CN110609970A - User identity identification method and device, storage medium and electronic equipment - Google Patents

User identity identification method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN110609970A
CN110609970A CN201910809615.1A CN201910809615A CN110609970A CN 110609970 A CN110609970 A CN 110609970A CN 201910809615 A CN201910809615 A CN 201910809615A CN 110609970 A CN110609970 A CN 110609970A
Authority
CN
China
Prior art keywords
information
identity
target user
user
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910809615.1A
Other languages
Chinese (zh)
Other versions
CN110609970B (en
Inventor
赵明明
刘立真
谢文珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dami Technology Co Ltd
Original Assignee
Beijing Dami Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dami Technology Co Ltd filed Critical Beijing Dami Technology Co Ltd
Priority to CN201910809615.1A priority Critical patent/CN110609970B/en
Publication of CN110609970A publication Critical patent/CN110609970A/en
Application granted granted Critical
Publication of CN110609970B publication Critical patent/CN110609970B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The embodiment of the application discloses a user identity identification method and device, a storage medium and electronic equipment, and belongs to the field of online education. The server acquires the face information and the identity of a target user in the target activity, inquires the associated identity in the database based on the face information, and generates first prompt information if the inquired identity is different from the acquired identity, wherein the first prompt information indicates that the user is an abnormal user, namely the target user uses other identities to participate in the target activity before, so that the same user is prevented from repeatedly referring to the target activity, and the processing overhead of the server is reduced.

Description

User identity identification method and device, storage medium and electronic equipment
Technical Field
The present application relates to the field of online education, and in particular, to a method and an apparatus for identifying a user identity, a storage medium, and an electronic device.
Background
With the development of the internet, online education is popular with more and more people, online education and scientific research is not limited to time and flexible in place, and skills of the online education and scientific research are fully improved. Compared with the traditional fixed classroom, the mobile classroom is more mobile and convenient, and the visual classroom has more visualization and more attractive in pictures and audio.
In the related technology, an online education platform provides a free audition function for a user, the user registers a login account through terminal equipment, the user logs in the online education platform through the login account after completing a registration process, and when the online education platform detects that the login account is a new account, the online education platform provides a free audition target activity for the user in a preset class.
Disclosure of Invention
According to the user identity identification method, the user identity identification device, the storage medium and the terminal in the target activity, the online education platform provides free audition service for new users, the online education platform can detect that the same user registers a plurality of accounts to conduct free audition, and processing overhead and operation cost of the online education platform are reduced. The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a method for identifying a user identity in a target activity, where the method includes:
acquiring facial information and a first identity of a user in a target activity; inquiring in a database associated with the target activity based on the face information, and reading a second identity associated with the face information if the identity associated with the face information is inquired in the database; if the first identity mark is different from the second identity mark, generating first prompt information; wherein the first prompt information indicates that the user is an abnormal user.
In a second aspect, an embodiment of the present application provides an apparatus for identifying a user identity in a target activity, where the apparatus includes:
the system comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring the face information of a target user and the identity of the target user in a target activity;
a query unit configured to query a database associated with the target activity based on the facial information;
the reading unit is used for reading the identification mark associated with the face image in the database if the identification mark associated with the face information is inquired in the database;
the prompting unit is used for generating first prompting information if the identification of the target user is different from the identification associated with the face information; wherein the first prompt information indicates that the target user is an abnormal user.
In a third aspect, embodiments of the present application provide a computer storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the above-mentioned method steps.
In a fourth aspect, an embodiment of the present application provides an electronic device, which may include: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the above-mentioned method steps.
The beneficial effects brought by the technical scheme provided by some embodiments of the application at least comprise:
the server acquires the face information and the identity of a target user in the target activity, inquires the associated identity in the database based on the face information, and generates first prompt information if the inquired identity is different from the acquired identity, wherein the first prompt information indicates that the user is an abnormal user, namely the target user uses other identities to participate in the target activity before, so that the same user is prevented from repeatedly referring to the target activity, and the processing overhead of the server is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a diagram of a network architecture provided by an embodiment of the present application;
fig. 2 is a schematic flowchart of a user identity recognition method according to an embodiment of the present application;
fig. 3 is another schematic flow chart of a user identification method according to an embodiment of the present application;
FIG. 4 is a timing diagram of a captured video stream provided by an embodiment of the present application;
fig. 5 is a user interface diagram of a terminal device provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of an apparatus according to an embodiment of the present disclosure;
fig. 7 is another schematic structural diagram of an apparatus provided herein.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 shows an exemplary system architecture 100 that can be applied to the user identification method or the user identification apparatus of the present application.
As shown in fig. 1, the system architecture 100 may include a first terminal device 100, a first network 101, a server 102, a second network 103, and a second terminal device 104. The first network 104 is used to provide a medium for a communication link between the first terminal device 101 and the server 102, and the second network 103 is used to provide a medium for a communication link between the second terminal device 104 and the server 102. The first network 101 and the second network 103 may include various types of wired or wireless communication links, such as: the wired communication link includes an optical fiber, a twisted pair wire, or a coaxial cable, and the WIreless communication link includes a bluetooth communication link, a WIreless-FIdelity (Wi-Fi) communication link, or a microwave communication link, etc.
The first terminal device 100 communicates with the second terminal device 104 through the first network 101, the server 102, the second network 103, the first terminal device 100 sends a message to the server 102, the server 102 forwards the message to the second terminal device 104, the second terminal device 104 sends the message to the server 102, the server 102 forwards the message to the second terminal device 100, thereby realizing communication between the first terminal device 100 and the second terminal device 104, and the message type interacted between the first terminal device 100 and the second terminal device 104 includes control data and service data.
In the present application, the first terminal device 100 is a terminal for students to attend class, and the second terminal device 104 is a terminal for teachers to attend class; or the first terminal device 100 is a terminal for the teacher to attend class and the second terminal device 104 is a terminal for the student to attend class. For example: the service data is a video stream, the first terminal device 100 acquires a first video stream in the course of the student through the camera, the second terminal device acquires a second video stream in the course of the teacher through the camera 104, the first terminal device 100 sends the first video stream to the server 102, the server 102 sends the first video stream to the second terminal device 104, and the second terminal device 104 displays the first video stream and the second video stream on the interface; the second terminal device 104 sends the second video stream to the server 102, the server 102 forwards the second video stream to the first terminal device 100, and the first terminal device 100 displays the first video stream and the second video stream.
The class mode of the application can be one-to-one or one-to-many, namely one teacher corresponds to one student or one teacher corresponds to a plurality of students. Correspondingly, in the one-to-one teaching mode, a terminal used for a teacher to attend a class and a terminal used for a student to attend the class are communicated; in the one-to-many teaching method, one terminal for a teacher to attend a class and a plurality of terminals for students to attend a class are communicated with each other.
Various communication client applications may be installed on the first terminal device 100 and the second terminal device 104, for example: video recording application, video playing application, voice interaction application, search application, instant messaging tool, mailbox client, social platform software, etc.
The first terminal device 100 and the second terminal device 104 may be hardware or software. When the terminal devices 101 to 103 are hardware, they may be various electronic devices with a display screen, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like. When the first terminal device 100 and the second terminal device 104 are software, they may be installed in the electronic devices listed above. Which may be implemented as multiple software or software modules (e.g., to provide distributed services) or as a single software or software module, and is not particularly limited herein.
When the first terminal device 100 and the second terminal device 104 are hardware, a display device and a camera may be further installed thereon, the display device may display various devices capable of implementing a display function, and the camera is used to collect a video stream; for example: the display device may be a Cathode ray tube (CR) display, a Light-emitting diode (LED) display, an electronic ink screen, a Liquid Crystal Display (LCD), a Plasma Display Panel (PDP), or the like. The user can view information such as displayed text, pictures, videos, and the like using the display devices on the first terminal device 100 and the second terminal device 104.
It should be noted that the user identification method provided in the embodiment of the present application is generally executed by the server 102, and accordingly, the user identification apparatus is generally disposed in the server 102. For example: the server 102 detects the eye state of the student in the first video stream acquired by the first terminal device 100 and the eye state of the teacher in the second video stream acquired by the second terminal device 104, and evaluates the teaching quality information according to the eye state of the student and the eye state of the teacher. In addition, when the time length of the student in the eye closing state exceeds the preset time length, the server 102 sends a prompt message to the first terminal device 100 to prompt the student to be inattentive; when the time length of the teacher in the eye-closing state exceeds the preset time length, the server 102 sends a prompt message to the second terminal device 104 to prompt the teacher that the teaching quality is not good.
The server 102 may be a server that provides various services, and the server 102 may be hardware or software. When the server 105 is hardware, it may be implemented as a distributed server cluster composed of a plurality of servers, or may be implemented as a single server. When the server 102 is software, it may be implemented as a plurality of software or software modules (for example, for providing distributed services), or may be implemented as a single software or software module, and is not limited in particular herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. Any number of terminal devices, networks, and servers may be used, as desired for implementation.
The user identification method provided by the embodiment of the present application will be described in detail below with reference to fig. 2 to 6. The user identification apparatus in the embodiment of the present application may be a server shown in fig. 2 to 6.
Referring to fig. 2, a flow chart of a user identity recognition method is provided in the embodiment of the present application. As shown in fig. 2, the method of the embodiment of the present application may include the steps of:
s201, acquiring the face information of the user and the identity of the user in the target activity.
Wherein the target activities represent virtual spaces created in a server of the online education platform, and the teacher gives one-to-one or one-to-many remote lectures to the user through the internet. The electronic device is pre-stored or pre-configured with a target activity name and time information of the target activity. For example: the start time, the end time, the duration of the target activity, etc. The electronic equipment can acquire an image including a user through the camera, then detect a face in the image according to a face detection algorithm, extract feature information of the face and generate face information, wherein the feature information comprises color information, texture information, position information and spatial position information. The user logs in the server by using the pre-registered login information, the server acquires the identity of the user according to the login information, the login information comprises a user name and a password, and the server ensures that the user name registered each time is different according to the pre-stored login information in the process of registering the login information.
The electronic device in the embodiment of the application can be a first terminal device used by a student or a server.
S202, inquiring in a database associated with the target activity based on the face information.
The electronic device is pre-stored or pre-configured with a database, the database stores face information and identification of students who have participated in the target activity within a preset time, the electronic device queries in the database by using the face information as an index, and the type of the database may be a relational database, for example: the database is a mysql database; the type of database may also be a non-relational database, such as: the database is a hash database.
S203, if the identity identification related to the face information is inquired in the database, reading the identity identification related to the face information in the database.
And if the identity associated with the face information is inquired, reading the identity associated with the face information in the database.
And S204, if the identity of the user is different from the identity associated with the face image, generating first prompt information.
And the electronic equipment generates first prompt information when the obtained identity identification according to the login information is different from the identity identification associated with the facial information stored in the database, wherein the first prompt information indicates that the student is an abnormal user, namely the student participates in the target activity.
When the scheme of the embodiment of the application is executed, the server acquires the face information and the identity of the target user in the target activity, inquires the associated identity in the database based on the face information, and generates the first prompt information if the inquired identity is different from the acquired identity, wherein the first prompt information indicates that the user is an abnormal user, namely the target user has used other identities to participate in the target activity before, so that the same user is prevented from repeatedly referring to the target activity, and the processing overhead of the server is reduced.
Referring to fig. 3, a schematic flow chart of a user identity recognition method is provided in the embodiment of the present application. The embodiment is exemplified by applying the user identification method to the server. The user identity identification method can comprise the following steps:
s301, receiving a login request sent by the first terminal device in response to the login operation of the target user.
The target user executes login operation on the first terminal device, wherein the login operation can be one or more of touch operation, mouse operation, keyboard operation, voice control operation or somatosensory operation. When detecting a login operation executed by a target user on a first terminal device, the terminal device generates a login request and sends the login request to a server, wherein the type of the login request is any one of an HTTP (hypertext transfer protocol) request, a TCP (transmission control protocol) request or a UDP (user datagram protocol) request. The login request carries login information, the login information is registered on the server in advance by a target user, and the login information comprises a user identifier and a login password.
For example: the method comprises the steps that an icon of an online education APP is displayed on first terminal equipment, after the first terminal equipment detects clicking operation on the icon, whether login information of the online education APP is stored locally or not is judged, and if yes, a login request carrying the login information is sent to a server; if the judgment result is negative, the first terminal device displays a login interface, the login interface comprises a login information input box, the first terminal device receives login information input by a user in the login information input box, then sends a login request carrying the login information to the server, and the server receives the login request from the first terminal device.
And S302, after the login information is verified to be correct, storing the login information, and returning a login success response to the first terminal equipment.
The server pre-stores login information of a target user, compares the pre-stored login information with login information in a received login request, determines that the login information in the received login request is correct if the pre-stored login information and the login information in the received login request are the same, records that the login information is in an online state, and returns a login success response to the first terminal device, wherein the login success response indicates that the first terminal device successfully logs in the server by using the login information, and the type of the login success response can be any one of an HTTP request, a TCP request and a UDP request. And if the server compares that the pre-stored login information is different from the login information in the received login request, the login information recorded on the server is kept in an offline state, the server returns a login failure response to the first terminal device, and the login failure response indicates that the first terminal device fails to login the server by using the login information.
In one or more embodiments, the trigger condition for the server to return the login failure response may be that a load on the server is greater than a preset load; or the number of users on the server is larger than the preset number; or when the resource residual quantity on the server is smaller than the preset threshold value, the server returns a login failure response to the first terminal equipment.
S303, creating a virtual space corresponding to the target activity, and adding the first terminal device into the virtual space.
The virtual space is equivalent to a group, after the terminal devices of the participants participating in the target activity join the virtual space, any one terminal sends a message in the virtual space, other terminals in the virtual space can receive the message, and the type of the message can be text, picture, voice or video. For example: the virtual space of the online education platform is a virtual classroom, after the virtual classroom is created by the server, the first terminal equipment (student role) and the second terminal equipment (teacher role) are added into the virtual space, the first terminal equipment in the virtual classroom can receive a second video stream from the second terminal equipment, the second terminal equipment can receive a first video stream from the first terminal equipment, the second video stream is acquired by the second terminal equipment through the audio acquisition device and the video acquisition device, and the first video stream is acquired by the first terminal equipment through the audio acquisition device and the video acquisition device.
S304, receiving a first video stream from the first terminal device, and pushing a second video stream from the second terminal device to the first terminal device.
The virtual space comprises a first terminal device and a second terminal device, and the server is responsible for forwarding messages from the first terminal device and the second terminal device. The method comprises the steps that a first terminal device acquires audio data by using an audio acquisition device (such as a microphone) and image data by using a video acquisition device (such as a camera), the audio data and the image data are combined to obtain a first video stream, the first video stream is sent to a server, and the server forwards the first video stream to a second terminal device in a virtual space; correspondingly, the server forwards the second video stream from the second terminal device to the first terminal device in the virtual space, so that the mutual communication between the first terminal device and the second terminal device is realized. The number of the first terminal devices in the virtual space may be one or more, and the number of the second terminal devices may also be one or more, which is not limited in the embodiments of the present application.
The server acquires the video stream in the same period, for example: referring to fig. 4, when the server detects that a preset class starting time is reached, a virtual classroom is created, a first terminal device and a second terminal device are added into the virtual classroom, the first terminal device starts to start a camera to acquire a first video stream, and the first video stream is sent to the server; and the second terminal equipment starts to start the camera to collect a second video stream and sends the second video stream to the server, wherein the first video stream and the second video stream are real-time continuous media streams. The server adopts the same period T2 to collect the video stream with the preset duration T1, the durations of T1 and T2 can be determined according to actual needs, and T0 is the initial moment of class.
S305, obtaining the identity of the target user according to the pre-stored login information.
The server records login information which is registered in advance, and records that each login information is in an online state or an offline state. The server acquires S301 login information used when the first terminal device logs in.
S306, extracting the face image of the target user according to the first video stream from the first terminal device, and identifying the face image to obtain the face information of the target user.
The target user logs in the server by using the first terminal device, the first video stream collected by the first terminal device comprises a face image of the target user, feature information in the face image is extracted to obtain face information, and the face information comprises one or more of color information, texture information, shape information and position information. The face information may be represented using feature vectors.
Referring to fig. 5, an interface schematic diagram of a first terminal device or a second terminal device is shown, and the first terminal device is taken as an example for explanation, the first terminal device is provided with a camera 50, when a class start time arrives, the camera adds the first terminal device and the second terminal device into a virtual classroom, instructs the camera 50 of the first terminal device to display a collected first video stream in a first window 51, and sends a second video stream collected by the camera of the second terminal device to the first terminal device, and displays the second video stream collected by the second terminal device in a second window 52 of the first terminal device. The interface of the first terminal device further comprises a chat window 53, a text input box 54 and a sending button 55, wherein the chat window is used for displaying chat records of the user of the first terminal device and the user of the second terminal device, the text input box user inputs information such as texts, pictures, videos and emoticons, and the sending button 55 is used for sending the information in the text input box 54. The second window 52 includes the facial image of the target user collected by the first terminal device, and the server extracts feature information of the facial image in the second window 52 to obtain facial information.
S307, the face information is processed based on the hash operation to obtain a hash value, and the address space indicated by the hash value is inquired in a database related to the target activity.
The hash algorithm used in the hash operation may be any one of the prior art, and the embodiment of the present application is not limited. And carrying out Hash operation on the face information to obtain a character string with a fixed length. The server is pre-stored or provided with a database, the database is related to the activity identification, and different activities are related to different databases. The index of the data stored in the database is a hash address, and is searched in an address space indicated by a hash value obtained by processing the face information based on a hash operation.
The database associated with the target activity stores facial information and identification of students who have participated in the target activity within a preset time length, and the preset time length can be determined according to actual needs.
S308, judging whether the identification associated with the face information is inquired.
If the query result is yes, executing S310; if the query result is negative, S309 is executed.
S309, the face information is associated with the identity of the target user and then written into the database.
The server determines that the target user is a student who participates in the target activity for the first time, calculates the face information based on the same hash algorithm used in S307 to obtain a hash value, and writes the identity into the address space indicated by the hash value.
S310, judging whether the user identification of the target user is the same as the inquired identity identification.
If the corresponding data is queried in the database, the server compares whether the user identifiers obtained in step S305 are the same as the user identifiers queried in the database, and if so, performs step S311; if not, go to step S312. The reason why the identification stored in the database in which the face information is an index is not identical to the identification acquired in S305 includes: the target user registers a plurality of different login information for a plurality of times so as to realize the trial listening of free courses provided by the online education platform for a plurality of times.
S311, generating first prompt information, displaying the first prompt information on the first terminal device, and stopping pushing the second video stream from the second terminal device to the first terminal device.
And S312, generating second prompt information.
And the second prompt message indicates that the target user has participated in the target activity and participates in the target activity server by using the same login message.
By implementing the embodiment of the application, the server acquires the face information and the identity of the target user in the target activity, inquires the associated identity in the database based on the face information, and generates the first prompt information if the inquired identity is different from the acquired identity, wherein the first prompt information indicates that the user is an abnormal user, namely the target user uses other identities to participate in the target activity before, so that the same user is prevented from repeatedly referring to the target activity, and the processing overhead of the server is reduced.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Referring to fig. 6, a schematic structural diagram of a user identification apparatus according to an exemplary embodiment of the present application is shown. Hereinafter referred to as the apparatus 6, the apparatus 6 may be implemented as all or a part of the terminal by software, hardware or a combination of both. The apparatus 6 comprises an obtaining unit 601, a querying unit 602, a reading unit 603 and a prompting unit 604.
An obtaining unit 601, configured to obtain face information of a target user and an identity of the target user in a target activity.
A query unit 602 configured to query a database associated with the target activity based on the facial information;
a reading unit 603, configured to read, if the database queries the identifier associated with the face information, the identifier associated with the face image in the database;
a prompting unit 604, configured to generate first prompting information if the identity of the target user is different from the identity associated with the facial information; wherein the first prompt information indicates that the target user is an abnormal user.
In one or more embodiments, the obtaining unit 601 is specifically configured to:
acquiring the identity of the target user according to pre-stored login information;
extracting a face image of the target user according to a first video stream from a first terminal device, and identifying the face image to obtain face information of the target user; and the first terminal equipment is the terminal equipment which is used by the target user to perform login operation by using the login information.
In one or more embodiments, the apparatus 6 further comprises:
the processing unit is used for receiving a login request sent by the first terminal equipment in response to the login operation of the target user; the login request carries login information, wherein the login information comprises a user identifier and a login password of the target user;
after the login information is verified to be correct, storing the login information, and returning a login success response to the first terminal equipment;
creating a virtual space corresponding to the target activity, and adding the first terminal equipment into the virtual space;
receiving a first video stream from the first terminal device, and pushing a second video stream from a second terminal device to the first terminal device.
In one or more embodiments, the apparatus 6 further comprises:
and the pushing unit is used for displaying the first prompt information on the first terminal equipment and stopping pushing the second video stream from the second terminal equipment to the first terminal equipment.
In one or more embodiments, the obtaining unit 601 is specifically configured to:
acquiring a facial image of a target user in a target activity, and identifying based on the facial image to obtain facial information;
and allocating an identity to the target user, and binding the facial information and the identity of the target user and then storing the facial information and the identity of the target user.
In one or more embodiments, the querying element 602 is specifically configured to:
the face information is processed based on a hash operation to obtain a hash value, and a query is made in a database associated with the target activity based on an address space indicated by the hash value.
In one or more embodiments, the apparatus 6 further comprises:
the writing unit is used for generating second prompt information if the identification of the target user is the same as the identification associated with the face information; wherein the second prompt information indicates that the student is a normal user; or
And if the identity identification associated with the face information does not exist in the database, the face information is associated with the identity identification of the target user and then written into the database.
It should be noted that, when the apparatus 6 provided in the foregoing embodiment executes the user identification method, only the division of the functional modules is illustrated, and in practical applications, the above functions may be distributed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the embodiments of the user identity recognition method provided by the above embodiments belong to the same concept, and details of the implementation process are found in the embodiments of the method, which are not described herein again.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The method comprises the steps that the device 7 obtains face information and an identity of a target user in the target activity, related identity is inquired in a database based on the face information, if the inquired identity is different from the obtained identity, first prompt information is generated, the first prompt information indicates that the user is an abnormal user, namely the target user uses other identities to participate in the target activity before, the same user is prevented from repeatedly referring to the target activity, and the processing overhead of a server is reduced.
An embodiment of the present application further provides a computer storage medium, where the computer storage medium may store a plurality of instructions, where the instructions are suitable for being loaded by a processor and executing the method steps in the embodiments shown in fig. 2 to 6, and a specific execution process may refer to specific descriptions of the embodiments shown in fig. 2 to 6, which are not described herein again.
The present application further provides a computer program product, which stores at least one instruction, and the at least one instruction is loaded and executed by the processor to implement the user identification method according to the above embodiments.
Fig. 7 is a schematic structural diagram of a user identification apparatus according to an embodiment of the present application, which is hereinafter referred to as an apparatus 7, where the apparatus 7 may be integrated in the aforementioned server, as shown in fig. 7, the apparatus includes: memory 702, processor 701, input device 703, output device 704, and a communication interface.
The memory 702 may be a separate physical unit, and may be connected to the processor 701, the memory 702, and the transceiver 703 via a bus. The memory 702, processor 701, transceiver 703 may also be integrated, implemented in hardware, etc.
The memory 702 is used for storing a program for implementing the above method embodiment, or various modules of the apparatus embodiment, and the processor 701 calls the program to perform the operations of the above method embodiment.
Wherein, the device 7 may further include an input device and an output device, the input device including but not limited to a keyboard, a mouse, a touch panel, a camera and a microphone; the output device includes, but is not limited to, a display screen.
Communication interfaces are used to send and receive various types of messages and include, but are not limited to, wireless interfaces or wired interfaces.
Alternatively, when part or all of the distributed task scheduling method of the above embodiments is implemented by software, the apparatus may also include only a processor. The memory for storing the program is located outside the device and the processor is connected to the memory by means of circuits/wires for reading and executing the program stored in the memory.
The processor may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of a CPU and an NP.
The processor may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
The memory may include volatile memory (volatile memory), such as random-access memory (RAM); the memory may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a Hard Disk Drive (HDD) or a solid-state drive (SSD); the memory may also comprise a combination of memories of the kind described above.
Wherein, the processor 701 calls the program code in the memory 702 for executing the following steps:
acquiring face information of a target user in a target activity and an identity of the target user;
querying a database associated with the target activity based on the facial information;
if the identification mark associated with the face information is inquired in the database, reading the identification mark associated with the face image in the database;
if the identity of the target user is different from the identity associated with the facial information, generating first prompt information; wherein the first prompt information indicates that the target user is an abnormal user.
In one or more embodiments, the processor 701 performs the acquiring of the facial information of the target user and the identity of the target user in the target activity, including:
acquiring the identity of the target user according to the login information prestored in the memory 702;
instructing the transceiver 703 to extract a facial image of the target user from the first video stream from the first terminal device, and to perform recognition based on the facial image to obtain facial information of the target user; and the first terminal equipment is the terminal equipment which is used by the target user to perform login operation by using the login information.
In one or more embodiments, processor 701 is further configured to perform:
instructing the transceiver 703 to receive a login request sent by the first terminal device in response to the login operation of the target user; the login request carries login information, wherein the login information comprises a user identifier and a login password of the target user;
after the login information is verified to be correct, storing the login information in a memory 702, and returning a login success response to the first terminal device;
creating a virtual space corresponding to the target activity, and adding the first terminal equipment into the virtual space;
the transceiver 703 is instructed to receive a first video stream from the first terminal device and to push a second video stream from a second terminal device to the first terminal device.
In one or more embodiments, the first prompt message is displayed on the first terminal device, and the second video stream from the second terminal device is stopped from being pushed to the first terminal device.
In one or more embodiments, the processor 701 performs the acquiring of the facial information of the target user and the identity of the target user in the target activity, including:
acquiring a facial image of a target user in a target activity, and identifying based on the facial image to obtain facial information;
and allocating an identity to the target user, and binding the facial information and the identity of the target user and then storing the facial information and the identity of the target user.
In one or more embodiments, processor 701 performs the querying in the database associated with the target activity based on the facial information, including:
the face information is processed based on a hash operation to obtain a hash value, and a query is made in a database associated with the target activity based on an address space indicated by the hash value.
In one or more embodiments, processor 701 is further configured to perform:
if the identity of the target user is the same as the identity associated with the facial information, generating second prompt information; wherein the second prompt information indicates that the student is a normal user; or
And if the identity identification associated with the face information does not exist in the database, the face information is associated with the identity identification of the target user and then written into the database.
The embodiment of the application also provides a computer storage medium, which stores a computer program, and the computer program is used for executing the user identity identification method provided by the embodiment.
The embodiment of the present application further provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the user identification method provided by the above embodiment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

Claims (10)

1. A method for identifying a user, the method comprising:
acquiring face information of a target user in a target activity and an identity of the target user;
querying a database associated with the target activity based on the facial information;
if the identification mark associated with the face information is inquired in the database, reading the identification mark associated with the face image in the database;
if the identity of the target user is different from the identity associated with the facial information, generating first prompt information; wherein the first prompt information indicates that the target user is an abnormal user.
2. The method of claim 1, wherein the obtaining facial information of a target user and an identity of the target user in a target activity comprises:
acquiring the identity of the target user according to pre-stored login information;
extracting a face image of the target user according to a first video stream from a first terminal device, and identifying the face image to obtain face information of the target user; and the first terminal equipment is the terminal equipment which is used by the target user to perform login operation by using the login information.
3. The method of claim 2, wherein before the obtaining the identity of the target user according to the pre-stored login information, the method further comprises:
receiving a login request sent by first terminal equipment in response to the login operation of the target user; the login request carries login information, wherein the login information comprises a user identifier and a login password of the target user;
after the login information is verified to be correct, storing the login information, and returning a login success response to the first terminal equipment;
creating a virtual space corresponding to the target activity, and adding the first terminal equipment into the virtual space;
receiving a first video stream from the first terminal device, and pushing a second video stream from a second terminal device to the first terminal device.
4. The method of claim 3, wherein generating the first prompt message if the identity of the target user is different from the identity associated with the facial information further comprises:
and displaying the first prompt message on the first terminal equipment, and stopping pushing a second video stream from the second terminal equipment to the first terminal equipment.
5. The method of claim 1, wherein the obtaining facial information of a target user and an identity of the target user in a target activity comprises:
acquiring a facial image of a target user in a target activity, and identifying based on the facial image to obtain facial information;
and allocating an identity to the target user, and binding the facial information and the identity of the target user and then storing the facial information and the identity of the target user.
6. The method of any of claims 1 to 4, wherein the querying in a database associated with the target activity based on the facial information comprises:
the face information is processed based on a hash operation to obtain a hash value, and a query is made in a database associated with the target activity based on an address space indicated by the hash value.
7. The method of claim 5, further comprising:
if the identity of the target user is the same as the identity associated with the facial information, generating second prompt information; wherein the second prompt information indicates that the student is a normal user; or
And if the identity identification associated with the face information does not exist in the database, the face information is associated with the identity identification of the target user and then written into the database.
8. An apparatus for identifying a user, the apparatus comprising:
the system comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring the face information of a target user and the identity of the target user in a target activity;
a query unit configured to query a database associated with the target activity based on the facial information;
the reading unit is used for reading the identification mark associated with the face image in the database if the identification mark associated with the face information is inquired in the database;
the prompting unit is used for generating first prompting information if the identification of the target user is different from the identification associated with the face information; wherein the first prompt information indicates that the target user is an abnormal user.
9. A computer storage medium, characterized in that it stores a plurality of instructions adapted to be loaded by a processor and to carry out the method steps according to any one of claims 1 to 7.
10. An electronic device, comprising: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method steps of any of claims 1 to 7.
CN201910809615.1A 2019-08-29 2019-08-29 User identity identification method and device, storage medium and electronic equipment Active CN110609970B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910809615.1A CN110609970B (en) 2019-08-29 2019-08-29 User identity identification method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910809615.1A CN110609970B (en) 2019-08-29 2019-08-29 User identity identification method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110609970A true CN110609970A (en) 2019-12-24
CN110609970B CN110609970B (en) 2022-06-07

Family

ID=68889842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910809615.1A Active CN110609970B (en) 2019-08-29 2019-08-29 User identity identification method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110609970B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327719A (en) * 2020-02-11 2020-06-23 腾讯科技(深圳)有限公司 Service processing method, device, service server and medium
CN111400510A (en) * 2020-03-18 2020-07-10 腾讯音乐娱乐科技(深圳)有限公司 Data archiving processing method, device, equipment and readable storage medium
CN112463817A (en) * 2020-11-24 2021-03-09 深圳市新系区块链技术有限公司 Mask information processing method and related equipment thereof
CN113971196A (en) * 2021-08-13 2022-01-25 荣耀终端有限公司 Push information processing method and terminal equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303712A (en) * 2007-05-10 2008-11-12 上海银晨智能识别科技有限公司 Method for preventing enthrallment network game through human face recognition
CN102082775A (en) * 2009-11-27 2011-06-01 中国移动通信集团公司 Method, device and system for managing subscriber identity
US20130291093A1 (en) * 2012-04-26 2013-10-31 Google Inc. Automatic user swap
US20140237576A1 (en) * 2013-01-29 2014-08-21 Tencent Technology (Shenzhen) Company Limited User authentication method and apparatus based on audio and video data
CN105100029A (en) * 2014-05-22 2015-11-25 阿里巴巴集团控股有限公司 Method and device for user identity verification
CN106778144A (en) * 2017-02-26 2017-05-31 王田 Electronic equipment and method with identification function
CN107485858A (en) * 2017-08-28 2017-12-19 昆明理工大学 A kind of network game indulging verification method
CN107786487A (en) * 2016-08-24 2018-03-09 腾讯科技(深圳)有限公司 A kind of authentification of message processing method, system and relevant device
CN108734514A (en) * 2018-05-07 2018-11-02 北京科码先锋互联网技术股份有限公司 User's normalizing method
CN109240489A (en) * 2018-08-10 2019-01-18 广东小天才科技有限公司 User's switching method, device, terminal and the medium of learning machine

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303712A (en) * 2007-05-10 2008-11-12 上海银晨智能识别科技有限公司 Method for preventing enthrallment network game through human face recognition
CN102082775A (en) * 2009-11-27 2011-06-01 中国移动通信集团公司 Method, device and system for managing subscriber identity
US20130291093A1 (en) * 2012-04-26 2013-10-31 Google Inc. Automatic user swap
US20140237576A1 (en) * 2013-01-29 2014-08-21 Tencent Technology (Shenzhen) Company Limited User authentication method and apparatus based on audio and video data
CN105100029A (en) * 2014-05-22 2015-11-25 阿里巴巴集团控股有限公司 Method and device for user identity verification
CN109257366A (en) * 2014-05-22 2019-01-22 阿里巴巴集团控股有限公司 The method and apparatus that authentication is carried out to user
CN107786487A (en) * 2016-08-24 2018-03-09 腾讯科技(深圳)有限公司 A kind of authentification of message processing method, system and relevant device
CN106778144A (en) * 2017-02-26 2017-05-31 王田 Electronic equipment and method with identification function
CN107485858A (en) * 2017-08-28 2017-12-19 昆明理工大学 A kind of network game indulging verification method
CN108734514A (en) * 2018-05-07 2018-11-02 北京科码先锋互联网技术股份有限公司 User's normalizing method
CN109240489A (en) * 2018-08-10 2019-01-18 广东小天才科技有限公司 User's switching method, device, terminal and the medium of learning machine

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327719A (en) * 2020-02-11 2020-06-23 腾讯科技(深圳)有限公司 Service processing method, device, service server and medium
CN111327719B (en) * 2020-02-11 2021-03-26 腾讯科技(深圳)有限公司 Service processing method, device, service server and medium
CN111400510A (en) * 2020-03-18 2020-07-10 腾讯音乐娱乐科技(深圳)有限公司 Data archiving processing method, device, equipment and readable storage medium
CN111400510B (en) * 2020-03-18 2024-02-27 腾讯音乐娱乐科技(深圳)有限公司 Data archiving processing method, device, equipment and readable storage medium
CN112463817A (en) * 2020-11-24 2021-03-09 深圳市新系区块链技术有限公司 Mask information processing method and related equipment thereof
CN113971196A (en) * 2021-08-13 2022-01-25 荣耀终端有限公司 Push information processing method and terminal equipment

Also Published As

Publication number Publication date
CN110609970B (en) 2022-06-07

Similar Documents

Publication Publication Date Title
CN110570698B (en) Online teaching control method and device, storage medium and terminal
CN110609970B (en) User identity identification method and device, storage medium and electronic equipment
US11171893B2 (en) Methods and systems for providing virtual collaboration via network
CN110673777A (en) Online teaching method and device, storage medium and terminal equipment
CN107316520B (en) Video teaching interaction method, device, equipment and storage medium
CN105448149B (en) Interaction and immediate feedback system and method in a kind of teaching
US20200289947A1 (en) Message push method and apparatus, device, and storage medium
CN109844717A (en) The system and method that real time remote for mobile applications controls
CN111405224B (en) Online interaction control method and device, storage medium and electronic equipment
WO2014183427A1 (en) Method and apparatus for displaying webcast rooms
CN111510659B (en) Online interaction method and device, storage medium and electronic equipment
CN110677685B (en) Network live broadcast display method and device
CN112135196A (en) Online live broadcast teaching interaction method, device, system, equipment and storage medium
CN112292708A (en) Device demonstration with real-time feedback
US9369536B1 (en) Event-based user behavior timeline, predictions, and recommendations
CN103297858A (en) Smart television user state displaying system and smart television user state displaying method
CN106411703A (en) Information synchronization method and apparatus
CN111507754A (en) Online interaction method and device, storage medium and electronic equipment
CN113747247B (en) Live broadcast method, live broadcast device, computer equipment and storage medium
JP2016021178A (en) Associated topic display control device, associated topic display control method, and program
CN112769919A (en) Push flow task distribution method and device, storage medium and electronic equipment
CN114244793B (en) Information processing method, device, equipment and storage medium
CN113420133B (en) Session processing method, device, equipment and storage medium
CN114745594A (en) Method and device for generating live playback video, electronic equipment and storage medium
CN113938697A (en) Virtual speech method and device in live broadcast room and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant