2020-01-20 2020-06-16 北京沃东天骏信息技术有限公司 Identity verification method and device, computer readable medium and electronic equipment
CN114500044A (en) * 2022-01-25 2022-05-13 特斯联科技集团有限公司 Data verification method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
AU2019202631B2 (en) Toggling biometric authentication
US10579784B2 (en) System, device, and method of secure utilization of fingerprints for user authentication
US8970348B1 (en) Using sequences of facial gestures to authenticate users
US20190318077A1 (en) Visual data processing of response images for authentication
CN106487511B (en) Identity authentication method and device
CN111033501B (en) Secure authorization for access to private data in virtual reality
CN106557678B (en) A kind of intelligent terminal mode switching method and its device
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
US10140614B2 (en) User authentication method and device for credentials back-up service to mobile devices
US20180374101A1 (en) Facial biometrics card emulation for in-store payment authorization
CN109146470A (en) Generate the method and device of payment code
CN104484593B (en) terminal verification method and device
JPWO2017170384A1 (en) Biometric data processing apparatus, biometric data processing system, biometric data processing method, biometric data processing program, and storage medium for storing biometric data processing program
CN108241999A (en) A kind of generation method of invoice information, apparatus and system
JP7428242B2 (en) Authentication device, authentication system, authentication method and authentication program
CN107748991A (en) Account safety management method and device
CN109726636A (en) User ID authentication method and device, storage medium and electronic equipment
JP2015176555A (en) Communication terminal and method for authenticating communication terminal
CN106060027A (en) Methods, devices, equipment and systems for verification based on verification codes
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
US20240028698A1 (en) System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration
CN109254661A (en) Image display method, device, storage medium and electronic equipment
CN105931053A (en) Authentication method and apparatus, and electronic device
CN111435503A (en) Method and device for acquiring electronic credential
CN115906028A (en) User identity verification method and device and self-service terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190507