CN112667984A - Identity authentication method and device, electronic equipment and storage medium - Google Patents

Identity authentication method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112667984A
CN112667984A CN202011631815.1A CN202011631815A CN112667984A CN 112667984 A CN112667984 A CN 112667984A CN 202011631815 A CN202011631815 A CN 202011631815A CN 112667984 A CN112667984 A CN 112667984A
Authority
CN
China
Prior art keywords
identity authentication
face information
information
face
unlocked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011631815.1A
Other languages
Chinese (zh)
Inventor
祁凯悦
伍俊
范亦卿
陶莹
许亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Sensetime Lingang Intelligent Technology Co Ltd
Original Assignee
Shanghai Sensetime Lingang Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Sensetime Lingang Intelligent Technology Co Ltd filed Critical Shanghai Sensetime Lingang Intelligent Technology Co Ltd
Priority to CN202011631815.1A priority Critical patent/CN112667984A/en
Publication of CN112667984A publication Critical patent/CN112667984A/en
Priority to JP2023521973A priority patent/JP2023546837A/en
Priority to PCT/CN2021/109820 priority patent/WO2022142330A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The present disclosure relates to an identity authentication method and apparatus, an electronic device, and a storage medium, the method including: acquiring face information for requesting unlocking of an object to be unlocked; performing identity authentication on the requesting user sending the request based on the face information and preset identity authentication reference information; and in response to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.

Description

Identity authentication method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an identity authentication method and apparatus, an electronic device, and a storage medium.
Background
With the development of artificial intelligence technology, intelligent unlocking is increasingly applied to various industries, such as automobile unlocking, door unlocking, gate unlocking, and the like. The traditional unlocking modes include key unlocking, fingerprint unlocking and the like, and with the development of computer vision technology, the face recognition unlocking mode is also widely applied to various unlocking objects.
Currently, there is a need to optimize the unlocking process to improve the user experience.
Disclosure of Invention
The present disclosure provides an identity authentication technical scheme.
According to an aspect of the present disclosure, there is provided an identity authentication method, including:
acquiring face information for requesting unlocking of an object to be unlocked;
performing identity authentication on the requesting user sending the request based on the face information and preset identity authentication reference information;
and in response to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.
In one possible implementation manner, the identity authentication reference information includes: a reference face information base;
the adjusting the identity authentication reference information based on the face information includes:
and adding the face information into a reference face information set associated with the request user in the reference face information base.
In one possible implementation manner, the identity authentication reference information includes: reference parameters for identity authentication.
In one possible implementation, the reference parameter includes a preset parameter of a neural network;
the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises:
based on the face information, verifying whether the requesting user is an authenticated user by adopting the preset neural network;
the adjusting the identity authentication reference information based on the face information includes:
constructing a training sample by using the face information;
and adjusting the parameters of the preset neural network based on the training samples.
In a possible implementation manner, the adjusting the parameter of the preset neural network based on the training sample includes:
taking the face information as the input of the preset neural network to obtain an output result;
and responding to the output result that the authentication fails, and adjusting the parameters of the preset neural network so as to enable the adjusted identity authentication result of the preset neural network on the face information to be authenticated.
In one possible implementation, the reference parameter for identity authentication includes: a matching degree threshold value of the face information;
the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises:
determining the matching degree between the face information and the face information of the authenticated user;
determining that the requesting user passes authentication in response to the matching degree between the face information and the face information of the authenticated user exceeding the matching degree threshold;
the adjusting the identity authentication reference information based on the face information includes:
and reducing the matching degree threshold value.
In one possible implementation, the reducing the threshold of the matching degree includes:
and in response to the ambient brightness being lower than a set brightness threshold, adjusting the matching degree threshold down to a target matching degree threshold.
In one possible implementation, the method further includes:
detecting whether a human face corresponding to the human face information has an occlusion area;
the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises:
in response to the fact that the shielded area exists in the face corresponding to the face information is detected, weighting is conducted on the non-shielded area in the face information on the basis of a first matching weight to obtain first weighting information, and weighting is conducted on the shielded area in the face information on the basis of a second matching weight to obtain second weighting information;
performing identity authentication on the requesting user based on the first weighted information and the second weighted information;
the adjusting the identity authentication reference information based on the face information includes: and in response to detecting that the face has an occlusion region, increasing the first matching weight and/or decreasing the second matching weight.
In one possible implementation, the method further includes:
responding to the situation that the object to be unlocked is successfully unlocked based on preset unlocking operation under the condition that the object to be unlocked is not successfully unlocked according to the identity authentication result of the user, and sending prompt information to the requesting user, wherein the prompt information is used for prompting the requesting user to adjust the identity authentication reference information; the adjusting the identity authentication reference information based on the face information includes:
and responding to the detected request user to send out an adjusting instruction based on the prompt information, and adjusting the identity authentication reference information based on the face information.
In one possible implementation, the method further includes:
acquiring a time interval between the request sent by the requesting user and the execution of the preset unlocking operation;
the adjusting the identity authentication reference information based on the face information includes:
and responding to the condition that the time interval is smaller than a set duration threshold, and adjusting the identity authentication reference information based on the face information.
In a possible implementation manner, the object to be unlocked includes at least one of the following devices:
door lock, room door lock, floodgate machine.
According to an aspect of the present disclosure, there is provided an identity authentication apparatus including:
the device comprises an acquisition unit, a judgment unit and a display unit, wherein the acquisition unit is used for acquiring face information for requesting to unlock an object to be unlocked;
the authentication unit is used for performing identity authentication on the requesting user sending the request based on the face information and preset identity authentication reference information;
and the adjusting unit is used for responding to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on the preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.
In one possible implementation manner, the identity authentication reference information includes: a reference face information base;
and the adjusting unit is used for adding the face information into a reference face information set associated with the request user in the reference face information base.
In one possible implementation manner, the identity authentication reference information includes: reference parameters for identity authentication.
In one possible implementation, the reference parameter includes a preset parameter of a neural network;
the authentication unit is used for verifying whether the requesting user is an authenticated user or not by adopting the preset neural network based on the face information;
the adjusting unit is used for constructing a training sample by using the face information; and adjusting the parameters of the preset neural network based on the training samples.
In a possible implementation manner, the adjusting unit is configured to use the face information as an input of the preset neural network to obtain an output result; and responding to the output result that the authentication fails, and adjusting the parameters of the preset neural network so as to enable the adjusted identity authentication result of the preset neural network on the face information to be authenticated.
In one possible implementation, the reference parameter for identity authentication includes: a matching degree threshold value of the face information;
the authentication unit is used for determining the matching degree between the face information and the face information of an authenticated user; determining that the requesting user passes authentication in response to the matching degree between the face information and the face information of the authenticated user exceeding the matching degree threshold;
the adjusting unit is used for reducing the threshold value of the matching degree.
In a possible implementation manner, the adjusting unit is configured to adjust the threshold of the matching degree down to a threshold of a target matching degree in response to that the ambient brightness is lower than a set brightness threshold.
In one possible implementation, the apparatus further includes:
the detection unit is used for detecting whether a human face corresponding to the human face information has an occlusion area;
the authentication unit is used for weighting the non-occluded area in the face information based on a first matching weight to obtain first weighted information and weighting the occluded area in the face information based on a second matching weight to obtain second weighted information in response to the detection that the occluded area exists in the face corresponding to the face information; performing identity authentication on the requesting user based on the first weighted information and the second weighted information;
the adjusting unit is used for responding to the detected occlusion area of the human face, increasing the first matching weight, and/or reducing the second matching weight.
In one possible implementation, the apparatus further includes:
the prompting unit is used for responding to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the user, the object to be unlocked is successfully unlocked based on preset unlocking operation, and sending prompting information to the requesting user, wherein the prompting information is used for prompting the requesting user to adjust the identity authentication reference information;
the adjusting unit is used for responding to the detection that the requesting user sends out an adjusting instruction based on the prompt information and adjusting the identity authentication reference information based on the face information.
In one possible implementation, the apparatus further includes:
a time interval determining unit, configured to obtain a time interval between the request of the requesting user and the execution of the preset unlocking operation;
and the adjusting unit is used for responding to the condition that the time interval is smaller than a set time length threshold value and adjusting the identity authentication reference information based on the face information.
In a possible implementation manner, the object to be unlocked includes at least one of the following devices:
door lock, room door lock, floodgate machine.
According to an aspect of the present disclosure, there is provided an electronic device including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
According to an aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described method.
In the embodiment of the disclosure, after face information for requesting unlocking is acquired, identity authentication is performed on a requesting user who sends a request based on the face information and preset identity authentication reference information, and then in response to a situation that an object to be unlocked is not successfully unlocked according to an identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information. Because the object to be unlocked is successfully unlocked based on the preset unlocking operation and is not successfully unlocked according to the identity authentication result of the requesting user, the requesting user is possibly the user with the unlocking authority, and the process of identity authentication based on the face information and the preset identity authentication reference information can be further optimized, so that the identity authentication reference information is adjusted based on the face information, the accuracy of identity authentication based on the face information and the preset identity authentication reference information can be improved, the unlocking success rate is improved, and the user experience is better.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure. Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
Fig. 1 shows a flow chart of an identity authentication method according to an embodiment of the present disclosure.
Fig. 2 shows a block diagram of an identity authentication apparatus provided in an embodiment of the present disclosure.
Fig. 3 shows a block diagram of an electronic device provided by an embodiment of the present disclosure.
Fig. 4 shows a block diagram of an electronic device provided by an embodiment of the present disclosure.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
With the development of artificial intelligence technology, intelligent unlocking is more and more achieved, for example, face recognition unlocking based on computer vision technology. Face identification unblock often has certain rate of accuracy, therefore, need to optimize the unblock process to improve user experience.
Based on this, the embodiment of the disclosure provides an identity authentication method, which performs identity authentication on a requesting user who sends a request based on face information and preset identity authentication reference information after obtaining the face information for requesting unlocking, and then responds to that the object to be unlocked is successfully unlocked based on preset unlocking operation under the condition that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, and the identity authentication reference information is adjusted based on the face information. Because the object to be unlocked is successfully unlocked based on the preset unlocking operation and is not successfully unlocked according to the identity authentication result of the requesting user, the requesting user is possibly the user with the unlocking authority, and the process of identity authentication based on the face information and the preset identity authentication reference information can be further optimized, so that the identity authentication reference information is adjusted based on the face information, the accuracy of identity authentication based on the face information and the preset identity authentication reference information can be improved, the unlocking success rate is improved, and the user experience is better.
In one possible implementation, the identity authentication method may be performed by an electronic device such as a terminal device or a server, the terminal device may be a User Equipment (UE), a mobile device, a User terminal, a cellular phone, a cordless phone, a Personal Digital Assistant (PDA), a handheld device, a computing device, a vehicle-mounted device, a wearable device, or the like, and the method may be implemented by a processor calling a computer readable instruction stored in a memory. Alternatively, the method may be performed by a server.
In a possible implementation manner, the object to be unlocked includes at least one of the following devices: door lock, room door lock, floodgate machine. Accordingly, an execution subject of the identity authentication method provided by the embodiment of the present disclosure may be an identity authentication device located in the unlocking object, or the unlocking object itself.
For convenience of description, in one or more embodiments of the present specification, an executing subject of the identity authentication method may be an identity authentication device, and hereinafter, an implementation of the method will be described by taking the executing subject as the identity authentication device as an example. It is understood that the method is performed by the identity authentication device as an exemplary illustration only, and should not be construed as limiting the method.
Fig. 1 shows a flowchart of an identity authentication method according to an embodiment of the present disclosure, as shown in fig. 1, the identity authentication method includes:
in step S11, face information for requesting unlocking of the object to be unlocked is acquired.
The request for unlocking the object to be unlocked may be triggered by a user operation, for example, the user may send a request for unlocking the object to be unlocked through the face information through a physical key or a virtual key on the object to be unlocked. Or the request for unlocking the object to be unlocked is triggered when the face information of the user is detected, the electronic device can continuously detect whether the face object appears in the video stream acquired by the camera for face unlocking, awaken the face unlocking function when the face object appears, and automatically generate the request for unlocking the object to be unlocked.
The face information may be acquired by an image acquisition device associated with the object to be unlocked, and the specific acquisition mode is not limited in this disclosure.
In step S12, based on the face information and preset identity authentication reference information, the identity authentication is performed on the requesting user who issued the request.
The identity authentication may be a process of confirming the identity of the user, and specifically may be to confirm specific identity information corresponding to the user based on the face information, or may also be to confirm whether the user belongs to an authenticated user having an unlocking right based on the face information.
The identity authentication is performed based on preset identity authentication reference information, wherein the identity authentication reference information can be reference information used for performing identity authentication on face information, and the identity authentication can be performed on the face information based on the identity authentication reference information.
In a possible implementation manner, the identity authentication reference information includes a reference face library, and the reference face library may include reference face information whose user identity is known, or reference face information whose user identity is an authenticated user with an unlocking right. In the embodiment of the present disclosure, the face information of the requesting user may be a face image, or may be a face feature value, and then the reference face information in the reference face information base may specifically be a face image, or may be a face feature value.
Then, in the process of performing identity authentication on the requesting user who sends the request based on the face information and the preset identity authentication reference information, the face information can be matched with the reference face information in the reference face information base to obtain the matching degree of the face information and the reference face information; and then judging whether the matching degree exceeds a matching degree threshold value, and determining that the requesting user is an authenticated user under the condition that the matching degree exceeds the matching degree threshold value, namely the authentication is passed.
In one possible implementation, the identity authentication reference information includes reference parameters for identity authentication. The reference parameter may be, for example, a parameter of an artificial intelligence module for identity authentication, and may be, for example, a parameter of a preset neural network.
Then, in the process of performing identity authentication on the requesting user who sends the request based on the face information and the preset identity authentication reference information, the face information may be subjected to identity authentication through the preset neural network to obtain an identity authentication result, and specifically, the process of performing identity authentication through the neural network is not specifically limited in this disclosure.
It should be noted that, the foregoing exemplarily provides several possible implementation manners for performing identity authentication in the present disclosure, and in practical applications of the present disclosure, other identity authentication manners selected by a person skilled in the art according to actual requirements all belong to the protection scope of the present application, and further details are not described herein for more identity authentication manners.
After the identity authentication result is obtained, under the condition that the identity authentication result represents that the requesting user is the authentication user, an unlocking instruction is sent to the unlocking object to indicate the unlocking of the unlocking object; and when the identity authentication result represents that the requesting user is a non-authentication user, informing the user that the identity authentication fails and the unlocking fails.
In step S13, in response to that the object to be unlocked is successfully unlocked based on a preset unlocking operation when the object to be unlocked is not successfully unlocked according to the result of the identity authentication of the requesting user, the identity authentication reference information is adjusted based on the face information.
The preset unlocking operation may be performed after the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, for example, after the requesting user fails to request the object to be unlocked through the face information, the requesting user tries to unlock again through the unlocking operation.
For a specific mode of the preset unlocking operation, the disclosure is not particularly limited, and for example, the unlocking operation may be unlocking by an entity key, unlocking by a fingerprint, unlocking by a human face, unlocking by a password, and the like.
The preset unlocking operation may be an operation performed by the requesting user described in the present disclosure, that is, when the requesting user fails to request unlocking through the face information, after the unlocking operation is successfully unlocked based on the entity key, the fingerprint, the password, and the like, the requesting user may be considered as a user with an unlocking right, and the requesting user may fail to request unlocking through the face information due to inaccurate identity authentication reference information, so in this case, the identity authentication reference information may be adjusted based on the face information.
The adjusting of the identity authentication reference information based on the face information may be adjusting the identity authentication reference information so that the object to be unlocked can be unlocked based on the authentication result of the identity authentication performed by the acquired face information and the identity authentication reference information, for example, the face information may be added to a face template information base serving as the identity authentication reference information, or a face recognition threshold may be adjusted, and the like. The specific adjustment manner may be various, and reference may be made to possible implementation manners provided in the present disclosure hereinafter, which are not described in detail herein.
In the embodiment of the disclosure, after face information for requesting unlocking is acquired, identity authentication is performed on a requesting user who sends a request based on the face information and preset identity authentication reference information, and then in response to a situation that an object to be unlocked is not successfully unlocked according to an identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information. Because the object to be unlocked is successfully unlocked based on the preset unlocking operation and is not successfully unlocked according to the identity authentication result of the requesting user, the requesting user is possibly the user with the unlocking authority, and the process of identity authentication based on the face information and the preset identity authentication reference information can be further optimized, so that the identity authentication reference information is adjusted based on the face information, the accuracy of identity authentication based on the face information and the preset identity authentication reference information can be improved, the unlocking success rate is improved, and the user experience is better.
In one possible implementation manner, the identity authentication reference information includes: a reference face information base; the adjusting the identity authentication reference information based on the face information includes: and adding the face information into a reference face information set associated with the request user in the reference face information base.
In this implementation manner, the identity authentication reference information may be a reference face information base, and then, in the process of performing identity authentication on the requesting user who sends the request based on the face information and the preset identity authentication reference information, the face information may be matched with the reference face information in the reference face information base to obtain the matching degree between the face information and the reference face information; and then judging whether the matching degree exceeds a matching degree threshold value, and under the condition that the matching degree exceeds the matching degree threshold value, considering that the obtained face information is successfully matched with the reference face information, and determining that the requesting user is an authenticated user, namely the authentication is passed.
After the object to be unlocked is successfully unlocked based on the preset unlocking operation, the requesting user can be considered as a user with unlocking permission, and the requesting user fails to request unlocking through the face information, which may be caused by the fact that the reference face information in the reference face information base cannot be successfully matched with the face information of the requesting user, so that the acquired face information can be added into the reference face information base under the condition. Therefore, the unlocking success rate can be improved under the condition that the requesting user requests unlocking through the face information next time, and the user experience is good.
In the reference face information base, reference face information of a plurality of authenticated users may be contained, and a single authenticated user may correspond to one reference face information set. In this case, in the process of performing identity authentication, after the face of the requesting user is matched with the reference face information in the reference face information base, the authenticated user to which the reference face information that is successfully matched belongs corresponds to the requesting user.
Then, in the process of adding the acquired face information to the reference face information base, the face information may be added to a reference face information set associated with the requesting user in the reference face information base.
In the embodiment of the disclosure, in the case that the identity authentication reference information includes the reference face information base, the face information may be added to the reference face information set associated with the requesting user in the reference face information base, so that the unlocking success rate can be improved and the user experience is better in the case that the requesting user requests unlocking through the face information next time.
In one possible implementation manner, the identity authentication reference information includes: reference parameters for identity authentication. The reference parameter may be a parameter that affects the authentication result. For example, the parameters of the artificial intelligence module for identity authentication may be parameters of a preset neural network. Therefore, in response to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on the preset unlocking operation, the reference parameter for identity authentication is adjusted based on the face information, the accuracy of identity authentication based on the face information and the reference parameter can be improved, the unlocking success rate is improved, and the user experience is good.
In one possible implementation, the reference parameter includes a preset parameter of the neural network; the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises: based on the face information, verifying whether the requesting user is an authenticated user by adopting the preset neural network; the adjusting the identity authentication reference information based on the face information includes: constructing a training sample by using the face information; and adjusting the parameters of the preset neural network based on the training samples.
The parameters of the neural network may be, for example, parameters such as weight values of nodes in the neural network, the parameters in the neural network may affect the prediction result of the neural network, and in the training of the neural network, the parameters of the neural network are often adjusted by training samples to tune the performance of the neural network.
In this implementation manner, whether the requesting user is an authenticated user may be verified by using a preset neural network based on the face information, the neural network may be an end-to-end neural network, the input of the neural network may be the face information, and the output is an identity authentication result.
The preset neural network can be obtained by training based on the training sample, so that the training sample can be constructed by using the face information, and the parameters of the preset neural network are adjusted based on the constructed training sample.
In a possible implementation manner, the adjusting the parameter of the preset neural network based on the training sample includes: taking the face information as the input of the preset neural network to obtain an output result; and responding to the output result that the authentication fails, and adjusting the parameters of the preset neural network so as to enable the adjusted identity authentication result of the preset neural network on the face information to be authenticated.
In a possible implementation manner, in the process of adjusting the preset parameters of the neural network based on the training samples, the face information and the existing training samples can be combined, the new training samples are used for iterative training of the neural network, and the parameters of the neural network are adjusted.
In the embodiment of the disclosure, under the condition that the reference parameter includes a preset neural network parameter, the preset neural network is adopted to verify whether the requesting user is an authenticated user, then, a training sample is constructed by using the face information, and the neural network parameter is adjusted based on the training sample, so that the accuracy of performing identity authentication on the preset neural network can be improved, the unlocking success rate when the requesting user is unlocked is improved, and the user experience is better.
In addition, in the specific training process, the parameters of the preset neural network can be adjusted under the condition that the authentication result of the preset neural network on the face information is not passed, so that the adjusted authentication result of the preset neural network on the face information is passed, the success rate of the preset neural network on the authentication of the requesting user can be improved, the unlocking success rate of the requesting user during unlocking is improved, and the user experience is better.
In a possible implementation manner, the reference parameter for identity authentication includes a matching degree threshold of face information; the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises: determining the matching degree between the face information and the face information of the authenticated user; determining that the requesting user passes authentication in response to the matching degree between the face information and the face information of the authenticated user exceeding the matching degree threshold; the adjusting the identity authentication reference information based on the face information includes: and reducing the matching degree threshold value.
The matching degree here may be, for example, a similarity between face information of the requesting user and face information of the authenticated user, and the similarity may be a cosine similarity between vectors corresponding to the face information. For the process of determining the similarity between face information, reference may be made to related technologies, which are not described herein in detail.
And whether the request user passes the authentication or not can be measured through a matching degree threshold value, the matching degree between the face information of the request user and the face information of the authentication user is compared with the matching degree threshold value, and the request user is determined to pass the authentication under the condition that the matching degree between the face information of the request user and the face information of the authentication user exceeds the matching degree threshold value.
The threshold of the degree of matching may be set empirically or may be dynamically adjusted, and the threshold of the degree of matching may be 90%, for example. It is determined that the requesting user is authenticated in the case where the degree of matching between the face information of the requesting user and the face information of the authenticated user exceeds 90%.
Under the condition that the object to be unlocked is not successfully unlocked based on the identity authentication result obtained based on the face information and the matching degree threshold, because the object to be unlocked is successfully unlocked based on the preset unlocking operation, the requesting user can be considered as the user with the unlocking permission, and the requesting user fails to request unlocking through the face information, which may be caused by the excessively high matching degree threshold, so that the matching degree threshold can be lowered under the condition. Therefore, the unlocking success rate can be improved and the user experience is better under the condition that the user requests unlocking through the face information next time.
The specific amplitude for lowering the threshold of the matching degree may be set by the user, for example, the threshold of the matching degree may be lowered by 5%, and the threshold of the matching degree may be lowered from 90% to 85%.
In one possible implementation, the reducing the threshold of the matching degree includes: and in response to the ambient brightness being lower than a set brightness threshold, adjusting the matching degree threshold down to a target matching degree threshold.
In the embodiment of the disclosure, it is considered that unsuccessful unlocking of the identity authentication result obtained based on the face information and the matching degree threshold may be caused by low ambient brightness, and therefore, the matching degree threshold may be adjusted to be lower than the target matching degree threshold under the condition that the ambient brightness is lower than the set brightness threshold, so that the unlocking success rate under the condition of low ambient brightness is improved, and the user experience is good.
The ambient brightness may be detected by an ambient light sensor that is capable of detecting the ambient brightness around the object to be unlocked.
In one possible implementation, the method further includes: detecting whether a human face corresponding to the human face information has an occlusion area; the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises: in response to the fact that the shielded area exists in the face corresponding to the face information is detected, weighting is conducted on the non-shielded area in the face information on the basis of a first matching weight to obtain first weighting information, and weighting is conducted on the shielded area in the face information on the basis of a second matching weight to obtain second weighting information; performing identity authentication on the requesting user based on the first weighted information and the second weighted information; the adjusting the identity authentication reference information based on the face information includes: and in response to detecting that the face has an occlusion region, increasing the first matching weight and/or decreasing the second matching weight.
In this implementation manner, whether a human face corresponding to the human face information has an occlusion region may be detected, specifically, for an image acquired by the image acquisition device, whether a human face exists in the image is often detected through human face key point detection, or whether a human face exists in the image may also be determined through semantic segmentation, and for the detected human face, whether an occlusion exists in the human face may be further determined.
There are various ways to determine whether there is an occlusion in a face, for example, the method may be identified based on the color of a face region, and when it is detected that there is a color with a large difference from the skin color in the face region, it may be considered that there is an occlusion in the face region; or the human face can be determined to be shielded in a target object identification mode under the condition that the target object is identified in the human face, and the target object can be a mask, a scarf, glasses and the like; alternatively, facial occlusions may also be identified by training neural networks.
After it is determined that occlusion exists in the face, an area where the occlusion exists can be further determined. Since the occlusion region often cannot accurately reflect the features of the face, when it is detected that the face corresponding to the face information has the occlusion region, in the process of performing identity authentication based on the face information, the non-occlusion region in the face information may be weighted based on the first matching weight to obtain first weighting information, and the occlusion region in the face information may be weighted based on the second matching weight to obtain second weighting information; the requesting user is then authenticated based on the first weighted information and the second weighted information.
As an example of this implementation, the first matching weight and the second matching weight may be specific weight values, and in the case that the occlusion region is detected to exist on the face, the first matching weight may be increased, and/or the second matching weight may be decreased. For example, the first matching weight may be increased from 0.6 to 0.7, and/or the second matching weight may be decreased from 0.4 to 0.3.
The first matching weight and the second matching weight are used for adjusting the influence degree of a shielding area and a non-shielding area in the face information on an identity authentication result in the identity authentication process, and the larger the weight is, the larger the influence on the identity authentication result is; the smaller the weight, the less influence on the authentication result.
In the embodiment of the disclosure, under the condition that a human face has a shielding region, in the process of identity authentication based on human face information, the first matching weight can be increased to increase the influence degree of a non-shielding region in the human face information on an identity authentication result, so as to increase the accuracy of identity authentication; or the second matching weight can be reduced to reduce the influence degree of the shielding area in the face information on the identity authentication result, and the accuracy of identity authentication is improved under the condition that the face shielding exists when a user wears a mask, sunglasses, a hat and the like.
In one possible implementation, the method further includes: responding to the situation that the object to be unlocked is successfully unlocked based on preset unlocking operation under the condition that the object to be unlocked is not successfully unlocked according to the identity authentication result of the user, and sending prompt information to the requesting user, wherein the prompt information is used for prompting the requesting user to adjust the identity authentication reference information; the adjusting the identity authentication reference information based on the face information includes: and responding to the detected request user to send out an adjusting instruction based on the prompt information, and adjusting the identity authentication reference information based on the face information.
In the embodiment of the disclosure, the user is reminded to adjust the identity authentication reference information by sending the reminding information to the user, and the identity authentication reference information is adjusted based on the face information only when the adjusting instruction is detected, so that the identity authentication reference information is prevented from being adjusted based on the face information of an illegal user, and the security is high.
In one possible implementation, the method further includes: acquiring a time interval between the request sent by the requesting user and the execution of the preset unlocking operation; the adjusting the identity authentication reference information based on the face information includes: and responding to the condition that the time interval is smaller than a set duration threshold, and adjusting the identity authentication reference information based on the face information.
Under the condition that the time interval between the request of the user and the execution of the preset unlocking operation is short, the two times of unlocking are performed by the same person with high probability; in the case of a long time interval, it is likely that the two unlocks are not the same person. Therefore, in the embodiment of the present disclosure, by setting the duration threshold, and in the case that the time interval is smaller than the set duration threshold, the identity authentication reference information is adjusted based on the face information, and the security is higher.
As an example of this implementation, the set duration threshold may be, for example, 30 seconds, and the set duration threshold may be set empirically, which is not specifically limited by this disclosure.
An application scenario of the embodiment of the present disclosure is explained below. In the application scenario, the object to be unlocked is a door lock of a vehicle. A user requests to unlock the face before entering the vehicle; the identity authentication equipment in the vehicle door lock acquires face information of a user through a camera, and matches the face information with reference face information in a reference face information base to obtain the matching degree of the face information and the reference face information; the identity authentication equipment judges whether the matching degree exceeds a matching degree threshold value, and under the condition that the matching degree does not exceed the matching degree threshold value, the identity authentication equipment determines that the requesting user is a non-authentication user and does not successfully unlock; the user successfully unlocks the vehicle door in a key unlocking mode; after the user enters the vehicle, the vehicle sends prompt information to the user to inquire whether the user adds the face information used when the face is unlocked into the reference face information base; and the vehicle responds to an adjusting instruction sent by the user based on the prompt information and adds the face information into the reference face information base.
It is understood that the above-mentioned method embodiments of the present disclosure can be combined with each other to form a combined embodiment without departing from the logic of the principle, which is limited by the space, and the detailed description of the present disclosure is omitted. Those skilled in the art will appreciate that in the above methods of the specific embodiments, the specific order of execution of the steps should be determined by their function and possibly their inherent logic.
In addition, the present disclosure also provides an identity authentication apparatus, an electronic device, a computer-readable storage medium, and a program, which can be used to implement any one of the identity authentication methods provided by the present disclosure, and the corresponding technical solutions and descriptions and corresponding descriptions in the methods section are not repeated.
Fig. 2 shows a block diagram of an identity authentication apparatus according to an embodiment of the present disclosure, as shown in fig. 2, the apparatus including:
an obtaining unit 21, configured to obtain face information for requesting unlocking of an object to be unlocked;
the authentication unit 22 is configured to perform identity authentication on the requesting user who sends the request based on the face information and preset identity authentication reference information;
the adjusting unit 23 is configured to respond to that, when the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and adjust the identity authentication reference information based on the face information.
In one possible implementation manner, the identity authentication reference information includes: a reference face information base;
the adjusting unit 23 is configured to add the face information to a reference face information set associated with the requesting user in the reference face information base.
In one possible implementation manner, the identity authentication reference information includes: reference parameters for identity authentication.
In one possible implementation, the reference parameter includes a preset parameter of a neural network;
the authentication unit 22 is configured to verify whether the requesting user is an authenticated user by using the preset neural network based on the face information;
the adjusting unit 23 is configured to construct a training sample by using the face information; and adjusting the parameters of the preset neural network based on the training samples.
In a possible implementation manner, the adjusting unit 23 is configured to use the face information as an input of the preset neural network to obtain an output result; and responding to the output result that the authentication fails, and adjusting the parameters of the preset neural network so as to enable the adjusted identity authentication result of the preset neural network on the face information to be authenticated.
In one possible implementation, the reference parameter for identity authentication includes: a matching degree threshold value of the face information;
the authentication unit 22 is configured to determine a matching degree between the face information and face information of an authenticated user; determining that the requesting user passes authentication in response to the matching degree between the face information and the face information of the authenticated user exceeding the matching degree threshold;
the adjusting unit 23 is configured to lower the threshold of the matching degree.
In a possible implementation manner, the adjusting unit 23 is configured to adjust the threshold of the matching degree to be lower than the target threshold of the matching degree in response to the ambient brightness being lower than the set brightness threshold.
In one possible implementation, the apparatus further includes:
the detection unit is used for detecting whether a human face corresponding to the human face information has an occlusion area;
the authentication unit 22 is configured to, in response to detecting that a human face corresponding to the human face information has an occlusion region, weight a non-occlusion region in the human face information based on a first matching weight to obtain first weighting information, and weight an occlusion region in the human face information based on a second matching weight to obtain second weighting information; performing identity authentication on the requesting user based on the first weighted information and the second weighted information;
the adjusting unit 23 is configured to increase the first matching weight and/or decrease the second matching weight in response to detecting that the human face has an occlusion region.
In one possible implementation, the apparatus further includes:
the prompting unit is used for responding to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the user, the object to be unlocked is successfully unlocked based on preset unlocking operation, and sending prompting information to the requesting user, wherein the prompting information is used for prompting the requesting user to adjust the identity authentication reference information;
the adjusting unit 23 is configured to, in response to detecting that the requesting user issues an adjusting instruction based on the prompt information, adjust the identity authentication reference information based on the face information.
In one possible implementation, the apparatus further includes:
a time interval determining unit, configured to obtain a time interval between the request of the requesting user and the execution of the preset unlocking operation;
the adjusting unit 23 is configured to adjust the identity authentication reference information based on the face information in response to that the time interval is smaller than a set duration threshold.
In a possible implementation manner, the object to be unlocked includes at least one of the following devices:
door lock, room door lock, floodgate machine.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and specific implementation thereof may refer to the description of the above method embodiments, and for brevity, will not be described again here.
In the embodiment of the disclosure, after face information for requesting unlocking is acquired, identity authentication is performed on a requesting user who sends a request based on the face information and preset identity authentication reference information, and then in response to a situation that an object to be unlocked is not successfully unlocked according to an identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information. Because the object to be unlocked is successfully unlocked based on the preset unlocking operation and is not successfully unlocked according to the identity authentication result of the requesting user, the fact that the requesting user is the user with the unlocking authority with high probability is shown, and then the process of identity authentication based on the face information and the preset identity authentication reference information can be further optimized, so that the identity authentication reference information is adjusted based on the face information, the accuracy of identity authentication based on the face information and the preset identity authentication reference information can be improved, the unlocking success rate is improved, and the user experience is better.
Embodiments of the present disclosure also provide a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the above-mentioned method. The computer readable storage medium may be a non-volatile computer readable storage medium.
An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
The embodiments of the present disclosure also provide a computer program product, which includes computer readable code, and when the computer readable code runs on a device, a processor in the device executes instructions for implementing the identity authentication method provided in any one of the above embodiments.
Embodiments of the present disclosure also provide another computer program product for storing computer readable instructions, which when executed cause a computer to perform the operations of the identity authentication method provided in any of the above embodiments.
The electronic device may be provided as a terminal, server, or other form of device.
Fig. 3 illustrates a block diagram of an electronic device 800 in accordance with an embodiment of the disclosure. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like terminal.
Referring to fig. 3, electronic device 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the electronic device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 800 is in an operation mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the electronic device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a Complementary Metal Oxide Semiconductor (CMOS) or Charge Coupled Device (CCD) image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as a wireless network (WiFi), a second generation mobile communication technology (2G) or a third generation mobile communication technology (3G), or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium, such as the memory 804, is also provided that includes computer program instructions executable by the processor 820 of the electronic device 800 to perform the above-described methods.
Fig. 4 shows a block diagram of an electronic device 1900 according to an embodiment of the disclosure. For example, the electronic device 1900 may be provided as a server. Referring to fig. 4, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. Electronic device 1900 may operate based on storageAn operating system in memory 1932, such as the Microsoft Server operating System (Windows Server)TM) Apple Inc. of the present application based on the graphic user interface operating System (Mac OS X)TM) Multi-user, multi-process computer operating system (Unix)TM) Free and open native code Unix-like operating System (Linux)TM) Open native code Unix-like operating System (FreeBSD)TM) Or the like.
In an exemplary embodiment, a non-transitory computer readable storage medium, such as the memory 1932, is also provided that includes computer program instructions executable by the processing component 1922 of the electronic device 1900 to perform the above-described methods.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The computer program product may be embodied in hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied in a computer storage medium, and in another alternative embodiment, the computer program product is embodied in a Software product, such as a Software Development Kit (SDK), or the like.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (14)

1. An identity authentication method, comprising:
acquiring face information for requesting unlocking of an object to be unlocked;
performing identity authentication on the requesting user sending the request based on the face information and preset identity authentication reference information;
and in response to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.
2. The method according to claim 1, wherein the identity authentication reference information comprises: a reference face information base;
the adjusting the identity authentication reference information based on the face information includes:
and adding the face information into a reference face information set associated with the request user in the reference face information base.
3. The method according to claim 1, wherein the identity authentication reference information comprises: reference parameters for identity authentication.
4. The method of claim 3, wherein the reference parameters comprise preset neural network parameters;
the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises:
based on the face information, verifying whether the requesting user is an authenticated user by adopting the preset neural network;
the adjusting the identity authentication reference information based on the face information includes:
constructing a training sample by using the face information;
and adjusting the parameters of the preset neural network based on the training samples.
5. The method of claim 4, wherein the adjusting the parameters of the pre-set neural network based on the training samples comprises:
taking the face information as the input of the preset neural network to obtain an output result;
and responding to the output result that the authentication fails, and adjusting the parameters of the preset neural network so as to enable the adjusted identity authentication result of the preset neural network on the face information to be authenticated.
6. The method of claim 3, wherein the reference parameters for identity authentication comprise: a matching degree threshold value of the face information;
the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises:
determining the matching degree between the face information and the face information of the authenticated user;
determining that the requesting user passes authentication in response to the matching degree between the face information and the face information of the authenticated user exceeding the matching degree threshold;
the adjusting the identity authentication reference information based on the face information includes:
and reducing the matching degree threshold value.
7. The method of claim 6, wherein said adjusting down the threshold of the degree of match comprises:
and in response to the ambient brightness being lower than a set brightness threshold, adjusting the matching degree threshold down to a target matching degree threshold.
8. The method of claim 3, further comprising:
detecting whether a human face corresponding to the human face information has an occlusion area;
the identity authentication of the requesting user based on the face information and preset identity authentication reference information comprises:
in response to the fact that the shielded area exists in the face corresponding to the face information is detected, weighting is conducted on the non-shielded area in the face information on the basis of a first matching weight to obtain first weighting information, and weighting is conducted on the shielded area in the face information on the basis of a second matching weight to obtain second weighting information;
performing identity authentication on the requesting user based on the first weighted information and the second weighted information;
the adjusting the identity authentication reference information based on the face information includes: and in response to detecting that the face has an occlusion region, increasing the first matching weight and/or decreasing the second matching weight.
9. The method according to any one of claims 1-8, further comprising:
responding to the situation that the object to be unlocked is successfully unlocked based on preset unlocking operation under the condition that the object to be unlocked is not successfully unlocked according to the identity authentication result of the user, and sending prompt information to the requesting user, wherein the prompt information is used for prompting the requesting user to adjust the identity authentication reference information; the adjusting the identity authentication reference information based on the face information includes:
and responding to the detected request user to send out an adjusting instruction based on the prompt information, and adjusting the identity authentication reference information based on the face information.
10. The method of any one of claims 1-8, further comprising:
acquiring a time interval between the request sent by the requesting user and the execution of the preset unlocking operation;
the adjusting the identity authentication reference information based on the face information includes:
and responding to the condition that the time interval is smaller than a set duration threshold, and adjusting the identity authentication reference information based on the face information.
11. The method according to any one of claims 1-10, wherein the object to be unlocked comprises at least one of the following devices:
door lock, room door lock, floodgate machine.
12. An identity authentication apparatus, comprising:
the device comprises an acquisition unit, a judgment unit and a display unit, wherein the acquisition unit is used for acquiring face information for requesting to unlock an object to be unlocked;
the authentication unit is used for performing identity authentication on the requesting user sending the request based on the face information and preset identity authentication reference information;
and the adjusting unit is used for responding to the situation that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on the preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.
13. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to invoke the memory-stored instructions to perform the method of any of claims 1 to 11.
14. A computer readable storage medium having computer program instructions stored thereon, which when executed by a processor implement the method of any one of claims 1 to 11.
CN202011631815.1A 2020-12-31 2020-12-31 Identity authentication method and device, electronic equipment and storage medium Pending CN112667984A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202011631815.1A CN112667984A (en) 2020-12-31 2020-12-31 Identity authentication method and device, electronic equipment and storage medium
JP2023521973A JP2023546837A (en) 2020-12-31 2021-07-30 Identity authentication methods and devices, electronic devices and storage media
PCT/CN2021/109820 WO2022142330A1 (en) 2020-12-31 2021-07-30 Identity authentication method and apparatus, and electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011631815.1A CN112667984A (en) 2020-12-31 2020-12-31 Identity authentication method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112667984A true CN112667984A (en) 2021-04-16

Family

ID=75413047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011631815.1A Pending CN112667984A (en) 2020-12-31 2020-12-31 Identity authentication method and device, electronic equipment and storage medium

Country Status (3)

Country Link
JP (1) JP2023546837A (en)
CN (1) CN112667984A (en)
WO (1) WO2022142330A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113256832A (en) * 2021-05-11 2021-08-13 南开大学 Intelligent sign-in system and intelligent sign-in management method
CN113628376A (en) * 2021-07-19 2021-11-09 杭州奥声物业有限公司 Property management system based on non-contact recognition
WO2022142330A1 (en) * 2020-12-31 2022-07-07 上海商汤临港智能科技有限公司 Identity authentication method and apparatus, and electronic device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295482A (en) * 2015-06-11 2017-01-04 中国移动(深圳)有限公司 The update method of a kind of face database and device
CN107679473A (en) * 2017-09-22 2018-02-09 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108229120A (en) * 2017-09-07 2018-06-29 北京市商汤科技开发有限公司 Face unlock and its information registering method and device, equipment, program, medium
CN108256451A (en) * 2018-01-05 2018-07-06 百度在线网络技术(北京)有限公司 For detecting the method and apparatus of face
CN108830062A (en) * 2018-05-29 2018-11-16 努比亚技术有限公司 Face identification method, mobile terminal and computer readable storage medium
CN108830061A (en) * 2018-05-25 2018-11-16 努比亚技术有限公司 Terminal unlock method, mobile terminal and readable storage medium storing program for executing based on recognition of face
WO2020113571A1 (en) * 2018-12-07 2020-06-11 深圳市欢太科技有限公司 Face recognition data processing method and apparatus, mobile device and computer readable storage medium
CN111554006A (en) * 2020-04-13 2020-08-18 绍兴埃瓦科技有限公司 Intelligent lock and intelligent unlocking method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3188406B1 (en) * 2014-09-30 2019-05-29 Huawei Technologies Co., Ltd. Method and apparatus for identity authentication and user equipment
CN110008821B (en) * 2019-02-02 2023-07-18 创新先进技术有限公司 Method and equipment for predicting updating of portrait base map
CN111898561A (en) * 2020-08-04 2020-11-06 腾讯科技(深圳)有限公司 Face authentication method, device, equipment and medium
CN112667984A (en) * 2020-12-31 2021-04-16 上海商汤临港智能科技有限公司 Identity authentication method and device, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295482A (en) * 2015-06-11 2017-01-04 中国移动(深圳)有限公司 The update method of a kind of face database and device
CN108229120A (en) * 2017-09-07 2018-06-29 北京市商汤科技开发有限公司 Face unlock and its information registering method and device, equipment, program, medium
CN107679473A (en) * 2017-09-22 2018-02-09 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108256451A (en) * 2018-01-05 2018-07-06 百度在线网络技术(北京)有限公司 For detecting the method and apparatus of face
CN108830061A (en) * 2018-05-25 2018-11-16 努比亚技术有限公司 Terminal unlock method, mobile terminal and readable storage medium storing program for executing based on recognition of face
CN108830062A (en) * 2018-05-29 2018-11-16 努比亚技术有限公司 Face identification method, mobile terminal and computer readable storage medium
WO2020113571A1 (en) * 2018-12-07 2020-06-11 深圳市欢太科技有限公司 Face recognition data processing method and apparatus, mobile device and computer readable storage medium
CN111554006A (en) * 2020-04-13 2020-08-18 绍兴埃瓦科技有限公司 Intelligent lock and intelligent unlocking method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022142330A1 (en) * 2020-12-31 2022-07-07 上海商汤临港智能科技有限公司 Identity authentication method and apparatus, and electronic device and storage medium
CN113256832A (en) * 2021-05-11 2021-08-13 南开大学 Intelligent sign-in system and intelligent sign-in management method
CN113628376A (en) * 2021-07-19 2021-11-09 杭州奥声物业有限公司 Property management system based on non-contact recognition

Also Published As

Publication number Publication date
WO2022142330A1 (en) 2022-07-07
JP2023546837A (en) 2023-11-08

Similar Documents

Publication Publication Date Title
CN106709399B (en) Fingerprint identification method and device
CN110569777B (en) Image processing method and device, electronic device and storage medium
US10102505B2 (en) Server-implemented method, terminal-implemented method and device for acquiring business card information
CN112667984A (en) Identity authentication method and device, electronic equipment and storage medium
CN110287671B (en) Verification method and device, electronic equipment and storage medium
CN105847243B (en) Method and device for accessing intelligent camera
CN110675539B (en) Identity verification method and device, electronic equipment and storage medium
US10313870B2 (en) Identity verification method and apparatus, and storage medium
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
EP3457271B1 (en) Methods, devices and storage medium for printing information
CN110532957B (en) Face recognition method and device, electronic equipment and storage medium
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
KR20170038178A (en) Method, apparatus, and mobile terminal for identificating fingerprint
CN112270288A (en) Living body identification method, access control device control method, living body identification device, access control device and electronic device
CN106980836B (en) Identity verification method and device
CN108319419B (en) Method and device for starting application
US10263925B2 (en) Method, device and medium for sending message
CN111310664A (en) Image processing method and device, electronic equipment and storage medium
CN110826045B (en) Authentication method and device, electronic equipment and storage medium
CN111625671A (en) Data processing method and device, electronic equipment and storage medium
US10671827B2 (en) Method and device for fingerprint verification
CN107133551B (en) Fingerprint verification method and device
CN112949568A (en) Method and device for matching human face and human body, electronic equipment and storage medium
CN108470120B (en) Screen locking control method and device and readable storage medium
CN112020059B (en) NFC instruction processing method, NFC instruction processing device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40045106

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20210416