CN111882324A - Face authentication method and system - Google Patents

Face authentication method and system Download PDF

Info

Publication number
CN111882324A
CN111882324A CN202010722884.7A CN202010722884A CN111882324A CN 111882324 A CN111882324 A CN 111882324A CN 202010722884 A CN202010722884 A CN 202010722884A CN 111882324 A CN111882324 A CN 111882324A
Authority
CN
China
Prior art keywords
data stream
color data
face
encrypted
face authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010722884.7A
Other languages
Chinese (zh)
Inventor
汤文敏
李骊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Huajie Imi Technology Co ltd
Beijing HJIMI Technology Co Ltd
Original Assignee
Nanjing Huajie Imi Technology Co ltd
Beijing HJIMI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Huajie Imi Technology Co ltd, Beijing HJIMI Technology Co Ltd filed Critical Nanjing Huajie Imi Technology Co ltd
Priority to CN202010722884.7A priority Critical patent/CN111882324A/en
Publication of CN111882324A publication Critical patent/CN111882324A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The invention discloses a face authentication method and a face authentication system, wherein collected color data streams and collected depth data streams are processed to obtain encrypted color data streams and encrypted depth data information, and the depth data information is used for determining that a collected object is a person; based on the encrypted color data stream and the encrypted depth data information, selecting face image information meeting preset requirements from the face image information for transparent transmission processing to generate face authentication application information, decrypting the encrypted color data stream based on the face authentication application information, and if decryption is successful, confirming that face authentication is successful. In the scheme, the safety and the confidentiality of the face authentication are improved through the encryption and the decryption of the color data stream, the living body detection based on the depth data information and other safety links. In addition, the face payment is carried out on the successfully authenticated face, so that the safety of the face payment is improved.

Description

Face authentication method and system
Technical Field
The invention relates to the technical field of secure payment, in particular to a face authentication method and a face authentication system.
Background
As the consumption level of people is improved, shopping consumption of people is more and more, and people can pay by people in a face mode.
Due to the convenience of face payment, face payment gradually becomes a mainstream payment mode. The existing face payment is realized by acquiring face image data, transmitting the acquired face image data to a payment server, comparing the acquired face image data with image data pre-stored in a database by the payment server, and when the face image data is consistent with the image data pre-stored in the database by a user, carrying out face payment.
The existing face payment is only compared with image data stored in a database in advance by a user through collected face image data, and safety links such as living body detection and the like are lacked. Resulting in low security of the existing face payment.
Disclosure of Invention
In view of this, the invention discloses a face authentication method and system, which improve the security and confidentiality of face authentication through the encryption and decryption of color data streams and security links such as living body detection based on depth data streams. In addition, the face payment is carried out on the successfully authenticated face, so that the safety of the face payment is improved.
In order to achieve the purpose, the technical scheme is as follows:
the invention discloses a face authentication method, which is applied to a face authentication system, wherein the face authentication system comprises an image acquisition module, an MR chip, a host and a remote server, and the method comprises the following steps:
the image acquisition module acquires a color data stream and a depth data stream, wherein the color data stream at least comprises face image information;
the MR chip encrypts the color data stream to obtain an encrypted color data stream, processes the depth data stream to obtain depth data information, and sends the depth data information and the encrypted color data stream to the host, wherein the depth data stream is used for determining that an object acquired by the image acquisition module is a person;
the host selects face image information meeting preset requirements from the face image information for transparent transmission processing based on the encrypted color data stream and the depth data information to generate face authentication application information, and sends the face authentication application information and the encrypted color data stream to the remote server;
and the remote server decrypts the encrypted color data stream based on the face authentication application information, and if decryption is successful, the face authentication is confirmed to be successful.
Preferably, the image acquisition module includes an infrared module and a color module, and the image acquisition module acquires a color data stream and a depth data stream, and includes:
the infrared module collects a depth data stream;
the color module collects a color data stream.
Preferably, the host selects the face image information meeting the preset requirement from the face image information for transparent transmission processing, and the method includes:
the host machine scores the face image information based on an image scoring mechanism;
if the face image information accords with the image information standard of the image grading mechanism, selecting the face image information which accords with the image information standard of the image grading mechanism to carry out transparent transmission processing;
and if the face image information does not accord with the image information standard of the image scoring mechanism, the host stops executing the face image information scoring operation.
Preferably, the remote server decrypts the encrypted color data stream based on the face authentication application information, and if the decryption is successful, it is determined that the face authentication is successful, including:
the remote server decrypts the encrypted color data stream by a public key based on the face authentication application information to obtain a hash value decrypted by the public key;
when the hash value decrypted based on the public key is consistent with the hash value encrypted by the private key in the MR chip, the encrypted color data stream is decrypted successfully, and the face authentication is confirmed to be successful;
and when the hash value decrypted by the public key is inconsistent with the hash value encrypted by the private key in the MR chip, the encrypted color data stream is failed to be decrypted, and the failure of face authentication is confirmed.
Preferably, the method further comprises the following steps:
and the MR chip signs the encrypted color data stream to obtain the encrypted and signed color data stream.
The invention discloses a face authentication system in a second aspect, which comprises an image acquisition module, an MR chip, a host and a remote server;
the image acquisition module is used for acquiring a color data stream and a depth data stream, wherein the color data stream at least comprises face image information;
the MR chip is used for encrypting the color data stream to obtain an encrypted color data stream, processing the depth data stream to obtain depth data information, and sending the depth data information and the encrypted color data stream to the host, wherein the depth data stream is used for determining that an object acquired by the image acquisition module is a person;
the host is used for selecting face image information meeting preset requirements from the face image information for transparent transmission processing based on the encrypted color data stream and the encrypted depth data information, generating face authentication application information, and sending the face authentication application information and the encrypted color data stream to the remote server;
and the remote server is used for decrypting the encrypted color data stream based on the face authentication application information, and if the decryption is successful, the face authentication is confirmed to be successful.
Preferably, the image acquisition module comprises an infrared module and a color module;
the infrared module is used for collecting a depth data stream;
and the color module is used for collecting color data streams.
Preferably, the host is specifically configured to:
grading the face image information based on an image grading mechanism, and if the face image information meets the image information standard of the image grading mechanism, selecting the face image information meeting the image information standard of the image grading mechanism to perform transparent transmission processing; and if the face image information does not accord with the image information standard of the image scoring mechanism, stopping executing the face image information scoring operation.
Preferably, the remote server is specifically configured to:
based on the face authentication application information, carrying out public key decryption on the encrypted color data stream and the signed color data stream to obtain a public key decryption value; when the public key decryption value is consistent with the private key encryption value in the MR chip, the encrypted color data stream and the signed color data stream are decrypted successfully; and when the public key decryption value is inconsistent with the private key encryption value in the MR chip, the encrypted color data stream is failed to be decrypted, and the failure of face authentication is confirmed.
Preferably, the MR chip is further configured to:
and signing the encrypted color data stream to obtain the encrypted and signed color data stream.
According to the technical scheme, the invention discloses a face authentication method and a face authentication system, an image acquisition module acquires a color data stream and a depth data stream, an MR chip encrypts the color data stream to obtain an encrypted color data stream, the depth data stream is processed to obtain depth data information, the depth data information and the encrypted color data stream are sent to a host, the host selects face image information meeting preset requirements in the face image information to perform transparent transmission processing based on the encrypted color data stream and the encrypted depth data information to generate face authentication application information, the face authentication application information and the encrypted color data stream are sent to a remote server, and the remote server decrypts the encrypted color data stream based on the face authentication application information and confirms that the face authentication is successful if the decryption is successful. By the scheme, the acquired object is determined to be a character based on the depth data information, the encrypted color data stream is decrypted, if the decryption is successful, the face authentication of the character is confirmed to be successful, and the safety and the confidentiality of the face authentication are improved through the encryption and decryption of the color data stream, the living body detection based on the depth data stream and other safety links. In addition, the face payment is carried out on the successfully authenticated face, so that the safety of the face payment is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a face authentication system disclosed in an embodiment of the present invention;
fig. 2 is a flow entity diagram of a face authentication method disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As known from the background technology, the existing face payment is only compared with image data stored in a database in advance by a user through collected face image data, and safety links such as living body detection and the like are lacked. Resulting in low security of the existing face payment.
In order to solve the problem, the invention discloses a face authentication method and a face authentication system, wherein the acquired object is determined to be a figure based on depth data information, the encrypted color data stream is decrypted, if the decryption is successful, the face authentication of the figure is confirmed to be successful, and the security and the confidentiality of the face authentication are improved through the encryption and the decryption of the color data stream, the living body detection based on the depth data stream and other security links. In addition, the face payment is carried out on the successfully authenticated face, so that the safety of the face payment is improved. The specific implementation is specifically illustrated by the following examples.
As shown in fig. 1, a schematic structural diagram of a face authentication system disclosed in the present invention includes an image acquisition module 101, an MR chip 102, a host 103, and a remote server 104.
And the image acquisition module 101 is used for acquiring a color data stream and a depth data stream.
The image acquisition module 101 is an image acquisition module of 3D structured light.
The color data stream includes at least facial image information.
The image acquisition module 101 acquires a color data stream and a depth data stream in the facial features of a user who is to be subjected to face authentication.
The color data stream is a picture with colors and the depth data stream is a gray picture.
Further, the image capturing module 101 includes an infrared module and a color module.
And the infrared module is used for collecting the depth data stream.
Wherein the depth data stream includes depth information and the infrared module may also be used to detect the depth information.
And the color module is used for collecting color data streams.
The MR chip 102 is configured to encrypt the color data stream to obtain an encrypted color data stream, process the depth data stream to obtain depth data information, and send the depth data information and the encrypted color data stream to the host 103.
The depth data information is used for determining that the object acquired by the image acquisition module is a person.
The method for encrypting the color data stream by the MR chip 102 may be SHA256 encryption, SHA512 encryption, etc., and specifically, the method for encrypting the color data stream by the MR chip 102 is not particularly limited in the present invention, and the SHA256 encryption method is preferred in the present invention.
The MR chip 102 includes a Distributed Processing Unit (DPU) chip and an Image Signal Processing (ISP) chip.
The DSP chip is used for processing the depth data stream collected by the infrared module to obtain depth data information.
The ISP chip is used for processing the color data stream collected by the color module, and the color effect of the color image is better by processing the color image in the color data stream.
The color data stream is encrypted by the MR chip 102, thereby improving the confidentiality and security of the color data stream.
Further, the MR chip 102 is specifically configured to sign the encrypted color data stream, so as to obtain the encrypted and signed color data stream.
The way of signing the encrypted color data stream by the MR chip 102 may be RSA signature, http encrypted signature, and the like, and specifically, the way of signing the encrypted color data stream is not specifically limited in the present invention, and the RSA signature way is preferred in the present invention.
And the host 103 is configured to select, based on the encrypted color data stream and the encrypted depth data information, face image information meeting preset requirements from the face image information for transparent transmission processing, generate face authentication application information, and send the face authentication application information and the encrypted color data stream to the remote server 104.
The host 103 receives the color data stream and the depth data stream processed by the MR chip 102 through a Universal Serial Bus (USB) controller.
Further, the host 103 is specifically configured to score the face image information based on an image scoring mechanism, and if the face image information meets the image information standard of the image scoring mechanism, select the face image information meeting the image information standard of the image scoring mechanism to perform transparent transmission processing; and if the face image information does not accord with the image information standard of the image scoring mechanism, stopping executing the face image information scoring operation.
The host 103 selects the face image information meeting the image information standard of the image scoring mechanism for transparent transmission, that is, the host 103 selects the face image information meeting the image information standard of the image scoring mechanism without any data modification, and directly performs data transmission.
In the process of transparent transmission processing, the host 103 sends face authentication application information to the remote server 104 through a network protocol, and the remote server 104 obtains information that the host 103 completes encryption of the color data stream based on the face authentication application information.
And the remote server 104 is used for decrypting the encrypted color data stream based on the face authentication application information, and if the decryption is successful, the face authentication is confirmed to be successful.
Further, the remote server 104 is specifically configured to decrypt the public key of the encrypted color data stream based on the face authentication application information to obtain a public key decrypted value; when the decryption value based on the public key is consistent with the private key encryption value in the MR chip 102, the encrypted color data stream is decrypted successfully, and the success of face authentication is confirmed; when the public key decryption value is inconsistent with the private key encryption value in the MR chip 102, the decryption of the encrypted color data stream fails, and the failure of face authentication is confirmed.
Alternatively, a binary value may be used for encryption, such as a hash value. If the hash value is adopted, the remote server 104 is specifically configured to perform public key decryption on the encrypted color data stream based on the face authentication application information to obtain a public key decrypted hash value; when the hash value decrypted based on the public key is consistent with the hash value encrypted by the private key in the MR chip 102, the encrypted color data stream is decrypted successfully, and the success of face authentication is confirmed; when the hash value decrypted by the public key is inconsistent with the hash value encrypted by the private key in the MR chip 102, the decryption of the encrypted color data stream fails, and the face authentication failure is confirmed.
