CN113204754B - Authentication method and device based on augmented reality glasses, medium and electronic equipment - Google Patents

Authentication method and device based on augmented reality glasses, medium and electronic equipment Download PDF

Info

Publication number
CN113204754B
CN113204754B CN202110467018.2A CN202110467018A CN113204754B CN 113204754 B CN113204754 B CN 113204754B CN 202110467018 A CN202110467018 A CN 202110467018A CN 113204754 B CN113204754 B CN 113204754B
Authority
CN
China
Prior art keywords
depth
augmented reality
authentication
reality glasses
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110467018.2A
Other languages
Chinese (zh)
Other versions
CN113204754A (en
Inventor
陶宇权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110467018.2A priority Critical patent/CN113204754B/en
Publication of CN113204754A publication Critical patent/CN113204754A/en
Application granted granted Critical
Publication of CN113204754B publication Critical patent/CN113204754B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure provides an authentication method based on augmented reality glasses, an authentication device based on the augmented reality glasses, a computer readable storage medium and an electronic device, and relates to the technical field of augmented reality. The augmented reality glasses-based authentication method comprises the following steps: determining depth information of the first object using a depth sensor provided with augmented reality glasses; the depth information of the first object is displayed on a display interface of the augmented reality glasses; if the depth information of the first object meets the pre-configured authentication requirement, the authentication is passed. The present disclosure can improve security of authentication.

Description

Authentication method and device based on augmented reality glasses, medium and electronic equipment
Technical Field
The present disclosure relates to the field of augmented reality technologies, and in particular, to an authentication method based on augmented reality glasses, an authentication apparatus based on augmented reality glasses, a computer-readable storage medium, and an electronic device.
Background
The security authentication plays an increasingly important role in daily work and life, and can be applied to various terminal application scenes such as unlocking, payment and awakening.
At present, security authentication mainly includes password input authentication, fingerprint authentication, face authentication, and the like. However, in public places, the password input authentication mode may have the risk of password leakage, and the biometric-based authentication modes such as fingerprints and human faces may also have the problem of personal privacy leakage.
Disclosure of Invention
The present disclosure provides an authentication method of augmented reality glasses, an authentication apparatus based on augmented reality glasses, a computer-readable storage medium, and an electronic device, thereby overcoming, at least to some extent, the problem of insecurity of authentication due to privacy leakage.
According to a first aspect of the present disclosure, there is provided an authentication method based on augmented reality glasses, the augmented reality glasses being equipped with a depth sensor, the authentication method comprising: determining, with a depth sensor, depth information of a first object; the depth information of the first object is displayed on a display interface of the augmented reality glasses; and if the depth information of the first object meets the pre-configured authentication requirement, the authentication is passed.
According to a second aspect of the present disclosure, there is provided an authentication apparatus based on augmented reality glasses, the augmented reality glasses being equipped with a depth sensor, the authentication apparatus comprising: a depth information determination module for determining depth information of the first object using the depth sensor; the depth information of the first object is displayed on a display interface of the augmented reality glasses; and the authentication module is used for passing the authentication if the depth information of the first object meets the preconfigured authentication requirement.
According to a third aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described augmented reality glasses-based authentication method.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising a processor; a memory for storing one or more programs which, when executed by the processor, cause the processor to implement the augmented reality glasses-based authentication method described above.
In some embodiments of the present disclosure, a depth sensor provided in augmented reality glasses is used to determine depth information of a first object, and the depth information is displayed on a display interface of the augmented reality glasses, and when the depth information of the first object meets a pre-configured authentication requirement, it is determined that the authentication is passed. The distance of this disclosure with the help of augmented reality glasses detection object realizes the authentication, because only the person of wearing of augmented reality glasses can see the degree of depth information on the glasses interface, has reduced the risk of information leakage, has guaranteed the security of authentication.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure. It should be apparent that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived by those of ordinary skill in the art without inventive effort. In the drawings:
fig. 1 shows a schematic diagram of an exemplary system architecture of an augmented reality glasses-based authentication scheme to which embodiments of the present disclosure may be applied;
fig. 2 shows a stylistic schematic of augmented reality glasses of an embodiment of the present disclosure;
FIG. 3 shows a schematic structural diagram of an electronic device of an embodiment of the disclosure;
fig. 4 schematically illustrates a flow chart of an augmented reality glasses-based authentication method according to an exemplary embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart of an authentication requirement entry process according to an embodiment of the present disclosure;
FIG. 6 schematically shows a flow diagram of an authentication requirement entry process according to another embodiment of the present disclosure;
FIG. 7 is a schematic diagram illustrating a scenario of authentication based on the enhanced display glasses authentication method according to the present disclosure;
fig. 8 schematically illustrates a block diagram of an augmented reality glasses-based authentication apparatus according to an exemplary embodiment of the present disclosure;
fig. 9 schematically illustrates a block diagram of an augmented reality glasses-based authentication apparatus according to another exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the embodiments of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the steps. For example, some steps may be decomposed, and some steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation. In addition, all of the following terms "first" and "second" are used for distinguishing purposes only and should not be construed as limiting the present disclosure.
Fig. 1 shows a schematic diagram of an exemplary system architecture of an augmented reality glasses-based authentication scheme to which embodiments of the present disclosure may be applied.
As shown in fig. 1, the system architecture may include augmented reality glasses 11 and another terminal device 12, such as a cell phone. Although the terminal device 12 is illustrated as a mobile phone in fig. 1, the terminal device 12 may also include a tablet computer, a personal computer, and the like. In addition, the augmented reality glasses 11 may be in communication connection with the terminal device 12 in a wired or wireless manner, and for example, in a wireless manner, the communication connection may be performed in a bluetooth manner, a WiFi manner, or the like.
The augmented reality glasses 11 may be equipped with a depth sensor, and the present disclosure does not limit the type of the depth sensor, and may be, for example, structured light, toF (Time of Flight), or the like.
In the case where the augmented reality glasses 11 establish control trust with the terminal device 12, authentication confirmation for the terminal device 12 may be implemented using the augmented reality glasses 11.
Specifically, the augmented reality glasses 11 may determine the depth information of the first object by using a depth sensor provided therein, and display the depth information of the first object on a display interface of the augmented reality glasses. It should be noted that the depth information described in the present disclosure may include one or more depth values. Next, the augmented reality glasses 11 may determine whether the depth information of the first object satisfies a pre-configured authentication requirement, and if so, the authentication passes. At this time, the augmented reality glasses 11 may transmit information representing that the authentication is passed to the terminal device 12, so that the terminal device 12 performs operations after the authentication is passed, for example, but not limited to unlocking a screen, paying, waking up an application, and any other operations requiring authentication.
With the trend that the functions of the augmented reality glasses 11 are more and more abundant, the authentication may also be for the augmented reality glasses 11 themselves, for example, waking up a microphone, turning off a power supply, and other device functions. In this case, only augmented reality glasses 11 are included in the system architecture.
Taking the scene of waking up the microphone as an example, the augmented reality glasses 11 may determine the depth information of the first object by using the depth sensor, and when the depth information of the first object meets the pre-configured authentication requirement corresponding to the waking up microphone, the authentication is passed, and the augmented reality glasses 11 turn on the microphone equipped by themselves.
In addition, the process of determining whether the authentication requirement is satisfied according to the present disclosure may also be performed by the terminal device 12, that is, the augmented reality glasses 11 are only used for collecting the depth information and displaying the depth information on the display interface. Meanwhile, the augmented reality glasses 11 send the collected depth information to the terminal device 12, and the terminal device 12 determines whether the detected depth information meets the pre-configured authentication requirement. If the augmented reality glasses 11 perform the operation after the authentication, the terminal device 12 may send the information representing that the authentication is passed to the augmented reality glasses 11, so that the augmented reality glasses 11 perform the operation after the authentication is passed. If the terminal device 12 performs the operation after the authentication, the terminal device 12 may directly perform the operation after the authentication is passed.
Fig. 2 shows a style diagram of augmented reality glasses of an embodiment of the present disclosure.
Referring to fig. 2, augmented reality glasses of the present disclosure may include a depth sensor 21, a processor 22, a light engine 23, and a displayable lens 24. It should be understood that the augmented reality glasses of the present disclosure may include a light engine and a display lens on only one side corresponding to the human eye, and for example, in fig. 2, the depth information can only be displayed on the displayable lens 24. However, in other embodiments, the optical machine and the display lens are included on both sides of the augmented reality glasses, that is, the depth information can be displayed on both lenses of the glasses.
In the authentication scheme based on augmented reality glasses according to the embodiment of the present disclosure, the depth sensor 21 may detect depth information of an object in a scene, and the processor 22 analyzes the depth data and displays the depth information of the object on the displayable lens 24 by means of the optical machine 23.
Meanwhile, the processor 22 may determine whether the depth information satisfies a pre-configured authentication requirement, and if so, the authentication is passed. If the depth information does not meet the pre-configured authentication requirement after a preset time elapses from the start of the detection, the information of the authentication failure is displayed on the displayable lens 24 by means of the optical machine 23.
Fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. Augmented reality glasses of exemplary embodiments of the present disclosure may be configured as in fig. 3. It should be noted that the electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
The electronic device of the present disclosure includes at least a processor and a memory for storing one or more programs, which when executed by the processor, cause the processor to implement the authentication method of the exemplary embodiments of the present disclosure.
Specifically, as shown in fig. 3, the electronic device 3 may include: a processor 31, a memory 32, an input-output unit 33 and a communication unit 34. Among them, the input-output unit 33 may include at least one display part 331, an optical part 332, a sensor 333, and an audio part 334.
It is to be understood that the illustrated structure of the embodiment of the present disclosure does not constitute a specific limitation to the electronic device 3. In other embodiments of the present disclosure, the electronic device 3 may include more or fewer components than illustrated, or combine certain components, or split certain components, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 31 may include one or more processing units, such as: the Processor 31 may include an Application Processor (AP), a modem Processor, a Graphics Processor (GPU), an Image Signal Processor (ISP), a controller, a video codec, a Digital Signal Processor (DSP), a baseband Processor and/or a Neural Network Processor (NPU), and the like. Wherein, the different processing units may be independent devices or may be integrated in one or more processors. Additionally, a memory may be provided in the processor 31 for storing instructions and data.
The input-output unit 33 may be used to acquire data from the outside or transmit data to the outside.
At least one display member 331 may be used to display images, generally referred to as displayable lenses.
Optical components 332 may be used to form an optical system that presents an image to a user and may include static components such as waveguides, static optical couplers, and fixed lenses. In addition, adjustable optical components may also be included, such as adjustable resonators, tunable lenses, dynamically adjustable couplers, adjustable liquid crystal holographic couplers, and the like. The device structures included in optical component 332 may be configured in series, and the present disclosure does not limit the manner in which they are combined.
The sensor 333 may include, for example, an infrared sensor, a temperature sensor, an acceleration sensor, etc., in addition to the depth sensor described in the present disclosure. In addition, the present disclosure does not limit the arrangement position of the sensor, and for example, the depth sensor may be arranged on a frame of the glasses.
Audio component 334 may include a microphone for capturing voice instructions and other audio input, and a speaker for providing audio output.
The communication unit 34 may include a wired and/or wireless communication module for transmitting signals with an external device.
The present disclosure also provides a computer-readable storage medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device.
A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable storage medium may transmit, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The computer-readable storage medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method as described in the embodiments below.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
In the following, the authentication method according to the embodiment of the present disclosure is performed by using augmented reality glasses as an example, and in this case, the authentication device described below may be disposed in the augmented reality glasses.
Fig. 4 schematically illustrates a flowchart of an augmented reality glasses-based authentication method of an exemplary embodiment of the present disclosure. Referring to fig. 4, the augmented reality glasses-based authentication method may include the steps of:
s42, determining depth information of the first object by using a depth sensor; the depth information of the first object is displayed on a display interface of the augmented reality glasses.
In an exemplary embodiment of the present disclosure, the first object is a real object in the real world. The first object may be a living object, such as an animal like a cat, a dog, a human hand, a user other than a user wearing augmented reality glasses, or the like. In addition, the first object may also be a non-living object, such as a display screen, book, box, or the like.
In a scene in which the first object is a specific object, an RGB camera equipped with augmented reality glasses may be used to capture an image, and image recognition is performed to determine whether the image includes the first object, and if it is determined that the image includes the first object, the depth sensor may be used to determine depth information of the first object.
In the case that the depth map collected by the depth sensor includes a plurality of objects, a region of each object may be displayed on a display interface (an interface corresponding to a displayable lens) of the augmented reality glasses, and the region is generally configured in the form of a rectangular frame. In this case, the user can move the head to realize the movement of the center of gravity, and then the object corresponding to the center of gravity is set as the first object without manual operation. In addition, the user can select one object from the plurality of objects as the first object through the buttons of the augmented reality glasses.
In addition, in a case that the depth value of each point on the first object is not exactly the same, the depth values of all the points may be averaged, for example, to obtain the depth values of the augmented reality glasses and the first object. For another example, the depth value of the center point of the first object may be taken as the depth value of the augmented reality glasses and the first object. For another example, a number of points on the first object may be randomly selected, and a depth average value may be obtained for the points, so as to obtain a depth value between the augmented reality glasses and the first object.
According to some embodiments of the present disclosure, the depth information of the first object is one depth value. That is, the scheme process described below uses only one depth value to determine whether authentication passes.
According to other embodiments of the present disclosure, in a case where a user wearing the augmented reality glasses moves or the first object moves, a distance between the augmented reality glasses and the first object changes, and at this time, the determined depth information includes a plurality of depth values determined in chronological order.
In case the depth sensor continuously acquires depths, the plurality of depth values may be consecutive depth values. For example, 30cm to 10cm.
In the case where the depth sensor collects depths at time intervals, the plurality of depth values may be discrete depth values. Taking the example of acquiring 5 depth values, for example: 30cm, 28cm, 25cm, 20cm, 10cm.
In addition, in order to make the collected depth value better controlled by the user's intention, during the user's movement, if the user has hardly moved for a certain period of time, that is, the depth value of the detected number is stabilized at a value and the offset is smaller than a depth threshold, the depth value in this case is recorded. For example, the resulting depth values may be 10cm, 15cm, and 20cm.
It can be appreciated that since the depth information of the first object can be displayed on the display interface of the augmented reality glasses in real time, the user is facilitated to adjust the distance from the first object. In addition, the privacy is guaranteed just because the depth information is on the augmented reality glasses.
And S44, if the depth information of the first object meets the preset authentication requirement, the authentication is passed.
In the case where the depth information of the first object is only one depth value, the detected depth value may be compared with a preset depth value, and if the two depth values are identical, the authentication may pass. Wherein the preset depth value may be a depth value pre-configured by a user, for example, 52cm. If the preconfigured depth value is the same person as the user who wants to authenticate at present, the user must know that 52cm is the set preset depth value, and the user can move to a place having a depth value of 52cm from the first object by means of the depth value displayed on the augmented reality glasses. At this point, the user may stay for a certain time (e.g., 3s, 5s, etc.) to complete the authentication. Alternatively, the user may complete the authentication by voice or by touching a control.
The following describes a case where the depth information of the first object includes a plurality of depth values determined in chronological order.
According to some embodiments of the present disclosure, it may be determined whether the plurality of depth values includes a plurality of preset depth values arranged in a predetermined order with respect to each other, it should be noted that the preset depth values are ordered with respect to each other.
If it is determined that the plurality of depth values includes a plurality of preset depth values arranged in a predetermined order with respect to each other, it is determined that the depth information of the first object satisfies a pre-configured authentication requirement.
If it is determined that the plurality of depth values does not include a plurality of preset depth values arranged in a predetermined order with respect to each other, it is determined that the depth information of the first object does not satisfy a pre-configured authentication requirement.
For example, in the case where the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, 30cm, if a plurality of preset depth values arranged in a predetermined order with respect to each other are 15cm, 10cm, 30cm, it is determined that the depth information of the first object satisfies the authentication requirement arranged in advance. If the plurality of preset depth values arranged in the predetermined order are 10cm, 15cm, 30cm, it is determined that the depth information of the first object does not satisfy the authentication requirement arranged in advance.
It can be seen that, when determining whether the pre-configured authentication requirement is satisfied, it is determined not only whether the detected depth information includes the preset depth value, but also whether the predetermined appearance sequence of the preset depth values is satisfied.
Referring to fig. 5, a process of determining the preset depth value in advance is exemplified.
In step S502, a plurality of depth values of the augmented reality glasses and the second object are determined as the depth information of the second object using the depth sensor. The second object may be the same as or different from the first object, and in fact, the disclosed solution does not concern what the object is, but only concerns the depth of the object. For example, 10 depth values of the second object are obtained.
In step S504, a plurality of depth values are determined as a plurality of preset depth values from the depth information of the second object. For example, 3 depth values are determined as the preset depth values from the 10 depth values determined in step S502. Specifically, the preset depth values may be selected by the user, or may be selected by the augmented reality glasses, and then the preset depth values are displayed through the display interface of the augmented reality glasses, so that the user can know the preset depth values.
It should be understood that the process of detecting the depth value in step S42 is a process of detecting in real time, that is, each time a depth value is detected, the depth value is displayed on the display interface of the augmented reality glasses, and a determination process of whether the authentication requirement is met is performed.
Changing a display style of the current depth value on the display interface if the determined current depth value corresponds to a target depth value among a plurality of preset depth values arranged in a predetermined order with respect to each other.
Still by way of example, in the case where the plurality of preset depth values arranged in a predetermined order from each other are 15cm, 10cm, and 30cm, if the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, and 30cm, the display patterns of the depth values on the display interface are respectively changed when the current depth values are 15cm, 10cm, and 30cm, respectively. Therefore, the function of reminding the user is achieved.
Specifically, the change of the display style includes, but is not limited to, changing the font size, changing the font color, changing the font flicker degree, and the like, which is not limited by the present disclosure.
According to further embodiments of the present disclosure, first, feature values corresponding to a plurality of depth values in the depth information of the first object may be determined. Specifically, the mapping relationship table between the depth values and the feature values may be used to determine the feature value corresponding to each depth value, for example, 10cm corresponds to the feature value 1, and 12cm corresponds to the feature value 2. Such a mapping table may be configured and stored by the user in advance.
It will be appreciated that where the determined depth values are arranged chronologically, the determined corresponding feature values are also chronologically ordered.
Next, it is determined whether the plurality of feature values sorted in time-series order include a plurality of preset feature values arranged in a predetermined order therebetween.
And if the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values which are configured according to a preset sequence, determining that the depth information of the first object meets the pre-configured authentication requirement.
And if the plurality of characteristic values arranged according to the time sequence do not comprise a plurality of preset characteristic values configured according to a preset sequence, determining that the depth information of the first object does not meet the pre-configured authentication requirement.
For example, when the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, or 30cm, the characteristic values determined in chronological order by the above-described mapping relationship table are respectively 5, 3, 2, 1, 0.8, 4, or 8, and if a plurality of preset characteristic values arranged in a predetermined order from one another are 3, 1, or 8, it is determined that the depth information of the first object satisfies the authentication requirement configured in advance. And if the plurality of preset characteristic values which are arranged in a predetermined sequence among each other are 2, 1 and 4, determining that the depth information of the first object does not meet the preset authentication requirement.
It can be seen that, when determining whether the preset authentication requirement is met, not only is the determined characteristic value included in the preset characteristic values, but also whether the preset appearance sequence of each preset characteristic value is met is determined.
Referring to fig. 6, a process of determining the preset characteristic value in advance is exemplified.
In step S602, a plurality of depth values of the augmented reality glasses and the second object are determined as the depth information of the second object by using the depth sensor. As described above, the second object may be the same as the first object or may be different from the first object. For example, 10 depth values of the second object are obtained.
In step S604, a plurality of depth values are determined as depth values to be converted from the second object depth information, wherein each depth value to be converted is a depth value to be converted into a feature value, which are arranged in chronological order of detection by the depth sensor. For example, 3 depth values to be converted are determined from the 10 depth values. Specifically, the depth values to be converted may be selected by the user, or may be selected by the augmented reality glasses, and then the depth values to be converted are displayed through the display interface of the augmented reality glasses, so that the user can know the depth values.
In step S606, a feature value corresponding to each depth value to be converted may be determined as a preset feature value by using a pre-configured mapping relationship table.
It should be understood that the process of detecting the depth value in step S42 is a process of detecting in real time, that is, each time a depth value is detected, the depth value is displayed on the display interface of the augmented reality glasses, and a determination process of whether the authentication requirement is met is performed.
And changing a display style of the current depth value on the display interface if the determined feature value of the current depth value corresponds to a target feature value among a plurality of preset feature values arranged in a predetermined order with respect to each other.
Still by way of example, in the case where the plurality of preset feature values arranged in a predetermined order among each other are 3, 1, 8, if the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, 30cm, the display styles of these on the display interface are changed respectively in the case where the current depth values are 15cm, 10cm, 30cm, respectively. Therefore, the function of reminding the user is achieved.
Specifically, the change of the display style includes, but is not limited to, changing the font size, changing the font color, changing the font flicker degree, and the like, which is not limited by the present disclosure.
In addition, in the case that the augmented reality glasses are in communication connection with a terminal device and the whole authentication process is an authentication process for the terminal device, after the augmented reality glasses determine that the authentication passes, the augmented reality glasses may send information representing that the authentication passes to the terminal device, so that the terminal device performs an operation after the authentication passes. For example, the terminal device completes unlocking, payment and the like.
It should be understood that the authentication scheme of the present disclosure may replace the existing scheme of authentication using password input, fingerprint, facial recognition, etc., and can help to improve the security of authentication.
In addition, in other embodiments of the present disclosure, after a preset time elapses after the depth sensor of the augmented reality glasses is turned on, for example, 60s after the depth sensor starts to detect the depth, if the determined depth information of the first object does not meet the preconfigured authentication requirement, the authentication failure is indicated, and information of the authentication failure may be displayed on the display interface of the augmented reality glasses.
An application scenario of the disclosed solution will be explained with reference to fig. 7.
When a user wants to unlock a corresponding function (e.g., a computing, rendering, etc. function) of an application, this may be accomplished by means of augmented reality glasses 71.
Specifically, the user may preset an authentication password corresponding to the function, for example, the authentication password is a feature value 5, 2, or 3. In the case where the correspondence relationship between the feature value and the depth value is known in advance, the depth values corresponding to the feature values 5, 2, and 3 can be obtained as 15cm, 6cm, and 9cm. Just as the mobile phone needs to be unlocked at present, the user knows the unlocking password.
In the authenticated scenario, the user needs to wear augmented reality glasses 71, and with the depth sensor turned on, the user can select one box 72 in the real world as the object for sensing depth.
At this time, the depth value of the box 72 may be displayed in real time on the display interface of the augmented reality glasses 71. Such as showing a current depth value of 30cm on the lens.
When the user sees the box 72 with a depth value of 30cm, he can know that it is farther from the box 72 than the first 15cm of the password, and at this time, he can move toward the box 72.
In the case where 15cm is displayed on the lens, the user may stay for a certain time (e.g., 3s, 5s, etc.) as one digit of the password. Alternatively, the user may confirm the current depth value as one bit of the password by voice or by touching a control on the glasses. In this case, the augmented reality glasses would record this depth value and compare it to the pre-configured password.
Subsequently, the user continues forward, and with 6cm displayed on the lens, the user confirms the current depth value as one digit of the password, for example, by staying for a certain time or by voice, or by touching and pressing a control on the glasses. In this case, the augmented reality glasses continue to record the comparison.
Next, the user can go backwards, and in the case that 9cm is displayed on the lens, the user can determine another password by using the same manner of confirming the depth.
Thus, the augmented reality glasses record the depth of 15cm, 6cm, 9cm, and correspond to the feature values of 5, 2, 3, thereby passing the authentication. In this case, the augmented reality glasses unlock the corresponding function by themselves.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken into multiple step executions, etc.
Further, the present example embodiment also provides an authentication device based on augmented reality glasses.
Fig. 8 schematically illustrates a block diagram of an augmented reality glasses-based authentication apparatus according to an exemplary embodiment of the present disclosure. Augmented reality glasses are equipped with depth sensors. Referring to fig. 8, the augmented reality glasses-based authentication apparatus 8 according to an exemplary embodiment of the present disclosure may include a depth information determination module 81 and an authentication module 83.
In particular, the depth information determining module 81 may be configured to determine depth information of the first object using a depth sensor; the depth information of the first object is displayed on a display interface of the augmented reality glasses; the authentication module 83 may be configured to pass the authentication if the depth information of the first object meets a pre-configured authentication requirement.
According to an exemplary embodiment of the present disclosure, in a case where a distance between the augmented reality glasses and the first object is changed, the depth information of the first object includes a plurality of depth values determined in chronological order.
According to an example embodiment of the present disclosure, the authentication module 83 may be configured to perform: judging whether the plurality of depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence; and if the plurality of depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence, determining that the depth information of the first object meets the preset authentication requirement.
According to an example embodiment of the disclosure, the authentication module 83 may be further configured to perform: determining depth information of a second object by using a depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed; a plurality of depth values are determined as a plurality of preset depth values from the depth information of the second object.
According to an example embodiment of the disclosure, the authentication module 83 may be further configured to perform: and if the determined current depth value corresponds to a target depth value among a plurality of preset depth values configured in a predetermined order with respect to each other, changing a display style of the current depth value on the display interface.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: determining characteristic values corresponding to the depth values, wherein the characteristic values are arranged according to time sequence; judging whether the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values which are configured according to a preset sequence; and if the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values which are configured according to a preset sequence, determining that the depth information of the first object meets the pre-configured authentication requirement.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: determining depth information of a second object by using a depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed; determining a plurality of depth values as depth values to be converted from the depth information of the second object; wherein, the depth values to be converted are arranged according to the time sequence detected by the depth sensor; and determining a characteristic value corresponding to each depth value to be converted as a preset characteristic value.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: and changing a display style of the current depth value on the display interface if the determined feature value of the current depth value corresponds to a target feature value among a plurality of preset feature values arranged in a predetermined order with respect to each other.
According to an exemplary embodiment of the present disclosure, the augmented reality glasses are communicatively connected with a terminal device, in this case, referring to fig. 9, the augmented reality glasses-based authentication apparatus 9 may further include an information transmitting module 91, compared to the augmented reality glasses-based authentication apparatus 8.
Specifically, after the augmented reality glasses determine that the authentication is passed, information representing that the authentication is passed is sent to the terminal device, so that the terminal device executes the operation after the authentication is passed.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: and after a preset time passes since the depth sensor is started, if the depth information of the first object does not meet the pre-configured authentication requirement, displaying the information of authentication failure on a display interface.
Since each functional module of the authentication device based on augmented reality glasses according to the embodiment of the present disclosure is the same as that in the embodiment of the method described above, it is not described herein again.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Furthermore, the above-described figures are merely schematic illustrations of processes included in methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the terms of the appended claims.

Claims (12)

1. An augmented reality glasses-based authentication method, wherein the augmented reality glasses are equipped with a depth sensor, the authentication method comprising:
determining, with the depth sensor, depth information of a first object; the first object is a real object in the real world, the depth information of the first object is displayed on a display interface of the augmented reality glasses, and the depth information of the first object comprises a plurality of depth values determined according to the time sequence under the condition that the distance between the augmented reality glasses and the first object is changed due to the movement of a user wearing the augmented reality glasses or the movement of the first object;
and if the depth information of the first object meets the preset authentication requirement, the authentication is passed.
2. The authentication method according to claim 1, characterized in that the authentication method comprises:
judging whether the depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence;
and if the depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence, determining that the depth information of the first object meets the preset authentication requirement.
3. The authentication method according to claim 2, further comprising:
determining depth information of a second object by using the depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed;
determining a plurality of depth values as the plurality of preset depth values from the depth information of the second object.
4. The authentication method according to claim 2, further comprising:
changing a display style of the current depth value on the display interface if the determined current depth value corresponds to a target depth value among the plurality of preset depth values arranged in a predetermined order therebetween.
5. The authentication method according to claim 1, characterized in that the authentication method comprises:
determining characteristic values corresponding to the depth values, wherein the characteristic values are arranged according to time sequence;
judging whether the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values which are configured according to a preset sequence;
and if the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values which are configured according to a preset sequence, determining that the depth information of the first object meets the pre-configured authentication requirement.
6. The authentication method according to claim 5, further comprising:
determining depth information of a second object by using the depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed;
determining a plurality of depth values as depth values to be converted from the depth information of the second object; the depth values to be converted are arranged according to the time sequence detected by the depth sensor;
and determining a characteristic value corresponding to each depth value to be converted as the preset characteristic value.
7. The authentication method according to claim 5, further comprising:
and if the determined characteristic value of the current depth value corresponds to a target characteristic value in a plurality of preset characteristic values which are configured in a preset sequence, changing the display style of the current depth value on the display interface.
8. The authentication method according to claim 1, wherein the augmented reality glasses are communicatively connected to a terminal device, the authentication method further comprising:
and after the augmented reality glasses determine that the authentication is passed, sending information representing that the authentication is passed to the terminal equipment so that the terminal equipment can execute the operation after the authentication is passed.
9. The authentication method according to any one of claims 1 to 8, characterized in that the authentication method further comprises:
and after a preset time elapses since the depth sensor is started, if the depth information of the first object does not meet the pre-configured authentication requirement, displaying information of authentication failure on the display interface.
10. An augmented reality glasses-based authentication apparatus, the augmented reality glasses being equipped with a depth sensor, the authentication apparatus comprising:
a depth information determination module for determining depth information of the first object using the depth sensor; the first object is a real object in the real world, the depth information of the first object is displayed on a display interface of the augmented reality glasses, and the depth information of the first object comprises a plurality of depth values determined according to the time sequence under the condition that the distance between the augmented reality glasses and the first object is changed due to the movement of a user wearing the augmented reality glasses or the movement of the first object;
and the authentication module is used for passing the authentication if the depth information of the first object meets the pre-configured authentication requirement.
11. A computer-readable storage medium on which a computer program is stored, the program, when executed by a processor, implementing an augmented reality glasses-based authentication method according to any one of claims 1 to 9.
12. An electronic device, comprising:
a processor;
a memory for storing one or more programs that, when executed by the processor, cause the processor to implement the augmented reality glasses-based authentication method of any one of claims 1 to 9.
CN202110467018.2A 2021-04-28 2021-04-28 Authentication method and device based on augmented reality glasses, medium and electronic equipment Active CN113204754B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110467018.2A CN113204754B (en) 2021-04-28 2021-04-28 Authentication method and device based on augmented reality glasses, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110467018.2A CN113204754B (en) 2021-04-28 2021-04-28 Authentication method and device based on augmented reality glasses, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN113204754A CN113204754A (en) 2021-08-03
CN113204754B true CN113204754B (en) 2023-01-31

Family

ID=77029195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110467018.2A Active CN113204754B (en) 2021-04-28 2021-04-28 Authentication method and device based on augmented reality glasses, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113204754B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036169A (en) * 2014-06-06 2014-09-10 北京智谷睿拓技术服务有限公司 Biometric authentication method and biometric authentication device
US9147061B1 (en) * 2013-11-22 2015-09-29 Google Inc. Multi-level authentication

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9092600B2 (en) * 2012-11-05 2015-07-28 Microsoft Technology Licensing, Llc User authentication on augmented reality display device
CN104038489A (en) * 2014-06-06 2014-09-10 北京智谷睿拓技术服务有限公司 Biological authentication method and biological authentication device
KR102210633B1 (en) * 2014-07-09 2021-02-02 엘지전자 주식회사 Display device having scope of accredition in cooperatin with the depth of virtual object and controlling method thereof
US10402554B2 (en) * 2015-06-27 2019-09-03 Intel Corporation Technologies for depth-based user authentication
WO2019231042A1 (en) * 2018-06-01 2019-12-05 엘지전자 주식회사 Biometric authentication device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9147061B1 (en) * 2013-11-22 2015-09-29 Google Inc. Multi-level authentication
CN104036169A (en) * 2014-06-06 2014-09-10 北京智谷睿拓技术服务有限公司 Biometric authentication method and biometric authentication device

Also Published As

Publication number Publication date
CN113204754A (en) 2021-08-03

Similar Documents

Publication Publication Date Title
EP3692461B1 (en) Removing personally identifiable data before transmission from a device
US10565763B2 (en) Method and camera device for processing image
KR101688168B1 (en) Mobile terminal and method for controlling the same
KR101710478B1 (en) Mobile electric document system of multiple biometric
CN104933344A (en) Mobile terminal user identity authentication device and method based on multiple biological feature modals
TW201814572A (en) Facial recognition-based authentication
TWI706270B (en) Identity recognition method, device and computer readable storage medium
WO2021147434A1 (en) Artificial intelligence-based face recognition method and apparatus, device, and medium
CN204791017U (en) Mobile terminal users authentication device based on many biological characteristics mode
KR20190121758A (en) Information processing apparatus, information processing method, and program
CN111432245B (en) Multimedia information playing control method, device, equipment and storage medium
CN103838366A (en) facial expression control system, expression control method and computer system thereof
CN107636565B (en) Wearable display device and method for controlling operation of a payment process
CN108363939B (en) Characteristic image acquisition method and device and user authentication method
CN111566693A (en) Wrinkle detection method and electronic equipment
CN107169429A (en) Vivo identification method and device
CN111915305B (en) Payment method, device, equipment and storage medium
CN111310608A (en) User identification method, user identification device, storage medium and head-mounted device
KR20190021049A (en) Electronic device and method for identifying object based on setting region-of-interest by using the same
CN103870735A (en) Unlocking processing method and device
CN113204754B (en) Authentication method and device based on augmented reality glasses, medium and electronic equipment
KR20190048630A (en) Electric terminal and method for controlling the same
CN116152122A (en) Image processing method and electronic device
KR101314687B1 (en) Providing device of eye scan path and mehtod for providing eye scan path
KR20120017670A (en) Image communications method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant