CN110348194A - Method of password authentication, device, equipment and storage medium - Google Patents
Method of password authentication, device, equipment and storage medium Download PDFInfo
- Publication number
- CN110348194A CN110348194A CN201910438347.7A CN201910438347A CN110348194A CN 110348194 A CN110348194 A CN 110348194A CN 201910438347 A CN201910438347 A CN 201910438347A CN 110348194 A CN110348194 A CN 110348194A
- Authority
- CN
- China
- Prior art keywords
- facial image
- encrypted message
- target facial
- matching result
- preset password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/174—Facial expression recognition
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
This application involves a kind of method of password authentication, device, equipment and storage mediums.The described method includes: obtaining encrypted message, according to encrypted message, acquire target facial image, target facial image is matched with preset password template, obtains the matching result of target facial image, and then verification operation is carried out according to matching result, since above-mentioned encrypted message is used to indicate dynamic password length and human face expression type, without remembering to encrypted message, while ensuring information security, the verifying of password can also be realized.
Description
Technical field
This application involves field of image recognition, are situated between more particularly to a kind of method of password authentication, device, equipment and storage
Matter.
Background technique
It lives indispensable a part with the rapid development of information technology, mobile terminal has become people.In recent years
Come, people increasingly pay close attention to the safety problem of mobile terminal, in order to protect the individual privacy information of user, usually in mobile terminal
Account and corresponding password are set in the application software of installation, logging in for application software is realized by password authentification, to ensure information
Safety.
Traditional method of password authentication is usually that user presets password, for example, existing password generally comprise number,
The elements such as upper and lower case letter and spcial character, and these passwords are required to remember and be saved, and then by user's input password and in advance
It sets password to compare, realizes password authentification.
However, above-mentioned method of password authentication in the case where forgetting Password, will lead to verifying failure.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of method of password authentication, device, equipment and storage and be situated between
Matter.
A kind of method of password authentication, which comprises
Obtain encrypted message;The encrypted message is used to indicate dynamic password length and human face expression type;
According to the encrypted message, target facial image is acquired;
The target facial image is matched with preset password template, obtains the matching knot of the target facial image
Fruit;
Verification operation is carried out according to the matching result.
The acquisition encrypted message in one of the embodiments, comprising: when receiving register instruction, from institute
It states and selects at least one human face expression in preset password template, be determined as the encrypted message.
In one of the embodiments, the method also includes: acquisition it is multiple refer to facial image;According to the multiple ginseng
Facial image is examined, the preset password template is obtained.
In one of the embodiments, the method also includes: receive update operational order when, acquire new reference
Facial image;According to the new reference facial image, the preset password template is updated.
It is described according to the encrypted message in one of the embodiments, acquire target facial image, comprising: receiving
When to user's call instruction, broadcast interface is called;The broadcast interface for play voice corresponding to the encrypted message and/
Or image information;According to the voice and/or image information, the target facial image is acquired.
It is described in one of the embodiments, to match the target facial image with preset password template, it obtains
The matching result of the target facial image, comprising: extract the characteristic information of the target facial image;Believed according to the feature
Breath, calculates the similarity between the target facial image and preset password template;According to the similarity, the target is determined
The matching result of facial image.
It is described in one of the embodiments, that authentication operation is carried out according to the matching result, comprising: if the matching is tied
Fruit is successful match, then is proved to be successful;If the matching result is that it fails to match, authentication failed message is shown, and prompt weight
New acquisition target facial image.
A kind of password authentication device, described device include:
First obtains module, for obtaining encrypted message;The encrypted message is used to indicate dynamic password length and face
Expression type;
Acquisition module, for acquiring target facial image according to the encrypted message;
Second acquisition module obtains the mesh for matching the target facial image with preset password template
Mark the matching result of facial image;
Authentication module, for carrying out verification operation according to the matching result.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device realizes method of password authentication described in any of the above-described embodiment when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
Method of password authentication described in any of the above-described embodiment is realized when row.
Above-mentioned method of password authentication, device, computer equipment and storage medium, by obtaining encrypted message, according to password
Information acquires target facial image, target facial image is matched with preset password template, obtains target facial image
Matching result, so according to matching result carry out verification operation, due to above-mentioned encrypted message be used to indicate dynamic password length and
Human face expression type while ensuring information security, can also realize the verifying of password without remembering to encrypted message.
Detailed description of the invention
Fig. 1 is the internal structure chart of computer equipment in one embodiment;
Fig. 2 is the flow diagram of method of password authentication in one embodiment;
Fig. 3 is preset password template generation method flow diagram in another embodiment;
Fig. 4 is the concrete methods of realizing flow diagram that preset password updates in another embodiment;
Fig. 5 is the specific implementation flow diagram of S202 in another embodiment;
Fig. 6 is the specific implementation flow diagram of S203 in another embodiment;
Fig. 7 is the structural block diagram of password authentication device in one embodiment;
Fig. 8 is the structural block diagram of password authentication device in another embodiment;
Fig. 9 is the structural block diagram of password authentication device in another embodiment;
Figure 10 is the structural block diagram of password authentication device in another embodiment;
Figure 11 is the structural block diagram of password authentication device in another embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Method of password authentication provided by the embodiments of the present application can be applied to computer equipment, which can be
Terminal, internal structure chart can be as shown in Figure 1.The computer equipment includes the processor connected by system bus, storage
Device, network interface, display screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.
The memory of the computer equipment includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with behaviour
Make system and computer program.The built-in storage is the operation of the operating system and computer program in non-volatile memory medium
Environment is provided.The network interface of the computer equipment is used to communicate with external terminal by network connection.The computer program
To realize a kind of method of password authentication when being executed by processor.The display screen of the computer equipment can be liquid crystal display or
Electric ink display screen, the input unit of the computer equipment can be the touch layer covered on display screen, be also possible to calculate
Key, trace ball or the Trackpad being arranged on machine equipment shell can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 1, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
Technical solution of the present invention is described in detail with specifically embodiment below.These specific implementations below
Example can be combined with each other, and the same or similar concept or process may be repeated no more in certain embodiments.
In one embodiment, as shown in Fig. 2, providing a kind of method of password authentication, it is applied in Fig. 1 in this way
It is illustrated for terminal, comprising the following steps:
S201 obtains encrypted message;The encrypted message is used to indicate dynamic password length and human face expression type.
Wherein, encrypted message may include the information such as Password Length and user's human face expression type, for example, encrypted message is
3 passwords, respectively " front is looked up, left view ";It is also possible to 4 passwords, respectively " front, is looked up, right view at front " etc..
It should be noted that user is when each application logs in, encrypted message be can be different, and encrypted message can basis
Preset password template changes, and Password Length and password type can change at random.Optionally, login is being received
When operational order, at least one human face expression can be randomly choosed from preset password template, is determined as encrypted message.Specifically
Ground, application log in when, click registration is carried out by login interface, according to pre-set user's human facial expression information prompt with
Machine content and random cipher length, and then determine encrypted message.
S202 acquires target facial image according to the encrypted message.
Illustratively, if encrypted message is 5 passwords " front closes one's eyes, front, smiles, stares ", target facial image
5 facial images corresponding to " front, close one's eyes, front, smile, stare " for user, pass through the Image Acquisition that terminal carries
Equipment such as camera successively acquires target facial image.
The target facial image is matched with preset password template, obtains the target facial image by S203
Matching result.
Wherein, preset password template refers to user's human face expression gathered in advance, for example, by the user front of acquisition, facing upward
Depending on, left view, it is right depending on, close one's eyes, stare, smile, 8 human face expressions that stuck out one's tongue are stored as preset password template, alternatively, by 8 faces
The characteristic information of expression is stored as preset password template.
Illustratively, if preset password template is the characteristic information of human face expression, the feature of target facial image is extracted
Information matches the characteristic information of target facial image characteristic information corresponding with preset password template, obtains matching knot
Fruit;If preset password template is human face expression, target facial image human face expression corresponding with preset password template is carried out
Matching obtains matching result.
S204 carries out verification operation according to the matching result.
Specifically, if matching result is successful match, show to be proved to be successful, using logining successfully, if matching result is
It fails to match, then shows to show authentication failed message using login failure and prompt to resurvey target facial image.
The method of password authentication provided in above-described embodiment, according to encrypted message, acquires target by obtaining encrypted message
Facial image matches target facial image with preset password template, obtains the matching result of target facial image, in turn
Verification operation is carried out according to matching result, since above-mentioned encrypted message is used to indicate dynamic password length and human face expression type,
Without remembering to encrypted message, while ensuring information security, the verifying of password can also be realized.
On the basis of the above embodiments, the specific implementation for obtaining encrypted message is present embodiments provided.Optionally,
Above-mentioned acquisition encrypted message, comprising: when receiving register instruction, select at least one from above-mentioned preset password template
Human face expression is determined as above-mentioned encrypted message.
Wherein, register instruction refers to the log on command that user initiates computer equipment, it, which can be, passes through user
Login button, or the instruction issued by user speech operational order are clicked in login interface.
It is exemplary, when application logs in for the first time, acquisition user front, look up, left view, it is right depending on, close one's eyes, stare, smile, spit
Tongue 8 opens human facial expression information, and 8 human face expressions are stored as preset password template, then when receiving register instruction,
Encrypted message can be considered as according to preset password template random selection front, left view, the right side;Alternatively, if a preceding user logs in not
Success, then can be determined as message in cipher according to preset password stencil-chosen and the inconsistent human face expression of a preceding encrypted message
Breath.
On the basis of the above embodiments, this application involves the specific implementation processes of preset password template generation, such as Fig. 3 institute
Show, the method also includes:
S301 is acquired multiple with reference to facial image.
Wherein, the reference facial image in the embodiment of the present application refers to the different human face expression of user.Specifically, pass through meter
The image capture module such as camera acquisition for calculating machine equipment is multiple with reference to facial image, for example, by the user front of acquisition, facing upward
Regard, left view, it is right regard, close one's eyes, staring, smiling, 8 human face expressions that stuck out one's tongue is with reference to facial images.
S302 refers to facial image according to the multiple, obtains the preset password template.
Wherein, preset password template refers to user's human face expression gathered in advance, for example, carrying out first when logging in application
The setting of password, for example, by the user of acquisition front, look up, left view, it is right depending on, close one's eyes, stare, smile, stuck out one's tongue 8 face tables
Feelings are stored as preset password template;Alternatively, extract user front, look up, left view, it is right depending on, close one's eyes, stare, smile, stuck out one's tongue 8
Characteristic information is stored as preset password template by the characteristic information of human face expression.
It should be noted that also may include the simple of user setting in preset password template to enhance Cipher Strength
Number, cooperation conventional cipher sequence carry out dual factors verifying.
It is multiple with reference to facial image by acquiring in above-described embodiment, and then facial image is referred to according to multiple, it obtains pre-
If cipher template, since preset password template is Facial Expression Image, and encrypted message is determined by preset password template, into
Without remembering to encrypted message, while ensuring information security, the verifying of password can also be realized.
When great variety occurs for face shape of face, the target facial image of acquisition can not be matched into preset password template
Function, the embodiment of the present application provides the concrete methods of realizing updated to preset password, in one of the embodiments, such as Fig. 4 institute
Show, the method also includes:
S401 acquires new reference facial image when receiving update operational order.
Wherein, it updates operational order and refers to the resetting code word that user initiates computer equipment, it, which can be, passes through
User clicks reset button, or the instruction issued by user speech operational order in login interface.Illustratively, in user
When great variety occurs for shape of face, new reference facial image can be acquired, preset password template is updated.
S402 is updated the preset password template according to the new reference facial image.
Specifically, by the user resurveyed front, look up, left view, it is right depending on, close one's eyes, stare, smile, stuck out one's tongue 8 faces
Expression is stored as new preset password template;Alternatively, extract user front, look up, left view, it is right depending on, close one's eyes, stare, smile, spit
Tongue 8 opens the characteristic information of human face expression, and characteristic information is stored as to new preset password template.
In above-described embodiment, when receiving update operational order, new reference facial image is acquired, according to new reference
Facial image is updated preset password template, avoid acquisition target facial image and preset password template can not
With the case where.
Fig. 5 is provided according to the encrypted message, acquires the specific implementation of target facial image, as shown in figure 5,
S202 " according to the encrypted message, acquires target facial image ", comprising:
S501 calls broadcast interface when receiving user's call instruction;The broadcast interface is for playing the password
Voice corresponding to information and/or image information.
Wherein, user's call instruction refers to the call instruction that user initiates computer equipment, it, which can be, passes through user
Call buttons, or the call instruction issued by user speech operational order are clicked in login interface.Corresponding to encrypted message
Voice messaging be used for prompt cipher information concrete type, for example, voice prompting password be information be " front " human face expression;
Image information corresponding to encrypted message is used to provide reference for the concrete operations of encrypted message, can be corresponding picture, view
Frequently, the explanation of the forms such as 3D simulation animation, for example, image information is the concrete operations of " left view ".
S502 acquires the target facial image according to the voice and/or image information.
Specifically, it is illustrated by what voice and/or image information provided, acquires target facial image.Above-mentioned implementation
In example, due to calling broadcast interface when receiving user's call instruction, and then according to above-mentioned voice and/or image information, adopt
Collect above-mentioned target facial image, since broadcast interface can be used for playing voice corresponding to above-mentioned encrypted message and/or image letter
Breath, and then provide and illustrate for acquisition target facial image, and then without remembering to encrypted message, guaranteeing information peace
While complete, the verifying of password can also be realized.
The invention relates to the specific implementations for the matching result for obtaining target facial image, as shown in fig. 6,
The target facial image " is matched with preset password template, obtains the matching knot of the target facial image by S203
Fruit ", comprising:
S601 extracts the characteristic information of the target facial image.
Specifically, the characteristic information of target facial image can be extracted according to preset feature extraction algorithm, wherein pre-
If feature extraction algorithm can be histograms of oriented gradients (Histogram of Oriented Gradient, HOG), scale
Invariant features converter technique (Scale-invariant features transform, SIFT) accelerates robust feature method
(Speeded Up Robust Features, SURF) etc..
S602 calculates the similarity between the target facial image and preset password template according to the characteristic information.
Specifically, the characteristic information of the corresponding image of preset password template is extracted, the feature letter of target facial image is calculated
The Euclidean distance between the characteristic information of image corresponding with preset password template is ceased, and then is turned according to Euclidean distance and similarity
Formula is changed, the similarity between target facial image and preset password template is calculated.
S603 determines the matching result of the target facial image according to the similarity.
Optionally, if the similarity of the characteristic information of target facial image and preset password template is greater than preset threshold,
Determine target facial image successful match;If the similarity of the characteristic information of target facial image and preset password template be less than or
Equal to preset threshold, it is determined that it fails to match for target facial image, wherein preset threshold can be carried out according to practical situations
Setting, the embodiment of the present application are not specifically limited.
It should be understood that although each step in the flow chart of Fig. 2-6 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-6
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in fig. 7, providing a kind of password authentication device, including first obtains module 11, the
One acquisition module 12, second obtains module 13 and authentication module 14, in which:
First obtains module 11, for obtaining encrypted message;The encrypted message is used to indicate dynamic password length and people
Face expression type;
First acquisition module 12, for acquiring target facial image according to the encrypted message;
Second obtains module 13, for matching the target facial image with preset password template, described in acquisition
The matching result of target facial image;
Authentication module 14, for carrying out verification operation according to the matching result.
The first acquisition module 11 is used for when receiving register instruction, from described pre- in one of the embodiments,
If selecting at least one human face expression in cipher template, it is determined as the encrypted message.
On the basis of shown in Fig. 7 in one of the embodiments, as shown in figure 8, described device further includes the second acquisition
Module 15 and third obtain module 16, in which:
Second acquisition module 15, it is multiple with reference to facial image for acquiring;
Third obtains module 16, for referring to facial image according to the multiple, obtains the preset password template.
On the basis of shown in Fig. 7 in one of the embodiments, as shown in figure 9, described device further includes third acquisition
Module 17 and update module 18, in which:
Third acquisition module 17, for acquiring new reference facial image when receiving update operational order;
Update module 18, for being updated to the preset password template according to the new reference facial image.
On the basis of shown in Fig. 7 in one of the embodiments, as shown in Figure 10, the first acquisition module 12 includes adjusting
With unit 120 and acquisition unit 121, in which:
Call unit 120, for calling broadcast interface when receiving user's call instruction;The broadcast interface is used for
Play voice corresponding to the encrypted message and/or image information;
Acquisition unit 121, for acquiring the target facial image according to the voice and/or image information.
On the basis of shown in Fig. 7 in one of the embodiments, as shown in figure 11, the second acquisition module 13 includes mentioning
Take unit 130, computing unit 131 and determination unit 132, in which:
Extraction unit 130, for extracting the characteristic information of the target facial image;
Computing unit 131, for according to the characteristic information, calculate the target facial image and preset password template it
Between similarity;
Determination unit 132, for determining the matching result of the target facial image according to the similarity.
If authentication module 14 is successful match for the matching result in one of the embodiments, it is proved to be successful;
If the matching result is that it fails to match, authentication failed message is shown, and prompt to resurvey target facial image.
Specific about password authentication device limits the restriction that may refer to above for method of password authentication, herein not
It repeats again.Modules in above-mentioned password authentification can be realized fully or partially through software, hardware and combinations thereof.It is above-mentioned each
Module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be stored in meter in a software form
It calculates in the memory in machine equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory
Computer program, the processor perform the steps of when executing computer program
Obtain encrypted message;The encrypted message is used to indicate dynamic password length and human face expression type;
According to the encrypted message, target facial image is acquired;
The target facial image is matched with preset password template, obtains the matching knot of the target facial image
Fruit;
Verification operation is carried out according to the matching result.
In one embodiment, it is also performed the steps of when processor executes computer program and is receiving register
When instruction, at least one human face expression is selected from the preset password template, is determined as the encrypted message.
In one embodiment, it is multiple with reference to face that acquisition is also performed the steps of when processor executes computer program
Image;Facial image is referred to according to the multiple, obtains the preset password template.
In one embodiment, it is also performed the steps of when processor executes computer program and is receiving update operation
When instruction, new reference facial image is acquired;According to the new reference facial image, the preset password template is carried out more
Newly.
In one embodiment, it is also performed the steps of when processor executes computer program and is receiving user's calling
When instruction, broadcast interface is called;The broadcast interface is for playing voice corresponding to the encrypted message and/or image letter
Breath;According to the voice and/or image information, the target facial image is acquired.
In one embodiment, it is also performed the steps of when processor executes computer program and extracts the target face
The characteristic information of image;According to the characteristic information, calculate similar between the target facial image and preset password template
Degree;According to the similarity, the matching result of the target facial image is determined.
In one embodiment, it is if processor also performs the steps of the matching result when executing computer program
Successful match is then proved to be successful;If the matching result is that it fails to match, authentication failed message is shown, and prompt to adopt again
Collect target facial image.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Obtain encrypted message;The encrypted message is used to indicate dynamic password length and human face expression type;
According to the encrypted message, target facial image is acquired;
The target facial image is matched with preset password template, obtains the matching knot of the target facial image
Fruit;
Verification operation is carried out according to the matching result.
In one embodiment, it is also performed the steps of when computer program is executed by processor and is receiving login behaviour
When instructing, at least one human face expression is selected from the preset password template, is determined as the encrypted message.
In one embodiment, acquisition multiple reference men are also performed the steps of when computer program is executed by processor
Face image;Facial image is referred to according to the multiple, obtains the preset password template.
In one embodiment, it is also performed the steps of when computer program is executed by processor and is receiving update behaviour
When instructing, new reference facial image is acquired;According to the new reference facial image, the preset password template is carried out
It updates.
In one embodiment, it is also performed the steps of when computer program is executed by processor and is receiving user's tune
When with instruction, broadcast interface is called;The broadcast interface is for playing voice corresponding to the encrypted message and/or image letter
Breath;According to the voice and/or image information, the target facial image is acquired.
In one embodiment, it is also performed the steps of when computer program is executed by processor and extracts the target person
The characteristic information of face image;According to the characteristic information, the phase between the target facial image and preset password template is calculated
Like degree;According to the similarity, the matching result of the target facial image is determined.
In one embodiment, if also performing the steps of the matching result when computer program is executed by processor
For successful match, then it is proved to be successful;If the matching result is that it fails to match, authentication failed message is shown, and prompt again
Acquire target facial image.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of method of password authentication, which is characterized in that the described method includes:
Obtain encrypted message;The encrypted message is used to indicate dynamic password length and human face expression type;
According to the encrypted message, target facial image is acquired;
The target facial image is matched with preset password template, obtains the matching result of the target facial image;
Verification operation is carried out according to the matching result.
2. the method according to claim 1, wherein the acquisition encrypted message, comprising:
When receiving register instruction, at least one human face expression is selected from the preset password template, is determined as institute
State encrypted message.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
It acquires multiple with reference to facial image;
Facial image is referred to according to the multiple, obtains the preset password template.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
When receiving update operational order, new reference facial image is acquired;
According to the new reference facial image, the preset password template is updated.
5. method according to claim 1 or 2, which is characterized in that it is described according to the encrypted message, acquire target face
Image, comprising:
When receiving user's call instruction, broadcast interface is called;The broadcast interface is right for playing the encrypted message
The voice and/or image information answered;
According to the voice and/or image information, the target facial image is acquired.
6. method according to claim 1 or 2, which is characterized in that described by the target facial image and preset password
Template is matched, and the matching result of the target facial image is obtained, comprising:
Extract the characteristic information of the target facial image;
According to the characteristic information, the similarity between the target facial image and preset password template is calculated;
According to the similarity, the matching result of the target facial image is determined.
7. method according to claim 1 or 2, which is characterized in that it is described that authentication operation is carried out according to the matching result,
Include:
If the matching result is successful match, it is proved to be successful;
If the matching result is that it fails to match, authentication failed message is shown, and prompt to resurvey target facial image.
8. a kind of password authentication device, which is characterized in that described device includes:
First obtains module, for obtaining encrypted message;The encrypted message is used to indicate dynamic password length and human face expression
Type;
Acquisition module, for acquiring target facial image according to the encrypted message;
Second acquisition module obtains the target person for matching the target facial image with preset password template
The matching result of face image;
Authentication module, for carrying out verification operation according to the matching result.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910438347.7A CN110348194A (en) | 2019-05-24 | 2019-05-24 | Method of password authentication, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910438347.7A CN110348194A (en) | 2019-05-24 | 2019-05-24 | Method of password authentication, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110348194A true CN110348194A (en) | 2019-10-18 |
Family
ID=68174286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910438347.7A Pending CN110348194A (en) | 2019-05-24 | 2019-05-24 | Method of password authentication, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110348194A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111754239A (en) * | 2020-06-30 | 2020-10-09 | 海南大学 | Payment password evaluation method and component integrating data, information and knowledge |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203232423U (en) * | 2013-05-15 | 2013-10-09 | 金硕澳门离岸商业服务有限公司 | Authentication system |
CN103778360A (en) * | 2012-10-26 | 2014-05-07 | 华为技术有限公司 | Face unlocking method and device based on motion analysis |
CN104298910A (en) * | 2013-07-19 | 2015-01-21 | 广达电脑股份有限公司 | Portable electronic device and interactive face login method |
CN104683302A (en) * | 2013-11-29 | 2015-06-03 | 国际商业机器公司 | Authentication method, authentication device, terminal equipment, authentication server and system |
US20150310259A1 (en) * | 2011-07-12 | 2015-10-29 | Microsoft Technology Licensing, Llc | Using facial data for device authentication or subject identification |
CN108345779A (en) * | 2018-01-31 | 2018-07-31 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
-
2019
- 2019-05-24 CN CN201910438347.7A patent/CN110348194A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150310259A1 (en) * | 2011-07-12 | 2015-10-29 | Microsoft Technology Licensing, Llc | Using facial data for device authentication or subject identification |
CN103778360A (en) * | 2012-10-26 | 2014-05-07 | 华为技术有限公司 | Face unlocking method and device based on motion analysis |
CN203232423U (en) * | 2013-05-15 | 2013-10-09 | 金硕澳门离岸商业服务有限公司 | Authentication system |
CN104298910A (en) * | 2013-07-19 | 2015-01-21 | 广达电脑股份有限公司 | Portable electronic device and interactive face login method |
CN104683302A (en) * | 2013-11-29 | 2015-06-03 | 国际商业机器公司 | Authentication method, authentication device, terminal equipment, authentication server and system |
CN108345779A (en) * | 2018-01-31 | 2018-07-31 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111754239A (en) * | 2020-06-30 | 2020-10-09 | 海南大学 | Payment password evaluation method and component integrating data, information and knowledge |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108846676B (en) | Biological feature auxiliary payment method, device, computer equipment and storage medium | |
CN110348193A (en) | Verification method, device, equipment and storage medium | |
EP3203681B1 (en) | Sequential biometric cryptosystem and sequential biometric cryptographic processing method | |
CN110955874A (en) | Identity authentication method, identity authentication device, computer equipment and storage medium | |
CN107944247B (en) | Unlocking control method and device and electronic equipment | |
CN107609508A (en) | A kind of face identification method, terminal and computer-readable recording medium | |
US10282532B2 (en) | Secure storage of fingerprint related elements | |
CN104778416A (en) | Information hiding method and terminal | |
JP6028453B2 (en) | Image processing apparatus, image processing method, and image processing program | |
CN109829277A (en) | Terminal unlock method, device, computer equipment and storage medium | |
CN114612986A (en) | Detection method, detection device, electronic equipment and storage medium | |
CN112334896B (en) | Unlocking method and equipment of terminal equipment and storage medium | |
CN110348194A (en) | Method of password authentication, device, equipment and storage medium | |
CN109493079A (en) | Payment authentication method and equipment | |
US20180124034A1 (en) | Image based method, system and computer program product to authenticate user identity | |
CN105138887B (en) | A kind of input method of log-on message, device and terminal device | |
CN115840931A (en) | Identity verification method based on face sliding screen interaction and related product | |
WO2016155090A1 (en) | Unlocking method, apparatus and terminal based on palm print and computer storage medium | |
CN114095266B (en) | Login authentication method and device, electronic equipment and readable storage medium | |
CN109165490A (en) | A kind of data inputting method and device | |
CN113032755B (en) | Nuclear power equipment operator verification method, device, equipment and storage medium | |
CN109086584A (en) | Data processing method, device, computer equipment and storage medium | |
CN106161365B (en) | Data processing method and device and terminal | |
CN111898107A (en) | Account freezing method and device, computer equipment and storage medium | |
CN111783048A (en) | Control method, control device, electronic equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Room 1901, building 5, Shenzhen new generation industrial park, 136 Zhongkang Road, Meidu community, Meilin street, Futian District, Shenzhen, Guangdong 518000 Applicant after: Zhaoyin yunchuang Information Technology Co.,Ltd. Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.) Applicant before: MBCLOUD (SHENZHEN) INFORMATION TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191018 |
|
RJ01 | Rejection of invention patent application after publication |