CN113810394A - Service processing method and device, electronic equipment and storage medium - Google Patents

Service processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113810394A
CN113810394A CN202111032354.0A CN202111032354A CN113810394A CN 113810394 A CN113810394 A CN 113810394A CN 202111032354 A CN202111032354 A CN 202111032354A CN 113810394 A CN113810394 A CN 113810394A
Authority
CN
China
Prior art keywords
client
face image
verification data
server
current verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111032354.0A
Other languages
Chinese (zh)
Other versions
CN113810394B (en
Inventor
路双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Original Assignee
Baidu Online Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baidu Online Network Technology Beijing Co Ltd filed Critical Baidu Online Network Technology Beijing Co Ltd
Priority to CN202111032354.0A priority Critical patent/CN113810394B/en
Publication of CN113810394A publication Critical patent/CN113810394A/en
Application granted granted Critical
Publication of CN113810394B publication Critical patent/CN113810394B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Abstract

The application provides a service processing method, a service processing device, electronic equipment and a storage medium, and belongs to the technical field of computer application. Wherein, the method comprises the following steps: after acquiring a service request sent by a client, a server sends an image acquisition instruction to the client so that the client acquires a face image of a current service object; the server generates current verification data according to the face image acquired by the client; the server returns the current verification data to the client so that the client can display the current verification data; and the server processes the service request according to the check data processing result returned by the client. Therefore, by the service processing method, the service request sent by the client is processed only when the effective face image is acquired, so that the malicious request of the user is avoided, and the processing burden of the server is reduced.

Description

Service processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer application technologies, and in particular, to a service processing method and apparatus, an electronic device, and a storage medium.
Background
Since the 21 st century, the technology development is changing day by day, and the internet has been in the aspect of people's daily life. The use of the internet for work, learning, entertainment, etc. has been a constant state of the information society. The expansion of the application range of the internet brings great convenience to production and life of people, and meanwhile, various defects are gradually exposed. For example, when people obtain various services through the internet, a large number of malicious requests can be sent through software, so that the processing burden of the server is too heavy, and even the normal use of a user may be affected.
In the related art, in order to avoid a large number of concurrent malicious requests, when a service request sent by a user is obtained, the validity of the service request is usually verified through a verification code checking mechanism. However, with the continuous and powerful computer technology, the computer device can automatically identify the verification code issued by the server and automatically submit the identified verification code, so that the verification method for the verification code cannot thoroughly avoid the malicious request of the user.
Disclosure of Invention
The service processing method, the service processing device, the electronic equipment and the storage medium are used for solving the problem that malicious requests of users cannot be thoroughly avoided by a method for verifying the validity of service requests through a verification code verification mechanism in the related art.
An embodiment of an aspect of the present application provides a service processing method, including: after acquiring a service request sent by a client, a server sends an image acquisition instruction to the client so that the client acquires a face image of a current service object; the server generates current verification data according to the face image acquired by the client; the server returns the current verification data to the client side so that the client side can display the current verification data; and the server processes the service request according to a check data processing result returned by the client.
Another aspect of the present application provides a service processing apparatus, including: the sending module is used for sending an image acquisition instruction to the client after the server acquires a service request sent by the client so as to enable the client to acquire a face image of a current service object; the generating module is used for generating current verification data by the server according to the face image acquired by the client; a return module, configured to return the current verification data to the client by the server, so that the client displays the current verification data; and the processing module is used for processing the service request by the server according to a check data processing result returned by the client.
An embodiment of another aspect of the present application provides an electronic device, which includes: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the service processing method as described before when executing the program.
A further aspect of the present application provides a computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the service processing method as described above.
In another aspect of the present application, a computer program is provided, which is executed by a processor to implement the service processing method according to the embodiment of the present application.
According to the service processing method, the service processing device, the electronic equipment, the computer readable storage medium and the computer program, the server can send the image acquisition instruction to the client after acquiring the service request sent by the client, so that the client acquires the face image of the current service object, the current verification data is generated according to the face image acquired by the client, then the current verification data is returned to the client, so that the client displays the current verification data, and the service request is processed according to the verification data processing result returned by the client. Therefore, when the service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and the verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, the malicious request of a user is avoided, and the processing burden of the server is reduced.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of a service processing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another service processing method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a service processing apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the like or similar elements throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The embodiment of the application provides a service processing method aiming at the problem that malicious requests of users cannot be thoroughly avoided by a method for verifying the validity of a service request through a verification code verification mechanism in the related art.
According to the service processing method provided by the embodiment of the application, after the server acquires the service request sent by the client, the server sends the image acquisition instruction to the client, so that the client acquires the face image of the current service object, generates the current verification data according to the face image acquired by the client, and then returns the current verification data to the client, so that the client displays the current verification data, and further processes the service request according to the verification data processing result returned by the client. Therefore, when the service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and the verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, the malicious request of a user is avoided, and the processing burden of the server is reduced.
The service processing method, apparatus, electronic device, storage medium, and computer program provided by the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a service processing method according to an embodiment of the present application.
As shown in fig. 1, the service processing method includes the following steps:
step 101, after acquiring a service request sent by a client, a server sends an image acquisition instruction to the client, so that the client acquires a face image of a current service object.
The service request may include a login request, a payment request, a refresh request, and the like sent by the current service object through the client.
In the embodiment of the application, after the server acquires the service request sent by the client, the server can send an image acquisition instruction to the client to control the image acquisition equipment in the terminal where the client is located currently, so as to acquire the face image of the current service object.
As a possible implementation manner, after the current service object responds to the image acquisition instruction through the client, that is, after the client agrees to acquire the face image of the current service object, the image acquisition device in the terminal where the client is currently located may be triggered to acquire the face image of the current service object, and the face contour is displayed at an appropriate position in the viewing interface of the terminal where the client is currently located, so that the current service object may adjust the shooting position and posture according to the face contour displayed in the viewing interface, thereby ensuring that an effective face image can be acquired.
Further, if the client does not acquire a valid face image, the service request sent by the client can be rejected. That is, in a possible implementation form of the embodiment of the present application, after the step 101, the method may further include:
and if the server does not acquire the face image returned by the client, sending a prompt message for representing service request response failure to the client so that the client displays the prompt message.
It should be noted that, in order to avoid a malicious request of an illegal user, the service request sent by the client may be further processed only when it is determined that the currently acquired service request sent by the client is sent by the current service object through the client itself.
Optionally, if the server acquires a face image returned by the client, it may be determined that the current service object is sent by the client when the acquired service request is made, that is, the acquired service request may be further processed; if the server does not acquire the face image returned by the client, the server can determine that the acquired service request is possibly a malicious request, namely the acquired service request can be rejected, and send a prompt message representing the response failure of the service request to the client, so that the client displays the prompt message and prompts the client to respond to the service request failure of the service object corresponding to the client.
And 102, the server generates current verification data according to the face image acquired by the client.
In the embodiment of the application, if the server acquires the face image acquired by the client, the current verification data can be generated according to the acquired face image. It should be noted that, when the face image acquired by the client is acquired, the current verification policy, that is, the policy for generating the current verification data, may be selected according to actual needs.
Optionally, when the face image of the current service object acquired by the client is acquired, the current verification data may be generated by using a random verification policy unrelated to the face image acquired by the client, that is, the generated current verification data may be data such as numbers, letters, a combination of numbers and letters, and pictures unrelated to the face image acquired by the client, but is not limited thereto. In actual use, the mode of generating the current transaction data can be preset according to actual needs, which is not limited in the embodiment of the application.
Optionally, when the face image of the current service object acquired by the client is acquired, a verification policy related to the face image acquired by the client may be further adopted to generate current verification data. For example, the current verification data may be generated by using a face image and other random images acquired by the client.
Furthermore, when the current verification data is generated by adopting a verification strategy related to the face image collected by the client, the current verification data can also be generated by utilizing the recognition result of the collected face image. That is, in a possible implementation form of the embodiment of the present application, the step 102 may include:
the server identifies the face image collected by the client to determine the character characteristics corresponding to the face image;
and the server generates current verification data according to the character characteristics currently corresponding to the face image.
Wherein the character features comprise at least one of the following features: gender, age, expression.
As a possible implementation manner, after a face image of a current service object acquired by a client is acquired, the acquired face image may be identified through a face identification algorithm to determine a feature of a person currently corresponding to the acquired face image, and then current verification data is generated according to the feature of the person currently corresponding to the identified face image.
Optionally, the current verification data may be generated according to the current corresponding gender feature of the identified face image. In a possible implementation form of the embodiment of the application, the gender feature currently corresponding to the identified face image can be used as the current verification data. For example, if the sex corresponding to the recognized face image is "woman", the generated current verification data may be the chinese character "woman", the english word "child", and the like.
Optionally, the current verification data may be generated according to the age characteristic currently corresponding to the identified face image. In a possible implementation form of the embodiment of the application, the gender feature currently corresponding to the identified face image can be used as the current verification data. For example, if the age corresponding to the recognized face image is "30", the generated current verification data may be a number "30", a chinese character "thirty", an english word "thirty", and the like.
Optionally, the current verification data may be generated according to the expression feature currently corresponding to the identified face image. In a possible implementation form of the embodiment of the application, the expression features currently corresponding to the recognized face image can be used as the inspection data; or, corresponding expression image data is generated by using the expression features currently corresponding to the recognized face image, and other expression image data are randomly generated and jointly used as current verification data. For example, if the expression corresponding to the recognized face image is "smile", the generated current verification data may be the Chinese character "smile", the english word "smile", or the like; or the smile expression image data can be generated, other expression image data such as "too much" and "lacrimation" can be randomly generated, and the smile expression image data and the randomly generated other expression image data are used to jointly form the current verification data.
It should be noted that, the manner of generating the current verification data according to the human features currently corresponding to the face image acquired by the client may include, but is not limited to, the above-mentioned cases. In actual use, the mode of generating the current verification data can be preset according to actual needs, and the embodiment of the application does not limit the mode.
Step 103, the server returns the current verification data to the client, so that the client displays the current verification data.
In the embodiment of the application, after the server acquires the face image of the current service object acquired by the client and generates the current verification data, the current verification data can be returned to the client, so that the current service object can perform corresponding processing on the current verification data according to the current verification data displayed in the client.
As a possible implementation manner, when returning the current verification data to the client, the server may also return the preset processing rule for the current verification data to the client together, so that the current service object may process the current verification data according to the current verification data displayed in the client and the processing rule for the current verification data. Wherein, the processing rule for the current check data may be related to the type of the current check data.
Optionally, if the current verification data is a chinese character, an english letter, a number, or the like, the processing rule for the current verification data may be: "enter the current check data in the corresponding entry box"; if the current verification data is image data, the processing rule for the current verification data may be: "select qualified image data from the current verification data".
For example, if the current verification data is a plurality of expression image data, the processing rule for the current verification data may be: "from the following list image data, all images whose expressions are" smiles "are selected.
It should be noted that, the processing rule for the current verification data may include, but is not limited to, the above-listed situations. In actual use, the processing rule of the current verification data can be determined according to actual needs and the type of the current verification data, which is not limited in the embodiment of the present application.
And 104, the server processes the service request according to a check data processing result returned by the client.
In the embodiment of the application, after the server obtains the processing result of the current service object to the check data returned by the client, whether the processing result of the check data returned by the client is correct or not can be judged according to the preset processing rule of the current check data, and the service request sent by the client is correspondingly processed according to the judgment result.
Optionally, if the check data processing result returned by the client conforms to the preset processing rule for the current check data, that is, the check data processing result returned by the client is correct, the service request sent by the client may be responded; if the processing result of the check data returned by the client does not accord with the preset processing rule for the current check data, namely the processing result of the check data returned by the client is wrong, the service request sent by the client can be rejected, and prompt information of 'verification data input error' is returned to the client.
Furthermore, if the processing result of the check data returned by the client is determined to be wrong, the face image of the current service object can be collected again, and the check data return value client is generated again, so that the current service object can process new check data again. That is, in a possible implementation form of the embodiment of the present application, the step 104 may include:
and if the server determines that the processing result of the check data returned by the client is wrong, the server sends an image acquisition instruction to the client again.
As a possible implementation manner, if the server determines that the processing result of the check data returned by the client is wrong, the server may send an image acquisition instruction to the client again, and after acquiring the face image of the current service object acquired by the client, generate the check data again according to the face image acquired by the client, and return the generated check data to the client, so that the current service object processes the check data again until it is determined that the processing result of the check data returned by the client is correct.
According to the service processing method provided by the embodiment of the application, after the server acquires the service request sent by the client, the server sends the image acquisition instruction to the client, so that the client acquires the face image of the current service object, generates the current verification data according to the face image acquired by the client, and then returns the current verification data to the client, so that the client displays the current verification data, and further processes the service request according to the verification data processing result returned by the client. Therefore, when the service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and the verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, the malicious request of a user is avoided, and the processing burden of the server is reduced.
In a possible implementation form of the present application, after the face image of the current service object acquired by the client is acquired, data related to the identifier of the client can be acquired according to the identifier of the client, and current verification data is generated according to the acquired data related to the identifier of the client, so as to further reduce the probability that the malicious request passes the verification.
The service processing method provided in the embodiment of the present application is further described below with reference to fig. 2.
Fig. 2 is a flowchart illustrating another service processing method according to an embodiment of the present application.
As shown in fig. 2, the service processing method includes the following steps:
in step 201, after acquiring a service request sent by a client, a server sends an image acquisition instruction to the client, so that the client acquires a face image of a current service object.
The detailed implementation process and principle of step 201 may refer to the detailed description of the above embodiments, and are not described herein again.
Step 202, the server obtains a target face image according to the identification of the client.
The identifier of the client may be an account that the current service object has registered and entered in the client. The target face image refers to a face image which is stored in advance and is associated with an identifier of the client, and may be a face image of a service object which is uploaded by the service object after the service object registers an account in the client, or a face image which is acquired from a valid certificate uploaded by the service object and stored.
It should be noted that, in a possible implementation form of the embodiment of the present application, when a service object uses a client for the first time, an account may be registered in the client to serve as a client identifier of the service object, and during the account registration process or after the account registration is successful, a server may send an image acquisition instruction to the client, so that the client acquires a face image of the service object, and stores the face image of the service object acquired by the client in association with the client identifier corresponding to the service object, that is, the acquired face image is taken as a target face image corresponding to the client identifier; or the server can send a personal information acquisition instruction to the client so that the service object can upload the valid identity document according to the prompt information displayed in the client, and then the server can acquire the face image in the valid identity document by using the valid identity document uploaded by the service object returned by the client, and store the acquired face image in association with the client identifier corresponding to the service object, namely, the acquired face image is used as the target face image corresponding to the client identifier.
As a possible implementation manner, after acquiring the face image of the current service object collected and returned by the client, the server may acquire a target face image associated with the identifier of the client according to the identifier of the client, which is input by the current service object in the client.
Step 203, when the server determines that the face image collected by the client matches the target face image, the server obtains each reference face image associated with the target face image.
In the embodiment of the application, after the server acquires the target face image, whether the face image acquired by the client is matched with the target face image can be judged, if so, the current service object can be determined to be a legal user corresponding to the identifier of the client, and then current verification data can be further generated; if the face image collected by the client is not matched with the target face image, the current service object can be determined not to be a legal user corresponding to the identification of the client, namely, the service request sent by the client can be rejected.
As a possible implementation manner, there may be one or more target face images, so that the identifier of one client may be used by multiple service objects, that is, when the server determines that the face image acquired by the client matches one of the target face images, it may determine that the current service object is a valid user corresponding to the identifier of the client. For example, when a user uses certain shopping software, the facial image information of the user and the family can be uploaded to serve as the target facial image corresponding to the identification of the registered client, so that the user and the family can log in and use the shopping software by using the identification of the registered client.
It should be noted that, in a possible implementation form of the embodiment of the present application, a threshold of a matching degree between a face image acquired by a client and a target face image may be preset, and then whether the face image acquired by the client matches the target face image is determined according to a relationship between the matching degree between the face image acquired by the client and the target face image and the preset threshold.
Specifically, if the matching degree of the face image acquired by the client and the target face image is greater than or equal to a preset threshold value, it can be determined that the face image acquired by the client is matched with the target face image; if the matching degree of the face image collected by the client and the target face image is smaller than a preset threshold value, the fact that the face image collected by the client is not matched with the target face can be determined.
It should be noted that, in actual use, the threshold of the matching degree between the face image collected by the client and the target face image may be preset according to actual needs, and this is not limited in the embodiment of the present application. For example, it may be 90%.
As a possible implementation manner, when determining that the face image acquired by the client matches the target face image, the server may generate current verification data by using each reference face image associated with the target face image, so that each reference face image associated with the target face image may be acquired after determining that the face image acquired by the client matches the target face image.
For example, if the client is an instant messaging application, the current verification data may be generated by using the avatar data of the contact associated with the identifier of the client corresponding to the current service object or the target face image of the contact, that is, each reference face image associated with the target face image may be the avatar data of the contact associated with the identifier of the client corresponding to the current service object or the target face image of the contact.
It should be noted that the above examples are only illustrative and should not be construed as limiting the present application. In actual use, a manner of acquiring each reference face image associated with the target face image may be preset according to actual needs, which is not limited in the embodiment of the present application.
Step 204, the server acquires a target reference face image for generating current verification data from the reference face images.
In the embodiment of the application, after the server acquires each reference face image associated with the target face image, a part of the reference face image can be selected from the acquired reference face images to serve as the target reference face image, and the current verification data is generated by using the target reference face image and the randomly generated image data.
As a possible implementation manner, one or more reference face images may be randomly selected from the obtained reference face images to serve as the target reference face image. For example, the client is an instant messaging application, each reference face image is head portrait data of each contact associated with the target face image, and then two reference face images can be randomly selected from the head portrait data of each contact to serve as the target reference face images.
Further, when the target face image is obtained from each reference face image, the target reference face image may be determined according to a relationship between each reference face image and the target face image, or interactive data of a client identifier corresponding to each reference face image and a client identifier corresponding to the target face image, or the like. That is, in a possible implementation form of the embodiment of the present application, the step 204 may include:
acquiring a target reference face image used for generating current verification data from each reference face image according to the relation between each reference face image and the target face image;
alternatively, the first and second electrodes may be,
acquiring a target reference face image used for generating current verification data from each reference face image according to the current online state of each reference face image;
alternatively, the first and second electrodes may be,
and acquiring a target reference face image used for generating current verification data from each reference face image according to the historical interaction frequency of each reference face image and the target face image.
Optionally, when the target reference face image is obtained from each reference face image, the target reference face image may be determined according to a relationship between the identifier of the client corresponding to the reference face image and the identifier of the client corresponding to the target face image. For example, the reference face image corresponding to the identifier of the client having a closer relationship with the target face image may be determined as the target reference face image according to the identifier of the client corresponding to each reference face image and the grouping information associated with the identifier of the client corresponding to the target face image.
For example, if the client is an instant messaging application, each reference face image is head portrait data corresponding to a contact associated with the identifier of the client corresponding to the target face image, and the group information associated with the client corresponding to the target face image includes three groups of "family, friend, and stranger", one or more reference face images may be randomly selected from the reference face images corresponding to the group of "family" as the target reference face images.
Optionally, when the target reference face image is obtained from each reference face image, the target reference face image may be determined according to an online state of an identifier of a client corresponding to each reference face image. For example, one or more reference face images may be randomly selected from the reference face images whose online status is "online" as the target reference face image.
Optionally, when the target reference face image is obtained from each reference face image, the target reference face image may be determined according to the identifier of the client corresponding to each reference face image and the historical interaction frequency between the identifier of the client corresponding to the target face image. For example, one or more reference facial images with the highest historical interaction frequency of the client corresponding to the target facial image may be determined as the target reference facial images.
It should be noted that, the manner of obtaining the target reference face image from each reference face image may include, but is not limited to, the above-listed situations. In actual use, the method for acquiring the target reference face image can be preset according to actual needs, and the embodiment of the application is not limited thereto.
Step 205, the server generates current verification data according to the target reference face image.
As a possible implementation manner, after determining the target reference face image, the server may generate current verification data according to the target reference face image. Alternatively, the current verification data may be generated by using the target reference face image and the randomly generated image data together.
For example, if the target reference face image is the head portrait data of two contacts corresponding to the target face image, then a plurality of face images (for example, 3) unfamiliar with the current service object may be randomly generated, or a plurality of non-face images of animals, plants, articles, and the like may be randomly generated, and form the current verification data together with the two target reference images.
Step 206, the server returns the current verification data to the client, so that the client displays the current verification data.
And step 207, the server processes the service request according to the check data processing result returned by the client.
The detailed implementation process and principle of the steps 206-207 may refer to the detailed description of the above embodiments, and are not described herein again.
According to the service processing method provided by the embodiment of the application, after the server acquires the service request sent by the client, the server sends an image acquisition instruction to the client, so that the client acquires the face image of the current service object, acquires the target face image according to the identification of the client, acquires each reference face image associated with the target face image when the face image acquired by the client is determined to be matched with the target face image, further acquires the target reference face image used for generating the current verification data from each reference face image, generates the current verification data according to the target reference face image, then returns the current verification data to the client, and further processes the service request according to the verification data processing result returned by the client. Therefore, when the face image of the current service object is acquired, the validity of the current service object is further verified according to the matching degree of the face image acquired by the client and the target face image, and the current verification data is generated by using the reference face image associated with the target face image, so that the service request sent by the client is processed only when the valid face image is acquired, the validity of the current service object can be verified, the malicious request of a user is further avoided, and the processing burden of a server is reduced.
In order to implement the above embodiments, the present application further provides a service processing apparatus.
Fig. 3 is a schematic structural diagram of a service processing apparatus according to an embodiment of the present application.
As shown in fig. 3, the service processing apparatus 30 includes:
the first sending module 31 is configured to send, by the server, an image acquisition instruction to the client after acquiring the service request sent by the client, so that the client acquires a face image of a current service object;
a generating module 32, configured to generate, by the server, current verification data according to the face image acquired by the client;
a returning module 33, configured to return the current verification data to the client by the server, so that the client displays the current verification data;
and the processing module 34 is configured to process the service request by the server according to a check data processing result returned by the client.
In practical use, the service processing apparatus provided in the embodiment of the present application may be configured in any electronic device to execute the service processing method.
The service processing device provided by the embodiment of the application can send the image acquisition instruction to the client through the server after acquiring the service request sent by the client, so that the client acquires the face image of the current service object, generates the current verification data according to the face image acquired by the client, and then returns the current verification data to the client, so that the client displays the current verification data, and further processes the service request according to the verification data processing result returned by the client. Therefore, when the service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and the verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, the malicious request of a user is avoided, and the processing burden of the server is reduced.
In a possible implementation form of the present application, the generating module 32 is specifically configured to:
the server identifies the face image collected by the client to determine the character characteristics corresponding to the face image;
and the server generates current verification data according to the character characteristics currently corresponding to the face image.
Further, in another possible implementation form of the present application, the above feature includes at least one of the following features: gender, age, expression.
Further, in another possible implementation form of the present application, the generating module 32 is further configured to:
the server acquires a target face image according to the identification of the client;
the server acquires reference face images associated with a target face image when determining that the face image acquired by the client is matched with the target face image;
the server acquires a target reference face image used for generating current verification data from each reference face image;
and the server generates current verification data according to the target reference face image.
Further, in another possible implementation form of the present application, the generating module 32 is further configured to:
acquiring a target reference face image used for generating current verification data from each reference face image according to the relation between each reference face image and the target face image;
alternatively, the first and second electrodes may be,
acquiring a target reference face image used for generating current verification data from each reference face image according to the current online state of each reference face image;
alternatively, the first and second electrodes may be,
and acquiring a target reference face image used for generating current verification data from each reference face image according to the historical interaction frequency of each reference face image and the target face image.
In a possible implementation form of the present application, the service processing apparatus 30 further includes:
and the second sending module is used for sending a prompt message for representing service request response failure to the client if the server does not acquire the face image returned by the client, so that the client displays the prompt message.
In a possible implementation form of the present application, the processing module 34 is specifically configured to:
and if the server determines that the processing result of the check data returned by the client is wrong, the server sends an image acquisition instruction to the client again.
It should be noted that the foregoing explanation of the service processing method embodiment shown in fig. 1 and fig. 2 is also applicable to the service processing apparatus 30 of this embodiment, and is not repeated here.
The service processing device provided by the embodiment of the application can send an image acquisition instruction to the client through the server after acquiring a service request sent by the client, so that the client acquires a face image of a current service object, acquires a target face image according to an identifier of the client, acquires reference face images associated with the target face image when the face image acquired by the client is determined to be matched with the target face image, further acquires the target reference face image used for generating current verification data from the reference face images, generates the current verification data according to the target reference face image, then returns the current verification data to the client, and further processes the service request according to a verification data processing result returned by the client. Therefore, when the face image of the current service object is acquired, the validity of the current service object is further verified according to the matching degree of the face image acquired by the client and the target face image, and the current verification data is generated by using the reference face image associated with the target face image, so that the service request sent by the client is processed only when the valid face image is acquired, the validity of the current service object can be verified, the malicious request of a user is further avoided, and the processing burden of a server is reduced.
In order to implement the above embodiments, the present application further provides an electronic device.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
As shown in fig. 4, the electronic device 200 includes:
a memory 210 and a processor 220, and a bus 230 connecting different components (including the memory 210 and the processor 220), wherein the memory 210 stores a computer program, and when the processor 220 executes the program, the service processing method according to the embodiment of the present application is implemented.
Bus 230 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 200 typically includes a variety of electronic device readable media. Such media may be any available media that is accessible by electronic device 200 and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 210 may also include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)240 and/or cache memory 250. The electronic device 200 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 260 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, and commonly referred to as a "hard drive"). Although not shown in FIG. 4, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 230 by one or more data media interfaces. Memory 210 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
A program/utility 280 having a set (at least one) of program modules 270, including but not limited to an operating system, one or more application programs, other program modules, and program data, each of which or some combination thereof may comprise an implementation of a network environment, may be stored in, for example, the memory 210. The program modules 270 generally perform the functions and/or methodologies of the embodiments described herein.
Electronic device 200 may also communicate with one or more external devices 290 (e.g., keyboard, pointing device, display 291, etc.), with one or more devices that enable a user to interact with electronic device 200, and/or with any devices (e.g., network card, modem, etc.) that enable electronic device 200 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 292. Also, the electronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 293. As shown, the network adapter 293 communicates with the other modules of the electronic device 200 via the bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 220 executes various functional applications and data processing by executing programs stored in the memory 210.
It should be noted that, for the implementation process and the technical principle of the electronic device of this embodiment, reference is made to the foregoing explanation of the service processing method of the embodiment of the present application, and details are not described here again.
The electronic device provided by the embodiment of the application can execute the service processing method, and after the server acquires the service request sent by the client, the server sends an image acquisition instruction to the client, so that the client acquires a face image of a current service object, generates current verification data according to the face image acquired by the client, and then returns the current verification data to the client, so that the client displays the current verification data, and further processes the service request according to a verification data processing result returned by the client. Therefore, when the service request sent by the client is acquired, the client is controlled to acquire the face image of the current service object, and the verification data is generated based on the acquired face image, so that the service request sent by the client is processed only when the effective face image is acquired, the malicious request of a user is avoided, and the processing burden of the server is reduced.
In order to implement the above embodiments, the present application also proposes a computer-readable storage medium.
The computer readable storage medium stores thereon a computer program, and the program is executed by a processor to implement the service processing method according to the embodiment of the present application.
In order to implement the foregoing embodiments, a further embodiment of the present application provides a computer program, which when executed by a processor, implements the service processing method according to the embodiments of the present application.
In an alternative implementation, the embodiments may be implemented in any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the consumer electronic device, partly on the consumer electronic device, as a stand-alone software package, partly on the consumer electronic device and partly on a remote electronic device, or entirely on the remote electronic device or server. In the case of remote electronic devices, the remote electronic devices may be connected to the consumer electronic device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external electronic device (e.g., through the internet using an internet service provider).
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A service processing method, comprising:
after acquiring a service request sent by a client, a server sends an image acquisition instruction to the client so that the client acquires a face image of a current service object;
the server generates current verification data according to the face image acquired by the client;
the server returns the current verification data to the client side so that the client side can display the current verification data; when the server returns the current verification data to the client, the server also returns a preset processing rule for the current verification data to the client, so that the current service object processes the current verification data according to the current verification data displayed in the client and the processing rule for the current verification data to obtain a verification data processing result;
and the server processes the service request according to a check data processing result returned by the client.
2. The method of claim 1, wherein the server generates current verification data from the facial image captured by the client, comprising:
the server identifies the face image collected by the client to determine the character characteristics corresponding to the face image;
and the server generates current verification data according to the character characteristics currently corresponding to the face image.
3. The method of claim 2, wherein the character features include at least one of: gender, age, expression.
4. The method of claim 1, wherein the server generates current verification data from the facial image captured by the client, comprising:
the server acquires a target face image according to the identification of the client;
the server acquires reference face images associated with a target face image when determining that the face image acquired by the client is matched with the target face image;
the server acquires a target reference face image used for generating current verification data from each reference face image;
and the server generates current verification data according to the target reference face image.
5. The method of claim 4, wherein said obtaining a target reference face image from said reference face images for generating current verification data comprises:
acquiring a target reference face image used for generating current verification data from each reference face image according to the relation between each reference face image and the target face image;
alternatively, the first and second electrodes may be,
acquiring a target reference face image used for generating current verification data from each reference face image according to the current online state of each reference face image;
alternatively, the first and second electrodes may be,
and acquiring a target reference face image used for generating current verification data from each reference face image according to the historical interaction frequency of each reference face image and the target face image.
6. The method of any of claims 1-5, wherein after sending the image capture instruction to the client, further comprising:
and if the server does not acquire the face image returned by the client, sending a prompt message for representing service request response failure to the client so that the client displays the prompt message.
7. The method according to any one of claims 1 to 5, wherein the server processes the service request according to the check data processing result returned by the client, including:
and if the server determines that the processing result of the check data returned by the client is wrong, the server sends an image acquisition instruction to the client again.
8. A service processing apparatus, comprising:
the sending module is used for sending an image acquisition instruction to the client after the server acquires a service request sent by the client so as to enable the client to acquire a face image of a current service object;
the generating module is used for generating current verification data by the server according to the face image acquired by the client;
a return module, configured to return the current verification data to the client by the server, so that the client displays the current verification data; when the current verification data is returned to the client, a preset processing rule for the current verification data is returned to the client, so that the current service object processes the current verification data according to the current verification data displayed in the client and the processing rule for the current verification data to obtain a verification data processing result;
and the processing module is used for processing the service request by the server according to a check data processing result returned by the client.
9. An electronic device, comprising: memory, processor and program stored on the memory and executable on the processor, characterized in that the processor implements the service processing method according to any of claims 1-7 when executing the program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a service processing method according to any one of claims 1 to 7.
CN202111032354.0A 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium Active CN113810394B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111032354.0A CN113810394B (en) 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111032354.0A CN113810394B (en) 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium
CN201910169192.1A CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201910169192.1A Division CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113810394A true CN113810394A (en) 2021-12-17
CN113810394B CN113810394B (en) 2023-06-06

Family

ID=67129629

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201910169192.1A Active CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium
CN202111032354.0A Active CN113810394B (en) 2019-03-06 2019-03-06 Service processing method, device, electronic equipment and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201910169192.1A Active CN109995761B (en) 2019-03-06 2019-03-06 Service processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (2) CN109995761B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113011339A (en) * 2021-03-19 2021-06-22 支付宝(杭州)信息技术有限公司 User identity verification method and device and electronic equipment
CN113536270B (en) * 2021-07-26 2023-08-08 网易(杭州)网络有限公司 Information verification method, device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015062255A1 (en) * 2013-10-31 2015-05-07 Tencent Technology (Shenzhen) Company Limited Information processing method, device and system
CN105024814A (en) * 2014-04-22 2015-11-04 腾讯科技(深圳)有限公司 Verifying method, server and system
CN105184570A (en) * 2015-09-01 2015-12-23 百度在线网络技术(北京)有限公司 Information verification method and device
US20170161477A1 (en) * 2015-12-03 2017-06-08 Google Inc. Image Based CAPTCHA Challenges
CN106844492A (en) * 2016-12-24 2017-06-13 深圳云天励飞技术有限公司 A kind of method of recognition of face, client, server and system
CN107846424A (en) * 2017-12-26 2018-03-27 上海棠宝机器人有限公司 A kind of login validation method and device
CN108776791A (en) * 2018-06-07 2018-11-09 中国平安人寿保险股份有限公司 Client identity identifies method of calibration, device, computer equipment and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592254A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Identifying code system based on image splicing
CN104135671A (en) * 2014-07-25 2014-11-05 宁波创视信息技术有限公司 Television video content interactive question and answer method
JP6096161B2 (en) * 2014-10-15 2017-03-15 ソニー株式会社 Information processing apparatus and information processing method
CN105989263A (en) * 2015-01-30 2016-10-05 阿里巴巴集团控股有限公司 Method for authenticating identities, method for opening accounts, devices and systems
CN105025018B (en) * 2015-07-06 2016-09-07 国网山东寿光市供电公司 A kind of method carrying out safety verification in communication process
CN106169075A (en) * 2016-07-11 2016-11-30 北京小米移动软件有限公司 Auth method and device
CN108090405B (en) * 2016-11-23 2020-08-14 腾讯科技(深圳)有限公司 Face recognition method and terminal
CN107483423B (en) * 2017-08-04 2020-10-27 北京联合大学 User login verification method
CN107766713B (en) * 2017-10-18 2020-02-18 Oppo广东移动通信有限公司 Face template data entry control method and related product

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015062255A1 (en) * 2013-10-31 2015-05-07 Tencent Technology (Shenzhen) Company Limited Information processing method, device and system
CN105024814A (en) * 2014-04-22 2015-11-04 腾讯科技(深圳)有限公司 Verifying method, server and system
CN105184570A (en) * 2015-09-01 2015-12-23 百度在线网络技术(北京)有限公司 Information verification method and device
US20170161477A1 (en) * 2015-12-03 2017-06-08 Google Inc. Image Based CAPTCHA Challenges
CN106844492A (en) * 2016-12-24 2017-06-13 深圳云天励飞技术有限公司 A kind of method of recognition of face, client, server and system
CN107846424A (en) * 2017-12-26 2018-03-27 上海棠宝机器人有限公司 A kind of login validation method and device
CN108776791A (en) * 2018-06-07 2018-11-09 中国平安人寿保险股份有限公司 Client identity identifies method of calibration, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN109995761B (en) 2021-10-19
CN113810394B (en) 2023-06-06
CN109995761A (en) 2019-07-09

Similar Documents

Publication Publication Date Title
US20200211121A1 (en) Credit-based claim settlement implementing method and device
CN110214320B (en) Authentication using facial image comparison
CN109993150B (en) Method and device for identifying age
WO2021175019A1 (en) Guide method for audio and video recording, apparatus, computer device, and storage medium
CN111343162B (en) System secure login method, device, medium and electronic equipment
CN113765898B (en) Login method, device, equipment and medium based on AI and RPA
US20040250084A1 (en) Secure messaging for security token
US11521209B2 (en) Systems and methods for automated identity verification
CN110795714A (en) Identity authentication method and device, computer equipment and storage medium
US20200019970A1 (en) System and method for authenticating transactions from a mobile device
CN109995761B (en) Service processing method and device, electronic equipment and storage medium
WO2021068613A1 (en) Face recognition method and apparatus, device and computer-readable storage medium
CN113158156A (en) Service processing method, system, device, electronic equipment and storage medium
US20220414193A1 (en) Systems and methods for secure adaptive illustrations
CA3142780A1 (en) Webpage access method, apparatus, computer device and storage medium
CN112055013A (en) Automatic authentication method, device, equipment and storage medium
Purkayastha et al. Object oriented modelling of cloud voting system
CN113420271A (en) Identity authentication method, device, equipment and storage medium
TWM610179U (en) Device for identifying identity based on chip pre-stored image and real-time in vivo image
CN113518061A (en) Data transmission method, device, apparatus, system and medium in face recognition
WO2019098205A1 (en) Authentication device, authentication method, and computer-readable recording medium
TWI807219B (en) System for performing identification based on comparing photo stored in chip and real-time live photo and method thereof
CN112685588B (en) Resource recommendation method, device, equipment and storage medium
WO2023120221A1 (en) Authentication device, authentication system, authentication method, and recording medium
AU2022204469B2 (en) Large pose facial recognition based on 3D facial model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant