CN110348378A - A kind of authentication method, device and storage medium - Google Patents
A kind of authentication method, device and storage medium Download PDFInfo
- Publication number
- CN110348378A CN110348378A CN201910617306.4A CN201910617306A CN110348378A CN 110348378 A CN110348378 A CN 110348378A CN 201910617306 A CN201910617306 A CN 201910617306A CN 110348378 A CN110348378 A CN 110348378A
- Authority
- CN
- China
- Prior art keywords
- audio
- authentication
- reference object
- video flow
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention relates to a kind of authentication method and devices, this method comprises: obtaining audio/video flow;In vivo detection and face alignment processing are executed to audio/video flow, judge whether the reference object in audio/video flow is user to be certified;Speech recognition is carried out to the content that the reference object in audio/video flow is read aloud, whether the content and the authentication content read aloud described in judgement are consistent;If the reference object in the audio/video flow is the user to be certified, and the content that the reference object is read aloud is consistent with the authentication content, then confirms the user authentication success to be certified.The embodiment of the present invention can be realized remote authentication, reach certification scene without user, the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile verification process is instructed without staff, is not only reduced the uncertainty manually instructed and is linked up cost, also reduces human cost, bring more considerable economic benefit.
Description
Technical field
The invention belongs to authentication techniques fields, and in particular to a kind of authentication method, device and storage medium.
Background technique
Existing certificate scheme needs to authenticate people and comes certification scene, carries out under the guidance for the staff for being familiar with business
Certification.Existing certificate scheme has the following deficiencies: that certification requires manual intervention, low efficiency every time;Certification people needs to come
Scene, the time is wasted in mostly to be authenticated in unrelated distance;As certification number increases, the staff needed also increases, at
This height.
Summary of the invention
For above-mentioned problems of the prior art, the purpose of the present invention is to provide the avoidable appearance of one kind is above-mentioned extremely
The authentication method and device of small part technological deficiency.
On the one hand, a kind of authentication method is provided, comprising:
Audio/video flow is obtained, the audio/video flow includes the audio stream and video flowing that reference object reads aloud authentication content;
In vivo detection and face alignment processing are executed to the audio/video flow, judge the reference object in the audio/video flow
It whether is user to be certified;
The authentication content is obtained, and speech recognition is carried out to the content that the reference object in the audio/video flow is read aloud,
Whether the content read aloud described in judgement is consistent with the authentication content;
If reference object in the audio/video flow is the user to be certified, and the content that the reference object is read aloud
It is consistent with the authentication content, then confirm the user authentication success to be certified.
Further, the audio/video flow that obtains includes: the audio/video flow for receiving client and sending.
Further, the acquisition audio/video flow includes:
Video flowing is obtained, Face datection is carried out to video flowing, judges the face figure that whether there is reference object in video flowing
Picture;
Facial image if it exists then shows the authentication content, and when the reference object reads aloud the authentication content
Record the audio/video flow.
Further, during recording audio/video stream in the current audio/video flow of real-time detection facial image quality;
If detecting, face is lost or the quality of facial image is lower than threshold value, terminates this recording.
Further, the method also includes:
Prompt information is exported, prompt information is used to that the quality of facial image to be prompted to lose lower than threshold value or face;
Restart to record.
Further, the mode for showing authentication content text is scrolling display text, and the rolling speed of text is according to true
People reads aloud what speed data average value obtained.
It on the other hand, can be with another authentication method, comprising:
Video flowing is obtained, Face datection is carried out to video flowing, judges the face figure that whether there is reference object in video flowing
Picture;
Facial image if it exists then shows the authentication content, and records the reference object and read aloud the protocol authentication
The audio/video flow of content;
The audio/video flow recorded and completed is sent to server, the audio/video flow is for the server to the bat
It takes the photograph object and carries out protocol authentication.
Further, the method also includes:
The authentication result that the server is sent is received, the authentication result is used to indicate the reference object;
Show the authentication result.
On the other hand, a kind of authentication device is additionally provided, comprising:
Module is obtained, for obtaining audio/video flow, the audio/video flow includes the audio that reference object reads aloud authentication content
Stream and video flowing;
In vivo detection and face alignment module, for executing In vivo detection and face alignment processing, judgement to audio/video flow
Whether the reference object in the audio/video flow is user to be certified;;
Speech recognition module is carried out for obtaining authentication content, and to the content that the reference object in audio/video flow is read aloud
Speech recognition judges whether the content read aloud is consistent with authentication content;
Authentication module, if for the reference object in audio/video flow be user to be certified, and reference object read aloud it is interior
Appearance is consistent with authentication content, then confirms user authentication success to be certified.
On the other hand, another authentication device is additionally provided, comprising:
Face detection module carries out Face datection to video flowing, judges to whether there is in video flowing for obtaining video flowing
The facial image of reference object;
Display module then shows authentication content for facial image if it exists;
Module is recorded, the audio/video flow of the protocol authentication content is read aloud for recording the reference object;
Video sending module, for sending the audio/video flow recorded and completed to server, audio/video flow is used for server pair
Reference object is authenticated.
A kind of electronic equipment, including processor and memory, the memory is for storing instruction;Described instruction is described
For executing the authentication method of any of the above-described aspect description when processor is run.
A kind of storage medium, is stored with program instruction on said storage, and described program instruction is used at runtime
Execute the authentication method of any of the above-described aspect description.
Authentication method provided by the invention and device, by carrying out In vivo detection and people to the reference object in audio/video flow
Face identification, and speech recognition is carried out to the content that reference object is read aloud, it can be realized remote authentication, it is existing to reach certification without user
, the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile verification process without
It needs staff to instruct, not only reduce the uncertainty manually instructed and links up cost, also reduce human cost, bring
More considerable economic benefit.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
It is clear that alternatively, Partial Feature and advantage can deduce from specification or unambiguously determine, or pass through implementation
The embodiment of the present invention understands.The objectives and other advantages of the invention can be by written specification, claims and attached
Specifically noted structure is achieved and obtained in figure.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in invention, for those of ordinary skill in the art, without creative efforts,
It is also possible to obtain other drawings based on these drawings.
Fig. 1 is the authentication method flow chart that the present invention discloses an embodiment;
Fig. 2 is the authentication method flow chart that the present invention discloses another embodiment;
Fig. 3 is the authentication method flow chart that the present invention discloses another embodiment;
Fig. 4 is the structural schematic diagram for the authentication device that the present invention discloses one embodiment;
Fig. 5 is the structural schematic diagram for the authentication device that the present invention discloses another embodiment;
Fig. 6 is the structural block diagram for the client that the present invention discloses an embodiment;
Fig. 7 is the structural block diagram for the server end that the present invention discloses an embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawing and specific implementation
The present invention will be further described for example.It should be appreciated that described herein, specific examples are only used to explain the present invention, and does not have to
It is of the invention in limiting.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
In the embodiment of the present invention, client can include but is not limited to mobile terminal (such as mobile phone, E-book reader),
Wearable device, tablet computer, laptop or desktop computer etc..
In one embodiment, a kind of authentication method 10 is provided, which can be by client executing, can also
To be executed by server.As shown in Figure 1, this method 10 includes S11~S14.
S11 obtains audio/video flow, and audio/video flow includes the audio stream and video flowing that reference object reads aloud authentication content.
S12 executes In vivo detection and face alignment to audio/video flow and handles, and judges whether is reference object in audio/video flow
For user to be certified.
Comparison is executed to audio/video flow, can recognize that whether reference object is user to be certified.Audio/video flow is executed
In vivo detection processing, can judge whether the reference object in audio/video flow is true man, rather than use the living body of photo, video etc.
Attack, can be improved the security performance in verification process.It should be understood that the present embodiment handles execution In vivo detection and face alignment
Tandem not limit, execute face alignment after In vivo detection can be first carried out, held after face alignment can also be first carried out
Row In vivo detection, may also be performed simultaneously In vivo detection and face alignment.
S13 obtains authentication content, and carries out speech recognition, judgement to the content that the reference object in audio/video flow is read aloud
Whether the content read aloud is consistent with authentication content.
Authentication content can be stored in advance in client or the storage equipment of server, can also will be recognized by server
Card content is sent in client, or authentication content is sent in server by client.
S14, if reference object in audio/video flow is user to be certified, and in the reference object content and certification read aloud
Hold unanimously, then confirms user authentication success to be certified.
By carrying out In vivo detection and recognition of face to the reference object in audio/video flow, and in reading aloud to reference object
Hold and carry out speech recognition, can be realized remote authentication, reaches certification scene without user, the user experience is improved, improves and recognizes
Efficiency is demonstrate,proved, the needs of practical application can be met well.Meanwhile verification process is instructed without staff, is not only reduced
The uncertainty and communication cost manually instructed, also reduces human cost, brings more considerable economic benefit.
When this method 10 is executed by server, server can receive the audio/video flow of its upload from client in S11.
When this method 10 is executed by server, client can connect from image capture module (such as camera etc.) in S11
The audio/video flow is received, the audio/video flow can also be obtained using following steps S111 and S112:
S111 obtains video flowing, carries out Face datection to video flowing, judges the people that whether there is reference object in video flowing
Face image;
S112, facial image, then show authentication content, and the recording when reference object reads aloud protocol authentication content if it exists
Audio/video flow.
By carrying out Face datection to video flowing automatically, and shown in certification determining there are in the case where facial image
Appearance and recording audio/video stream instruct without staff, realize self-service certification.
In another embodiment, a kind of authentication method 20 is provided, which can be by client executing.Such as figure
Shown in 2, this method 20 includes S21~S23.
S21 obtains video flowing, carries out Face datection to video flowing, judges the people that whether there is reference object in video flowing
Face image;
S22, facial image, then show authentication content if it exists;
S23 records the audio/video flow that reference object reads aloud authentication content;
S24, the audio/video flow recorded and completed is sent to server, and audio/video flow recognizes reference object for server
Card.
Optionally, in S22 or S23, prompt information can also be exported, to prompt reference object to start to read aloud in certification
Hold.For example, can start to read aloud authentication content by playing voice messaging and/or Word message prompting personnel to be certified.
The present embodiment is uploaded audio/video flow by the audio/video flow in client recording user to be verified for certification
To server, user to be verified is authenticated according to the audio/video flow by server, can be realized remote authentication, is not necessarily to user
Certification scene is reached, the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile
Verification process is instructed without staff, is not only reduced the uncertainty manually instructed and is linked up cost, also reduces manpower
Cost brings more considerable economic benefit.
In addition, being authenticated according to the audio/video flow to user to be verified by server, reduce the processing number of client
According to can reduce requirement of the client to computing capability, to advantageously reduce the hardware cost of client.
Optionally, method 20 can also include:
The authentication result that server is sent is received, authentication result is used to indicate whether reference object authenticates success;
Show authentication result.
Client can be in the display screen display authentication result of itself, other that can also be client connection are aobvious
Show and shows authentication result in equipment.
That is, authentication result can be fed back to client after server authentication, client can show this
Whether authentication result informs user's authenticated success.The mistake that server verifies user to be verified according to audio/video flow
Journey can refer to the associated description of method 10, and which is not described herein again.
It optionally, can also be real during recording audio/video stream in some embodiments of method 10 or method 20
When detect the quality of facial image in current audio/video flow, if detecting, face is lost or the quality of facial image is lower than threshold
Value, then terminate this recording.The quality that can guarantee the audio/video flow recorded in this way is avoided since face is lost or face figure
The quality of picture is lower, and can not accurately carry out In vivo detection and face alignment processing.
Optionally, method 10 or method 20 can also include: output prompt information, and prompt information is for prompting facial image
Quality lost lower than threshold value or face, and/or, prompt information is for prompting reference object shift position and/or adjustment shooting
Luminous environment in scene;And after the prefixed time interval of output prompt information, restart to record.It is used by automatic prompt
Family enables to user to adjust position or luminous environment etc. to meet shooting quality requirement.
In some embodiments, authentication content is text.Correspondingly, the mode for showing authentication content can be scrolling display
Text, the rolling speed of text can read aloud speed data average value according to true man and obtain.For example, acquisition certain amount (such as 1
Ten thousand) true man read aloud speed data, speed data then is read aloud to all true man of acquisition and does average treatment, is averaged work
For rolling speed.
Certainly, the mode for showing authentication content may be static status display, i.e., all shows authentication content in display screen
Deng display equipment on, if authentication content is more, can also be shown in the form of page turning on multiple pages.
Face datection and facial image matter can be carried out using the method based on neural network model in the embodiment of the present invention
Amount detection, the training process of neural network model the following steps are included:
(a): the facial image of acquisition certain amount (such as 100,000) is stored in bottom library;
(b): face key point is carried out to facial image collected and is precisely marked, including but not limited to: the profile point of face,
Eye contour point, nose profile point, eyebrow outline point, forehead profile point, upper lip profile point, lower lip profile point etc.;
(c): accurate labeled data is divided into training set, verifying collection and test set by a certain percentage;
(d): neural network model being trained using training set, while with verifying collection to the intermediate knot in training process
Fruit verify and adjusting training parameter in real time, and when training precision and verifying precision all reach certain threshold value, pause was trained
Journey;
(e): trained neural network model being tested with test set, measures the performance of the model, if the model
Performance meet application demand condition, then terminate entirely to train process, if the performance of the neural network model be unsatisfactory for using need
Condition is sought, then turns to step (d).
Face critical point detection is carried out to image based on neural network model, obtains real-time face key point information and people
Face attribute information (such as quality of human face image), can Face datection and quality of human face image detection.
Below with reference to Fig. 3, the authentication method of one embodiment of the invention is described, the authentication method is from client and server
Interactive angle describes verification process, and this method includes the following contents.
Step (100): the authentication function of the real-time face identification of user's open system.
Step (101): configuration informations such as authentication contents are sent client by server end.
The configuration informations such as authentication content are stored in the memory module of server end, are adjusted from memory module when needed
Take the configuration informations such as authentication content.
Client can send the request for pulling the configuration informations such as authentication content to server end, and server receives
Configuration information is recalled from memory module after the request, is subsequently transmitted to client.
Step (102): the image capture module (such as camera etc.) of client opens preview video stream, obtains preview view
Frequency data frame;The video flowing in preview video stream, that is, image capture module acquisition current shooting visual field.
Step (103): carrying out Face datection to video flowing, judges the face figure that whether there is reference object in video flowing
Picture.
Preview video data frame can be inputted in the face detection module of client, people is carried out to preview video data frame
Face detection (such as can carry out Face datection according to face key point information), judges in preview video data frame with the presence or absence of people
Face image;If there is facial image, then it represents that personnel to be certified have been positioned in the shooting visual field of image capture module;
Step (104): facial image if it exists then shows authentication content, and reads aloud protocol authentication content in reference object
When recording audio/video stream.
Facial image if it exists, then authentication content display module (such as word extractor or display screen etc.) display of client is recognized
Content text is demonstrate,proved, image capture module starts recording audio/video stream, and personnel to be certified is prompted to start to read aloud authentication content text.
It optionally, can be with the matter of facial image in the current audio/video flow of real-time detection during recording audio/video stream
Amount.If detected in recording process face lose or quality of human face image lower than threshold value (such as facial image is fuzzy causes
Facial image clarity is lower than situations such as preset clarity threshold), then terminate this recording, and export prompt information;
Prompt information is used to that the quality of facial image to be prompted to lose lower than threshold value or face;Prompt information can for sound, light or other
Display reminding mode, such as prompt information is exported in such a way that display is shown or loudspeaker plays audio, prompt shooting pair
Angle, distance or the position etc. of video camera are faced as adjusting;Then restart to record.
After restarting recording, authentication content text can be shown again, and personnel to be certified read aloud again from the beginning
Authentication content text, and in the current audio/video flow of real-time detection facial image quality, until authentication content text is by complete bright
It runs through, records and complete;
Step (105): client sends the audio/video flow recorded and completed;Client will record the sound completed
After video stream data is compressed and handled (as encrypted), it is uploaded to server.
Step (106): server receives audio/video flow, carries out the processing such as speech recognition, In vivo detection, face alignment, right
Processing result carries out authentication content inspection, and provides authentication result.Specifically, executing In vivo detection and face ratio to audio/video flow
To processing, judge whether the reference object in audio/video flow is user to be certified;And authentication content is obtained, and to audio-video
The content that reference object in stream is read aloud carries out speech recognition, judges whether the content read aloud is consistent with authentication content;
If reference object in audio/video flow is user to be certified, and the content read aloud of reference object and authentication content one
It causes, then confirms user authentication success to be certified.
Step (107): client receives the authentication result that server end is sent, and authentication result, which is used to indicate reference object, is
Deny demonstrate,proving successfully;And show authentication result.
Server end sends client for authentication result and is shown, and client receives the certification knot that server end is sent
Fruit, and shown.Can show authentication result on the display screen of client, can also connect with client its
Authentication result is shown on his display module (such as display screen etc.).
Fig. 4 show the structural schematic diagram of the authentication device 400 of one embodiment of the invention.As shown in figure 4, authentication device
400 include:
Module 410 is obtained, for obtaining audio/video flow, audio/video flow includes the audio stream that reference object reads aloud authentication content
And video flowing;
In vivo detection and face alignment module 420 are sentenced for executing In vivo detection and face alignment processing to audio/video flow
Whether the reference object in staccato video flowing is user to be certified;
Speech recognition module 430, the content for reading aloud the reference object in audio/video flow carry out speech recognition, judgement
Whether the content read aloud is consistent with authentication content;
Authentication module 440 is user to be certified for the reference object in audio/video flow, and reference object is read aloud
Under content and authentication content unanimous circumstances, user authentication success to be certified is confirmed.
The authentication device of the present embodiment by carrying out In vivo detection and recognition of face to the reference object in audio/video flow, and
Speech recognition is carried out to the content that reference object is read aloud, can be realized remote authentication, certification scene is reached without user, improves
User experience improves authentication efficiency, can meet the needs of practical application well.Meanwhile verification process is not necessarily to work people
Member's guidance not only reduces the uncertainty manually instructed and links up cost, also reduces human cost, bring more considerable
Economic benefit.
Authentication device 400 can be server, or client.
When authentication device 400 is server, obtains module 410 and be specifically used for receiving its audio-video uploaded from client
Stream.
When authentication device 400 is client, obtains module 410 and specifically include: video acquiring module, Face datection mould
Block, display module and recording module (not shown).Wherein, video acquiring module is for obtaining video flowing;Face datection mould
Block is used to carry out Face datection to video flowing, judges the facial image that whether there is reference object in video flowing;Display module is used
In determining there are in the case where facial image, authentication content is shown;Module is recorded, for reading aloud protocol authentication in reference object
Recording audio/video stream when content.
It should be understood that authentication device 400 according to embodiments of the present invention is for executing authentication method according to an embodiment of the present invention
10 corresponding steps please refer to corresponding contents above, and which is not described herein again.
Fig. 5 show the structural schematic diagram of the authentication device 500 of another embodiment of the present invention.As shown in figure 5, device 500
Include:
Face detection module 510 judges in video flowing for carrying out Face datection to the video flowing of acquisition with the presence or absence of bat
Take the photograph the facial image of object;
Display module 520, for showing authentication content there are facial image;
Module 530 is recorded, the audio/video flow of protocol authentication content is read aloud for recording reference object;
Sending module 540, for sending the audio/video flow recorded and completed to server, audio/video flow is for server to bat
It takes the photograph object and carries out protocol authentication.
The present embodiment is uploaded audio/video flow by the audio/video flow in client recording user to be verified for certification
To server, user to be verified is authenticated according to the audio/video flow by server, can be realized remote authentication, is not necessarily to user
Certification scene is reached, the user experience is improved, improves authentication efficiency, can meet the needs of practical application well.Meanwhile
Verification process is instructed without staff, is not only reduced the uncertainty manually instructed and is linked up cost, also reduces manpower
Cost brings more considerable economic benefit.
In addition, being authenticated according to the audio/video flow to user to be verified by server, reduce the processing number of client
According to can reduce requirement of the client to computing capability, to advantageously reduce the hardware cost of client.
Optionally, device 500 can also include: receiving module (not shown), for receiving recognizing for server transmission
Card is as a result, authentication result is used to indicate whether reference object authenticates success.Correspondingly, display module 520 can be also used for showing
Authentication result.
It should be understood that authentication device 500 according to embodiments of the present invention is for executing authentication method according to an embodiment of the present invention
20 corresponding steps please refer to corresponding contents above, and which is not described herein again.
In addition, authentication device 400 and authentication device 500 can also include picture quality detection module (not shown),
For during recording module recording audio/video stream in the current audio/video flow of real-time detection facial image quality, if detection
It is lost to face or the quality of facial image is lower than threshold value, then terminate this recording.
Term " module " is not intended to be limited to specific physical form.Depending on concrete application, module be can be implemented as firmly
Part, firmware, software and/or combination thereof.In addition, different modules can share common component or even be realized by same components.
May exist between disparate modules or there is no clear boundaries.
Those of ordinary skill in the art may be aware that mould described in conjunction with the examples disclosed in the embodiments of the present disclosure
Block and method and step can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.In some embodiments, it as shown in fig. 6, client 1000 includes processor 1100 and memory 1200, deposits
Reservoir 1200 is for storing instruction;For executing method 10 when instruction is run by processor 1100.
In some embodiments, as shown in fig. 7, server end 2000 includes processor 2100 and memory 2200, storage
Device 2200 is for storing instruction;For executing method 20 when instruction times processor 2100 is run.
Processor 2100 and processor 1100 can be central processor CPU, Micro-processor MCV etc..2200 He of memory
Memory 1200 can be the nonvolatile memory of ROM (read-only memory), RAM (random access memory), such as hard disk
Deng.
It is well known by those skilled in the art that the development of the electronic information technology with such as large scale integrated circuit technology
With the trend of hardware and software, clearly to divide computer system soft and hardware boundary has seemed relatively difficult.Because general
For, operation can both be realized by software, can also be realized by hardware.Generally, the execution of instruction both can be by hard
Part is completed, and can also equally be completed by software.Hardware implementations or software realization side are used for a certain machine function
Case depends on the Non-technical factors such as price, speed, reliability, memory capacity, change cycle.For the technician, soft
Part implementation and hardware implementation mode are equivalent.Technical staff can according to need selection software or hardware is above-mentioned to realize
Scheme.Therefore, specific software or hardware are not limited here.
The present invention can be equipment, method and/or computer program product.Computer program product may include computer
Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment
Equipment.Computer readable storage medium for example may be-but not limited to-storage device electric, magnetic storage apparatus, optical storage
Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium
More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits
It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable
Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon
It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above
Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to
It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire
Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/
Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network
Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway
Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted
Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment
In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs,
Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages
The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as
Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer
Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one
Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part
Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind
It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit
It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions
Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can
Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the invention
Face.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/
Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/
Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas
The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas
When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced
The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to
It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction
Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram
The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other
In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce
Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment
Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
One module of table, program segment or a part of instruction, the module, program segment or a part of instruction include one or more use
The executable instruction of the logic function as defined in realizing.In some implementations as replacements, function marked in the box
It can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be held substantially in parallel
Row, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or
The combination of each box in flow chart and the box in block diagram and or flow chart, can the function as defined in executing or dynamic
The dedicated hardware based system made is realized, or can be realized using a combination of dedicated hardware and computer instructions.It is right
For those skilled in the art it is well known that, by hardware mode realize, by software mode realize and pass through software and
It is all of equal value that the mode of combination of hardware, which is realized,.
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other
At least part of the sub-step or stage of step or other steps executes in turn or alternately.
Embodiments of the present invention above described embodiment only expresses, the description thereof is more specific and detailed, but can not
Therefore limitations on the scope of the patent of the present invention are interpreted as.It should be pointed out that for those of ordinary skill in the art,
Without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection model of the invention
It encloses.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (12)
1. a kind of authentication method characterized by comprising
Audio/video flow is obtained, the audio/video flow includes the audio stream and video flowing that reference object reads aloud authentication content;
In vivo detection and face alignment processing are executed to the audio/video flow, judge whether is reference object in the audio/video flow
For user to be certified;
The content read aloud to the reference object in the audio/video flow carries out speech recognition, the content read aloud described in judgement with it is described
Whether authentication content is consistent;
If reference object in the audio/video flow is the user to be certified, and the content read aloud of the reference object and institute
It is consistent to state authentication content, then confirms the user authentication success to be certified.
2. authentication method according to claim 1, which is characterized in that the acquisition audio/video flow includes: reception client
The audio/video flow sent.
3. authentication method according to claim 1, which is characterized in that the acquisition audio/video flow includes:
Video flowing is obtained, Face datection is carried out to video flowing, judges the facial image that whether there is reference object in video flowing;
Facial image if it exists then shows the authentication content, and the recording when the reference object reads aloud the authentication content
The audio/video flow.
4. authentication method according to claim 3, which is characterized in that real-time detection is worked as during recording audio/video stream
The quality of facial image in preceding audio/video flow;
If detecting, face is lost or the quality of facial image is lower than threshold value, terminates this recording.
5. authentication method according to claim 4, which is characterized in that the method also includes:
Prompt information is exported, prompt information is used to that the quality of facial image to be prompted to lose lower than threshold value or face, and/or, it is described
Prompt information is used to prompt the reference object adjustment position and/or adjust the luminous environment in photographed scene;
Restart to record.
6. authentication method according to claim 3, which is characterized in that show the mode of authentication content for scrolling display text
Word, the rolling speed of text are to read aloud speed data average value according to true man to obtain.
7. a kind of authentication method characterized by comprising
Video flowing is obtained, Face datection is carried out to the video flowing, judges the face figure that whether there is reference object in video flowing
Picture;
Facial image if it exists then shows the authentication content, and records the sound that the reference object reads aloud the authentication content
Video flowing;
The audio/video flow recorded and completed is sent to server, the audio/video flow is for the server to the shooting pair
As being authenticated.
8. authentication method according to claim 7, which is characterized in that the method also includes:
The authentication result that the server is sent is received, the authentication result is used to indicate whether the reference object authenticates into
Function;
Show the authentication result.
9. a kind of authentication device characterized by comprising
Obtain module, for obtaining audio/video flow, the audio/video flow include reference object read aloud authentication content audio stream and
Video flowing;
In vivo detection and face alignment module, the audio/video flow for obtaining to the acquisition module execute In vivo detection and face
Comparison processing, judges whether the reference object in the audio/video flow is user to be certified;;
Speech recognition module, the content that the reference object in audio/video flow for obtaining to the acquisition module is read aloud carry out language
Sound identification, judges whether the content read aloud is consistent with authentication content;
Authentication module, for the reference object in the audio/video flow be user to be certified, and reference object read aloud it is interior
Hold and under authentication content unanimous circumstances, confirms user authentication success to be certified.
10. a kind of authentication device characterized by comprising
Face detection module carries out Face datection to video flowing for obtaining video flowing, judges in video flowing with the presence or absence of shooting
The facial image of object;
Display module then shows authentication content for facial image if it exists;
Module is recorded, the audio/video flow of the authentication content is read aloud for recording the reference object;
Sending module, for sending the audio/video flow recorded and completed to server, the audio/video flow is used for the server pair
The reference object is authenticated.
11. a kind of electronic equipment, including processor and memory, which is characterized in that the memory is for storing instruction;It is described
For executing such as method of any of claims 1-8 when instruction is run by the processor.
12. a kind of storage medium, which is characterized in that be stored with program instruction on said storage, described program instruction exists
For executing method as claimed in any one of claims 1 to 8 when operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910617306.4A CN110348378A (en) | 2019-07-10 | 2019-07-10 | A kind of authentication method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910617306.4A CN110348378A (en) | 2019-07-10 | 2019-07-10 | A kind of authentication method, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110348378A true CN110348378A (en) | 2019-10-18 |
Family
ID=68176837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910617306.4A Pending CN110348378A (en) | 2019-07-10 | 2019-07-10 | A kind of authentication method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110348378A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111191073A (en) * | 2019-12-26 | 2020-05-22 | 深圳壹账通智能科技有限公司 | Video and audio recognition method, device, storage medium and device |
CN111402096A (en) * | 2020-04-03 | 2020-07-10 | 广州云从鼎望科技有限公司 | Online teaching quality management method, system, equipment and medium |
CN111814732A (en) * | 2020-07-23 | 2020-10-23 | 上海优扬新媒信息技术有限公司 | Identity verification method and device |
CN112002042A (en) * | 2020-09-02 | 2020-11-27 | 赵辛 | Artificial intelligence unblock system |
CN112055013A (en) * | 2020-09-01 | 2020-12-08 | 好活(昆山)网络科技有限公司 | Automatic authentication method, device, equipment and storage medium |
CN112861099A (en) * | 2021-01-29 | 2021-05-28 | 深圳前海微众银行股份有限公司 | Data processing method and device |
CN113191286A (en) * | 2021-05-08 | 2021-07-30 | 重庆紫光华山智安科技有限公司 | Image data quality detection and tuning method, system, device and medium |
CN113485668A (en) * | 2021-05-17 | 2021-10-08 | 广州佰锐网络科技有限公司 | Intelligent account opening method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103021045A (en) * | 2011-09-25 | 2013-04-03 | 边高伟 | Intelligent entrance guard system for mobile terminal user verification |
CN105718874A (en) * | 2016-01-18 | 2016-06-29 | 北京天诚盛业科技有限公司 | Method and device of in-vivo detection and authentication |
CN107404381A (en) * | 2016-05-19 | 2017-11-28 | 阿里巴巴集团控股有限公司 | A kind of identity identifying method and device |
CN108876374A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | The network identity certificate authentication method and system of block chain |
CN109034029A (en) * | 2018-07-17 | 2018-12-18 | 新疆玖富万卡信息技术有限公司 | Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body |
CN109218269A (en) * | 2017-07-05 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Identity authentication method, device, equipment and data processing method |
CN109271915A (en) * | 2018-09-07 | 2019-01-25 | 北京市商汤科技开发有限公司 | False-proof detection method and device, electronic equipment, storage medium |
CN109871780A (en) * | 2019-01-28 | 2019-06-11 | 中国科学院重庆绿色智能技术研究院 | A kind of face quality decision method, system and face identification method, system |
CN109981525A (en) * | 2017-12-27 | 2019-07-05 | 航天信息股份有限公司 | Identity information authentication method, terminal, server and system |
-
2019
- 2019-07-10 CN CN201910617306.4A patent/CN110348378A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103021045A (en) * | 2011-09-25 | 2013-04-03 | 边高伟 | Intelligent entrance guard system for mobile terminal user verification |
CN105718874A (en) * | 2016-01-18 | 2016-06-29 | 北京天诚盛业科技有限公司 | Method and device of in-vivo detection and authentication |
CN107404381A (en) * | 2016-05-19 | 2017-11-28 | 阿里巴巴集团控股有限公司 | A kind of identity identifying method and device |
CN109218269A (en) * | 2017-07-05 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Identity authentication method, device, equipment and data processing method |
CN109981525A (en) * | 2017-12-27 | 2019-07-05 | 航天信息股份有限公司 | Identity information authentication method, terminal, server and system |
CN108876374A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | The network identity certificate authentication method and system of block chain |
CN109034029A (en) * | 2018-07-17 | 2018-12-18 | 新疆玖富万卡信息技术有限公司 | Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body |
CN109271915A (en) * | 2018-09-07 | 2019-01-25 | 北京市商汤科技开发有限公司 | False-proof detection method and device, electronic equipment, storage medium |
CN109871780A (en) * | 2019-01-28 | 2019-06-11 | 中国科学院重庆绿色智能技术研究院 | A kind of face quality decision method, system and face identification method, system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111191073A (en) * | 2019-12-26 | 2020-05-22 | 深圳壹账通智能科技有限公司 | Video and audio recognition method, device, storage medium and device |
CN111402096A (en) * | 2020-04-03 | 2020-07-10 | 广州云从鼎望科技有限公司 | Online teaching quality management method, system, equipment and medium |
CN111814732A (en) * | 2020-07-23 | 2020-10-23 | 上海优扬新媒信息技术有限公司 | Identity verification method and device |
CN111814732B (en) * | 2020-07-23 | 2024-02-09 | 度小满科技(北京)有限公司 | Identity verification method and device |
CN112055013A (en) * | 2020-09-01 | 2020-12-08 | 好活(昆山)网络科技有限公司 | Automatic authentication method, device, equipment and storage medium |
CN112002042A (en) * | 2020-09-02 | 2020-11-27 | 赵辛 | Artificial intelligence unblock system |
CN112861099A (en) * | 2021-01-29 | 2021-05-28 | 深圳前海微众银行股份有限公司 | Data processing method and device |
CN113191286A (en) * | 2021-05-08 | 2021-07-30 | 重庆紫光华山智安科技有限公司 | Image data quality detection and tuning method, system, device and medium |
CN113191286B (en) * | 2021-05-08 | 2023-04-25 | 重庆紫光华山智安科技有限公司 | Image data quality detection and optimization method, system, equipment and medium |
CN113485668A (en) * | 2021-05-17 | 2021-10-08 | 广州佰锐网络科技有限公司 | Intelligent account opening method and system |
CN113485668B (en) * | 2021-05-17 | 2024-05-10 | 广州佰锐网络科技有限公司 | Intelligent account opening method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110348378A (en) | A kind of authentication method, device and storage medium | |
CN109726624B (en) | Identity authentication method, terminal device and computer readable storage medium | |
CN111432233B (en) | Method, apparatus, device and medium for generating video | |
CN111415677B (en) | Method, apparatus, device and medium for generating video | |
CN105518708B (en) | For verifying the method for living body faces, equipment and computer program product | |
CN108447159B (en) | Face image acquisition method and device and entrance and exit management system | |
US20170049389A1 (en) | Internet-Based Traditional Chinese Medical Science Health Consultation System | |
WO2020019591A1 (en) | Method and device used for generating information | |
CN108197586A (en) | Recognition algorithms and device | |
CN109614613A (en) | The descriptive statement localization method and device of image, electronic equipment and storage medium | |
WO2021083069A1 (en) | Method and device for training face swapping model | |
WO2020215722A1 (en) | Method and device for video processing, electronic device, and computer-readable storage medium | |
CN109462603A (en) | Voiceprint authentication method, equipment, storage medium and device based on blind Detecting | |
CN112866776B (en) | Video generation method and device | |
CN113343831A (en) | Method and device for classifying speakers in video, electronic equipment and storage medium | |
CN109740492A (en) | A kind of identity identifying method and device | |
CN208351494U (en) | Face identification system | |
CN110532957A (en) | Face identification method and device, electronic equipment and storage medium | |
CN112241689A (en) | Face recognition method and device, electronic equipment and computer readable storage medium | |
CN114616565A (en) | Living body detection using audio-visual disparity | |
WO2020052062A1 (en) | Detection method and device | |
US10425578B1 (en) | Image capturing assistant | |
CN112286364A (en) | Man-machine interaction method and device | |
CN110121105A (en) | Editing video generation method and device | |
CN110321778A (en) | A kind of face image processing process, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191018 |