WO2019020083A1 - 基于特征信息进行用户验证的方法及装置 - Google Patents
基于特征信息进行用户验证的方法及装置 Download PDFInfo
- Publication number
- WO2019020083A1 WO2019020083A1 PCT/CN2018/097276 CN2018097276W WO2019020083A1 WO 2019020083 A1 WO2019020083 A1 WO 2019020083A1 CN 2018097276 W CN2018097276 W CN 2018097276W WO 2019020083 A1 WO2019020083 A1 WO 2019020083A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- similar
- feature information
- verified
- similarity
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/211—Selection of the most significant subset of features
- G06F18/2115—Selection of the most significant subset of features by evaluating different subsets according to an optimisation criterion, e.g. class separability, forward selection or backward elimination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/217—Validation; Performance evaluation; Active pattern learning techniques
- G06F18/2193—Validation; Performance evaluation; Active pattern learning techniques based on specific statistical tests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/77—Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
- G06V10/771—Feature selection, e.g. selecting representative features from a multi-dimensional feature space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/77—Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
- G06V10/778—Active pattern-learning, e.g. online learning of image or video features
- G06V10/7796—Active pattern-learning, e.g. online learning of image or video features based on specific statistical tests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/165—Detection; Localisation; Normalisation using facial parts and geometric relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
Definitions
- the present specification relates to the field of identity recognition technologies, and in particular, to a method and apparatus for user authentication based on feature information.
- face recognition As a kind of recognition technology with good user experience, face recognition has been widely used in many scenarios.
- the principle of face recognition is to collect the face image of the target user and extract the image feature, and then compare the image feature with the image or image feature retained by the target user in the system, and determine the identity of the user through the comparison result. Sex.
- the risky users who may belong to similar faces are processed in a shielding manner, that is, the risk users are not allowed to use the face recognition.
- face recognition technology the user base using face recognition technology has also expanded dramatically, which has led to a rapid increase in the number of similar users. This makes it difficult to use the mask to avoid misrecognition. Executed in the actual application.
- the use of the shielding method can not solve the misidentification problem of similar faces from the root cause.
- the purpose of one or more embodiments of the present specification is to provide a method and apparatus for user authentication based on feature information, which is used to improve the accuracy and coverage of user authentication.
- one or more embodiments of the present specification provide a method for user authentication based on feature information, including:
- the user to be verified belongs to a similar user group, the user to be verified is verified according to the reference feature information in the similar user group.
- verifying the user to be verified according to the reference feature information in the similar user group including:
- Determining, according to the first comparison result, whether the user to be verified passes the verification.
- the determining whether the user to be verified belongs to a similar user group includes:
- the preset similarity condition includes: the similarity of the reference feature information reaches a preset threshold.
- the preset distinguishable condition includes: comparing the similarity between the sample feature information of the similar user and each of the reference feature information in the similar user group to which the similar user belongs, the similarity comparison is successful.
- the number of ratios is greater than the preset scale value.
- the collected feature information is compared with each of the reference feature information in the similar user group to obtain a first comparison result, including:
- determining, according to the first comparison result, whether the user to be verified passes the verification including:
- the first similarity is not greater than the second similarity, it is determined that the user to be verified fails the verification.
- the method further includes:
- the at least two sample users satisfy the preset distinguishable condition, the at least two sample users are added to the same similar user group.
- determining, according to the calculated similarity, whether the at least two sample users meet the preset distinguishable condition including:
- the method further includes:
- the global user information database When the user to be authenticated does not belong to the similar user group, the global user information database is obtained, and the global user information database includes reference feature information corresponding to the preset number of users and identification information thereof;
- the feature information includes at least one of a facial feature, an iris feature, a fingerprint, and an eyelet
- the identification information includes at least one of an ID number, a communication number, a name, and predetermined identification information.
- one or more embodiments of the present disclosure provide a method for user authentication based on feature information, including:
- the user to be verified belongs to a similar user group, acquiring feature information collected by the user to be verified, and calculating reference feature information corresponding to the first similar user in the similar user group. a first similarity between the first similarity, and a second similarity between the collected feature information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is a similar user that is the same as the identification information of the user to be authenticated, and the second similar user is a similar user that is different from the identification information of the user to be verified.
- determining that the user to be verified passes the verification.
- one or more embodiments of the present specification provide an apparatus for performing user authentication based on feature information, including:
- the first judging module determines whether the user to be verified belongs to a similar user group; wherein the similar user group includes at least two similar users, and the similar user is a user whose reference feature information satisfies a preset similar condition and a preset distinguishable condition. ;
- the first verification module if the user to be verified belongs to a similar user group, verifying the user to be verified according to the reference feature information in the similar user group.
- the first verification module includes:
- a first acquiring unit acquiring feature information collected by the user to be verified
- the determining unit determines, according to the first comparison result, whether the user to be verified passes the verification.
- the first determining module includes:
- An identifier information acquiring unit which acquires identification information of the user to be verified
- a first determining unit determining whether the identification information of the user to be verified matches the identification information of a similar user in the pre-stored similar user group; if yes, determining that the user to be verified belongs to a similar user group; if not, determining the The user to be verified does not belong to the similar user group.
- the preset similarity condition includes: the similarity of the reference feature information reaches a preset threshold.
- the preset distinguishable condition includes: comparing the similarity between the sample feature information of the similar user and each of the reference feature information in the similar user group to which the similar user belongs, the similarity comparison is successful.
- the number of ratios is greater than the preset scale value.
- the comparing unit calculates a first similarity between the collected feature information and reference feature information corresponding to a first similar user in the similar user group, and calculates the collected feature a second similarity between the information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is a similar user with the same identity information as the user to be authenticated, The second similar user is a similar user different from the identification information of the user to be verified;
- the determining unit if the first similarity is greater than the second similarity, determining that the user to be verified passes verification; if the first similarity is not greater than the second similarity, It is determined that the user to be verified fails the verification.
- the device further includes: creating a module, creating the similar user group;
- the creating module includes:
- a second acquiring unit configured to acquire reference feature information and sample feature information corresponding to each of the at least two sample users; wherein the reference feature information of the at least two sample users meets the preset similarity condition;
- a calculating unit for each of the sample users, respectively calculating a similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to each sample user;
- a second determining unit determining, according to the calculated similarity, whether the at least two sample users meet the preset distinguishable condition
- the determining unit compares a third similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to the sample user, and sample feature information corresponding to the sample user, and the sample user a fourth similarity between the reference feature information corresponding to the other sample users, to obtain a second comparison result; determining, according to the second comparison result, whether the third similarity is greater than the fourth similarity If yes, determining that the similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to each sample user is successful; if not, determining that the sample feature information corresponding to the sample user corresponds to each sample user Determining the similarity comparison of the reference feature information; counting the ratio of the similarity ratio to the success ratio, and determining that the at least two sample users satisfy the preset when the number ratio is greater than the preset ratio value Differentiate conditions.
- the device further includes:
- Determining a module and determining, according to the identifier information corresponding to the user to be verified, the reference feature information corresponding to the user to be verified in the global user information database;
- the second verification module verifies the user to be verified according to the reference feature information corresponding to the user to be verified.
- the feature information includes at least one of a facial feature, an iris feature, a fingerprint, and an eyelet
- the identification information includes at least one of an ID number, a communication number, a name, and predetermined identification information.
- one or more embodiments of the present disclosure provide an apparatus for performing user authentication based on feature information, including:
- the receiving module receives the verification request of the user to be verified, and the verification request includes the identification information of the user to be verified;
- the second determining module determines, according to the identifier information of the user to be verified, whether the user to be verified belongs to a similar user group, wherein the similar user group includes at least two similar users, and the similar user satisfies the reference feature information. Preset similar conditions and preset users that can distinguish conditions;
- a calculation module if the user to be verified belongs to a similar user group, acquiring feature information collected by the user to be verified, and calculating a reference corresponding to the first similar user in the similar user group a first similarity between the feature information, and a second similarity between the collected feature information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first The similar user is a similar user that is the same as the identification information of the user to be authenticated, and the second similar user is a similar user that is different from the identification information of the user to be verified.
- one or more embodiments of the present disclosure provide an apparatus for performing user authentication based on feature information, including:
- a memory arranged to store computer executable instructions that, when executed, cause the processor to:
- the user to be verified belongs to a similar user group, the user to be verified is verified according to the reference feature information in the similar user group.
- one or more embodiments of the present disclosure provide an apparatus for performing user authentication based on feature information, including:
- a memory arranged to store computer executable instructions that, when executed, cause the processor to:
- the user to be verified belongs to a similar user group, acquiring feature information collected by the user to be verified, and calculating reference feature information corresponding to the first similar user in the similar user group. a first similarity between the first similarity, and a second similarity between the collected feature information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is a similar user that is the same as the identification information of the user to be authenticated, and the second similar user is a similar user that is different from the identification information of the user to be verified.
- determining that the user to be verified passes the verification.
- one or more embodiments of the present specification provide a storage medium for storing computer executable instructions that, when executed, implement the following processes:
- the user to be verified belongs to a similar user group, the user to be verified is verified according to the reference feature information in the similar user group.
- one or more embodiments of the present specification provide a storage medium for storing computer executable instructions that, when executed, implement the following processes:
- the user to be verified belongs to a similar user group, acquiring feature information collected by the user to be verified, and calculating reference feature information corresponding to the first similar user in the similar user group. a first similarity between the first similarity, and a second similarity between the collected feature information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is a similar user that is the same as the identification information of the user to be authenticated, and the second similar user is a similar user that is different from the identification information of the user to be verified.
- determining that the user to be verified passes the verification.
- the technical solution of one or more embodiments of the present specification is to first determine whether the user to be authenticated belongs to a similar user group. If the user to be verified belongs to a similar user group, the user to be authenticated is verified according to the reference feature information in the similar user group, where The similar user group includes at least two similar users, and the at least two similar users are users whose reference feature information satisfies a preset similar condition and a preset distinguishable condition.
- the technical solution can verify the user to be authenticated by using a similar user group that belongs to a similar user that meets the preset similar condition and the preset distinguishable condition, so that the user to be verified can be distinguished from the similar user to avoid
- a similar user group that belongs to a similar user that meets the preset similar condition and the preset distinguishable condition
- the accuracy of user authentication is improved.
- the technical solution greatly improves the coverage of user authentication compared to the prior art shielding for verification of similar users.
- FIG. 1 is a schematic flowchart of a method for performing user authentication based on feature information according to an embodiment of the present specification
- FIG. 2 is a schematic flowchart of a method for creating a similar user group according to an embodiment of the present specification
- FIG. 3 is a schematic diagram of creating a similar user group according to a first embodiment of the present specification
- FIG. 4 is a schematic diagram of creating a similar user group according to a second embodiment of the present specification.
- FIG. 5 is a schematic diagram of another method for creating a similar user group according to Embodiment 2 of the present specification.
- FIG. 6 is a schematic flowchart of a method for performing user authentication based on feature information according to another embodiment of the present specification
- FIG. 7 is a schematic block diagram of an apparatus for performing user authentication based on feature information according to an embodiment of the present specification.
- FIG. 8 is a schematic block diagram of an apparatus for performing user authentication based on feature information according to another embodiment of the present specification.
- FIG. 9 is a schematic block diagram of an apparatus for performing user authentication based on feature information, according to another embodiment of the present specification.
- One or more embodiments of the present disclosure provide a method and apparatus for performing user authentication based on feature information, to improve accuracy and coverage of user authentication.
- FIG. 1 is a schematic flowchart of a method for performing user authentication based on feature information according to an embodiment of the present disclosure. As shown in FIG. 1, the method includes:
- Step S102 Determine whether the user to be verified belongs to a similar user group.
- the similar user group includes at least two similar users, and the similar user is a user whose reference feature information satisfies a preset similar condition and a preset distinguishable condition.
- the identification information of each similar user is stored correspondingly to the similar user, so that, in specific implementation, the identification information of the user to be verified and the identifier of a similar user in each similar user group may be If the information is matched, if there is a similar user that matches the identification information of the user to be authenticated, the user to be verified belongs to a similar user group where the similar user is located; if there is no similar user that matches the identification information of the user to be verified, The user to be verified does not belong to a similar user group.
- Step S104 If the user to be verified belongs to a similar user group, the user to be authenticated is verified according to the reference feature information in the similar user group.
- determining whether the user to be verified belongs to a similar user group it may be determined according to the identification information or the feature information of the user to be verified.
- step S102 may be performed as follows: First, the identification information of the user to be verified is obtained. Secondly, it is determined whether the identification information of the user to be verified matches the identification information of the similar user in the pre-stored similar user group; if yes, it is determined that the user to be verified belongs to the similar user group; if not, it is determined that the user to be verified does not belong to the similar user group. In the pre-stored similar user group, each similar user is associated with the corresponding identification information. Therefore, the matching identification information can be used to determine whether the user to be verified belongs to a similar user group.
- the identification information includes at least one of an ID number, a communication number, a name, and predetermined identification information.
- the predetermined identification information may be information that is to be verified by the user to be authenticated in advance on the server side for identifying the identity of the user, such as specifying a numeric string, specifying a text, and the like.
- step S102 can be performed as follows: First, the feature information of the user to be verified is obtained. Secondly, it is determined whether the feature information of the user to be verified matches the reference feature information of the similar user in the pre-stored similar user group; if yes, it is determined that the user to be verified belongs to the similar user group; if not, it is determined that the user to be verified does not belong to the similar user group .
- Verification includes verification of security.
- the reference feature information in the similar user group refers to feature information of the similar user in the similar user group that is pre-retained on the server side, wherein the feature information may include facial features, iris features, fingerprints, and eye patterns. At least one of the information.
- the reference feature information includes feature information that has a unique identifier function pre-stored by the user on the server side, and is mainly used for comparison with other feature information in the verification process.
- the selection of the reference feature information is not limited, and may be standard feature information that satisfies a predetermined standard, or may be non-standard feature information, or may be feature information that is selected from a plurality of feature information according to a predetermined condition, and the like. .
- the technical solution of one or more embodiments of the present specification is to first determine whether the user to be authenticated belongs to a similar user group. If the user to be verified belongs to a similar user group, the user to be authenticated is verified according to the reference feature information in the similar user group, where The similar user group includes at least two similar users, and the at least two similar users are users whose reference feature information satisfies a preset similar condition and a preset distinguishable condition.
- the technical solution can verify the user to be authenticated by using a similar user group that belongs to a similar user that meets the preset similar condition and the preset distinguishable condition, so that the user to be verified can be distinguished from the similar user to avoid
- a similar user group that belongs to a similar user that meets the preset similar condition and the preset distinguishable condition
- the accuracy of user authentication is improved.
- the technical solution greatly improves the coverage of user authentication compared to the prior art shielding for verification of similar users.
- FIG. 2 is a schematic flowchart of a method for creating a similar user group according to an embodiment of the present disclosure. As shown in FIG. 2, a method for creating a similar user group may include the following steps S202-S210:
- Step S202 Acquire reference feature information and sample feature information corresponding to each of at least two sample users.
- the reference feature information of the at least two sample users satisfies a preset similarity condition, and the preset similarity condition includes that the similarity of the reference feature information reaches a preset threshold.
- the reference feature information corresponding to the sample user refers to the feature information of the user that has a unique identifier function pre-stored on the server side, and the sample feature information corresponding to the sample user may include one or more feature information that the sample user history passes.
- the feature information may include at least one of facial features, iris features, fingerprints, and eye patterns.
- Step S204 Calculate the similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to each sample user for any sample user.
- the similarity between the different feature information may be determined by determining the feature vector of each feature information and further calculating the feature vector distance between the different feature information. If the feature information is a face image, the similarity between different face images may also be determined by determining a feature face corresponding to each face image (ie, a set of feature vectors for face recognition problems in the field of machine vision). ;and many more.
- the similarity comparison method of the feature information listed above is prior art, and details are not described herein again.
- Step S206 determining, according to the calculated similarity, whether the at least two sample users satisfy the preset distinguishable condition; if yes, executing step S208; if not, executing step S210.
- the preset distinguishable condition may include: comparing the similarity between the sample feature information corresponding to any sample user and the reference feature information corresponding to each sample user, and the ratio of the number of successful similarity comparisons is greater than the preset proportional value. Based on the preset distinguishable condition, when step S206 is performed, it may be determined by the following implementation manner whether at least two sample users satisfy the preset distinguishable condition:
- the third similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to the sample user, and the sample feature information corresponding to the sample user and the reference corresponding to the sample user other than the sample user The fourth similarity between the feature information is obtained as a comparison result. And determining, according to the comparison result, whether the third similarity is greater than the fourth similarity; if yes, determining that the similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to each sample user is successful; if not, Then, it is determined that the similarity comparison between the sample feature information corresponding to the sample user and the reference feature information corresponding to each sample user fails.
- the statistical similarity ratio is proportional to the number of successes. When the number ratio is greater than the preset ratio value, it is determined that at least two sample users satisfy the preset identifiable condition.
- the number of successes may be compared, and when the number of similarity comparisons reaches a preset number, at least two may be determined. The sample users satisfy the preset distinguishable conditions. Alternatively, the number of similarity comparison failures may also be counted. When the number of similarity comparison failures reaches another preset number, it may be determined that at least two sample users do not satisfy the preset distinguishable condition.
- Step S208 adding at least two sample users to the same similar user group.
- Step S210 determining that the at least two sample users cannot be added to the same similar user group.
- the following describes how to create a similar user group according to the method of the present embodiment by two specific embodiments.
- only the ratio of the number of similarity comparison successes is 100% (that is, the similarity comparison result of all the sample feature information and the reference feature information corresponding to each sample user is a similarity comparison success.
- at least two sample users can satisfy the preset distinguishable condition.
- the feature information is a face feature
- the reference feature information is a reference face feature
- the sample feature information is a sample face feature
- step S202 is performed to select two sample users A and B, and each sample user corresponds to one reference facial feature and one sample facial feature. It is assumed that the sample user A corresponds to the reference face feature A1 and the sample face feature A2, and the sample user B corresponds to the reference face feature B1 and the sample face feature B2.
- step S204 is performed to calculate the similarity between the sample face feature A2 and the reference face feature A1 and the reference face feature B1 for the sample user A; and, for the sample user B, calculate the sample face feature B2 and the reference person respectively.
- step S206 is performed, for the sample user A, whether the similarity between the sample face feature A2 and the reference face feature A1 is greater than the similarity between the sample face feature A2 and the reference face feature B1, and if so, Determining whether the similarity comparison between the sample face feature A2 and each reference face feature is successful; and, for the sample user B, whether the similarity between the sample face feature B2 and the reference face feature B1 is greater than the sample face feature The similarity between B2 and the reference face feature A1, if yes, determines that the similarity comparison between the sample face feature B2 and each reference face feature is successful.
- FIG. 3 shows a schematic diagram of creating a similar user group in the first embodiment.
- the "success" displayed under the sample face feature A2 indicates that the similarity comparison between the sample face feature A2 and each reference face feature is successful, and the "success" displayed below the sample face feature B2 indicates the sample person. The similarity comparison between the face feature B2 and each of the reference face features is successful.
- Sample user A and sample user B can be added to the same similar user group; otherwise, if any one of the similarity comparisons fails, sample user A and sample user B cannot be added to the same similar user group.
- the feature information is a face feature
- the reference feature information is a reference face feature
- the sample feature information is a sample face feature
- step S202 is performed to select two sample users A and B, and each sample user corresponds to one reference face feature and three sample face features. It is assumed that the sample user A corresponds to the reference face feature A1 and the sample face feature A2, the sample face feature A3, the sample face feature A4, the sample user B corresponds to the reference face feature B1 and the sample face feature B2, and the sample face feature B3 , sample face feature B4.
- step S204 is performed to calculate the similarity between the sample face feature A2 and the reference face feature A1 and the reference face feature B1 for the sample user A; and calculate the sample face feature A3 and the reference face feature A1, respectively.
- the similarity between the sample face feature B2 and the reference face feature A1 and the reference face feature B1 is calculated respectively; and the sample face feature B3 and the reference face feature A1 and the reference face feature B1 are respectively calculated. Similarity; and, the similarity of the sample face feature B4 and the reference face feature A1 and the reference face feature B1 are respectively calculated.
- step S206 is performed, for the sample user A, whether the similarity between the sample face feature A2 and the reference face feature A1 is greater than the similarity between the sample face feature A2 and the reference face feature B1, and if so, Determining the similarity comparison between the sample face feature A2 and each reference face feature is successful; otherwise, determining that the similarity comparison of the sample face feature A2 and each reference face feature fails; and comparing the sample face feature A3 and Whether the similarity between the reference facial features A1 is greater than the similarity between the sample facial features A3 and the reference facial features B1, and if so, the similarity between the sample facial features A3 and the reference facial features is determined to be successful.
- sample face feature B2 and the reference face feature B1 determine whether the similarity between the sample face feature B2 and the reference face feature B1 is greater than the similarity between the sample face feature B2 and the reference face feature A1, and if so, determine the sample face feature The similarity comparison between B2 and each reference face feature is successful. Otherwise, it is determined that the similarity comparison of the sample face feature B2 and each reference face feature fails; and the sample face feature B3 and the reference face feature B1 are compared. Whether the similarity between the samples is greater than the similarity between the sample face feature B2 and the reference face feature A1, and if so, it is determined that the similarity comparison between the sample face feature B3 and each reference face feature is successful, otherwise, the sample is determined.
- the similarity comparison between the face feature B3 and each of the reference face features fails; and whether the similarity between the sample face feature B4 and the reference face feature B1 is greater than the sample face feature B4 and the reference face feature A1
- the similarity between the two if yes, it is determined that the similarity comparison between the sample face feature B4 and each reference face feature is successful, otherwise, the similarity comparison of the sample face feature B4 and each reference face feature is determined to fail.
- FIG. 4 and 5 are schematic diagrams showing the creation of similar user groups in the second embodiment.
- the right side of each sample face feature indicates the result of the similarity between the corresponding sample face feature and each reference face feature by "success" or "failure".
- the similarity comparison results between the sample face features A2, A3, and A4 and each of the reference face features are successful, and the sample face features B2, B3, B4 and each reference face feature are successful.
- the similarity comparison results are also similar to the similarity comparison, so it can be determined that the sample user A and the sample user B can be added to the same similar user group.
- the similarity ratio comparison between the sample face feature A4 and each reference face feature is a similarity ratio failure, the sample user A and the sample user B cannot be added to the same similar user group.
- the user verification can be performed according to the method of steps S102-S104.
- the above steps S102-S104 will be described in detail below.
- the verification request of the user to be verified is received, and the verification request may include the identification information of the user to be verified.
- the identification information includes at least one of an ID number, a communication number, a name, and predetermined identification information.
- the predetermined identification information may be information that is to be verified by the user to be authenticated in advance on the server side for identifying the identity of the user, such as specifying a numeric string, specifying a text, and the like.
- the process proceeds to step S102, and according to the identification information of the user to be verified, it is determined whether the user to be verified belongs to a similar user group.
- the similar user group includes at least two similar users, and the similar user is a user whose reference feature information satisfies a preset similar condition and a preset distinguishable condition.
- the preset similarity condition may include: the similarity of the reference feature information reaches a preset threshold.
- the preset distinguishable condition may include: comparing the similarity between the sample feature information of the similar user and each of the reference feature information in the similar user group to which the similar user belongs, the ratio of the number of successful similarity comparisons being greater than the preset ratio value .
- step S104 After determining whether the user to be verified belongs to a similar user group, step S104 is continued, that is, if the user to be verified belongs to a similar user group, the user to be authenticated is verified according to the reference feature information in the similar user group.
- Specific verification can include the following steps:
- Step 1 Obtain feature information collected by the user to be verified.
- the collection time of the feature information of the user to be authenticated in this embodiment is not limited.
- the feature information of the user to be verified may be collected after receiving the verification request of the user to be verified, or the feature information of the user to be verified may be collected after determining whether the user to be verified belongs to a similar user group, and the user to be verified may also be determined.
- the feature information of the user to be verified is collected before the user is authenticated according to the reference feature information in the similar user group.
- Step 2 Compare the collected feature information with each of the reference feature information in the similar user group to obtain a comparison result.
- step 2 may be implemented as follows: first, calculating a first similarity between the collected feature information and the reference feature information corresponding to the first similar user in the similar user group, and calculating the collected feature a second similarity between the information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is the same user as the identification information of the user to be verified, and the second similar user is the same user A similar user who verifies that the user's identification information is different. Next, determining whether the first similarity is greater than the second similarity; if yes, determining that the collected feature information matches the reference feature information corresponding to the first similar user; if not, determining that the collected feature information corresponds to the second similar user The baseline feature information matches.
- Step 3 Determine, according to the comparison result, whether the user to be verified passes the verification. Specifically, when the comparison result is that the collected feature information matches the reference feature information corresponding to the first similar user, that is, the first similarity is greater than the second similarity, determining that the user to be verified passes the verification; when the first comparison result is If the collected feature information matches the reference feature information corresponding to the second similar user, that is, the first similarity is not greater than the second similarity, it is determined that the user to be verified fails the verification.
- the collected face feature of the user to be verified is A
- the identification information is “XXX0”
- the user to be verified belongs to a similar user group including similar users M and N.
- the identification information corresponding to the similar user M is “XXX0”
- the reference face feature is B1
- the identification information corresponding to the similar user N is “XXX1”
- the reference facial feature is B2.
- first similarity a first similarity
- second similarity a first similarity between the face feature A and the reference face feature B2 corresponding to the second similar user in the similar user group (ie, the similar user N different from the identification information of the user to be verified) .
- first similarity is greater than the second similarity. Assuming that the first similarity is 98% and the second similarity is 90%, since the first similarity is greater than the second similarity, the facial feature A of the user to be verified and the reference facial feature B1 corresponding to the similar user M may be determined. Matches, at this time the user to be verified passes the security verification.
- the facial feature A of the user to be verified and the reference facial feature B2 corresponding to the similar user N may be determined. Matches, at this time the user to be verified has not passed the security verification.
- the above method may also be implemented as steps S602-S612 shown in FIG. 6:
- Step S602 receiving an authentication request of the user to be verified, where the verification request includes the identification information of the user to be verified.
- Step S604 determining, according to the identification information of the user to be verified, whether the user to be verified belongs to a similar user group; if yes, executing step S606; if not, executing step S608.
- Step S606 the user to be authenticated is verified according to the reference feature information in the similar user group.
- Step S608 Acquire a global user information database, where the global user information database includes reference feature information corresponding to the preset number of users and identification information thereof.
- Step S610 Determine, according to the identification information corresponding to the user to be verified, the reference feature information corresponding to the user to be verified in the global user information database.
- Step S612 the user to be authenticated is verified according to the reference feature information corresponding to the user to be verified.
- the user to be authenticated is verified according to the reference feature information in the similar user group; if the user to be verified does not belong to the similar user group, according to the reference feature in the global user information database The information is verified against the authenticated user. It can be seen that the technical solution can not only verify the general users, but also accurately verify the similar users with low recognition, and avoid the misidentification between multiple similar users (such as father and son faces, identical twins, etc.), and then Improve the accuracy and coverage of user authentication.
- one or more embodiments of the present specification further provide an apparatus for performing user authentication based on feature information.
- FIG. 7 is a schematic block diagram of an apparatus for performing user authentication based on feature information, according to an embodiment of the present specification. As shown in Figure 7, the device includes:
- the first judging module 710 is configured to determine whether the user to be verified belongs to a similar user group; wherein the similar user group includes at least two similar users, and the similar user is a user whose reference feature information satisfies a preset similar condition and a preset distinguishable condition;
- the first verification module 720 if the user to be verified belongs to a similar user group, performs verification on the user according to the reference feature information in the similar user group.
- the first verification module 720 includes:
- a first acquiring unit acquiring feature information collected by the user to be verified
- the comparison unit compares the collected feature information with each of the reference feature information in the similar user group to obtain a first comparison result
- the determining unit determines whether the user to be verified passes the verification according to the first comparison result.
- the first determining module 710 includes:
- An identifier information acquiring unit which acquires identification information of the user to be verified
- a first determining unit determining whether the identification information of the user to be verified matches the identification information of a similar user in the pre-stored similar user group; if yes, determining that the user to be verified belongs to a similar user group; if not, determining that the user to be verified does not belong to the similarity user group.
- the preset similarity condition includes: the similarity of the reference feature information reaches a preset threshold.
- the preset distinguishable condition includes: comparing the similarity between the sample feature information of the similar user and each of the reference feature information in the similar user group to which the similar user belongs, the proportion of the success ratio comparison success is greater than the preset Proportional value.
- the comparison unit calculates a first similarity between the collected feature information and the reference feature information corresponding to the first similar user in the similar user group, and calculates the collected feature information and the first in the similar user group. a second similarity between the reference feature information corresponding to the second user; wherein the first similar user is the same user as the identification information of the user to be verified, and the second similar user is different from the identification information of the user to be verified. user;
- the determining unit determines that the user to be verified passes the verification if the first similarity is greater than the second similarity; and determines that the user to be verified fails the verification if the first similarity is not greater than the second similarity.
- the comparison unit when the first comparison result matches the collected feature information with the reference feature information corresponding to the first similar user, determining that the user to be verified passes the verification; and when the first comparison result is the collected feature If the information matches the reference feature information corresponding to the second similar user, it is determined that the user to be verified fails the verification.
- the foregoing apparatus further includes: creating a module, creating a similar user group;
- Creating modules includes:
- a second acquiring unit configured to acquire reference feature information and sample feature information corresponding to each of the at least two sample users; wherein the reference feature information of the at least two sample users meets a preset similarity condition;
- the calculating unit calculates, for each sample user, the similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to each sample user;
- the second determining unit determines, according to the calculated similarity, whether the at least two sample users satisfy the preset distinguishable condition
- Adding a unit adding at least two sample users to the same similar user group when at least two sample users satisfy the preset distinguishable condition.
- the determining unit compares a third similarity between the sample feature information corresponding to the sample user and the reference feature information corresponding to the sample user, and sample feature information corresponding to the sample user, and other than the sample user a fourth similarity between the reference feature information corresponding to the sample user, to obtain a second comparison result; determining, according to the second comparison result, whether the third similarity is greater than the fourth similarity; if yes, determining a sample corresponding to the sample user
- the similarity comparison between the feature information and the reference feature information corresponding to each sample user is successful; if not, determining that the similarity comparison between the sample feature information corresponding to the sample user and the reference feature information corresponding to each sample user fails; statistical similarity ratio For the proportion of success, when the number ratio is greater than the preset ratio value, it is determined that at least two sample users satisfy the preset distinguishable condition.
- the foregoing apparatus further includes:
- the obtaining module 740 is configured to: when the user to be verified does not belong to the similar user group, obtain the global user information database, where the global user information database includes the reference feature information corresponding to the preset number of users and the identification information thereof;
- the determining module 750 is configured to determine, according to the identifier information corresponding to the user to be verified, the reference feature information corresponding to the user to be verified in the global user information database;
- the second verification module 760 performs verification on the user to be verified according to the reference feature information corresponding to the user to be verified.
- the feature information includes at least one of a facial feature, an iris feature, a fingerprint, and an eyelet
- the identification information includes at least one of an ID number, a communication number, a name, and predetermined identification information.
- one or more embodiments of the present specification further provide an apparatus for performing user verification based on feature information, including:
- the receiving module receives the verification request of the user to be verified, and the verification request includes the identification information of the user to be verified;
- the second judging module determines whether the user to be verified belongs to a similar user group according to the identification information of the user to be verified; wherein the similar user group includes at least two similar users, and the similar user satisfies the preset similar condition and the preset as the reference feature information. User that distinguishes conditions;
- a calculation module if the user to be verified belongs to a similar user group, acquiring feature information collected by the user to be verified, and calculating a first similarity between the collected feature information and the reference feature information corresponding to the first similar user in the similar user group And calculating a second similarity between the collected feature information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is the same user as the identification information of the user to be verified The second similar user is a similar user different from the identification information of the user to be verified;
- Determining a module if the first similarity is greater than the second similarity, determining that the user to be verified passes the verification.
- the device of one or more embodiments of the present specification is used to determine whether the user to be authenticated belongs to a similar user group. If the user to be verified belongs to a similar user group, the user to be authenticated is verified according to the reference feature information in the similar user group.
- the similar user group includes at least two similar users, and the at least two similar users are users whose reference feature information satisfies a preset similar condition and a preset distinguishable condition.
- the technical solution can verify the user to be authenticated by using a similar user group that belongs to a similar user that meets the preset similar condition and the preset distinguishable condition, so that the user to be verified can be distinguished from the similar user to avoid
- a similar user group that belongs to a similar user that meets the preset similar condition and the preset distinguishable condition
- the accuracy of user authentication is improved.
- the technical solution greatly improves the coverage of user authentication compared to the prior art shielding for verification of similar users.
- the device for performing user authentication based on the feature information in FIG. 7 and FIG. 8 can be used to implement the method for user authentication based on the feature information described above, wherein the detailed description should be related to the method part of the foregoing method. The description is similar, and to avoid cumbersomeness, it will not be described here.
- one or more embodiments of the present specification further provide an apparatus for performing user authentication based on feature information, as shown in FIG.
- the device for user authentication based on the feature information may have a relatively large difference due to different configurations or performances, and may include one or more processors 901 and a memory 902 in which one or more storage applications or data may be stored. .
- the memory 902 can be short-term storage or persistent storage.
- An application stored in memory 902 may include one or more modules (not shown), each of which may include a series of computer executable instructions in a device for user authentication based on feature information.
- the processor 901 can be arranged to communicate with the memory 902 to execute a series of computer executable instructions in the memory 902 on a device that performs user authentication based on the feature information.
- the device for user authentication based on the feature information may also include one or more power sources 903, one or more wired or wireless network interfaces 904, one or more input and output interfaces 905, one or more keyboards 906.
- the apparatus for performing user authentication based on the feature information includes a memory, and one or more programs, wherein one or more programs are stored in the memory, and one or more programs may include one or more programs.
- Modules, and each module can include a series of computer executable instructions in a device for user authentication based on feature information, and configured to be executed by one or more processors.
- the one or more programs are included for performing the following computer Executable instructions:
- the user to be verified belongs to a similar user group, the user to be verified is verified according to the reference feature information in the similar user group.
- the computer executable instructions when executed, may also cause the processor to:
- Verifying the user to be verified according to the reference feature information in the similar user group including:
- Determining, according to the first comparison result, whether the user to be verified passes the verification.
- the computer executable instructions when executed, may also cause the processor to:
- the preset similarity condition includes: the similarity of the reference feature information reaches a preset threshold.
- the preset distinguishable condition includes: comparing the similarity between the sample feature information of the similar user and each of the reference feature information in the similar user group to which the similar user belongs, the similarity comparison is successful.
- the number of ratios is greater than the preset scale value.
- the computer executable instructions when executed, may also cause the processor to:
- the first similarity is not greater than the second similarity, it is determined that the user to be verified fails the verification.
- the computer executable instructions when executed, may also cause the processor to:
- the at least two sample users satisfy the preset distinguishable condition, the at least two sample users are added to the same similar user group.
- the computer executable instructions when executed, may also cause the processor to:
- the computer executable instructions when executed, may also cause the processor to:
- the global user information database When the user to be authenticated does not belong to the similar user group, the global user information database is obtained, and the global user information database includes reference feature information corresponding to the preset number of users and identification information thereof;
- the feature information includes at least one of a facial feature, an iris feature, a fingerprint, and an eyelet
- the identification information includes at least one of an ID number, a communication number, a name, and predetermined identification information.
- the apparatus for performing user authentication based on the feature information is configured to be executable by one or more processors to execute the one or more programs for performing the following computer executable instructions:
- the user to be verified belongs to a similar user group, acquiring feature information collected by the user to be verified, and calculating reference feature information corresponding to the first similar user in the similar user group. a first similarity between the first similarity, and a second similarity between the collected feature information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is a similar user that is the same as the identification information of the user to be authenticated, and the second similar user is a similar user that is different from the identification information of the user to be verified.
- determining that the user to be verified passes the verification.
- One or more embodiments of the present specification also provide a computer readable storage medium storing one or more programs, the one or more programs including instructions that when included in a plurality of applications When the electronic device is executed, the electronic device can be configured to perform the foregoing method for performing user verification based on the feature information, and specifically for performing:
- the user to be verified belongs to a similar user group, the user to be verified is verified according to the reference feature information in the similar user group.
- One or more embodiments of the present specification also provide another computer readable storage medium storing one or more programs, the one or more programs including instructions that when included in a plurality of applications
- the electronic device of the program When the electronic device of the program is executed, the electronic device can be configured to perform the above method for performing user verification based on the feature information, and specifically for performing:
- the user to be verified belongs to a similar user group, acquiring feature information collected by the user to be verified, and calculating reference feature information corresponding to the first similar user in the similar user group. a first similarity between the first similarity, and a second similarity between the collected feature information and the reference feature information corresponding to the second similar user in the similar user group; wherein the first similar user is a similar user that is the same as the identification information of the user to be authenticated, and the second similar user is a similar user that is different from the identification information of the user to be verified.
- determining that the user to be verified passes the verification.
- the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
- a typical implementation device is a computer.
- the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
- one or more embodiments of the present specification can be provided as a method, system, or computer program product.
- one or more embodiments of the present specification can take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware.
- one or more embodiments of the present specification can employ a computer program embodied on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer usable program code embodied therein. The form of the product.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
- one or more embodiments of the present specification can be provided as a method, system, or computer program product.
- one or more embodiments of the present specification can take the form of an entirely hardware embodiment, an entirely software embodiment or a combination of software and hardware.
- one or more embodiments of the present specification can employ a computer program embodied on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer usable program code embodied therein. The form of the product.
- One or more embodiments of the present specification can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
- program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
- One or more embodiments of the present specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
- program modules can be located in both local and remote computer storage media including storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Multimedia (AREA)
- Software Systems (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Evolutionary Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Human Computer Interaction (AREA)
- Medical Informatics (AREA)
- Probability & Statistics with Applications (AREA)
- Biomedical Technology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Geometry (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims (21)
- 一种基于特征信息进行用户验证的方法,包括:判断待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;若所述待验证用户属于相似用户组,则根据所述相似用户组中的基准特征信息对所述待验证用户进行验证。
- 根据权利要求1所述的方法,根据所述相似用户组中的基准特征信息对所述待验证用户进行验证,包括:获取针对所述待验证用户所采集的特征信息;将所述采集的特征信息分别与所述相似用户组中的各基准特征信息进行比对,得到第一比对结果;根据所述第一比对结果确定所述待验证用户是否通过验证。
- 根据权利要求1所述的方法,所述判断待验证用户是否属于相似用户组,包括:获取所述待验证用户的标识信息;判断所述待验证用户的标识信息与预存的相似用户组中的相似用户的标识信息是否匹配;若是,则确定所述待验证用户属于相似用户组;若否,确定所述待验证用户不属于所述相似用户组。
- 根据权利要求1-3中任一项所述的方法,所述预设相似条件包括:所述基准特征信息的相似度达到预设阈值。
- 根据权利要求1-3中任一项所述的方法,所述预设可区分条件包括:基于所述相似用户的样本特征信息与该相似用户所属的相似用户组中的各基准特征信息的相似度比对,所述相似度比对成功的数目比例大于预设比例值。
- 根据权利要求2所述的方法,将所述采集的特征信息分别与所述相似用户组中的各基准特征信息进行比对,得到第一比对结果,包括:计算所述采集的特征信息与所述相似用户组中的第一相似用户对应的基准特征信息之间的第一相似度,以及,计算所述采集的特征信息与所述相似用户组中的第二相似用户对应的基准特征信息之间的第二相似度;其中,所述第一相似用户为与所述待验证用户的标识信息相同的相似用户,所述第二相似用户为与所述待验证用户的标识信息不同的相似用户;相应的,根据所述第一比对结果确定所述待验证用户是否通过验证,包括:若所述第一相似度大于所述第二相似度,则确定所述待验证用户通过验证;若所述第一相似度不大于所述第二相似度,则确定所述待验证用户未通过验证。
- 根据权利要求1所述的方法,所述方法还包括:获取至少两个样本用户各自对应的基准特征信息以及样本特征信息;其中,所述至少两个样本用户的基准特征信息满足所述预设相似度条件;针对任一所述样本用户,分别计算该样本用户对应的样本特征信息与各样本用户对应的基准特征信息的相似度;根据计算得到的所述相似度判断所述至少两个样本用户是否满足所述预设可区分条件;当所述至少两个样本用户满足所述预设可区分条件时,将所述至少两个样本用户添加至同一相似用户组。
- 根据权利要求7所述的方法,根据计算得到的所述相似度判断所述至少两个样本用户是否满足所述预设可区分条件,包括:比对所述样本用户对应的样本特征信息与该样本用户对应的基准特征信息之间的第三相似度以及该样本用户对应的样本特征信息与除该样本用户之外的其他样本用户对应的基准特征信息之间的第四相似度,得到第二比对结果;根据所述第二比对结果,判断所述第三相似度是否大于所述第四相似度;若是,则确定所述样本用户对应的样本特征信息与各样本用户对应的基准特征信息的相似度比对成功;若否,则确定所述样本用户对应的样本特征信息与各样本用户对应的基准特征信息的相似度比对失败;统计所述相似度比对成功的数目比例,当所述数目比例大于所述预设比例值时,确定所述至少两个样本用户满足所述预设可区分条件。
- 根据权利要求1所述的方法,所述方法还包括:当所述待验证用户不属于所述相似用户组时,获取全局用户信息库,所述全局用户信息库中包括超出预设数量的用户各自对应的基准特征信息及其标识信息;根据所述待验证用户对应的标识信息,在所述全局用户信息库中确定所述待验证用户对应的基准特征信息;根据所述待验证用户对应的基准特征信息对所述待验证用户进行验证。
- 根据权利要求3所述的方法,所述特征信息包括人脸特征、虹膜特征、指纹、眼纹中的至少一种信息,所述标识信息包括身份证号、通讯号码、姓名、预定标识信息中的至少一项。
- 一种基于特征信息进行用户验证的方法,包括:接收待验证用户的验证请求,所述验证请求中包括所述待验证用户的标识信息;根据所述待验证用户的标识信息,判断所述待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;若所述待验证用户属于相似用户组,则获取针对所述待验证用户所采集的特征信息,计算所述采集的特征信息与所述相似用户组中的第一相似用户对应的基准特征信息之间的第一相似度,以及,计算所述采集的特征信息与所述相似用户组中的第二相似用户对应的基准特征信息之间的第二相似度;其中,所述第一相似用户为与所述待验证用户的标识信息相同的相似用户,所述第二相似用户为与所述待验证用户的标识信息不同的相似用户;若所述第一相似度大于所述第二相似度,则确定所述待验证用户通过验 证。
- 一种基于特征信息进行用户验证的装置,包括:第一判断模块,判断待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;第一验证模块,若所述待验证用户属于相似用户组,则根据所述相似用户组中的基准特征信息对所述待验证用户进行验证。
- 根据权利要求12所述的装置,所述第一验证模块包括:第一获取单元,获取针对所述待验证用户所采集的特征信息;比对单元,将所述采集的特征信息分别与所述相似用户组中的各基准特征信息进行比对,得到第一比对结果;确定单元,根据所述第一比对结果确定所述待验证用户是否通过验证。
- 根据权利要求12所述的装置,所述第一判断模块包括:标识信息获取单元,获取所述待验证用户的标识信息;第一判断单元,判断所述待验证用户的标识信息与预存的相似用户组中的相似用户的标识信息是否匹配;若是,则确定所述待验证用户属于相似用户组;若否,确定所述待验证用户不属于所述相似用户组。
- 根据权利要求13所述的装置,所述比对单元,计算所述采集的特征信息与所述相似用户组中的第一相似用户对应的基准特征信息之间的第一相似度,以及,计算所述采集的特征信息与所述相似用户组中的第二相似用户对应的基准特征信息之间的第二相似度;其中,所述第一相似用户为与所述待验证用户的标识信息相同的相似用户,所述第二相似用户为与所述待验证用户的标识信息不同的相似用户;相应的,所述确定单元,若所述第一相似度大于所述第二相似度,则确定所述待验证用户通过验证;若所述第一相似度不大于所述第二相似度,则确定所述待验证用户未通过验证。
- 根据权利要求12所述的装置,所述装置还包括:创建模块,创建所述相似用户组;所述创建模块包括:第二获取单元,获取至少两个样本用户各自对应的基准特征信息以及样本特征信息;其中,所述至少两个样本用户的基准特征信息满足所述预设相似度条件;计算单元,针对任一所述样本用户,分别计算该样本用户对应的样本特征信息与各样本用户对应的基准特征信息的相似度;第二判断单元,根据计算得到的所述相似度判断所述至少两个样本用户是否满足所述预设可区分条件;添加单元,当所述至少两个样本用户满足所述预设可区分条件时,将所述至少两个样本用户添加至同一相似用户组。
- 一种基于特征信息进行用户验证的装置,包括:接收模块,接收待验证用户的验证请求,所述验证请求中包括所述待验证用户的标识信息;第二判断模块,根据所述待验证用户的标识信息,判断所述待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;计算模块,若所述待验证用户属于相似用户组,则获取针对所述待验证用户所采集的特征信息,计算所述采集的特征信息与所述相似用户组中的第一相似用户对应的基准特征信息之间的第一相似度,以及,计算所述采集的特征信息与所述相似用户组中的第二相似用户对应的基准特征信息之间的第二相似度;其中,所述第一相似用户为与所述待验证用户的标识信息相同的相似用户,所述第二相似用户为与所述待验证用户的标识信息不同的相似用户;确定模块,若所述第一相似度大于所述第二相似度,则确定所述待验证用户通过验证。
- 一种基于特征信息进行用户验证的装置,包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时 使所述处理器:判断待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;若所述待验证用户属于相似用户组,则根据所述相似用户组中的基准特征信息对所述待验证用户进行验证。
- 一种基于特征信息进行用户验证的装置,包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:接收待验证用户的验证请求,所述验证请求中包括所述待验证用户的标识信息;根据所述待验证用户的标识信息,判断所述待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;若所述待验证用户属于相似用户组,则获取针对所述待验证用户所采集的特征信息,计算所述采集的特征信息与所述相似用户组中的第一相似用户对应的基准特征信息之间的第一相似度,以及,计算所述采集的特征信息与所述相似用户组中的第二相似用户对应的基准特征信息之间的第二相似度;其中,所述第一相似用户为与所述待验证用户的标识信息相同的相似用户,所述第二相似用户为与所述待验证用户的标识信息不同的相似用户;若所述第一相似度大于所述第二相似度,则确定所述待验证用户通过验证。
- 一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:判断待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;若所述待验证用户属于相似用户组,则根据所述相似用户组中的基准特征信息对所述待验证用户进行验证。
- 一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:接收待验证用户的验证请求,所述验证请求中包括所述待验证用户的标识信息;根据所述待验证用户的标识信息,判断所述待验证用户是否属于相似用户组;其中,所述相似用户组包括至少两个相似用户,所述相似用户为基准特征信息满足预设相似条件及预设可区分条件的用户;若所述待验证用户属于相似用户组,则获取针对所述待验证用户所采集的特征信息,计算所述采集的特征信息与所述相似用户组中的第一相似用户对应的基准特征信息之间的第一相似度,以及,计算所述采集的特征信息与所述相似用户组中的第二相似用户对应的基准特征信息之间的第二相似度;其中,所述第一相似用户为与所述待验证用户的标识信息相同的相似用户,所述第二相似用户为与所述待验证用户的标识信息不同的相似用户;若所述第一相似度大于所述第二相似度,则确定所述待验证用户通过验证。
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG11201907795XA SG11201907795XA (en) | 2017-07-27 | 2018-07-26 | Method and apparatus for user authentication based on feature information |
EP18838562.9A EP3582127B1 (en) | 2017-07-27 | 2018-07-26 | Feature information-based user authentication method and device |
KR1020197026682A KR102306407B1 (ko) | 2017-07-27 | 2018-07-26 | 피처 정보에 기반한 사용자 인증 방법 및 장치 |
MYPI2019004883A MY202171A (en) | 2017-07-27 | 2018-07-26 | Method and apparatus for user authentication based on feature information |
JP2019547975A JP7058665B2 (ja) | 2017-07-27 | 2018-07-26 | 特徴情報に基づくユーザ認証のための方法及び装置 |
PH12019501975A PH12019501975A1 (en) | 2017-07-27 | 2019-08-28 | Method and apparatus for user authentication based on a feature information |
US16/599,599 US10963551B2 (en) | 2017-07-27 | 2019-10-11 | Method and apparatus for user authentication based on feature information |
US16/776,047 US11003754B2 (en) | 2017-07-27 | 2020-01-29 | Method and apparatus for user authentication based on feature information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710622716.9 | 2017-07-27 | ||
CN201710622716.9A CN107491674B (zh) | 2017-07-27 | 2017-07-27 | 基于特征信息进行用户验证的方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/599,599 Continuation US10963551B2 (en) | 2017-07-27 | 2019-10-11 | Method and apparatus for user authentication based on feature information |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019020083A1 true WO2019020083A1 (zh) | 2019-01-31 |
Family
ID=60644845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/097276 WO2019020083A1 (zh) | 2017-07-27 | 2018-07-26 | 基于特征信息进行用户验证的方法及装置 |
Country Status (10)
Country | Link |
---|---|
US (2) | US10963551B2 (zh) |
EP (1) | EP3582127B1 (zh) |
JP (1) | JP7058665B2 (zh) |
KR (1) | KR102306407B1 (zh) |
CN (2) | CN107491674B (zh) |
MY (1) | MY202171A (zh) |
PH (1) | PH12019501975A1 (zh) |
SG (1) | SG11201907795XA (zh) |
TW (1) | TWI675580B (zh) |
WO (1) | WO2019020083A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107491674B (zh) * | 2017-07-27 | 2020-04-07 | 阿里巴巴集团控股有限公司 | 基于特征信息进行用户验证的方法及装置 |
CN110490026A (zh) * | 2018-05-14 | 2019-11-22 | 阿里巴巴集团控股有限公司 | 验证对象的方法、装置和系统 |
CN109344732B (zh) * | 2018-09-10 | 2020-01-21 | 阿里巴巴集团控股有限公司 | 一种鉴权以及确定鉴权方式的方法、装置及电子设备 |
CN109858464B (zh) * | 2019-02-26 | 2021-03-23 | 北京旷视科技有限公司 | 底库数据处理方法、人脸识别方法、装置和电子设备 |
CN114495188B (zh) * | 2020-10-26 | 2024-09-20 | 腾讯科技(深圳)有限公司 | 一种图像数据处理方法、装置和相关设备 |
CN113158958B (zh) * | 2021-04-30 | 2023-04-28 | 北京市商汤科技开发有限公司 | 通行方法及相关装置 |
CN113469012B (zh) * | 2021-06-28 | 2024-05-03 | 广州云从鼎望科技有限公司 | 用户刷脸验证的方法、系统、介质及装置 |
CN114399355B (zh) * | 2021-12-22 | 2023-10-10 | 中国电信股份有限公司 | 基于用户转化率的信息推送方法、装置和电子设备 |
CN114358983A (zh) * | 2021-12-27 | 2022-04-15 | 北京金堤科技有限公司 | 律师推荐方法、装置以及可读存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140254892A1 (en) * | 2013-03-06 | 2014-09-11 | Suprema Inc. | Face recognition apparatus, system and method for managing users based on user grouping |
CN104598795A (zh) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | 身份验证方法及系统 |
CN104615658A (zh) * | 2014-12-31 | 2015-05-13 | 中国科学院深圳先进技术研究院 | 一种确定用户身份的方法 |
CN106778684A (zh) * | 2017-01-12 | 2017-05-31 | 易视腾科技股份有限公司 | 深度神经网络训练方法及人脸识别方法 |
CN106897590A (zh) * | 2015-12-17 | 2017-06-27 | 阿里巴巴集团控股有限公司 | 人像信息的校验方法及装置 |
CN107491674A (zh) * | 2017-07-27 | 2017-12-19 | 阿里巴巴集团控股有限公司 | 基于特征信息进行用户验证的方法及装置 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI278782B (en) * | 2001-08-24 | 2007-04-11 | Toshiba Corp | Personal recognition apparatus |
JP4153691B2 (ja) | 2001-11-06 | 2008-09-24 | 株式会社東芝 | 顔画像照合装置及び顔画像照合方法 |
JP4952101B2 (ja) | 2006-07-12 | 2012-06-13 | 富士通株式会社 | 個人認証装置および個人認証方法 |
CN100576230C (zh) * | 2006-09-27 | 2009-12-30 | 中国科学院自动化研究所 | 基于局部结构的双胞胎相似指纹识别系统及方法 |
US10169646B2 (en) * | 2007-12-31 | 2019-01-01 | Applied Recognition Inc. | Face authentication to mitigate spoofing |
US20140257892A1 (en) * | 2013-03-07 | 2014-09-11 | International Business Machines Corporation | Social project collaboration through self-organizing teams |
KR102057947B1 (ko) * | 2013-04-01 | 2019-12-20 | 삼성전자주식회사 | 사용자 인증을 수행하는 디스플레이 장치 및 그 사용자 인증 방법 |
CN104639517B (zh) * | 2013-11-15 | 2019-09-17 | 阿里巴巴集团控股有限公司 | 利用人体生物特征进行身份验证的方法和装置 |
CN105227307A (zh) * | 2014-06-03 | 2016-01-06 | 阿里巴巴集团控股有限公司 | 身份验证方法与系统以及服务器数据处理方法和服务器 |
CN106156702A (zh) * | 2015-04-01 | 2016-11-23 | 北京市商汤科技开发有限公司 | 身份认证方法及设备 |
JP6488853B2 (ja) | 2015-04-21 | 2019-03-27 | 富士通株式会社 | 認証処理プログラム、認証処理装置および認証処理方法 |
US10002242B2 (en) * | 2015-08-17 | 2018-06-19 | Qualcomm Incorporated | Electronic device access control using biometric technologies |
CN106778484A (zh) * | 2016-11-16 | 2017-05-31 | 南宁市浩发科技有限公司 | 交通场景下的运动车辆跟踪方法 |
-
2017
- 2017-07-27 CN CN201710622716.9A patent/CN107491674B/zh active Active
- 2017-07-27 CN CN202010334076.3A patent/CN111506889B/zh active Active
-
2018
- 2018-05-16 TW TW107116558A patent/TWI675580B/zh active
- 2018-07-26 JP JP2019547975A patent/JP7058665B2/ja active Active
- 2018-07-26 MY MYPI2019004883A patent/MY202171A/en unknown
- 2018-07-26 EP EP18838562.9A patent/EP3582127B1/en active Active
- 2018-07-26 WO PCT/CN2018/097276 patent/WO2019020083A1/zh unknown
- 2018-07-26 KR KR1020197026682A patent/KR102306407B1/ko active IP Right Grant
- 2018-07-26 SG SG11201907795XA patent/SG11201907795XA/en unknown
-
2019
- 2019-08-28 PH PH12019501975A patent/PH12019501975A1/en unknown
- 2019-10-11 US US16/599,599 patent/US10963551B2/en active Active
-
2020
- 2020-01-29 US US16/776,047 patent/US11003754B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140254892A1 (en) * | 2013-03-06 | 2014-09-11 | Suprema Inc. | Face recognition apparatus, system and method for managing users based on user grouping |
CN104615658A (zh) * | 2014-12-31 | 2015-05-13 | 中国科学院深圳先进技术研究院 | 一种确定用户身份的方法 |
CN104598795A (zh) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | 身份验证方法及系统 |
CN106897590A (zh) * | 2015-12-17 | 2017-06-27 | 阿里巴巴集团控股有限公司 | 人像信息的校验方法及装置 |
CN106778684A (zh) * | 2017-01-12 | 2017-05-31 | 易视腾科技股份有限公司 | 深度神经网络训练方法及人脸识别方法 |
CN107491674A (zh) * | 2017-07-27 | 2017-12-19 | 阿里巴巴集团控股有限公司 | 基于特征信息进行用户验证的方法及装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3582127A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN111506889B (zh) | 2023-05-02 |
TW201911808A (zh) | 2019-03-16 |
PH12019501975A1 (en) | 2020-06-15 |
EP3582127A1 (en) | 2019-12-18 |
CN107491674B (zh) | 2020-04-07 |
JP7058665B2 (ja) | 2022-04-22 |
SG11201907795XA (en) | 2019-09-27 |
US20200167458A1 (en) | 2020-05-28 |
TWI675580B (zh) | 2019-10-21 |
EP3582127B1 (en) | 2022-04-13 |
US20200042686A1 (en) | 2020-02-06 |
MY202171A (en) | 2024-04-13 |
KR20200014265A (ko) | 2020-02-10 |
KR102306407B1 (ko) | 2021-10-01 |
CN107491674A (zh) | 2017-12-19 |
US10963551B2 (en) | 2021-03-30 |
JP2020524830A (ja) | 2020-08-20 |
US11003754B2 (en) | 2021-05-11 |
EP3582127A4 (en) | 2020-04-29 |
CN111506889A (zh) | 2020-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019020083A1 (zh) | 基于特征信息进行用户验证的方法及装置 | |
KR101956071B1 (ko) | 사용자 인증 방법 및 장치 | |
WO2019179036A1 (zh) | 深度神经网络模型、电子装置、身份验证方法和存储介质 | |
CN108491794B (zh) | 面部识别的方法和装置 | |
WO2019179029A1 (zh) | 电子装置、身份验证方法和计算机可读存储介质 | |
US20110043437A1 (en) | Systems and methods for tagging photos | |
US11126827B2 (en) | Method and system for image identification | |
JP2016006679A (ja) | 顔認識方法、装置、および該方法を実行するためのコンピュータ可読記録媒体 | |
WO2012139269A1 (en) | Tracking and recognition of faces using selected region classification | |
US11062120B2 (en) | High speed reference point independent database filtering for fingerprint identification | |
JP2020524860A (ja) | 身元認証方法および装置、電子機器、コンピュータプログラムおよび記憶媒体 | |
US20150379254A1 (en) | Authentication system that utilizes biometric information | |
WO2019095587A1 (zh) | 人脸识别方法、应用服务器及计算机可读存储介质 | |
CN111008620A (zh) | 目标用户识别方法、装置及存储介质、电子设备 | |
US20150371098A1 (en) | Authentication device, authentication method and program storage medium | |
CN112818312A (zh) | 基于人脸识别技术mes系统登录认证方法及mes系统 | |
JP6349062B2 (ja) | 認証システム、クライアント端末、認証サーバー、端末プログラム及びサーバープログラム | |
CN112836612B (zh) | 一种用户实名认证的方法、装置及系统 | |
Cîrlugea et al. | Facial Recognition Software for Android Operating Systems | |
JP2021086255A (ja) | ペン入力個人認証方法 | |
CN111858982B (zh) | 图像搜索方法、装置及电子设备 | |
Ninassi et al. | Privacy Compliant Multi-biometric Authentication on Smartphones. | |
JP6349063B2 (ja) | 認証システム、認証サーバー、及びサーバープログラム | |
CN117201144A (zh) | 基于人工智能的请求处理方法、装置、设备及存储介质 | |
CN116824707A (zh) | 一种签名验证方法、装置、设备、存储介质及产品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18838562 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019547975 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20197026682 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018838562 Country of ref document: EP Effective date: 20190912 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |