CN117077100A - Information verification method, device, equipment and storage medium - Google Patents

Information verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN117077100A
CN117077100A CN202211450948.8A CN202211450948A CN117077100A CN 117077100 A CN117077100 A CN 117077100A CN 202211450948 A CN202211450948 A CN 202211450948A CN 117077100 A CN117077100 A CN 117077100A
Authority
CN
China
Prior art keywords
information
verification
verified
target object
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211450948.8A
Other languages
Chinese (zh)
Inventor
王少鸣
侯锦坤
郭润增
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202211450948.8A priority Critical patent/CN117077100A/en
Publication of CN117077100A publication Critical patent/CN117077100A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application discloses an information verification method, an information verification device, information verification equipment and a storage medium, and belongs to the technical field of Internet and computers. The method comprises the following steps: acquiring information to be verified, including an identity verification image of a target object; according to the information to be verified, determining the identity information of the target object and first auxiliary verification information; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified; determining a first object group corresponding to the first auxiliary verification information from at least one object group bound with the identity information according to the first auxiliary verification information; different object groups correspond to different auxiliary verification information, and each object group comprises at least one object to be verified; and acquiring information query results of all objects to be verified contained in the first object group. And acquiring information query results related to a plurality of objects to be verified according to verification information of the target object, so that information acquisition efficiency is improved.

Description

Information verification method, device, equipment and storage medium
Technical Field
The present application relates to the field of internet and computer technologies, and in particular, to an information verification method, apparatus, device, and storage medium.
Background
In order to improve environmental security, authentication is required at some sites of the user.
In the related art, a terminal carried by an object to be verified can acquire attribute information of a user in real time. Namely, under the condition that information verification is required, the object to be verified can display attribute information through the user terminal, and the verification process of the attribute information is performed.
However, providing attribute information by the control terminal has a problem that information acquisition efficiency is low.
Disclosure of Invention
The application provides an information verification method, an information verification device, information verification equipment and a storage medium. The technical scheme is as follows:
according to an aspect of an embodiment of the present application, there is provided an information verification method, including:
acquiring information to be verified, including an identity verification image of a target object;
according to the information to be verified, determining the identity information of the target object and first auxiliary verification information; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified;
determining a first object group corresponding to the first auxiliary verification information from at least one object group bound with the identity information according to the first auxiliary verification information; wherein, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified;
And acquiring information query results of all objects to be verified contained in the first object group.
According to an aspect of an embodiment of the present application, there is provided an information verification method, including:
collecting information to be verified, including an identity verification image of a target object;
the information to be verified is sent to a server and is used for determining the identity information and the first auxiliary verification information of the target object; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified;
receiving an information inquiry result sent by the server, wherein the information inquiry result comprises at least one of the following steps: attribute information of each object to be verified contained in a first object group, wherein the first object group contains verification results of each object to be verified; the first object group is an object group corresponding to the first auxiliary verification information, which is determined from at least one object group bound by the identity information according to the first auxiliary verification information, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
According to an aspect of an embodiment of the present application, there is provided an information verification method, including:
displaying an information setting interface;
displaying at least one object group bound with identity information of a target object in response to an operation of the information setting interface; the identity information is used for uniquely identifying the identity of the target object, different object groups correspond to different auxiliary verification information, and each object group comprises at least one object to be verified;
displaying first auxiliary verification information set for a first object group in the at least one object group, wherein the first auxiliary verification information is used for determining an object to be verified which needs to be verified;
an information setting request is sent to a server, the information setting request being used for requesting establishment of a correspondence between the first object group and the first auxiliary authentication information.
According to an aspect of an embodiment of the present application, there is provided an information authentication apparatus including:
the information acquisition module is used for acquiring information to be verified, including an identity verification image of a target object;
the information determining module is used for determining the identity information of the target object and the first auxiliary verification information according to the information to be verified; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified;
The grouping determining module is used for determining a first object grouping corresponding to the first auxiliary verification information from at least one object grouping bound by the identity information according to the first auxiliary verification information; wherein, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified;
and the information query module is used for acquiring information query results of all objects to be verified contained in the first object group.
In some embodiments, the information determination module is configured to identify first image content and second image content contained in the authentication image, the first image content and the second image content being different; a first determining unit, configured to determine identity information of the target object according to the first image content; and the second determining unit is used for determining the first auxiliary verification information according to the second image content.
In some embodiments, the first image content is palm print information and the second image content is gesture information or left-right palm information; or, the first image content is facial information, and the second image content is expression information or mouth shape information.
In some embodiments, the information to be verified further comprises: voice data of the target object; the information determining module is used for identifying the identity verification image and determining the identity information of the target object; and recognizing the voice data and determining the first auxiliary verification information.
In some embodiments, the information to be verified is collected and provided by a verification terminal; the apparatus further comprises: the information sending module is used for sending an information inquiry result to the verification terminal, and the information inquiry result information comprises at least one of the following information: attribute information of each object to be verified contained in the first object group, and verification results of each object to be verified contained in the first object group.
In some embodiments, the apparatus further comprises: the system comprises a packet management module, a user terminal and a user terminal, wherein the packet management module is used for receiving a packet management request sent by the user terminal, and the packet management request comprises a user account logged in by the user terminal; acquiring identity information corresponding to the user account and at least one object group bound with the identity information; performing a management operation on at least one object group bound to the identity information according to the group management request, the management operation including at least one of: adding object groups and corresponding auxiliary verification information, deleting the object groups and the corresponding auxiliary verification information, inquiring the object groups and the corresponding auxiliary verification information, modifying the auxiliary verification information corresponding to the object groups, and modifying the objects to be verified contained in the object groups.
In some embodiments, the information query module is configured to send an information acquisition request to an external service, where the information acquisition request includes identification information of each object to be verified included in the first object packet; receiving the information inquiry result sent by the external service; the information query result comprises attribute information of each object to be verified contained in the first object group, and the attribute information comprises an attribute code used for representing the target attribute of the object to be verified.
In some embodiments, the apparatus further comprises: the binding establishment module is used for identifying and obtaining the characteristic data of the target object based on the identity verification image, and taking the characteristic data as the characteristic data to be matched; if the feature data matched with the feature data to be matched does not exist in the feature database, generating a graphic code associated with the feature data to be matched; wherein, the feature database stores feature data of at least one registered object; the graphic code is sent to a verification terminal for display; receiving an account binding request sent by a user terminal, wherein the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal; and establishing a binding relation between the feature data to be matched and the user account.
According to an aspect of an embodiment of the present application, there is provided an information authentication apparatus including:
the information acquisition module is used for acquiring information to be verified, including an identity verification image of a target object;
the information sending module is used for sending the information to be verified to a server, wherein the information to be verified is used for determining the identity information and the first auxiliary verification information of the target object; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified;
the result receiving module is used for receiving the information inquiry result sent by the server, and the information inquiry result comprises at least one of the following steps: attribute information of each object to be verified contained in a first object group, wherein the first object group contains verification results of each object to be verified; the first object group is an object group corresponding to the first auxiliary verification information, which is determined from at least one object group bound by the identity information according to the first auxiliary verification information, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
In some embodiments, the identity information of the target object is determined based on a first image content contained in the authentication image, the first auxiliary authentication information is determined based on a second image content contained in the authentication image, the first image content and the second image content being different.
In some embodiments, the first image content is palm print information and the second image content is gesture information or left-right palm information; or, the first image content is facial information, and the second image content is expression information or mouth shape information.
In some embodiments, the information to be verified further comprises: voice data of the target object; the information acquisition module is also used for acquiring voice data of the target object; wherein the identity information of the target object is determined based on the authentication image and the first auxiliary authentication information is determined based on the voice data.
In some embodiments, the apparatus further comprises: the graphic code display module is used for receiving the graphic code sent by the server, and the graphic code is generated and associated with the feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in the feature database; the feature data to be matched are feature data of the target object obtained based on the identification of the identity verification image, and feature data of at least one registered object are stored in a feature database; displaying the graphic code, wherein the graphic code is used for being scanned by a user terminal so as to send an account binding request to the server, the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
According to an aspect of an embodiment of the present application, there is provided an information authentication apparatus including:
the information display module is used for displaying an information setting interface;
an information binding module for displaying at least one object group bound with the identity information of the target object in response to an operation for the information setting interface; the identity information is used for uniquely identifying the identity of the target object, different object groups correspond to different auxiliary verification information, and each object group comprises at least one object to be verified;
the verification display module is used for displaying first auxiliary verification information set for a first object group in the at least one object group, wherein the first auxiliary verification information is used for determining an object to be verified which needs to be verified;
and the request sending module is used for sending an information setting request to a server, wherein the information setting request is used for requesting to establish the corresponding relation between the first object group and the first auxiliary verification information.
In some embodiments, the apparatus further comprises: the information binding module is used for scanning a graphic code displayed by the verification terminal, the graphic code is generated in association with feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in a feature database, the feature data to be matched is the feature data of a target object obtained based on identification verification image recognition related to the target object, and the feature data of at least one registered object is stored in the feature database; and sending an account binding request to the server, wherein the account binding request comprises identification information of the graphic code and a user account logged in by a user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
In some embodiments, the apparatus further comprises: a packet management module for sending a packet management request to the server, the packet management request requesting that a management operation be performed on at least one object packet bound to the identity information, the management operation comprising at least one of: adding object groups and corresponding auxiliary verification information, deleting the object groups and the corresponding auxiliary verification information, inquiring the object groups and the corresponding auxiliary verification information, modifying the auxiliary verification information corresponding to the object groups, and modifying the objects to be verified contained in the object groups.
In some embodiments, the apparatus further comprises: a request binding module, configured to send packet binding requests to at least one other user terminal respectively; the grouping binding request is used for requesting to add a candidate verification object to at least one object grouping, and the other user terminals log in the user accounts of the candidate verification objects; receiving binding permission information sent by the other user terminals; wherein the binding permission information is used to characterize that the candidate verification object agrees to be an object to be bound in at least one of the object groups.
According to an aspect of an embodiment of the present application, there is provided an electronic device including: a processor and a memory in which a computer program is stored, the computer program being loaded and executed by the processor to implement the information verification method as described above.
According to an aspect of an embodiment of the present application, there is provided a computer-readable storage medium having stored therein a computer program loaded and executed by a processor to implement the information verification method as described above.
According to an aspect of an embodiment of the present application, there is provided a computer program product including a computer program stored in a computer-readable storage medium, from which a processor reads and executes the computer program to implement the information verification method as described above.
According to an aspect of an embodiment of the present application, there is provided an information verification system including a server, a verification terminal, and a user terminal. The server is used for executing the information verification method of the server side in the embodiment of the application, the verification terminal is used for executing the information verification method of the verification terminal side in the embodiment of the application, and the user terminal is used for executing the information verification method of the user terminal side in the embodiment of the application.
The technical scheme provided by the embodiment of the application has the beneficial effects that at least:
the server stores the binding relation between at least one auxiliary verification information and the object group, and the server obtains the auxiliary verification information by processing the information to be verified, so that the target object group can be determined from the at least one object group. The server can then obtain the query results for the plurality of objects to be verified contained in the target object group. By the method, the user terminal does not need to be relied on to provide attribute information of the object to be verified for verification, and the operation requirement of the object to be verified in the information verification process is simplified. Meanwhile, the information query results of the objects to be verified can be grouped and contained by verification information related to the target object, so that the efficiency of obtaining the information query results is improved.
Drawings
FIG. 1 is a schematic illustration of an implementation environment for an embodiment of the present application;
FIG. 2 is a schematic diagram of a solution technical concept provided by an exemplary embodiment of the present application;
FIG. 3 is a flow chart of a method of information verification provided by an exemplary embodiment of the present application;
FIG. 4 is a schematic diagram of an information verification process provided by an exemplary embodiment of the present application;
Fig. 5 is a flowchart of an information verification method provided by another exemplary embodiment of the present application;
fig. 6 is a flowchart of an information verification method provided by another exemplary embodiment of the present application;
FIG. 7 is a schematic diagram of an information verification method provided by an exemplary embodiment of the present application;
fig. 8 is a block diagram of an information authentication apparatus provided in an exemplary embodiment of the present application;
fig. 9 is a block diagram of an information authentication apparatus provided in another exemplary embodiment of the present application;
fig. 10 is a block diagram of an information authentication apparatus provided by another exemplary embodiment of the present application;
fig. 11 is a block diagram of an electronic device according to an exemplary embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail with reference to the accompanying drawings.
First, the terms involved in the present application will be described.
1. The palm print identification refers to a method for identifying user identity information according to palm print pictures.
2. Color image refers to a color image of natural light imaging acquired by a color sensor (sensor) in a color camera. In the application scene of face/palm payment, the color chart is used for face or palm preference or color chart comparison and identification to determine the identity of the user.
3. The infrared image refers to an infrared image of the pan-infrared light image acquired by an infrared sensor in the infrared camera. In the application scene of face/palm brushing payment, an infrared image is used for living body detection, and the activity of a target to be detected is judged.
4. A three-dimensional (3D) camera refers to a camera to which living body related software and hardware are added, including a depth camera, and an infrared camera. The 3D camera is used for improving the safety of the information verification process.
5. The Serial Number (SN) refers to an identification Number (Identity document, ID) that uniquely identifies a device.
To promote the security of the surrounding environment, authentication information needs to be provided before the object enters the public place. When verification information of the object is verified to be correct, the object can smoothly enter the place.
In the related art, an object may search for authentication information through a user terminal and provide the authentication information to a verification terminal. The information verification efficiency in the method is low, and each object needs to use the respective user terminal to search verification information and provide the verification information to the verification terminals respectively, so that people are easy to gather under the condition that the number of the verification terminals is limited. In addition, for the old, children, etc., there may be a problem in that the user terminal is difficult to use, resulting in difficulty in the population to go in and out of public places.
In the information verification method provided by the application, the efficiency of information verification is improved, the difficulty of information verification of partial groups (such as old people and children) is reduced, the time consumption of information verification of a plurality of objects is shortened, crowded and gathered people are avoided, and the popularity of the people is improved.
FIG. 1 is a schematic diagram of an implementation environment for an embodiment of the present application. The information verification device may include: a user terminal 10, a verification terminal 20, and a server 30.
The user terminal 10 may be an electronic device such as a personal computer, tablet computer, cell phone, wearable device, smart home appliance, car terminal, etc. Optionally, a client with a target application running on the user terminal 10. The target application can provide attribute information of the target object. For example, attribute information of the user is stored in the target application. For another example, in the case of dynamic update of authentication information, the target application program retrieves and displays attribute information of the target object through an external service.
In addition, the target application may also have other functions, for example, the target application may be a social application, a news application, a shopping application, a social application, an interactive entertainment application, a browser application, a content sharing application, a virtual reality application, an augmented reality application, and the like, which is not limited by the embodiment of the present application. In addition, for different applications. The target application program has a social relation chain, and the target object communicates by determining at least one object to be verified in the social relation chain.
The user terminal 10 has at least a data receiving function and a storage function.
The verification terminal 20 is used for collecting information to be verified related to the target object. The verification terminal 20 may include at least one of the following modules for collecting information: shooting camera module, distance sensor module and audio recording module.
The shooting camera module is used for shooting an image to be verified. The shooting camera module comprises at least one shooting camera, and the types of the shooting cameras comprise at least one of the following: color cameras, depth cameras, infrared cameras, etc.
The distance Sensor module includes at least one distance Sensor (P-Sensor).
In some embodiments, the shooting camera module and the distance sensor module are located on the same plane, and the distance sensor in the distance sensor module is used for measuring the distance between the object to be shot and the shooting camera module, so that the shooting camera is helped to fix focus, and the definition of an identity verification image obtained by the shooting camera is helped to be improved.
The audio recording module may record authentication audio (also referred to as voice data) of the target object.
The server 30 establishes a communication connection with the user terminal 10. The server 30 is used to provide background services for clients of the target application in the user terminal 10. For example, the server 30 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, secure service content distribution network, (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platform, but is not limited thereto.
The server 30 establishes a communication connection with the authentication terminal 20. The server 30 obtains information to be verified through the verification terminal 20, and obtains information query results related to a plurality of objects to be verified according to the information to be verified.
Fig. 2 is a schematic diagram of an exemplary embodiment of the present application.
When information verification is needed, the verification terminal collects information to be verified, including an identity verification image (such as a hand image of a target object), and sends the information to be verified to the server. The server receives the information to be verified, determines the identity information of the target object according to the information to be verified, and determines the gesture information of the target object according to the identity verification image. The server stores at least one group of object groups preset by the target object, and each group of object groups corresponds to different gesture information. The server determines a target object group from a plurality of object groups through gesture information, and automatically verifies attribute information (such as health codes) of at least one object to be verified in the object group.
The server only needs to process the information to be verified related to the target object, and can automatically verify the attribute information of a plurality of objects to be verified.
Meanwhile, the operation required by the object to be verified is simplified, the verification terminal is reduced from not needing to collect attribute information of each object to be verified, the data collection pressure of the verification terminal and the information processing pressure of the server are reduced, the speed of verifying the object to be verified is improved, and the efficiency of information verification is improved.
The information verification method provided by the application can be applied to a graphic code (such as a health code) verification scene. The image code corresponds to attribute information of an object to be authenticated in the claims.
In the graphic code checking process, the checking terminal shoots or records information to be verified related to the target object, and the server can check the graphic code of at least one object to be verified according to the information to be verified. And the verification results of all the objects to be verified are returned, so that compared with the objects to be verified, the method and the device are beneficial to improving the graphic code verification speed of the objects to be verified and improving the information verification efficiency by actively providing attribute information. Under epidemic prevention scene, the method is helpful for the object to be verified to rapidly complete the information verification process, accelerates the speed of the object to be verified entering a certain place, and is helpful for avoiding aggregation of the object to be verified outside the place.
The information verification method provided by the application can be applied to an image code display scene, the verification terminal obtains the information to be verified of the target object, the server determines the graphic code of at least one object to be verified according to the information to be verified, and the graphic code of at least one object to be verified is returned to the verification terminal. And the verification terminal displays the graphic code of the at least one object to be verified.
In the nucleic acid detection process, a nucleic acid inspector needs to provide information such as an image code before performing nucleic acid detection. The staff obtains the graphic code provided by the nucleic acid inspector through the information collecting equipment, and establishes the connection between the nucleic acid detection result and the nucleic acid inspector. In the information verification method provided by the application, after the verification terminal acquires the information to be verified of the target object, the acquisition server determines the graphic code of at least one object to be verified according to the information to be verified. The verification terminal displays the graphic code of at least one object to be verified to the staff member so that the staff member can scan the graphic code by using the information collecting device.
In this way, the verification device can display the image code of at least one member in the family only by collecting the information to be detected of the member in the family queued for nucleic acid detection (for example, the member finishes palm brushing, face verification and the like through the verification terminal). The staff can use the graphic code displayed in the scanning verification terminal between the information collection devices, the information collection speed of the staff can be improved by the method, the nucleic acid detection flow is shortened, and the waiting time of the masses before the nucleic acid detection is carried out can be reduced.
Fig. 3 is a flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by a server as described in fig. 1, for example. As shown in fig. 3, the method may include the following steps (310-340):
step 310, obtaining information to be verified including an authentication image of a target object.
In some embodiments, a target object refers to any object to be information verified. Optionally, the server stores an object group set in advance by the target object, and for details of this portion, please refer to the following embodiments.
The information to be verified is used to verify the identity of the target object. In some embodiments, the information to be verified includes biometric information of the target object. Optionally, the information to be verified includes at least one of: an authentication image of the target object, authentication audio (which may be referred to as voice data) of the target object, etc.
In some embodiments, the information to be verified comprises an authentication image of the target object. The authentication image is an image obtained by photographing a target object. Optionally, the authentication image shows the complete target object or a part of the feature limbs of the target object are shown in the authentication image.
For example, the authentication image includes a hand image of the target object. As another example, the authentication image includes a facial image of the target object.
In some embodiments, the information to be verified is collected by the verification terminal. Shooting the target object through a camera module in the verification terminal to obtain an identity verification image of the target object. For example, in the case where the authentication image includes a hand image of the target object, the target object may approach the hand to the photographing camera module of the authentication terminal, and the photographing camera module of the authentication terminal photographs at least one authentication image.
After the verification terminal acquires the information to be verified, including the identity verification image of the target object, the information to be verified is sent to the server.
Because the target object is dynamically changed in the acquisition process, the verification terminal can shoot for a plurality of times to obtain a plurality of candidate identity verification images. The authentication terminal transmits authentication information including a plurality of candidate authentication images to the server.
The server performs optimization according to the plurality of candidate authentication images, and picks out at least one authentication image according to factors such as image definition, shooting light and the like. In some embodiments, the authentication image includes at least one of: infrared images, color images, identity images, etc.
In some embodiments, in the case where the information to be verified includes an authentication audio, the authentication terminal may acquire the authentication audio through the audio recording module and send the authentication audio to the server.
The information type included in the information to be verified is related to the target object setting, and the following embodiments are referred to for specific content.
Step 320, determining the identity information of the target object and the first auxiliary verification information according to the information to be verified; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified.
In some embodiments, the identity information is used to uniquely identify the target object. Optionally, the identity information comprises an identification number of the target object. The identification number of the target object includes, but is not limited to, at least one of: the identification card number of the target object, the mobile phone number of the target object, the user account number of the target object in the application program, and the like have corresponding numbers with the target object.
The user account of the target object in the target application may be referred to as open identity information (OpenID).
Taking the user account in the target application program as an example, because different objects respectively correspond to different user accounts in the target application program, the user account of the target object is used as the identity information of the target object, and the identity of the target object can be uniquely identified.
Optionally, the identity information comprises a biometric ID of the target object. The biometric ID refers to an ID created for biometric information of the target object.
In some embodiments, the biological information of the target object includes, but is not limited to, at least one of: palmprint (or palm), fingerprint, voiceprint, facial information, and the like.
For example, the server creates a palm ID for the palm of the target object in advance. Since palmprints of different objects have differences, palm IDs corresponding to different palms are different, and thus, the palm IDs can identify the identity of the target object. The left palm of the target object and the right palm of the target object can correspond to different palm IDs, and the left palm ID and the right palm ID can both represent identity information of the target object.
In some embodiments, to enhance the security of the authentication process, the identity information of the target object includes a user account of the target object and a biometric ID of the target object.
Optionally, the server extracts the feature to be verified from the information to be verified, compares the feature to be verified with at least one known identity feature, determines the known identity feature with the highest similarity to the feature to be verified, and uses the identity information corresponding to the known identity feature as the identity information of the target object to determine the identity information of the target object through the information to be verified.
Before the server determines the identity information of the target object according to the information to be verified, the server needs to establish a binding relationship between the identity characteristics related to the target object and the identity information of the target object. For details of this process, please refer to the following examples.
In some embodiments, the auxiliary authentication information is used to determine at least one object to be authenticated associated with the target object. Optionally, the target object may set a plurality of auxiliary verification information, where objects to be verified corresponding to different auxiliary verification information are not identical. The object to be verified refers to an object that needs to be verified for information. For example, the object to be authenticated includes an object for which authentication of communication information is required.
The first auxiliary verification information refers to auxiliary verification information determined according to information to be verified. Optionally, the object to be verified includes other objects that need to be verified in information besides the target object.
In some embodiments, a social relationship exists between the object to be verified and the target object, for example, a social link exists between a user account of the object to be verified and a user account of the target object, and the target object, after acquiring authorization of the object to be verified, is configured to add the object to be verified to at least one user group. For subsequent information verification of the object to be verified by the identity information and the auxiliary verification information of the target object, please refer to the following examples for details of the procedure. By the method, information verification efficiency is improved.
In some embodiments, the first auxiliary authentication information is used to determine an object to be authenticated that needs to be authenticated. Optionally, an association relationship exists between the first auxiliary verification information and the object to be verified; and the server determines at least one object to be verified for the information verification from a plurality of objects to be verified associated with the target object through the first auxiliary verification information.
In some embodiments, the auxiliary authentication information is set by the target object, and the auxiliary authentication information set by different target objects is not identical. Optionally, the auxiliary authentication information includes, but is not limited to, at least one of: the gesture of the target object, the expression of the target object and the voice command of the target object.
The server stores at least one auxiliary authentication information set by the target object. In the case that the target object is provided with a plurality of auxiliary verification information, there are at least two objects to be verified corresponding to the auxiliary verification information respectively, which are not identical, and for the specific content of the portion, please refer to the following embodiments.
In some embodiments, the server determines, according to the information to be verified, identity information of the target object and first auxiliary verification information, including: the server determines the identity information of the target object according to the information to be verified; and the server determines first auxiliary verification information from the at least one auxiliary verification information according to the information to be verified.
For example, the information to be verified includes an authentication image, the authentication image includes a palm image obtained by photographing a palm of the target object, the server determines identity information (for example, palm ID) of the target object according to a palm print in the authentication image, and determines first auxiliary authentication information (for example, gesture information) according to a gesture of the target object in the authentication image.
For another example, the information to be verified comprises an identity verification image, the identity verification image comprises a face image obtained by shooting the face of the target object, and the server determines the identity information (such as a face ID) of the target object according to the face information in the image to be recognized; and the server determines the identity information first auxiliary verification information of the target object according to the expression information of the image to be identified.
For another example, the information to be verified includes authentication audio, the server determines the identity information (e.g., voiceprint ID) of the target object based on the authentication audio, and the first auxiliary authentication information (e.g., semantic information in the authentication audio).
For another example, the information to be verified includes an authentication image and authentication audio, the server determines identity information of the target object (e.g., a user account in the target application) according to the authentication image, and the server determines first auxiliary authentication information (e.g., semantic information in the authentication audio) according to the authentication audio.
It should be noted that, in the above embodiment, the identification information of the target object and the first auxiliary verification information are determined according to the information to be verified only by way of example, and the form of the information to be verified is not limited. For details of this process, please refer to the following examples.
Step 330, determining a first object group corresponding to the first auxiliary verification information from at least one object group bound with the identity information according to the first auxiliary verification information; wherein, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
In some embodiments, the object group includes at least one object to be authenticated. Optionally, the object group is created by the target object. Optionally, the target object performs management activities related to object grouping through the user terminal, for details of the process, please refer to the following embodiments.
Optionally, in the case that the identity information is bound with a plurality of object groups, there are at least two object groups that contain different objects to be verified. The two object groups contain different objects to be verified, which means that the two object groups comprise at least one different object to be verified.
For example, the object group 1 includes an object to be verified 1, an object to be verified 2, and an object to be verified 3; the object group 2 includes an object to be verified 2 and an object to be verified 4, and the object group 3 includes an object to be verified 5.
Different object groups correspond to different auxiliary authentication information. Optionally, the object groups and the auxiliary verification information are in one-to-one correspondence, that is, one object group corresponds to only one auxiliary verification information, and one auxiliary verification information corresponds to only one object group.
Optionally, the object group includes a target object.
It should be noted that, the number of objects to be verified included in the object group, and the sources of the objects to be verified are set according to actual needs.
Optionally, the target object may bind the auxiliary verification information and the object group in advance, so that a mapping relationship is established between the auxiliary verification information and the object group in the server, and the server can determine the object group uniquely corresponding to the auxiliary verification information through the auxiliary verification information.
In some embodiments, the auxiliary authentication information is specified by the user, different object groups correspond to different auxiliary authentication information, e.g., the target object may select target auxiliary authentication information among the candidate auxiliary authentication information and create a target object group associated with the target auxiliary authentication information, or establish a binding relationship between the target auxiliary authentication information and the target object group.
The candidate auxiliary verification information is a preset value, for example, in the case that the first auxiliary verification information is gesture information, the server selects a target gesture from a plurality of preset gestures according to the target object indication, and binds the target gesture and the target object group. After that, if the target object wants to perform information verification on the object to be tested in the target object group, the identity verification information acquired by the verification terminal may include: an authentication image of the palm of the target gesture is made.
The first object group is an object group corresponding to the first auxiliary authentication information. The first object group comprises at least one object to be verified.
Step 340, obtaining the information query results of each object to be verified contained in the first object group.
In some embodiments, the information query results include attribute information of each object to be verified, or verification results of attribute information of each object to be verified.
Attribute information refers to attributes that characterize an object. Optionally, the attribute information is used to characterize a traffic attribute of the object. And the server determines the right to pass the object to be verified in a certain scene according to the attribute information of the object to be verified.
Optionally, the attribute information includes, but is not limited to, at least one of: pass codes (e.g., health codes), pass levels, ticket ownership, etc.
In some embodiments, the attribute information is a graphic code of the object to be authenticated. The graphic code is used to obtain information about the object to be authenticated. In the present application, the name of the graphic code is not limited, such as a nucleic acid code, a personal code, an identity code, and the like.
In some embodiments, the server obtaining the information query result of each object to be verified included in the first object group includes: and acquiring attribute information of each object to be verified, and carrying out information verification on each object to be verified to generate an information inquiry result.
Optionally, the information verification process is completed through an external service, the server may send identification information of each object to be verified in the first object group to the external service, and the external service automatically searches attribute information of each object to be verified, and verifies the attribute information of each object to be verified to generate an information query result; the information inquiry result comprises verification results corresponding to the objects to be verified respectively.
The information verification process can be completed through external service, and can also be performed through a server, for example, the server obtains attribute information of each object to be verified in the first object group through the external service, and verifies the attribute information of each object to be verified; and the server generates an information inquiry result according to the verification results respectively corresponding to the objects to be verified.
Optionally, the server determines attribute information of the target object according to the identification information of the target object. If the attribute information of the target object does not pass the verification, the server does not verify the attribute information of each object to be verified in the first object group; if the attribute information of the target object passes the verification, the server verifies the attribute information of each object in the first object group to verify. And under the condition that the attribute information of the target object passes the verification, if the attribute information of all objects to be verified in the first object group passes the verification, the server determines that each object to be verified passes the verification. If the attribute information of at least one object to be verified in the first object group does not pass verification, the server sends out an abnormal notification.
The main body that generates the information query result is determined according to actual needs, and the present application is not limited herein.
In an information inspection scene, acquiring information to be verified related to a target object through an inspection terminal; the server can automatically check the attribute information of each object to be verified in a certain object group established by the target object according to the information to be verified, and generate an information inquiry result. The server sends an information inquiry result to the verification terminal, and the verification device determines whether each object to be verified in the first object group passes verification according to the information inquiry result.
In other embodiments, the information query result includes attribute information of each object to be verified in the first group. After the first object group is determined, the server inquires attribute information of each object to be verified in the first object group, and generates an information inquiry result according to the attribute information of each object to be verified in the first object group.
In this case, the server transmits the information verification result to the verification terminal, and the verification terminal can display attribute information of each object to be verified of the first object group according to the information inquiry result.
In one example, the information verification method provided by the application is used for information display scenes, and the verification terminal is used for collecting information to be verified, which is related to a target object; and the server searches the attribute information of each object to be verified in a certain object group established by the target object according to the information to be verified, and sends the attribute information of each object to be verified to the verification terminal. Optionally, the verification terminal may display attribute information of each object to be verified, so as to quickly display attribute information of each object to be verified.
The information verification method provided by the application is briefly described by an embodiment.
In order to improve the efficiency of information verification, the target object may set in advance a binding relationship between the auxiliary verification information and the object group. If each object in the first object group needs to be subjected to information verification, the target object makes a gesture, an expression or a voice with a preset value to the verification device. The verification device collects gestures, expressions or provided voices of the target object to obtain information to be verified, and sends the information to be verified to the server.
The server determines the identity information and the first auxiliary information of the target object according to the information to be verified, and determines a first object group from a plurality of object groups set by the target object through the first auxiliary information. The server obtains information query results of all objects to be verified contained in the first object group. Optionally, according to different application scenarios, the content carried by the information query result is not identical. For example, in the information verification scenario, the information query result carries the result of information verification performed by each object to be verified. For another example, in the information display scenario, the information query result carries attribute information of each object to be verified.
Under the condition that the first object group comprises a plurality of objects to be verified, the information inquiry result comprising the plurality of objects to be verified can be generated by acquiring the information to be verified of any target object 1, so that the information inquiry and verification efficiency can be effectively improved.
Under the condition that the first object group only comprises 1 object to be verified, the method can also improve the efficiency of information inquiry. For example, if the target object is a guardian and the object to be verified is a child, the information query result of the child can be obtained by brushing the palm or scanning the code through the target object.
Since children and old people wait for the verification object to have no independent user terminal or have difficulty in using the user terminal, the user terminal cannot be used efficiently to provide attribute information. The guardian is used for brushing the palm, brushing the face or inputting voice information to acquire information query results of groups such as children, old people and the like, so that the operation requirements on the old people and the children in the information query process are simplified. Compared with the method for manually inputting and registering identity information of children and old people in the related art, the method for acquiring the information to be verified of the target object through the verification terminal is beneficial to improving information query efficiency.
In summary, the binding relationship between the at least one auxiliary verification information and the object group is stored in the server, and the server processes the information to be verified to obtain the auxiliary verification information, so that the target object group can be determined from the at least one object group. The server can then obtain information query results containing the respective objects to be verified in the first object group. By the method, the object to be verified does not need to rely on the user terminal to show the attribute information, and the operation requirement of the object to be verified in the information verification process is simplified. Meanwhile, through the information to be verified related to the target object, the information related to at least one object to be verified can be obtained at one time, and the information obtaining efficiency is improved.
Next, description will be made on a determination method of the identity information and the first auxiliary authentication information by several embodiments.
In some embodiments, the server determines, according to the information to be verified, identity information of the target object and first auxiliary verification information, including: the server identifies first image content and second image content contained in the authentication image, the first image content and the second image content being different; the server determines the identity information of the target object according to the first image content; the server determines first auxiliary authentication information according to the second image content.
The first image content refers to image content in the authentication image used to determine identity information. Optionally, the first image content is related to biological information. For example, the first image content is palmprint information, facial information, or the like. The first image content is set according to actual needs, and the present application is not limited thereto.
The second image content refers to the content of the authentication image used to determine the first auxiliary authentication information. Optionally, the second image content is related to an action of the target object. For example, the second screen content is gesture information, mouth shape information, or expression information of the target object.
Optionally, the first screen content is a unique screen content provided by the target object. That is, the first picture content respectively identified in the authentication images corresponding to different target objects is different.
For example, the target object 1 corresponds to the authentication image 1, and the server identifies the first screen content 1 from the authentication image 1; the target object 2 corresponds to the authentication image 2, and the server recognizes the first screen content 2 from the authentication image 2, and the first screen content 1 and the second screen content 2 are different.
The server can determine the identity information uniquely identifying the identity of the target object according to the first picture content.
In some embodiments, to promote reliability of the determined identity information of the target object, the server obtains a plurality of authentication images. For example, the server obtains at least two authentication images, a first authentication image being taken by the infrared camera and a second authentication image being taken by the color. The server identifies infrared first picture content from the first authentication image and color first picture content from the second authentication image. The infrared first picture content comprises subcutaneous palmprint information (such as vascularization in palm) of the target object, and the color first picture content comprises epidermis palmprint information of the target object. The server determines the identity information of the target object according to the infrared first picture content and the color first picture content.
The second screen content includes screen content autonomously decided by the target object. Alternatively, the second screen contents respectively corresponding to the different target objects may be the same. For example, the second screen content is gesture information of the target object, and different target objects may select the same gesture information.
The method for determining the identity information and the first auxiliary information of the target object is described below by taking the first picture content as palm print information and the second picture content as gesture information as an example.
The server uses the palm print recognition model to conduct feature extraction on the first picture content to obtain palm print features to be verified; the server compares the palm print feature to be verified with at least one known palm print feature of the palm database (for example, calculates the spatial similarity between the palm print feature to be verified and the known palm print feature), and determines the known palm feature with the highest similarity with the palm print feature to be verified. The server takes the palm ID corresponding to the known palm feature with the highest similarity between the palm features to be verified as the palm ID of the target object. The identity information of the target object is a palm ID. Optionally, the palmprint recognition model is a machine learning model.
Optionally, a mapping relationship exists between the palm ID and the user account in the target application program, and the server determines the user account of the target object in the target application program according to the palm ID of the target object. Optionally, the identity information of the target object includes a palm ID of the target object and a user account of the target object.
In some embodiments, the server determines the first auxiliary authentication information from the second image content, including: the server uses the gesture recognition model to extract characteristics of the second picture content to obtain gesture characteristics to be verified; the server compares the gesture features to be verified with at least one known gesture feature, determines the known gesture feature with the highest similarity between the known gesture feature and the gesture feature to be verified, and takes the gesture corresponding to the known gesture feature as first auxiliary verification information.
Optionally, the gesture recognition model is used for performing static gesture recognition, and the gesture recognition model is constructed based on a neural network model of a template matching method.
By the method, the identity information and the first auxiliary verification information of the target object can be determined simultaneously only through the identity verification image of the identity recognition image. On the one hand, compared with the method for carrying out information verification by using the user terminal in the related technology, the method gets rid of the dependence of the information verification on the user terminal, reduces the limitation of the information verification process on the aspects of electric quantity, network factors and the like of the user terminal, and ensures that the information verification method has more universality. On the other hand, the method reduces the information quantity required to be collected by the verification terminal in the information verification process, and the verification terminal only needs to acquire the information to be verified of the target object, so that the server can verify the information of at least one object to be verified according to the information to be verified, and the information verification efficiency is improved.
In some embodiments, the first image content is palm print information and the second image content is gesture information or left-right palm information; or the first image content is facial information, and the second image content is expression information or mouth shape information.
Optionally, the palmprint information includes at least one of the following: palm epidermis texture information and subcutaneous vein blood vessel information.
In some embodiments, gesture information is used to characterize the motion of the palm, and left and right palm information is used to characterize the palm completing the palm motion. Optionally, the gesture information includes at least one of: OK (thumb-finger tip-rest finger-spread) gestures, YE (index finger-and-middle finger-spread), rest finger-palm-strike) gestures, and FIST (FIST-hold) gestures.
In some embodiments, the second image content includes gesture information and left and right palm information. I.e. the auxiliary authentication information is related to both the gesture and the left and right palm. That is, the same gesture performed by different palms corresponds to different groupings of objects. By the method, under the condition of limited gestures, the number of object groups which can be established by the target object is expanded, and flexibility of the information verification method is improved.
Optionally, the facial information includes, but is not limited to: shape information of the five sense organs, relative position information of the five sense organs, facial contours, and the like.
Expression information includes, but is not limited to, the extent of stretching of the five sense organs, the relative distance between the five sense organs, and the like. The mouth shape information is used for representing the opening and closing degree of the mouth.
In some embodiments, the first and second visual content are related to the same limb of the target object. For example, if the authentication image includes a hand of the target object, the first screen content and the second screen content are both related to the hand of the target object. For example, the first screen content is palm print information of the target object, and the second screen content is gesture information of the target object. For another example, the first screen content is face information of the target object, and the second screen content is expression information or mouth shape information.
By the method, the identity information of the target object and the first auxiliary verification information are related to only part of limbs of the target object, so that the part of limbs focused on the target object is facilitated to obtain the identity verification image, irrelevant picture contents in the identity verification image are reduced, the duty ratio of effective picture contents (comprising the first picture contents and the second picture contents) in the identity verification image is improved, the accuracy of the identity information and the first auxiliary verification information of the target object determined according to the identity verification image is facilitated, and the calculated amount of a server is reduced.
Meanwhile, the target object only needs to concentrate on controlling part of the limb to respond actions or expressions, which is beneficial to alleviating the operation difficulty of the target object in the information verification process.
In some embodiments, the information to be verified further comprises: voice data of the target object; the server determines the identity information of the target object and the first auxiliary verification information according to the information to be verified, and comprises the following steps: the server identifies the identity verification image and determines the identity information of the target object; the server identifies the voice data and determines first auxiliary verification information.
The voice data of the target object is the authentication audio of the above embodiment.
The server identifies the identity verification image and determines the identity information of the target object, wherein the server determines the identity information of the target object according to the first picture content for the identity verification information. Please refer to the above embodiments, and the description thereof is omitted herein.
In some embodiments, the server identifies the voice data, determines the first auxiliary authentication information, and includes: the server identifies semantic information in the voice data, and the server determines first auxiliary verification information according to the text information. In this case, the first auxiliary authentication information may be a special sentence preset by the user, and different sentences correspond to different object groups. The server identifies semantic information from the voice data and determines sentences corresponding to the semantic information from a plurality of preset value sentences. Namely, the sentence corresponding to the semantic information is the first auxiliary verification information.
In this case, the information to be detected includes an authentication image and voice data. The verification terminal needs to shoot an identity verification image in the process of collecting the information to be detected, and records the sound of the target object to obtain voice data.
In the method, auxiliary verification information is determined by recognizing voice data; the flexibility of setting the first auxiliary verification information is improved, the target object is supported to set the auxiliary verification information in a personalized mode, and the flexible setting of the auxiliary verification information is realized. Meanwhile, the number of auxiliary verification information is also expanded, and the number of object groups corresponding to one target object is increased.
In some embodiments, the information to be verified is collected and provided by the verification terminal; after obtaining the information query results of the objects to be verified contained in the first object group, the server further comprises: the server sends information inquiry results to the verification terminal, wherein the information inquiry results comprise at least one of the following: attribute information of each object to be verified contained in the first object group, and verification results of each object to be verified contained in the first object group.
Please refer to the above embodiments for a method for the verification terminal to collect the information to be verified, and detailed description is omitted herein.
In some embodiments, after obtaining the information to be verified, the server determines, according to the information to be verified, identity information of the target object and first auxiliary verification information, and the server determines a first object group corresponding to the first auxiliary verification information. The server acquires attribute information of each object to be verified contained in the first object group. And the server respectively verifies the attribute information of each object to be verified, and generates an information inquiry result based on the verification result of each object to be verified.
Optionally, the server generates the information query result according to the attribute information of each object to be verified and the verification result of each object to be verified, which are contained in the first object group. And the server sends the information inquiry result to the verification terminal. Alternatively, the information inquiry result containing the authentication result of the object to be authenticated is referred to as authentication result information.
The verification result of each object to be verified comprises at least one of the following: the verification passes and the verification fails.
Through the method, the server detects all the objects to be verified in the first group at one time, and feeds back verification results corresponding to all the objects to be detected to the verification terminal, so that the speed of information verification of the verification terminal is improved.
In other embodiments, the server generates the information query result according to attribute information of each object to be verified in the first object group. The information inquiry result comprises attribute information of each object to be verified. And the verification terminal receives the information inquiry result sent by the server and displays attribute information of each object to be verified contained in the first group according to the information inquiry result.
By the method, the display efficiency of the attribute information of the object to be verified is improved, the display operation of the attribute information of the object to be verified is simplified, and the information display process is more friendly for the old and children waiting for the object to be verified.
In the following, a method of managing the auxiliary authentication information and the object group is described by several embodiments.
In some embodiments, the information verification method further comprises: the server receives a grouping management request sent by a user terminal, wherein the grouping management request comprises a user account number which is logged in by the user terminal; the method comprises the steps that a server obtains identity information corresponding to a user account and at least one object group bound with the identity information; the server performs a management operation on at least one object group bound with the identity information according to the group management request, the management operation including at least one of: adding object groups and corresponding auxiliary verification information, deleting the object groups and the corresponding auxiliary verification information, inquiring the object groups and the corresponding auxiliary verification information, modifying the auxiliary verification information corresponding to the object groups, and modifying the objects to be verified contained in the object groups.
In some embodiments, the group management request is for requesting editing of at least one object group from the server. Optionally, the packet management request includes: identity information of the user account. The packet management request is initiated by the target object through the user terminal.
In some embodiments, the identity information corresponding to the user account is used to characterize the identity of the target object, and optionally, the identity information corresponding to the user account is a biological ID of the target object, such as a palm ID. In general, the user accounts and the objects of the target application program are in one-to-one correspondence, so that the identity information of the user accounts can refer to the user accounts themselves.
In some embodiments, at least one object group to which the identity information is bound is set by the target object. Optionally, a plurality of object groups are bound in the identity information, and at least one different object to be verified is included in two different object groups.
In some embodiments, the server performs a management operation for the object group according to the group management request. Optionally, if the management operation is adding the object group and the corresponding auxiliary verification information, the server receives the newly added auxiliary verification information and the newly added object group sent by the terminal in the user, and binds the newly added auxiliary verification information and the newly added object group, where the newly added object group includes at least one object to be verified.
Optionally, if the management operation is to delete the object group and the corresponding auxiliary verification information, query the object group and the corresponding auxiliary verification information, modify the auxiliary verification information corresponding to the object group, and modify the object to be verified included in the object group, the group management request includes the identity information of the user account and the object group identifier; wherein the object group identification is used to indicate the object group that needs to be managed.
In some embodiments, the server receives at least one object identifier to be managed sent by the user terminal, and processes the object identifier to be managed according to the object group to be managed; wherein the object to be managed belongs to the object to be verified.
Optionally, the grouping management request includes a user account number, a management type, an object grouping identifier and an object identifier to be managed, which are logged in by the user terminal.
The object group bound to the user account is managed by using the group management request, so that the flexibility of creating, deleting and modifying the object group of the target object is improved.
Next, description will be made of a verification method of attribute information by several embodiments.
In some embodiments, the server verifies attribute information of each object to be verified contained in the first object group, including: the server sends an information acquisition request to an external service, wherein the information acquisition request comprises identification information of each object to be verified, which is contained in a first object group; and receiving attribute information of each object to be verified contained in a first object group sent by an external service, wherein the attribute information comprises an attribute code for representing the target attribute of the object to be verified.
The external service is used for generating or calling attribute information of the object to be verified. In some embodiments, the target attribute refers to an attribute that requires that the object to be authenticated needs to be authenticated. Target attributes include, but are not limited to: traffic attributes, class attributes, etc. Optionally, the traffic attribute is used to characterize the traffic capacity of the object to be verified in at least one venue. The class attribute is used for representing the class to which the object to be verified belongs.
In some embodiments, the attribute code is used to characterize a target attribute of the object to be verified. Alternatively, the attribute code may be implemented as a bar code, a two-dimensional code, a digital code, or the like. For example, the target attribute is a passing attribute of the object to be verified, and the attribute code refers to a passing verification code (such as health code and other epidemic prevention information) of the object to be verified. The attribute code may be referred to as an image code.
The identification information of the object to be verified is used to indicate the identity of the object to be verified, and in some embodiments, the identification information of the object to be verified includes, but is not limited to, at least one of the following: user account number of the object to be verified, mobile phone number of the object to be verified, or identity of the object to be verified, etc.
In some embodiments, the binding relationship between the first auxiliary authentication information and the first object group may be understood as: the first auxiliary verification information is associated with identification information of each object to be verified in the first object group. That is, the server can find the identification information of each object to be verified in the first object group through the first auxiliary verification information.
In some embodiments, the server generates an information acquisition request according to the identification information of each object to be verified, and receives attribute information of each object to be verified, which is included in the first object packet sent by the external service.
The information acquisition request comprises the identification information of each object to be verified contained in the object group, so that the server can acquire the attribute information of each object to be verified, the acquisition speed of the attribute information of the objects to be verified is improved compared with the process of acquiring the attribute information of the objects to be verified one by one, meanwhile, the information interaction times between the server and external services are reduced, and transmission resources are reduced.
The above embodiments describe a method for determining identity information of a target object based on an authentication image. Before this, the server needs to store the identity information of the target object and the feature information related to the target object, and the process will be described in the following by several embodiments.
In some embodiments, the information verification method further comprises: the server recognizes and obtains the characteristic data of the target object based on the identity verification image, and the characteristic data is used as the characteristic data to be matched; if the feature database does not have the feature data matched with the feature data to be matched, generating a graphic code associated with the feature data to be matched; wherein, the feature database stores feature data of at least one registered object; sending the graphic code to a verification terminal for display; receiving an account binding request sent by a user terminal, wherein the account binding request comprises identification information of a graphic code and a user account logged in by the user terminal; and establishing a binding relation between the feature data to be matched and the user account.
In some embodiments, the authentication image is used to provide characteristic information of the target object. Optionally, the authentication image includes a palm image of the target object or includes a face image of the target object.
In some embodiments, the server uses the feature extraction model to identify the authentication image, and obtains feature data of the target object as feature data to be matched.
In some embodiments, the server determines whether there is feature data in the feature database that matches the feature data to be matched. In some embodiments, the feature data to be matched with the feature data to be matched refers to feature data with similarity greater than or equal to a similarity threshold. The similarity threshold is determined according to actual needs, and the present application is not limited herein.
Optionally, if feature data matched with the feature data to be matched exists in the feature database, it is indicated that a binding relationship has been created between the feature of the target object and the user account.
If the feature database does not have the feature data matched with the feature data to be matched, the server needs to bind the feature information to be matched with the user account of the target object. In this case, the server generates a biological ID of the biological information object of the target object, such as a palm ID. In addition, the server also generates a graphic code associated with the feature data to be matched, and sends the graphic code to the verification terminal for display.
The graphic code associated with the feature data to be matched is used for realizing the binding between the feature information to be matched and the user account of the target object. Optionally, the graphic code is a two-dimensional code, and the verification terminal displays the graphic code associated with the feature data to be matched to the target object through the display screen.
The account binding request is used for requesting to correlate the user account of the target object with the feature information to be matched. The account binding request includes identification information of the graphic code and a user account to which the user terminal is logged in. Optionally, the target object uses the user terminal logged in with the user account to scan the image code, generate an account binding request, and send the account binding request to the server.
After receiving the account binding request, the server establishes a binding relation between the feature data to be matched and the user account, and realizes a binding process of the user account of the target object and the feature data to be matched.
In one example, the authentication image includes a palm image of the target object, and the feature data to be matched refers to palm print features to be matched. If the server determines that the palm print database does not have the palm print features matched with the palm print features to be matched, the server generates a palm ID corresponding to the palm print features to be matched, and stores the palm print features to be matched in the palm print database.
The server generates a graphic code associated with the palm print feature to be matched, the graphic code is displayed to a target object through the verification terminal, the target object scans the graphic code by using a user account in the user terminal, an account binding request is generated, and the server establishes a binding relationship between the palm print feature to be matched and the user account based on the account binding request. For example, the server establishes a binding relationship between the palm ID and the user account.
Alternatively, the server may obtain two authentication images, where the two authentication images include the left palm of the target object and the right palm of the target object, respectively. The server generates the left palm ID and the right palm ID according to the method of the above embodiment, and establishes a binding relationship between the left palm ID and the user account, and establishes a binding relationship between the right palm ID and the user account, so that one user account binds two palm IDs (the left palm ID and the right palm ID), which is helpful for increasing the number of auxiliary authentication information (the same gesture in the left palm and the right palm belongs to two auxiliary authentication information).
And through the image code, the binding between the user account and the feature data to be matched is realized, and the binding method between the user account and the feature information to be matched is simplified. After the graphic code is generated, the target object is required to send an account binding request through the user terminal scanning the graphic code, so that unnecessary binding caused by the false touch of the target object is avoided.
Fig. 4 is a schematic diagram of an information verification process provided by an exemplary embodiment of the present application.
Taking the palm of the target object as an example in the authentication information, the flow of the information authentication method is described.
The information verification process provided by the application mainly comprises the following processes.
1. The opening process comprises the following steps: the target object needs to conduct opening behavior in the verification device, and binding of identity information including a user account and the palm of the target object is established. For example, the verification terminal captures an image of the palm of the target object.
After the verification device collects the palm image, the palm image is sent to the server. The server generates a palm ID uniquely associated with the palm and a unique two-dimensional code associated with the palm ID.
And the verification terminal displays the unique two-dimensional code associated with the palm ID to the target object.
The target object uses a user terminal of a user account to scan the two-dimension code by logging in, and the user account of the target object is obtained through the target application program. The user terminal sends an account binding request to the server, and the server associates the palm ID with the user account.
The target object can record two palms together at this stage, and finally one can be OPENID, and the two palms can be associated.
2. Binding process: after the target object is successfully input into the palm, the target object can perform management operation of object grouping and binding operation of the object grouping and auxiliary verification information in the target application program.
The target object may apply for authorization of the object to be verified through the target application.
After the object to be verified is authorized, the target object can pull the attribute information (such as health code) of the object to be verified.
The target object can be bound by selecting the left palm or the right palm, and can also be bound together. Meanwhile, the gesture recognition component can be pulled, for example, after the target object selects the right palm and the OK gesture, the object to be verified can be added into a certain object group, different palms and combinations of different palms represent different groups, and the target object can be managed by itself.
The following describes the implementation of the information verification method in the nucleic acid testing process by an embodiment.
For any one target object in a member group, such as a household, a floor or floors of a residential building, or a work group. The target object can complete the binding process of the target object and the user account through the verification terminal. Specifically, the present invention relates to a method for manufacturing a semiconductor device. The verification terminal shoots a palm image of a target object (serving as an identity verification image), the server acquires the palm image, and palm print characteristics in the palm verification image are extracted and stored. The server generates a graphic code which is associated with the palm ID corresponding to the palm print characteristics and is associated with the palm ID. The verification terminal receives and displays the graphic code associated with the palm ID, and the target object uses the user terminal logged in with the user account to scan the graphic code to generate an account binding request.
The server receives an account binding request sent by the user terminal, and establishes a binding relationship between the palm ID and the user account. The target object sends a grouping binding request to the user account of at least one candidate verification object through a social relation chain (such as a friend list) in the user account, and a user terminal of the candidate verification object sends binding permission information to a user terminal of the target object, wherein the binding permission information is used for representing attribute information of the permission target object to call or verify the candidate verification object in an information verification process.
After receiving the binding permission information, the user terminal of the target object takes the candidate verification object as the candidate verification object. Optionally, the target object inputs or selects auxiliary authentication information through the user terminal device, and selects at least one candidate authentication object, and constitutes an object group. The user terminal associates the object group with the auxiliary authentication information. For example, the target object selects an "OK" gesture as the auxiliary verification information, and associates the "OK" gesture with the first object group.
In the process, the user terminal generates a base group management request, wherein the group management request comprises a user account number logged in by the user terminal, gesture information and identification information of each object to be verified in the first object group.
And the server receives the grouping management request and associates the gesture information with the identification information of each object to be verified.
In performing the nucleic acid verification, the target object and each object to be verified in the first group of objects are adjacent in the queuing team. The target object makes an OK gesture to the verification terminal, and the verification terminal collects an identity verification image of the target object and sends the identity verification image waiting verification information to the server.
The server acquires the nucleic acid verification graphic codes of all verification objects in the first group according to the information to be verified, and generates an information query result carrying the nucleic acid verification graphic codes of all verification objects in the first group. And the server sends the information inquiry result to the verification terminal. Optionally, the information inquiry result further comprises a nucleic acid inspection image code of the target object.
The nucleic acid test pattern code is used for establishing association between the object for performing accounting detection and the nucleic acid detection result.
The verification terminal displays the nucleic acid verification graphic codes of the verification objects in the first group through a display screen. The worker who entered the nucleic acid detecting code scans the nucleic acid detecting pattern code displayed in the verification terminal using the information collecting apparatus.
By the method, one person brushes the palm, the verification terminal automatically displays the nucleic acid verification graphic codes of all the objects to be verified in the member group, and the nucleic acid verification graphic codes are not required to be sequentially presented by all the objects to be verified in the member group, so that the efficiency in the nucleic acid detection process is improved.
In this embodiment, only the target object is used to brush the palm as an example, and the information verification method is described. In practice, the target object performs a face brushing process or performs an information verification process in the form of input voice, etc., and specific reference is made to the combination of the above embodiments, which is not described herein.
Fig. 5 is a flowchart of an information verification method provided in another exemplary embodiment of the present application. The subject of the method may be, for example, a verification terminal as described in fig. 1. As shown in fig. 5, the method may include the following steps (510-530):
step 510, collecting information to be verified including an authentication image of a target object.
Step 520, the information to be verified is sent to a server, where the information to be verified is used to determine identity information and first auxiliary verification information of the target object; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified.
Step 530, receiving verification result information sent by the server, where the verification result information includes at least one of the following: attribute information of each object to be verified contained in a first object group, wherein the first object group contains verification results of each object to be verified; the first object group is an object group corresponding to the first auxiliary verification information, which is determined from at least one object group bound by the identity information according to the first auxiliary verification information, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
In summary, the binding relationship between the at least one auxiliary verification information and the object group is stored in the server, and the server processes the information to be verified to obtain the auxiliary verification information, so that the target object group can be determined from the at least one object group. The server can then obtain information query results containing the respective objects to be verified in the first object group. By the method, the object to be verified does not need to rely on the user terminal to show the attribute information, and the operation requirement of the object to be verified in the information verification process is simplified. Meanwhile, through the information to be verified related to the target object, the information related to at least one object to be verified can be obtained at one time, and the information obtaining efficiency is improved.
In some embodiments, the identity information of the target object is determined based on a first image content contained in the authentication image, the first auxiliary authentication information is determined based on a second image content contained in the authentication image, the first image content and the second image content being different.
In some embodiments, the first image content is palm print information and the second image content is gesture information or left-right palm information; or the first image content is facial information, and the second image content is expression information or mouth shape information.
In some embodiments, the information to be verified further comprises: voice data of the target object; the information verification method further comprises the following steps: the verification terminal collects voice data of a target object; wherein the identity information of the target object is determined based on the authentication image and the first auxiliary authentication information is determined based on the voice data.
In some embodiments, the information verification method further comprises: the verification terminal receives the graphic code sent by the server, wherein the graphic code is generated and associated with the feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in the feature database; the feature data to be matched are feature data of a target object obtained based on identification of the identity verification image, and feature data of at least one registered object are stored in a feature database; the verification terminal displays a graphic code, the graphic code is used for being scanned by the user terminal to send an account binding request to the server, the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
For parts not described in detail in this embodiment, please refer to the server-side embodiment.
Fig. 6 is a flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by the user terminal described in fig. 1, for example. As shown in fig. 6, the method may include the following steps (610-640):
step 610, an information setting interface is displayed.
Step 620, in response to the operation of the information setting interface, displaying at least one object group bound with the identity information of the target object; the identity information is used for uniquely identifying the identity of the target object, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
Step 630, displaying first auxiliary verification information set for a first object group in the at least one object group, where the first auxiliary verification information is used for determining an object to be verified that needs to be verified.
Step 640, sending an information setting request to a server, where the information setting request is used to request to establish a correspondence between the first object group and the first auxiliary authentication information.
In summary, the binding relationship between the at least one auxiliary verification information and the object group is stored in the server, and the server processes the information to be verified to obtain the auxiliary verification information, so that the target object group can be determined from the at least one object group. The server can then obtain information query results containing the respective objects to be verified in the first object group. By the method, the object to be verified does not need to rely on the user terminal to show the attribute information, and the operation requirement of the object to be verified in the information verification process is simplified. Meanwhile, through the information to be verified related to the target object, the information related to at least one object to be verified can be obtained at one time, and the information obtaining efficiency is improved. In some embodiments, the information verification method further comprises: the user terminal scans the graphic code displayed by the verification terminal, the graphic code is generated in association with the feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in a feature database, the feature data to be matched is the feature data of the target object obtained based on the identification verification image related to the target object, and the feature data of at least one registered object is stored in the feature database; the user terminal sends an account binding request to the server, wherein the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
In some embodiments, the information verification method further comprises: a user terminal sends a packet management request to the server, wherein the packet management request is used for requesting to execute a management operation on at least one object packet bound with the identity information, and the management operation comprises at least one of the following steps: adding object groups and corresponding auxiliary verification information, deleting the object groups and the corresponding auxiliary verification information, inquiring the object groups and the corresponding auxiliary verification information, modifying the auxiliary verification information corresponding to the object groups, and modifying the objects to be verified contained in the object groups.
In some embodiments, the information verification method further comprises: the user terminal respectively sends a packet binding request to at least one other user terminal; the grouping binding request is used for requesting to add a candidate verification object to at least one object grouping, and the other user terminals log in the user accounts of the candidate verification objects; receiving binding permission information sent by other user terminals; wherein the binding permission information is used to characterize that the candidate verification object agrees to be an object to be bound in at least one of the object groups.
For parts not described in detail in this embodiment, please refer to the server-side embodiment.
Fig. 7 is a schematic diagram of an information verification method according to an exemplary embodiment of the present application.
The user terminal runs a target application program, and the kernel core of the target application program comprises a palm identification module, a palm registration module, a passing module and the like.
In the palm acquisition and recognition process, a target application program calls a 3D camera in the verification terminal to acquire current palm streaming media data (comprising a plurality of palm images) of a user. After the streaming media is acquired, the verification terminal performs optimization on the streaming media.
Preferably, the method comprises comprehensively evaluating and selecting the optimal palm image according to the index of coefficients such as palm size, angle, image contrast, brightness and definition of the image and the like. And then, the image is sent to a server for palm recognition, and if the recognition is unsuccessful, namely the user is a new user, the palm registration module is called after the image is uploaded, and the two-dimensional code uniquely associated with the palm ID is displayed.
The passing module is mainly used for pulling the relevant health codes of the user and the associated authorized friends to display after the palm is successfully identified. If the friend related health code is abnormal, the friend related health code can be subjected to lamplight or sound related reminding.
The user terminal (such as a user mobile phone) runs a target application program, and the target application program carries a login module, a relationship chain module, an applet module, a gesture selection module and the like.
When the user mobile phone terminal logs in the target application program, the target application program has a user WeChat login state, and can carry out information chat or message forwarding, opening related small programs and the like through the relation chain module.
After opening the authorization program in the target application program, the user can forward the grouping binding request to relevant friends, and the friends receive the grouping binding request and authorize the grouping binding request. While the user can manage the authorized or grouped by the management module.
The user may select the entered palms for grouping, or in combination with a gesture library. The gesture library is an OK gesture, a YE gesture, a CHECK gesture, a FIST gesture, and the like.
The server core comprises cloud palm recognition and gesture recognition services, basic services of target application programs, target application program services, user account authorization management services and external services (such as health code acquisition or health code verification).
The palm recognition and gesture recognition service is used for extracting features of the current image after receiving the palm image uploaded by the verification terminal, comparing the features with features in the database, finding out feature data with highest score, and comparing the related palm data with the palm of the back-end database. The successful comparison can be matched with the user account number of the user, and the user account number is related to the invention, namely, the information of OPENID is returned after the user identity is successfully matched.
The gesture recognition can be static gesture recognition, and a template matching method neural network method is adopted. The gesture is recognized by comparing a sequence of static gesture images with a sequence of known gesture templates.
User account authorization management service: the authorization-related information is recorded in the service, and the user can add authorization, delete authorization, modify association, query association and the like through the applet.
The external health code service refers to an externally provided health code inquiry service interface.
The following are examples of the apparatus of the present application that may be used to perform the method embodiments of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the method of the present application.
Fig. 8 shows a block diagram of an information authentication apparatus provided by an exemplary embodiment of the present application. The apparatus may be implemented as all or part of a server by software, hardware, or a combination of both. The apparatus 800 may include: an information acquisition module 810, an information determination module 820, a packet determination module 830, and an information query module 840.
The information acquisition module 810 is configured to acquire information to be authenticated including an authentication image of a target object.
An information determining module 820, configured to determine, according to the information to be verified, identity information of the target object and first auxiliary verification information; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified.
A grouping determining module 830, configured to determine, according to the first auxiliary authentication information, a first object group corresponding to the first auxiliary authentication information from at least one object group bound by the identity information; wherein, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
And the information query module 840 is configured to obtain information query results of each object to be verified included in the first object group.
In some embodiments, the information determination module 820 is configured to identify first image content and second image content contained in the authentication image, the first image content and the second image content being different; a first determining unit, configured to determine identity information of the target object according to the first image content; and the second determining unit is used for determining the first auxiliary verification information according to the second image content.
In some embodiments, the first image content is palm print information and the second image content is gesture information or left-right palm information; or, the first image content is facial information, and the second image content is expression information or mouth shape information.
In some embodiments, the information to be verified further comprises: voice data of the target object; the information determining module 820 is configured to identify the authentication image and determine identity information of the target object; and recognizing the voice data and determining the first auxiliary verification information.
In some embodiments, the information to be verified is collected and provided by a verification terminal; the apparatus 800 further comprises: the result sending module is used for sending verification result information to the verification terminal, wherein the verification result information comprises at least one of the following components: attribute information of each object to be verified contained in the first object group, and verification results of each object to be verified contained in the first object group.
In some embodiments, the apparatus 800 further comprises: the system comprises a packet management module, a user terminal and a user terminal, wherein the packet management module is used for receiving a packet management request sent by the user terminal, and the packet management request comprises a user account logged in by the user terminal; acquiring identity information corresponding to the user account and at least one object group bound with the identity information; performing a management operation on at least one object group bound to the identity information according to the group management request, the management operation including at least one of: adding object groups and corresponding auxiliary verification information, deleting the object groups and the corresponding auxiliary verification information, inquiring the object groups and the corresponding auxiliary verification information, modifying the auxiliary verification information corresponding to the object groups, and modifying the objects to be verified contained in the object groups.
In some embodiments, the information query module 840 is configured to send an information acquisition request to an external service, where the information acquisition request includes identification information of each object to be verified included in the first object packet; receiving the information inquiry result sent by the external service; the information query result comprises attribute information of each object to be verified contained in the first object group, and the attribute information comprises an attribute code used for representing the target attribute of the object to be verified.
In some embodiments, the apparatus 800 further comprises: the binding establishment module is used for identifying and obtaining the characteristic data of the target object based on the identity verification image, and taking the characteristic data as the characteristic data to be matched; if the feature data matched with the feature data to be matched does not exist in the feature database, generating a graphic code associated with the feature data to be matched; wherein, the feature database stores feature data of at least one registered object; the graphic code is sent to a verification terminal for display; receiving an account binding request sent by a user terminal, wherein the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal; and establishing a binding relation between the feature data to be matched and the user account.
Fig. 9 shows a block diagram of an information authentication apparatus provided by another exemplary embodiment of the present application. The apparatus may be implemented as all or part of an information verification device by software, hardware, or a combination of both. The apparatus 900 may include: an information acquisition module 910, an information transmission module 920, and a result reception module 930.
The information acquisition module 910 is configured to acquire information to be authenticated including an authentication image of a target object.
The information sending module 920 is configured to send the information to be verified to a server, where the information to be verified is used to determine identity information of the target object and first auxiliary verification information; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified.
The result receiving module 930 is configured to receive an information query result sent by the server, where the information query result includes at least one of the following: attribute information of each object to be verified contained in a first object group, wherein the first object group contains verification results of each object to be verified; the first object group is an object group corresponding to the first auxiliary verification information, which is determined from at least one object group bound by the identity information according to the first auxiliary verification information, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
In some embodiments, the apparatus 900 further comprises: the graphic code display module is used for receiving the graphic code sent by the server, and the graphic code is generated and associated with the feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in the feature database; the feature data to be matched are feature data of the target object obtained based on the identification of the identity verification image, and feature data of at least one registered object are stored in a feature database; displaying the graphic code, wherein the graphic code is used for being scanned by a user terminal so as to send an account binding request to the server, the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
Fig. 10 shows a block diagram of an information authentication apparatus provided by another exemplary embodiment of the present application. The apparatus may be implemented as all or part of a user terminal by software, hardware or a combination of both. The apparatus 1000 may include: an information display module 1010, an information binding module 1020, a verification display module 1030, and a request transmission module 1040.
And an information display module 1010 for displaying an information setting interface.
An information binding module 1020 for displaying at least one object group bound with identity information of a target object in response to an operation for the information setting interface; the identity information is used for uniquely identifying the identity of the target object, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
The verification display module 1030 is configured to display first auxiliary verification information set for a first object group in the at least one object group, where the first auxiliary verification information is used to determine an object to be verified that needs to be verified.
A request sending module 1040, configured to send an information setting request to a server, where the information setting request is used to request to establish a correspondence between the first object group and the first auxiliary authentication information.
In some embodiments, the apparatus 1000 further comprises: the information binding module is used for scanning a graphic code displayed by the verification terminal, the graphic code is generated in association with feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in a feature database, the feature data to be matched is the feature data of a target object obtained based on identification verification image recognition related to the target object, and the feature data of at least one registered object is stored in the feature database;
And sending an account binding request to the server, wherein the account binding request comprises identification information of the graphic code and a user account logged in by a user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
In some embodiments, the apparatus further comprises: a request binding module, configured to send packet binding requests to at least one other user terminal respectively; the grouping binding request is used for requesting to add a candidate verification object to at least one object grouping, and the other user terminals log in the user accounts of the candidate verification objects; receiving binding permission information sent by the other user terminals; wherein the binding permission information is used to characterize that the candidate verification object agrees to be an object to be bound in at least one of the object groups.
It should be noted that, in the apparatus provided in the foregoing embodiment, when implementing the functions thereof, only the division of the foregoing functional modules is used as an example, in practical application, the foregoing functional allocation may be implemented by different functional modules, that is, the content structure of the device is divided into different functional modules, so as to implement all or part of the functions described above. In addition, the apparatus and the method embodiments provided in the foregoing embodiments belong to the same concept, and specific implementation processes of the apparatus and the method embodiments are detailed in the method embodiments and are not repeated herein. The beneficial effects of the device provided in the foregoing embodiments are described with reference to the method side embodiments, and are not repeated herein.
Fig. 11 is a block diagram illustrating a structure of an electronic device according to an exemplary embodiment of the present application. The information verification device 1100 may be any of the above-described electronic devices, and may be a server, a verification terminal, or a user terminal.
Generally, the electronic device 1100 includes: a processor 1101 and a memory 1102.
The processor 1101 may include one or more processing cores, such as a 4-core processor, an 11-core processor, and the like. The processor 1101 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 1101 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 1101 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen. In some embodiments, the processor 1101 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
Memory 1102 may include one or more computer-readable storage media, which may be tangible and non-transitory. Memory 1102 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1102 stores at least one instruction, at least one program, code set, or instruction set that is loaded and executed by processor 1101 to implement the information verification method provided by the method embodiments described above.
The embodiments of the present application also provide a computer-readable storage medium having stored therein a computer program that is loaded and executed by a processor to implement the information verification method provided by the above-described method embodiments.
The computer readable medium may include computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash Memory or other solid state Memory technology, CD-ROM, DVD (Digital Video Disc, high density digital video disc) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will recognize that the computer storage medium is not limited to the ones described above.
Embodiments of the present application also provide a computer program product, which includes a computer program stored in a computer-readable storage medium, from which a processor reads and executes the computer program to implement the information verification method provided in the above-mentioned method embodiments.
According to an aspect of an embodiment of the present application, there is provided an information verification system including a server, a verification terminal, and a user terminal. The server is used for executing the information verification method of the server side in the embodiment of the application, the verification terminal is used for executing the information verification method of the verification terminal side in the embodiment of the application, and the user terminal is used for executing the information verification method of the user terminal side in the embodiment of the application.
It should be understood that references herein to "a plurality" are to two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
It should be noted that, the information (including but not limited to identity information, palm information, facial information), data and signals related to the present application are all authorized by the user or fully authorized by the parties, and the collection, use and processing of the related data is required to comply with the relevant laws and regulations and standards of the relevant countries and regions. For example, the palm print information, face information, and the like referred to in the present application are acquired with sufficient authorization.
The foregoing description of the preferred embodiments of the application is not intended to limit the application to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and principles of the application are intended to be included within the scope of the application.

Claims (15)

1. An information verification method, the method comprising:
acquiring information to be verified, including an identity verification image of a target object;
according to the information to be verified, determining the identity information of the target object and first auxiliary verification information; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified;
Determining a first object group corresponding to the first auxiliary verification information from at least one object group bound with the identity information according to the first auxiliary verification information; wherein, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified;
and acquiring information query results of all objects to be verified contained in the first object group.
2. The method according to claim 1, wherein determining the identity information of the target object and the first auxiliary authentication information according to the information to be authenticated comprises:
identifying first image content and second image content contained in the authentication image, the first image content and the second image content being different;
determining identity information of the target object according to the first image content;
and determining the first auxiliary verification information according to the second image content.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the first image content is palm print information, and the second image content is gesture information or left-right palm information;
or,
the first image content is facial information, and the second image content is expression information or mouth shape information.
4. The method of claim 1, wherein the information to be verified further comprises: voice data of the target object;
the step of determining the identity information of the target object and the first auxiliary verification information according to the information to be verified comprises the following steps:
identifying the identity verification image and determining the identity information of the target object;
and recognizing the voice data and determining the first auxiliary verification information.
5. The method according to claim 1, wherein the information to be verified is collected and provided by a verification terminal;
after the information query results of the objects to be verified contained in the first object group are obtained, the method further includes:
sending the information inquiry result to the verification terminal, wherein the information inquiry result comprises at least one of the following steps: attribute information of each object to be verified contained in the first object group, and verification results of each object to be verified contained in the first object group.
6. The method according to claim 1, wherein the method further comprises:
receiving a group management request sent by a user terminal, wherein the group management request comprises a user account logged in by the user terminal;
Acquiring identity information corresponding to the user account and at least one object group bound with the identity information;
performing a management operation on at least one object group bound to the identity information according to the group management request, the management operation including at least one of: adding object groups and corresponding auxiliary verification information, deleting the object groups and the corresponding auxiliary verification information, inquiring the object groups and the corresponding auxiliary verification information, modifying the auxiliary verification information corresponding to the object groups, and modifying the objects to be verified contained in the object groups.
7. The method according to claim 1, wherein the obtaining the information query result of each object to be verified included in the first object group includes:
sending an information acquisition request to an external service, wherein the information acquisition request comprises identification information of each object to be verified contained in the first object group;
receiving the information inquiry result sent by the external service; the information query result comprises attribute information of each object to be verified contained in the first object group, and the attribute information comprises an attribute code for representing the target attribute of the object to be verified.
8. The method according to claim 1, wherein the method further comprises:
based on the identity verification image, recognizing and obtaining characteristic data of the target object as characteristic data to be matched;
if the feature data matched with the feature data to be matched does not exist in the feature database, generating a graphic code associated with the feature data to be matched; wherein, the feature database stores feature data of at least one registered object;
the graphic code is sent to a verification terminal for display;
receiving an account binding request sent by a user terminal, wherein the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal;
and establishing a binding relation between the feature data to be matched and the user account.
9. An information verification method, the method comprising:
collecting information to be verified, including an identity verification image of a target object;
the information to be verified is sent to a server and is used for determining the identity information and the first auxiliary verification information of the target object; the identity information is used for uniquely identifying the identity of the target object, and the first auxiliary verification information is used for determining an object to be verified, which needs to be verified;
Receiving an information inquiry result sent by the server, wherein the information inquiry result comprises at least one of the following steps: attribute information of each object to be verified contained in a first object group, wherein the first object group contains verification results of each object to be verified; the first object group is an object group corresponding to the first auxiliary verification information, which is determined from at least one object group bound by the identity information according to the first auxiliary verification information, different object groups correspond to different auxiliary verification information, and each object group contains at least one object to be verified.
10. The method according to claim 9, wherein the method further comprises:
receiving a graphic code sent by the server, wherein the graphic code is generated and associated with the feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in a feature database; the feature data to be matched are feature data of the target object obtained based on the identification of the identity verification image, and feature data of at least one registered object are stored in a feature database;
Displaying the graphic code, wherein the graphic code is used for being scanned by a user terminal so as to send an account binding request to the server, the account binding request comprises identification information of the graphic code and a user account logged in by the user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
11. An information verification method, the method comprising:
displaying an information setting interface;
displaying at least one object group bound with identity information of a target object in response to an operation of the information setting interface; the identity information is used for uniquely identifying the identity of the target object, different object groups correspond to different auxiliary verification information, and each object group comprises at least one object to be verified;
displaying first auxiliary verification information set for a first object group in the at least one object group, wherein the first auxiliary verification information is used for determining an object to be verified which needs to be verified;
an information setting request is sent to a server, the information setting request being used for requesting establishment of a correspondence between the first object group and the first auxiliary authentication information.
12. The method of claim 11, wherein the method further comprises:
the method comprises the steps of scanning a graphic code displayed by a verification terminal, wherein the graphic code is generated in association with feature data to be matched under the condition that the feature data matched with the feature data to be matched does not exist in a feature database, the feature data to be matched is the feature data of a target object obtained based on identification verification image recognition related to the target object, and the feature data of at least one registered object is stored in the feature database;
and sending an account binding request to the server, wherein the account binding request comprises identification information of the graphic code and a user account logged in by a user terminal, and the account binding request is used for requesting to establish a binding relationship between the feature data to be matched and the user account.
13. The method of claim 11, wherein the method further comprises:
respectively sending a packet binding request to at least one other user terminal; the grouping binding request is used for requesting to add a candidate verification object to at least one object grouping, and the other user terminals log in the user accounts of the candidate verification objects;
Receiving binding permission information sent by the other user terminals; wherein the binding permission information is used to characterize that the candidate verification object agrees to be an object to be bound in at least one of the object groups.
14. An electronic device comprising a processor and a memory, wherein the memory has stored therein a computer program that is loaded and executed by the processor to implement the information authentication method of any one of claims 1 to 8, or the information authentication method of any one of claims 9 to 10, or the information authentication method of any one of claims 11 to 13.
15. A computer-readable storage medium, in which a computer program is stored, the computer program being loaded and executed by a processor to implement the information authentication method according to any one of claims 1 to 8, or the information authentication method according to any one of claims 9 to 10, or the information authentication method according to any one of claims 11 to 13.
CN202211450948.8A 2022-11-18 2022-11-18 Information verification method, device, equipment and storage medium Pending CN117077100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211450948.8A CN117077100A (en) 2022-11-18 2022-11-18 Information verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211450948.8A CN117077100A (en) 2022-11-18 2022-11-18 Information verification method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117077100A true CN117077100A (en) 2023-11-17

Family

ID=88712158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211450948.8A Pending CN117077100A (en) 2022-11-18 2022-11-18 Information verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117077100A (en)

Similar Documents

Publication Publication Date Title
CN107066983B (en) Identity verification method and device
CN110414373B (en) Deep learning palm vein recognition system and method based on cloud edge-side cooperative computing
CN106303599B (en) Information processing method, system and server
CN111126980B (en) Virtual article sending method, processing method, device, equipment and medium
CN102985933A (en) Distinguishing live faces from flat surfaces
CN109754329B (en) Electronic resource processing method, terminal, server and storage medium
CN113656761B (en) Business processing method and device based on biological recognition technology and computer equipment
CN112752153A (en) Video playing processing method, intelligent device and storage medium
CN113259140B (en) Cloud conference box rapid conference entering method and system
US20210406353A1 (en) System and method for biometric authentication
CN112188223B (en) Live video playing method, device, equipment and medium
CN117077100A (en) Information verification method, device, equipment and storage medium
CN116468113A (en) Living body detection model training method, living body detection method and living body detection system
CN113055194B (en) Cloud conference box rapid conference entering method, cloud conference box and readable storage medium
WO2022089220A1 (en) Image data processing method and apparatus, device, storage medium, and product
CN115906028A (en) User identity verification method and device and self-service terminal
CN112637148B (en) Method, device, electronic equipment and medium for verifying user
WO2021068485A1 (en) User identity verification method and apparatus for multi-party video, and computer device
CN113496166A (en) Face living body data acquisition method and device
CN117011881A (en) Body state identification method and device, storage medium and electronic equipment
US20230161854A1 (en) Fool-proof registration system and methods thereof
CN117456619A (en) Palm image recognition method, palm image recognition device, palm image recognition apparatus, palm image recognition device, palm image recognition program, and palm image recognition program
CN116258497A (en) Resource transfer method based on interactive operation and related equipment
CN115828205A (en) Business resource sharing method and device, electronic equipment and storage medium
CN116957114A (en) Method and device for reserving verification and verification, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination