CN111241501B - Identity authentication method and device, electronic equipment and storage medium - Google Patents

Identity authentication method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111241501B
CN111241501B CN202010033473.7A CN202010033473A CN111241501B CN 111241501 B CN111241501 B CN 111241501B CN 202010033473 A CN202010033473 A CN 202010033473A CN 111241501 B CN111241501 B CN 111241501B
Authority
CN
China
Prior art keywords
verified
map
password
user
preset storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010033473.7A
Other languages
Chinese (zh)
Other versions
CN111241501A (en
Inventor
杨强
梅林海
刘权
陈志刚
王智国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
iFlytek Co Ltd
Original Assignee
iFlytek Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by iFlytek Co Ltd filed Critical iFlytek Co Ltd
Priority to CN202010033473.7A priority Critical patent/CN111241501B/en
Publication of CN111241501A publication Critical patent/CN111241501A/en
Application granted granted Critical
Publication of CN111241501B publication Critical patent/CN111241501B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The embodiment of the invention provides an identity authentication method, an identity authentication device, electronic equipment and a storage medium, wherein the method comprises the following steps: determining a storage position to be verified in a map to be verified; determining a character string to be verified; and generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified. The method, the device, the electronic equipment and the storage medium provided by the embodiment of the invention consider the characteristic that the image information and the regular information are convenient to memorize, carry out the identity authentication by combining the storage position to be authenticated and the character string to be authenticated, reduce the memory difficulty of a user, improve the one-time passing rate and the authentication efficiency of the identity authentication and simultaneously ensure the security of the identity authentication.

Description

Identity authentication method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of identity authentication technologies, and in particular, to an identity authentication method and apparatus, an electronic device, and a storage medium.
Background
The password set by the user is usually a combination of numbers, letters and symbols. The password is used for carrying out the identity authentication of the user in a preset and later-period authentication mode, so that the information security of the user is protected.
With the increasing prominence of information security problems, users can only improve security by increasing the length and complexity of passwords. The long and complicated password is easily mistaken or forgotten, which increases the difficulty of authentication and causes inconvenience to users.
Disclosure of Invention
The embodiment of the invention provides an identity authentication method, an identity authentication device, electronic equipment and a storage medium, which are used for solving the problem of high identity authentication difficulty caused by too complicated passwords.
In a first aspect, an embodiment of the present invention provides an identity authentication method, including:
determining a storage position to be verified in a map to be verified;
determining a character string to be verified;
and generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified.
Preferably, the determining a storage location to be verified in the map to be verified specifically includes:
displaying a plurality of candidate maps;
receiving a map to be verified selected by a user from the plurality of candidate maps;
and if the map to be verified is a preset storage map, determining a storage position to be verified in the map to be verified.
Preferably, the determining a storage location to be verified in the storage map to be verified specifically includes:
displaying a prompt question corresponding to a preset storage position;
receiving a user answer returned by the user aiming at the prompt question;
adjusting the size of a preset storage area in the map to be verified based on the user answer and the prompt answer corresponding to the prompt question; the preset storage area is associated with the preset storage position;
and receiving a storage position to be verified selected by the user based on the preset storage area.
Preferably, the displaying of the prompt question corresponding to the preset storage location specifically includes:
displaying a plurality of candidate areas of the map to be verified;
receiving a region to be verified selected by a user from the plurality of candidate regions;
and if the area to be verified is a preset storage area, displaying a prompt question corresponding to the preset storage position.
Preferably, the displaying of the prompt question corresponding to the preset storage location further includes, before the displaying,:
determining a map area of the preset storage position in a preset storage map;
performing target detection on the map area to obtain map feature information of the preset storage position;
and inputting the map characteristic information into a question generation model to obtain the prompt question output by the question generation model and a prompt answer corresponding to the prompt question.
Preferably, the generating a password to be verified based on the storage location to be verified and the character string to be verified, and performing identity verification based on the password to be verified specifically includes:
and if the storage position to be verified is a preset storage position, generating a password to be verified corresponding to the character string to be verified, and performing identity verification based on the password to be verified.
Preferably, the generating of the password to be verified corresponding to the character string to be verified specifically includes:
generating a password segment corresponding to the character string to be verified and any password generation algorithm based on any password generation algorithm in a plurality of password generation algorithms corresponding to the preset storage position;
and determining the password to be verified corresponding to the character string to be verified based on the character string to be verified and the password fragment corresponding to each password generation algorithm.
In a second aspect, an embodiment of the present invention provides an identity authentication apparatus, including:
the position determining unit is used for determining a storage position to be verified in the map to be verified;
the character string determining unit is used for determining a character string to be verified;
and the password verification unit is used for generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified.
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor, a communication interface, a memory, and a bus, where the processor and the communication interface, the memory complete mutual communication through the bus, and the processor may call a logic command in the memory to perform the steps of the method provided in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the method as provided in the first aspect.
According to the identity authentication method, the identity authentication device, the electronic equipment and the storage medium, the characteristic that the image information and the regular information are convenient to memorize is considered, the identity authentication is carried out in a mode of combining the storage position to be authenticated and the character string to be authenticated, the user memory difficulty is reduced, the one-time passing rate of the identity authentication and the authentication efficiency are improved, and meanwhile the identity authentication safety can be guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of an identity authentication method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a method for determining a storage location to be verified according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a method for determining a storage location to be verified according to another embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating a process of displaying a prompt question according to an embodiment of the present invention;
fig. 5 is a schematic flow chart of a method for generating a prompt question according to an embodiment of the present invention;
fig. 6 is a schematic flowchart of a password generation method to be verified according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
With the increasing prominence of information security problems, how to improve the security of passwords becomes a problem generally concerned by users. The conventional mode of improving the security by increasing the length and the complexity of the password can lead a user to easily remember the password by mistake or forget the password, so that the practicability of the password is greatly sacrificed, the authentication difficulty is increased, and a great deal of inconvenience is brought to the user.
Therefore, the embodiment of the invention provides the identity authentication method, which improves the practicability of the identity authentication method while ensuring the safety and is simple and convenient to implement. Fig. 1 is a schematic flow chart of an identity authentication method according to an embodiment of the present invention, as shown in fig. 1, the method includes:
step 110, determining a storage location to be verified in the map to be verified.
Step 120, determining a character string to be verified.
And step 130, generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified.
Specifically, before executing the identity authentication method, the user needs to select a preset storage location in a preset storage map in advance, and set a user personalized character string, so that the authentication end generates a user password according to the preset storage location and the user personalized character string.
Here, the preset storage map is a map for storing a user password, and the preset storage location is a location selected by the user in the preset storage map for storing the user password. The user personalized character string may be a character string arbitrarily input by the user, such as a character string easy to remember, for example, a birthday of the user, favorite dishes of the user, favorite poems of the user, and the like. After the preset storage location and the user personalized character string are determined, a user password can be generated based on the preset storage location and the user personalized character string, and the user password is stored in the preset storage location. The generated user password combines the information of the preset storage position and the user personalized character string, and is relatively complex and extremely high in safety.
Although the user password is difficult to memorize, it is easy to memorize the preset storage location for acquiring the user password since human thinking has an inherent advantage for memorizing the like information. In addition, the user personalized character string for generating the user password is a character string which is set by the user, has regularity and is easy to memorize, the memory difficulty is low, the user can easily memorize the preset storage position and the user personalized character string, the storage position to be verified and the character string to be verified are respectively determined according to the preset storage position and the user personalized character string in the memory, the password to be verified is generated at any time based on the storage position to be verified and the character string to be verified, and high-safety identity verification is realized based on the password to be verified.
In step 110, the map to be verified is a map for identity verification, where the map to be verified may be a preset stored map, or may be one map that is selected by the user from multiple maps provided by the verification end and may be the preset stored map, and this is not specifically limited in the embodiment of the present invention.
The storage location to be verified is a certain location which is considered by the user selected from the map to be verified as possibly being a preset storage location. The user can know the preset storage position preset by the user through the memory of the image information, and in the process of identity authentication, the preset storage position in the memory is selected in the map to be authenticated as the storage position to be authenticated, and the specific mode for selecting the storage position to be authenticated can be that the user directly inputs the name of the storage position to be authenticated, or the user clicks a certain position in the map to be authenticated as the storage position to be authenticated.
In step 120, the character string to be verified, i.e., the character string used for authentication, is a character string that the user considers to be possibly the preset user personalized character string according to the user personalized character string preset in the memory.
It should be noted that, in the embodiment of the present invention, the execution order of step 110 and step 120 is not specifically limited, and step 110 may be executed before or after step 120, or may be executed synchronously with step 120.
In step 130, after receiving the storage location to be verified and the character string to be verified input by the user, generating a password to be verified based on a password generation method the same as the user password generation method, and performing identity verification by comparing the password to be verified and the user password; the storage location to be verified and the preset storage location may also be compared, and the character string to be verified and the user personalized character string may also be compared, if the storage location to be verified is consistent with the preset storage location, and the character string to be verified is consistent with the user personalized character string, the user password is directly used as the password to be verified for identity verification, which is not specifically limited in the embodiment of the present invention.
It should be noted that the method provided in the embodiment of the present invention may be used not only for authentication, but also for storage and extraction of a password or other important information, and at this time, the password to be authenticated generated based on the storage location to be authenticated and the character string to be authenticated may be replaced with the pre-stored important information.
The method provided by the embodiment of the invention considers the characteristic that the image information and the regular information are convenient to memorize, and carries out the identity verification by combining the storage position to be verified and the character string to be verified, thereby reducing the memory difficulty of the user, improving the one-time passing rate and the verification efficiency of the identity verification and simultaneously ensuring the security of the identity verification.
Based on the foregoing embodiment, fig. 2 is a schematic flowchart of a method for determining a storage location to be verified according to an embodiment of the present invention, and as shown in fig. 2, step 110 specifically includes:
and step 111-1, displaying a plurality of candidate maps.
And step 111-2, receiving a map to be verified selected by a user from a plurality of candidate maps.
Specifically, the verification end may pre-store a large number of candidate maps, and when identity verification is required, select and display a plurality of candidate maps from the large number of candidate maps, so that a user may select a to-be-verified map, which may be a preset stored map in memory, from the plurality of candidate maps provided by the verification end for subsequent identity verification.
Here, one of the candidate maps is necessarily a preset stored map, and the map to be verified selected by the user may or may not be the preset stored map.
And step 111-3, if the map to be verified is the preset storage map, determining the storage position to be verified in the map to be verified.
Specifically, after the map to be verified is determined, verifying the map to be verified based on a preset storage map, and if the map to be verified is the preset storage map, determining that the map to be verified passes verification, and prompting a user to select a specific storage position to be verified in the map to be verified; and if the map to be verified is not the preset storage map, determining that the map to be verified fails to be verified, and prompting the user to reselect or informing the user of verification failure.
For example, the verification end provides maps of three scenes as selectable maps, namely a desert scene, a rainforest scene and a snowfield scene, and the user selects the map of the desert scene as a preset storage map when setting the password. During identity authentication, the authentication end displays the maps of the three scenes for the user to select, if the user selects the map of the desert scene as the map to be authenticated, the authentication is passed, and the user is prompted to select a storage position to be authenticated in the map of the desert scene; and if the user selects the map of the rainforest scene, prompting the user that the verification fails.
Based on any of the above embodiments, the verification end may store a large number of maps in advance, and set a map label for each map, where the map label specifically includes user identity information, a map name, and a map attribute, where the user identity information, that is, a user ID, is used to uniquely label a user, the map name is used to distinguish the map, so that the user can find a preset storage map from the large number of maps, and the map attribute is used to distinguish the preset storage map from other maps, for example, the map attribute may be set to 0 or 1, where 1 represents the preset storage map and 0 represents other maps. And after the map to be verified is obtained, if the map attribute of the map to be verified is 1, determining that the map to be verified is the preset storage map, and otherwise, determining that the map to be verified is not the preset storage map.
In the process of identity authentication, a user may forget the name or specific location of a preset storage location, and only an approximate area of the preset storage location in a map can be determined, so that a correct preset storage location cannot be directly determined as a storage location to be authenticated. Based on any of the above embodiments, fig. 3 is a schematic flowchart of a method for determining a storage location to be verified according to another embodiment of the present invention, and as shown in fig. 3, step 110 specifically includes:
and 112-1, displaying a prompt question corresponding to the preset storage position.
And step 112-2, receiving a user answer returned by the user for the prompt question.
Here, the preset storage location is a specific location for storing the user password in a preset storage map set by the user when setting the user password. For a preset storage position, a corresponding prompt question can be preset, and after a prompt question display button clicked by a user is detected, the prompt question corresponding to the preset storage position can be displayed; or, the prompt question corresponding to the preset storage position can be directly displayed in a default manner without detecting whether the user clicks a prompt question display button. The prompt question is used for prompting a user to input a map feature at a preset storage position. For example, the prompt question may be whether the preset storage location is in the upper left corner or the lower right corner of the map, or whether the color of the preset storage location is red or green. The user can input a corresponding answer, namely the user answer, aiming at the prompt question provided by the verification end.
Step 112-3, adjusting the size of a preset storage area in the map to be verified based on the user answers and the prompt answers corresponding to the prompt questions; the preset storage area is associated with a preset storage location.
And 112-4, receiving the storage position to be verified selected by the user based on the preset storage area.
Here, the prompted answer is an answer preset for the prompted question.
The preset storage area is an area in the map to be verified, and the preset storage area is associated with a preset storage location, specifically, the preset storage location may be included in the preset storage area, or the preset storage location may be set in a position adjacent to the preset storage area. The existence of the preset storage area can prompt a user to preset an approximate range which can be set by the storage position.
And after the user answer is obtained, verifying the user answer based on the prompt answer, and if the user answer is consistent with the prompt answer, passing the verification of the user answer and reducing the current preset storage area. The reduction of the preset storage area reduces the possible set approximate range of the preset storage position, and can help a user to more easily locate the correct preset storage position; if the user answer is different from the prompt answer, the user answer is not verified, the current preset storage area is enlarged, the approximate range which can be set by the preset storage position is enlarged, the difficulty of positioning the preset storage position by the user is increased, and the risk that the preset storage position is stolen is reduced.
After the size of the preset storage area is adjusted, the user can position the storage position to be verified from the map to be verified according to the adjusted prompt of the preset storage area.
According to the method provided by the embodiment of the invention, the adjustment of the preset storage area is realized through prompting problems, so that the user who forgets the specific position of the preset storage position is helped to realize user verification under the relevant prompt, and the practicability of identity verification is further improved.
Based on any of the above embodiments, fig. 4 is a schematic diagram of a display flow of a prompt question provided by an embodiment of the present invention, as shown in fig. 4, step 112-1 specifically includes:
and step 112-11, displaying a plurality of candidate areas of the map to be verified.
And step 112-12, receiving a selected area to be verified from the plurality of candidate areas by the user.
And step 112-13, if the area to be verified is the preset storage area, displaying a prompt question corresponding to the preset storage position.
Specifically, the candidate area is a randomly selected area in the map to be verified. In the process of determining the storage location to be verified, the verification end may select a plurality of candidate areas from the map to be verified, where the plurality of candidate areas have a preset storage area.
The user can select a candidate area which is possibly the preset storage area from the plurality of candidate areas as the area to be verified according to the plurality of candidate areas displayed by the verification end and the approximate position of the preset storage position in the map to be verified in the memory.
After the area to be verified selected by the user is obtained, verifying the area to be verified based on the preset storage area, if the area to be verified is the preset storage area, determining that the area to be verified passes verification, and displaying a prompt problem corresponding to the preset storage position to adjust the size of the area to be verified, so that the refined positioning of the preset storage position is realized; otherwise, determining that the verification of the area to be verified fails, and prompting the user to select an error.
The method provided by the embodiment of the invention is beneficial to the user to roughly position the preset storage position from the region so as to improve the efficiency of positioning the preset storage position by the user.
Based on any of the embodiments, for the preset storage map, the verifying end may pre-divide a plurality of candidate regions, and set a region tag of each candidate region, where the region tag specifically includes a region name, a region position, and region feature information, where the region name is used to distinguish the candidate regions, so that a user may find the preset storage region from the plurality of candidate regions, the region position is used to indicate a position of the candidate region in the preset storage map, for example, coordinates of a lower left corner and an upper right corner of the candidate region, and the region feature information is used to characterize a feature object included in the candidate region, a relative position relationship of the feature object, and the like.
For any candidate region, the verification end can highlight the candidate region through the region position of the candidate region stored in advance so as to prompt the user to pay attention to the candidate region, and can generate a corresponding prompt problem through the region characteristic information of the candidate region so as to assist the user in carrying out region positioning.
Based on any of the above embodiments, fig. 5 is a schematic flow chart of a method for generating a prompt question according to an embodiment of the present invention, as shown in fig. 5, before step 112-1, the method further includes:
and step 112-01, determining a map area of the preset storage position in the preset storage map.
And 112-02, carrying out target detection on the map area to obtain map characteristic information of a preset storage position.
And step 112-03, inputting the map feature information into the question generation model to obtain a prompt question output by the question generation model and a prompt answer corresponding to the prompt question.
Specifically, the map area of the preset storage location in the preset storage map may be determined according to a preset map area division rule, for example, the map area may be a rectangular area with a preset length and width as a center of the preset storage location, or a circle center area with a preset length as a radius as a center of the preset storage location.
After determining the map area, object detection may be performed on the map area. Here, the target detection can be achieved by commonly used target detectors such as Fast R-CNN, Fast R-CNN and FPN, etc. The map feature information obtained by the method may include feature objects in the map region, and may further include a specific position or other attribute features of each feature object. For example, when the target detection is performed on a map area in a preset storage map, the obtained map feature information may include map elements existing in the map area, such as mountains, rivers, forests, houses, and the like, and may further include specific positions, sizes, and the like of the respective map elements.
After the map feature information is obtained, the map feature information can be input into a pre-trained question generation model, and a prompt question and a prompt answer output when the question generation model is obtained are provided for subsequent display. Here, the question generation model generates and outputs a corresponding question and answer to the prompt based on the input map feature information. Here, the presentation question may be an existence question for inquiring whether a certain feature object exists in the map area, or a generation question for inquiring a position relationship between any two feature objects in the map area, and the like, and the embodiment of the present invention is not particularly limited thereto.
In addition, before step 112-03 is executed, the problem generation model may be trained in advance, and specifically, the problem generation model may be trained as follows: firstly, a large amount of sample map feature information is collected, and sample prompt questions and sample prompt answers corresponding to the sample map feature information are set manually. And then training an initial model based on the sample map feature information, the corresponding sample prompt question and the sample prompt answer, so as to obtain a question generation model.
According to the method provided by the embodiment of the invention, the prompt question and the prompt answer are automatically generated through the map characteristic information corresponding to the preset storage position, so that a subsequent auxiliary user can quickly position the preset storage position.
Based on any of the above embodiments, for the preset storage location, the verification end may preset a storage point mark of the preset storage location, where the storage point mark specifically includes a storage point name, a storage point location, and storage point feature information, where the setting of the storage point name can facilitate a user to directly locate the preset storage location from a preset storage map, the storage point location is used to represent coordinate information of the preset storage location in the preset storage map, and the storage point feature information is used to represent a feature object associated with the preset storage location, a relative position relationship of the feature object, and the like, and may be map feature information of the preset storage location.
Based on any of the above embodiments, step 120 specifically includes: and displaying personalized prompt information corresponding to the personalized character string of the user, and receiving the character string to be verified input by the user based on the personalized prompt information.
Specifically, the user-customized character string is a character string set by the user when setting the user password.
The personalized prompt information is set for the personalized character string of the user and is used for assisting the user to input the character string to be verified. The personalized prompt information can be set by the user when the user password is set, or the related prompt information of the user personalized character string obtained by the verification terminal according to the user personalized character string. For example, when the user password is set, the user inputs a user personalized character string "and tries new tea with new fire", and inputs corresponding prompt information "poetry and wine are in good time", or when the user password is set, the user selects personalized prompt information "i favorite lesson" and inputs a corresponding user personalized character string "advanced mathematics".
In addition, the verification end can perform entity identification on the user personalized character string, and the entity type of the user personalized character string is used as personalized prompt information, for example, the user personalized character string is 'Zhou Ji Lung and nunchaku', and the corresponding personalized prompt information is 'singer and song'.
Based on any of the above embodiments, step 130 specifically includes: and if the storage position to be verified is a preset storage position, generating a password to be verified corresponding to the character string to be verified, and performing identity verification.
Specifically, after the storage location to be verified is determined, the storage location to be verified may be verified based on the preset storage location, if the storage location to be verified is the preset storage location, it is determined that the storage location to be verified passes verification, and a password to be verified is generated based on the character string to be verified and used for identity verification; and if the storage position to be verified is not the preset storage position, determining that the storage position to be verified is not verified, and not generating the password to be verified any more, and prompting the user that the verification fails.
Based on any of the foregoing embodiments, fig. 6 is a schematic flow diagram of a method for generating a password to be verified according to an embodiment of the present invention, and as shown in fig. 6, in step 130, the generating a password to be verified corresponding to a character string to be verified specifically includes:
and 131, generating a character string to be verified and a password fragment corresponding to the password generation algorithm based on any one of a plurality of password generation algorithms corresponding to the preset storage position.
Specifically, a password generation method for generating a password to be verified based on a character string to be verified is preset, any preset storage position may correspond to multiple password generation algorithms, and different password generation algorithms may be different algorithms themselves or different parameters in the algorithms.
For example, the multiplicative Hash algorithm may be represented as a Hash (key, prime), where the key is user personalized information or a to-be-verified character string, the prime is a multiplication factor, and for the same key, the prime is different, and correspondingly obtained passwords are also different. The multiplicative hash algorithm under different parameters prime can be used as different password generation algorithms.
The password segment is obtained by performing password conversion on the character string to be verified based on any one password generation algorithm corresponding to the preset storage position. Different cryptographic generation algorithms correspond to different cryptographic sections.
Step 132, determining the password to be verified corresponding to the character string to be verified based on the character string to be verified and the password fragment corresponding to each password generation algorithm.
Specifically, the password to be verified is combined with the password fragments corresponding to the multiple password generation algorithms, so that the problem that the password is cracked due to the fact that a single type of password generation algorithm is cracked is solved, and the safety of identity verification is improved. For example, the password fragments corresponding to each password generation algorithm may be spliced to obtain the password to be verified.
According to the method provided by the embodiment of the invention, the password is generated through a plurality of password generation algorithms, and the password generation algorithms are associated with the preset storage position, so that the password cracking difficulty is increased, and the safety of identity authentication is effectively improved.
Based on any one of the embodiments, an identity authentication method specifically includes the following steps:
before performing authentication, a user password needs to be generated:
the verification end receives a preset storage map selected by a user and a preset storage position in the preset storage map, receives a user personalized character string input by the user, and generates a user password corresponding to the user personalized character string based on a password generation algorithm corresponding to the preset storage position.
When identity authentication is needed, a plurality of maps are displayed firstly, so that a user can select one map from the maps to be used as a map to be authenticated. If the map to be verified is the preset storage map, the name of the storage position to be verified input by the user can be directly received, or the storage position to be verified clicked on the preset storage map by the user can be directly received.
In addition, when the user forgets the name and the location of the preset storage location, a plurality of candidate areas may be displayed in the preset storage map for the user to select an area to be verified from. If the area to be verified is a preset storage area corresponding to the preset storage position, displaying a prompt question set for the preset storage position to a user, receiving a user answer returned by the user, and if the user answer is consistent with the prompt answer corresponding to the prompt question, namely the user answer is correct, reducing the preset storage area so that the user can locate the preset storage position in a smaller range; and if the user answer is different from the prompt answer corresponding to the prompt question, enlarging the preset storage area and prompting the user of a verification error.
And if the storage position to be verified is a preset storage position, prompting a user to input the character string to be verified. The verification end can directly receive the character string to be verified input by the user, and can also display personalized prompt information corresponding to the personalized character string of the user, so that the user can input the character string to be verified according to the personalized prompt information.
And after the character string to be verified is obtained, generating a password to be verified corresponding to the character string to be verified based on a password generation algorithm corresponding to a preset storage position. The user can directly obtain the password to be verified and apply the password to be verified to identity verification, and the verification end can directly compare the generated password to be verified with the pre-stored user password so as to judge whether the user passes the identity verification.
In the above identity authentication process, if the authentication fails in the midway, the authentication failure can be directly determined, the identity authentication is exited, the number of times of the authentication failure can be accumulated, and if the number of times of the authentication failure reaches a preset fault-tolerant threshold, the authentication failure is determined, and the identity authentication is exited.
In addition, the authentication process can be timed, if the time for authentication exceeds the threshold of the prior time and the authentication is not completed, the authentication is determined to fail, and the authentication is quitted.
The method provided by the embodiment of the invention considers the characteristic that the image information and the regular information are convenient to memorize, and carries out the identity verification by combining the storage position to be verified and the character string to be verified, thereby reducing the memory difficulty of the user, improving the one-time passing rate and the verification efficiency of the identity verification and simultaneously ensuring the security of the identity verification.
Based on any of the above embodiments, fig. 7 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present invention, as shown in fig. 7, the apparatus includes a location determining unit 710, a character string determining unit 720, and a password authentication unit 730;
the location determining unit 710 is configured to determine a storage location to be verified in the map to be verified;
the character string determining unit 720 is configured to determine a character string to be verified;
the password authentication unit 730 is configured to generate a password to be authenticated based on the storage location to be authenticated and the character string to be authenticated, and perform identity authentication based on the password to be authenticated.
The device provided by the embodiment of the invention considers the characteristic that the image information and the regular information are convenient to memorize, and performs the identity verification by combining the storage position to be verified and the character string to be verified, thereby reducing the memory difficulty of the user, improving the one-time passing rate and the verification efficiency of the identity verification and simultaneously ensuring the safety of the identity verification.
Based on any of the above embodiments, the position determination unit 710 includes:
a map display subunit for displaying a plurality of candidate maps;
the map determining subunit is used for receiving a map to be verified selected by a user from a plurality of candidate maps;
and the position determining subunit is used for determining the storage position to be verified in the map to be verified if the map to be verified is a preset storage map.
Based on any of the above embodiments, the position determination unit 710 includes:
the prompt display subunit is used for displaying prompt questions corresponding to the preset storage positions;
the answer receiving subunit is used for receiving a user answer returned by the user aiming at the prompt question;
the answer judgment subunit is used for adjusting the size of a preset storage area in the map to be verified based on the user answer and the prompt answer corresponding to the prompt question; the preset storage area is associated with the preset storage position;
and the position receiving subunit is used for receiving the storage position to be verified selected by the user based on the preset storage area.
Based on any of the above embodiments, the prompt display subunit is specifically configured to:
displaying a plurality of candidate areas of the map to be verified;
receiving a region to be verified selected by a user from the plurality of candidate regions;
and if the area to be verified is a preset storage area, displaying a prompt question corresponding to the preset storage position.
Based on any of the above embodiments, the position determining unit 710 further includes a prompt generating subunit, where the prompt generating subunit is configured to:
determining a map area of the preset storage position in a preset storage map;
carrying out target detection on the map area to obtain map feature information of the preset storage position;
and inputting the map characteristic information into a question generation model to obtain the prompt question output by the question generation model and a prompt answer corresponding to the prompt question.
Based on any of the above embodiments, the password authentication unit 730 is specifically configured to:
and if the storage position to be verified is a preset storage position, generating a password to be verified corresponding to the character string to be verified, and performing identity verification.
Based on any of the above embodiments, the password authentication unit 730 is specifically configured to:
generating a password segment corresponding to the character string to be verified and any password generation algorithm based on any password generation algorithm in a plurality of password generation algorithms corresponding to the preset storage position;
and determining the password to be verified corresponding to the character string to be verified based on the character string to be verified and the password fragment corresponding to each password generation algorithm.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 8, the electronic device may include: a processor (processor)810, a communication Interface 820, a memory 830 and a communication bus 840, wherein the processor 810, the communication Interface 820 and the memory 830 communicate with each other via the communication bus 840. The processor 810 may call logical commands in the memory 830 to perform the following method: determining a storage position to be verified in a map to be verified; determining a character string to be verified; and generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified.
In addition, the logic commands in the memory 830 can be implemented in the form of software functional units and stored in a computer readable storage medium when the logic commands are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes a plurality of commands for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Embodiments of the present invention further provide a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the method provided in the foregoing embodiments when executed by a processor, and the method includes: determining a storage position to be verified in a map to be verified; determining a character string to be verified; and generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes commands for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. An identity verification method, comprising:
determining a storage position to be verified in a map to be verified;
determining a character string to be verified;
generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified;
generating a password to be verified based on the storage location to be verified and the character string to be verified, including:
if the storage position to be verified is a preset storage position, generating a password fragment corresponding to the character string to be verified and any password generation algorithm based on any password generation algorithm in multiple password generation algorithms corresponding to the preset storage position;
and determining the password to be verified corresponding to the character string to be verified based on the character string to be verified and the password fragment corresponding to each password generation algorithm.
2. The identity authentication method according to claim 1, wherein the determining of the storage location to be authenticated in the map to be authenticated specifically comprises:
displaying a plurality of candidate maps;
receiving a map to be verified selected by a user from the plurality of candidate maps;
and if the map to be verified is a preset storage map, determining a storage position to be verified in the map to be verified.
3. The identity authentication method according to claim 1 or 2, wherein the determining the storage location to be authenticated in the map to be authenticated specifically comprises:
displaying a prompt question corresponding to a preset storage position;
receiving a user answer returned by the user aiming at the prompt question;
adjusting the size of a preset storage area in the map to be verified based on the user answer and the prompt answer corresponding to the prompt question; the preset storage area is associated with the preset storage position;
and receiving the storage position to be verified selected by the user based on the preset storage area.
4. The identity authentication method according to claim 3, wherein the displaying of the prompt question corresponding to the preset storage location specifically comprises:
displaying a plurality of candidate areas of the map to be verified;
receiving a region to be verified selected by a user from the plurality of candidate regions;
and if the area to be verified is a preset storage area, displaying a prompt question corresponding to the preset storage position.
5. The identity authentication method according to claim 3, wherein the displaying the prompt question corresponding to the preset storage location further comprises:
determining a map area of the preset storage position in a preset storage map;
carrying out target detection on the map area to obtain map feature information of the preset storage position;
and inputting the map characteristic information into a question generation model to obtain the prompt question output by the question generation model and a prompt answer corresponding to the prompt question.
6. An authentication apparatus, comprising:
the position determining unit is used for determining a storage position to be verified in the map to be verified;
the character string determining unit is used for determining a character string to be verified;
the password verification unit is used for generating a password to be verified based on the storage position to be verified and the character string to be verified, and performing identity verification based on the password to be verified;
the password authentication unit is specifically configured to:
if the storage position to be verified is a preset storage position, generating a password segment corresponding to the character string to be verified and any password generation algorithm based on any password generation algorithm in multiple password generation algorithms corresponding to the preset storage position;
and determining the password to be verified corresponding to the character string to be verified based on the character string to be verified and the password fragment corresponding to each password generation algorithm.
7. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the authentication method according to any of claims 1 to 5 are implemented by the processor when executing the program.
8. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the authentication method according to any one of claims 1 to 5.
CN202010033473.7A 2020-01-13 2020-01-13 Identity authentication method and device, electronic equipment and storage medium Active CN111241501B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010033473.7A CN111241501B (en) 2020-01-13 2020-01-13 Identity authentication method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010033473.7A CN111241501B (en) 2020-01-13 2020-01-13 Identity authentication method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111241501A CN111241501A (en) 2020-06-05
CN111241501B true CN111241501B (en) 2022-08-05

Family

ID=70870995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010033473.7A Active CN111241501B (en) 2020-01-13 2020-01-13 Identity authentication method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111241501B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833613A (en) * 2011-06-15 2012-12-19 康佳集团股份有限公司 Method and system for finding password of set top box and set top box device
CN103716279A (en) * 2012-09-28 2014-04-09 张仁平 Method and system for realizing network authentication in question-and-answer manner
CN106060020A (en) * 2016-05-20 2016-10-26 鲁东 Method and device for registering or logging in to electronic device or application
CN106650389A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent terminal screen unlocking method and device and intelligent terminal
CN107169341A (en) * 2017-05-17 2017-09-15 苏州锦佰安信息技术有限公司 Picture password generation method and picture password generating means
CN109977656A (en) * 2019-04-08 2019-07-05 广州众诺电子技术有限公司 Auth method and consumption material box and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833613A (en) * 2011-06-15 2012-12-19 康佳集团股份有限公司 Method and system for finding password of set top box and set top box device
CN103716279A (en) * 2012-09-28 2014-04-09 张仁平 Method and system for realizing network authentication in question-and-answer manner
CN106650389A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent terminal screen unlocking method and device and intelligent terminal
CN106060020A (en) * 2016-05-20 2016-10-26 鲁东 Method and device for registering or logging in to electronic device or application
CN107169341A (en) * 2017-05-17 2017-09-15 苏州锦佰安信息技术有限公司 Picture password generation method and picture password generating means
CN109977656A (en) * 2019-04-08 2019-07-05 广州众诺电子技术有限公司 Auth method and consumption material box and storage medium

Also Published As

Publication number Publication date
CN111241501A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
WO2017059700A1 (en) Identity authentication method and apparatus
EP3306504A1 (en) Multi-user login method, device and storage medium
CN111064743B (en) Method and system for safely inputting password
US9596087B2 (en) Token authentication for touch sensitive display devices
CN105245489B (en) Verification method and device
CN105094652B (en) Touch screen unlocking method and device, electronic equipment, display and mobile terminal
WO2015032281A1 (en) Method and system for generating and processing challenge-response tests
SE542213C2 (en) Method and system for creating a strong authentication for a user using a portable electronic device
CN111143812B (en) Login authentication method based on graphics
CN106156595B (en) Method, device and system for verifying through verification code picture
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN105138887B (en) A kind of input method of log-on message, device and terminal device
CN111241501B (en) Identity authentication method and device, electronic equipment and storage medium
Moraskar et al. Cued click point technique for graphical password authentication
CN106529232A (en) Startup method and device
CN110765431B (en) Multi-user fingerprint or password login method and management system thereof
WO2017129071A1 (en) Password authentication method, device and application server
WO2023092345A1 (en) Identity authentication method and apparatus, and terminal, storage medium and program product
US20180124034A1 (en) Image based method, system and computer program product to authenticate user identity
TWI652593B (en) Password setting method, login method and device
CN110046491B (en) Method and device for verifying security problem, electronic equipment and storage medium
KR101516565B1 (en) Apparatus and method for auhentication using an image
CN106161365B (en) Data processing method and device and terminal
CN104660561B (en) Identity verification method and device
CN106452766B (en) Password retrieving method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant