CN113781050A - Biological password verification method and device, electronic equipment and storage medium - Google Patents

Biological password verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113781050A
CN113781050A CN202111031381.6A CN202111031381A CN113781050A CN 113781050 A CN113781050 A CN 113781050A CN 202111031381 A CN202111031381 A CN 202111031381A CN 113781050 A CN113781050 A CN 113781050A
Authority
CN
China
Prior art keywords
dynamic information
information
video information
target
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111031381.6A
Other languages
Chinese (zh)
Inventor
农时
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202111031381.6A priority Critical patent/CN113781050A/en
Publication of CN113781050A publication Critical patent/CN113781050A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a method and a device for checking a biological password, electronic equipment and a storage medium, relates to the technical field of information security, and can improve the security of the biological password. The method comprises the following steps: under the condition of executing the target service, acquiring target video information of a target object in a preset time period; the target video information comprises specific dynamic information of the target object; matching the target video information with preset video information; and if the specific dynamic information in the target video information is consistent with the preset dynamic information in the preset video information, the verification of the target video information is passed.

Description

Biological password verification method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of information security, in particular to a method and a device for verifying a biological password, electronic equipment and a storage medium.
Background
Passwords are important assets in the field of information security and are used for guaranteeing virtual assets of users. For example, for an electronic bank, a user may set a login password and a payment password of the electronic bank, and the user needs to input a corresponding password to the electronic bank when the user performs a payment service. Since the password is the only identification for verifying the user identity in the application program, when the third party acquires the user password, the user password may be used to steal the virtual asset of the user.
With the development of biometric technology, face recognition technology has been applied to various scenes in life. For example, the recognized face image may be used as a biometric password of an application program through a face recognition technology. However, with the appearance of some black production tools such as face changing tools, head models and masks, the simulation technology of the face image is more and more, and therefore, the security of the biometric password using the face image as an application program is also affected.
Disclosure of Invention
The application provides a method and a device for checking a biological password, electronic equipment and a storage medium, which can improve the safety of the biological password.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, a biometric password verification method is provided, including: under the condition of executing the target service, acquiring target video information of a target object in a preset time period; the target video information comprises specific dynamic information of the target object; matching the target video information with preset video information; and if the specific dynamic information in the target video information is consistent with the preset dynamic information in the preset video information, the verification of the target video information is passed.
Optionally, the specific dynamic information is lip dynamic information when the target object reads the target text, specific head posture dynamic information corresponding to the target object, or eye dynamic information for a specific number of times.
Optionally, after the obtaining of the target video information of the target object within the preset time period, the method further includes: extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the target video information according to a pre-trained feature extraction model; and extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in preset video information according to the feature extraction model.
Optionally, the matching the target video information with the preset video information includes: and matching the lip dynamic information, the head posture dynamic information or the eye dynamic information in the target video information with the lip dynamic information, the head posture dynamic information or the eye dynamic information in the preset video information.
In a second aspect, there is provided a biometric password verification apparatus, including: the acquisition module is used for acquiring target video information of a target object in a preset time period under the condition of executing a target service; the target video information comprises specific dynamic information of the target object; the matching module is used for matching the target video information acquired by the acquisition module with preset video information; and the verification module is used for passing the verification of the target video information when the matching module determines that the specific dynamic information in the target video information is consistent with the preset dynamic information in the preset video information.
Optionally, the specific dynamic information is lip dynamic information when the target object reads the target text, specific head posture dynamic information corresponding to the target object, or eye dynamic information for a specific number of times.
Optionally, the apparatus further includes a feature extraction module.
And the feature extraction module is used for extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the target video information according to the pre-trained feature extraction model.
The feature extraction module is further used for extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the preset video information according to the feature extraction model.
Optionally, the matching module is specifically configured to: and matching the lip dynamic information, the head posture dynamic information or the eye dynamic information in the target video information with the lip dynamic information, the head posture dynamic information or the eye dynamic information in the preset video information.
In a third aspect, an electronic device is provided, including: a memory, a processor, a bus, and a communication interface; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus; when the electronic device is operating, the processor executes the computer-executable instructions stored by the memory to cause the electronic device to perform the biometric password verification method as provided by the first aspect.
In a fourth aspect, a computer-readable storage medium is provided, the computer-readable storage medium comprising computer-executable instructions that, when executed on a computer, cause the computer to perform the biometric password verification method as provided in the first aspect.
In the method for verifying the biological password, specific dynamic information of a user in a preset time period is determined as the biological password, and the specific dynamic information can be dynamic change information of limbs or organs of the user; compared with the technology of taking the face image as the biological password in the related technology, the dynamic change information of the user is taken as the biological password, so that the difficulty of simulating the biological password by a third party is increased, and the safety of the biological password is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic architecture diagram of an implementation environment according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of a biometric password verification method according to an embodiment of the present disclosure;
fig. 3 is a second schematic flowchart of a biometric password verification method according to an embodiment of the present application;
fig. 4 is a third schematic flowchart of a biometric password verification method according to an embodiment of the present application;
fig. 5 is a schematic diagram of a face key point provided in an embodiment of the present application;
fig. 6 is a fourth schematic flowchart of a biometric password verification method according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a biometric password verification apparatus according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that in the embodiments of the present application, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
For the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the terms "first", "second", and the like are used for distinguishing the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the terms "first", "second", and the like are not limited in number or execution order.
The following describes a technique related to an embodiment of the present application.
Face recognition: a biological recognition technology for identity recognition based on human face feature information can collect a human face image or a human face video stream of a user through a camera, automatically detect and track a human face in the image or the video stream, and further recognize related face feature information of the detected human face.
And (3) living body detection: the method for determining the real physiological characteristics of the object in some identity verification scenes combines a face recognition technology, and a living body detection technology can verify whether the object is the operation of the real living body by blinking, opening the mouth, shaking the head, pointing the head and the like.
In the related art, the face image of the user can be used as the biological password of the related application program through the face recognition technology, so that the security of the password is improved. But with the appearance of some black products tools such as face changing tools, head models and the like, a third party can simulate the face image of the user through the black products tools, so that the property safety of the user is endangered.
In order to solve the problem that the face image is easy to be simulated by a black production tool, the living body detection technology becomes a main defense means. The living body detection technology is that after the face image of a user is recognized through the face recognition technology, the user is instructed to take actions such as blinking and shaking, so that the face image is determined to be provided by the user, and the problem that a black product tool simulates the face image is solved. However, with the development of the dynamic video generation technology, the current technology can generate simple dynamic motions such as blinking and shaking after face changing, so that password verification based on the living body detection technology still has certain safety problems.
In order to solve the above problem, an embodiment of the present application provides a biometric password verification method, where specific dynamic information of a user in a preset time period is determined as a biometric password, and the specific dynamic information may be dynamic change information of a limb or an organ of the user; compared with the technology of taking the face image as the biological password in the related technology, the dynamic change information of the user is taken as the biological password, so that the difficulty of simulating the biological password by a third party is increased, and the safety of the biological password is further improved. Meanwhile, the specific dynamic information of the application is determined by the specific dynamic action, so that although a third party can generate simple dynamic action by a dynamic video generation technology, the third party cannot determine the specific dynamic action set by the user, and the safety of the biological password is further improved.
Fig. 1 is an architecture diagram illustrating an implementation environment in which the following biometric password verification method may be applied, as shown in fig. 1, according to an example embodiment. The implementation environment includes a terminal 01 and an electronic device 02.
Wherein, the terminal 01 can establish a communication connection with the electronic device 02 through an application installed on the terminal 01.
In an implementation manner, the electronic device 02 may be a server, a server cluster composed of a plurality of servers, or a cloud computing service center. The electronic device 02 may include a processor, memory, and a network interface, among others.
In one implementable manner, terminal 01 is used to provide voice and/or data connectivity services to a user. Terminal 01 may have different names such as UE, terminal unit, terminal station, mobile station, remote terminal, mobile device, wireless communication device, vehicle user equipment, terminal agent, or terminal device, etc.
Optionally, the terminal 01 may be various handheld devices, vehicle-mounted devices, wearable devices, and computers with communication functions, which is not limited in this disclosure. For example, the handheld device may be a smartphone. The in-vehicle device may be an in-vehicle navigation system. The wearable device may be a smart bracelet. The computer may be a Personal Digital Assistant (PDA) computer, a tablet computer, and a laptop computer.
Those skilled in the art should appreciate that the above-described terminals are merely exemplary and that other existing or future terminals, which may be suitable for use with the present disclosure, are also encompassed within the scope of the present disclosure and are hereby incorporated by reference.
Based on the above implementation environment, the embodiments of the present application provide a biometric password verification method, which may be executed by the terminal shown in fig. 1 or the electronic device shown in fig. 1, and the method executed by the terminal is described as an example below. As shown in FIG. 2, the method includes S11-S13.
And S11, acquiring the target video information of the target object in a preset time period under the condition of executing the target service.
Wherein the target video information comprises specific dynamic information of the target object.
As a possible implementation manner, the application determines the specific dynamic information as the biometric password of the application, for example, the specific dynamic information may be a payment password of a financial application, a payment password of a social application, or the like. The preset time period may be 3s or 5s, and the setting of the preset time period may vary according to the application scenario of the specific dynamic information, which is not limited herein.
The specific dynamic information may be lip dynamic information when the target object reads the target text, specific head posture dynamic information corresponding to the target object, or eye dynamic information for a specific number of times. For example, the target object may be a user of the relevant application, the target text may be a set of text information, such as "sunny day", and "12345678", etc., and the lip dynamic information may be lip feature change information when the user reads "sunny day" or "12345678"; the head posture dynamic information can be a combination of nodding and shaking for a specific number of times, such as a combination of twice nodding and three shaking, and a combination of twice shaking and three nodding, and the like; similarly, eye movement information may be a combination of blinks for a particular number of times by the user, such as a combination of two blinks of the left eye with three blinks of the right eye, or a combination of two blinks of the right eye with three blinks of the left eye.
Of course, the specific dynamic information is set based on the fact that the user is close to the camera, and since the camera may collect only the head dynamic information or the face dynamic information of the user at this time, the specific dynamic information may be determined by the lip dynamic information, the head posture dynamic information, or the eye dynamic information. In some special scenes, the camera of the terminal can shoot the whole body video of the user, and at this time, the specific dynamic information can also be set as the dynamic change information of other limbs of the user, such as the specific dynamic change combination of the arms and the like.
In one possible implementation, the target service may be a sensitive service or an important service in the application, for example, if the application is an electronic bank, the target service may be a large transaction service in the electronic bank, and for a normal transaction service in the electronic bank, the text password may be used continuously. The following description will be given taking an example in which the application is an electronic bank and the target service is a large-amount payment service. The target object refers to a user who logs in the related application program, such as a user who logs in an electronic bank.
When a user logs in an electronic bank and executes a large amount payment service, a payment password needs to be input, and the payment password is the specific dynamic information. At the moment, the electronic bank can call a camera of the terminal to acquire target video information of the user in a preset time period. The target video information can be collected by a face recognition technology, such as collecting the face characteristic change information or the head characteristic change information of the user by the face recognition technology.
It should be noted that the target video information corresponds to specific dynamic information, for example, the specific dynamic information may be face feature change information or head feature change information of the user, and at this time, the target video information is a face video of the user. And when the specific dynamic information is the body feature change information of the user, the target video information can be a whole-body video of the user.
And S12, matching the target video information with the preset video information.
As a possible implementation manner, the server of the application program pre-stores preset video information, where the preset video information includes preset dynamic information of the user as a biological password preset by the user.
After the terminal collects the target video information of the user through the camera, the target video information can be uploaded to a server of an application program, and the target video information is matched with the preset video information.
In a possible implementation manner, the server of the application program may also store preset dynamic information, in this case, step S12 may be: and matching the specific dynamic information in the target video information with the preset dynamic information.
And S13, if the specific dynamic information in the target video information is consistent with the preset dynamic information in the preset video information, the verification of the target video information is passed.
As a possible implementation manner, when the specific dynamic information is consistent with the preset dynamic information, it may be determined that the user operating the application program at this time is the owner of the relevant account, that is, the user may execute the target service by checking the biometric password at this time.
In some possible embodiments, in conjunction with fig. 2, as shown in fig. 3, after step S11, S20-S21 is further included.
And S20, extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the target video information according to the pre-trained feature extraction model.
And S21, extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the preset video information according to the feature extraction model.
As a possible implementation manner, for specific dynamic information in the target video information or preset dynamic information in the preset video information, the specific dynamic information or the preset dynamic information may be extracted through a machine learning model, the machine learning model may be a pre-trained feature extraction model, and the feature extraction model may be obtained through training of a neural network model, and is used for extracting lip dynamic information, head pose dynamic information, or eye dynamic information in the relevant video information.
For example, when the specific dynamic information is lip dynamic information of the user, after the terminal uploads the target video information to the server of the application program, the target video information may be used as an input of a feature extraction model set in the server, and the lip dynamic information of the user in the target video information is extracted by the feature extraction model.
Correspondingly, when the preset video information is prestored in the server, the preset dynamic information in the preset video information, such as the preset lip dynamic information, needs to be extracted through the feature extraction model.
In a possible implementation manner, when the preset dynamic information is stored in the server of the application program, specific dynamic information in the target video information, such as lip dynamic information, head posture dynamic information, or eye dynamic information, may be extracted only through the feature extraction model, and it is no longer necessary to extract the preset dynamic information every time the target service is executed.
In some possible embodiments, with reference to fig. 3, as shown in fig. 4, step S12 specifically includes: and matching the lip dynamic information, the head posture dynamic information or the eye dynamic information in the target video information with the lip dynamic information, the head posture dynamic information or the eye dynamic information in the preset video information.
As a possible implementation manner, since the present application actually uses the lip dynamic information, the head pose dynamic information, or the eye dynamic information as the biometric password of the user, when the lip dynamic information, the head pose dynamic information, or the eye dynamic information in the target video and the lip dynamic information, the head pose dynamic information, or the eye dynamic information in the preset video information are extracted through the feature extraction model, these dynamic information may be matched. For example, the step S20 extracts the lip dynamic information in the target video information, and the step S21 extracts the lip dynamic information in the preset video information, at this time, the lip dynamic information in the target video information may be matched with the lip dynamic information in the preset video information.
It should be noted that, in the present application, matching the specific dynamic information with the preset dynamic information actually matches the characteristic change condition in the specific dynamic information and the characteristic change condition in the preset dynamic information.
For example, as shown in fig. 5, a schematic diagram of face key points is provided, and if the specific dynamic information is lip dynamic information, the change conditions of key points 49-68 when the user reads the target text may be extracted according to the feature extraction model. Since different people have different changes of key point 49-key point 68 corresponding to lips when reading the same text, even if a third party obtains the biometric code set by the user, the change of key point 49-key point 68 when reading the target text is different from the change of key point 49-key point 68 corresponding to the user. Therefore, it is possible to identify whether the operator of the application is the user himself or herself by the user's lip-specific feature change.
Similarly, when the specific dynamic information is eye dynamic information, it can be determined whether the operator of the application is the user himself or herself through the change of the key points 37 to 48. When the specific dynamic information is head posture dynamic information, whether the operator of the application program is the user himself or herself can be determined by the variation of the key points 1 to 17. Therefore, based on the combination of the face recognition technology and the machine learning model, whether the operator of the application program is the user can be determined, and the safety of the password is further improved.
In particular, dynamic feature variations may be determined by variations of keypoints in a plurality of consecutive frames. For example, for lip dynamic information, when a user reads a target text, a lip image of each frame of the user can be extracted through a feature extraction model, and the lip image can comprise a plurality of frames, such as a first frame to an nth frame; similarly, a lip image of each frame in the preset video information may be extracted through the feature extraction model, and in this case, the lip image may also include a plurality of frames, such as the first frame to the mth frame. At this time, the lip images of the first to nth frames may be matched with the lip images of the first and mth frames, and it may be determined that the two are identical when the number of lip image frames identical therebetween is greater than 90% of the total number of lip image frames. Of course, the description herein is merely exemplary and not intended to be limiting.
In some possible embodiments, as shown in fig. 6, before step S11, a preset of the biometric password is also included, such as S10a-S10 b.
And S10a, acquiring preset video information of the target object in a preset time period.
And S10b, storing the preset video information.
As a possible implementation manner, a user may set a password of a target service in an application program as a biological password, and when the biological password is set, a camera of a terminal may be called to collect video information of the user within a preset time period. At this time, the user can determine dynamic information such as lip dynamic information, head posture dynamic information, or eye dynamic information, etc. by himself or herself as required. For example, after the camera of the terminal is turned on, the user may read the target text, and may click and shake the head for a certain number of times, or blink for a certain number of times. The terminal may incorporate face recognition techniques to determine these feature variations on the user's face.
After the preset video information is determined, the preset video information can be uploaded to a server of the application program.
In a possible implementation manner, after the preset video information is obtained, step S10b may further be: and extracting the characteristic dynamic information in the preset video information according to the pre-trained characteristic extraction model, and storing the characteristic dynamic information to a server.
The characteristic dynamic information is lip dynamic information, head posture dynamic information, eye dynamic information or the like.
In the method for verifying the biological password, specific dynamic information of a user in a preset time period is determined as the biological password, and the specific dynamic information can be dynamic change information of limbs or organs of the user; compared with the technology of taking the face image as the biological password in the related technology, the dynamic change information of the user is taken as the biological password, so that the difficulty of simulating the biological password by a third party is increased, and the safety of the biological password is further improved. Meanwhile, the specific dynamic information of the application is determined by the specific dynamic action, so that although a third party can generate simple dynamic action by a dynamic video generation technology, the third party cannot determine the specific dynamic action set by the user, and the safety of the biological password is further improved. And when different users adopt the same dynamic combination, the corresponding characteristic change conditions are different, so that whether the operator of the application program is the user can be determined according to the characteristic change extracted by the face recognition technology, and the safety of the biological password is further improved.
As shown in fig. 7, an embodiment of the present application provides a biometric password verification apparatus 30, including: an acquisition module 301, a matching module 302, a verification module 303 and a feature extraction module 304.
An obtaining module 301, configured to obtain target video information of a target object within a preset time period when a target service is executed; the target video information includes specific dynamic information of the target object.
A matching module 302, configured to match the target video information acquired by the acquiring module 301 with preset video information.
A checking module 303, configured to pass the check of the target video information when the matching module 302 determines that the specific dynamic information in the target video information is consistent with the preset dynamic information in the preset video information.
Optionally, the specific dynamic information is lip dynamic information when the target object reads the target text, specific head posture dynamic information corresponding to the target object, or eye dynamic information for a specific number of times.
Optionally, the apparatus further includes a feature extraction module 304.
The feature extraction module 304 is configured to extract lip dynamic information, head pose dynamic information, or eye dynamic information of the target object in the target video information according to a pre-trained feature extraction model.
The feature extraction module 304 is further configured to extract lip dynamic information, head pose dynamic information, or eye dynamic information of the target object within the preset video information according to the feature extraction model.
Optionally, the matching module 302 is specifically configured to: and matching the lip dynamic information, the head posture dynamic information or the eye dynamic information in the target video information with the lip dynamic information, the head posture dynamic information or the eye dynamic information in the preset video information.
In the method for verifying the biological password, specific dynamic information of a user in a preset time period is determined as the biological password, and the specific dynamic information can be dynamic change information of limbs or organs of the user; compared with the technology of taking the face image as the biological password in the related technology, the dynamic change information of the user is taken as the biological password, so that the difficulty of simulating the biological password by a third party is increased, and the safety of the biological password is further improved. Meanwhile, the specific dynamic information of the application is determined by the specific dynamic action, so that although a third party can generate simple dynamic action by a dynamic video generation technology, the third party cannot determine the specific dynamic action set by the user, and the safety of the biological password is further improved. And when different users adopt the same dynamic combination, the corresponding characteristic change conditions are different, so that whether the operator of the application program is the user can be determined according to the characteristic change extracted by the face recognition technology, and the safety of the biological password is further improved.
Referring to fig. 8, an embodiment of the present invention further provides an electronic device, which includes a memory 41, a processor 42, a bus 43, and a communication interface 44; the memory 41 is used for storing computer execution instructions, and the processor 42 is connected with the memory 41 through a bus 43; when the electronic device is operating, processor 42 executes computer-executable instructions stored by memory 41 to cause the electronic device to perform the biometric password verification method provided in the embodiments described above. As an example, in conjunction with fig. 7, the functions implemented by the acquisition module 301, the matching module 302, the verification module 303, and the feature extraction module 304 in the biometric password verification apparatus are the same as those of the processor 42 in fig. 8.
In particular implementations, processor 42(42-1 and 42-2) may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 8, for example, as one embodiment. And as an example, the electronic device may include multiple processors 42, such as processor 42-1 and processor 42-2 shown in fig. 8. Each of the processors 42 may be a single-Core Processor (CPU) or a multi-Core Processor (CPU). Processor 42 may refer herein to one or more devices, circuits, and/or processing cores that process data (e.g., computer program instructions).
The memory 41 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 41 may be self-contained and coupled to the processor 42 via a bus 43. The memory 41 may also be integrated with the processor 42.
In a specific implementation, the memory 41 is used for storing data in the present application and computer-executable instructions corresponding to software programs for executing the present application. The processor 42 may perform various functions of the electronic device by running or executing software programs stored in the memory 41, and by calling up data stored in the memory 41.
The communication interface 44 is any device, such as a transceiver, for communicating with other devices or communication networks, such as a control system, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), and the like. The communication interface 44 may include a receiving unit implementing a receiving function and a transmitting unit implementing a transmitting function.
The bus 43 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an extended ISA (enhanced industry standard architecture) bus, or the like. The bus 43 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 8, but this is not intended to represent only one bus or type of bus.
Embodiments of the present invention also provide a computer-readable storage medium, where the computer-readable storage medium includes computer-executable instructions, and when the computer-executable instructions are executed on a computer, the computer is enabled to execute the biometric password verification method provided in the above embodiments.
The embodiment of the present invention further provides a computer program, where the computer program can be directly loaded into a memory and contains a software code, and the computer program can be loaded and executed by a computer to implement the biometric password verification method provided in the above embodiment.
Those skilled in the art will recognize that in one or more of the examples described above, the functions described herein may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical function division, and there may be other division ways in actual implementation. For example, various elements or components may be combined or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A biometric password verification method, comprising:
under the condition of executing the target service, acquiring target video information of a target object in a preset time period; the target video information comprises specific dynamic information of the target object;
matching the target video information with preset video information;
and if the specific dynamic information in the target video information is consistent with the preset dynamic information in the preset video information, the target video information is verified.
2. The biometric password verification method according to claim 1, wherein the specific dynamic information is lip dynamic information when the target object reads a target character, specific head pose dynamic information corresponding to the target object, or eye dynamic information for a specific number of times.
3. The biometric password verification method according to claim 2, further comprising, after the obtaining of the target video information of the target object within a preset time period:
extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the target video information according to a pre-trained feature extraction model;
and extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the preset video information according to the feature extraction model.
4. The biometric password verification method according to claim 3, wherein the matching the target video information with preset video information comprises:
matching the lip dynamic information, the head posture dynamic information or the eye dynamic information in the target video information with the lip dynamic information, the head posture dynamic information or the eye dynamic information in the preset video information.
5. A biometric password verification apparatus, comprising:
the acquisition module is used for acquiring target video information of a target object in a preset time period under the condition of executing a target service; the target video information comprises specific dynamic information of the target object;
the matching module is used for matching the target video information acquired by the acquisition module with preset video information;
and the verification module is used for passing the verification of the target video information when the matching module determines that the specific dynamic information in the target video information is consistent with the preset dynamic information in the preset video information.
6. The device according to claim 5, wherein the specific dynamic information is lip dynamic information when the target object reads a target character, specific head pose dynamic information corresponding to the target object, or eye dynamic information for a specific number of times.
7. The biometric password verification apparatus of claim 6, further comprising a feature extraction module;
the feature extraction module is used for extracting lip dynamic information, head posture dynamic information or eye dynamic information of the target object in the target video information according to a pre-trained feature extraction model;
the feature extraction module is further configured to extract lip dynamic information, head posture dynamic information, or eye dynamic information of the target object in the preset video information according to the feature extraction model.
8. The biometric password verification apparatus according to claim 7, wherein the matching module is specifically configured to:
matching the lip dynamic information, the head posture dynamic information or the eye dynamic information in the target video information with the lip dynamic information, the head posture dynamic information or the eye dynamic information in the preset video information.
9. An electronic device comprising a memory, a processor, a bus, and a communication interface; the memory is used for storing computer execution instructions, and the processor is connected with the memory through the bus; the processor executes the computer-executable instructions stored by the memory to cause the electronic device to perform the biometric password verification method of any one of claims 1-4 when the electronic device is operating.
10. A computer-readable storage medium, comprising computer-executable instructions that, when executed on a computer, cause the computer to perform the biometric password verification method of any one of claims 1 to 4.
CN202111031381.6A 2021-09-03 2021-09-03 Biological password verification method and device, electronic equipment and storage medium Pending CN113781050A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111031381.6A CN113781050A (en) 2021-09-03 2021-09-03 Biological password verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111031381.6A CN113781050A (en) 2021-09-03 2021-09-03 Biological password verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113781050A true CN113781050A (en) 2021-12-10

Family

ID=78841016

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111031381.6A Pending CN113781050A (en) 2021-09-03 2021-09-03 Biological password verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113781050A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874876A (en) * 2017-02-20 2017-06-20 深圳市科漫达智能管理科技有限公司 A kind of human face in-vivo detection method and device
WO2018033155A1 (en) * 2016-08-19 2018-02-22 北京市商汤科技开发有限公司 Video image processing method, apparatus and electronic device
WO2018233487A1 (en) * 2017-06-22 2018-12-27 腾讯科技(深圳)有限公司 Identity authentication method, terminal and storage medium
US20190130172A1 (en) * 2017-10-31 2019-05-02 Baidu Usa Llc Identity authentication method, terminal device, and computer-readable storage medium
CN110032924A (en) * 2019-02-21 2019-07-19 百度在线网络技术(北京)有限公司 Recognition of face biopsy method, terminal device, storage medium and electronic equipment
CN110097671A (en) * 2019-05-10 2019-08-06 银河水滴科技(北京)有限公司 Unlocking method, device and the storage medium of key area based on biological characteristic
CN110390290A (en) * 2019-07-17 2019-10-29 北京天正聚合科技有限公司 A kind of method, apparatus, electronic equipment and storage medium identifying target object
CN110532744A (en) * 2019-07-22 2019-12-03 平安科技(深圳)有限公司 Face login method, device, computer equipment and storage medium
CN111507165A (en) * 2020-01-21 2020-08-07 北京明略软件系统有限公司 Face recognition method and device, electronic equipment and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018033155A1 (en) * 2016-08-19 2018-02-22 北京市商汤科技开发有限公司 Video image processing method, apparatus and electronic device
CN106874876A (en) * 2017-02-20 2017-06-20 深圳市科漫达智能管理科技有限公司 A kind of human face in-vivo detection method and device
WO2018233487A1 (en) * 2017-06-22 2018-12-27 腾讯科技(深圳)有限公司 Identity authentication method, terminal and storage medium
US20190130172A1 (en) * 2017-10-31 2019-05-02 Baidu Usa Llc Identity authentication method, terminal device, and computer-readable storage medium
CN110032924A (en) * 2019-02-21 2019-07-19 百度在线网络技术(北京)有限公司 Recognition of face biopsy method, terminal device, storage medium and electronic equipment
CN110097671A (en) * 2019-05-10 2019-08-06 银河水滴科技(北京)有限公司 Unlocking method, device and the storage medium of key area based on biological characteristic
CN110390290A (en) * 2019-07-17 2019-10-29 北京天正聚合科技有限公司 A kind of method, apparatus, electronic equipment and storage medium identifying target object
CN110532744A (en) * 2019-07-22 2019-12-03 平安科技(深圳)有限公司 Face login method, device, computer equipment and storage medium
CN111507165A (en) * 2020-01-21 2020-08-07 北京明略软件系统有限公司 Face recognition method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11704939B2 (en) Liveness detection
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
WO2021169637A1 (en) Image recognition method and apparatus, computer device and storage medium
Galbally et al. Three‐dimensional and two‐and‐a‐half‐dimensional face recognition spoofing using three‐dimensional printed models
WO2018228218A1 (en) Identification method, computing device, and storage medium
TW201814572A (en) Facial recognition-based authentication
US20190188903A1 (en) Method and apparatus for providing virtual companion to a user
CN107545241A (en) Neural network model is trained and biopsy method, device and storage medium
CN106557678A (en) A kind of intelligent terminal's mode switching method and its device
Witte et al. Context-aware mobile biometric authentication based on support vector machines
CN105659243B (en) The implicit registration and mark being apprised of
CN108108711B (en) Face control method, electronic device and storage medium
CN108197318A (en) Face identification method, device, robot and storage medium
CN108229375B (en) Method and device for detecting face image
CN111240482A (en) Special effect display method and device
CN112333165B (en) Identity authentication method, device, equipment and system
US20230410220A1 (en) Information processing apparatus, control method, and program
CN112634017A (en) Remote card opening activation method and device, electronic equipment and computer storage medium
CN108154070A (en) Face identification method and device
CN116798129A (en) Living body detection method and device, storage medium and electronic equipment
CN113781050A (en) Biological password verification method and device, electronic equipment and storage medium
CN115906028A (en) User identity verification method and device and self-service terminal
CN109858219A (en) User registering method, device, electronic equipment and computer readable storage medium
CN109977835B (en) Facial image recognition method, device and equipment
CN114565814B (en) Feature detection method and device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination