CN110348378A - A kind of authentication method, device and storage medium - Google Patents

A kind of authentication method, device and storage medium Download PDF

Info

Publication number
CN110348378A
CN110348378A CN201910617306.4A CN201910617306A CN110348378A CN 110348378 A CN110348378 A CN 110348378A CN 201910617306 A CN201910617306 A CN 201910617306A CN 110348378 A CN110348378 A CN 110348378A
Authority
CN
China
Prior art keywords
audio
authentication
reference object
video flow
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910617306.4A
Other languages
Chinese (zh)
Inventor
马福鑫
付英波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201910617306.4A priority Critical patent/CN110348378A/en
Publication of CN110348378A publication Critical patent/CN110348378A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to a kind of authentication method and devices, this method comprises: obtaining audio/video flow;In vivo detection and face alignment processing are executed to audio/video flow, judge whether the reference object in audio/video flow is user to be certified;Speech recognition is carried out to the content that the reference object in audio/video flow is read aloud, whether the content and the authentication content read aloud described in judgement are consistent;If the reference object in the audio/video flow is the user to be certified, and the content that the reference object is read aloud is consistent with the authentication content, then confirms the user authentication success to be certified.The embodiment of the present invention can be realized remote authentication, reach certification scene without user, the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile verification process is instructed without staff, is not only reduced the uncertainty manually instructed and is linked up cost, also reduces human cost, bring more considerable economic benefit.

Description

A kind of authentication method, device and storage medium
Technical field
The invention belongs to authentication techniques fields, and in particular to a kind of authentication method, device and storage medium.
Background technique
Existing certificate scheme needs to authenticate people and comes certification scene, carries out under the guidance for the staff for being familiar with business Certification.Existing certificate scheme has the following deficiencies: that certification requires manual intervention, low efficiency every time;Certification people needs to come Scene, the time is wasted in mostly to be authenticated in unrelated distance;As certification number increases, the staff needed also increases, at This height.
Summary of the invention
For above-mentioned problems of the prior art, the purpose of the present invention is to provide the avoidable appearance of one kind is above-mentioned extremely The authentication method and device of small part technological deficiency.
On the one hand, a kind of authentication method is provided, comprising:
Audio/video flow is obtained, the audio/video flow includes the audio stream and video flowing that reference object reads aloud authentication content;
In vivo detection and face alignment processing are executed to the audio/video flow, judge the reference object in the audio/video flow It whether is user to be certified;
The authentication content is obtained, and speech recognition is carried out to the content that the reference object in the audio/video flow is read aloud, Whether the content read aloud described in judgement is consistent with the authentication content;
If reference object in the audio/video flow is the user to be certified, and the content that the reference object is read aloud It is consistent with the authentication content, then confirm the user authentication success to be certified.
Further, the audio/video flow that obtains includes: the audio/video flow for receiving client and sending.
Further, the acquisition audio/video flow includes:
Video flowing is obtained, Face datection is carried out to video flowing, judges the face figure that whether there is reference object in video flowing Picture;
Facial image if it exists then shows the authentication content, and when the reference object reads aloud the authentication content Record the audio/video flow.
Further, during recording audio/video stream in the current audio/video flow of real-time detection facial image quality;
If detecting, face is lost or the quality of facial image is lower than threshold value, terminates this recording.
Further, the method also includes:
Prompt information is exported, prompt information is used to that the quality of facial image to be prompted to lose lower than threshold value or face;
Restart to record.
Further, the mode for showing authentication content text is scrolling display text, and the rolling speed of text is according to true People reads aloud what speed data average value obtained.
It on the other hand, can be with another authentication method, comprising:
Video flowing is obtained, Face datection is carried out to video flowing, judges the face figure that whether there is reference object in video flowing Picture;
Facial image if it exists then shows the authentication content, and records the reference object and read aloud the protocol authentication The audio/video flow of content;
The audio/video flow recorded and completed is sent to server, the audio/video flow is for the server to the bat It takes the photograph object and carries out protocol authentication.
Further, the method also includes:
The authentication result that the server is sent is received, the authentication result is used to indicate the reference object;
Show the authentication result.
On the other hand, a kind of authentication device is additionally provided, comprising:
Module is obtained, for obtaining audio/video flow, the audio/video flow includes the audio that reference object reads aloud authentication content Stream and video flowing;
In vivo detection and face alignment module, for executing In vivo detection and face alignment processing, judgement to audio/video flow Whether the reference object in the audio/video flow is user to be certified;;
Speech recognition module is carried out for obtaining authentication content, and to the content that the reference object in audio/video flow is read aloud Speech recognition judges whether the content read aloud is consistent with authentication content;
Authentication module, if for the reference object in audio/video flow be user to be certified, and reference object read aloud it is interior Appearance is consistent with authentication content, then confirms user authentication success to be certified.
On the other hand, another authentication device is additionally provided, comprising:
Face detection module carries out Face datection to video flowing, judges to whether there is in video flowing for obtaining video flowing The facial image of reference object;
Display module then shows authentication content for facial image if it exists;
Module is recorded, the audio/video flow of the protocol authentication content is read aloud for recording the reference object;
Video sending module, for sending the audio/video flow recorded and completed to server, audio/video flow is used for server pair Reference object is authenticated.
A kind of electronic equipment, including processor and memory, the memory is for storing instruction;Described instruction is described For executing the authentication method of any of the above-described aspect description when processor is run.
A kind of storage medium, is stored with program instruction on said storage, and described program instruction is used at runtime Execute the authentication method of any of the above-described aspect description.
Authentication method provided by the invention and device, by carrying out In vivo detection and people to the reference object in audio/video flow Face identification, and speech recognition is carried out to the content that reference object is read aloud, it can be realized remote authentication, it is existing to reach certification without user , the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile verification process without It needs staff to instruct, not only reduce the uncertainty manually instructed and links up cost, also reduce human cost, bring More considerable economic benefit.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It is clear that alternatively, Partial Feature and advantage can deduce from specification or unambiguously determine, or pass through implementation The embodiment of the present invention understands.The objectives and other advantages of the invention can be by written specification, claims and attached Specifically noted structure is achieved and obtained in figure.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in invention, for those of ordinary skill in the art, without creative efforts, It is also possible to obtain other drawings based on these drawings.
Fig. 1 is the authentication method flow chart that the present invention discloses an embodiment;
Fig. 2 is the authentication method flow chart that the present invention discloses another embodiment;
Fig. 3 is the authentication method flow chart that the present invention discloses another embodiment;
Fig. 4 is the structural schematic diagram for the authentication device that the present invention discloses one embodiment;
Fig. 5 is the structural schematic diagram for the authentication device that the present invention discloses another embodiment;
Fig. 6 is the structural block diagram for the client that the present invention discloses an embodiment;
Fig. 7 is the structural block diagram for the server end that the present invention discloses an embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawing and specific implementation The present invention will be further described for example.It should be appreciated that described herein, specific examples are only used to explain the present invention, and does not have to It is of the invention in limiting.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
In the embodiment of the present invention, client can include but is not limited to mobile terminal (such as mobile phone, E-book reader), Wearable device, tablet computer, laptop or desktop computer etc..
In one embodiment, a kind of authentication method 10 is provided, which can be by client executing, can also To be executed by server.As shown in Figure 1, this method 10 includes S11~S14.
S11 obtains audio/video flow, and audio/video flow includes the audio stream and video flowing that reference object reads aloud authentication content.
S12 executes In vivo detection and face alignment to audio/video flow and handles, and judges whether is reference object in audio/video flow For user to be certified.
Comparison is executed to audio/video flow, can recognize that whether reference object is user to be certified.Audio/video flow is executed In vivo detection processing, can judge whether the reference object in audio/video flow is true man, rather than use the living body of photo, video etc. Attack, can be improved the security performance in verification process.It should be understood that the present embodiment handles execution In vivo detection and face alignment Tandem not limit, execute face alignment after In vivo detection can be first carried out, held after face alignment can also be first carried out Row In vivo detection, may also be performed simultaneously In vivo detection and face alignment.
S13 obtains authentication content, and carries out speech recognition, judgement to the content that the reference object in audio/video flow is read aloud Whether the content read aloud is consistent with authentication content.
Authentication content can be stored in advance in client or the storage equipment of server, can also will be recognized by server Card content is sent in client, or authentication content is sent in server by client.
S14, if reference object in audio/video flow is user to be certified, and in the reference object content and certification read aloud Hold unanimously, then confirms user authentication success to be certified.
By carrying out In vivo detection and recognition of face to the reference object in audio/video flow, and in reading aloud to reference object Hold and carry out speech recognition, can be realized remote authentication, reaches certification scene without user, the user experience is improved, improves and recognizes Efficiency is demonstrate,proved, the needs of practical application can be met well.Meanwhile verification process is instructed without staff, is not only reduced The uncertainty and communication cost manually instructed, also reduces human cost, brings more considerable economic benefit.
When this method 10 is executed by server, server can receive the audio/video flow of its upload from client in S11.
When this method 10 is executed by server, client can connect from image capture module (such as camera etc.) in S11 The audio/video flow is received, the audio/video flow can also be obtained using following steps S111 and S112:
S111 obtains video flowing, carries out Face datection to video flowing, judges the people that whether there is reference object in video flowing Face image;
S112, facial image, then show authentication content, and the recording when reference object reads aloud protocol authentication content if it exists Audio/video flow.
By carrying out Face datection to video flowing automatically, and shown in certification determining there are in the case where facial image Appearance and recording audio/video stream instruct without staff, realize self-service certification.
In another embodiment, a kind of authentication method 20 is provided, which can be by client executing.Such as figure Shown in 2, this method 20 includes S21~S23.
S21 obtains video flowing, carries out Face datection to video flowing, judges the people that whether there is reference object in video flowing Face image;
S22, facial image, then show authentication content if it exists;
S23 records the audio/video flow that reference object reads aloud authentication content;
S24, the audio/video flow recorded and completed is sent to server, and audio/video flow recognizes reference object for server Card.
Optionally, in S22 or S23, prompt information can also be exported, to prompt reference object to start to read aloud in certification Hold.For example, can start to read aloud authentication content by playing voice messaging and/or Word message prompting personnel to be certified.
The present embodiment is uploaded audio/video flow by the audio/video flow in client recording user to be verified for certification To server, user to be verified is authenticated according to the audio/video flow by server, can be realized remote authentication, is not necessarily to user Certification scene is reached, the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile Verification process is instructed without staff, is not only reduced the uncertainty manually instructed and is linked up cost, also reduces manpower Cost brings more considerable economic benefit.
In addition, being authenticated according to the audio/video flow to user to be verified by server, reduce the processing number of client According to can reduce requirement of the client to computing capability, to advantageously reduce the hardware cost of client.
Optionally, method 20 can also include:
The authentication result that server is sent is received, authentication result is used to indicate whether reference object authenticates success;
Show authentication result.
Client can be in the display screen display authentication result of itself, other that can also be client connection are aobvious Show and shows authentication result in equipment.
That is, authentication result can be fed back to client after server authentication, client can show this Whether authentication result informs user's authenticated success.The mistake that server verifies user to be verified according to audio/video flow Journey can refer to the associated description of method 10, and which is not described herein again.
It optionally, can also be real during recording audio/video stream in some embodiments of method 10 or method 20 When detect the quality of facial image in current audio/video flow, if detecting, face is lost or the quality of facial image is lower than threshold Value, then terminate this recording.The quality that can guarantee the audio/video flow recorded in this way is avoided since face is lost or face figure The quality of picture is lower, and can not accurately carry out In vivo detection and face alignment processing.
Optionally, method 10 or method 20 can also include: output prompt information, and prompt information is for prompting facial image Quality lost lower than threshold value or face, and/or, prompt information is for prompting reference object shift position and/or adjustment shooting Luminous environment in scene;And after the prefixed time interval of output prompt information, restart to record.It is used by automatic prompt Family enables to user to adjust position or luminous environment etc. to meet shooting quality requirement.
In some embodiments, authentication content is text.Correspondingly, the mode for showing authentication content can be scrolling display Text, the rolling speed of text can read aloud speed data average value according to true man and obtain.For example, acquisition certain amount (such as 1 Ten thousand) true man read aloud speed data, speed data then is read aloud to all true man of acquisition and does average treatment, is averaged work For rolling speed.
Certainly, the mode for showing authentication content may be static status display, i.e., all shows authentication content in display screen Deng display equipment on, if authentication content is more, can also be shown in the form of page turning on multiple pages.
Face datection and facial image matter can be carried out using the method based on neural network model in the embodiment of the present invention Amount detection, the training process of neural network model the following steps are included:
(a): the facial image of acquisition certain amount (such as 100,000) is stored in bottom library;
(b): face key point is carried out to facial image collected and is precisely marked, including but not limited to: the profile point of face, Eye contour point, nose profile point, eyebrow outline point, forehead profile point, upper lip profile point, lower lip profile point etc.;
(c): accurate labeled data is divided into training set, verifying collection and test set by a certain percentage;
(d): neural network model being trained using training set, while with verifying collection to the intermediate knot in training process Fruit verify and adjusting training parameter in real time, and when training precision and verifying precision all reach certain threshold value, pause was trained Journey;
(e): trained neural network model being tested with test set, measures the performance of the model, if the model Performance meet application demand condition, then terminate entirely to train process, if the performance of the neural network model be unsatisfactory for using need Condition is sought, then turns to step (d).
Face critical point detection is carried out to image based on neural network model, obtains real-time face key point information and people Face attribute information (such as quality of human face image), can Face datection and quality of human face image detection.
Below with reference to Fig. 3, the authentication method of one embodiment of the invention is described, the authentication method is from client and server Interactive angle describes verification process, and this method includes the following contents.
Step (100): the authentication function of the real-time face identification of user's open system.
Step (101): configuration informations such as authentication contents are sent client by server end.
The configuration informations such as authentication content are stored in the memory module of server end, are adjusted from memory module when needed Take the configuration informations such as authentication content.
Client can send the request for pulling the configuration informations such as authentication content to server end, and server receives Configuration information is recalled from memory module after the request, is subsequently transmitted to client.
Step (102): the image capture module (such as camera etc.) of client opens preview video stream, obtains preview view Frequency data frame;The video flowing in preview video stream, that is, image capture module acquisition current shooting visual field.
Step (103): carrying out Face datection to video flowing, judges the face figure that whether there is reference object in video flowing Picture.
Preview video data frame can be inputted in the face detection module of client, people is carried out to preview video data frame Face detection (such as can carry out Face datection according to face key point information), judges in preview video data frame with the presence or absence of people Face image;If there is facial image, then it represents that personnel to be certified have been positioned in the shooting visual field of image capture module;
Step (104): facial image if it exists then shows authentication content, and reads aloud protocol authentication content in reference object When recording audio/video stream.
Facial image if it exists, then authentication content display module (such as word extractor or display screen etc.) display of client is recognized Content text is demonstrate,proved, image capture module starts recording audio/video stream, and personnel to be certified is prompted to start to read aloud authentication content text.
It optionally, can be with the matter of facial image in the current audio/video flow of real-time detection during recording audio/video stream Amount.If detected in recording process face lose or quality of human face image lower than threshold value (such as facial image is fuzzy causes Facial image clarity is lower than situations such as preset clarity threshold), then terminate this recording, and export prompt information; Prompt information is used to that the quality of facial image to be prompted to lose lower than threshold value or face;Prompt information can for sound, light or other Display reminding mode, such as prompt information is exported in such a way that display is shown or loudspeaker plays audio, prompt shooting pair Angle, distance or the position etc. of video camera are faced as adjusting;Then restart to record.
After restarting recording, authentication content text can be shown again, and personnel to be certified read aloud again from the beginning Authentication content text, and in the current audio/video flow of real-time detection facial image quality, until authentication content text is by complete bright It runs through, records and complete;
Step (105): client sends the audio/video flow recorded and completed;Client will record the sound completed After video stream data is compressed and handled (as encrypted), it is uploaded to server.
Step (106): server receives audio/video flow, carries out the processing such as speech recognition, In vivo detection, face alignment, right Processing result carries out authentication content inspection, and provides authentication result.Specifically, executing In vivo detection and face ratio to audio/video flow To processing, judge whether the reference object in audio/video flow is user to be certified;And authentication content is obtained, and to audio-video The content that reference object in stream is read aloud carries out speech recognition, judges whether the content read aloud is consistent with authentication content;
If reference object in audio/video flow is user to be certified, and the content read aloud of reference object and authentication content one It causes, then confirms user authentication success to be certified.
Step (107): client receives the authentication result that server end is sent, and authentication result, which is used to indicate reference object, is Deny demonstrate,proving successfully;And show authentication result.
Server end sends client for authentication result and is shown, and client receives the certification knot that server end is sent Fruit, and shown.Can show authentication result on the display screen of client, can also connect with client its Authentication result is shown on his display module (such as display screen etc.).
Fig. 4 show the structural schematic diagram of the authentication device 400 of one embodiment of the invention.As shown in figure 4, authentication device 400 include:
Module 410 is obtained, for obtaining audio/video flow, audio/video flow includes the audio stream that reference object reads aloud authentication content And video flowing;
In vivo detection and face alignment module 420 are sentenced for executing In vivo detection and face alignment processing to audio/video flow Whether the reference object in staccato video flowing is user to be certified;
Speech recognition module 430, the content for reading aloud the reference object in audio/video flow carry out speech recognition, judgement Whether the content read aloud is consistent with authentication content;
Authentication module 440 is user to be certified for the reference object in audio/video flow, and reference object is read aloud Under content and authentication content unanimous circumstances, user authentication success to be certified is confirmed.
The authentication device of the present embodiment by carrying out In vivo detection and recognition of face to the reference object in audio/video flow, and Speech recognition is carried out to the content that reference object is read aloud, can be realized remote authentication, certification scene is reached without user, improves User experience improves authentication efficiency, can meet the needs of practical application well.Meanwhile verification process is not necessarily to work people Member's guidance not only reduces the uncertainty manually instructed and links up cost, also reduces human cost, bring more considerable Economic benefit.
Authentication device 400 can be server, or client.
When authentication device 400 is server, obtains module 410 and be specifically used for receiving its audio-video uploaded from client Stream.
When authentication device 400 is client, obtains module 410 and specifically include: video acquiring module, Face datection mould Block, display module and recording module (not shown).Wherein, video acquiring module is for obtaining video flowing;Face datection mould Block is used to carry out Face datection to video flowing, judges the facial image that whether there is reference object in video flowing;Display module is used In determining there are in the case where facial image, authentication content is shown;Module is recorded, for reading aloud protocol authentication in reference object Recording audio/video stream when content.
It should be understood that authentication device 400 according to embodiments of the present invention is for executing authentication method according to an embodiment of the present invention 10 corresponding steps please refer to corresponding contents above, and which is not described herein again.
Fig. 5 show the structural schematic diagram of the authentication device 500 of another embodiment of the present invention.As shown in figure 5, device 500 Include:
Face detection module 510 judges in video flowing for carrying out Face datection to the video flowing of acquisition with the presence or absence of bat Take the photograph the facial image of object;
Display module 520, for showing authentication content there are facial image;
Module 530 is recorded, the audio/video flow of protocol authentication content is read aloud for recording reference object;
Sending module 540, for sending the audio/video flow recorded and completed to server, audio/video flow is for server to bat It takes the photograph object and carries out protocol authentication.
The present embodiment is uploaded audio/video flow by the audio/video flow in client recording user to be verified for certification To server, user to be verified is authenticated according to the audio/video flow by server, can be realized remote authentication, is not necessarily to user Certification scene is reached, the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile Verification process is instructed without staff, is not only reduced the uncertainty manually instructed and is linked up cost, also reduces manpower Cost brings more considerable economic benefit.
In addition, being authenticated according to the audio/video flow to user to be verified by server, reduce the processing number of client According to can reduce requirement of the client to computing capability, to advantageously reduce the hardware cost of client.
Optionally, device 500 can also include: receiving module (not shown), for receiving recognizing for server transmission Card is as a result, authentication result is used to indicate whether reference object authenticates success.Correspondingly, display module 520 can be also used for showing Authentication result.
It should be understood that authentication device 500 according to embodiments of the present invention is for executing authentication method according to an embodiment of the present invention 20 corresponding steps please refer to corresponding contents above, and which is not described herein again.
In addition, authentication device 400 and authentication device 500 can also include picture quality detection module (not shown), For during recording module recording audio/video stream in the current audio/video flow of real-time detection facial image quality, if detection It is lost to face or the quality of facial image is lower than threshold value, then terminate this recording.
Term " module " is not intended to be limited to specific physical form.Depending on concrete application, module be can be implemented as firmly Part, firmware, software and/or combination thereof.In addition, different modules can share common component or even be realized by same components. May exist between disparate modules or there is no clear boundaries.
Those of ordinary skill in the art may be aware that mould described in conjunction with the examples disclosed in the embodiments of the present disclosure Block and method and step can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.In some embodiments, it as shown in fig. 6, client 1000 includes processor 1100 and memory 1200, deposits Reservoir 1200 is for storing instruction;For executing method 10 when instruction is run by processor 1100.
In some embodiments, as shown in fig. 7, server end 2000 includes processor 2100 and memory 2200, storage Device 2200 is for storing instruction;For executing method 20 when instruction times processor 2100 is run.
Processor 2100 and processor 1100 can be central processor CPU, Micro-processor MCV etc..2200 He of memory Memory 1200 can be the nonvolatile memory of ROM (read-only memory), RAM (random access memory), such as hard disk Deng.
It is well known by those skilled in the art that the development of the electronic information technology with such as large scale integrated circuit technology With the trend of hardware and software, clearly to divide computer system soft and hardware boundary has seemed relatively difficult.Because general For, operation can both be realized by software, can also be realized by hardware.Generally, the execution of instruction both can be by hard Part is completed, and can also equally be completed by software.Hardware implementations or software realization side are used for a certain machine function Case depends on the Non-technical factors such as price, speed, reliability, memory capacity, change cycle.For the technician, soft Part implementation and hardware implementation mode are equivalent.Technical staff can according to need selection software or hardware is above-mentioned to realize Scheme.Therefore, specific software or hardware are not limited here.
The present invention can be equipment, method and/or computer program product.Computer program product may include computer Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment Equipment.Computer readable storage medium for example may be-but not limited to-storage device electric, magnetic storage apparatus, optical storage Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/ Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs, Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the invention Face.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/ Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/ Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation One module of table, program segment or a part of instruction, the module, program segment or a part of instruction include one or more use The executable instruction of the logic function as defined in realizing.In some implementations as replacements, function marked in the box It can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be held substantially in parallel Row, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or The combination of each box in flow chart and the box in block diagram and or flow chart, can the function as defined in executing or dynamic The dedicated hardware based system made is realized, or can be realized using a combination of dedicated hardware and computer instructions.It is right For those skilled in the art it is well known that, by hardware mode realize, by software mode realize and pass through software and It is all of equal value that the mode of combination of hardware, which is realized,.
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other At least part of the sub-step or stage of step or other steps executes in turn or alternately.
Embodiments of the present invention above described embodiment only expresses, the description thereof is more specific and detailed, but can not Therefore limitations on the scope of the patent of the present invention are interpreted as.It should be pointed out that for those of ordinary skill in the art, Without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection model of the invention It encloses.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (12)

1. a kind of authentication method characterized by comprising
Audio/video flow is obtained, the audio/video flow includes the audio stream and video flowing that reference object reads aloud authentication content;
In vivo detection and face alignment processing are executed to the audio/video flow, judge whether is reference object in the audio/video flow For user to be certified;
The content read aloud to the reference object in the audio/video flow carries out speech recognition, the content read aloud described in judgement with it is described Whether authentication content is consistent;
If reference object in the audio/video flow is the user to be certified, and the content read aloud of the reference object and institute It is consistent to state authentication content, then confirms the user authentication success to be certified.
2. authentication method according to claim 1, which is characterized in that the acquisition audio/video flow includes: reception client The audio/video flow sent.
3. authentication method according to claim 1, which is characterized in that the acquisition audio/video flow includes:
Video flowing is obtained, Face datection is carried out to video flowing, judges the facial image that whether there is reference object in video flowing;
Facial image if it exists then shows the authentication content, and the recording when the reference object reads aloud the authentication content The audio/video flow.
4. authentication method according to claim 3, which is characterized in that real-time detection is worked as during recording audio/video stream The quality of facial image in preceding audio/video flow;
If detecting, face is lost or the quality of facial image is lower than threshold value, terminates this recording.
5. authentication method according to claim 4, which is characterized in that the method also includes:
Prompt information is exported, prompt information is used to that the quality of facial image to be prompted to lose lower than threshold value or face, and/or, it is described Prompt information is used to prompt the reference object adjustment position and/or adjust the luminous environment in photographed scene;
Restart to record.
6. authentication method according to claim 3, which is characterized in that show the mode of authentication content for scrolling display text Word, the rolling speed of text are to read aloud speed data average value according to true man to obtain.
7. a kind of authentication method characterized by comprising
Video flowing is obtained, Face datection is carried out to the video flowing, judges the face figure that whether there is reference object in video flowing Picture;
Facial image if it exists then shows the authentication content, and records the sound that the reference object reads aloud the authentication content Video flowing;
The audio/video flow recorded and completed is sent to server, the audio/video flow is for the server to the shooting pair As being authenticated.
8. authentication method according to claim 7, which is characterized in that the method also includes:
The authentication result that the server is sent is received, the authentication result is used to indicate whether the reference object authenticates into Function;
Show the authentication result.
9. a kind of authentication device characterized by comprising
Obtain module, for obtaining audio/video flow, the audio/video flow include reference object read aloud authentication content audio stream and Video flowing;
In vivo detection and face alignment module, the audio/video flow for obtaining to the acquisition module execute In vivo detection and face Comparison processing, judges whether the reference object in the audio/video flow is user to be certified;;
Speech recognition module, the content that the reference object in audio/video flow for obtaining to the acquisition module is read aloud carry out language Sound identification, judges whether the content read aloud is consistent with authentication content;
Authentication module, for the reference object in the audio/video flow be user to be certified, and reference object read aloud it is interior Hold and under authentication content unanimous circumstances, confirms user authentication success to be certified.
10. a kind of authentication device characterized by comprising
Face detection module carries out Face datection to video flowing for obtaining video flowing, judges in video flowing with the presence or absence of shooting The facial image of object;
Display module then shows authentication content for facial image if it exists;
Module is recorded, the audio/video flow of the authentication content is read aloud for recording the reference object;
Sending module, for sending the audio/video flow recorded and completed to server, the audio/video flow is used for the server pair The reference object is authenticated.
11. a kind of electronic equipment, including processor and memory, which is characterized in that the memory is for storing instruction;It is described For executing such as method of any of claims 1-8 when instruction is run by the processor.
12. a kind of storage medium, which is characterized in that be stored with program instruction on said storage, described program instruction exists For executing method as claimed in any one of claims 1 to 8 when operation.
CN201910617306.4A 2019-07-10 2019-07-10 A kind of authentication method, device and storage medium Pending CN110348378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910617306.4A CN110348378A (en) 2019-07-10 2019-07-10 A kind of authentication method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910617306.4A CN110348378A (en) 2019-07-10 2019-07-10 A kind of authentication method, device and storage medium

Publications (1)

Publication Number Publication Date
CN110348378A true CN110348378A (en) 2019-10-18

Family

ID=68176837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910617306.4A Pending CN110348378A (en) 2019-07-10 2019-07-10 A kind of authentication method, device and storage medium

Country Status (1)

Country Link
CN (1) CN110348378A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111191073A (en) * 2019-12-26 2020-05-22 深圳壹账通智能科技有限公司 Video and audio recognition method, device, storage medium and device
CN111402096A (en) * 2020-04-03 2020-07-10 广州云从鼎望科技有限公司 Online teaching quality management method, system, equipment and medium
CN111814732A (en) * 2020-07-23 2020-10-23 上海优扬新媒信息技术有限公司 Identity verification method and device
CN112002042A (en) * 2020-09-02 2020-11-27 赵辛 Artificial intelligence unblock system
CN112055013A (en) * 2020-09-01 2020-12-08 好活(昆山)网络科技有限公司 Automatic authentication method, device, equipment and storage medium
CN112861099A (en) * 2021-01-29 2021-05-28 深圳前海微众银行股份有限公司 Data processing method and device
CN113191286A (en) * 2021-05-08 2021-07-30 重庆紫光华山智安科技有限公司 Image data quality detection and tuning method, system, device and medium
CN113485668A (en) * 2021-05-17 2021-10-08 广州佰锐网络科技有限公司 Intelligent account opening method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
CN105718874A (en) * 2016-01-18 2016-06-29 北京天诚盛业科技有限公司 Method and device of in-vivo detection and authentication
CN107404381A (en) * 2016-05-19 2017-11-28 阿里巴巴集团控股有限公司 A kind of identity identifying method and device
CN108876374A (en) * 2018-06-29 2018-11-23 全链通有限公司 The network identity certificate authentication method and system of block chain
CN109034029A (en) * 2018-07-17 2018-12-18 新疆玖富万卡信息技术有限公司 Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body
CN109218269A (en) * 2017-07-05 2019-01-15 阿里巴巴集团控股有限公司 Identity authentication method, device, equipment and data processing method
CN109271915A (en) * 2018-09-07 2019-01-25 北京市商汤科技开发有限公司 False-proof detection method and device, electronic equipment, storage medium
CN109871780A (en) * 2019-01-28 2019-06-11 中国科学院重庆绿色智能技术研究院 A kind of face quality decision method, system and face identification method, system
CN109981525A (en) * 2017-12-27 2019-07-05 航天信息股份有限公司 Identity information authentication method, terminal, server and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
CN105718874A (en) * 2016-01-18 2016-06-29 北京天诚盛业科技有限公司 Method and device of in-vivo detection and authentication
CN107404381A (en) * 2016-05-19 2017-11-28 阿里巴巴集团控股有限公司 A kind of identity identifying method and device
CN109218269A (en) * 2017-07-05 2019-01-15 阿里巴巴集团控股有限公司 Identity authentication method, device, equipment and data processing method
CN109981525A (en) * 2017-12-27 2019-07-05 航天信息股份有限公司 Identity information authentication method, terminal, server and system
CN108876374A (en) * 2018-06-29 2018-11-23 全链通有限公司 The network identity certificate authentication method and system of block chain
CN109034029A (en) * 2018-07-17 2018-12-18 新疆玖富万卡信息技术有限公司 Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body
CN109271915A (en) * 2018-09-07 2019-01-25 北京市商汤科技开发有限公司 False-proof detection method and device, electronic equipment, storage medium
CN109871780A (en) * 2019-01-28 2019-06-11 中国科学院重庆绿色智能技术研究院 A kind of face quality decision method, system and face identification method, system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111191073A (en) * 2019-12-26 2020-05-22 深圳壹账通智能科技有限公司 Video and audio recognition method, device, storage medium and device
CN111402096A (en) * 2020-04-03 2020-07-10 广州云从鼎望科技有限公司 Online teaching quality management method, system, equipment and medium
CN111814732A (en) * 2020-07-23 2020-10-23 上海优扬新媒信息技术有限公司 Identity verification method and device
CN111814732B (en) * 2020-07-23 2024-02-09 度小满科技(北京)有限公司 Identity verification method and device
CN112055013A (en) * 2020-09-01 2020-12-08 好活(昆山)网络科技有限公司 Automatic authentication method, device, equipment and storage medium
CN112002042A (en) * 2020-09-02 2020-11-27 赵辛 Artificial intelligence unblock system
CN112861099A (en) * 2021-01-29 2021-05-28 深圳前海微众银行股份有限公司 Data processing method and device
CN113191286A (en) * 2021-05-08 2021-07-30 重庆紫光华山智安科技有限公司 Image data quality detection and tuning method, system, device and medium
CN113191286B (en) * 2021-05-08 2023-04-25 重庆紫光华山智安科技有限公司 Image data quality detection and optimization method, system, equipment and medium
CN113485668A (en) * 2021-05-17 2021-10-08 广州佰锐网络科技有限公司 Intelligent account opening method and system
CN113485668B (en) * 2021-05-17 2024-05-10 广州佰锐网络科技有限公司 Intelligent account opening method and system

Similar Documents

Publication Publication Date Title
CN110348378A (en) A kind of authentication method, device and storage medium
CN109726624B (en) Identity authentication method, terminal device and computer readable storage medium
CN111432233B (en) Method, apparatus, device and medium for generating video
CN111415677B (en) Method, apparatus, device and medium for generating video
CN105518708B (en) For verifying the method for living body faces, equipment and computer program product
CN108447159B (en) Face image acquisition method and device and entrance and exit management system
US20170049389A1 (en) Internet-Based Traditional Chinese Medical Science Health Consultation System
WO2020019591A1 (en) Method and device used for generating information
CN108197586A (en) Recognition algorithms and device
CN109614613A (en) The descriptive statement localization method and device of image, electronic equipment and storage medium
WO2021083069A1 (en) Method and device for training face swapping model
WO2020215722A1 (en) Method and device for video processing, electronic device, and computer-readable storage medium
CN109462603A (en) Voiceprint authentication method, equipment, storage medium and device based on blind Detecting
CN112866776B (en) Video generation method and device
CN113343831A (en) Method and device for classifying speakers in video, electronic equipment and storage medium
CN109740492A (en) A kind of identity identifying method and device
CN208351494U (en) Face identification system
CN110532957A (en) Face identification method and device, electronic equipment and storage medium
CN112241689A (en) Face recognition method and device, electronic equipment and computer readable storage medium
CN114616565A (en) Living body detection using audio-visual disparity
WO2020052062A1 (en) Detection method and device
US10425578B1 (en) Image capturing assistant
CN112286364A (en) Man-machine interaction method and device
CN110121105A (en) Editing video generation method and device
CN110321778A (en) A kind of face image processing process, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191018