WO2017096921A1 - 一种通过社交关系进行身份验证的方法 - Google Patents

一种通过社交关系进行身份验证的方法 Download PDF

Info

Publication number
WO2017096921A1
WO2017096921A1 PCT/CN2016/092305 CN2016092305W WO2017096921A1 WO 2017096921 A1 WO2017096921 A1 WO 2017096921A1 CN 2016092305 W CN2016092305 W CN 2016092305W WO 2017096921 A1 WO2017096921 A1 WO 2017096921A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
friend
account
photo
social relationship
Prior art date
Application number
PCT/CN2016/092305
Other languages
English (en)
French (fr)
Inventor
吴文亮
张永
梁添才
龚文川
刘道余
Original Assignee
广州广电运通金融电子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州广电运通金融电子股份有限公司 filed Critical 广州广电运通金融电子股份有限公司
Publication of WO2017096921A1 publication Critical patent/WO2017096921A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Definitions

  • the present invention relates to the field of identity verification technologies, and in particular, to a method for authenticating through a social relationship.
  • the authentication technology of user accounts is indispensable. For example, account password verification, face recognition verification, fingerprint identification verification, etc.
  • these authentication technologies have the possibility of copying and fraudulating, which makes the user account have security risks. Therefore, finding a new authentication method to further improve the security of the user account has become an urgent problem to be solved by those skilled in the art.
  • the embodiment of the invention provides a method for authenticating through a social relationship, which can solve the problem of insufficient security of an existing user account.
  • the user social relationship database obtains more than one friend photo of different friend accounts that have been bound to the user account, and the user social relationship database includes the user account and the friend account. Binding relationship
  • binding relationship between the user account and the friend account in the user social relationship database is:
  • the corresponding account is a friend account, and a binding relationship between the user account and the friend account is established.
  • the displaying the corresponding account of the potential friend to the user selection specifically includes:
  • the potential friend photo is displayed on the operation interface for the user to select.
  • binding relationship between the user account and the friend account is also from:
  • the feedback binding request accepts information to the corresponding account of the potential friend to establish a binding relationship between the user account and the corresponding account of the potential friend;
  • the friend binding request is sent to the corresponding account of the new potential friend
  • the corresponding account is a friend account, and a binding relationship between the user account and the friend account is established.
  • the method further includes:
  • obtaining, by the user social relationship database, the photo of the friend of the different friend accounts that have been bound to the social relationship of the user account includes:
  • a queue order of the initial circular queue of the friend account in the user social relationship database is determined by a binding order of the friend account and the user account.
  • the verification pass includes:
  • the photo selection result is all the acquired buddy photos and the number of photos of the photo selection result is less than a preset threshold, one or more of the acquired buddy photos are acquired and displayed on the operation interface.
  • the obtaining, by the user social relationship database, the photo of the friend of the different friend accounts that have been bound to the social relationship of the user account includes:
  • the photo of the stranger who obtains one or more unfamiliar accounts that are not bound to the user account and has a social relationship includes:
  • the current user is first subjected to face recognition verification. If the face recognition verification result is passed, performing one or more user accounts through the user social relationship database is performed. The step of binding a friend photo of a different friend account of a social relationship.
  • the buddy photo of the different buddy accounts that have been bound to the social relationship of the user account is obtained through the user social relationship database, where the user social relationship database includes the a binding relationship between the user account and the friend account; then, obtaining a photo of the stranger of one or more unfamiliar accounts that are not bound to the user account; the obtained friend photo and the stranger photo
  • the out-of-order display is displayed on the operation interface for the user to select; then, the photo selection result of the user on the operation interface is obtained; finally, if the photo selection result is all the acquired photo of the friend, the verification is passed.
  • the identity of the current user can be confirmed by verifying the social relationship of the user account, thereby further improving the security of the user account.
  • FIG. 1 is a flowchart of an embodiment of a method for performing identity verification by a social relationship according to an embodiment of the present invention
  • FIG. 2 is a flowchart of another embodiment of a method for performing identity verification by a social relationship according to an embodiment of the present invention.
  • the embodiment of the invention provides a method for authenticating an identity through a social relationship, which is used to solve the problem of insufficient security of an existing user account.
  • an embodiment of a method for performing identity verification by using a social relationship in an embodiment of the present invention includes:
  • the user social relationship database obtains more than one friend photo of the different friend account that has been bound to the user account, and the user social relationship database includes the user account and the friend account. Binding relationship.
  • one or more stranger photos of an unfamiliar account that is not bound to the user account may be acquired.
  • the obtained photo of the friend and the photo of the stranger may be displayed in an operation interface on the operation interface for the user to select.
  • the photo selection result of the user on the operation interface may be obtained.
  • the verification is passed.
  • the user social relationship database obtains more than one friend photo of the different friend account that has been bound to the social relationship of the user account, and the user social relationship database includes the user account and the user account. a binding relationship between the buddy accounts; then, obtaining a photo of the stranger of the unfamiliar account that is not bound to the social relationship of the user account; displaying the obtained photo of the buddy and the photo of the stranger in an out-of-order manner
  • the interface is for the user to select; then, the user selects the photo selection result on the operation interface; finally, if the photo is taken
  • the result of the slice selection is all the photos of the friend that have been obtained, and the verification is passed.
  • the identity of the current user can be confirmed by verifying the social relationship of the user account, thereby further improving the security of the user account.
  • FIG. 2 is a social interaction in the embodiment of the present invention.
  • the current user can be authenticated by face recognition. It can be understood that in order to improve the security of the user account, face recognition verification and social relationship verification can be used together to reduce the account risk as much as possible.
  • the standard facial feature data is reserved when the user account is registered, that is, when the user account is registered, the facial feature data of the user who registered the account has been pre-stored as the standard facial feature. data.
  • the face recognition verification result is a pass, obtain a preset number of active friend accounts in the user social relationship database in a circular queue manner;
  • a preset number of active friend accounts in the user social relationship database may be obtained in a circular queue manner.
  • the buddy account is obtained in the form of a circular queue.
  • the order of obtaining the buddy account is: each buddy account is initially set with a queue order, for example, by setting a priority value for each buddy account as a sequence. value. If the priority value of the friend account with the priority value is 1, the friend account with the priority value of 2 is ranked second... the friend account with the priority value of n is ranked with the priority value of n+1. In front of the friend account, the smaller the priority value, the higher the order. When the top friend account is obtained, the friend account will automatically go to the last position of the queue.
  • a friend account with a priority value of 1 is obtained for social relationship verification. After the verification is completed, the friend is authenticated.
  • the priority value of the account is set to a maximum value, the friend account is adjusted from the first position to the last position, and the positions of other bound friend accounts are moved forward by one bit (ie, the priority values are all decreased by one).
  • the queue order of the initial circular queue of the friend account in the user social relationship database may be determined by the binding order of the friend account and the user account, that is, the first bound friend account is arranged in the circular queue.
  • the front and back bound friend accounts are queued behind the circular queue.
  • the user social relationship database includes a binding relationship between the user account and the friend account, where the binding relationship between the user account and the friend account in the user social relationship database may be from the following the way:
  • the corresponding account is a friend account, and a binding relationship between the user account and the friend account is established;
  • displaying the corresponding account of the potential friend to the user selection may specifically include: a. extracting a potential friend photo of the corresponding account of the potential friend; b. displaying the potential friend photo on the operation interface for the user to select.
  • the feedback binding request accepts information to the corresponding account of the potential friend to establish a binding relationship between the user account and the corresponding account of the potential friend, and at this time, between the user account and the corresponding account of the potential friend Belongs to two-way binding.
  • the new potential friend is The corresponding account sends a friend binding request
  • the corresponding account is a friend account, and a binding relationship between the user account and the friend account is established.
  • the user account may be bound to the user account itself, and the user account is bound to itself.
  • a friend account of the social relationship when the number of friend accounts in the user social relationship database that have been bound to the user account has a social relationship greater than 0, the binding relationship between the user account and the user account itself may be released.
  • the status of the friend account is set by the user, including an active state and an inactive state.
  • the active friend account is an account approved by the user for participating in social verification, and the inactive friend account may be Since the avatar is not real or for other reasons, it is considered by the user to be unavailable for social verification, and the activation status and the inactive status of the buddy account can be manually changed by the user.
  • the “preset number” may be one or two or more, or “the preset number” may also be “random number”, and the number of friend accounts is pre- A random algorithm is set to determine the uncertainty in user authentication.
  • the acquired friend photos of the friend accounts may be extracted.
  • one or more unfamiliar accounts that are not bound to the user account's social relationship, or a buddy account that has been socially associated with the user account but is inactive may be acquired.
  • the photo as a photo of a stranger.
  • the unfamiliar account refers to an account that has no social relationship with the user account, and the corresponding stranger photo can be used as an "interference option" for verifying the user.
  • the obtained photo of the friend may be obtained.
  • the film and the stranger's photo are displayed in the operation interface for the user to select. It can be understood that, after the out-of-order, if the user is a legitimate user, the user must know the photo of the friend of the friend account that is bound to the user account, so that the friend photo can be selected from the out-of-order photos; otherwise, The user is considered to be an illegal user.
  • the photo selection result of the user on the operation interface can be obtained.
  • step 207 determining whether the photo selection result is all the acquired friend photos and the number of photos of the photo selection result is less than a preset threshold, and if so, executing step 208, and if not, executing step 211;
  • step 208 After obtaining the photo selection result of the user on the operation interface, it may be determined whether the photo selection result is all the acquired buddy photos and the number of photos of the photo selection result is less than a preset threshold, and if yes, step 208 is performed. Otherwise, step 211 is performed.
  • the user may be required to input one or more of the user names or aliases of the friend accounts corresponding to the friend photos, thereby further confirming whether the user is legal. user.
  • the photo selection result is all the acquired friend photos and the number of photos of the photo selection result is less than a preset threshold, one or more of the friend photos are obtained and displayed on the operation interface for the user to input the corresponding friend account.
  • Username or alias Username or alias.
  • the user name or alias entered by the user can be obtained.
  • the verification is passed, and if not, the verification is passed.
  • the number of photos of the photo selection result is not less than a preset threshold, it can be considered that the result of the photo selection is valid for verification. For example, if the preset threshold is 3, if the number of photos of the photo selection result is greater than 3, that is, the acquired photo of the friend participating in the social verification is greater than 3, if the user selects 3 buddy photos, the user identity may be considered. is correct. On the other hand, when the number of photos in the photo selection result is less than 3, because the number is too small, the probability of the illegal user is not low, and the error rate is too high for all the obtained friends photos, and the user is required to input the corresponding photo of the friend among them. Username or alias is guaranteed.
  • the authentication method such as fingerprint verification, iris verification or vein verification can be added freely in combination, thereby enhancing the security of the user account. It can be understood that the more different authentication methods are used for the same user account, the stronger the security is, and the other authentication methods are not described here.
  • the first step is to verify the face. After the face verification is successful, the second step is performed to verify the social relationship bound by the user. After the social relationship is successfully verified, the identity of the user is verified. The verification is successful, otherwise the verification fails.
  • the face image Before the user uses the face verification function, the face image needs to be collected by the camera and the like, and the collected face image is extracted into the face feature data by the feature extraction algorithm, and then the extracted face feature data is saved to the background database.
  • the terminal device including mobile phone, card puncher, ATM, etc.
  • the user can start registration, and the camera of the terminal device image acquisition module first collects the face image. And then transmitting the image to the background server.
  • the face clipping module in the background server first cuts the face image into a face thumbnail that can be used to extract features, and then the feature extraction program performs the incoming face thumbnail.
  • Feature extraction processing generating facial feature data, face clipping program is implemented by ASM method
  • feature extraction program is implemented by LBP algorithm
  • generated face thumbnail and face feature data will be saved to the background database, given The unique ID number, and the user name obtained from the ID card, bank card, QQ number or micro signal will be saved under the ID number. Weighing, ID number, Bank card number, QQ number, micro signal, etc., the cut face thumbnail and face feature data as registration information will be kept in the database, these registration information will be used to compare with the face information to be verified. .
  • the user identity verification system After completing the registration of the user identity information, the user identity verification system immediately invokes the social information registration module, and the social information registration module prompts the user to immediately register the social information (ie, bind the social friend's photo and the user name and alias corresponding to the photo), first
  • the social information registration module will screen potential friends based on their own identity information, including home address, organization and department, graduation school, year and major. If there is a person in the database of registration information that has the same keyword as the user registered, the photo is extracted for the user to confirm. If the user has a social relationship with the other party, the user can click the photo to send a friend binding request to the other party, and the ATM will wait for the machine.
  • the other party may decide to accept or reject the friend binding request in the friend management module interface, and if the other party accepts the binding request, complete the social interaction between the user and the third party.
  • the relationship binding operation the database module will associate the user's own ID number to the face image address of the other party, and at the same time, the friend management software of the friend management module will add the user name, alias and photo registered by the other party to the software UI interface. In the list; if the other party refuses to bind, the friend binding fails.
  • the social relationship verification module selects the bound photo of the friend according to certain rules (such as dynamic ordering by photo priority), and verifies the picture as a social relationship, and then the machine will be in the UI and other users.
  • the interface initiates a social relationship verification request to the user and receives feedback on the verification of the social relationship. If the feedback received by the machine, such as the user name or alias, matches the name of the photo in the system background database, the verification is passed, otherwise the verification fails.
  • Users must bind at least one social relationship, and there is no limit on the number of bindings.
  • the friend management module detects that the number of third-party friends bound by the current user is 0, it automatically binds itself and adds its own image as a friend relationship verification image.
  • the social relationship verification module When verifying the social relationship, the social relationship verification module will use the user's own The photos are extracted for social relationship verification. When the number of bound third-party friends is greater than 0, the binding relationship to itself is automatically released. Later, when there is a new friend registration, you can add more friend relationships through the social relationship management module.
  • the social relationship management software will display the social registration information, and can manage the social relationship information, before entering the social relationship management software, the face verification module And the social information verification module first authenticates the user identity, including verifying the face and verifying the binding social information.
  • the terminal device first asks the user to input the user account or swipe the ID card such as the ID card and the bank card, and then enters the face.
  • the collected images are sent to the background face verification module for verification.
  • the social relationship verification link is entered, and the social relationship verification module is used to verify the social relationship, and more than 3 social relationships are bound. The user will extract 3 social relationships for the user to verify. Only when all the authentication is successful can the social relationship management software be entered.
  • social relationship management software For users with less than 3 social relationships, it is necessary to verify all social relationships to enter the social relationship management software. After entering the social relationship management software, you can find the latest photos of the registered users under the user-specified keywords by viewing the friend relationship interface. These keywords must be keywords in the user's own registration field. If a new friend is found, A friend relationship binding request may be sent to the other party, and each bound friend may separately set to participate in social verification and not participate in social verification. When the bound friend is set to not participate in social verification, the social verification link will not The friend's photo will be extracted to participate in the social relationship verification. In addition, the user can also release the bound friend relationship, and the friend relationship will not be notified when the friend relationship is released.
  • the friend's photo and related information will no longer be displayed in the binding interface of the social relationship management software.
  • User name information When the social relationship is verified, the unbound image of the friend is no longer extracted.
  • Each image that has been bound to a social relationship and can participate in social relationship verification will have a verification priority value.
  • the photo with priority value 1 is ranked first, the photo with priority value 2 is ranked second, and so on.
  • the last photo has the highest priority value.
  • the photo with the priority value of 1 is first extracted for social relationship verification. After the verification is completed, the photo priority value becomes the maximum, and the photo is from the first position. Going to the last position, the other bound photos were previously moved one position and their priority values were decremented by 1. In the beginning, the priority value of the photo is determined by the order in which the photos are bound.
  • the first photo priority value is 1, and the newly bound photo priority value is the largest, and the photo is ranked last.
  • the identity verification can be performed.
  • the image acquisition module collects the face image data through the camera, and then the image acquisition module sends the collected image to the background, and the face clipping module will image.
  • the face is cut, and the face is rotated into an upright face and scaled to a uniform size.
  • the feature extraction module performs face feature extraction on the face thumbnail, and then the face feature extracted by the face verification module. Matching the face features registered in the background.
  • the program After the matching is successful, the program immediately calls the social relationship verification module to verify the solution one:
  • the system first extracts the photo with the priority value of 1 as the photo of the social relationship verification, and then selects 9 photos from the photos that do not belong to the user's binding social relationship, and displays the 10 photos in the UI interface after being out of order.
  • the user In the user, the user needs to click the correct associated photo and enter the user name or alias registered in the photo. Only after the selected photo and the alias are successfully verified, the social relationship is verified to be successful, otherwise the social relationship verification fails.
  • Verification scheme 2 extract an indefinite number of photos x photos from the photos of the bound social relationship, and then randomly extract 10-x photos from the photos not bound with the user ID, and display them in the UI interface, the user needs all the points Bind the photo, and then click to confirm, the social relationship is considered successful, more or less of the photo of the binding social relationship, will verify the failure, the same, all verified photos will be listed behind, unverified The photos will go forward.
  • ID card reading module We use the ID card as an account to perform user login by using face verification and social relationship verification as a password.
  • the face information is registered.
  • the ID card module When the ID card module reads the ID information, it will search in the background database to see if the user has registered face information. If it has been registered, it will directly enter the verification link. If it is not registered, After that, enter the face information registration link.
  • the face image of the ATM machine is first collected, and then the image is transmitted to the background server, and the face feature data is extracted by the face clipping and feature extraction module. After the face feature data is successfully extracted, an index is established by using the ID number as an ID, and the face feature data is placed under the index, and the registered user is required to input information about the user identity through the UI interface, including the birth place and the company name. With departments, graduate schools, etc. After the user identity information is completed, click Confirm to enter the social information registration link.
  • the social relationship registration module binds the user to the initial friend relationship, so that it can be verified when other social relationships are not used, but such security is possible. Sex will be slightly worse.
  • binding a social relationship the system first finds a potential social relationship friend in the system database according to the keyword of the identity related information registered by the user. If there is a friend in the found photo, the user can send a binding social relationship request to the other party. After the other party receives the binding request and agrees, the system will bind the other party's photo to the user's ID.
  • the bound friend photo will have a chance to be Extracted, in the user's social relationship management software interface, you will be able to see your friends' photos and user names and aliases.
  • the user can use the registered information for authentication.
  • the user When performing authentication, the user first needs to put the ID card on the ID card reader module of the ATM machine. After the card reader obtains the ID number of the user, the image capture interface is entered, and after the camera takes a photo of the face, Passing the photo into the background, after receiving the photo in the background, the face clipping and feature extraction module will be activated, and the extracted feature will be compared with the face feature associated with the ID number. After the comparison is successful, the social information will be started.
  • the verification module finds the social photo associated with the ID number by the ID number, extracts the photo with the priority value of 1, and randomly extracts the photos from other registered users, if the extracted photo does not have the ID number of the user For social binding, the photo can be extracted until 9 shots are taken, then 10 photos are displayed together in the ATM display.
  • the user needs to click on the social photo that is bound and enter the correct username. Or an alias, the social verification is successful, otherwise the social verification fails.
  • the user has only one chance to click on the photo. After clicking and entering the name, the photo will disappear in the interface.
  • the face verification and social information verification succeeds, the user logs in to the system to perform the inquiry and withdrawal operation. As long as any verification fails, the system cannot be logged into the system.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. You can choose some of them according to your actual needs. Or all units to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Abstract

一种通过社交关系进行身份验证的方法,用于解决现有用户账户安全性不足的问题。本发明实施例方法包括:当需要进行用户账户的身份验证时,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片,所述用户社会关系数据库包括所述用户账户与好友账户之间的绑定关系;获取一张以上与所述用户账户未绑定社交关系的陌生账户的陌生人照片;将获取到的所述好友照片和所述陌生人照片乱序后显示在操作界面上供用户选择;获取用户在所述操作界面上的照片选择结果;若所述照片选择结果为所有获取到的所述好友照片,则验证通过。

Description

一种通过社交关系进行身份验证的方法
本申请要求于2015年12月09日提交中国专利局、申请号为201510902901.4、发明名称为“一种通过社交关系进行身份验证的方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及身份验证技术领域,尤其涉及一种通过社交关系进行身份验证的方法。
背景技术
随着网络技术的发展和普及,网络社交逐渐成为人们生活中不可或缺的一部分。为此,一个社交软件的用户账户往往连接着该用户的绝大部分社交关系,用户账户已不单单是一个社交软件的登录凭证,更是该用户的人脉资源和财富。因此,用户账户的安全性越来越受到重视。
目前,为保证用户账户的安全性,用户账户的身份验证技术必不可少。例如,账号密码验证、人脸识别验证、指纹识别验证等,然而,这些身份验证技术均存在复制、造假的可能性,使得用户账户存在安全性的隐患。因此,找出一种新的身份验证方法来进一步提升用户账户的安全性成为本领域技术人员亟需解决的问题。
发明内容
本发明实施例提供了一种通过社交关系进行身份验证的方法,能够解决现有用户账户安全性不足的问题。
本发明实施例提供的一种通过社交关系进行身份验证的方法,包括:
当需要进行用户账户的身份验证时,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片,所述用户社会关系数据库包括所述用户账户与好友账户之间的绑定关系;
获取一张以上与所述用户账户未绑定社交关系的陌生账户的陌生人照片;
将获取到的所述好友照片和所述陌生人照片乱序后显示在操作界面上 供用户选择;
获取用户在所述操作界面上的照片选择结果;
若所述照片选择结果为所有获取到的所述好友照片,则验证通过。
可选地,所述用户社会关系数据库中所述用户账户与好友账户之间的绑定关系来自于:
在所述用户账户完成注册之后,获取所述用户账户注册时所用的用户身份信息;
根据所述用户身份信息筛选出用户潜在好友的对应账户;
将所述潜在好友的对应账户展示给用户选择;
向被用户选择的所述潜在好友的对应账户发送好友绑定请求;
若接收到所述潜在好友的对应账户反馈的绑定请求接受信息,则所述对应账户为好友账户,并建立所述用户账户与所述好友账户之间的绑定关系。
可选地,所述将所述潜在好友的对应账户展示给用户选择具体包括:
提取所述潜在好友的对应账户的潜在好友照片;
将所述潜在好友照片显示在操作界面上供用户选择。
可选地,所述用户账户与好友账户之间的绑定关系还来自于:
接收来自潜在好友的对应账户的好友绑定请求;
反馈绑定请求接受信息至所述潜在好友的对应账户,以建立所述用户账户与所述潜在好友的对应账户之间的绑定关系;
或者
当检测到新的潜在好友的对应账户完成注册时,向新的潜在好友的对应账户发送好友绑定请求;
若接收到所述新的潜在好友的对应账户反馈的绑定请求接受信息,则所述对应账户为好友账户,并建立所述用户账户与所述好友账户之间的绑定关系。
可选地,所述方法还包括:
当所述用户社会关系数据库中与用户账户已绑定社交关系的好友账户数目为0时,将所述用户账户与所述用户账户自身建立绑定关系,所述用户账户作为与自身已绑定社交关系的好友账户;
当所述用户社会关系数据库中与用户账户已绑定社交关系的好友账户数目大于0时,解除所述用户账户与所述用户账户自身的绑定关系。
可选地,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片具体包括:
以循环队列的方式获取所述用户社会关系数据库中预设数量个所述好友账户;
提取所述好友账户的好友照片。
可选地,所述好友账户在所述用户社会关系数据库中最初的循环队列的队列顺序由所述好友账户与所述用户账户的绑定顺序决定。
可选地,若所述照片选择结果为所有获取到的所述好友照片,则验证通过具体包括:
若所述照片选择结果为所有获取到的好友照片并且所述照片选择结果的照片数量少于预设阈值,则获取其中的一张以上获取到的所述好友照片并显示在所述操作界面上供用户输入对应的好友账户的用户名或别名;
获取用户输入的用户名或别名,若所述用户名或别名与显示在所述操作界面上的所述好友照片一一对应,则验证通过。
可选地,所述通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片包括:
通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的并且处于激活状态的不同好友账户的好友照片,所述好友账户的状态由用户进行设定,包括激活状态和非激活状态两种;
所述获取一张以上与所述用户账户未绑定社交关系的陌生账户的陌生人照片包括:
获取一张以上与所述用户账户未绑定社交关系的陌生账户,或者与所述用户账户已绑定社交关系但处于非激活状态的好友账户的照片,作为陌生人照片。
可选地,当需要进行用户账户的身份验证时,先对当前用户进行人脸识别验证,若所述人脸识别验证结果为通过,则执行通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片的步骤。
从以上技术方案可以看出,本发明实施例具有以下优点:
本发明实施例中,当需要进行用户账户的身份验证时,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片,所述用户社会关系数据库包括所述用户账户与好友账户之间的绑定关系;然后,获取一张以上与所述用户账户未绑定社交关系的陌生账户的陌生人照片;将获取到的所述好友照片和所述陌生人照片乱序后显示在操作界面上供用户选择;接着,获取用户在所述操作界面上的照片选择结果;最后,若所述照片选择结果为所有获取到的所述好友照片,则验证通过。在本发明实施例中,可以通过验证用户账户的社交关系来确认当前用户的身份,进一步提升了用户账户的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例中一种通过社交关系进行身份验证的方法一个实施例流程图;
图2为本发明实施例中一种通过社交关系进行身份验证的方法另一个实施例流程图。
具体实施方式
本发明实施例提供了一种通过社交关系进行身份验证的方法,用于解决现有用户账户安全性不足的问题。
为使得本发明的发明目的、特征、优点能够更加的明显和易懂,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,下面所描述的实施例仅仅是本发明一部分实施例,而非全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做 出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
请参阅图1,本发明实施例中一种通过社交关系进行身份验证的方法一个实施例包括:
101、当需要进行用户账户的身份验证时,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片;
当需要进行用户账户的身份验证时,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片,该用户社会关系数据库包括该用户账户与好友账户之间的绑定关系。
102、获取一张以上与该用户账户未绑定社交关系的陌生账户的陌生人照片;
在获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片之后或者同时,可以获取一张以上与该用户账户未绑定社交关系的陌生账户的陌生人照片。
103、将获取到的该好友照片和该陌生人照片乱序后显示在操作界面上供用户选择;
在获取到该好友照片和该陌生人照片之后,可以将获取到的该好友照片和该陌生人照片乱序后显示在操作界面上供用户选择。
104、获取用户在该操作界面上的照片选择结果;
在将获取到的该好友照片和该陌生人照片乱序后显示在操作界面上供用户选择之后,可以获取用户在该操作界面上的照片选择结果。
105、若该照片选择结果为所有获取到的该好友照片,则验证通过。
在获取用户在该操作界面上的照片选择结果之后,若该照片选择结果为所有获取到的该好友照片,则验证通过。
本实施例中,当需要进行用户账户的身份验证时,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片,该用户社会关系数据库包括该用户账户与好友账户之间的绑定关系;然后,获取一张以上与该用户账户未绑定社交关系的陌生账户的陌生人照片;将获取到的该好友照片和该陌生人照片乱序后显示在操作界面上供用户选择;接着,获取用户在该操作界面上的照片选择结果;最后,若该照 片选择结果为所有获取到的该好友照片,则验证通过。在本实施例中,可以通过验证用户账户的社交关系来确认当前用户的身份,进一步提升了用户账户的安全性。
为便于理解,下面对本发明实施例中的一种通过社交关系进行身份验
证的方法进行详细描述,请参阅图2,本发明实施例中一种通过社交
关系进行身份验证的方法另一个实施例包括:
201、当需要进行用户账户的身份验证时,对当前用户进行人脸识别验证;
当需要进行用户账户的身份验证时,可以对当前用户进行人脸识别验证。可以理解的是,为提高用户账户的安全性,可以将人脸识别验证和社交关系验证结合起来使用,尽可能地降低账户风险。
其中,本实施例中该人脸识别验证可以包括以下步骤:
A、采集当前用户的人脸图像;
B、在该人脸图像上定位人脸区域,得到只包含该人脸区域的人脸小图;
C、提取该人脸小图的人脸特征数据;
D、对比该人脸特征数据与标准人脸特征数据是否一致,若是,则人脸识别验证结果为通过。
需要注意的是,该标准人脸特征数据由该用户账户注册时预留,也即在该用户账户注册时,已经将注册该账户的用户的人脸特征数据预存下来,作为该标准人脸特征数据。
202、若该人脸识别验证结果为通过,则以循环队列的方式获取该用户社会关系数据库中预设数量个处于激活状态的好友账户;
若该人脸识别验证结果为通过,则可以以循环队列的方式获取该用户社会关系数据库中预设数量个处于激活状态的好友账户。可以理解的是,以循环队列的方式获取好友账户,可以认为,该好友账户的获取顺序为:每个好友账户最初均设置有队列顺序,比如可以通过为每个好友账户设置优先权值作为顺序值。如优先权值为1的好友账户排在第一,优先权值为2的好友账户排在第二……优先权值为n的好友账户排在优先权值为n+1 的好友账户的前面,优先权值越小,其顺序越靠前。而当排在最前面的好友账户被获取到之后,该好友账户将自动转到队列最后的位置,例如,优先权值为1的好友账户被获取用于社交关系验证,验证完成后,该好友账户的优先权值设置有最大值,该好友账户从第一的位置调整到最后的位置上,其他已绑定的好友账户的位置均向前移动一位(即优先权值均减1)。
需要说明的是,该好友账户在该用户社会关系数据库中最初的循环队列的队列顺序可以由该好友账户与该用户账户的绑定顺序决定,也即先绑定的好友账户排在循环队列的前面,后绑定的好友账户排在循环队列的后面。
需要说明的是,该用户社会关系数据库包括该用户账户与好友账户之间的绑定关系,其中,该用户社会关系数据库中该用户账户与好友账户之间的绑定关系可以来自于以下几种方式:
第一种方式:
1、在该用户账户完成注册之后,获取该用户账户注册时所用的用户身份信息;
2、根据该用户身份信息筛选出用户潜在好友的对应账户;
3、将该潜在好友的对应账户展示给用户选择;
4、向被用户选择的该潜在好友的对应账户发送好友绑定请求;
5、若接收到该潜在好友的对应账户反馈的绑定请求接受信息,则该对应账户为好友账户,并建立该用户账户与该好友账户之间的绑定关系;
需要说明的是,将该潜在好友的对应账户展示给用户选择可以具体包括:a、提取该潜在好友的对应账户的潜在好友照片;b、将该潜在好友照片显示在操作界面上供用户选择。
第二种方式:
1、接收来自潜在好友的对应账户的好友绑定请求;
2、反馈绑定请求接受信息至该潜在好友的对应账户,以建立该用户账户与该潜在好友的对应账户之间的绑定关系,此时,该用户账户与该潜在好友的对应账户之间属于双向绑定。
第三种方式:
1、当检测到新的潜在好友的对应账户完成注册时,向新的潜在好友的 对应账户发送好友绑定请求;
2、若接收到该新的潜在好友的对应账户反馈的绑定请求接受信息,则该对应账户为好友账户,并建立该用户账户与该好友账户之间的绑定关系。
另外,而当该用户社会关系数据库中与用户账户已绑定社交关系的好友账户数目为0时,可以将该用户账户与该用户账户自身建立绑定关系,该用户账户作为与自身已绑定社交关系的好友账户;当该用户社会关系数据库中与用户账户已绑定社交关系的好友账户数目大于0时,可以解除该用户账户与该用户账户自身的绑定关系。
需要说明的是,该好友账户的状态由用户进行设定,包括激活状态和非激活状态两种,激活状态的好友账户为用户认可的可用于参加社交验证的账户,非激活状态的好友账户可能由于头像不真实或者其他原因,被用户认为不可用于参与社交验证,好友账户的激活状态和非激活状态可以由用户手动更改。
需要说明的是,此处“预设数量个”可以为1个也可以为两个或者多个,或者,“预设数量个”也可以为“随机数量个”,好友账户的个数由预设的随机算法来确定,增加用户验证时的不确定性。
203、提取获取到的好友账户的好友照片;
在以循环队列的方式获取该用户社会关系数据库中预设数量个该好友账户之后,可以提取获取到的好友账户的好友照片。
204、获取一张以上与该用户账户未绑定社交关系的陌生账户,或者与该用户账户已绑定社交关系但处于非激活状态的好友账户的照片,作为陌生人照片;
在获取预设数量个该好友账户的同时或者之后,可以获取一张以上与该用户账户未绑定社交关系的陌生账户,或者与该用户账户已绑定社交关系但处于非激活状态的好友账户的照片,作为陌生人照片。该陌生账户是指与该用户账户没有绑定社交关系的账户,其对应的陌生人照片可以作为验证用户的“干扰选项”。
205、将获取到的该好友照片和该陌生人照片乱序后显示在操作界面上供用户选择;
在获取到该好友照片和该陌生人照片之后,可以将获取到的该好友照 片和该陌生人照片乱序后显示在操作界面上供用户选择。可以理解的是,乱序后,若该用户为合法用户,则其必然知道与用户账户绑定社交关系的好友账户的好友照片,从而可以从乱序的照片中挑选出好友照片;否则,可以认为该用户为非法用户。
206、获取用户在该操作界面上的照片选择结果;
当用户完成照片的选择之后,可以获取用户在该操作界面上的照片选择结果。
207、判断是否该照片选择结果为所有获取到的好友照片并且该照片选择结果的照片数量少于预设阈值,若是,则执行步骤208,若否,则执行步骤211;
在获取用户在该操作界面上的照片选择结果之后,可以判断是否该照片选择结果为所有获取到的好友照片并且该照片选择结果的照片数量少于预设阈值,若是,则执行步骤208,若否,则执行步骤211。为进一步加强账户的安全性,可以在用户正确选择出所有好友照片之后,要求用户输入其中的一张或者多张该好友照片对应的好友账户的用户名或者别名,从而进一步确认该用户是否为合法用户。
208、获取其中的一张以上该好友照片并显示在该操作界面上供用户输入对应的好友账户的用户名或别名;
若该照片选择结果为所有获取到的好友照片并且该照片选择结果的照片数量少于预设阈值,获取其中的一张以上该好友照片并显示在该操作界面上供用户输入对应的好友账户的用户名或别名。
209、获取用户输入的用户名或别名;
在用户完成用户名或别名的输入之后,可以获取用户输入的用户名或别名。
210、判断输入的用户名或别名与显示在该操作界面上的该好友照片是否一一对应,若是,则验证通过,若否,则验证不通过;
若该用户名或别名与显示在该操作界面上的该好友照片一一对应,则验证通过,反之,则不通过。
211、若该照片选择结果为所有获取到的好友照片,则验证通过。
当该照片选择结果的照片数量不少于预设阈值时,可以认为照片选择结果的是具备验证的有效性的。例如,假设预设阈值为3,则照片选择结果的照片数量如果大于3,也即获取到的参与社交验证的好友照片大于3,用户如果将3张好友照片均选中,则可以认为该用户身份是正确的。反之,当照片选择结果的照片数量小于3时,由于数量太少,非法用户存在不低的概率蒙对所有获取到的好友照片,误差率过高,需要要求用户给其中的好友照片输入对应的用户名或者别名作为保证。
需要说明的是,本实施例中,在进行社交关系验证之前,还对用户账户进行了人脸识别验证以加强安全性。这里,可以自由组合地加入指纹验证、虹膜验证或静脉验证等身份验证方式,从而加强用户账户的安全性。可以理解的是,对同一个用户账户采用的不同身份验证方式越多,其安全性越强,此处不再赘述其他的身份验证方式。
为便于理解,根据图2所描述的实施例,下面以一个实际应用场景对本发明实施例中的一种通过社交关系进行身份验证的方法进行描述:
应用场景一:
可以分为两个步骤,第一个步骤为对人脸进行验证,人脸验证成功后,进入第二个步骤,对用户绑定的社交关系进行验证,社交关系验证成功后,则用户的身份验证成功,否则验证失败。
在用户使用人脸验证功能之前需要通过摄像头等部件采集人脸图像,并将采集的人脸图像经过特征提取算法提取为人脸特征数据,然后将提取到的人脸特征数据保存到后台数据库中,用户通过终端设备(包括手机、打卡机、ATM等)刷身份证、银行卡、工卡或登录QQ、微信号后,则可以开始进行注册,终端设备图像采集模块的摄像头首先会采集人脸图像,然后将图像传送给后台服务器,后台服务器中的人脸剪切模块先将人脸图像剪切成可以用于提取特征的人脸小图,接着特征提取程序对传入的人脸小图进行特征提取处理,生成人脸特征数据,人脸剪切程序通过ASM方法实现,特征提取程序通过LBP算法实现,生成的人脸小图和人脸特征数据将会保存到后台数据库中,并给定唯一的ID号,同时会在该ID号下保存从身份证、银行卡、QQ号或微信号中获取到的用户名称、身份证号、 银行卡号、QQ号、微信号等,剪切后的人脸小图与人脸特征数据作为注册信息将会一直保存在数据库中,这些注册信息将会用于与待验证的人脸信息作比较。
在完成用户身份信息注册之后,用户身份验证系统会立即调用社交信息注册模块,社交信息注册模块会提示用户需要立即注册社交信息(即绑定社交好友的照片与照片对应的用户名和别名),首先社交信息注册模块会根据用户自己已注册的自身身份信息,包括家庭地址,单位和部门,毕业学校、年份与专业等关键字,筛选潜在的好友。如果注册信息的数据库中存在与用户注册的关键字相同的人,则提取其照片供用户确认,若用户与对方存在社交关系,用户可以点击该照片向对方发送好友绑定请求,ATM等机器会将该绑定请求消息发送到对方的好友管理模块中,对方在好友管理模块界面中可以决定接受或拒绝该好友绑定请求,如果对方接受该绑定请求,则完成了用户与第三方的社交关系绑定操作,则数据库模块会将用户自己的ID号关联到对方的人脸图像地址,并且同时好友管理模块的好友管理软件会将对方注册的用户名、别名及照片添加到软件UI界面的列表中;若对方拒绝绑定,则好友绑定失败。用户在进行社交关系验证时,社交关系验证模块会将绑定到的好友照片按照一定规则(如按照片优先权动态排序)挑选一张出来,作为社交关系验证图片,然后机器会在UI等用户界面对用户发起社交关系验证请求,并接收对该社交关系验证的反馈。若机器接收到的反馈如用户名或别名与系统后台数据库中该照片的名称一致则验证通过,否则验证失败。用户至少要绑定一个以上的社交关系,绑定数目没有上限。好友管理模块检测到当前用户绑定的第三方好友数目为0时,会自动对自己进行绑定,将自身图像添加为好友关系验证图像,在验证社交关系时社交关系验证模块会将用户自己的照片抽取出来进行社交关系验证。当绑定的第三方好友数目大于0时,对自身的绑定关系将自动解除。后续在有新的好友注册时,可以通过社交关系管理模块添加绑定更多的好友关系。
社交信息注册完成之后,社交关系管理软件将会显示这些社交注册信息,并可以管理社交关系信息,进入社交关系管理软件前,人脸验证模块 和社交信息验证模块会先验证用户身份,包括验证人脸和验证绑定的社交信息,验证身份时,首先终端设备要求用户输入用户账号或刷身份证和银行卡等证件卡,然后进入人脸采集环节,将采集到的图片送入后台人脸验证模块进行验证,验证通过后,则进入社交关系验证环节,通过社交关系验证模块对社交关系进行验证,对绑定多于3个社交关系的用户,会抽出3个社交关系供用户验证,只有全部验证成功,才能进入社交关系管理软件,对于绑定的社交关系少于3个的用户,需要验证全部的社交关系才能进入社交关系管理软件。进入社交关系管理软件后,可以通过查看朋友关系的界面,查找出最新的在用户指定关键字下注册用户的照片,这些关键字必须是用户自己注册字段里的关键字,若发现新的好友,可以向对方发送好友关系绑定请求,每个绑定的好友,都可以单独设置参与社交验证和不参与社交验证,当已绑定的好友设置为不参与社交验证时,在社交验证环节将不再会抽取到该好友的照片参与社交关系验证。此外用户也可以解除已绑定的好友关系,解除好友关系时,不会通知到对方,好友关系解除绑定后,在社交关系管理软件的绑定界面中将不再显示好友的照片及相关的用户名信息。社交关系验证时,也不再会抽取到已解除绑定的好友图片。已绑定社交关系的每张可参与社交关系验证的图片都会有一个验证优先权值,优先权值为1的照片排在第一,优先权值为2的照片排在第二,依此类推,最后一张照片的优先权值最大,优先权值为1的照片最先被抽取到用于社交关系验证,验证完成后,该照片的优先权值变成最大,该照片从第一的位置转到最后的位置,其他已绑定的照片均先前移动一个位置,他们的优先权值均减1。最开始时,照片的优先权值由绑定照片的先后顺序确定,最先绑定的照片优先权值为1,后面新绑定的照片优先权值最大,照片排在最后。
在身份信息和社交信息注册完成之后,便可以进行身份验证,首先图像采集模块通过摄像头采集人脸图像数据,然后图像采集模块会将采集到的图像发送给后台,人脸剪切模块会将图像进行人脸剪切,并把人脸旋转为直立的正脸和缩放为统一的尺寸,特征提取模块会对人脸小图进行人脸特征提取,接着人脸验证模块将提取到的人脸特征与后台注册的人脸特征进行匹配,匹配成功后,程序立刻调用社交关系验证模块,验证方案一: 系统首先将优先权值为1的照片抽取出来作为社交关系验证的照片,然后从不属于该用户绑定社交关系的照片中挑选出9张照片,将这10张照片乱序后显示在UI界面中,用户需要点击出正确的关联照片,并输入该照片所注册的用户名或别名,只有所选照片和别名均验证成功后,社交关系才算验证成功,否则社交关系验证失败。验证方案二:从已绑定社交关系的照片中抽取不定数目的照片x张,然后从没有与用户ID绑定的照片中随机抽取10-x张照片显示在UI界面中,用户需要点中全部的绑定照片,然后点击确认,社交关系才算验证成功,多点或者少点了绑定社交关系的照片,都会验证失败,同样,所有验证过的照片都会排到后面去,未验证过的照片会往前排。
应用场景二:
目前的很多ATM机都配有身份证读取模块,我们用身份证作为账户,通过人脸验证与社交关系验证作为密码来进行用户登录。
首先开始注册人脸信息,在身份证模块读取到该身份证信息时,会在后台数据库中去查找是否该用户是否已经注册过人脸信息,若注册过,直接进入验证环节,若没有注册过,则进入人脸信息注册环节。注册时首先通过ATM机的摄像头采集人脸图像,然后将图像传到后台服务器中,再通过人脸剪切与特征提取模块提取出人脸特征数据。人脸特征数据提取成功之后,以该身份证号为ID建立一条索引,将人脸特征数据放在该索引下,并且要求注册用户通过UI界面输入用户身份的相关信息,包括出生地、公司名称与部门、毕业院校等。用户身份信息填写完成后,点击确认进入社交信息注册环节。
刚开始注册社交信息的用户,绑定的第三方好友数目为0时,社交关系注册模块会绑定用户自己为初始好友关系,这样在没用其他社交关系时也能进行验证,但这样的安全性会稍微差一些。绑定社交关系时,系统首先会根据用户注册的身份相关信息的关键字在系统数据库中查找出潜在的社交关系好友,若查找出来的照片中存在好友,用户可以向对方发送绑定社交关系请求,对方在收到绑定请求并同意后,则系统会将对方的照片绑定到用户的ID下,在进行社交关系验证时,该绑定的好友照片将有机会被 抽取到,在用户的社交关系管理软件界面中,将可以看到好友的照片与用户名及别名。社交关系注册成功后,用户就可以使用注册的信息进行身份验证了。
进行身份验证时,首先用户需要把身份证放在ATM机的身份证读卡器模块上,读卡器获取到用户的身份证号后,则进入图像拍摄界面,摄像头拍摄到人脸照片后,将照片传入后台,后台收到照片后会启动人脸剪切与特征提取模块,将提取到的特征与身份证号所关联的人脸特征进行比对,比对成功后,将启动社交信息验证模块,通过身份证号找到与身份证号关联的社交照片,将优先权值为1的照片提取出来,再从其他注册用户中随机抽取照片,若抽取到的照片没有和该用户身份证号进行社交绑定,则该照片可以被抽取出来,直到抽取9张为止,然后将10张照片一起显示在ATM的显示屏中,用户需要点中绑定的社交照片,并输入照片正确的用户名或别名,则社交验证成功,否则社交验证失败。用户只有一次点击照片的机会,点击完并输入名称后,照片将在界面中消失。人脸验证和社交信息验证成功后,用户就登录到系统中来进行查询取款操作了,只要有任意一个验证失败,都无法登录系统。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
该作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分 或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims (10)

  1. 一种通过社交关系进行身份验证的方法,其特征在于,包括:
    当需要进行用户账户的身份验证时,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片,所述用户社会关系数据库包括所述用户账户与好友账户之间的绑定关系;
    获取一张以上与所述用户账户未绑定社交关系的陌生账户的陌生人照片;
    将获取到的所述好友照片和所述陌生人照片乱序后显示在操作界面上供用户选择;
    获取用户在所述操作界面上的照片选择结果;
    若所述照片选择结果为所有获取到的所述好友照片,则验证通过。
  2. 根据权利要求1所述的方法,其特征在于,所述用户社会关系数据库中所述用户账户与好友账户之间的绑定关系来自于:
    在所述用户账户完成注册之后,获取所述用户账户注册时所用的用户身份信息;
    根据所述用户身份信息筛选出用户潜在好友的对应账户;
    将所述潜在好友的对应账户展示给用户选择;
    向被用户选择的所述潜在好友的对应账户发送好友绑定请求;
    若接收到所述潜在好友的对应账户反馈的绑定请求接受信息,则所述对应账户为好友账户,并建立所述用户账户与所述好友账户之间的绑定关系。
  3. 根据权利要求2所述的方法,其特征在于,所述将所述潜在好友的对应账户展示给用户选择具体包括:
    提取所述潜在好友的对应账户的潜在好友照片;
    将所述潜在好友照片显示在操作界面上供用户选择。
  4. 根据权利要求2所述的方法,其特征在于,所述用户账户与好友账户之间的绑定关系还来自于:
    接收来自潜在好友的对应账户的好友绑定请求;
    反馈绑定请求接受信息至所述潜在好友的对应账户,以建立所述用户 账户与所述潜在好友的对应账户之间的绑定关系;
    或者
    当检测到新的潜在好友的对应账户完成注册时,向新的潜在好友的对应账户发送好友绑定请求;
    若接收到所述新的潜在好友的对应账户反馈的绑定请求接受信息,则所述对应账户为好友账户,并建立所述用户账户与所述好友账户之间的绑定关系。
  5. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    当所述用户社会关系数据库中与用户账户已绑定社交关系的好友账户数目为0时,将所述用户账户与所述用户账户自身建立绑定关系,所述用户账户作为与自身已绑定社交关系的好友账户;
    当所述用户社会关系数据库中与用户账户已绑定社交关系的好友账户数目大于0时,解除所述用户账户与所述用户账户自身的绑定关系。
  6. 根据权利要求1所述的方法,其特征在于,通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片具体包括:
    以循环队列的方式获取所述用户社会关系数据库中预设数量个所述好友账户;
    提取所述好友账户的好友照片。
  7. 根据权利要求6所述的方法,其特征在于,所述好友账户在所述用户社会关系数据库中最初的循环队列的队列顺序由所述好友账户与所述用户账户的绑定顺序决定。
  8. 根据权利要求1所述的方法,其特征在于,若所述照片选择结果为所有获取到的所述好友照片,则验证通过具体包括:
    若所述照片选择结果为所有获取到的好友照片并且所述照片选择结果的照片数量少于预设阈值,则获取其中的一张以上获取到的好友照片并显示在所述操作界面上供用户输入对应的好友账户的用户名或别名;
    获取用户输入的用户名或别名,若所述用户名或别名与显示在所述操作界面上的所述好友照片一一对应,则验证通过。
  9. 根据权利要求1所述的方法,其特征在于,所述通过用户社会关系 数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片包括:
    通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的并且处于激活状态的不同好友账户的好友照片,所述好友账户的状态由用户进行设定,包括激活状态和非激活状态两种;
    所述获取一张以上与所述用户账户未绑定社交关系的陌生账户的陌生人照片包括:
    获取一张以上与所述用户账户未绑定社交关系的陌生账户,或者与所述用户账户已绑定社交关系但处于非激活状态的好友账户的照片,作为陌生人照片。
  10. 根据权利要求1所述的方法,其特征在于,当需要进行用户账户的身份验证时,先对当前用户进行人脸识别验证,若所述人脸识别验证结果为通过,则执行通过用户社会关系数据库获取一张以上与用户账户已绑定社交关系的不同好友账户的好友照片的步骤。
PCT/CN2016/092305 2015-12-09 2016-07-29 一种通过社交关系进行身份验证的方法 WO2017096921A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510902901.4 2015-12-09
CN201510902901.4A CN105468948B (zh) 2015-12-09 2015-12-09 一种通过社交关系进行身份验证的方法

Publications (1)

Publication Number Publication Date
WO2017096921A1 true WO2017096921A1 (zh) 2017-06-15

Family

ID=55606638

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/092305 WO2017096921A1 (zh) 2015-12-09 2016-07-29 一种通过社交关系进行身份验证的方法

Country Status (2)

Country Link
CN (1) CN105468948B (zh)
WO (1) WO2017096921A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309691A (zh) * 2018-03-27 2019-10-08 腾讯科技(深圳)有限公司 一种人脸识别方法、装置、服务器及存储介质
CN110717388A (zh) * 2019-09-02 2020-01-21 平安科技(深圳)有限公司 多账户关联注册的方法、装置、计算机设备及存储介质

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468948B (zh) * 2015-12-09 2019-01-25 广州广电运通金融电子股份有限公司 一种通过社交关系进行身份验证的方法
CN105959283B (zh) * 2016-05-03 2019-10-29 Tcl移动通信科技(宁波)有限公司 一种社交软件中目标人物安全性提示方法及系统
CN106778851B (zh) * 2016-12-05 2020-05-01 公安部第三研究所 基于手机取证数据的社交关系预测系统及其方法
CN107135208B (zh) * 2017-04-21 2020-07-14 广州有意思网络科技有限公司 一种运动社交平台的注册方法
CN107992733B (zh) * 2017-12-13 2021-04-02 广西邕城云科技有限公司 一种智能终端及其安全解锁方法
CN108566371B (zh) * 2018-02-13 2020-12-11 深圳市爱浦联科技有限公司 一种社交认证方法、系统及终端设备
CN108429745B (zh) * 2018-03-05 2021-08-10 广州杰赛科技股份有限公司 登录的认证方法和认证系统、网页登录方法和系统
CN109241499B (zh) * 2018-08-10 2023-07-18 四川译讯信息科技有限公司 一种在线图文转换方法
CN109558856A (zh) * 2018-12-08 2019-04-02 北京俩俩科技有限公司 一种认证线上用户之间真实好友关系的系统及方法
CN109948366B (zh) * 2019-03-26 2022-08-05 武汉聚脉网络科技有限公司 一种基于智能问答交互身份验证的共享家谱隐私保护方法
CN110177042A (zh) * 2019-06-18 2019-08-27 深圳市靠谱网络科技有限公司 一种基于社交关系的身份验证方法及装置
CN115022016A (zh) * 2022-05-31 2022-09-06 中国银行股份有限公司 基于区块链的用户身份认证方法及装置
CN114936359B (zh) * 2022-07-20 2022-11-01 深圳市木浪云科技有限公司 基于生物人和社会人的用户鉴权方法和系统
TWI817674B (zh) * 2022-08-24 2023-10-01 宏碁股份有限公司 二步驟驗證方法與二步驟驗證系統

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446961A (zh) * 2008-12-24 2009-06-03 腾讯科技(深圳)有限公司 在网络社区中对用户及其好友进行关联的方法及系统
CN102930457A (zh) * 2012-10-24 2013-02-13 深圳市万凯达科技有限公司 一种基于面部图像特征实现应用推荐的方法和系统
CN103916244A (zh) * 2013-01-04 2014-07-09 深圳市腾讯计算机系统有限公司 验证方法及装置
CN103970830A (zh) * 2014-03-31 2014-08-06 小米科技有限责任公司 信息推荐方法和装置
CN104751032A (zh) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 身份验证方法及装置
CN105468948A (zh) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 一种通过社交关系进行身份验证的方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446961A (zh) * 2008-12-24 2009-06-03 腾讯科技(深圳)有限公司 在网络社区中对用户及其好友进行关联的方法及系统
CN102930457A (zh) * 2012-10-24 2013-02-13 深圳市万凯达科技有限公司 一种基于面部图像特征实现应用推荐的方法和系统
CN103916244A (zh) * 2013-01-04 2014-07-09 深圳市腾讯计算机系统有限公司 验证方法及装置
CN104751032A (zh) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 身份验证方法及装置
CN103970830A (zh) * 2014-03-31 2014-08-06 小米科技有限责任公司 信息推荐方法和装置
CN105468948A (zh) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 一种通过社交关系进行身份验证的方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309691A (zh) * 2018-03-27 2019-10-08 腾讯科技(深圳)有限公司 一种人脸识别方法、装置、服务器及存储介质
CN110309691B (zh) * 2018-03-27 2022-12-27 腾讯科技(深圳)有限公司 一种人脸识别方法、装置、服务器及存储介质
CN110717388A (zh) * 2019-09-02 2020-01-21 平安科技(深圳)有限公司 多账户关联注册的方法、装置、计算机设备及存储介质
CN110717388B (zh) * 2019-09-02 2023-06-06 平安科技(深圳)有限公司 多账户关联注册的方法、装置、计算机设备及存储介质

Also Published As

Publication number Publication date
CN105468948B (zh) 2019-01-25
CN105468948A (zh) 2016-04-06

Similar Documents

Publication Publication Date Title
WO2017096921A1 (zh) 一种通过社交关系进行身份验证的方法
AU2019202631B2 (en) Toggling biometric authentication
US11394708B2 (en) Account information obtaining method, terminal, server and system
WO2017193826A1 (zh) 一种云桌面登陆验证方法、云桌面控制系统及客户端
JP2018092122A (ja) ユーザ認証の方法及び装置
CN110322317B (zh) 一种交易数据处理方法、装置、电子设备及介质
TW201424324A (zh) 帳戶登入的方法及裝置
CN102833182B (zh) 即时通信中进行人脸识别的方法、客户端及系统
CN105868970B (zh) 一种认证方法和电子设备
CN104980402B (zh) 一种识别恶意操作的方法及装置
EP3905174A1 (en) Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
JP2017526995A (ja) デュアルチャネル識別認証
CN107786487B (zh) 一种信息认证处理方法、系统以及相关设备
CN109831441B (zh) 一种身份认证的方法、系统及相关组件
JP2020074142A (ja) 生体データ登録支援システム、生体データ登録支援方法、プログラム
CN108337251A (zh) 银行卡手机号码变更实现方法、设备、系统及存储介质
US11663306B2 (en) System and method for confirming a person's identity
KR101282824B1 (ko) 만남 인증 시스템 및 그 제공방법
WO2016119341A1 (zh) 多用户登录模式的实现方法、装置和计算机存储介质
WO2018144692A1 (en) System and method for synchronizing notary meeting interactions between multiple software clients
CN114553838A (zh) 远程业务办理的实现方法、系统及服务器
KR101334744B1 (ko) 무인대출 처리방법
CN107786349B (zh) 一种针对用户账号的安全管理方法及装置
JP7364057B2 (ja) 情報処理装置、システム、顔画像の更新方法及びプログラム
WO2016202045A1 (zh) 名片交换方法、设备及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16872120

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16872120

Country of ref document: EP

Kind code of ref document: A1