CN110096859A - User authentication method, device, computer equipment and computer readable storage medium - Google Patents

User authentication method, device, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN110096859A
CN110096859A CN201910192559.1A CN201910192559A CN110096859A CN 110096859 A CN110096859 A CN 110096859A CN 201910192559 A CN201910192559 A CN 201910192559A CN 110096859 A CN110096859 A CN 110096859A
Authority
CN
China
Prior art keywords
user
age
face
card
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910192559.1A
Other languages
Chinese (zh)
Inventor
姬小玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910192559.1A priority Critical patent/CN110096859A/en
Publication of CN110096859A publication Critical patent/CN110096859A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses user authentication method, device, equipment and computer readable storage mediums to judge whether the ID card No. that user is inputted is qualified according to preset rules if method includes: to receive the ID card No. of user's input;If qualified, by calling the photographic device to obtain the face image of the user, and face's attribute information of the user is obtained according to acquired face image and preset face character recognizer and is saved, wherein, face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;Judge whether the identification age meets default age rule;If the identification age meets default age rule, determine that the user passes through verifying.Verifying age of user can be quickly identified by implementing this programme, effectively improve the verification efficiency of age of user, and the process CIMS that user needs to operate during the entire process of identification verifying age of user is simple, it is convenient for the user to operate.

Description

User authentication method, device, computer equipment and computer readable storage medium
Technical field
The present invention relates to field of computer technology more particularly to a kind of user authentication method, device, computer equipment and meters Calculation machine readable storage medium storing program for executing.
Background technique
With the fast development of computer technology and Internet information technique, the terminal devices such as computer, smart phone It is widely used, miscellaneous application program (Application, app) also occurs, may be, for example, game class App, life kind app, social category app and audio-visual class app etc..Currently, much needing to limit the use year of user using app Age, such as shared bicycle app forbid 12 years old children below to use shared bicycle service;Such as net is borrowed the financial class such as app and is answered With software need to limit user use the age, with prevent minor using net borrow app provided a loan but impotentia repay should The corresponding interest of loan and loan and lead to the higher problem of risk, therefore much need to limit the answering using the age of user Should have the function of identification identification age of user, with program to realize the mesh for limiting non-targeted user and using the application program 's.However, existing identification identification age of user is mainly to verify age of user by ID card No. that user is actively entered, But if the application program is the inputted ID card No. format of simple verification, then user can be by falsely using others ID card No. generates corresponding ID card No. using the tool for automatically generating ID card No. by verification, that is, to use Family, which can use the ID card No. of fraud or claim the identity of others fraudulently, demonstrate,proves number to escape application program identification identification user year The function in age, if but the application program call directly real-name authentication system to verify age of user, then can considerably increase this The cost of application program is unfavorable for the popularization and application of the application program.
Summary of the invention
The embodiment of the invention provides a kind of user authentication method, device, computer equipment and computer-readable storage mediums Matter verifies age of user, the process ratio that user needs to operate during the entire process of identification verifying age of user convenient for quickly identification It is relatively simple, it is convenient for the user to operate, substantially increase the experience effect of user.
In a first aspect, the embodiment of the invention provides a kind of user authentication methods comprising:
If receiving the ID card No. of user's input, it is according to the ID card No. that preset rules judge that user is inputted No qualification;
If the ID card No. is qualified, by calling the photographic device to obtain the face image of the user, and root Face's attribute information of the user is obtained according to acquired face image and preset face character recognizer and is saved, In, face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;
Judge whether the identification age meets default age rule;
If the identification age meets default age rule, determine that the user passes through verifying.
Second aspect, the embodiment of the invention also provides a kind of user authentication devices comprising:
First judging unit, if the ID card No. for receiving user's input, judges user institute according to preset rules Whether the ID card No. of input is qualified;
First acquisition unit, if qualified for the ID card No., by calling the photographic device to obtain the use The face image at family, and obtain according to acquired face image and preset face character recognizer the face of the user Attribute information simultaneously saves, wherein face's attribute information includes age attribute information, and the age attribute information includes user The identification age;
Second judgment unit, for judging whether the identification age meets default age rule;And
First judging unit determines that the user passes through verifying if meeting default age rule for the identification age.
The third aspect, the embodiment of the invention also provides a kind of computer equipment, the computer equipment includes memory And processor, computer program is stored on the memory, the processor is realized above-mentioned when executing the computer program The method of first aspect.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium Storage media is stored with computer program, and the computer program includes program instruction, and described program instruction, which is worked as, to be executed by processor When can realize above-mentioned first aspect method.
The embodiment of the invention provides a kind of user authentication method, device, computer equipment and computer-readable storage mediums Matter.The embodiment of the present invention can help the application program for needing to limit age of user effectively to identify non-targeted user, the non-mesh Marking user is the user that application program limitation uses the application program, is generally underage users or the elderly user, It can solve non-targeted user and claim the identity of others fraudulently and demonstrate,prove number or pass through proof of identity using the ID card No. of Software Create The problem of.This programme was identified using face character and is calculated using identity card and the age of face character recognizer verification user Method identifies that the accuracy rate of age of user is higher.Implementation this programme embodiment can be effectively prevented leads to because non-targeted user falsely uses fraud It crosses caused bad influence after proof of identity and may insure not miss any target user;Meanwhile identifying age of user Need the process CIMS of user's operation simple during entire proof of identity, it is convenient for the user to operate, substantially increase the body of user Test effect.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram for user authentication method that first embodiment of the invention provides;
Fig. 2 is an a kind of sub-process schematic diagram of user authentication method that first embodiment of the invention provides;
Fig. 3 is a kind of another sub-process schematic diagram for user authentication method that first embodiment of the invention provides;
Fig. 4 is a kind of another sub-process schematic diagram for user authentication method that first embodiment of the invention provides;
Fig. 5 is a kind of flow diagram for user authentication method that second embodiment of the invention provides;
Fig. 6 is an a kind of sub-process schematic diagram of user authentication method that second embodiment of the invention provides;
Fig. 7 is a kind of schematic block diagram for user authentication device that first embodiment of the invention provides;
Fig. 8 is a kind of schematic frame of the first judging unit of user authentication device that first embodiment of the invention provides Figure;
Fig. 9 is a kind of schematic frame of the second judgment unit for user authentication device that first embodiment of the invention provides Figure;
Figure 10 is a kind of schematic block diagram for user authentication device that second embodiment of the invention provides;And
Figure 11 is a kind of schematic block diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
Referring to Fig. 1, a kind of schematic flow chart of its user authentication method provided for first embodiment of the invention.It should User authentication method, which may operate in, to be had in the terminal device of photographic device, wherein terminal device can be smart phone, put down The electronic equipments such as plate computer or laptop.Specifically, which is applied in an application program, implements one In example, for verifying the user when user's registration application program, specifically, whether the age for verifying the user meets this The default age of application program.As shown in Figure 1, this method may include step S101 to S104.
If S101, the ID card No. for receiving user's input, judge the identity card that user is inputted according to preset rules Whether number is qualified.
Specifically, in one embodiment, described to judge whether the ID card No. that user is inputted closes according to preset rules Lattice include identity card method of calibration.The identity card method of calibration, as shown in Fig. 2, i.e. step S101 include sub-step S101a extremely S101e.Wherein, S101a, judge whether the ID card No. that user is inputted meets ID card No. rules of arrangement;S101b, If the ID card No. meets ID card No. rules of arrangement, the user identity card age in the ID card No. is obtained; S101c, judge whether the user identity card age meets default age rule;If S101d, meeting default age rule, Determine that the ID card No. is qualified;If S101e, the ID card No. do not meet ID card No. rules of arrangement or discontented The default age rule of foot, then determine that the ID card No. is unqualified.
Wherein, in one embodiment, the ID card No. rules of arrangement is the rules of arrangement that user identity demonstrate,proves number, tool Body, the ID card No. of user is feature combinational code, totally 18 bit digital, is verified by 17 bit digital ontology codes and 1 bit digital Code composition, wherein the rules of arrangement that user identity demonstrate,proves number is from left to right successively are as follows: 6 bit digital address codes, 8 bit digitals go out Raw date code, 3 bit digital sequence codes and 1 bit digital check code.Wherein, check code is according to 17 digit numeric code of front, according to phase The check code for answering check code rule to calculate.Therefore, it can be inputted according to ID card No. rules of arrangement to verify user Identity card format it is whether correct.Verify the ID card No. that the user is inputted with whether meeting 6 bit digitals from left to right Location code, 8 bit digital dates of birth code, rules of arrangement as 3 bit digital sequence codes and 1 bit digital check code, and it is last Whether one-bit digital check code is to be got according to 17 digit numeric code of front according to the calculating of corresponding check code rule.
Wherein, in one embodiment, the step S101c judges whether the user identity card age meets the default age Rule specifically includes step A~C:
Step A, judge whether the user identity card age belongs within preset target age range;
If step B, the described user identity card age belongs within preset target age range, the user identity is determined Demonstrate,prove the default age rule of age satisfaction;And
If step C, the described user identity card age is not belonging within preset target age range, user's body is determined Part card age is unsatisfactory for default age rule.
Wherein, the target age range can be by user according to the demand of the practical application scene of the age method of calibration Customized setting is carried out in advance, for example, if according to the demand of the practical application scene of the age method of calibration by the target The range of age is set as between 12 years old to 60 years old, then the age method of calibration is the use by the range of age between 12 years old to 60 years old Family is considered as target user, and the user not between 12 years old to 60 years old is considered as non-targeted user, i.e. judgement the range of age was at 12 years old The user identity card age between by 60 years old meets default age rule, determines the user identity less than 12 years old and greater than 60 years old The card age is unsatisfactory for default age rule.
In another embodiment, the step S101c judges whether the user identity card age meets default age rule It then specifically includes: judging whether the user identity card age is greater than the default age.In other embodiments, the step S101c judges whether the user identity card age meets default age rule and specifically include: judging the user identity card year Whether age is less than the default age.Wherein, the default age can be by user according to the practical application field of the age method of calibration The demand of scape carries out customized setting in advance, and the default age is a specific age value.Such as the default age is 18 Year or 60 years old.
Therefore, in above-mentioned steps S101 it is whether the format of ID card No. that first verification user is inputted meets identity Rules of arrangement is demonstrate,proved, and then judges whether the identity card age of acquired user meets default age rule again, that is, judges the use Whether the identity card age at family is within preset target age range, or judges whether the identity card age of the user is big In or less than a specific age value, and then judge whether the ID card No. for determining that the user is inputted is qualified.
If S102, the ID card No. are qualified, by calling the photographic device to obtain the face image of the user, And face's attribute information of the user is obtained according to acquired face image and preset face character recognizer and is protected It deposits, wherein face's attribute information includes age attribute information, and the age attribute information includes the identification age of user.
Specifically, in one embodiment, the face image according to acquired in and preset face character recognizer Obtaining face's attribute information of the user and saving includes face's attribute information acquiring method.The attribute information acquisition side, face Method, as shown in figure 3, i.e. step S102 includes sub-step S102a to S102b.Wherein, S102a, based on preset face character know Other algorithm obtains face's attribute information of the user from acquired face image;And S102b, by the face of the user Subordinate's property information preservation is into a preset relevant database.
Wherein, face character identification (Face Attribute) algorithm be the gender for going out face for identification, the age, The algorithm of the attribute values such as posture, expression, i.e., by calling the face character to identify that the identification of (Face Attribute) algorithm is used Face's attribute information of the available user of the face image at family, face's attribute information is in addition to the age attribute including user Information further includes gender attribute information, the posture attribute information, expression attribute information of user.Specifically, the face character is known The input variable x1 of other algorithm is generally " user's face image " and analyzes the " face five that user's face image obtains Official's key point coordinate ", output valve y1 are the corresponding attribute value of face.Wherein, face character recognizer generally can be according to people Face is aligned by face face key point coordinate, i.e., by the face image of the user after rotation, the operation such as scaling, taking off, by people Face is adjusted to scheduled size and form, and then carries out attributive analysis again.In addition, in the present embodiment, by output valve y1, that is, people The corresponding attribute value of face is saved in a relevant database, and reading data are more convenient quick from relevant database, and The data being stored in relevant database are also relatively safer.
It in one embodiment, is all one independent when each attribute of the face character recognizer identification face The identification of process, i.e. face character is only to the general designation of a kind of algorithm, wherein gender identification, age estimation, Attitude estimation, expression Identification is all independent from each other algorithm, i.e., for the face character recognizer of gender identification and the face category for age estimation Property recognizer be different recognizers, therefore, can use and identified for the face character recognizer of age estimation The age attribute information of user, wherein the age attribute information includes identification age and the ID number of user of user.Another In one embodiment, the face character recognizer can be the face character recognizer based on deep learning, which can It, therefore, can be with to realize the output of gender, posture, the attribute values such as expression while the age attribute value output for realizing user Using the age attribute information and gender attribute information for identifying user based on the face character recognizer of deep learning, In, the age attribute information includes identification age and the ID number of user of user.
S103, judge whether the identification age meets default age rule.
Specifically, in one embodiment, described to judge whether the identification age meets default age rule and include identification Age estimation method.The identification Age estimation method, as shown in figure 4, i.e. step S103 includes sub-step S103a to S103c.Its In, S103a, judge whether the identification age belongs within preset target age range;If S103c, the identification age Belong within preset target age range, determines that the identification age meets default age rule;And if S103d, described The identification age is not belonging within preset target age range, determines that the identification age is unsatisfactory for default age rule.
Specifically, face's attribute information of the user includes the age attribute information of user, specifically, according to being identified Face's attribute information of obtained user it can be seen that the user age attribute information, and then can be belonged to according to the age of user Property information determine the identification age of the user, and then judge whether the identification age of the user meets default age rule, wherein In the present embodiment, the target age range can be by user according to the demand of the practical application scene of the age method of calibration Customized setting is carried out in advance.In the present embodiment, which is a specific age value range, may be, for example, 13 - 65 years old years then determined that the identification age of the user was unsatisfactory for default age rule that is, when the identification age of user is 12 years old; Or when user identifies that the age is 70 years old, equally determine that the identification age of the user is unsatisfactory for default age rule;Work as user The identification age between 13 years old to 65 years old when determine that the identification age of the user meets default age rule.
In another embodiment, the default age rule may be, for example, to be greater than the default age at the identification age of the user Or the identification age of the user is less than the default age, wherein the default age be application program developer according to The demand of the practical application scene of application carries out customized setting in advance, and in the present embodiment, which is one specific Age value, i.e., when the identification age of user is greater than the default age or then determines that the identification age of the user is full less than the default age The default age rule of foot.
If S104, the identification age meet default age rule, determine that the user passes through verifying.
Specifically, in one embodiment, the identification age for obtaining the user is identified using face character recognizer, in turn Whether the identification age for verifying the user again, which meets default age rule, then illustrates the user when meeting default age rule The identification age meet registration age of application program, determine that the user passes through age verification, wherein identify using face character Algorithm identifies that the accuracy rate of age of user is higher.
In the above-described embodiments, this programme is by utilizing identity card and face character recognizer twin check user Age, wherein the accuracy rate using face character recognizer identification age of user is higher.The embodiment of the present invention can help to need The application program for limiting age of user effectively identifies non-targeted user, which is that application program limitation uses The user of the application program is generally underage users or the elderly user, can solve non-targeted user and falsely uses other people ID card No. or the problem of pass through proof of identity using the ID card No. of Software Create.Implementing this programme embodiment can be with It effectively prevent falsely using fraud because of non-targeted user by bad influence caused by after proof of identity and may insure not miss and appoint What target user;Meanwhile identifying that the entire proof of identity of age of user needs the process CIMS of user's operation simple in the process, just In user's operation, the experience effect of user is substantially increased.
Referring to Fig. 5, a kind of flow diagram of its user authentication method provided for second embodiment of the invention.Specifically Ground, the user authentication method are applied in an application program.As shown in figure 5, this method may include step S201-S209.Wherein Step S201-S204 is similar with the step S101-S104 in above-described embodiment, and details are not described herein.The following detailed description of this reality Apply in example increase step S205- step S209.
If S205, the identification age are unsatisfactory for default age rule, according to acquired face image and preset people Face feature extraction algorithm obtains face's key point information of the user and saves, wherein by face's key point of the user Information is as the first key point information.
Specifically, in one embodiment, the face image and preset face characteristic extraction algorithm according to acquired in Obtaining face's key point information of the user and saving includes face's key point information acquisition methods.Face's key point information Acquisition methods, as shown in fig. 6, i.e. step S205 includes sub-step S205a to S205b.Wherein, S205a, be based on preset face Feature extraction algorithm obtains face's key point information of the user from acquired face image;And S205b, will be described Face's key point information of user is saved in a preset relevant database.
Wherein, face's key point of the user includes eyes, ear, nose, mouth, eyebrow, the facial contour of user Etc. key points.Face's key point information is that the face characteristic extraction algorithm analyzes face's key point of the user in turn The information being calculated is extracted, and is saved in the face's key point information obtained is extracted in a relevant database.Wherein, The face, which mentions feature (Face Feature Extraction) algorithm, to be consolidated for converting a string for " facial image " The algorithm of the numerical value of measured length, wherein the numerical value for a string of regular lengths being transformed is known as " face characteristic (Face Feature) ", for characterizing the face feature of user, wherein the input variable x2 of the face characteristic extraction algorithm is generally For " facial image " and analyze " human face five-sense-organ key point coordinate " that the facial image obtains, output valve y2 be for State the numerical value of a string of regular lengths of the face feature of user.Specifically, the face characteristic extraction algorithm is according to face five Face is aligned by official's key point coordinate according to preassigned pattern, and then calculates feature.In one embodiment, the face characteristic extracts Algorithm is the face characteristic extraction algorithm based on deep learning, and face mentions that characteristic model is smaller, and extracts the speed for calculating feature Degree is very fast.In addition, in the present embodiment, face's key point information of the user is saved in a relationship type by output valve y2 In database, it is more convenient quick that data are read from relevant database, and be stored in the data in relevant database Compare safety.
S206, the identity card picture for obtaining the user simultaneously shine the identity card by calling face characteristic extraction algorithm Piece carries out face characteristic and extracts to obtain the face key point information of the identity card picture, wherein by the face of the photo Key point information is as the second key point information.
Specifically, the mode of the identity card picture for obtaining the user includes that camera shooting is imported or started from user's photograph album Head shooting obtains.Wherein, described that the identity card picture is carried out proposing characteristic processing to obtain using face characteristic extraction algorithm The step of face's key point information of the identity card picture, realizes that process and realization principle are similar with above-mentioned steps 205, herein It repeats no more.
S207, using face alignment algorithm to first key point information and the second key point information be compared with Obtain the similarity between the first key point information and the second key point information.
Specifically, face alignment (Face Compare) algorithm is the calculation for measuring similarity between two faces Method, the input variable x3 of the face alignment algorithm are two face characteristic informations, in the present embodiment, i.e. input variable x3 For first face key point information and second face's key point information, wherein first face key point information And second face's key point information acquired by above-mentioned steps S205 and S206 using face characteristic extraction algorithm, it is defeated Value y3 is the similarity between two face characteristic informations out, i.e., closes first face key point information and the second face The similarity that key point information obtains after being compared.
S208, judge whether the similarity is greater than default similarity.
Specifically, in one embodiment, the default similarity can be made by oneself according to the practical application request of user Justice setting, for example, this can be preset to similarity is set as 90%, that is, judges first face key point information and second Whether the similarity that face's key point information obtains after being compared is greater than 90%.
If S209, the similarity are greater than default similarity, determine that the user passes through verifying.
Specifically, the similarity is greater than default similarity and then shows the identity card picture and utilize face recognition technology Obtained face height is similar, is the same user, and then can determine that the user meets the note of this process of authentication Volume requires, and determines that the user passes through verifying;If the similarity is not more than default similarity, determines that the user does not pass through and test Card, at this point, in one embodiment, this can be forbidden not pass through the user's registration of verifying and use the application program;In other implementations In example, or this does not pass through the limitation of user setting one of verifying using mark, and then when the user for not passing through verifying sets After a limitation has been set using indicating and having registered the application program, which can be to the use with limitation using mark Family carries out corresponding permission limitation, for example, can limit the use duration of user for game class app, limits it and uses the time Section;For financial class app, the loan limit etc. of user can be limited.
In the above-described embodiments, this programme passes through using ID card No. and face character recognizer as the first gravidity Part verification, wherein the accuracy rate using face character recognizer identification age of user is higher, when user can not pass through the first weight Proof of identity avoids user from needing to be repeated as many times due to the first weight proof of identity fails then automatically into the second heavy proof of identity What is verified is cumbersome, and can simplify the user's checking process, greatly promotes the experience effect of user, wherein second weight Proof of identity is identity card picture provided by the face identified using face characteristic extraction algorithm to camera and user On face carry out proposing characteristic processing respectively, and then obtain on the first key point information and the photo of identified face Second key point information of face recycles face alignment algorithm to compare first and second key point information to be calculated The similarity of face on identity card picture provided by face that camera is identified and user, can more accurately identify Non-targeted user out, while can also avoid causing target user because being unsatisfactory for because of the identification error of face character recognizer The default age is regular and needs the problem of repeatedly identifying the age using face character recognizer, can effectively reduce target user's Registration step.The embodiment of the present invention can help the application program for needing to limit age of user effectively to identify non-targeted user, The non-targeted user is the user that application program limitation uses the application program, is generally underage users or the elderly User can solve non-targeted user and claim the identity of others fraudulently and demonstrate,proves number or pass through identity using the ID card No. of Software Create The problem of verification.Implementing this programme embodiment can be effectively prevented because non-targeted user falsely uses fraud by causing after proof of identity Bad influence and may insure not miss any target user;Meanwhile identifying the entire proof of identity process of age of user The middle process CIMS for needing user's operation is simple, convenient for the user to operate, substantially increases the experience effect of user.
Referring to Fig. 7, a kind of schematic block diagram of its user authentication device 100 provided for first embodiment of the invention. As shown in fig. 7, the user authentication device 100 corresponds to user authentication method shown in FIG. 1.The user authentication device 100 includes For executing the unit of above-mentioned user authentication method, which can be configured in the end for having photographic device In end equipment.Specifically, which is applied in an application program, in one embodiment, should for user's registration The user is verified when application program, specifically, whether the age for verifying the user meets the default age of the application program. Specifically, referring to Fig. 7, the user authentication device 100 is sentenced including the first judging unit 101, first acquisition unit 102, second Disconnected unit 103 and the first judging unit 104.
If first judging unit 101 is used to receive the ID card No. of user's input, judged according to preset rules Whether the ID card No. that user is inputted is qualified.
In one embodiment, as shown in figure 8, the first judging unit 101 includes: identity card judging unit 101a, identity card Age acquiring unit 101b, regular judging unit 101c, first determine that subelement 101d and second determines subelement 101e.Its Middle identity card judging unit 101a, for judging whether the ID card No. that user is inputted meets ID card No. layout rule Then;Identity card age acquiring unit 101b, if meeting ID card No. rules of arrangement for the ID card No., described in acquisition User identity in ID card No. demonstrate,proves the age;Regular judging unit 101c, for whether judging the user identity card age Meet default age rule;First determines subelement 101d, if determining the identification card number for meeting default age rule Code is qualified;And second determine subelement 101e, if for the ID card No. do not meet ID card No. rules of arrangement or Person is unsatisfactory for default age rule, then determines that the ID card No. is unqualified.
Wherein, in one embodiment, the rule judging unit 101c is specifically used for judging the user identity card age Whether belong within preset target age range;If being also used to the user identity card age belongs to preset target age model Within enclosing, determine that the user identity card age meets default age rule;And if not for the user identity card age Belong within preset target age range, determines that the user identity card age is unsatisfactory for default age rule.
In another embodiment, the rule judging unit 101c is for judging whether the user identity card age meets Default age rule specifically includes: for judging whether the user identity card age is greater than the default age.In other embodiments In, the rule judging unit 101c is for judging whether the user identity card age meets the default specific packet of age rule It includes: for judging whether the user identity card age is less than the default age.
If the first acquisition unit 102 is qualified for the ID card No., by calling the photographic device to obtain The face image of the user, and the user is obtained according to acquired face image and preset face character recognizer Face's attribute information and save, wherein face's attribute information includes age attribute information, the age attribute packet Include the identification age of user.
In one embodiment, as shown in fig. 7, first acquisition unit 102 includes: the first acquisition subelement 102a and first Storage unit 102b.Wherein first obtain subelement 102a, for based on preset face character recognizer from acquired Face's attribute information of the user is obtained in face image;And the first storage unit 102b, for by the face of the user Subordinate's property information preservation is into a preset relevant database.
The second judgment unit 103 is for judging whether the identification age meets default age rule.
In one embodiment, as shown in figure 9, second judgment unit 103 includes: Age estimation unit 103a, third judgement Subelement 103b and the 4th determines subelement 103c.Wherein Age estimation unit 103a, for judging that the identification age is It is no to belong within preset target age range;Third determines subelement 102b, if belonging to for the identification age preset Within target age range, determine that the identification age meets default age rule;And the 4th determine subelement 102c, be used for If the identification age is not belonging within preset target age range, determine that the identification age is unsatisfactory for default age rule Then.
If first judging unit 104 meets default age rule for the identification age, determine that the user passes through Verifying.
It should be noted that it is apparent to those skilled in the art that, above-mentioned 100 He of user authentication device The specific implementation process and effect of each unit, can be with reference to the corresponding description in preceding method embodiment, for the side of description Just and succinctly, details are not described herein.
Referring to Fig. 10, a kind of schematic block diagram of its user authentication device 200 provided for second embodiment of the invention. As shown in figure 11, a kind of user authentication device 200 that second embodiment of the invention provides is to increase on the basis of the above embodiments First information extraction unit 205, the second information extraction unit 206, information comparison unit 207, similarity judging unit 208 are added And third judging unit 209, i.e. described device 200 includes third judging unit 201, the judgement of second acquisition unit the 202, the 4th Unit 203, the second judging unit 204, first information extraction unit 205, the second information extraction unit 206, information comparison unit 207, similarity judging unit 208, third judging unit 209.Wherein, the third judging unit 201, second acquisition unit 202, 4th judging unit 203 and the second judging unit 204 obtain single with the first judging unit 101, first in above-described embodiment Member 102, second judgment unit 103 and the first judging unit 104 are similar, due to its application process and corresponding function with it is above-mentioned Corresponding unit is similar in embodiment, and details are not described herein.
If for the identification age to be unsatisfactory for the default age regular for the first information extraction unit 205, according to being obtained The face image and preset face characteristic extraction algorithm taken obtains face's key point information of the user and saves, wherein Using face's key point information of the user as the first key point information.
In one embodiment, as shown in Figure 10, first information extraction unit 205 include: the second acquisition subelement 205a with And the second storage unit 205b.Wherein second subelement 205a is obtained, for being based on preset face characteristic extraction algorithm from institute Face's key point information of the user is obtained in the face image of acquisition;And the second storage unit 205b, for will be described Face's key point information of user is saved in a preset relevant database.
Second information extraction unit 206 is used to obtain the identity card picture of the user and by calling face characteristic Extraction algorithm carries out face characteristic to the identity card picture and extracts to obtain the face key point information of the identity card picture, Wherein, using the face key point information of the photo as the second key point information.
The information comparison unit 207 is used to close first key point information and second using face alignment algorithm Key point information is compared to obtain the similarity between the first key point information and the second key point information.
The similarity judging unit 208 is for judging whether the similarity is greater than default similarity.
If the third judging unit 209 is greater than default similarity for the similarity, determine that the user passes through verifying.
It should be noted that it is apparent to those skilled in the art that, above-mentioned apparatus 200 and each unit Specific implementation process and effect can refer to the corresponding description in preceding method embodiment, for convenience of description and succinctly, Details are not described herein.
Above-mentioned apparatus can be implemented as a kind of form of computer program, which can be as shown in figure 11 It is run in computer equipment.
Figure 11 is please referred to, is a kind of schematic block diagram of computer equipment provided in an embodiment of the present invention.The computer Equipment 600 can be the terminal device that smart phone, tablet computer or laptop etc. have photographic device.
Refering to fig. 11, which includes processor 602, memory, the net connected by system bus 601 Network interface 605 and photographic device 606, wherein memory may include non-volatile memory medium 603 and built-in storage 604.
The non-volatile memory medium 603 can storage program area 6031 and computer program 6032.The computer program 6032 include program instruction, which is performed, and processor 602 may make to execute a kind of user authentication method.
The processor 602 is for providing calculating and control ability, to support the operation of entire computer equipment 600.
The built-in storage 604 provides environment for the operation of the computer program 6032 in non-volatile memory medium 603, should When computer program 6032 is executed by processor 602, processor 602 may make to execute a kind of user authentication method.
The network interface 605 is used to carry out network communication with other equipment.It will be understood by those skilled in the art that in Figure 11 The structure shown, only the block diagram of part-structure relevant to application scheme, does not constitute and is applied to application scheme The restriction of computer equipment 600 thereon, specific computer equipment 600 may include more more or fewer than as shown in the figure Component perhaps combines certain components or with different component layouts.
Wherein, the processor 602 is for running computer program 6032 stored in memory, to realize following step It is rapid: if receiving the ID card No. of user's input, to judge whether the ID card No. that user is inputted closes according to preset rules Lattice;If the ID card No. is qualified, the face image of the user is obtained by calling the photographic device, and according to being obtained The face image and preset face character recognizer taken obtains face's attribute information of the user and saves, wherein institute Stating face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;Judge the knowledge Whether the other age meets default age rule;If the identification age meets default age rule, determine that the user passes through verifying.
In one embodiment, processor 602 is realizing that described judge whether the identification age meets default age regular The step of after, specifically also realize following steps: if the identification age, to be unsatisfactory for the default age regular, according to acquired face Portion's image and preset face characteristic extraction algorithm obtain face's key point information of the user and save, wherein will be described Face's key point information of user is as the first key point information;Obtain the identity card picture of the user and by calling face Feature extraction algorithm carries out face characteristic to the identity card picture and extracts to obtain the face key point of the identity card picture Information, wherein using the face key point information of the photo as the second key point information;Using face alignment algorithm to described First key point information and the second key point information are compared to obtain the first key point information and the second key point information Between similarity;Judge whether the similarity is greater than default similarity;And if the similarity is greater than default similarity, Determine that the user passes through verifying.
In one embodiment, processor 602 is realizing the face image and preset face characteristic according to acquired in When extraction algorithm obtains face's key point information of the user and the step of preservation, it is implemented as follows step: based on default Face characteristic extraction algorithm face's key point information of the user is obtained from acquired face image;And it will be described Face's key point information of user is saved in a preset relevant database.
In one embodiment, processor 602 is realizing the identification card number for judging that according to preset rules, user is inputted When the whether qualified step of code, it is implemented as follows step: judges whether the ID card No. that user is inputted meets identity card Number rules of arrangement;If the ID card No. meets ID card No. rules of arrangement, the use in the ID card No. is obtained The family identity card age;Judge whether the user identity card age meets default age rule;If meeting default age rule, Determine that the ID card No. is qualified;And if the ID card No. does not meet ID card No. rules of arrangement or is unsatisfactory for Default age rule, then determine that the ID card No. is unqualified.
In one embodiment, processor 602 described judge that the user identity demonstrate,proves whether the age meets default year realizing When the step of age rule, it is implemented as follows step: judging whether the user identity card age belongs to preset target age Within the scope of;If the user identity card age belongs within preset target age range, the user identity card year is determined Age meets default age rule;And if the user identity card age is not belonging within preset target age range, determines The user identity card age is unsatisfactory for default age rule.
In one embodiment, processor 602 is realizing the face image and preset face character according to acquired in When recognizer obtains face's attribute information of the user and the step of preservation, it is implemented as follows step: based on preset Face character recognizer obtains face's attribute information of the user from acquired face image;And by the user Face's attribute information be saved in a preset relevant database.
In one embodiment, processor 602 is realizing that described judge whether the identification age meets default age regular Step when, be implemented as follows step: judging whether the identification age belongs within preset target age range;If institute It states and identifies that the age belongs within preset target age range, determine that the identification age meets default age rule;And if The identification age is not belonging within preset target age range, determines that the identification age is unsatisfactory for default age rule.
It should be appreciated that in embodiments of the present invention, processor 602 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable GateArray, FPGA) or other programmable logic devices Part, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or The processor is also possible to any conventional processor etc..
Those of ordinary skill in the art will appreciate that be realize above-described embodiment method in all or part of the process, It is that relevant hardware can be instructed to complete by computer program.The computer program includes program instruction, computer journey Sequence can be stored in a storage medium, which is storage medium.The program instruction by the computer system at least One processor executes, to realize the process step of the embodiment of the above method.
Therefore, the present invention also provides a kind of computer readable storage mediums.The computer-readable recording medium storage has meter Calculation machine program, wherein computer program includes program instruction.The program instruction executes processor when being executed by processor as above The user authentication method.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), magnetic disk Or the various storage mediums that can store program code such as CD.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This A little functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Specially Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not It is considered as beyond the scope of this invention.
In several embodiments provided by the present invention, it should be understood that disclosed system and method can pass through it Its mode is realized.For example, system embodiment described above is only schematical.For example, the division of each unit, only Only a kind of logical function partition, there may be another division manner in actual implementation.Such as multiple units or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.This hair Unit in bright embodiment system can be combined, divided and deleted according to actual needs.In addition, in each implementation of the present invention Each functional unit in example can integrate in one processing unit, is also possible to each unit and physically exists alone, can also be with It is that two or more units are integrated in one unit.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product, It can store in one storage medium.Based on this understanding, technical solution of the present invention is substantially in other words to existing skill The all or part of part or the technical solution that art contributes can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, terminal or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection scope subject to.

Claims (10)

1. a kind of user authentication method, applied in the terminal device with photographic device, which is characterized in that the method packet It includes:
If receiving the ID card No. of user's input, judge whether the ID card No. that user is inputted closes according to preset rules Lattice;
If the ID card No. is qualified, by calling the photographic device to obtain the face image of the user, and according to institute The face image of acquisition and preset face character recognizer obtain face's attribute information of the user and save, wherein Face's attribute information includes age attribute information, and the age attribute information includes the identification age of user;
Judge whether the identification age meets default age rule;And
If the identification age meets default age rule, determine that the user passes through verifying.
2. user authentication method according to claim 1, which is characterized in that described to judge whether the identification age meets After the step of default age rule, further includes:
If the identification age is unsatisfactory for default age rule, extracted according to acquired face image and preset face characteristic Algorithm obtains face's key point information of the user and saves, wherein using face's key point information of the user as One key point information;
Obtain the identity card picture of the user and by calling face characteristic extraction algorithm to carry out people to the identity card picture Face feature extraction is to obtain the face key point information of the identity card picture, wherein believes the face key point of the photo Breath is used as the second key point information;
First key point information and the second key point information are compared to obtain first using face alignment algorithm Similarity between key point information and the second key point information;
Judge whether the similarity is greater than default similarity;And
If the similarity is greater than default similarity, determine that the user passes through verifying.
3. user authentication method according to claim 2, which is characterized in that the face image according to acquired in and pre- If face characteristic extraction algorithm obtain face's key point information of the user and save, comprising:
Face's key point letter of the user is obtained from acquired face image based on preset face characteristic extraction algorithm Breath;And
Face's key point information of the user is saved in a preset relevant database.
4. user authentication method according to claim 1, which is characterized in that described to judge that user institute is defeated according to preset rules Whether the ID card No. entered is qualified, comprising:
Judge whether the ID card No. that user is inputted meets ID card No. rules of arrangement;
If the ID card No. meets ID card No. rules of arrangement, the user identity card year in the ID card No. is obtained Age;
Judge whether the user identity card age meets default age rule;
If meeting default age rule, determine that the ID card No. is qualified;And
If the ID card No. does not meet ID card No. rules of arrangement or is unsatisfactory for default age rule, described in judgement ID card No. is unqualified.
5. user authentication method according to claim 4, which is characterized in that described to judge that the user identity card age is It is no to meet default age rule, comprising:
Judge whether the user identity card age belongs within preset target age range;
If the user identity card age belongs within preset target age range, determine that the user identity card age meets Default age rule;And
If the user identity card age is not belonging within preset target age range, the user identity card age is determined not Meet default age rule.
6. user authentication method according to claim 1, which is characterized in that the face image according to acquired in and pre- If face character recognizer obtain face's attribute information of the user and save, comprising:
Face's attribute information of the user is obtained from acquired face image based on preset face character recognizer; And
Face's attribute information of the user is saved in a preset relevant database.
7. user authentication method according to claim 1, which is characterized in that described to judge whether the identification age meets Default age rule, comprising:
Judge whether the identification age belongs within preset target age range;
If the identification age belongs within preset target age range, determine that the identification age meets default age rule Then;And
If the identification age is not belonging within preset target age range, determine that the identification age is unsatisfactory for the default age Rule.
8. a kind of user authentication device, applied in the terminal device with photographic device characterized by comprising
First judging unit, if the ID card No. for receiving user's input, judges that user is inputted according to preset rules ID card No. it is whether qualified;
First acquisition unit, if qualified for the ID card No., by calling the photographic device to obtain the user's Face image, and obtain according to acquired face image and preset face character recognizer face's attribute of the user Information simultaneously saves, wherein face's attribute information includes age attribute information, and the age attribute information includes the knowledge of user The other age;
Second judgment unit, for judging whether the identification age meets default age rule;And
First judging unit determines that the user passes through verifying if meeting default age rule for the identification age.
9. a kind of computer equipment, which is characterized in that the computer equipment includes memory and processor, on the memory It is stored with computer program, the processor is realized as described in any one of claim 1-7 when executing the computer program User authentication method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program can be realized when being executed by a processor such as user's checking side of any of claims 1-7 Method.
CN201910192559.1A 2019-03-14 2019-03-14 User authentication method, device, computer equipment and computer readable storage medium Pending CN110096859A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910192559.1A CN110096859A (en) 2019-03-14 2019-03-14 User authentication method, device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910192559.1A CN110096859A (en) 2019-03-14 2019-03-14 User authentication method, device, computer equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110096859A true CN110096859A (en) 2019-08-06

Family

ID=67443164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910192559.1A Pending CN110096859A (en) 2019-03-14 2019-03-14 User authentication method, device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110096859A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414569A (en) * 2020-02-18 2020-07-14 北京网聘咨询有限公司 Efficient access control method for network recruitment search technology
CN111460484A (en) * 2020-04-20 2020-07-28 深圳市云智融科技有限公司 Information encryption method, information encryption device and computer readable storage medium
CN112416985A (en) * 2020-11-17 2021-02-26 用友网络科技股份有限公司 Information identification method and device and readable storage medium
CN112562202A (en) * 2020-11-30 2021-03-26 中国银行股份有限公司 Rental method and device for shared bicycle, storage medium and electronic equipment
CN113225327A (en) * 2021-04-29 2021-08-06 心动网络股份有限公司 Login client supervision method, device, equipment and medium based on voice recognition
CN113987442A (en) * 2021-11-01 2022-01-28 郑州云智信安安全技术有限公司 Citizen real identity authentication method and system based on personal privacy protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140099029A1 (en) * 2012-10-05 2014-04-10 Carnegie Mellon University Face Age-Estimation and Methods, Systems, and Software Therefor
CN107424267A (en) * 2017-07-27 2017-12-01 兰州集智信息技术有限公司 It is a kind of to prevent that children from riding the method for shared bicycle
CN107808087A (en) * 2017-11-08 2018-03-16 广东小天才科技有限公司 Unlocking method and device of electronic equipment
CN108171832A (en) * 2017-12-22 2018-06-15 维沃移动通信有限公司 A kind of method for unlocking and mobile terminal of shared bicycle

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140099029A1 (en) * 2012-10-05 2014-04-10 Carnegie Mellon University Face Age-Estimation and Methods, Systems, and Software Therefor
CN107424267A (en) * 2017-07-27 2017-12-01 兰州集智信息技术有限公司 It is a kind of to prevent that children from riding the method for shared bicycle
CN107808087A (en) * 2017-11-08 2018-03-16 广东小天才科技有限公司 Unlocking method and device of electronic equipment
CN108171832A (en) * 2017-12-22 2018-06-15 维沃移动通信有限公司 A kind of method for unlocking and mobile terminal of shared bicycle

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414569A (en) * 2020-02-18 2020-07-14 北京网聘咨询有限公司 Efficient access control method for network recruitment search technology
CN111460484A (en) * 2020-04-20 2020-07-28 深圳市云智融科技有限公司 Information encryption method, information encryption device and computer readable storage medium
CN112416985A (en) * 2020-11-17 2021-02-26 用友网络科技股份有限公司 Information identification method and device and readable storage medium
CN112562202A (en) * 2020-11-30 2021-03-26 中国银行股份有限公司 Rental method and device for shared bicycle, storage medium and electronic equipment
CN113225327A (en) * 2021-04-29 2021-08-06 心动网络股份有限公司 Login client supervision method, device, equipment and medium based on voice recognition
CN113987442A (en) * 2021-11-01 2022-01-28 郑州云智信安安全技术有限公司 Citizen real identity authentication method and system based on personal privacy protection

Similar Documents

Publication Publication Date Title
CN110096859A (en) User authentication method, device, computer equipment and computer readable storage medium
CN113283883B (en) Service realization method and device
CN107103218B (en) Service implementation method and device
CN108932456B (en) Face recognition method, device and system and storage medium
CN107515890A (en) A kind of method and terminal for identifying resident point
WO2014050281A1 (en) Method for updating personal authentication dictionary, device for updating personal authentication dictionary, recording medium, and personal authentication system
CN110311891B (en) Account management method and device, computer equipment and storage medium
US10997609B1 (en) Biometric based user identity verification
CN110322317A (en) A kind of transaction data processing method, device, electronic equipment and medium
JP6265456B1 (en) Virtual currency trading system, virtual currency trading apparatus, and virtual currency trading program
CN110097170A (en) Information pushes object prediction model acquisition methods, terminal and storage medium
CN110070431A (en) User is counter to cheat implementation method, device, computer equipment and storage medium
CN109902471A (en) Detection method, device, computer equipment and the storage medium of sliding block verifying
CN111860101A (en) Training method and device for face key point detection model
CN105893813A (en) Biometric Information Registration Apparatus And Biometric Information Registration Method
CN109274639A (en) The recognition methods of open platform abnormal data access and device
CN109145720A (en) A kind of face identification method and device
CN109816543B (en) Image searching method and device
CN110288488A (en) Medical insurance Fraud Prediction method, apparatus, equipment and readable storage medium storing program for executing
CN113705792A (en) Personalized recommendation method, device, equipment and medium based on deep learning model
US20230410222A1 (en) Information processing apparatus, control method, and program
CN110427923A (en) Infantile vomiting milk Activity recognition method, apparatus, computer equipment and storage medium
CN115222427A (en) Artificial intelligence-based fraud risk identification method and related equipment
CN111144899B (en) Method and device for identifying false transaction and electronic equipment
CN113032524A (en) Trademark infringement identification method, terminal device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190806