WO2019223149A1 - 安全认证方法、认证服务器及计算机可读存储介质 - Google Patents

安全认证方法、认证服务器及计算机可读存储介质 Download PDF

Info

Publication number
WO2019223149A1
WO2019223149A1 PCT/CN2018/102206 CN2018102206W WO2019223149A1 WO 2019223149 A1 WO2019223149 A1 WO 2019223149A1 CN 2018102206 W CN2018102206 W CN 2018102206W WO 2019223149 A1 WO2019223149 A1 WO 2019223149A1
Authority
WO
WIPO (PCT)
Prior art keywords
video
authentication
image
preset
security authentication
Prior art date
Application number
PCT/CN2018/102206
Other languages
English (en)
French (fr)
Inventor
王义文
王健宗
肖京
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019223149A1 publication Critical patent/WO2019223149A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the present application relates to the technical field of security authentication, and in particular, to a security authentication method and an authentication server.
  • the present application proposes an authentication server that can determine whether the video data contains video images of preset video data in video authentication, and whether the arrangement order and time limit of the video images of the video data meet the pre-defined requirements. Set conditions, when the video image containing the video data meets the preset conditions, the authentication is judged to pass, thereby improving the security of the authentication.
  • the authentication server includes a memory, a processor, and a security authentication program stored on the memory and operable on the processor.
  • the security authentication program When executed by the processor, the following steps are implemented:
  • the present application also provides a security authentication method, which is applied to an authentication server, and the method includes steps:
  • the present application further provides a computer-readable storage medium, where the computer-readable storage medium stores a security authentication program, and the security authentication program can be executed by at least one processor, so that the At least one processor performs the steps of the security authentication method as described above.
  • FIG. 1 is a schematic diagram of an optional hardware architecture of an authentication server
  • FIG. 2 is a schematic diagram of a program module of the first embodiment of the security authentication program of the present application
  • FIG. 3 is a schematic diagram of a program module of a second embodiment of a security authentication program of the present application.
  • FIG. 4 is a schematic flowchart of an embodiment of a security authentication method according to the present application.
  • FIG. 1 is a schematic diagram of an optional hardware architecture of the authentication server 1.
  • the authentication server 1 may be a computing device such as a rack server, a blade server, a tower server, or a rack server.
  • the authentication server 1 may be an independent server or a server cluster composed of multiple servers.
  • the authentication server 1 may include, but is not limited to, a memory 11, a processor 12, and a network interface 13 which may communicate with each other through a system bus.
  • the authentication server 1 is connected to a network (not shown in FIG. 1) through a network interface 13, or is connected to other electronic devices to obtain or transmit all information including a video or image to be authenticated and a security authentication request.
  • the network may be an Intranet, the Internet, a Global System for Mobile Communication (GSM), a Wideband Code Division Multiple Access (WCDMA), a 4G network, 5G Wireless, or wired networks such as Internet, Bluetooth, Wi-Fi, and call networks.
  • FIG. 1 only shows the authentication server 1 with components 11-13, but it should be understood that it is not required to implement all the illustrated components, and more or fewer components may be implemented instead.
  • the memory 11 includes at least one type of readable storage medium.
  • the readable storage medium includes a flash memory, a hard disk, a multimedia card, a card-type memory (for example, SD or DX memory, etc.), and a random access memory (RAM). , Static random access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read-only memory (PROM), magnetic memory, magnetic disks, optical disks, etc.
  • the memory 11 may be an internal storage unit of the authentication server 1, such as a hard disk or a memory of the authentication server 1.
  • the memory 11 may also be an external storage device of the authentication server 1, such as a plug-in hard disk, a smart memory card (SMC), and a secure digital ( Secure Digital (SD) card, Flash card, etc.
  • the memory 11 may also include both an internal storage unit of the authentication server 1 and an external storage device thereof.
  • the memory 11 is generally used to store an operating system and various application software installed on the authentication server 1, such as program codes of the security authentication program 200.
  • the memory 11 may also be used to temporarily store various types of data that have been output or will be output.
  • the processor 12 may be a central processing unit (CPU), a controller, a microcontroller, a microprocessor, or another data processing chip.
  • the processor 12 is generally used to control the overall operation of the authentication server 1, for example, to perform data interaction or communication-related control and processing.
  • the processor 12 is configured to run program code or process data stored in the memory 11, for example, to run the security authentication program 200 and the like.
  • the network interface 13 may include a wireless network interface or a wired network interface.
  • the network interface 13 is configured to establish a communication connection between the authentication server 1, a personal mobile terminal, or other electronic devices.
  • the authentication server 1 can determine whether the video data contains a pre- The video image of the video data, and the sequence and time limit of the arrangement of the video image of the video data meet the preset conditions. When the video image containing the video data meets the preset conditions, the authentication is judged to pass, thereby improving the authentication. safety.
  • the present application proposes a security authentication procedure 200.
  • FIG. 2 it is a program module diagram of the first embodiment of the security authentication program 200 of the present application.
  • the security authentication program 200 includes a series of computer program instructions stored in the memory 11. When the computer program instructions are executed by the processor 12, the security authentication operations of the embodiments of the present application can be implemented. In some embodiments, the security authentication program 200 may be divided into one or more modules based on specific operations implemented by various portions of the computer program instructions. For example, in FIG. 2, the security authentication program 200 may be divided into a receiving module 201, a recording module 202, and a determining module 203. among them:
  • the receiving module 201 is configured to receive a security authentication request.
  • the receiving module 201 may be considered to be an interface provided by the authentication server 1 to the user for security authentication requests, such as a human-computer interaction interface, or received by the user from an electronic device such as another mobile terminal through the network interface 13. Security authentication request.
  • the recording module 202 is configured to start video recording according to the security authentication request, and record video data within a preset time period.
  • the video data includes at least the arrangement order and duration of the video images.
  • the receiving module 201 After the receiving module 201 receives the security authentication request, the receiving module 201 turns on the camera unit, and then performs video recording on a preset window to record video data captured by the camera unit within a preset period of time.
  • the recording module 202 before recording the video data within a preset period of time, the recording module 202 will also perform a certain reminder, such as a voice announcement “start authentication”, so that the user knows that the authentication process has started.
  • the judging module 203 is configured to judge whether a video image in the video data meets a preset video authentication rule, and when the video image meets a preset video authentication rule, determine that the security authentication passes and open a corresponding Permissions.
  • the video authentication rule includes a video image of the video data, an arrangement order of the video images of the video data, and a time limit of the video images of the video data.
  • the determining module 203 determines the video data recorded by the recording module 202.
  • the determining module 203 determines whether the video image of the video data conforms to a preset video authentication rule, that is, determines whether the video data includes a video image of the preset video data, and then determines the The arrangement order of the video images of the video data is consistent, and it is determined whether the time limit of the video images of the video data of the group is within a preset range.
  • a preset video authentication rule that is, determines whether the video data includes a video image of the preset video data
  • the judgment module 203 analyzes the video data recorded by the recording module 202 according to the sequence of the recording time: the first step is to determine whether a smiling expression image appears; if a smiling expression image is detected, the second step is performed, If no smiley emoticon image is detected, the authentication fails, and the authentication ends.
  • the second step is to determine whether the mouth image has changed after the smiley facial image appears, and the change of the mouth image must include the mouth images of "world”, "world”, "you", and "good” in order.
  • the time interval between the two images of the "world”, “world”, “you”, and “good” are compared respectively; when the mouth image is detected, the "world”, “world”, “you”, and “good” are not sequentially included.
  • the authentication fails, and the authentication ends; if so, it continues to determine whether the time interval difference between the two images of the "world”, “world”, “you”, and “good” is less than a preset first A threshold, such as 1 second; if the time difference between the two images of the "world”, “boundary”, “you”, and “good” is less than a preset threshold, the third step is performed, otherwise an authentication failure is prompted , The authentication is over.
  • the second step when judging that the images of "world”, “world”, “you”, and “good” appear sequentially, it may also be determined whether the total time of the images of "world”, “world”, “you”, and “good” appears. Less than a preset threshold, such as 10 seconds, when the total time of the "world”, “world”, “you”, and “good” images is less than 10 seconds, the third step is performed, otherwise the authentication fails and the authentication ends.
  • a preset threshold such as 10 seconds
  • the rule that the images of "Shi”, “Jie”, “You”, and “Good” appear sequentially in the second step can also be set to be replaced with as long as the sequence includes "Shi", “Jie”, “You”, and “Good”
  • the image can be the person who meets the authentication rules, so even if it is mixed with other video images, it is not considered to be an authentication failure.
  • the third step is to determine whether there is a limb motion image of the scissors hand. When the image of the scissors hand is detected and the similarity with the preset scissors hand image is greater than the second threshold, such as 90%, the security certification is passed and the corresponding Authority, otherwise it prompts authentication failure and authentication ends. Among them, during the first step to the third step, if it is not completed, but it has exceeded the preset 30 seconds, the authentication failure is also prompted.
  • the authentication server 1 can determine whether the video data contains the preset video data in the video authentication, and whether the arrangement order and time limit of the video images of the video data meet the preset conditions. , When the video image containing the video data meets the preset conditions, the authentication is judged to pass, thereby improving the security of the authentication.
  • the security authentication program 200 in addition to the receiving module 201, the recording module 202, and the determining module 203 in the first embodiment, the security authentication program 200 further includes a detection module 204, a setting module 205, and a reminder module 206.
  • the receiving module 201, the recording module 202, and the determining module 203 have the same functions as the corresponding program modules in the first embodiment of the security authentication program 200.
  • the second embodiment of the security authentication program 200 of the present application further includes a detection module 204, a setting module 205, and a reminder module 206, which are used to provide a more convenient application experience for the user during the security authentication process.
  • the detection module 204 is configured to perform living body detection and face recognition.
  • the detection module 204 performs live detection on an object in a preset window.
  • the security authentication fails, and the authentication process ends.
  • the detection module 204 will also first take a face photo of the preset window through the camera unit, and then compare the face photo with the preset user face photo and determine Whether the similarity between the face photo and a preset user face photo is greater than or equal to a preset third threshold, such as 85%.
  • a preset third threshold such as 85%.
  • the setting module 205 is configured to set at least one of an expression image, a mouth image, and a limb motion image in the video authentication rule and the video authentication rule.
  • the authentication server 1 provides the user with settings for video authentication rules and at least one of an expression image, a mouth image, and a limb motion image in the video authentication rules.
  • a user wants to set video authentication rules to: within 30 seconds, smile, then say "hello world" at a constant speed and end with a scissors hand.
  • the setting module 205 can receive the setting instruction of the user, and will analyze the video data recorded during the authentication process in the order of the recording time, and automatically generate a judgment step: the first step is to determine whether a smile expression image appears; If a smiling expression image is detected, the second step is performed. If a smiling expression image is not detected, the authentication fails, and the authentication ends.
  • the second step is to determine whether the mouth image has changed after the smiley facial image appears, and the change of the mouth image must include the mouth images of "world”, “world”, “you”, and “good” in order.
  • the time interval between the two images of the "world”, “world”, “you”, and “good” are compared respectively; when the mouth image is detected, the "world”, “world”, “you”, and “good” are not sequentially included.
  • the authentication fails, and the authentication ends; if so, it continues to determine whether the time interval difference between the two images of the "world”, “world”, “you”, and “good” is less than a preset first A threshold, such as 1 second; if the time difference between the two images of the "world”, “boundary”, “you", and “good” is less than a preset threshold, the third step is performed, otherwise an authentication failure is prompted , The authentication is over.
  • a preset first A threshold such as 1 second
  • the third step is performed, otherwise an authentication failure is prompted , The authentication is over.
  • the second step when judging that the images of "world”, “world”, “you”, and “good” appear sequentially, it may also be determined whether the total time of the images of "world”, “world”, “you”, and “good” appears.
  • the third step is performed, otherwise the authentication fails and the authentication ends.
  • a preset threshold such as 10 seconds
  • the rule that the images of "Shi”, “Jie”, “You”, and “Good” appear sequentially in the second step can also be set to be replaced with as long as the sequence includes "Shi", “Jie”, “You”, and “Good”
  • the image can be the person who meets the authentication rules, so even if it is mixed with other video images, it is not considered to be an authentication failure.
  • the third step is to determine whether there is a limb motion image of the scissors hand.
  • the setting module 205 can also provide a user with a real-time preview through a display unit, so that the user can adjust and memorize the video actions recorded by himself. After the facial image and video action recording is completed, it is uploaded to the authentication server 1 for storage.
  • the determination module 203 makes a determination according to the rules set by the setting module 205.
  • the authentication process may be leaked. You can also reset the new video action as the video action key according to the key modification interface provided by the server, and upload it to the server for the next time. Enabled.
  • the reminder module 206 is configured to record the current photo or video data when the security authentication fails, mark it as alarm information, and perform a preset email reminder or short message reminder.
  • the alarm module 206 when the number of authentication failures exceeds three times, the photo or video data generated during the authentication process is stored as alarm information.
  • the alarm module 206 when the security authentication fails, the alarm module 206 also sends the alarm information to a specified person by email or text message according to a preset alarm information reminding function, and locks the authentication system. No more certification within 1 hour.
  • the authentication server 1 can determine whether the video data includes a video image of preset video data by recording videos based on the authentication of general living body detection and face recognition, and the video. Whether the arrangement order and time limit of the video images of the data meets the preset conditions. When the video images containing the video data meet the preset conditions, the authentication is determined to pass, thereby improving the security of the authentication.
  • this application also proposes a security authentication method.
  • FIG. 4 is a schematic flowchart of an embodiment of a security authentication method of the present application.
  • the execution order of the steps in the flowchart shown in FIG. 4 may be changed, and some steps may be omitted.
  • Step S500 Set at least one of an expression image, a mouth image, and a limb motion image in the video authentication rule and the video authentication rule.
  • the authentication server 1 provides the user with settings for video authentication rules and at least one of an expression image, a mouth image, and a limb motion image in the video authentication rules.
  • a user wants to set video authentication rules to: within 30 seconds, smile, then say "hello world" at a constant speed and end with a scissors hand.
  • step S500 can receive the user's setting instruction, and the video data recorded during the authentication process will be analyzed in the order of the recording time, and a judgment step will be automatically generated: the first step is to determine whether a smile expression image appears; if detected The smiling emoticon image proceeds to the second step. If the smiling emoticon image is not detected, the authentication fails, and the authentication ends.
  • the second step is to determine whether the mouth image has changed after the smiley facial image appears, and the change of the mouth image must include the mouth images of "world”, “world”, “you”, and “good” in order.
  • the time interval between the two images of the "world”, “world”, “you”, and “good” are compared respectively; when the mouth image is detected, the "world”, “world”, “you”, and “good” are not sequentially included.
  • the authentication fails, and the authentication ends; if so, it continues to determine whether the time interval difference between the two images of the "world”, “world”, “you”, and “good” is less than a preset first A threshold, such as 1 second; if the time difference between the two images of the "world”, “boundary”, “you", and “good” is less than a preset threshold, the third step is performed, otherwise an authentication failure is prompted , The authentication is over.
  • a preset first A threshold such as 1 second
  • the third step is performed, otherwise an authentication failure is prompted , The authentication is over.
  • the second step when judging that the images of "world”, “world”, “you”, and “good” appear sequentially, it may also be determined whether the total time of the images of "world”, “world”, “you”, and “good” appears.
  • the third step is performed, otherwise the authentication fails and the authentication ends.
  • a preset threshold such as 10 seconds
  • the rule that the images of "Shi”, “Jie”, “You”, and “Good” appear sequentially in the second step can also be set to be replaced with as long as the sequence includes "Shi", “Jie”, “You”, and “Good”
  • the image can be the person who meets the authentication rules, so even if it is mixed with other video images, it is not considered to be an authentication failure.
  • the third step is to determine whether there is a limb motion image of the scissors hand.
  • the setting module 205 can also provide a user with a real-time preview through a display unit, so that the user can adjust and memorize the video actions recorded by himself. After the facial image and video action recording is completed, it is uploaded to the authentication server 1 for storage. In addition, after the user passes the identity authentication, the authentication process may be leaked. You can also reset the new video action as the video action key according to the key modification interface provided by the server, and upload it to the server for the next time. Enabled.
  • Step S502 Receive a security authentication request.
  • this step receives the security authentication request input by the user or passed through the human-computer interaction interface interface provided by the authentication server 1 or the network interface 13 connected to other electronic devices such as a mobile terminal.
  • step S504 live detection and face recognition are performed.
  • a live detection is performed on an object in a preset window.
  • the security authentication fails, and the authentication process ends.
  • the camera unit further takes a face photo of the preset window, and then compares the face photo with a preset user face photo, and judges the person. Whether the similarity between the face photo and the preset user face photo is greater than or equal to a preset third threshold, such as 85%. When the similarity is greater than or equal to the third threshold, the next authentication is performed; otherwise, the security authentication fails, and the authentication process ends.
  • step S506 video recording is started according to the security authentication request, and video data within a preset time period is recorded.
  • the video data includes at least the arrangement order and duration of the video images.
  • step S504 After the authentication in step S504 is passed, the camera unit is turned on, and then video recording is performed against a preset window, and video data captured by the camera unit within a preset time period is recorded.
  • a certain reminder before recording the video data within a preset period of time, a certain reminder will be performed, such as a voice announcement "Start Authentication", so that the user knows that the authentication process starts.
  • step S508 it is determined whether the video image in the video data conforms to a preset video authentication rule, and when the video image conforms to a preset video authentication rule, it is determined that the security authentication has passed and the corresponding authority is opened.
  • the video authentication rule at least includes that the arrangement order of the video images conforms to a preset arrangement order of the video images, and the duration of the video images meets a preset time limit.
  • step S508 determines the video data recorded in step S506.
  • step S508 determines whether the video image in the video data conforms to a preset video authentication rule, and when the video image conforms to a preset video authentication rule, it is determined that the security authentication has passed and the corresponding Permissions.
  • the video authentication rule includes an arrangement order and time limit of video images of video data
  • step S508 analyzes the video data recorded in step S506 in the order of the recording time: the first step is to determine whether a smiling expression image appears; if a smiling expression image is detected, the second step is performed; if no smiling image is detected The emoticon image indicates that authentication failed, and authentication ends.
  • the second step is to determine whether the mouth image has changed after the smiley facial image appears, and the change of the mouth image must include the mouth images of "world”, “world”, “you”, and "good” in order.
  • the time interval between the two images of the "world”, “world”, “you”, and “good” are compared respectively; when the mouth image is detected, the "world”, “world”, “you”, and “good” are not sequentially included.
  • the authentication fails, and the authentication ends; if so, it continues to determine whether the time interval difference between the two images of the "world”, “world”, “you”, and “good” is less than a preset first A threshold, such as 1 second; if the time difference between the two images of the "world”, “boundary”, “you”, and “good” is less than a preset threshold, the third step is performed, otherwise an authentication failure is prompted , The authentication is over.
  • the second step when judging that the images of “world”, “world”, “you”, and “good” appear sequentially, it may also be determined whether the total time of the images of “world”, “world”, “you”, and “good” is Less than a preset threshold, such as 10 seconds, when the total time of the "world”, “world”, “you”, and “good” images is less than 10 seconds, the third step is performed, otherwise the authentication fails and the authentication ends.
  • a preset threshold such as 10 seconds
  • the rule that the images of "Shi”, “Jie”, “You”, and “Good” appear sequentially in the second step can also be set to be replaced with as long as the sequence includes "Shi", “Jie”, “You”, and “Good”
  • the image can be the person who meets the authentication rules, so even if it is mixed with other video images, it is not considered to be an authentication failure.
  • the third step is to determine whether there is a limb motion image of the scissors hand. When the image of the scissors hand is detected and the similarity with the preset scissors hand image is greater than the second threshold, such as 90%, the security certification is passed and the corresponding Authority, otherwise it prompts authentication failure and authentication ends. Among them, during the first step to the third step, if it is not completed, but it has exceeded the preset 30 seconds, the authentication failure is also prompted.
  • step S510 when the security authentication fails, the current photo or video data is recorded, marked as alarm information, and a preset email reminder or short message reminder is performed.
  • step S510 when the security authentication fails, according to a preset alarm information reminding function, the alarm information is sent to a specified person by email or SMS, and the authentication system is locked, within 1 hour. No longer certified.
  • the security authentication method proposed in this embodiment determines whether the video data includes a video image of preset video data by recording video on the basis of authentication of general living body detection and face recognition, and the video data Whether the arrangement order and time limit of the video images meet the preset conditions. When the video images containing video data meet the preset conditions, the authentication is determined to pass, thereby improving the security of the authentication.
  • the methods in the above embodiments can be implemented by means of software plus a necessary universal hardware platform, and of course, also by hardware, but in many cases the former is better.
  • Implementation Based on such an understanding, the technical solution of this application that is essentially or contributes to the existing technology can be embodied in the form of a software product that is stored in a storage medium (such as ROM / RAM, magnetic disk, The optical disc) includes several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in the embodiments of the present application.
  • a terminal device which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

一种安全认证方法、认证服务器及计算机可读存储介质,该方法包括:接收安全认证请求(S502);根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据(S506);判断所述视频数据中的视频图像是否符合预设的视频认证规则;当所述视频图像符合预设的视频认证规则时,则判定安全认证通过并开放相应的权限(S508)。该方法能够通过在视频认证中判断视频数据中是否包含预设的视频数据的视频图像,以及该视频数据的视频图像的排列顺序及时间限制是否符合预设条件,在包含视频数据的视频图像并符合预设条件时则判定认证通过,从而提高认证的安全性。

Description

安全认证方法、认证服务器及计算机可读存储介质
本申请要求于2018年5月23日提交中国专利局,申请号为201810501181.4、发明名称为“安全认证方法、认证服务器及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及安全认证技术领域,尤其涉及一种安全认证方法及认证服务器。
背景技术
随着互联网的发展,人们的生活变得更加便利,网络社交、网络购物、互联网金融等服务层出不穷。与此同时,互联网安全也成为人们关注的问题,人们都希望在享受互联网服务的同时,个人利益不受侵害。这也对互联网服务的安全性提出了更高的要求,如何证明“正在使用服务的用户是合法的”就成为了一个重要的问题。互联网服务一般使用密码机制验证用户的合法性,但这种机制的问题也很明显:密码破解、密码泄露等问题会导致非法用户被认为合法。因此,一种安全可靠,简单易行的安全认证方法是迫切需要的。
发明内容
有鉴于此,本申请提出一种认证服务器,能够通过在视频认证中判断视频数据中是否包含预设的视频数据的的视频图像,以及该视频数据的视频图像的排列顺序及时间限制是否符合预设条件,在包含视频数据的视频图像并符合预设条件时则判定认证通过,从而提高认证的安全性。
首先,为实现上述目的,本申请提出一种认证服务器,所述认证服务器包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的安全 认证程序,所述安全认证程序被所述处理器执行时实现如下步骤:
接收安全认证请求;根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据,所述视频数据至少包括视频图像的排列顺序和时长;判断所述视频数据中的视频图像是否符合预设的视频认证规则,其中,所述视频认证规则至少包括所述视频图像的排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制;当所述视频图像排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制时,则判定安全认证通过并开放相应的权限。
此外,为实现上述目的,本申请还提供一种安全认证方法,该方法应用于认证服务器,所述方法包括步骤:
接收安全认证请求;根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据,所述视频数据至少包括视频图像的排列顺序和时长;判断所述视频数据中的视频图像是否符合预设的视频认证规则,其中,所述视频认证规则至少包括所述视频图像的排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制;当所述视频图像排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制时,则判定安全认证通过并开放相应的权限。
进一步地,为实现上述目的,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质存储有安全认证程序,所述安全认证程序可被至少一个处理器执行,以使所述至少一个处理器执行如上述的安全认证方法的步骤。
附图说明
图1是认证服务器一可选的硬件架构的示意图;
图2是本申请安全认证程序第一实施例的程序模块示意图;
图3是本申请安全认证程序第二实施例的程序模块示意图;
图4是本申请安全认证方法一实施例的流程示意图。
附图标记:
认证服务器 1
存储器 11
处理器 12
网络接口 13
安全认证程序 200
接收模块 201
记录模块 202
判断模块 203
检测模块 204
设置模块 205
提醒模块 206
本申请目的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
需要说明的是,在本申请中涉及“第一”、“第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数 量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本申请要求的保护范围之内。
参阅图1所示,是认证服务器1一可选的硬件架构的示意图。
所述认证服务器1可以是机架式服务器、刀片式服务器、塔式服务器或机柜式服务器等计算设备,该认证服务器1可以是独立的服务器,也可以是多个服务器所组成的服务器集群。
本实施例中,所述认证服务器1可包括,但不仅限于,可通过系统总线相互通信连接存储器11、处理器12、网络接口13。
所述认证服务器1通过网络接口13连接网络(图1未标出),或者连接到其他电子装置,以获取或传递包括待认证视频或者图像,以及安全认证请求在内的所有资讯。所述网络可以是企业内部网(Intranet)、互联网(Internet)、全球移动通讯系统(Global System of Mobile communication,GSM)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、4G网络、5G网络、蓝牙(Bluetooth)、Wi-Fi、通话网络等无线或有线网络。
需要指出的是,图1仅示出了具有组件11-13的认证服务器1,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。
其中,所述存储器11至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、随机访问存储器(RAM)、静态随机访问存储器(SRAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、可编程只读存储器(PROM)、磁性存储器、磁盘、光盘等。在一些实施例中,所述存储器11可以是所述认证服务器1的内部存储单元,例如该认证服务器1的硬盘或内存。在另一些实施例中,所述存储器11也可以是所述认证服务器1的外部存储设备,例如该认证服 务器1配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。当然,所述存储器11还可以既包括所述认证服务器1的内部存储单元也包括其外部存储设备。本实施例中,所述存储器11通常用于存储安装于所述认证服务器1的操作系统和各类应用软件,例如安全认证程序200的程序代码等。此外,所述存储器11还可以用于暂时地存储已经输出或者将要输出的各类数据。
所述处理器12在一些实施例中可以是中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器、或其他数据处理芯片。该处理器12通常用于控制所述认证服务器1的总体操作,例如执行数据交互或者通信相关的控制和处理等。本实施例中,所述处理器12用于运行所述存储器11中存储的程序代码或者处理数据,例如运行所述的安全认证程序200等。
所述网络接口13可包括无线网络接口或有线网络接口,该网络接口13用于在所述认证服务器1、个人移动终端或者其他电子装置之间建立通信连接。
本实施例中,当所述认证服务器1内安装并运行有安全认证程序200时,当所述安全认证程序200运行时,所述认证服务器1能够通过在视频认证中判断视频数据中是否包含预设的视频数据的的视频图像,以及该视频数据的视频图像的排列顺序及时间限制是否符合预设条件,在包含视频数据的视频图像并符合预设条件时则判定认证通过,从而提高认证的安全性。
至此,己经详细介绍了本申请各个实施例的应用环境和相关设备的硬件结构和功能。下面,将基于上述应用环境和相关设备,提出本申请的各个实施例。
首先,本申请提出一种安全认证程序200。
参阅图2所示,是本申请安全认证程序200第一实施例的程序模块图。
本实施例中,所述安全认证程序200包括一系列的存储于存储器11上的计算机程序指令,当该计算机程序指令被处理器12执行时,可以实现本申请各实施例的安全认证操作。在一些实施例中,基于该计算机程序指令各部分所 实现的特定的操作,安全认证程序200可以被划分为一个或多个模块。例如,在图2中,所述安全认证程序200可以被分割成接收模块201、记录模块202和判断模块203。其中:
所述接收模块201,用于接收安全认证请求。
具体地,所述接收模块201可以认为是所述认证服务器1提供给用户进行安全认证请求的例如人机交互界面等的接口,或者接收用户在其他移动终端等电子装置通过网络接口13传递过来的安全认证请求。
所述记录模块202,用于根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据。所述视频数据至少包括视频图像的排列顺序和时长。
具体地,当所述接收模块201接收到所述安全认证请求之后,则会开启摄像单元,然后对着预设的窗口进行视频录制,记录预设时间段内所述摄像单元拍摄的视频数据。当然,在其他实施例中,所述记录模块202在记录预设时间段内的视频数据之前,还会进行一定的提醒,比如语音播报“开始认证”等以使得用户知道认证过程开始。
所述判断模块203,用于判断所述视频数据中的视频图像是否符合预设的视频认证规则,并在所述视频图像符合预设的视频认证规则时,则判定安全认证通过并开放相应的权限。其中,所述视频认证规则包括视频数据的视频图像、所述视频数据的视频图像的排列顺序、及所述视频数据的视频图像的时间限制。
具体的,当完成认证过程之后,所述判断模块203则对所述记录模块202所记录的视频数据进行判断。在本实施例中,所述判断模块203判断所述视频数据的视频图像是否符合预设的视频认证规则,即判断所述视频数据中是否包括预设的视频数据的视频图像,然后判断所述视频数据的视频图像的排列顺序一致,以及判断该组所述视频数据的视频图像的时间限制是否在预设范围内。当所述视频图像符合以上全部的视频认证规则时,则判定安全认证通过并开放相应的权限。
例如,当视频认证规则为:在30秒中内,微笑,然后匀速说“世界你好”并以剪刀手结束。则所述判断模块203对所述记录模块202记录的视频数据按照记录时间的先后顺序进行分析:第一步,判断是否出现微笑的表情图像;如果检测到微笑的表情图像则进行第二步,如果未检测到微笑的表情图像,则提示认证失败,认证结束。第二步,判断在微笑的表情图像出现之后,检测口型图像是否发生变化,且口型图像的变化要依次包括“世”“界”“你”“好”的口型图像,另外,所述“世”“界”“你”“好”的图像的两两之间的时间间隔分别进行比较;当检测到口型图像并不是依次包括“世”“界”“你”“好”的口型图像时,则提示认证失败,认证结束;如果是,则继续判断所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的第一阈值,比如1秒;当所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的阈值,则进行第三步,否则提示认证失败,认证结束。当然,第二步在判断依次出现“世”“界”“你”“好”的图像时,还可以是判断所述“世”“界”“你”“好”的图像的总的时间是否小于预设的阈值,比如10秒,当所述“世”“界”“你”“好”的图像的总的时间小于10秒,则进行第三步,否则提示认证失败,认证结束。在其他实施例中,第二步所述依次出现“世”“界”“你”“好”的图像的规则还可以设置为替换为只要顺序包括“世”“界”“你”“好”的图像则可以人物是符合认证规则,所以即使掺有其他视频图像也并不认为是认证失败。第三步,判断是否出现剪刀手的肢体动作图像,当检测到剪刀手的图像并与预设的剪刀手的图像相似度大于第二阈值,比如90%时,则安全认证通过,开放相应的权限,否则提示认证失败,认证结束。其中,第一步到第三步的过程中,如果没进行完成,但是已经超出了预设的30秒钟了,则同样提示认证失败。
从上文可知,所述认证服务器1能够通过在视频认证中判断视频数据中是否包含预设的视频数据的的视频图像,以及该视频数据的视频图像的排列顺序及时间限制是否符合预设条件,在包含视频数据的视频图像并符合预设条 件时则判定认证通过,从而提高认证的安全性。
参阅图3所示,是本申请安全认证程序200第二实施例的程序模块图。本实施例中,所述的安全认证程序200除了包括第一实施例中的所述接收模块201、记录模块202、判断模块203之外,还包括检测模块204、设置模块205以及提醒模块206。
所述接收模块201、记录模块202及判断模块203与所述安全认证程序200第一实施例中的对应的程序模块功能相同。除此之外,本申请安全认证程序200第二实施例还包括有检测模块204、设置模块205及提醒模块206,用于提供用户在安全认证过程的更方便地应用体验。
所述检测模块204,用于进行活体检测以及人脸识别。
具体的,在所述接收模块201接收到所述安全认证请求之后,以及记录模块202开启视频录制之前,所述检测模块204会对预设窗口的对象进行活体检测,当活体检测不通过时,则安全认证失败,结束认证过程。当活体检测通过时,则所述检测模块204还会通过摄像单元首先对该预设窗口拍摄一张人脸照片,然后将该人脸照片与预设的用户人脸照片进行比对,并判断所述人脸照片是否与预设的用户人脸照片相似度是否大于或等于预设的第三阈值,比如85%。当所述相似度大于或等于所述第三阈值时,才会进行下一步认证;否则安全认证失败,结束认证过程。
所述设置模块205,用于设置视频认证规则以及视频认证规则中的表情图像、口型图像以及肢体动作图像中的至少一种。
具体的,整个的安全认证过程之前,所述认证服务器1提供给用户进行视频认证规则的设置,以及视频认证规则中的表情图像、口型图像以及肢体动作图像中的至少一种的设置。例如,用户想要将视频认证规则设置为:在30秒中内,微笑,然后匀速说“世界你好”并以剪刀手结束。则所述设置模块205能够接收用户的设置指令,将会对认证过程中记录的视频数据按照记录时间的先后顺序进行分析,并自动生成判断步骤:第一步,判断是否出现微笑 的表情图像;如果检测到微笑的表情图像则进行第二步,如果未检测到微笑的表情图像,则提示认证失败,认证结束。第二步,判断在微笑的表情图像出现之后,检测口型图像是否发生变化,且口型图像的变化要依次包括“世”“界”“你”“好”的口型图像,另外,所述“世”“界”“你”“好”的图像的两两之间的时间间隔分别进行比较;当检测到口型图像并不是依次包括“世”“界”“你”“好”的口型图像时,则提示认证失败,认证结束;如果是,则继续判断所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的第一阈值,比如1秒;当所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的阈值,则进行第三步,否则提示认证失败,认证结束。当然,第二步在判断依次出现“世”“界”“你”“好”的图像时,还可以是判断所述“世”“界”“你”“好”的图像的总的时间是否小于预设的阈值,比如10秒,当所述“世”“界”“你”“好”的图像的总的时间小于10秒,则进行第三步,否则提示认证失败,认证结束。在其他实施例中,第二步所述依次出现“世”“界”“你”“好”的图像的规则还可以设置为替换为只要顺序包括“世”“界”“你”“好”的图像则可以人物是符合认证规则,所以即使掺有其他视频图像也并不认为是认证失败。第三步,判断是否出现剪刀手的肢体动作图像,当检测到剪刀手的图像并与预设的剪刀手的图像相似度大于第二阈值,比如90%时,则安全认证通过,开放相应的权限,否则提示认证失败,认证结束。其中,第一步到第三步的过程中,如果没进行完成,但是已经超出了预设的30秒钟了,则同样提示认证失败。其中,在设置视频认证规则时,所述设置模块205还可以通过显示单元供用户进行实时预览,从而便于用户对自己录制的视频动作进行调整和记忆。人脸图像和视频动作录制完成后,上传到所述认证服务器1进行存储。因此,在设置模块205设置完成之后,所述判断模块203才会根据该设置模块205的设置的规则进行判断。另外,当用户通过身份认证之后,觉得该认证过程有可能泄密了,也可以根据服务器提供的修改密钥的界面,重新设置新的视频动作作为视频动作密钥,并上传 到服务器以备下次启用。
所述提醒模块206,用于当安全认证失败时,记录当前的照片或者视频数据,标记为警报信息,并进行预设的邮件提醒或短信提醒。
具体的,在认证过程中,当认证失败的次数超过3次时,则将该次认证过程中产生的照片或者视频数据作为警报信息存储起来。在本实施例中,所述提醒模块206还会在当安全认证失败时,根据预设的警报信息提醒功能,将该警报信息以邮件或者短信的方式发送给指定的人,并锁定认证系统,1小时内不再认证。
也就是说,所述认证服务器1能够将通过在一般的活体检测和人脸识别的认证基础上,再通过记录视频,判断视频数据中是否包含预设的视频数据的的视频图像,以及该视频数据的视频图像的排列顺序及时间限制是否符合预设条件,在包含视频数据的视频图像并符合预设条件时则判定认证通过,从而提高认证的安全性。
此外,本申请还提出一种安全认证方法。
参阅图4所示,是本申请安全认证方法一实施例的流程示意图。在本实施例中,根据不同的需求,图4所示的流程图中的步骤的执行顺序可以改变,某些步骤可以省略。
步骤S500,设置视频认证规则以及视频认证规则中的表情图像、口型图像以及肢体动作图像中的至少一种。
具体的,整个的安全认证过程之前,所述认证服务器1提供给用户进行视频认证规则的设置,以及视频认证规则中的表情图像、口型图像以及肢体动作图像中的至少一种的设置。例如,用户想要将视频认证规则设置为:在30秒中内,微笑,然后匀速说“世界你好”并以剪刀手结束。则步骤S500能够接收用户的设置指令,将会对认证过程中记录的视频数据按照记录时间的先后顺序进行分析,并自动生成判断步骤:第一步,判断是否出现微笑的表情图像;如果检测到微笑的表情图像则进行第二步,如果未检测到微笑的表情 图像,则提示认证失败,认证结束。第二步,判断在微笑的表情图像出现之后,检测口型图像是否发生变化,且口型图像的变化要依次包括“世”“界”“你”“好”的口型图像,另外,所述“世”“界”“你”“好”的图像的两两之间的时间间隔分别进行比较;当检测到口型图像并不是依次包括“世”“界”“你”“好”的口型图像时,则提示认证失败,认证结束;如果是,则继续判断所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的第一阈值,比如1秒;当所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的阈值,则进行第三步,否则提示认证失败,认证结束。当然,第二步在判断依次出现“世”“界”“你”“好”的图像时,还可以是判断所述“世”“界”“你”“好”的图像的总的时间是否小于预设的阈值,比如10秒,当所述“世”“界”“你”“好”的图像的总的时间小于10秒,则进行第三步,否则提示认证失败,认证结束。在其他实施例中,第二步所述依次出现“世”“界”“你”“好”的图像的规则还可以设置为替换为只要顺序包括“世”“界”“你”“好”的图像则可以人物是符合认证规则,所以即使掺有其他视频图像也并不认为是认证失败。第三步,判断是否出现剪刀手的肢体动作图像,当检测到剪刀手的图像并与预设的剪刀手的图像相似度大于第二阈值,比如90%时,则安全认证通过,开放相应的权限,否则提示认证失败,认证结束。其中,第一步到第三步的过程中,如果没进行完成,但是已经超出了预设的30秒钟了,则同样提示认证失败。其中,在设置视频认证规则时,所述设置模块205还可以通过显示单元供用户进行实时预览,从而便于用户对自己录制的视频动作进行调整和记忆。人脸图像和视频动作录制完成后,上传到所述认证服务器1进行存储。另外,当用户通过身份认证之后,觉得该认证过程有可能泄密了,也可以根据服务器提供的修改密钥的界面,重新设置新的视频动作作为视频动作密钥,并上传到服务器以备下次启用。
步骤S502,接收安全认证请求。
具体地,该步骤通过所述认证服务器1提供的人机交互界面接口,或者与 其他移动终端等电子装置连接的网络接口13,接收用户输入或者传递过来的安全认证请求。
步骤S504,进行活体检测以及人脸识别。
具体的,在接收到所述安全认证请求之后,则会对预设窗口的对象进行活体检测,当活体检测不通过时,则安全认证失败,结束认证过程。当活体检测通过时,则进一步地还会通过摄像单元首先对该预设窗口拍摄一张人脸照片,然后将该人脸照片与预设的用户人脸照片进行比对,并判断所述人脸照片是否与预设的用户人脸照片相似度是否大于或等于预设的第三阈值,比如85%。当所述相似度大于或等于所述第三阈值时,才会进行下一步认证;否则安全认证失败,结束认证过程。
步骤S506,根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据。所述视频数据至少包括视频图像的排列顺序和时长。
具体地,当通过步骤步骤S504的认证之后,则会开启摄像单元,然后对着预设的窗口进行视频录制,记录预设时间段内所述摄像单元拍摄的视频数据。当然,在其他实施例中,记录预设时间段内的视频数据之前,还会进行一定的提醒,比如语音播报“开始认证”等以使得用户知道认证过程开始。
步骤S508,判断所述视频数据中的视频图像是否符合预设的视频认证规则,并在所述视频图像符合预设的视频认证规则时,则判定安全认证通过并开放相应的权限。其中,所述视频认证规则至少包括所述视频图像的排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制。
具体的,当完成认证过程之后,步骤S508则会对步骤S506记录的视频数据进行判断。在本实施例中,步骤S508判断所述视频数据中的视频图像是否符合预设的视频认证规则,并在所述视频图像符合预设的视频认证规则时,则判定安全认证通过并开放相应的权限。其中,所述视频认证规则包括视频数据的视频图像的排列顺序及时间限制,
例如,当视频认证规则为:在30秒中内,微笑,然后匀速说“世界你好”并以剪刀手结束。则步骤S508对步骤S506记录的视频数据按照记录时间的先后顺序进行分析:第一步,判断是否出现微笑的表情图像;如果检测到微笑的表情图像则进行第二步,如果未检测到微笑的表情图像,则提示认证失败,认证结束。第二步,判断在微笑的表情图像出现之后,检测口型图像是否发生变化,且口型图像的变化要依次包括“世”“界”“你”“好”的口型图像,另外,所述“世”“界”“你”“好”的图像的两两之间的时间间隔分别进行比较;当检测到口型图像并不是依次包括“世”“界”“你”“好”的口型图像时,则提示认证失败,认证结束;如果是,则继续判断所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的第一阈值,比如1秒;当所述“世”“界”“你”“好”的图像的两两之间的时间间隔差是否小于预设的阈值,则进行第三步,否则提示认证失败,认证结束。当然,第二步在判断依次出现“世”“界”“你”“好”的图像时,还可以是判断所述“世”“界”“你”“好”的图像的总的时间是否小于预设的阈值,比如10秒,当所述“世”“界”“你”“好”的图像的总的时间小于10秒,则进行第三步,否则提示认证失败,认证结束。在其他实施例中,第二步所述依次出现“世”“界”“你”“好”的图像的规则还可以设置为替换为只要顺序包括“世”“界”“你”“好”的图像则可以人物是符合认证规则,所以即使掺有其他视频图像也并不认为是认证失败。第三步,判断是否出现剪刀手的肢体动作图像,当检测到剪刀手的图像并与预设的剪刀手的图像相似度大于第二阈值,比如90%时,则安全认证通过,开放相应的权限,否则提示认证失败,认证结束。其中,第一步到第三步的过程中,如果没进行完成,但是已经超出了预设的30秒钟了,则同样提示认证失败。
步骤S510,当安全认证失败时,记录当前的照片或者视频数据,标记为警报信息,并进行预设的邮件提醒或短信提醒。
具体的,在认证过程中,当认证失败的次数超过3次时,则将该次认证过 程中产生的照片或者视频数据作为警报信息存储起来。在本实施例中,步骤S510还会在当安全认证失败时,根据预设的警报信息提醒功能,将该警报信息以邮件或者短信的方式发送给指定的人,并锁定认证系统,1小时内不再认证。
本实施例所提出的安全认证方法,通过在一般的活体检测和人脸识别的认证基础上,再通过记录视频,判断视频数据中是否包含预设的视频数据的的视频图像,以及该视频数据的视频图像的排列顺序及时间限制是否符合预设条件,在包含视频数据的视频图像并符合预设条件时则判定认证通过,从而提高认证的安全性。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (20)

  1. 一种安全认证方法,应用于认证服务器,其特征在于,所述方法包括步骤:
    接收安全认证请求;
    根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据,所述视频数据至少包括视频图像的排列顺序和时长;
    判断所述视频数据中的视频图像是否符合预设的视频认证规则,其中,所述视频认证规则至少包括所述视频图像的排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制;
    当所述视频图像排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制时,则判定安全认证通过并开放相应的权限。
  2. 如权利要求1所述的安全认证方法,其特征在于,在所述根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据步骤之前,还包括步骤:
    启动活体检测器进行活体检测;
    当活体检测不通过时,则安全认证失败,结束认证过程;
    当活体检测通过时,则根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据。
  3. 如权利要求2所述的安全认证方法,其特征在于,所述方法包括步骤:
    当活体检测通过时,拍摄一张人脸照片;
    判断所述人脸照片是否与预设的用户人脸照片相似度是否大于或等于预设的阈值;
    当小于预设的阈值时,则安全认证失败,结束认证过程。
  4. 如权利要求1所述的安全认证方法,其特征在于,所述视频数据的视频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  5. 如权利要求2所述的安全认证方法,其特征在于,所述视频数据的视 频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  6. 如权利要求3所述的安全认证方法,其特征在于,所述视频数据的视频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  7. 如权利要求4-6任一项所述的安全认证方法,其特征在于,所述方法包括步骤:
    当安全认证失败时,记录当前的照片或者视频数据,标记为警报信息,并进行预设的邮件提醒或短信提醒。
  8. 一种认证服务器,其特征在于,所述认证服务器包括存储器、处理器、以及所述存储器上存储有可在所述处理器上运行的安全认证程序,所述安全认证程序被所述处理器执行时实现如下步骤:
    接收安全认证请求;
    根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据,所述视频数据至少包括视频图像的排列顺序和时长;
    判断所述视频数据中的视频图像是否符合预设的视频认证规则,其中,所述视频认证规则至少包括所述视频图像的排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制;
    当所述视频图像排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制时,则判定安全认证通过并开放相应的权限。
  9. 如权利要求8所述的认证服务器,其特征在于,在所述根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据步骤之前,所述安全认证程序被所述处理器执行时还实现如下步骤:
    启动活体检测器进行活体检测;
    当活体检测不通过时,则安全认证失败,结束认证过程;
    当活体检测通过时,则根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据。
  10. 如权利要求9所述的认证服务器,其特征在于,所述安全认证程序被 所述处理器执行时还实现如下步骤:
    当活体检测通过时,拍摄一张人脸照片;
    判断所述人脸照片是否与预设的用户人脸照片相似度是否大于或等于预设的阈值;
    当小于预设的阈值时,则安全认证失败,结束认证过程。
  11. 如权利要求8所述的认证服务器,其特征在于,所述视频数据的视频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  12. 如权利要求9所述的认证服务器,其特征在于,所述视频数据的视频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  13. 如权利要求10所述的认证服务器,其特征在于,所述视频数据的视频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  14. 如权利要求11-13任一项所述的认证服务器,其特征在于,所述安全认证程序被所述处理器执行时还实现如下步骤:
    当安全认证失败时,记录当前的照片或者视频数据,标记为警报信息,并进行预设的邮件提醒或短信提醒。
  15. 一种计算机可读存储介质,所述计算机可读存储介质存储有安全认证程序,所述安全认证程序可被至少一个处理器执行,以使所述至少一个处理器执行如下步骤:
    接收安全认证请求;
    根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据,所述视频数据至少包括视频图像的排列顺序和时长;
    判断所述视频数据中的视频图像是否符合预设的视频认证规则,其中,所述视频认证规则至少包括所述视频图像的排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制;
    当所述视频图像排列顺序符合预设的视频图像的排列顺序,且所述视频图像的时长满足预设时间限制时,则判定安全认证通过并开放相应的权限。
  16. 如权利要求15所述的计算机可读存储介质,其特征在于,在所述根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据步骤之前,所述安全认证程序被所述处理器执行时还实现如下步骤:
    启动活体检测器进行活体检测;
    当活体检测不通过时,则安全认证失败,结束认证过程;
    当活体检测通过时,则根据所述安全认证请求开启视频录制,记录预设时间段内的视频数据。
  17. 如权利要求16所述的计算机可读存储介质,其特征在于,所述安全认证程序被所述处理器执行时还实现如下步骤:
    当活体检测通过时,拍摄一张人脸照片;
    判断所述人脸照片是否与预设的用户人脸照片相似度是否大于或等于预设的阈值;
    当小于预设的阈值时,则安全认证失败,结束认证过程。
  18. 如权利要求15所述的计算机可读存储介质,其特征在于,所述视频数据的视频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  19. 如权利要求16或17所述的计算机可读存储介质,其特征在于,所述视频数据的视频图像包括表情图像、口型图像以及肢体动作图像中的至少一种。
  20. 如权利要求19所述的计算机可读存储介质,其特征在于,所述安全认证程序被所述处理器执行时还实现如下步骤:
    当安全认证失败时,记录当前的照片或者视频数据,标记为警报信息,并进行预设的邮件提醒或短信提醒。
PCT/CN2018/102206 2018-05-23 2018-08-24 安全认证方法、认证服务器及计算机可读存储介质 WO2019223149A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810501181.4A CN108830058A (zh) 2018-05-23 2018-05-23 安全认证方法、认证服务器及计算机可读存储介质
CN201810501181.4 2018-05-23

Publications (1)

Publication Number Publication Date
WO2019223149A1 true WO2019223149A1 (zh) 2019-11-28

Family

ID=64148437

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/102206 WO2019223149A1 (zh) 2018-05-23 2018-08-24 安全认证方法、认证服务器及计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN108830058A (zh)
WO (1) WO2019223149A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815944A (zh) * 2019-03-21 2019-05-28 娄奥林 一种针对人工智能对视频面部替换识别的防御方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140298368A1 (en) * 2013-03-27 2014-10-02 Samsung Techwin Co., Ltd. Authentication system and method of operating the same
CN104751110A (zh) * 2013-12-31 2015-07-01 汉王科技股份有限公司 一种活体检测方法和装置
CN105590043A (zh) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 身份验证方法、装置及系统
CN105871900A (zh) * 2016-05-24 2016-08-17 邵军利 一种身份认证方法及系统
CN106713368A (zh) * 2017-03-08 2017-05-24 四川大学 一种身份验证方法及装置

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114909B (zh) * 2007-08-17 2011-02-16 上海博康智能信息技术有限公司 全自动视频身份认证系统及方法
JP2009104599A (ja) * 2007-10-04 2009-05-14 Toshiba Corp 顔認証装置、顔認証方法、及び顔認証システム
CN102622588B (zh) * 2012-03-08 2013-10-09 无锡中科奥森科技有限公司 双验证人脸防伪方法及装置
CN104683302A (zh) * 2013-11-29 2015-06-03 国际商业机器公司 认证方法、认证装置、终端设备、认证服务器及系统
CN115457664A (zh) * 2015-01-19 2022-12-09 创新先进技术有限公司 一种活体人脸检测方法及装置
CN105718874A (zh) * 2016-01-18 2016-06-29 北京天诚盛业科技有限公司 活体检测及认证的方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140298368A1 (en) * 2013-03-27 2014-10-02 Samsung Techwin Co., Ltd. Authentication system and method of operating the same
CN104751110A (zh) * 2013-12-31 2015-07-01 汉王科技股份有限公司 一种活体检测方法和装置
CN105590043A (zh) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 身份验证方法、装置及系统
CN105871900A (zh) * 2016-05-24 2016-08-17 邵军利 一种身份认证方法及系统
CN106713368A (zh) * 2017-03-08 2017-05-24 四川大学 一种身份验证方法及装置

Also Published As

Publication number Publication date
CN108830058A (zh) 2018-11-16

Similar Documents

Publication Publication Date Title
US11069168B2 (en) Facial capture managing access to resources by a device
US10146922B2 (en) Access control of software applications based on biometric identifiers
US8914848B2 (en) Social authentication of users
US8970348B1 (en) Using sequences of facial gestures to authenticate users
US9569605B1 (en) Systems and methods for enabling biometric authentication options
US9781105B2 (en) Fallback identity authentication techniques
US10277588B2 (en) Systems and methods for authenticating a user based on self-portrait media content
US8959358B2 (en) User-based identification system for social networks
US20170118205A1 (en) User biological feature authentication method and system
WO2019200799A1 (zh) 短信验证码的推送方法、电子装置及可读存储介质
US20170364674A1 (en) Methods and systems for accessing a secure system
US10148631B1 (en) Systems and methods for preventing session hijacking
WO2018054387A1 (zh) 终端权限的管理方法和装置
US10735398B1 (en) Rolling code authentication techniques
CN109831695A (zh) 直播控制方法、装置、电子设备及存储介质
CN114612986A (zh) 检测方法、装置、电子设备及存储介质
US10116648B1 (en) User authentication
US20220070166A1 (en) Enhanced authentication techniques using virtual persona
WO2019223149A1 (zh) 安全认证方法、认证服务器及计算机可读存储介质
US20230386255A1 (en) Method and system for verifying image identification
JP6369324B2 (ja) 情報処理装置、制御方法、及びプログラム
US11163862B2 (en) Authentication of users based on snapshots thereof taken in corresponding acquisition conditions
US20220414193A1 (en) Systems and methods for secure adaptive illustrations
US9218495B1 (en) Systems and methods for sharing logs of a child's computer activities with a guardian of the child
US11809546B2 (en) Adaptive biometric authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18920154

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/03/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18920154

Country of ref document: EP

Kind code of ref document: A1