The Hash value, i.e. the Hash value, is a set of binary values obtained by performing an encryption operation on the content of the file. The hash value is used for file verification or signature, and whether the two files are the same or not is judged through the hash value.
The remote server 104 stores the corresponding public key inside the MR chip 102, and decrypts the encrypted color data stream based on the face authentication application information.
The MR chip 102 stores a private key, the private key is an important file for secure payment, and the private key is stored in the MR chip 102, so that the private key is prevented from being tampered, and the security of face authentication is improved.
After the face authentication is confirmed to be successful, the next processing can be continued, for example, face payment, face brushing attendance and the like.
Further, the remote server 104 is specifically configured to decrypt the encrypted and signed color data stream based on the face authentication application information; if the decryption is successful, confirming that the face authentication is successful; and if the decryption fails, confirming that the face authentication fails.
The embodiment of the invention discloses a face authentication system, which comprises an image acquisition module, an MR chip, a host and a remote server, wherein the image acquisition module acquires a color data stream and a depth data stream, the MR chip encrypts the color data stream to obtain an encrypted color data stream, processes the depth data stream to obtain depth data information, and sends the depth data information and the encrypted color data stream to the host, the host selects face image information meeting preset requirements from the face image information for transparent transmission processing based on the encrypted color data stream and the depth data information to generate face authentication application information, and sends the face authentication application information and the encrypted color data stream to the remote server, the remote server decrypts the encrypted color data stream based on the face authentication application information, if decryption is successful, and confirming that the face authentication is successful. Through the system, the acquired object is determined to be a character based on the depth data stream, the encrypted color data stream is decrypted, if the decryption is successful, the face authentication of the character is confirmed to be successful, and the safety and the confidentiality of the face authentication are improved through the encryption and decryption of the color data stream, the living body detection based on the depth data stream and other safety links. In addition, the face payment is carried out on the successfully authenticated face, so that the safety of the face payment is improved.
Based on the above-mentioned face authentication system disclosed in the embodiment of the present invention, as shown in fig. 2, it is a flow diagram of a face authentication method disclosed in the embodiment of the present invention, and the face authentication method is applicable to the above-mentioned face authentication system disclosed in the embodiment of the present invention, and the face authentication method mainly includes the following steps:
s201: an image acquisition module acquires a color data stream and a depth data stream.
The color data stream at least comprises face image information, and the depth data stream is used for determining that the object acquired by the image acquisition module is a person.
In the process of implementing S201 specifically, the image acquisition module acquires a color data stream and a depth data stream in the facial features of a user who wants to perform face authentication.
The color data stream is a colored picture and the depth data stream is a grey scale picture, the depth data stream comprising depth information.
The image acquisition module comprises an infrared module and a color module. The infrared module is used for collecting depth data flow and detecting depth information, and the color module is used for collecting color data flow.
S202: the MR chip encrypts the color data stream to obtain an encrypted color data stream, and sends the depth data stream and the encrypted color data stream to the host.
The method for encrypting the color data stream by the MR chip may be SHA256 encryption, SHA512 encryption, and the like, and the method for encrypting the color data stream by the MR chip is not particularly limited in the present invention, and the SHA256 encryption method is preferred in the present invention.
The MR chip includes a DPU chip and an ISP chip. The DSP chip is used for processing the depth data stream acquired by the infrared module, the ISP chip is used for processing the color data stream acquired by the color module, and the color effect of the color image is better by processing the color image in the color data stream.
The color data stream is encrypted by the MR chip, thereby improving the confidentiality and the safety of the color data stream.
S103: the host selects face image information meeting preset requirements from the face image information to perform transparent transmission processing based on the encrypted color data stream and the encrypted depth data stream, generates face authentication application information, and sends the face authentication application information and the encrypted color data stream to the remote server.
The host receives the color data stream and the depth data stream processed by the MR chip 102 through the universal USB controller.
In step S203, the host selects the face image information meeting the preset requirement from the face image information based on the encrypted color data stream and the encrypted depth data stream, and performs a transparent transmission process, as shown in a 1-A3:
a1: and the host machine scores the face image information based on an image scoring mechanism.
A2: and if the face image information accords with the image information standard of the image grading mechanism, the host selects the face image information which accords with the image information standard of the image grading mechanism to carry out transparent transmission processing.
The host selects the face image information meeting the image information standard of the image grading mechanism to perform transparent transmission processing, namely the host selects the face image information meeting the image information standard of the image grading mechanism without any data modification and directly performs data transmission.
A3: and if the face image information does not accord with the image information standard of the image scoring mechanism, the host stops executing the face image information scoring operation.
When the surrounding illumination is too strong, the quality of the face image is deteriorated, so that the face image information does not meet the image information standard of an image scoring mechanism.
S204: and the remote server decrypts the encrypted color data stream based on the face authentication application information, and if decryption is successful, the face authentication is confirmed to be successful.
The remote server decrypts the encrypted color data based on the face authentication application information, and the decryption mode can be symmetric decryption, asymmetric decryption and the like.
Specifically, in the step S204, the remote server is involved to decrypt the public key of the encrypted color data stream based on the face authentication application information to obtain a public key decrypted value, compare the public key decrypted value with the private key encrypted value in the MR chip, where the public key decrypted value and the private key encrypted value are used for file verification or signature, and determine whether the two files are the same according to the consistency of the public key decrypted value and the private key encrypted value.
Specifically, when the decryption value based on the public key is consistent with the private key encryption value in the MR chip, the encrypted color data stream is decrypted successfully, and the success of face authentication is confirmed; and when the public key decryption value is inconsistent with the private key encryption value in the MR chip, the decryption of the encrypted color data stream fails, and the failure of the face authentication is confirmed.
Alternatively, a binary value may be used for encryption, such as a hash value. If the hash value is adopted, the process of S204 is specifically executed, as shown in B1-B3:
b1: and the remote server decrypts the encrypted color data stream by the public key based on the face authentication application information to obtain a hash value decrypted by the public key.
The Hash value, i.e. the Hash value, is a set of binary values obtained by performing an encryption operation on the content of the file. The hash value is used for file verification or signature, and whether the two files are the same or not is judged through the hash value.
B2: and when the hash value decrypted based on the public key is consistent with the hash value encrypted by the private key in the MR chip, the remote server successfully decrypts the encrypted color data stream and confirms that the face authentication is successful.
After the face authentication is confirmed to be successful, the next processing can be continued, for example, face payment, face brushing attendance and the like.
B3: and when the hash value decrypted by the public key is inconsistent with the hash value encrypted by the private key in the MR chip, the remote server fails to decrypt the encrypted color data stream, and the face authentication is confirmed to fail.
The embodiment of the invention discloses a face authentication method, which comprises the steps of processing a collected color data stream and a collected depth data stream to obtain an encrypted color data stream and encrypted depth data information, wherein the depth data information is used for determining that a collected object is a person; based on the encrypted color data stream and the encrypted depth data information, selecting face image information meeting preset requirements from the face image information for transparent transmission processing to generate face authentication application information, decrypting the encrypted color data stream based on the face authentication application information, and if decryption is successful, confirming that face authentication is successful. In the scheme, the safety and the confidentiality of the face authentication are improved through the encryption and the decryption of the color data stream, the living body detection based on the depth data information and other safety links. In addition, the face payment is carried out on the successfully authenticated face, so that the safety of the face payment is improved.
Further, the embodiment of the present invention discloses another face authentication method, and a process of the another face authentication method is as shown in C1-C4:
c1: an image acquisition module acquires a color data stream and a depth data stream.
C2: the MR chip encrypts the color data stream to obtain an encrypted color data stream, signs the encrypted color data stream to obtain an encrypted and signed color data stream, and sends the encrypted and signed color data stream and the encrypted and signed depth data stream to the host.
C3: the host selects face image information meeting preset requirements from the face image information to perform transparent transmission processing based on the color data stream and the depth data stream after encryption and signature, generates face authentication application information, and sends the face authentication application information and the color data stream after encryption and signature to a remote server.
C4: and the remote server decrypts the color data stream after the encrypted signature based on the face authentication application information, if the decryption is successful, the face authentication is confirmed to be successful, and if the decryption is failed, the face authentication is confirmed to be failed.
In the embodiment of the invention, the acquired color data stream and the acquired depth data stream are processed to obtain the encrypted color data stream and the encrypted depth data information, wherein the depth data information is used for determining that the acquired object is a person; based on the encrypted color data stream and the encrypted depth data information, selecting face image information meeting preset requirements from the face image information for transparent transmission processing to generate face authentication application information, decrypting the encrypted color data stream based on the face authentication application information, and if decryption is successful, confirming that face authentication is successful. In the scheme, the safety and the confidentiality of the face authentication are improved through the encryption and the decryption of the color data stream, the living body detection based on the depth data information and other safety links. In addition, the face payment is carried out on the successfully authenticated face, so that the safety of the face payment is improved.
While, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present invention is not limited by the illustrated ordering of acts, as some steps may occur in other orders or concurrently with other steps in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The steps in the method of each embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The devices in the embodiments of the present invention can perform merging, dividing and deleting according to actual needs.
Finally, it should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A face authentication method is applied to a face authentication system, the face authentication system comprises an image acquisition module, an MR chip, a host and a remote server, and the method comprises the following steps:
the image acquisition module acquires a color data stream and a depth data stream, wherein the color data stream at least comprises face image information;
the MR chip encrypts the color data stream to obtain an encrypted color data stream, processes the depth data stream to obtain depth data information, and sends the depth data information and the encrypted color data stream to the host, wherein the depth data information is used for determining that an object acquired by the image acquisition module is a person;
the host selects face image information meeting preset requirements from the face image information for transparent transmission processing based on the encrypted color data stream and the depth data information to generate face authentication application information, and sends the face authentication application information and the encrypted color data stream to the remote server;
and the remote server decrypts the encrypted color data stream based on the face authentication application information, and if decryption is successful, the face authentication is confirmed to be successful.
2. The method of claim 1, wherein the image acquisition module comprises an infrared module and a color module, the image acquisition module acquiring a color data stream and a depth data stream, comprising:
the infrared module collects a depth data stream;
the color module collects a color data stream.
3. The method according to claim 1, wherein the host selects the face image information meeting the preset requirements from the face image information for transparent transmission processing, and the method comprises the following steps:
the host machine scores the face image information based on an image scoring mechanism;
if the face image information accords with the image information standard of the image grading mechanism, selecting the face image information which accords with the image information standard of the image grading mechanism to carry out transparent transmission processing;
and if the face image information does not accord with the image information standard of the image scoring mechanism, the host stops executing the face image information scoring operation.
4. The method of claim 1, wherein the remote server decrypts the encrypted color data stream based on the face authentication application information, and if the decryption is successful, it is determined that the face authentication is successful, comprising:
the remote server decrypts the encrypted color data stream by a public key based on the face authentication application information to obtain a public key decryption value;
when the decryption value based on the public key is consistent with the private key encryption value in the MR chip, the encrypted color data stream is decrypted successfully, and the success of face authentication is confirmed;
and when the public key decryption value is inconsistent with the private key encryption value in the MR chip, the encrypted color data stream is failed to be decrypted, and the failure of face authentication is confirmed.
5. The method of claim 1, further comprising:
and the MR chip signs the encrypted color data stream to obtain the encrypted and signed color data stream.
6. A face authentication system is characterized by comprising an image acquisition module, an MR chip, a host and a remote server;
the image acquisition module is used for acquiring a color data stream and a depth data stream, wherein the color data stream at least comprises face image information;
the MR chip is used for encrypting the color data stream to obtain an encrypted color data stream, processing the depth data stream to obtain depth data information, and sending the depth data information and the encrypted color data stream to the host, wherein the depth data stream is used for determining that an object acquired by the image acquisition module is a person;
the host is used for selecting face image information meeting preset requirements from the face image information for transparent transmission processing based on the encrypted color data stream and the encrypted depth data stream, generating face authentication application information, and sending the face authentication application information and the encrypted color data stream to the remote server;
and the remote server is used for decrypting the encrypted color data stream based on the face authentication application information, and if the decryption is successful, the face authentication is confirmed to be successful.
7. The system of claim 6, wherein the image acquisition module comprises an infrared module and a color module;
the infrared module is used for collecting a depth data stream;
and the color module is used for collecting color data streams.
8. The system of claim 6, wherein the host is specifically configured to:
grading the face image information based on an image grading mechanism, and if the face image information meets the image information standard of the image grading mechanism, selecting the face image information meeting the image information standard of the image grading mechanism to perform transparent transmission processing; and if the face image information does not accord with the image information standard of the image scoring mechanism, stopping executing the face image information scoring operation.
9. The system of claim 6, wherein the remote server is specifically configured to:
based on the face authentication application information, carrying out public key decryption on the encrypted color data stream and the signed color data stream to obtain a public key decryption value; when the public key decryption value is consistent with the private key encryption value in the MR chip, the encrypted color data stream and the signed color data stream are decrypted successfully; and when the public key decryption value is inconsistent with the private key encryption value in the MR chip, the encrypted color data stream is failed to be decrypted, and the failure of face authentication is confirmed.
10. The system according to claim 6, wherein the MR chip is further configured to:
and signing the encrypted color data stream to obtain the encrypted and signed color data stream.
CN202010722884.7A 2020-07-24 2020-07-24 Face authentication method and system Pending CN111882324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010722884.7A CN111882324A (en) 2020-07-24 2020-07-24 Face authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010722884.7A CN111882324A (en) 2020-07-24 2020-07-24 Face authentication method and system

Publications (1)

Publication Number Publication Date
CN111882324A true CN111882324A (en) 2020-11-03

Family

ID=73201328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010722884.7A Pending CN111882324A (en) 2020-07-24 2020-07-24 Face authentication method and system

Country Status (1)

Country Link
CN (1) CN111882324A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805024A (en) * 2018-04-28 2018-11-13 Oppo广东移动通信有限公司 Image processing method, device, computer readable storage medium and electronic equipment
CN108830364A (en) * 2018-05-10 2018-11-16 广州市贺氏办公设备有限公司 A kind of Dynamic Two-dimensional code generating method and system
CN110380864A (en) * 2019-07-05 2019-10-25 阿里巴巴集团控股有限公司 Method, equipment and the system of human face data acquisition, verifying
CN111062725A (en) * 2019-12-16 2020-04-24 腾讯科技(深圳)有限公司 Face payment method, device and system and computer readable storage medium
CN111401877A (en) * 2019-12-18 2020-07-10 中国银联股份有限公司 Face brushing equipment, face brushing payment system and face brushing payment method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805024A (en) * 2018-04-28 2018-11-13 Oppo广东移动通信有限公司 Image processing method, device, computer readable storage medium and electronic equipment
CN108830364A (en) * 2018-05-10 2018-11-16 广州市贺氏办公设备有限公司 A kind of Dynamic Two-dimensional code generating method and system
CN110380864A (en) * 2019-07-05 2019-10-25 阿里巴巴集团控股有限公司 Method, equipment and the system of human face data acquisition, verifying
CN111062725A (en) * 2019-12-16 2020-04-24 腾讯科技(深圳)有限公司 Face payment method, device and system and computer readable storage medium
CN111401877A (en) * 2019-12-18 2020-07-10 中国银联股份有限公司 Face brushing equipment, face brushing payment system and face brushing payment method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨雄;: "云环境下融合FHE和人脸识别的身份认证方案", 贵州大学学报(自然科学版), no. 06, pages 42 - 46 *

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110601853B (en) Block chain private key generation method and equipment
US20200153824A1 (en) Multifactor privacy-enhanced remote identification using a rich credential
TWI489846B (en) System and method of secure encryption for electronic data transfer
US6553494B1 (en) Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document
JP6296060B2 (en) How to use an analog digital (AD) signature with additional confirmation to sign a document
WO2020024993A1 (en) Method and system for generating public-private key pair
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US9218473B2 (en) Creation and authentication of biometric information
CN109922027B (en) Credible identity authentication method, terminal and storage medium
JP2008526078A (en) Method and apparatus for key generation and authentication approval
WO2015188424A1 (en) Key storage device and method for using same
CN109118377B (en) Processing method and system for claim settlement event based on block chain and electronic equipment
CN105635187B (en) Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp
WO1999012144A1 (en) Digital signature generating server and digital signature generating method
CN115333727A (en) Key generation method and device
TWI336046B (en) Processing equipment for authentication system, authentication system and operation method thereof
KR102068041B1 (en) Appratus and method of user authentication and digital signature using user's biometrics
CN109933992A (en) Information processing method, terminal device and device management module
KR20100008729A (en) A method for protecting from phishing attack
CN111882324A (en) Face authentication method and system
CA3227278A1 (en) Methods and systems for generating and validating uses of digital credentials and other documents
JP2003134108A (en) Electronic signature, apparatus and method for verifying electronic signature, program and recording medium
JP2003304228A (en) Encryption system and its method
WO2017107642A1 (en) Text processing method, apparatus and system for secure input method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination