CN110096859A - User authentication method, device, computer equipment and computer readable storage medium - Google Patents
User authentication method, device, computer equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110096859A CN110096859A CN201910192559.1A CN201910192559A CN110096859A CN 110096859 A CN110096859 A CN 110096859A CN 201910192559 A CN201910192559 A CN 201910192559A CN 110096859 A CN110096859 A CN 110096859A
- Authority
- CN
- China
- Prior art keywords
- user
- age
- face
- card
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 83
- 238000004422 calculation algorithm Methods 0.000 claims description 41
- 238000000605 extraction Methods 0.000 claims description 30
- 238000004590 computer program Methods 0.000 claims description 16
- 238000012795 verification Methods 0.000 abstract description 8
- 238000000262 chemical ionisation mass spectrometry Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 14
- 230000000694 effects Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 239000000284 extract Substances 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 230000001815 facial effect Effects 0.000 description 4
- 238000004321 preservation Methods 0.000 description 4
- 238000013135 deep learning Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 210000004209 hair Anatomy 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 210000004709 eyebrow Anatomy 0.000 description 1
- 210000000887 face Anatomy 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses user authentication method, device, equipment and computer readable storage mediums to judge whether the ID card No. that user is inputted is qualified according to preset rules if method includes: to receive the ID card No. of user's input;If qualified, by calling the photographic device to obtain the face image of the user, and face's attribute information of the user is obtained according to acquired face image and preset face character recognizer and is saved, wherein, face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;Judge whether the identification age meets default age rule;If the identification age meets default age rule, determine that the user passes through verifying.Verifying age of user can be quickly identified by implementing this programme, effectively improve the verification efficiency of age of user, and the process CIMS that user needs to operate during the entire process of identification verifying age of user is simple, it is convenient for the user to operate.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of user authentication method, device, computer equipment and meters
Calculation machine readable storage medium storing program for executing.
Background technique
With the fast development of computer technology and Internet information technique, the terminal devices such as computer, smart phone
It is widely used, miscellaneous application program (Application, app) also occurs, may be, for example, game class
App, life kind app, social category app and audio-visual class app etc..Currently, much needing to limit the use year of user using app
Age, such as shared bicycle app forbid 12 years old children below to use shared bicycle service;Such as net is borrowed the financial class such as app and is answered
With software need to limit user use the age, with prevent minor using net borrow app provided a loan but impotentia repay should
The corresponding interest of loan and loan and lead to the higher problem of risk, therefore much need to limit the answering using the age of user
Should have the function of identification identification age of user, with program to realize the mesh for limiting non-targeted user and using the application program
's.However, existing identification identification age of user is mainly to verify age of user by ID card No. that user is actively entered,
But if the application program is the inputted ID card No. format of simple verification, then user can be by falsely using others
ID card No. generates corresponding ID card No. using the tool for automatically generating ID card No. by verification, that is, to use
Family, which can use the ID card No. of fraud or claim the identity of others fraudulently, demonstrate,proves number to escape application program identification identification user year
The function in age, if but the application program call directly real-name authentication system to verify age of user, then can considerably increase this
The cost of application program is unfavorable for the popularization and application of the application program.
Summary of the invention
The embodiment of the invention provides a kind of user authentication method, device, computer equipment and computer-readable storage mediums
Matter verifies age of user, the process ratio that user needs to operate during the entire process of identification verifying age of user convenient for quickly identification
It is relatively simple, it is convenient for the user to operate, substantially increase the experience effect of user.
In a first aspect, the embodiment of the invention provides a kind of user authentication methods comprising:
If receiving the ID card No. of user's input, it is according to the ID card No. that preset rules judge that user is inputted
No qualification;
If the ID card No. is qualified, by calling the photographic device to obtain the face image of the user, and root
Face's attribute information of the user is obtained according to acquired face image and preset face character recognizer and is saved,
In, face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;
Judge whether the identification age meets default age rule;
If the identification age meets default age rule, determine that the user passes through verifying.
Second aspect, the embodiment of the invention also provides a kind of user authentication devices comprising:
First judging unit, if the ID card No. for receiving user's input, judges user institute according to preset rules
Whether the ID card No. of input is qualified;
First acquisition unit, if qualified for the ID card No., by calling the photographic device to obtain the use
The face image at family, and obtain according to acquired face image and preset face character recognizer the face of the user
Attribute information simultaneously saves, wherein face's attribute information includes age attribute information, and the age attribute information includes user
The identification age;
Second judgment unit, for judging whether the identification age meets default age rule;And
First judging unit determines that the user passes through verifying if meeting default age rule for the identification age.
The third aspect, the embodiment of the invention also provides a kind of computer equipment, the computer equipment includes memory
And processor, computer program is stored on the memory, the processor is realized above-mentioned when executing the computer program
The method of first aspect.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium
Storage media is stored with computer program, and the computer program includes program instruction, and described program instruction, which is worked as, to be executed by processor
When can realize above-mentioned first aspect method.
The embodiment of the invention provides a kind of user authentication method, device, computer equipment and computer-readable storage mediums
Matter.The embodiment of the present invention can help the application program for needing to limit age of user effectively to identify non-targeted user, the non-mesh
Marking user is the user that application program limitation uses the application program, is generally underage users or the elderly user,
It can solve non-targeted user and claim the identity of others fraudulently and demonstrate,prove number or pass through proof of identity using the ID card No. of Software Create
The problem of.This programme was identified using face character and is calculated using identity card and the age of face character recognizer verification user
Method identifies that the accuracy rate of age of user is higher.Implementation this programme embodiment can be effectively prevented leads to because non-targeted user falsely uses fraud
It crosses caused bad influence after proof of identity and may insure not miss any target user;Meanwhile identifying age of user
Need the process CIMS of user's operation simple during entire proof of identity, it is convenient for the user to operate, substantially increase the body of user
Test effect.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram for user authentication method that first embodiment of the invention provides;
Fig. 2 is an a kind of sub-process schematic diagram of user authentication method that first embodiment of the invention provides;
Fig. 3 is a kind of another sub-process schematic diagram for user authentication method that first embodiment of the invention provides;
Fig. 4 is a kind of another sub-process schematic diagram for user authentication method that first embodiment of the invention provides;
Fig. 5 is a kind of flow diagram for user authentication method that second embodiment of the invention provides;
Fig. 6 is an a kind of sub-process schematic diagram of user authentication method that second embodiment of the invention provides;
Fig. 7 is a kind of schematic block diagram for user authentication device that first embodiment of the invention provides;
Fig. 8 is a kind of schematic frame of the first judging unit of user authentication device that first embodiment of the invention provides
Figure;
Fig. 9 is a kind of schematic frame of the second judgment unit for user authentication device that first embodiment of the invention provides
Figure;
Figure 10 is a kind of schematic block diagram for user authentication device that second embodiment of the invention provides;And
Figure 11 is a kind of schematic block diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
Referring to Fig. 1, a kind of schematic flow chart of its user authentication method provided for first embodiment of the invention.It should
User authentication method, which may operate in, to be had in the terminal device of photographic device, wherein terminal device can be smart phone, put down
The electronic equipments such as plate computer or laptop.Specifically, which is applied in an application program, implements one
In example, for verifying the user when user's registration application program, specifically, whether the age for verifying the user meets this
The default age of application program.As shown in Figure 1, this method may include step S101 to S104.
If S101, the ID card No. for receiving user's input, judge the identity card that user is inputted according to preset rules
Whether number is qualified.
Specifically, in one embodiment, described to judge whether the ID card No. that user is inputted closes according to preset rules
Lattice include identity card method of calibration.The identity card method of calibration, as shown in Fig. 2, i.e. step S101 include sub-step S101a extremely
S101e.Wherein, S101a, judge whether the ID card No. that user is inputted meets ID card No. rules of arrangement;S101b,
If the ID card No. meets ID card No. rules of arrangement, the user identity card age in the ID card No. is obtained;
S101c, judge whether the user identity card age meets default age rule;If S101d, meeting default age rule,
Determine that the ID card No. is qualified;If S101e, the ID card No. do not meet ID card No. rules of arrangement or discontented
The default age rule of foot, then determine that the ID card No. is unqualified.
Wherein, in one embodiment, the ID card No. rules of arrangement is the rules of arrangement that user identity demonstrate,proves number, tool
Body, the ID card No. of user is feature combinational code, totally 18 bit digital, is verified by 17 bit digital ontology codes and 1 bit digital
Code composition, wherein the rules of arrangement that user identity demonstrate,proves number is from left to right successively are as follows: 6 bit digital address codes, 8 bit digitals go out
Raw date code, 3 bit digital sequence codes and 1 bit digital check code.Wherein, check code is according to 17 digit numeric code of front, according to phase
The check code for answering check code rule to calculate.Therefore, it can be inputted according to ID card No. rules of arrangement to verify user
Identity card format it is whether correct.Verify the ID card No. that the user is inputted with whether meeting 6 bit digitals from left to right
Location code, 8 bit digital dates of birth code, rules of arrangement as 3 bit digital sequence codes and 1 bit digital check code, and it is last
Whether one-bit digital check code is to be got according to 17 digit numeric code of front according to the calculating of corresponding check code rule.
Wherein, in one embodiment, the step S101c judges whether the user identity card age meets the default age
Rule specifically includes step A~C:
Step A, judge whether the user identity card age belongs within preset target age range;
If step B, the described user identity card age belongs within preset target age range, the user identity is determined
Demonstrate,prove the default age rule of age satisfaction;And
If step C, the described user identity card age is not belonging within preset target age range, user's body is determined
Part card age is unsatisfactory for default age rule.
Wherein, the target age range can be by user according to the demand of the practical application scene of the age method of calibration
Customized setting is carried out in advance, for example, if according to the demand of the practical application scene of the age method of calibration by the target
The range of age is set as between 12 years old to 60 years old, then the age method of calibration is the use by the range of age between 12 years old to 60 years old
Family is considered as target user, and the user not between 12 years old to 60 years old is considered as non-targeted user, i.e. judgement the range of age was at 12 years old
The user identity card age between by 60 years old meets default age rule, determines the user identity less than 12 years old and greater than 60 years old
The card age is unsatisfactory for default age rule.
In another embodiment, the step S101c judges whether the user identity card age meets default age rule
It then specifically includes: judging whether the user identity card age is greater than the default age.In other embodiments, the step
S101c judges whether the user identity card age meets default age rule and specifically include: judging the user identity card year
Whether age is less than the default age.Wherein, the default age can be by user according to the practical application field of the age method of calibration
The demand of scape carries out customized setting in advance, and the default age is a specific age value.Such as the default age is 18
Year or 60 years old.
Therefore, in above-mentioned steps S101 it is whether the format of ID card No. that first verification user is inputted meets identity
Rules of arrangement is demonstrate,proved, and then judges whether the identity card age of acquired user meets default age rule again, that is, judges the use
Whether the identity card age at family is within preset target age range, or judges whether the identity card age of the user is big
In or less than a specific age value, and then judge whether the ID card No. for determining that the user is inputted is qualified.
If S102, the ID card No. are qualified, by calling the photographic device to obtain the face image of the user,
And face's attribute information of the user is obtained according to acquired face image and preset face character recognizer and is protected
It deposits, wherein face's attribute information includes age attribute information, and the age attribute information includes the identification age of user.
Specifically, in one embodiment, the face image according to acquired in and preset face character recognizer
Obtaining face's attribute information of the user and saving includes face's attribute information acquiring method.The attribute information acquisition side, face
Method, as shown in figure 3, i.e. step S102 includes sub-step S102a to S102b.Wherein, S102a, based on preset face character know
Other algorithm obtains face's attribute information of the user from acquired face image;And S102b, by the face of the user
Subordinate's property information preservation is into a preset relevant database.
Wherein, face character identification (Face Attribute) algorithm be the gender for going out face for identification, the age,
The algorithm of the attribute values such as posture, expression, i.e., by calling the face character to identify that the identification of (Face Attribute) algorithm is used
Face's attribute information of the available user of the face image at family, face's attribute information is in addition to the age attribute including user
Information further includes gender attribute information, the posture attribute information, expression attribute information of user.Specifically, the face character is known
The input variable x1 of other algorithm is generally " user's face image " and analyzes the " face five that user's face image obtains
Official's key point coordinate ", output valve y1 are the corresponding attribute value of face.Wherein, face character recognizer generally can be according to people
Face is aligned by face face key point coordinate, i.e., by the face image of the user after rotation, the operation such as scaling, taking off, by people
Face is adjusted to scheduled size and form, and then carries out attributive analysis again.In addition, in the present embodiment, by output valve y1, that is, people
The corresponding attribute value of face is saved in a relevant database, and reading data are more convenient quick from relevant database, and
The data being stored in relevant database are also relatively safer.
It in one embodiment, is all one independent when each attribute of the face character recognizer identification face
The identification of process, i.e. face character is only to the general designation of a kind of algorithm, wherein gender identification, age estimation, Attitude estimation, expression
Identification is all independent from each other algorithm, i.e., for the face character recognizer of gender identification and the face category for age estimation
Property recognizer be different recognizers, therefore, can use and identified for the face character recognizer of age estimation
The age attribute information of user, wherein the age attribute information includes identification age and the ID number of user of user.Another
In one embodiment, the face character recognizer can be the face character recognizer based on deep learning, which can
It, therefore, can be with to realize the output of gender, posture, the attribute values such as expression while the age attribute value output for realizing user
Using the age attribute information and gender attribute information for identifying user based on the face character recognizer of deep learning,
In, the age attribute information includes identification age and the ID number of user of user.
S103, judge whether the identification age meets default age rule.
Specifically, in one embodiment, described to judge whether the identification age meets default age rule and include identification
Age estimation method.The identification Age estimation method, as shown in figure 4, i.e. step S103 includes sub-step S103a to S103c.Its
In, S103a, judge whether the identification age belongs within preset target age range;If S103c, the identification age
Belong within preset target age range, determines that the identification age meets default age rule;And if S103d, described
The identification age is not belonging within preset target age range, determines that the identification age is unsatisfactory for default age rule.
Specifically, face's attribute information of the user includes the age attribute information of user, specifically, according to being identified
Face's attribute information of obtained user it can be seen that the user age attribute information, and then can be belonged to according to the age of user
Property information determine the identification age of the user, and then judge whether the identification age of the user meets default age rule, wherein
In the present embodiment, the target age range can be by user according to the demand of the practical application scene of the age method of calibration
Customized setting is carried out in advance.In the present embodiment, which is a specific age value range, may be, for example, 13
- 65 years old years then determined that the identification age of the user was unsatisfactory for default age rule that is, when the identification age of user is 12 years old;
Or when user identifies that the age is 70 years old, equally determine that the identification age of the user is unsatisfactory for default age rule;Work as user
The identification age between 13 years old to 65 years old when determine that the identification age of the user meets default age rule.
In another embodiment, the default age rule may be, for example, to be greater than the default age at the identification age of the user
Or the identification age of the user is less than the default age, wherein the default age be application program developer according to
The demand of the practical application scene of application carries out customized setting in advance, and in the present embodiment, which is one specific
Age value, i.e., when the identification age of user is greater than the default age or then determines that the identification age of the user is full less than the default age
The default age rule of foot.
If S104, the identification age meet default age rule, determine that the user passes through verifying.
Specifically, in one embodiment, the identification age for obtaining the user is identified using face character recognizer, in turn
Whether the identification age for verifying the user again, which meets default age rule, then illustrates the user when meeting default age rule
The identification age meet registration age of application program, determine that the user passes through age verification, wherein identify using face character
Algorithm identifies that the accuracy rate of age of user is higher.
In the above-described embodiments, this programme is by utilizing identity card and face character recognizer twin check user
Age, wherein the accuracy rate using face character recognizer identification age of user is higher.The embodiment of the present invention can help to need
The application program for limiting age of user effectively identifies non-targeted user, which is that application program limitation uses
The user of the application program is generally underage users or the elderly user, can solve non-targeted user and falsely uses other people
ID card No. or the problem of pass through proof of identity using the ID card No. of Software Create.Implementing this programme embodiment can be with
It effectively prevent falsely using fraud because of non-targeted user by bad influence caused by after proof of identity and may insure not miss and appoint
What target user;Meanwhile identifying that the entire proof of identity of age of user needs the process CIMS of user's operation simple in the process, just
In user's operation, the experience effect of user is substantially increased.
Referring to Fig. 5, a kind of flow diagram of its user authentication method provided for second embodiment of the invention.Specifically
Ground, the user authentication method are applied in an application program.As shown in figure 5, this method may include step S201-S209.Wherein
Step S201-S204 is similar with the step S101-S104 in above-described embodiment, and details are not described herein.The following detailed description of this reality
Apply in example increase step S205- step S209.
If S205, the identification age are unsatisfactory for default age rule, according to acquired face image and preset people
Face feature extraction algorithm obtains face's key point information of the user and saves, wherein by face's key point of the user
Information is as the first key point information.
Specifically, in one embodiment, the face image and preset face characteristic extraction algorithm according to acquired in
Obtaining face's key point information of the user and saving includes face's key point information acquisition methods.Face's key point information
Acquisition methods, as shown in fig. 6, i.e. step S205 includes sub-step S205a to S205b.Wherein, S205a, be based on preset face
Feature extraction algorithm obtains face's key point information of the user from acquired face image;And S205b, will be described
Face's key point information of user is saved in a preset relevant database.
Wherein, face's key point of the user includes eyes, ear, nose, mouth, eyebrow, the facial contour of user
Etc. key points.Face's key point information is that the face characteristic extraction algorithm analyzes face's key point of the user in turn
The information being calculated is extracted, and is saved in the face's key point information obtained is extracted in a relevant database.Wherein,
The face, which mentions feature (Face Feature Extraction) algorithm, to be consolidated for converting a string for " facial image "
The algorithm of the numerical value of measured length, wherein the numerical value for a string of regular lengths being transformed is known as " face characteristic (Face
Feature) ", for characterizing the face feature of user, wherein the input variable x2 of the face characteristic extraction algorithm is generally
For " facial image " and analyze " human face five-sense-organ key point coordinate " that the facial image obtains, output valve y2 be for
State the numerical value of a string of regular lengths of the face feature of user.Specifically, the face characteristic extraction algorithm is according to face five
Face is aligned by official's key point coordinate according to preassigned pattern, and then calculates feature.In one embodiment, the face characteristic extracts
Algorithm is the face characteristic extraction algorithm based on deep learning, and face mentions that characteristic model is smaller, and extracts the speed for calculating feature
Degree is very fast.In addition, in the present embodiment, face's key point information of the user is saved in a relationship type by output valve y2
In database, it is more convenient quick that data are read from relevant database, and be stored in the data in relevant database
Compare safety.
S206, the identity card picture for obtaining the user simultaneously shine the identity card by calling face characteristic extraction algorithm
Piece carries out face characteristic and extracts to obtain the face key point information of the identity card picture, wherein by the face of the photo
Key point information is as the second key point information.
Specifically, the mode of the identity card picture for obtaining the user includes that camera shooting is imported or started from user's photograph album
Head shooting obtains.Wherein, described that the identity card picture is carried out proposing characteristic processing to obtain using face characteristic extraction algorithm
The step of face's key point information of the identity card picture, realizes that process and realization principle are similar with above-mentioned steps 205, herein
It repeats no more.
S207, using face alignment algorithm to first key point information and the second key point information be compared with
Obtain the similarity between the first key point information and the second key point information.
Specifically, face alignment (Face Compare) algorithm is the calculation for measuring similarity between two faces
Method, the input variable x3 of the face alignment algorithm are two face characteristic informations, in the present embodiment, i.e. input variable x3
For first face key point information and second face's key point information, wherein first face key point information
And second face's key point information acquired by above-mentioned steps S205 and S206 using face characteristic extraction algorithm, it is defeated
Value y3 is the similarity between two face characteristic informations out, i.e., closes first face key point information and the second face
The similarity that key point information obtains after being compared.
S208, judge whether the similarity is greater than default similarity.
Specifically, in one embodiment, the default similarity can be made by oneself according to the practical application request of user
Justice setting, for example, this can be preset to similarity is set as 90%, that is, judges first face key point information and second
Whether the similarity that face's key point information obtains after being compared is greater than 90%.
If S209, the similarity are greater than default similarity, determine that the user passes through verifying.
Specifically, the similarity is greater than default similarity and then shows the identity card picture and utilize face recognition technology
Obtained face height is similar, is the same user, and then can determine that the user meets the note of this process of authentication
Volume requires, and determines that the user passes through verifying;If the similarity is not more than default similarity, determines that the user does not pass through and test
Card, at this point, in one embodiment, this can be forbidden not pass through the user's registration of verifying and use the application program;In other implementations
In example, or this does not pass through the limitation of user setting one of verifying using mark, and then when the user for not passing through verifying sets
After a limitation has been set using indicating and having registered the application program, which can be to the use with limitation using mark
Family carries out corresponding permission limitation, for example, can limit the use duration of user for game class app, limits it and uses the time
Section;For financial class app, the loan limit etc. of user can be limited.
In the above-described embodiments, this programme passes through using ID card No. and face character recognizer as the first gravidity
Part verification, wherein the accuracy rate using face character recognizer identification age of user is higher, when user can not pass through the first weight
Proof of identity avoids user from needing to be repeated as many times due to the first weight proof of identity fails then automatically into the second heavy proof of identity
What is verified is cumbersome, and can simplify the user's checking process, greatly promotes the experience effect of user, wherein second weight
Proof of identity is identity card picture provided by the face identified using face characteristic extraction algorithm to camera and user
On face carry out proposing characteristic processing respectively, and then obtain on the first key point information and the photo of identified face
Second key point information of face recycles face alignment algorithm to compare first and second key point information to be calculated
The similarity of face on identity card picture provided by face that camera is identified and user, can more accurately identify
Non-targeted user out, while can also avoid causing target user because being unsatisfactory for because of the identification error of face character recognizer
The default age is regular and needs the problem of repeatedly identifying the age using face character recognizer, can effectively reduce target user's
Registration step.The embodiment of the present invention can help the application program for needing to limit age of user effectively to identify non-targeted user,
The non-targeted user is the user that application program limitation uses the application program, is generally underage users or the elderly
User can solve non-targeted user and claim the identity of others fraudulently and demonstrate,proves number or pass through identity using the ID card No. of Software Create
The problem of verification.Implementing this programme embodiment can be effectively prevented because non-targeted user falsely uses fraud by causing after proof of identity
Bad influence and may insure not miss any target user;Meanwhile identifying the entire proof of identity process of age of user
The middle process CIMS for needing user's operation is simple, convenient for the user to operate, substantially increases the experience effect of user.
Referring to Fig. 7, a kind of schematic block diagram of its user authentication device 100 provided for first embodiment of the invention.
As shown in fig. 7, the user authentication device 100 corresponds to user authentication method shown in FIG. 1.The user authentication device 100 includes
For executing the unit of above-mentioned user authentication method, which can be configured in the end for having photographic device
In end equipment.Specifically, which is applied in an application program, in one embodiment, should for user's registration
The user is verified when application program, specifically, whether the age for verifying the user meets the default age of the application program.
Specifically, referring to Fig. 7, the user authentication device 100 is sentenced including the first judging unit 101, first acquisition unit 102, second
Disconnected unit 103 and the first judging unit 104.
If first judging unit 101 is used to receive the ID card No. of user's input, judged according to preset rules
Whether the ID card No. that user is inputted is qualified.
In one embodiment, as shown in figure 8, the first judging unit 101 includes: identity card judging unit 101a, identity card
Age acquiring unit 101b, regular judging unit 101c, first determine that subelement 101d and second determines subelement 101e.Its
Middle identity card judging unit 101a, for judging whether the ID card No. that user is inputted meets ID card No. layout rule
Then;Identity card age acquiring unit 101b, if meeting ID card No. rules of arrangement for the ID card No., described in acquisition
User identity in ID card No. demonstrate,proves the age;Regular judging unit 101c, for whether judging the user identity card age
Meet default age rule;First determines subelement 101d, if determining the identification card number for meeting default age rule
Code is qualified;And second determine subelement 101e, if for the ID card No. do not meet ID card No. rules of arrangement or
Person is unsatisfactory for default age rule, then determines that the ID card No. is unqualified.
Wherein, in one embodiment, the rule judging unit 101c is specifically used for judging the user identity card age
Whether belong within preset target age range;If being also used to the user identity card age belongs to preset target age model
Within enclosing, determine that the user identity card age meets default age rule;And if not for the user identity card age
Belong within preset target age range, determines that the user identity card age is unsatisfactory for default age rule.
In another embodiment, the rule judging unit 101c is for judging whether the user identity card age meets
Default age rule specifically includes: for judging whether the user identity card age is greater than the default age.In other embodiments
In, the rule judging unit 101c is for judging whether the user identity card age meets the default specific packet of age rule
It includes: for judging whether the user identity card age is less than the default age.
If the first acquisition unit 102 is qualified for the ID card No., by calling the photographic device to obtain
The face image of the user, and the user is obtained according to acquired face image and preset face character recognizer
Face's attribute information and save, wherein face's attribute information includes age attribute information, the age attribute packet
Include the identification age of user.
In one embodiment, as shown in fig. 7, first acquisition unit 102 includes: the first acquisition subelement 102a and first
Storage unit 102b.Wherein first obtain subelement 102a, for based on preset face character recognizer from acquired
Face's attribute information of the user is obtained in face image;And the first storage unit 102b, for by the face of the user
Subordinate's property information preservation is into a preset relevant database.
The second judgment unit 103 is for judging whether the identification age meets default age rule.
In one embodiment, as shown in figure 9, second judgment unit 103 includes: Age estimation unit 103a, third judgement
Subelement 103b and the 4th determines subelement 103c.Wherein Age estimation unit 103a, for judging that the identification age is
It is no to belong within preset target age range;Third determines subelement 102b, if belonging to for the identification age preset
Within target age range, determine that the identification age meets default age rule;And the 4th determine subelement 102c, be used for
If the identification age is not belonging within preset target age range, determine that the identification age is unsatisfactory for default age rule
Then.
If first judging unit 104 meets default age rule for the identification age, determine that the user passes through
Verifying.
It should be noted that it is apparent to those skilled in the art that, above-mentioned 100 He of user authentication device
The specific implementation process and effect of each unit, can be with reference to the corresponding description in preceding method embodiment, for the side of description
Just and succinctly, details are not described herein.
Referring to Fig. 10, a kind of schematic block diagram of its user authentication device 200 provided for second embodiment of the invention.
As shown in figure 11, a kind of user authentication device 200 that second embodiment of the invention provides is to increase on the basis of the above embodiments
First information extraction unit 205, the second information extraction unit 206, information comparison unit 207, similarity judging unit 208 are added
And third judging unit 209, i.e. described device 200 includes third judging unit 201, the judgement of second acquisition unit the 202, the 4th
Unit 203, the second judging unit 204, first information extraction unit 205, the second information extraction unit 206, information comparison unit
207, similarity judging unit 208, third judging unit 209.Wherein, the third judging unit 201, second acquisition unit 202,
4th judging unit 203 and the second judging unit 204 obtain single with the first judging unit 101, first in above-described embodiment
Member 102, second judgment unit 103 and the first judging unit 104 are similar, due to its application process and corresponding function with it is above-mentioned
Corresponding unit is similar in embodiment, and details are not described herein.
If for the identification age to be unsatisfactory for the default age regular for the first information extraction unit 205, according to being obtained
The face image and preset face characteristic extraction algorithm taken obtains face's key point information of the user and saves, wherein
Using face's key point information of the user as the first key point information.
In one embodiment, as shown in Figure 10, first information extraction unit 205 include: the second acquisition subelement 205a with
And the second storage unit 205b.Wherein second subelement 205a is obtained, for being based on preset face characteristic extraction algorithm from institute
Face's key point information of the user is obtained in the face image of acquisition;And the second storage unit 205b, for will be described
Face's key point information of user is saved in a preset relevant database.
Second information extraction unit 206 is used to obtain the identity card picture of the user and by calling face characteristic
Extraction algorithm carries out face characteristic to the identity card picture and extracts to obtain the face key point information of the identity card picture,
Wherein, using the face key point information of the photo as the second key point information.
The information comparison unit 207 is used to close first key point information and second using face alignment algorithm
Key point information is compared to obtain the similarity between the first key point information and the second key point information.
The similarity judging unit 208 is for judging whether the similarity is greater than default similarity.
If the third judging unit 209 is greater than default similarity for the similarity, determine that the user passes through verifying.
It should be noted that it is apparent to those skilled in the art that, above-mentioned apparatus 200 and each unit
Specific implementation process and effect can refer to the corresponding description in preceding method embodiment, for convenience of description and succinctly,
Details are not described herein.
Above-mentioned apparatus can be implemented as a kind of form of computer program, which can be as shown in figure 11
It is run in computer equipment.
Figure 11 is please referred to, is a kind of schematic block diagram of computer equipment provided in an embodiment of the present invention.The computer
Equipment 600 can be the terminal device that smart phone, tablet computer or laptop etc. have photographic device.
Refering to fig. 11, which includes processor 602, memory, the net connected by system bus 601
Network interface 605 and photographic device 606, wherein memory may include non-volatile memory medium 603 and built-in storage 604.
The non-volatile memory medium 603 can storage program area 6031 and computer program 6032.The computer program
6032 include program instruction, which is performed, and processor 602 may make to execute a kind of user authentication method.
The processor 602 is for providing calculating and control ability, to support the operation of entire computer equipment 600.
The built-in storage 604 provides environment for the operation of the computer program 6032 in non-volatile memory medium 603, should
When computer program 6032 is executed by processor 602, processor 602 may make to execute a kind of user authentication method.
The network interface 605 is used to carry out network communication with other equipment.It will be understood by those skilled in the art that in Figure 11
The structure shown, only the block diagram of part-structure relevant to application scheme, does not constitute and is applied to application scheme
The restriction of computer equipment 600 thereon, specific computer equipment 600 may include more more or fewer than as shown in the figure
Component perhaps combines certain components or with different component layouts.
Wherein, the processor 602 is for running computer program 6032 stored in memory, to realize following step
It is rapid: if receiving the ID card No. of user's input, to judge whether the ID card No. that user is inputted closes according to preset rules
Lattice;If the ID card No. is qualified, the face image of the user is obtained by calling the photographic device, and according to being obtained
The face image and preset face character recognizer taken obtains face's attribute information of the user and saves, wherein institute
Stating face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;Judge the knowledge
Whether the other age meets default age rule;If the identification age meets default age rule, determine that the user passes through verifying.
In one embodiment, processor 602 is realizing that described judge whether the identification age meets default age regular
The step of after, specifically also realize following steps: if the identification age, to be unsatisfactory for the default age regular, according to acquired face
Portion's image and preset face characteristic extraction algorithm obtain face's key point information of the user and save, wherein will be described
Face's key point information of user is as the first key point information;Obtain the identity card picture of the user and by calling face
Feature extraction algorithm carries out face characteristic to the identity card picture and extracts to obtain the face key point of the identity card picture
Information, wherein using the face key point information of the photo as the second key point information;Using face alignment algorithm to described
First key point information and the second key point information are compared to obtain the first key point information and the second key point information
Between similarity;Judge whether the similarity is greater than default similarity;And if the similarity is greater than default similarity,
Determine that the user passes through verifying.
In one embodiment, processor 602 is realizing the face image and preset face characteristic according to acquired in
When extraction algorithm obtains face's key point information of the user and the step of preservation, it is implemented as follows step: based on default
Face characteristic extraction algorithm face's key point information of the user is obtained from acquired face image;And it will be described
Face's key point information of user is saved in a preset relevant database.
In one embodiment, processor 602 is realizing the identification card number for judging that according to preset rules, user is inputted
When the whether qualified step of code, it is implemented as follows step: judges whether the ID card No. that user is inputted meets identity card
Number rules of arrangement;If the ID card No. meets ID card No. rules of arrangement, the use in the ID card No. is obtained
The family identity card age;Judge whether the user identity card age meets default age rule;If meeting default age rule,
Determine that the ID card No. is qualified;And if the ID card No. does not meet ID card No. rules of arrangement or is unsatisfactory for
Default age rule, then determine that the ID card No. is unqualified.
In one embodiment, processor 602 described judge that the user identity demonstrate,proves whether the age meets default year realizing
When the step of age rule, it is implemented as follows step: judging whether the user identity card age belongs to preset target age
Within the scope of;If the user identity card age belongs within preset target age range, the user identity card year is determined
Age meets default age rule;And if the user identity card age is not belonging within preset target age range, determines
The user identity card age is unsatisfactory for default age rule.
In one embodiment, processor 602 is realizing the face image and preset face character according to acquired in
When recognizer obtains face's attribute information of the user and the step of preservation, it is implemented as follows step: based on preset
Face character recognizer obtains face's attribute information of the user from acquired face image;And by the user
Face's attribute information be saved in a preset relevant database.
In one embodiment, processor 602 is realizing that described judge whether the identification age meets default age regular
Step when, be implemented as follows step: judging whether the identification age belongs within preset target age range;If institute
It states and identifies that the age belongs within preset target age range, determine that the identification age meets default age rule;And if
The identification age is not belonging within preset target age range, determines that the identification age is unsatisfactory for default age rule.
It should be appreciated that in embodiments of the present invention, processor 602 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable GateArray, FPGA) or other programmable logic devices
Part, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or
The processor is also possible to any conventional processor etc..
Those of ordinary skill in the art will appreciate that be realize above-described embodiment method in all or part of the process,
It is that relevant hardware can be instructed to complete by computer program.The computer program includes program instruction, computer journey
Sequence can be stored in a storage medium, which is storage medium.The program instruction by the computer system at least
One processor executes, to realize the process step of the embodiment of the above method.
Therefore, the present invention also provides a kind of computer readable storage mediums.The computer-readable recording medium storage has meter
Calculation machine program, wherein computer program includes program instruction.The program instruction executes processor when being executed by processor as above
The user authentication method.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), magnetic disk
Or the various storage mediums that can store program code such as CD.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Specially
Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not
It is considered as beyond the scope of this invention.
In several embodiments provided by the present invention, it should be understood that disclosed system and method can pass through it
Its mode is realized.For example, system embodiment described above is only schematical.For example, the division of each unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation.Such as multiple units or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored or not executed.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.This hair
Unit in bright embodiment system can be combined, divided and deleted according to actual needs.In addition, in each implementation of the present invention
Each functional unit in example can integrate in one processing unit, is also possible to each unit and physically exists alone, can also be with
It is that two or more units are integrated in one unit.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product,
It can store in one storage medium.Based on this understanding, technical solution of the present invention is substantially in other words to existing skill
The all or part of part or the technical solution that art contributes can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, terminal or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection scope subject to.
Claims (10)
1. a kind of user authentication method, applied in the terminal device with photographic device, which is characterized in that the method packet
It includes:
If receiving the ID card No. of user's input, judge whether the ID card No. that user is inputted closes according to preset rules
Lattice;
If the ID card No. is qualified, by calling the photographic device to obtain the face image of the user, and according to institute
The face image of acquisition and preset face character recognizer obtain face's attribute information of the user and save, wherein
Face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;
Judge whether the identification age meets default age rule;And
If the identification age meets default age rule, determine that the user passes through verifying.
2. user authentication method according to claim 1, which is characterized in that described to judge whether the identification age meets
After the step of default age rule, further includes:
If the identification age is unsatisfactory for default age rule, extracted according to acquired face image and preset face characteristic
Algorithm obtains face's key point information of the user and saves, wherein using face's key point information of the user as
One key point information;
Obtain the identity card picture of the user and by calling face characteristic extraction algorithm to carry out people to the identity card picture
Face feature extraction is to obtain the face key point information of the identity card picture, wherein believes the face key point of the photo
Breath is used as the second key point information;
First key point information and the second key point information are compared to obtain first using face alignment algorithm
Similarity between key point information and the second key point information;
Judge whether the similarity is greater than default similarity;And
If the similarity is greater than default similarity, determine that the user passes through verifying.
3. user authentication method according to claim 2, which is characterized in that the face image according to acquired in and pre-
If face characteristic extraction algorithm obtain face's key point information of the user and save, comprising:
Face's key point letter of the user is obtained from acquired face image based on preset face characteristic extraction algorithm
Breath;And
Face's key point information of the user is saved in a preset relevant database.
4. user authentication method according to claim 1, which is characterized in that described to judge that user institute is defeated according to preset rules
Whether the ID card No. entered is qualified, comprising:
Judge whether the ID card No. that user is inputted meets ID card No. rules of arrangement;
If the ID card No. meets ID card No. rules of arrangement, the user identity card year in the ID card No. is obtained
Age;
Judge whether the user identity card age meets default age rule;
If meeting default age rule, determine that the ID card No. is qualified;And
If the ID card No. does not meet ID card No. rules of arrangement or is unsatisfactory for default age rule, described in judgement
ID card No. is unqualified.
5. user authentication method according to claim 4, which is characterized in that described to judge that the user identity card age is
It is no to meet default age rule, comprising:
Judge whether the user identity card age belongs within preset target age range;
If the user identity card age belongs within preset target age range, determine that the user identity card age meets
Default age rule;And
If the user identity card age is not belonging within preset target age range, the user identity card age is determined not
Meet default age rule.
6. user authentication method according to claim 1, which is characterized in that the face image according to acquired in and pre-
If face character recognizer obtain face's attribute information of the user and save, comprising:
Face's attribute information of the user is obtained from acquired face image based on preset face character recognizer;
And
Face's attribute information of the user is saved in a preset relevant database.
7. user authentication method according to claim 1, which is characterized in that described to judge whether the identification age meets
Default age rule, comprising:
Judge whether the identification age belongs within preset target age range;
If the identification age belongs within preset target age range, determine that the identification age meets default age rule
Then;And
If the identification age is not belonging within preset target age range, determine that the identification age is unsatisfactory for the default age
Rule.
8. a kind of user authentication device, applied in the terminal device with photographic device characterized by comprising
First judging unit, if the ID card No. for receiving user's input, judges that user is inputted according to preset rules
ID card No. it is whether qualified;
First acquisition unit, if qualified for the ID card No., by calling the photographic device to obtain the user's
Face image, and obtain according to acquired face image and preset face character recognizer face's attribute of the user
Information simultaneously saves, wherein face's attribute information includes age attribute information, and the age attribute information includes the knowledge of user
The other age;
Second judgment unit, for judging whether the identification age meets default age rule;And
First judging unit determines that the user passes through verifying if meeting default age rule for the identification age.
9. a kind of computer equipment, which is characterized in that the computer equipment includes memory and processor, on the memory
It is stored with computer program, the processor is realized as described in any one of claim 1-7 when executing the computer program
User authentication method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program can be realized when being executed by a processor such as user's checking side of any of claims 1-7
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910192559.1A CN110096859A (en) | 2019-03-14 | 2019-03-14 | User authentication method, device, computer equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910192559.1A CN110096859A (en) | 2019-03-14 | 2019-03-14 | User authentication method, device, computer equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110096859A true CN110096859A (en) | 2019-08-06 |
Family
ID=67443164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910192559.1A Pending CN110096859A (en) | 2019-03-14 | 2019-03-14 | User authentication method, device, computer equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110096859A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414569A (en) * | 2020-02-18 | 2020-07-14 | 北京网聘咨询有限公司 | Efficient access control method for network recruitment search technology |
CN111460484A (en) * | 2020-04-20 | 2020-07-28 | 深圳市云智融科技有限公司 | Information encryption method, information encryption device and computer readable storage medium |
CN112416985A (en) * | 2020-11-17 | 2021-02-26 | 用友网络科技股份有限公司 | Information identification method and device and readable storage medium |
CN112562202A (en) * | 2020-11-30 | 2021-03-26 | 中国银行股份有限公司 | Rental method and device for shared bicycle, storage medium and electronic equipment |
CN113225327A (en) * | 2021-04-29 | 2021-08-06 | 心动网络股份有限公司 | Login client supervision method, device, equipment and medium based on voice recognition |
CN113987442A (en) * | 2021-11-01 | 2022-01-28 | 郑州云智信安安全技术有限公司 | Citizen real identity authentication method and system based on personal privacy protection |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140099029A1 (en) * | 2012-10-05 | 2014-04-10 | Carnegie Mellon University | Face Age-Estimation and Methods, Systems, and Software Therefor |
CN107424267A (en) * | 2017-07-27 | 2017-12-01 | 兰州集智信息技术有限公司 | It is a kind of to prevent that children from riding the method for shared bicycle |
CN107808087A (en) * | 2017-11-08 | 2018-03-16 | 广东小天才科技有限公司 | Unlocking method and device of electronic equipment |
CN108171832A (en) * | 2017-12-22 | 2018-06-15 | 维沃移动通信有限公司 | A kind of method for unlocking and mobile terminal of shared bicycle |
-
2019
- 2019-03-14 CN CN201910192559.1A patent/CN110096859A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140099029A1 (en) * | 2012-10-05 | 2014-04-10 | Carnegie Mellon University | Face Age-Estimation and Methods, Systems, and Software Therefor |
CN107424267A (en) * | 2017-07-27 | 2017-12-01 | 兰州集智信息技术有限公司 | It is a kind of to prevent that children from riding the method for shared bicycle |
CN107808087A (en) * | 2017-11-08 | 2018-03-16 | 广东小天才科技有限公司 | Unlocking method and device of electronic equipment |
CN108171832A (en) * | 2017-12-22 | 2018-06-15 | 维沃移动通信有限公司 | A kind of method for unlocking and mobile terminal of shared bicycle |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414569A (en) * | 2020-02-18 | 2020-07-14 | 北京网聘咨询有限公司 | Efficient access control method for network recruitment search technology |
CN111460484A (en) * | 2020-04-20 | 2020-07-28 | 深圳市云智融科技有限公司 | Information encryption method, information encryption device and computer readable storage medium |
CN112416985A (en) * | 2020-11-17 | 2021-02-26 | 用友网络科技股份有限公司 | Information identification method and device and readable storage medium |
CN112562202A (en) * | 2020-11-30 | 2021-03-26 | 中国银行股份有限公司 | Rental method and device for shared bicycle, storage medium and electronic equipment |
CN113225327A (en) * | 2021-04-29 | 2021-08-06 | 心动网络股份有限公司 | Login client supervision method, device, equipment and medium based on voice recognition |
CN113987442A (en) * | 2021-11-01 | 2022-01-28 | 郑州云智信安安全技术有限公司 | Citizen real identity authentication method and system based on personal privacy protection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110096859A (en) | User authentication method, device, computer equipment and computer readable storage medium | |
CN113283883B (en) | Service realization method and device | |
CN107103218B (en) | Service implementation method and device | |
CN108932456B (en) | Face recognition method, device and system and storage medium | |
CN107515890A (en) | A kind of method and terminal for identifying resident point | |
WO2014050281A1 (en) | Method for updating personal authentication dictionary, device for updating personal authentication dictionary, recording medium, and personal authentication system | |
CN110311891B (en) | Account management method and device, computer equipment and storage medium | |
US10997609B1 (en) | Biometric based user identity verification | |
CN110322317A (en) | A kind of transaction data processing method, device, electronic equipment and medium | |
JP6265456B1 (en) | Virtual currency trading system, virtual currency trading apparatus, and virtual currency trading program | |
CN110097170A (en) | Information pushes object prediction model acquisition methods, terminal and storage medium | |
CN110070431A (en) | User is counter to cheat implementation method, device, computer equipment and storage medium | |
CN109902471A (en) | Detection method, device, computer equipment and the storage medium of sliding block verifying | |
CN111860101A (en) | Training method and device for face key point detection model | |
CN105893813A (en) | Biometric Information Registration Apparatus And Biometric Information Registration Method | |
CN109274639A (en) | The recognition methods of open platform abnormal data access and device | |
CN109145720A (en) | A kind of face identification method and device | |
CN109816543B (en) | Image searching method and device | |
CN110288488A (en) | Medical insurance Fraud Prediction method, apparatus, equipment and readable storage medium storing program for executing | |
CN113705792A (en) | Personalized recommendation method, device, equipment and medium based on deep learning model | |
US20230410222A1 (en) | Information processing apparatus, control method, and program | |
CN110427923A (en) | Infantile vomiting milk Activity recognition method, apparatus, computer equipment and storage medium | |
CN115222427A (en) | Artificial intelligence-based fraud risk identification method and related equipment | |
CN111144899B (en) | Method and device for identifying false transaction and electronic equipment | |
CN113032524A (en) | Trademark infringement identification method, terminal device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190806 |