CN115037488B - Account identity verification method and account identity verification device - Google Patents

Account identity verification method and account identity verification device Download PDF

Info

Publication number
CN115037488B
CN115037488B CN202110204739.4A CN202110204739A CN115037488B CN 115037488 B CN115037488 B CN 115037488B CN 202110204739 A CN202110204739 A CN 202110204739A CN 115037488 B CN115037488 B CN 115037488B
Authority
CN
China
Prior art keywords
video
identity verification
resource
video files
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110204739.4A
Other languages
Chinese (zh)
Other versions
CN115037488A (en
Inventor
葛进宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN202110204739.4A priority Critical patent/CN115037488B/en
Publication of CN115037488A publication Critical patent/CN115037488A/en
Application granted granted Critical
Publication of CN115037488B publication Critical patent/CN115037488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/222Studio circuitry; Studio devices; Studio equipment
    • H04N5/262Studio circuits, e.g. for mixing, switching-over, change of character of image, other special effects ; Cameras specially adapted for the electronic generation of special effects
    • H04N5/265Mixing

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application relates to an identity verification method and device for an account, wherein the method comprises the following steps: acquiring video resources recorded by a target account, wherein the video resources are used for verifying the identity of the target account on a client; dividing a video resource into a plurality of video files; an identity verification request and a plurality of video files are sent to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on a target account according to the plurality of video files; and receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes the identity verification. The application solves the technical problem of lower transmission efficiency of video resources in the authentication process.

Description

Account identity verification method and account identity verification device
Technical Field
The present application relates to the field of computers, and in particular, to a method and apparatus for verifying an account.
Background
In the current method for real-name verification of an account, one method is to use live video and identity information to verify the identity of the account. However, there may be a problem with the process of real-name authentication using video, that is, the size of the video and the network transmission problem may affect the efficiency of verification. Such as: the video of the mobile phone is clearer, the pixels are higher, and the video of a few seconds can reach the size of tens of Megabytes (MB). The data volume is large through transmission, and the verification of account identity is carried out on the video which is inconvenient to transmit, so that the video transmission and analysis process is very time-consuming, the bandwidth occupation is very high in the video transmission process, and the video transmission efficiency is very low.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The application provides an identity verification method and device for an account, which at least solve the technical problem of low transmission efficiency of video resources in the identity verification process.
According to an aspect of the embodiment of the present application, there is provided an authentication method of an account, applied to a client, including:
acquiring a video resource recorded by a target account, wherein the video resource is used for verifying the identity of the target account on the client;
Dividing the video resource into a plurality of video files;
sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files;
And receiving an authentication result returned by the server in response to the authentication request, wherein the authentication result is used for indicating whether the target account passes authentication.
Optionally, dividing the video asset into a plurality of video files comprises:
Determining whether the data volume of the video asset exceeds a target data volume;
In the event that the amount of data of the video asset exceeds the target amount of data, the video asset is divided into a plurality of video files.
Optionally, dividing the video asset into a plurality of video files comprises:
Acquiring a preset unit resource data amount, wherein the unit resource data amount is used for indicating the maximum value of the data amount of each video file in the plurality of video files;
dividing the video resources according to the unit resource data amount to obtain the plurality of video files.
Optionally, dividing the video resource according to the unit resource data amount, and obtaining the plurality of video files includes:
calculating the quotient of the data quantity of the video resource and the data quantity of the unit resource;
rounding up the quotient to obtain a target number;
Dividing the video resource into the target number of video files according to a time sequence, wherein the data volume of other video files except the last video file in the target number of video files is the unit resource data volume, and the data volume of the last video file is smaller than or equal to the unit resource data volume.
Optionally, sending the authentication request to the server and the plurality of video files comprise:
Marking the video files according to the time sequence of the video files in the video resource to obtain video file identifications corresponding to the video files;
adding a video file identification of each video file to the authentication request;
And sending the authentication request and the plurality of video files to the server.
According to another aspect of the embodiment of the present application, there is provided another method for verifying identity of an account, applied to a server, including:
Receiving an identity verification request and a plurality of video files sent by a client logged in by a target account, wherein the video files are obtained by dividing video resources, the video resources are used for verifying the identity of the target account on the client, and the identity verification request is used for requesting the server to verify the identity of the target account according to the video files;
splicing the plurality of video files into the video resource;
responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain an identity verification result, wherein the identity verification result is used for indicating whether the target account passes the identity verification;
And sending the identity verification result to the client.
Optionally, after splicing the plurality of video files into the video resource, the method further comprises: storing the video resource to an object storage server to obtain a storage address of the video resource;
The step of verifying the identity of the target account according to the video resource comprises the following steps: reading the video resource from a storage address of the video resource through an identity verification server; and carrying out identity verification on the target account through the identity verification server according to the video resource.
Optionally, after receiving the authentication request and the plurality of video files sent by the client registered by the target account, the method further includes: storing the plurality of video files to an object storage server to obtain storage addresses of the plurality of video files;
Splicing the plurality of video files into the video asset comprises: reading the plurality of video files from the storage addresses of the plurality of video files through an identity verification server, and splicing the plurality of video files into the video resource through the identity verification server;
The step of verifying the identity of the target account according to the video resource comprises the following steps: and carrying out identity verification on the target account through the identity verification server according to the video resource.
Optionally, stitching the plurality of video files into the video resource includes:
Obtaining video file identifications corresponding to the plurality of video files, wherein the video file identifications are obtained by marking the plurality of video files according to the time sequence of the plurality of video files in the video resource;
and splicing the plurality of video files into the video resource according to the file sequence indicated by the video file identification.
Optionally, performing identity verification on the target account according to the video resource, and obtaining an identity verification result includes:
Identifying video data to be verified from the video resource, wherein the video data to be verified is recorded with images of a target verification code read by a user using the target account;
matching the verification code read by the user and displayed in the video data to be verified with the target verification code;
Under the condition that the verification code read by the user and displayed in the video data to be verified are matched and consistent with the target verification code, determining that the identity verification result is used for indicating that the target account passes identity verification;
and under the condition that the verification code read by the user and displayed in the video data to be verified is inconsistent with the target verification code, determining that the identity verification result is used for indicating that the target account fails identity verification.
According to another aspect of the embodiment of the present application, there is also provided an authentication system for an account, the system including a client and a server, wherein,
The client is used for acquiring video resources recorded by a target account, wherein the video resources are used for verifying the identity of the target account on the client; dividing the video resource into a plurality of video files; sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files; receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes identity verification or not;
The server is used for receiving the authentication request and the plurality of video files sent by the client; splicing the plurality of video files into the video resource; responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain the identity verification result; and sending the identity verification result to the client.
Optionally, the server includes: a transmission interface, an object storage server and an authentication server, wherein,
The transmission interface is used for receiving the authentication request and the plurality of video files sent by the client; splicing the plurality of video files into the video resource; storing the video resource to the object storage server to obtain a storage address of the video resource; and sending the authentication result to the client;
The object storage server is used for storing the video resource;
The identity verification server is used for responding to the identity verification request and reading the video resource from the storage address of the video resource; and carrying out identity verification on the target account according to the video resource to obtain the identity verification result.
Optionally, the server includes: a transmission interface, an object storage server and an authentication server, wherein,
The transmission interface is used for receiving the authentication request and the plurality of video files sent by the client; storing the plurality of video files to the object storage server to obtain storage addresses of the plurality of video files; and sending the authentication result to the client;
the object storage server is used for storing the plurality of video files;
The identity verification server is used for reading the plurality of video files from the storage addresses of the plurality of video files and splicing the plurality of video files into the video resource; and responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain the identity verification result.
According to another aspect of the embodiment of the present application, there is also provided an authentication device for an account, applied to a client, including:
The acquisition module is used for acquiring video resources recorded by the target account, wherein the video resources are used for verifying the identity of the target account on the client;
the dividing module is used for dividing the video resource into a plurality of video files;
The first sending module is used for sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files;
The first receiving module is used for receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes the identity verification.
According to another aspect of the embodiment of the present application, there is also provided an authentication device for another account, applied to a server, including:
The second receiving module is used for receiving an identity verification request and a plurality of video files, wherein the identity verification request and the plurality of video files are sent by a client side logged in by a target account, the plurality of video files are obtained by dividing video resources, the video resources are used for verifying the identity of the target account on the client side, and the identity verification request is used for requesting the server to verify the identity of the target account according to the plurality of video files;
the splicing module is used for splicing the plurality of video files into the video resource;
The verification module is used for responding to the identity verification request, carrying out identity verification on the target account according to the video resource to obtain an identity verification result, wherein the identity verification result is used for indicating whether the target account passes the identity verification;
and the second sending module is used for sending the identity verification result to the client.
According to another aspect of the embodiments of the present application, there is also provided a storage medium including a stored program that executes the above-described method when running.
According to another aspect of the embodiments of the present application, there is also provided an electronic device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor executing the method described above by the computer program.
In the embodiment of the application, a video resource recorded by the target account is acquired, wherein the video resource is used for verifying the identity of the target account on the client; dividing a video resource into a plurality of video files; an identity verification request and a plurality of video files are sent to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on a target account according to the plurality of video files; and receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes the identity verification, dividing the video resource recorded by the target account into a plurality of video files, dividing and transmitting the video resource used for verifying the identity of the target account on the client, rapidly transmitting the video resource to the server for identity verification, and determining whether the target account passes the identity verification according to the identity verification result returned by the server, thereby achieving the purposes of reducing the occupation of bandwidth in the video resource transmission process and reducing the time consumption of transmission, further realizing the technical effect of improving the transmission efficiency of the video resource in the identity verification process, and further solving the technical problem of lower transmission efficiency of the video resource in the identity verification process.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic diagram of a hardware environment of an account number authentication method according to an embodiment of the present application;
FIG. 2 is a flow chart of an alternative method of authentication of an account number according to an embodiment of the present application;
FIG. 3 is a flow chart of another alternative method of authentication of an account number according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an alternative account number authentication device according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an authentication device for an alternative account number according to an embodiment of the present application;
Fig. 6 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiment of the present application, there is provided a system for authentication of an account, which can be applied to a hardware environment composed of a terminal 101 and a server 103 as shown in fig. 1. As shown in fig. 1, the server 103 is connected to the terminal 101 through a network, which may be used to provide services (such as game services, application services, etc.) to the terminal or clients installed on the terminal, and a database may be provided on the server or independent of the server, for providing data storage services to the server 103, where the network includes, but is not limited to: the terminal 101 is not limited to a PC, a mobile phone, a tablet computer, or the like. The authentication method of the account number in the embodiment of the present application may be executed by the server 103, may be executed by the terminal 101, or may be executed by both the server 103 and the terminal 101. The authentication method of the account number performed by the terminal 101 according to the embodiment of the present application may also be performed by a client installed thereon.
Optionally, in this embodiment, the client is configured to obtain a video resource recorded by a target account, where the video resource is configured to verify an identity of the target account on the client; dividing the video resource into a plurality of video files; sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files; receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes identity verification or not;
The server is used for receiving the authentication request and the video files sent by the client; splicing the plurality of video files into the video resource; responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain the identity verification result; and sending the identity verification result to the client.
Optionally, in this embodiment, the client is further configured to perform an authentication method applied to an account of the client.
Optionally, in this embodiment, the server includes: a transmission interface, an object storage server and an authentication server, wherein,
The transmission interface is used for receiving the authentication request and the video files sent by the client; splicing the plurality of video files into the video resource; storing the video resource to the object storage server to obtain a storage address of the video resource; and sending the authentication result to the client;
The object storage server is used for storing the video resource;
The identity verification server is used for responding to the identity verification request and reading the video resource from the storage address of the video resource; and carrying out identity verification on the target account according to the video resource to obtain the identity verification result.
Optionally, in this embodiment, the server includes: a transmission interface, an object storage server and an authentication server, wherein,
The transmission interface is used for receiving the authentication request and the plurality of video files sent by the client; storing the plurality of video files to the object storage server to obtain storage addresses of the plurality of video files; and sending the authentication result to the client;
the object storage server is used for storing the plurality of video files;
The identity verification server is used for reading the plurality of video files from the storage addresses of the plurality of video files and splicing the plurality of video files into the video resource; and responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain the identity verification result.
Optionally, in this embodiment, the server is further configured to perform an authentication method applied to an account of the server.
According to an aspect of the embodiment of the application, an embodiment of a method for verifying the identity of an account is provided, and the method is applied to a client. Fig. 2 is a flowchart of an alternative method for verifying the identity of an account, according to an embodiment of the present application, as shown in fig. 2, the method may include the steps of:
Step S202, obtaining a video resource recorded by a target account, wherein the video resource is used for verifying the identity of the target account on the client;
Step S204, dividing the video resource into a plurality of video files;
step S206, an identity verification request and the plurality of video files are sent to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files;
Step S208, receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes the identity verification.
Through the steps S202 to S208, the video resource recorded by the target account is divided into a plurality of video files, the video resource for verifying the identity of the target account on the client is divided and transmitted, the video resource is rapidly sent to the server for identity verification, and whether the target account passes the identity verification is determined according to the identity verification result returned by the server, so that the purposes of reducing the occupation of bandwidth in the video resource transmission process and reducing the transmission time consumption are achieved, the technical effect of improving the transmission efficiency of the video resource in the identity verification process is achieved, and the technical problem of lower transmission efficiency of the video resource in the identity verification process is solved.
Optionally, in this embodiment, the method for verifying the identity of the account may be applied to, but not limited to, a client, such as a client installed on the terminal, where the client may be, but not limited to, various types of applications that need to verify the identity of the account, such as: instant messaging applications, gaming applications, financial applications, shopping applications, multimedia applications, and the like.
In the technical solution provided in step S202, the target account may be, but not limited to, an account registered on the client, or an account to be registered on the client.
Optionally, in this embodiment, the purpose of authenticating the target account may include, but is not limited to, including: verifying whether the target account is used by the living body, verifying whether the target account meets requirements for performing operations on the client, such as: transaction right verification, online verification, transfer right verification, and the like.
In the technical solution provided in step S204, the video resource is divided into a plurality of video files, and the size of each video file is smaller than that of the video resource, so that the bandwidth occupied in the transmission process is reduced, and the transmission speed is increased.
As an alternative embodiment, dividing the video asset into a plurality of video files comprises:
S11, determining whether the data volume of the video resource exceeds a target data volume;
S12, dividing the video resource into a plurality of video files when the data volume of the video resource exceeds the target data volume.
Alternatively, in this embodiment, the operation of dividing the video resource into the plurality of video files may be triggered according to, but not limited to, the data amount of the video resource, if the data amount of the video resource is too large, the video resource may be divided into the plurality of video files, and if the data amount of the video resource is relatively normal, the video resource may be directly transmitted to the server without being divided.
Alternatively, in the present embodiment, whether the data amount of the video asset is too large to be divided may be determined by, but not limited to, comparing a relationship between the data amount of the video asset and the target data amount, and if the data amount of the video asset exceeds the target data amount, the data amount is considered to be too large to be divided.
Alternatively, in the present embodiment, the target data amount may be preset empirically, or may be set according to the bandwidth allowed to be used by the client and the server. Or the target data volume may also be, but is not limited to, dynamically changing based on the current network bandwidth. Such as: the current network bandwidth is acquired, a certain multiple of the current network bandwidth is determined to be the target data volume, then the current network bandwidth is larger, the larger target data volume can be calculated, and the current network bandwidth is smaller, the smaller target data volume can be calculated. Thus dynamically determining whether the video resource needs to be segmented according to the current network condition.
As an alternative embodiment, dividing the video asset into a plurality of video files comprises:
S21, acquiring a preset unit resource data amount, wherein the unit resource data amount is used for indicating the maximum value of the data amount of each video file in the plurality of video files;
s22, dividing the video resources according to the unit resource data amount to obtain the plurality of video files.
Alternatively, in the present embodiment, the unit resource data amount is used to indicate the maximum value of the data amount of each of the plurality of video files. The unit resource data amount is used to control the data amount of each video file divided so as not to exceed the unit resource data amount.
Alternatively, in the present embodiment, the unit resource data amount may be set in advance, but not limited to, empirically, or may be set according to the bandwidth allowed to be used by the client and the server. Or the amount of data per unit resource may also, but is not limited to, be dynamically variable based on the current network bandwidth. Such as: and acquiring the current network bandwidth, determining a certain multiple of the current network bandwidth as a unit resource data volume, and dividing the video resource into a plurality of parts with larger data volume if the current network bandwidth is larger, so that the number of video files can be smaller. The current network bandwidth is smaller, the video resources can be divided into a plurality of parts with a larger number, so that the data volume of each video file can be smaller, and the current network condition is met. Thus dynamically determining how to partition the video resources according to the current network conditions.
As an optional embodiment, dividing the video resources according to the unit resource data amount, and obtaining the plurality of video files includes:
s31, calculating the quotient of the data quantity of the video resource and the data quantity of the unit resource;
s32, rounding up the quotient value to obtain a target number;
S33, dividing the video resource into the target number of video files according to a time sequence, wherein the data volume of other video files except the last video file in the target number of video files is the unit resource data volume, and the data volume of the last video file is smaller than or equal to the unit resource data volume.
Alternatively, in this embodiment, the target number of video files may be, but is not limited to, obtained by calculating a quotient of the data amount of the video resource and the data amount of the unit resource, and rounding up.
Optionally, in this embodiment, the data size of the other video files except the last video file in the video files obtained after the video resources are divided according to the time sequence is the unit resource data size, and the data size of the last video file is smaller than or equal to the unit resource data size, that is, the video files are divided from the beginning of the video resources once every unit resource data size, so as to obtain the target number of video files.
In the technical solution provided in step S206, the authentication request carries a plurality of video files, and the authentication request is used for requesting the server to authenticate the identity of the target account.
As an alternative embodiment, sending the authentication request and the plurality of video files to the server includes:
s41, marking the plurality of video files according to the time sequence of the plurality of video files in the video resource to obtain video file identifications corresponding to each video file;
s42, adding the video file identification of each video file into the identity verification request;
And S43, the identity verification request and the video files are sent to the server.
Optionally, in the present embodiment, the video file identifier is used to identify the video file and indicates the temporal order of the video file in the video resource by reference numerals. The video resource identification method comprises the steps of carrying the video resource identification request in the identification request, and sending the identification request and a plurality of video files to a server, so that the server can splice the video files according to the sequence of the video files to obtain the video resource, and therefore the identification of the account is carried out.
In the technical solution provided in step S208, if the authentication result is used to indicate that the target account passes the authentication, the target account may be allowed to perform a subsequent operation on the client, otherwise, the operation performed on the client by the target account is rejected.
According to another aspect of the embodiment of the application, another embodiment of a method for verifying the identity of an account is also provided and is applied to a server. Fig. 3 is a flowchart of another alternative method of verifying the identity of an account, according to an embodiment of the present application, as shown in fig. 3, the method may include the steps of:
Step S302, an identity verification request and a plurality of video files, which are sent by a client terminal logged in by a target account, are received, wherein the video files are obtained by dividing video resources, the video resources are used for verifying the identity of the target account on the client terminal, and the identity verification request is used for requesting the server to verify the identity of the target account according to the video files;
step S304, splicing the plurality of video files into the video resource;
step S306, responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain an identity verification result, wherein the identity verification result is used for indicating whether the target account passes the identity verification;
step S308, sending the authentication result to the client.
Through the steps S302 to S308, the client divides the video resource recorded by the target account into a plurality of video files, performs division transmission on the video resource for verifying the identity of the target account on the client, rapidly sends the video resource to the server, and the server performs splicing and identity verification on the received plurality of video files and returns the identity verification result to the client, thereby achieving the purposes of reducing the occupation of bandwidth and reducing the time consumption of transmission in the video resource transmission process, further achieving the technical effect of improving the transmission efficiency of the video resource in the identity verification process, and further solving the technical problem of lower transmission efficiency of the video resource in the identity verification process.
Alternatively, in this embodiment, the method for verifying the identity of the account may be applied to, but not limited to, servers corresponding to various types of applications that need to verify the identity of the account.
In the technical solution provided in step S302, the plurality of video files may be, but are not limited to, video resources divided by the client.
In the technical scheme provided in step S304, a plurality of video files are spliced into a video resource according to the time sequence of the video files in the video resource.
As an alternative embodiment, in the step S304, a plurality of video files may be spliced into a video resource by, but not limited to:
S51, obtaining video file identifications corresponding to the plurality of video files, wherein the video file identifications are obtained by marking the plurality of video files according to the time sequence of the plurality of video files in the video resource;
And S52, splicing the plurality of video files into the video resources according to the file sequence indicated by the video file identification.
Optionally, in this embodiment, the video file identifier is obtained by labeling a plurality of video files according to a time sequence of the plurality of video files in the video resource, so that the video file identifier can identify the video files and can indicate the time sequence of the video files in the video resource.
Optionally, in this embodiment, the video file identifier may be marked on a video file and carried in an authentication request sent by the client, and the server may find, according to the video file identifier carried in the authentication request, a plurality of video files to be spliced, and splice the video files in sequence according to the video file identifier marked on the video file.
In the technical solution provided in step S306, the authentication process for the account may include, but is not limited to: operations performed by the account number in the video resource are verified (such as turning left, blinking eyes, low head, etc.), and the mouth shape of the account number in the video resource and the voice of the video resource are verified (such as reading a verification code, a text, etc.).
As an optional embodiment, performing identity verification on the target account according to the video resource, and obtaining an identity verification result includes:
S61, identifying video data to be verified from the video resource, wherein the video data to be verified records images of a target verification code read by a user using the target account;
s62, matching the verification code read by the user and displayed in the video data to be verified with the target verification code;
s63, determining that the identity verification result is used for indicating that the target account passes identity verification under the condition that the verification code read by the user and displayed in the video data to be verified are matched and consistent with the target verification code;
S64, determining that the identity verification result is used for indicating that the target account fails identity verification under the condition that the verification code read by the user and displayed in the video data to be verified are inconsistent with the target verification code in matching.
Alternatively, in this embodiment, the authentication process may be, but is not limited to, verifying whether the image of the user's speakable verification code using the target account matches the pre-generated target verification code. Such as: and extracting the displayed verification code read by the user from the video data to be verified, and matching the verification code with the target verification code.
Optionally, in this embodiment, in the process of identifying the video data to be verified, facial recognition may be performed on the recorded user by using, but not limited to, facial recognition technology, to determine whether the recorded user is a target user using the target account, and if so, identifying the video data to be verified.
Optionally, in this embodiment, an image of a target verification code read by a user using a target account is recorded in the video data to be verified, and the matching between the verification code read by the user and the target verification code displayed in the video data to be verified can be performed on the one hand, so that the mouth shape of the user reading the verification code in the image can be matched, and on the other hand, the audio of the reading verification code recorded in the image can be matched.
As an alternative embodiment, the process of verifying the identity of the target account at the server may be performed by a different server, but is not limited to, the server may be divided into an object storage server for storing video to be verified, and an authentication server for performing the verification operation.
Alternatively, in this embodiment, after the step S304, the video resource may be stored on an object storage server, to obtain a storage address of the video resource;
In step S306 described above, the target account may be authenticated by, but not limited to, the following ways: reading the video resource from a storage address of the video resource through an identity verification server; and carrying out identity verification on the target account through the identity verification server according to the video resource.
Optionally, in this embodiment, the server receives a plurality of video files, and may directly splice to obtain a video resource, store the video resource on the object storage server, and then notify the authentication server to obtain the video resource according to the storage address of the video resource for authentication.
Alternatively, in the present embodiment, the storage address of the video asset may include, but is not limited to, URL (uniform resource locator ) of the video asset.
Alternatively, in the present embodiment, the video resource may be stored in a compressed storage manner, but is not limited to the compressed storage manner.
Alternatively, in the present embodiment, after the above step S302, the plurality of video files may be stored on the object storage server, to obtain the storage addresses of the plurality of video files;
in the above step S304, a plurality of video files may be spliced into a video resource by, but not limited to: reading the plurality of video files from the storage address through an identity verification server, and splicing the plurality of video files into the video resource through the identity verification server;
in step S306 described above, the target account may be authenticated by, but not limited to, the following ways: and carrying out identity verification on the target account through the identity verification server according to the video resource.
Optionally, in this embodiment, the server receives a plurality of video files, and may directly store the plurality of video files on the object storage server, and then notify the authentication server to obtain the plurality of video files according to the storage address of the video files, and splice the plurality of video files into the video resource for authentication.
Alternatively, in the present embodiment, the storage addresses of the plurality of video files may include, but are not limited to, URLs (uniform resource locator, uniform resource locators) of the plurality of video files.
Alternatively, in the present embodiment, the video file may be stored in a compressed storage manner, but is not limited to this.
The application also provides an alternative embodiment which provides a process of verifying the identity of the account through video, firstly, dynamically generating an N-bit digital verification code on a server, and generating a SESSION for storing the digital verification code on a server. The user needs to record and read the video of the verification code by using a mobile phone. The client acquires the video, judges whether to divide the video according to a threshold value of the pre-equipment, intercepts the video file into M segments of small video stream files if the threshold value exceeds the threshold value, starts dividing from a first character, marks each divided small file according to sequence, and then sends the small file to a server for receiving the video.
After receiving the request of the client, the video server temporarily stores the small files in the temporary directory, and after receiving all the divided small files, the video server splices the small files into a complete video. After splicing, carrying out lossless compression on the video, after compression, sending the video to a cloud server for providing object storage, acquiring the URL address of the video, transmitting video information between local servers in the form of URL, and finally reaching an identity verification server. The identity verification server downloads the video from the object storage server to the local through the received URL, performs verification by combining the identity information, and performs identity verification according to the digital verification code stored in the SESSION.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present application.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing an electronic device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
According to another aspect of the embodiment of the application, there is also provided an account authentication device for implementing the account authentication method, which is applied to a client. Fig. 4 is a schematic diagram of an alternative account authentication device according to an embodiment of the present application, as shown in fig. 4, the device may include:
An obtaining module 42, configured to obtain a video resource recorded by a target account, where the video resource is used to verify an identity of the target account on the client;
a dividing module 44, configured to divide the video resource into a plurality of video files;
A first sending module 46, configured to send an authentication request and the plurality of video files to a server, where the authentication request is used to request the server to perform authentication on the target account according to the plurality of video files;
And a first receiving module 48, configured to receive an authentication result returned by the server in response to the authentication request, where the authentication result is used to indicate whether the target account passes authentication.
It should be noted that, the acquiring module 42 in this embodiment may be used to perform step S202 in the embodiment of the present application, the dividing module 44 in this embodiment may be used to perform step S204 in the embodiment of the present application, the first transmitting module 46 in this embodiment may be used to perform step S206 in the embodiment of the present application, and the first receiving module 48 in this embodiment may be used to perform step S208 in the embodiment of the present application.
It should be noted that the above modules are the same as examples and application scenarios implemented by the corresponding steps, but are not limited to what is disclosed in the above embodiments. It should be noted that the above modules may be implemented in software or hardware as a part of the apparatus in the hardware environment shown in fig. 1.
Through the module, the video resource recorded by the target account is divided into a plurality of video files, the video resource used for verifying the identity of the target account on the client is divided and transmitted, the video resource is rapidly transmitted to the server for identity verification, whether the target account passes the identity verification is determined according to the identity verification result returned by the server, the purposes of reducing the occupation of bandwidth in the video resource transmission process and reducing the time consumption of transmission are achieved, the technical effect of improving the transmission efficiency of the video resource in the identity verification process is achieved, and the technical problem of lower transmission efficiency of the video resource in the identity verification process is solved.
As an alternative embodiment, the dividing module includes:
a first determining unit configured to determine whether a data amount of the video resource exceeds a target data amount;
A first dividing unit for dividing the video resource into a plurality of video files in case that the data amount of the video resource exceeds the target data amount.
As an alternative embodiment, the dividing module includes:
A first obtaining unit, configured to obtain a preset unit resource data amount, where the unit resource data amount is used to indicate a maximum value of data amounts of each video file in the plurality of video files;
and the second dividing unit is used for dividing the video resources according to the unit resource data quantity to obtain the plurality of video files.
As an alternative embodiment, the second dividing unit is configured to:
calculating the quotient of the data quantity of the video resource and the data quantity of the unit resource;
rounding up the quotient to obtain a target number;
Dividing the video resource into the target number of video files according to a time sequence, wherein the data volume of other video files except the last video file in the target number of video files is the unit resource data volume, and the data volume of the last video file is smaller than or equal to the unit resource data volume.
As an alternative embodiment, the first transmitting module includes:
the marking unit is used for marking the plurality of video files according to the time sequence of the plurality of video files in the video resource to obtain a video file identifier corresponding to each video file;
an adding unit, configured to add a video file identifier of each video file to the authentication request;
A transmitting unit configured to transmit the authentication request and the plurality of video files to the server
According to another aspect of the embodiment of the application, another account authentication device for implementing the account authentication method is also provided and is applied to a server. Fig. 5 is a schematic diagram of an authentication device for an alternative account according to an embodiment of the present application, and as shown in fig. 5, the device may include:
A second receiving module 52, configured to receive an authentication request and a plurality of video files sent by a client on which a target account logs, where the plurality of video files are obtained by dividing video resources, the video resources are used to authenticate an identity of the target account on the client, and the authentication request is used to request the server to authenticate the target account according to the plurality of video files;
A stitching module 54, configured to stitch the plurality of video files into the video resource;
The verification module 56 is configured to respond to the authentication request, and perform authentication on the target account according to the video resource, so as to obtain an authentication result, where the authentication result is used to indicate whether the target account passes authentication;
a second sending module 58, configured to send the authentication result to the client.
It should be noted that, the second receiving module 52 in this embodiment may be used to perform step S302 in the embodiment of the present application, the splicing module 54 in this embodiment may be used to perform step S304 in the embodiment of the present application, the verification module 56 in this embodiment may be used to perform step S306 in the embodiment of the present application, and the second sending module 58 in this embodiment may be used to perform step S308 in the embodiment of the present application.
It should be noted that the above modules are the same as examples and application scenarios implemented by the corresponding steps, but are not limited to what is disclosed in the above embodiments. It should be noted that the above modules may be implemented in software or hardware as a part of the apparatus in the hardware environment shown in fig. 1.
Through the module, the client divides the video resource recorded by the target account into a plurality of video files, divides the video resource used for verifying the identity of the target account on the client, rapidly transmits the video resource to the server, and splices the received video files and verifies the identity and returns the verification result to the client, thereby achieving the purposes of reducing the occupation of bandwidth in the video resource transmission process and reducing the time consumption of transmission, further realizing the technical effect of improving the transmission efficiency of the video resource in the identity verification process, and further solving the technical problem of lower transmission efficiency of the video resource in the identity verification process.
As an alternative embodiment, the apparatus further comprises: the first storage module is used for storing the video resources to an object storage server after the video files are spliced into the video resources to obtain storage addresses of the video resources;
the verification module is used for: reading the video resource from a storage address of the video resource through an identity verification server; and carrying out identity verification on the target account through the identity verification server according to the video resource.
As an alternative embodiment, the apparatus further comprises: the second storage module is used for storing the video files to an object storage server after receiving the authentication request and the video files sent by the client to obtain storage addresses of the video files;
the splicing module is used for: reading the plurality of video files from the storage address through an identity verification server, and splicing the plurality of video files into the video resource through the identity verification server;
The verification module is used for: and carrying out identity verification on the target account through the identity verification server according to the video resource.
As an alternative embodiment, the splicing module includes:
A second obtaining unit, configured to obtain video file identifiers corresponding to the plurality of video files, where the video file identifiers are obtained by labeling the plurality of video files according to a time sequence of the plurality of video files in the video resource;
And the splicing unit is used for splicing the plurality of video files into the video resource according to the file sequence indicated by the video file identification.
As an alternative embodiment, the verification module includes:
The identification unit is used for identifying the video data to be verified from the video resource, wherein the video data to be verified records the image of the target verification code read by the user using the target account;
The matching unit is used for matching the verification code read by the user and displayed in the video data to be verified with the target verification code;
The second determining unit is used for determining that the identity verification result is used for indicating that the target account passes identity verification under the condition that the verification code read by the user and displayed in the video data to be verified are matched and consistent with the target verification code;
and the third determining unit is used for determining that the identity verification result is used for indicating that the target account fails identity verification under the condition that the verification code read by the user and displayed in the video data to be verified are inconsistent with the target verification code in matching.
It should be noted that the above modules are the same as examples and application scenarios implemented by the corresponding steps, but are not limited to what is disclosed in the above embodiments. It should be noted that the above modules may be implemented in software or in hardware as part of the apparatus shown in fig. 1, where the hardware environment includes a network environment.
According to another aspect of the embodiment of the application, an electronic device for implementing the authentication method of the account is also provided.
Fig. 6 is a block diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 6, the electronic device may include: one or more (only one is shown in the figure) processors 601, memory 603, and transmission means 605, which may also include input output devices 607, as shown in fig. 6.
The memory 603 may be used to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for verifying the identity of an account in the embodiment of the present application, and the processor 601 executes the software programs and modules stored in the memory 603, thereby executing various functional applications and data processing, that is, implementing the method for verifying the identity of an account. Memory 603 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory. In some examples, the memory 603 may further include memory remotely located with respect to the processor 601, which may be connected to the electronic device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 605 is used to receive or transmit data via a network, and may also be used for data transmission between the processor and the memory. Specific examples of the network described above may include wired networks and wireless networks. In one example, the transmission device 605 includes a network adapter (Network Interface Controller, NIC) that may be connected to other network devices and routers via a network cable to communicate with the internet or a local area network. In one example, the transmission device 605 is a Radio Frequency (RF) module that is configured to communicate wirelessly with the internet.
In particular, the memory 603 is used to store applications.
The processor 601 may call an application program stored in the memory 603 through the transmission means 605 to perform the steps of:
acquiring a video resource recorded by a target account, wherein the video resource is used for verifying the identity of the target account on the client;
Dividing the video resource into a plurality of video files;
sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files;
And receiving an authentication result returned by the server in response to the authentication request, wherein the authentication result is used for indicating whether the target account passes authentication.
The processor 601 may also call an application stored in the memory 603 via the transmission means 605 to perform the steps of:
Receiving an identity verification request and a plurality of video files sent by a client logged in by a target account, wherein the video files are obtained by dividing video resources, the video resources are used for verifying the identity of the target account on the client, and the identity verification request is used for requesting the server to verify the identity of the target account according to the video files;
splicing the plurality of video files into the video resource;
responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain an identity verification result, wherein the identity verification result is used for indicating whether the target account passes the identity verification;
And sending the identity verification result to the client.
By adopting the embodiment of the application, an account authentication scheme is provided. The video resource recorded by the target account is divided into a plurality of video files, the video resource used for verifying the identity of the target account on the client is divided and transmitted, the video resource is rapidly transmitted to the server for identity verification, and whether the target account passes the identity verification is determined according to the identity verification result returned by the server, so that the purposes of reducing the occupation of bandwidth in the video resource transmission process and reducing the time consumption of transmission are achieved, the technical effect of improving the transmission efficiency of the video resource in the identity verification process is achieved, and the technical problem of lower transmission efficiency of the video resource in the identity verification process is solved.
Alternatively, specific examples in this embodiment may refer to examples described in the foregoing embodiments, and this embodiment is not described herein.
It will be appreciated by those skilled in the art that the structure shown in fig. 6 is merely illustrative, and the electronic device may be a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, a Mobile internet device (Mobile INTERNET DEVICES, MID), a PAD, etc. Fig. 6 is not limited to the structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 6, or have a different configuration than shown in FIG. 6.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program for instructing an electronic device to execute in conjunction with hardware, the program may be stored on a computer readable storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
The embodiment of the application also provides a storage medium. Alternatively, in the present embodiment, the above-described storage medium may be used for program code for executing an authentication method of an account number.
Alternatively, in this embodiment, the storage medium may be located on at least one network device of the plurality of network devices in the network shown in the above embodiment.
Alternatively, in the present embodiment, the storage medium is configured to store program code for performing the steps of:
acquiring a video resource recorded by a target account, wherein the video resource is used for verifying the identity of the target account on the client;
Dividing the video resource into a plurality of video files;
sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files;
And receiving an authentication result returned by the server in response to the authentication request, wherein the authentication result is used for indicating whether the target account passes authentication.
Optionally, in the present embodiment, the storage medium is further configured to store program code for performing the steps of:
Receiving an identity verification request and a plurality of video files sent by a client logged in by a target account, wherein the video files are obtained by dividing video resources, the video resources are used for verifying the identity of the target account on the client, and the identity verification request is used for requesting the server to verify the identity of the target account according to the video files;
splicing the plurality of video files into the video resource;
responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain an identity verification result, wherein the identity verification result is used for indicating whether the target account passes the identity verification;
And sending the identity verification result to the client.
Alternatively, specific examples in this embodiment may refer to examples described in the foregoing embodiments, and this embodiment is not described herein.
Alternatively, in the present embodiment, the storage medium may include, but is not limited to: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
The integrated units in the above embodiments may be stored in the above-described computer-readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing one or more computer devices (which may be personal computers, servers or network devices, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In several embodiments provided by the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, such as the division of the units, is merely a logical function division, and may be implemented in another manner, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application, which are intended to be comprehended within the scope of the present application.

Claims (15)

1. An identity verification method of an account, applied to a client, is characterized by comprising the following steps:
acquiring a video resource recorded by a target account, wherein the video resource is used for verifying the identity of the target account on the client;
Dividing the video asset into a plurality of video files, comprising: determining whether the data volume of the video resource exceeds a target data volume, wherein the target data volume is a preset multiple of the current network bandwidth; dividing the video asset into a plurality of video files in the event that the amount of data of the video asset exceeds the target amount of data, comprising: acquiring a preset unit resource data amount, wherein the unit resource data amount is used for indicating the maximum value of the data amount of each video file in the plurality of video files, and the unit resource data amount is dynamically changed according to the current network bandwidth; dividing the video resources according to the unit resource data amount to obtain a plurality of video files;
sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files;
And receiving an authentication result returned by the server in response to the authentication request, wherein the authentication result is used for indicating whether the target account passes authentication.
2. The method of claim 1, wherein partitioning the video asset by the unit amount of asset data to obtain the plurality of video files comprises:
calculating the quotient of the data quantity of the video resource and the data quantity of the unit resource;
rounding up the quotient to obtain a target number;
Dividing the video resource into the target number of video files according to a time sequence, wherein the data volume of other video files except the last video file in the target number of video files is the unit resource data volume, and the data volume of the last video file is smaller than or equal to the unit resource data volume.
3. The method of claim 1, wherein sending the authentication request and the plurality of video files to the server comprises:
Marking the video files according to the time sequence of the video files in the video resource to obtain video file identifications corresponding to the video files;
adding a video file identification of each video file to the authentication request;
And sending the authentication request and the plurality of video files to the server.
4. An identity verification method of an account number is applied to a server and is characterized by comprising the following steps:
Receiving an identity verification request and a plurality of video files sent by a client logged in by a target account, wherein the video files are obtained by dividing video resources, the video resources are used for verifying the identity of the target account on the client, the identity verification request is used for requesting the server to verify the identity of the target account according to the video files, and the video resources are divided into the video files, and the method comprises the following steps: determining whether the data volume of the video resource exceeds a target data volume, wherein the target data volume is a preset multiple of the current network bandwidth; dividing the video asset into a plurality of video files in the event that the amount of data of the video asset exceeds the target amount of data, comprising: acquiring a preset unit resource data amount, wherein the unit resource data amount is used for indicating the maximum value of the data amount of each video file in the plurality of video files, and the unit resource data amount is dynamically changed according to the current network bandwidth; dividing the video resources according to the unit resource data amount to obtain a plurality of video files;
splicing the plurality of video files into the video resource;
responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain an identity verification result, wherein the identity verification result is used for indicating whether the target account passes the identity verification;
And sending the identity verification result to the client.
5. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
After stitching the plurality of video files into the video asset, the method further comprises: storing the video resource to an object storage server to obtain a storage address of the video resource;
The step of verifying the identity of the target account according to the video resource comprises the following steps: reading the video resource from a storage address of the video resource through an identity verification server; and carrying out identity verification on the target account through the identity verification server according to the video resource.
6. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
After receiving the authentication request and the plurality of video files sent by the client registered by the target account, the method further includes: storing the plurality of video files to an object storage server to obtain storage addresses of the plurality of video files;
Splicing the plurality of video files into the video asset comprises: reading the plurality of video files from the storage addresses of the plurality of video files through an identity verification server, and splicing the plurality of video files into the video resource through the identity verification server;
The step of verifying the identity of the target account according to the video resource comprises the following steps: and carrying out identity verification on the target account through the identity verification server according to the video resource.
7. The method of claim 4, wherein stitching the plurality of video files into the video asset comprises:
Obtaining video file identifications corresponding to the plurality of video files, wherein the video file identifications are obtained by marking the plurality of video files according to the time sequence of the plurality of video files in the video resource;
and splicing the plurality of video files into the video resource according to the file sequence indicated by the video file identification.
8. The method of claim 4, wherein authenticating the target account based on the video asset comprises:
Identifying video data to be verified from the video resource, wherein the video data to be verified is recorded with images of a target verification code read by a user using the target account;
matching the verification code read by the user and displayed in the video data to be verified with the target verification code;
Under the condition that the verification code read by the user and displayed in the video data to be verified are matched and consistent with the target verification code, determining that the identity verification result is used for indicating that the target account passes identity verification;
and under the condition that the verification code read by the user and displayed in the video data to be verified is inconsistent with the target verification code, determining that the identity verification result is used for indicating that the target account fails identity verification.
9. An account authentication system, characterized in that the system comprises a client and a server, wherein,
The client is used for acquiring video resources recorded by a target account, wherein the video resources are used for verifying the identity of the target account on the client; dividing the video asset into a plurality of video files, comprising: determining whether the data volume of the video resource exceeds a target data volume, wherein the target data volume is a preset multiple of the current network bandwidth; dividing the video asset into a plurality of video files in the event that the amount of data of the video asset exceeds the target amount of data, comprising: acquiring a preset unit resource data amount, wherein the unit resource data amount is used for indicating the maximum value of the data amount of each video file in the plurality of video files; dividing the video resources according to the unit resource data amount to obtain the plurality of video files, wherein the unit resource data amount is dynamically changed according to the current network bandwidth; sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files; receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes identity verification or not;
The server is used for receiving the authentication request and the plurality of video files sent by the client; splicing the plurality of video files into the video resource; responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain the identity verification result; and sending the identity verification result to the client.
10. The system of claim 9, wherein the server comprises: a transmission interface, an object storage server and an authentication server, wherein,
The transmission interface is used for receiving the authentication request and the plurality of video files sent by the client; splicing the plurality of video files into the video resource; storing the video resource to the object storage server to obtain a storage address of the video resource; and sending the authentication result to the client;
The object storage server is used for storing the video resource;
The identity verification server is used for responding to the identity verification request and reading the video resource from the storage address of the video resource; and carrying out identity verification on the target account according to the video resource to obtain the identity verification result.
11. The system of claim 9, wherein the server comprises: a transmission interface, an object storage server and an authentication server, wherein,
The transmission interface is used for receiving the authentication request and the plurality of video files sent by the client; storing the plurality of video files to the object storage server to obtain storage addresses of the plurality of video files; and sending the authentication result to the client;
the object storage server is used for storing the plurality of video files;
The identity verification server is used for reading the plurality of video files from the storage addresses of the plurality of video files and splicing the plurality of video files into the video resource; and responding to the identity verification request, and carrying out identity verification on the target account according to the video resource to obtain the identity verification result.
12. An identity verification device of an account, applied to a client, is characterized by comprising:
The acquisition module is used for acquiring video resources recorded by the target account, wherein the video resources are used for verifying the identity of the target account on the client;
The division module is configured to divide the video resource into a plurality of video files, and includes: determining whether the data volume of the video resource exceeds a target data volume, wherein the target data volume is a preset multiple of the current network bandwidth; dividing the video asset into a plurality of video files in the event that the amount of data of the video asset exceeds the target amount of data, comprising: acquiring a preset unit resource data amount, wherein the unit resource data amount is used for indicating the maximum value of the data amount of each video file in the plurality of video files, and the unit resource data amount is dynamically changed according to the current network bandwidth; dividing the video resources according to the unit resource data amount to obtain a plurality of video files;
The first sending module is used for sending an identity verification request and the plurality of video files to a server, wherein the identity verification request is used for requesting the server to carry out identity verification on the target account according to the plurality of video files;
The first receiving module is used for receiving an identity verification result returned by the server in response to the identity verification request, wherein the identity verification result is used for indicating whether the target account passes the identity verification.
13. An identity verification device of an account, applied to a server, is characterized by comprising:
The second receiving module is configured to receive an authentication request and a plurality of video files sent by a client on which a target account is logged, where the plurality of video files are obtained by dividing a video resource, the video resource is configured to authenticate an identity of the target account on the client, the authentication request is configured to request the server to authenticate the target account according to the plurality of video files, and divide the video resource into a plurality of video files, and the method includes: determining whether the data volume of the video resource exceeds a target data volume, wherein the target data volume is a preset multiple of the current network bandwidth; dividing the video asset into a plurality of video files in the event that the amount of data of the video asset exceeds the target amount of data, comprising: acquiring a preset unit resource data amount, wherein the unit resource data amount is used for indicating the maximum value of the data amount of each video file in the plurality of video files; dividing the video resources according to the unit resource data amount to obtain a plurality of video files;
the splicing module is used for splicing the plurality of video files into the video resource;
The verification module is used for responding to the identity verification request, carrying out identity verification on the target account according to the video resource to obtain an identity verification result, wherein the identity verification result is used for indicating whether the target account passes the identity verification;
and the second sending module is used for sending the identity verification result to the client.
14. A storage medium comprising a stored program, wherein the program when run performs the method of any one of the preceding claims 1 to 8.
15. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor performs the method of any of the preceding claims 1 to 8 by means of the computer program.
CN202110204739.4A 2021-02-23 2021-02-23 Account identity verification method and account identity verification device Active CN115037488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110204739.4A CN115037488B (en) 2021-02-23 2021-02-23 Account identity verification method and account identity verification device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110204739.4A CN115037488B (en) 2021-02-23 2021-02-23 Account identity verification method and account identity verification device

Publications (2)

Publication Number Publication Date
CN115037488A CN115037488A (en) 2022-09-09
CN115037488B true CN115037488B (en) 2024-05-31

Family

ID=83118364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110204739.4A Active CN115037488B (en) 2021-02-23 2021-02-23 Account identity verification method and account identity verification device

Country Status (1)

Country Link
CN (1) CN115037488B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090041182A (en) * 2007-10-23 2009-04-28 한양대학교 산학협력단 Method of transferring and receiving multimedia data on demand
CN101795264A (en) * 2009-12-30 2010-08-04 北京新岸线网络技术有限公司 Video data transmission method and system
CN105338424A (en) * 2015-10-29 2016-02-17 努比亚技术有限公司 Video processing method and system
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN108347463A (en) * 2017-01-23 2018-07-31 普天信息技术有限公司 A kind of terminal document method for uploading
CN109117688A (en) * 2017-06-22 2019-01-01 腾讯科技(深圳)有限公司 Identity identifying method, device and mobile terminal
CN109587438A (en) * 2017-09-29 2019-04-05 北京航空航天大学 A kind of differentiation video content services method towards intelligent video monitoring
CN109840406A (en) * 2017-11-29 2019-06-04 百度在线网络技术(北京)有限公司 Living body verification method, device and computer equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7047309B2 (en) * 2000-08-23 2006-05-16 International Business Machines Corporation Load balancing and dynamic control of multiple data streams in a network

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090041182A (en) * 2007-10-23 2009-04-28 한양대학교 산학협력단 Method of transferring and receiving multimedia data on demand
CN101795264A (en) * 2009-12-30 2010-08-04 北京新岸线网络技术有限公司 Video data transmission method and system
CN105338424A (en) * 2015-10-29 2016-02-17 努比亚技术有限公司 Video processing method and system
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN108347463A (en) * 2017-01-23 2018-07-31 普天信息技术有限公司 A kind of terminal document method for uploading
CN109117688A (en) * 2017-06-22 2019-01-01 腾讯科技(深圳)有限公司 Identity identifying method, device and mobile terminal
CN109587438A (en) * 2017-09-29 2019-04-05 北京航空航天大学 A kind of differentiation video content services method towards intelligent video monitoring
CN109840406A (en) * 2017-11-29 2019-06-04 百度在线网络技术(北京)有限公司 Living body verification method, device and computer equipment

Also Published As

Publication number Publication date
CN115037488A (en) 2022-09-09

Similar Documents

Publication Publication Date Title
CN108965950B (en) Advertisement monitoring method and device
CN104468531B (en) The authorization method of sensitive data, device and system
CN105915953B (en) Method, device, system, server and storage medium for live video identification
CN108449321B (en) Login method, server and client
CN104980278B (en) The method and apparatus for verifying the availability of biometric image
CN108683871A (en) Video-based service processing system, method, user terminal and storage medium
CN111640420B (en) Audio data processing method and device and storage medium
CN111931188B (en) Vulnerability testing method and system in login scene
CN110661829B (en) File downloading method and device, client and computer readable storage medium
CN104796257A (en) Flexible data authentication
US20170187837A1 (en) Ad download method, the client and the server
CN110691085A (en) Login method, login device, password management system and computer readable medium
CN108306886B (en) Identity authentication method, device and storage medium
CN105429959A (en) Image processing method, client equipment, image verification method and server
CN112532605B (en) Network attack tracing method and system, storage medium and electronic device
CN105554136B (en) Backup Data restoring method, apparatus and system
CN105450592A (en) Safety verification method and device, server and terminal
CN113079157A (en) Method and device for acquiring network attacker position and electronic equipment
CN104092653A (en) Data processing method and system
CN111698196A (en) Authentication method and micro-service system
CN108737328B (en) Browser user agent identification method, system and device
CN104778389A (en) Numerical value transferring method, terminal, server and system
CN115037488B (en) Account identity verification method and account identity verification device
CN114187545B (en) Progressive lens identification method and device, electronic equipment and storage medium
CN105871982A (en) Content pushing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant