WO2020238534A1 - Procédé et dispositif d'autorisation de certificat de données, dispositif informatique et support d'enregistrement - Google Patents

Procédé et dispositif d'autorisation de certificat de données, dispositif informatique et support d'enregistrement Download PDF

Info

Publication number
WO2020238534A1
WO2020238534A1 PCT/CN2020/087474 CN2020087474W WO2020238534A1 WO 2020238534 A1 WO2020238534 A1 WO 2020238534A1 CN 2020087474 W CN2020087474 W CN 2020087474W WO 2020238534 A1 WO2020238534 A1 WO 2020238534A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
face
face image
data
learning model
Prior art date
Application number
PCT/CN2020/087474
Other languages
English (en)
Chinese (zh)
Inventor
古明涌
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020238534A1 publication Critical patent/WO2020238534A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Definitions

  • This application relates to the field of artificial intelligence technology, in particular to data credential authorization methods, devices, computer equipment and storage media.
  • this application provides a data voucher authorization method, device, computer equipment and storage medium.
  • a data certificate authorization method including:
  • Receiving a request from a user to obtain a data voucher obtaining a face image of the user, wherein the request includes voucher information of the data voucher to be obtained by the user;
  • the acquired credential information associated with the user’s face image query the acquired credential information associated with the user’s face image, where the acquired credential information includes the number of data vouchers acquired in the user’s history and the acquired The expiration time of the data certificate;
  • the data voucher is authorized to the user, and the acquired credential information of the user is updated and stored in association with the face image of the user.
  • a data certificate authorization device including:
  • the face image acquisition unit is configured to receive a user's request for acquiring data credentials, and acquire a face image of the user;
  • the credential information query unit is configured to query the acquired credential information associated with the face information of the user according to the face image of the user, wherein the acquired credential information includes the number of data vouchers that the user has acquired And the expiration time of the obtained data certificate;
  • the authorization information confirmation unit is configured to send the obtained credential information associated with the user's face information to the authorization confirmation server, so that the authorization confirmation server can perform authorization confirmation;
  • the data voucher authorization unit is configured to receive an authorization confirmation instruction from the authorization confirmation server, authorize the data voucher to the user, and associate the user's acquired credential information with the user's face image after updating storage.
  • a computer device including a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor executes the above Describe the steps of the data certificate authorization method.
  • a storage medium storing computer-readable instructions.
  • the one or more processors execute the data voucher authorization method. step.
  • Fig. 1 is a diagram of an implementation environment of a data credential authorization method provided in an embodiment.
  • Fig. 2 is a flow chart showing a method for authorizing a data voucher according to an exemplary embodiment.
  • FIG. 3 is a specific implementation flow chart of step S120 in the data voucher authorization method according to the embodiment corresponding to FIG. 2.
  • Fig. 4 is another specific implementation flowchart of step S120 in the data voucher authorization method according to the embodiment corresponding to Fig. 2.
  • Fig. 5 is a specific implementation flow chart of step S130 in the data voucher authorization method according to the embodiment corresponding to Fig. 2.
  • FIG. 6 is another specific implementation flowchart of step S130 in the data voucher authorization method according to the embodiment corresponding to FIG. 2.
  • Fig. 7 is a block diagram showing a data voucher authorization device according to an exemplary embodiment.
  • Fig. 8 schematically shows an exemplary block diagram of an electronic device for implementing the above-mentioned data credential authorization method.
  • Fig. 9 schematically shows a computer-readable storage medium for implementing the above-mentioned data credential authorization method.
  • FIG. 1 is an implementation environment diagram of a data credential authorization method provided in an embodiment. As shown in FIG. 1, the implementation environment includes a computer device 100, a user terminal 200, and an authorization confirmation server 300.
  • the computer device 100 is a data voucher management device, for example, a computer, a server, and other computer devices used by data voucher operation and maintenance personnel.
  • the user terminal 200 is installed with a client that performs a data credential authorization request. After the user submits the data credential authorization through the user terminal 200 running the client, the computer device 100 obtains the user's face image according to the authorization request, and then extracts the user's obtained credential information based on the face image, and then the user's obtained credential information The credential information is sent to the authorization confirmation server 300, and the authorization confirmation server 300 sends the authorization confirmation information to the computer device 100 after performing authorization confirmation according to the obtained credential information and the user's request for obtaining data credential. After receiving the authorization confirmation instruction from the authorization confirmation server, the computer device 100 authorizes the data voucher to the user, and updates the obtained credential information of the user and stores it in association with the face image of the user .
  • the authorization confirmation server 300, the user terminal 200, and the computer device 100 may be smart phones, tablet computers, notebook computers, desktop computers, etc., but are not limited thereto.
  • the computer device 100, the user terminal 200, and the authorization confirmation server 300 can be connected via Bluetooth, USB (Universal Serial Bus, Universal Serial Bus) or other communication connection methods, which is not limited in this application.
  • a data voucher authorization method is proposed.
  • the data voucher authorization method can be applied to the above-mentioned computer device 100, and specifically may include the following steps:
  • Step S110 receiving a request from a user to obtain a data voucher, and obtaining a face image of the user, where the request includes voucher information of the data voucher to be obtained by the user;
  • the user's face image After receiving the user's request for obtaining data credentials, first obtain the user's face image, which may be obtained by the camera device of the user terminal 200 or by the camera device of the computer device 100.
  • the user terminal 200 is the user's mobile phone. After the user sends a request for obtaining data credentials, the user follows the shooting guide displayed on the screen of his mobile phone to take a face image, and then captures the captured face The image is sent to the computer device 100.
  • the shooting guide is to ensure that the image captured by the user is the user's own, rather than randomly shooting other people's faces, and also to reduce the pressure of image processing in the subsequent face recognition process.
  • the user requests to obtain data voucher in the voucher granting hall
  • the user terminal 200 is a terminal device in the hall for users to operate.
  • the computer device 100 in the hall will automatically Get the user's face information.
  • the request includes the credential information of the data voucher to be obtained by the user, and the credential information of the data voucher to be obtained by the user may include the expiration time of the voucher to be obtained, the characteristic identifier, and the quantity to be obtained by the user. And so on in order to compare in subsequent steps.
  • Step S120 According to the face image of the user, query the acquired credential information associated with the face image of the user, where the acquired credential information includes the number of data vouchers acquired in the user history and all State the expiration time of the obtained data certificate;
  • the obtained voucher information may also include the expiration time of the obtained voucher, the characteristic identifier, and the number obtained by the user.
  • Step S130 Send the obtained credential information associated with the user’s face information and the user’s request for obtaining data credential to the authorization confirmation server, so that the authorization confirmation server is based on the obtained credential information and the user’s acquisition.
  • Data certificate request for authorization confirmation
  • the user's request for data credential acquisition and the acquired credential information associated with the user's face information can be sent to the authorization confirmation server 300 .
  • the authorization confirmation server 300 performs authorization confirmation.
  • the authorization confirmation server 300 is a server used by the authorized administrator, and the authorization confirmation server 300 receives the user's request for obtaining data credentials and the information associated with the user's face information. After obtaining the credential information, the authorized administrator confirms the authorization of the request according to the information received by the authorization confirmation server 300. If the data credential that the user has obtained, the expiration time and the data credential to be obtained this time When the number of data vouchers with the same or similar expiration time is greater than the predetermined number, the user can be denied authorization, and if it does not reach the predetermined number, the user can be authorized.
  • the predetermined number may be 1, 2, 5, 9, etc., and is determined according to the purpose and the issued amount of the data voucher, which is not limited in this application.
  • the authorization confirm Request authorization confirmation is that if the number of data vouchers with the same or similar expiration time as the expiration time of the data vouchers to be obtained this time is greater than a predetermined number among the data vouchers that the user has obtained, the user can be denied authorization , If it does not reach the predetermined number, it will be authorized.
  • the predetermined number may be a fixed value, or may be determined according to a formula, which is not limited in this application.
  • the data voucher is a data voucher used to obtain a certain limited resource, and the formula for determining the predetermined number may be:
  • n is the predetermined number
  • W is the pre-issued number of the data vouchers
  • i is the minimum number of people scheduled to issue the data vouchers
  • j is the popularity index of the limited resource, for example, the limited resource is pre-issued The previous pageviews, or the percentage of users who are interested in the limited resources during the survey.
  • the values of W, i, and j are all deployed in the authorization confirmation server 300 before authorization is started.
  • n calculated by the above formula If the value of n calculated by the above formula is not less than 1, then set the predetermined number to the calculated value of n; if the value of n is less than 1, set the predetermined number to 1.
  • Step S140 If the authorization confirmation instruction from the authorization confirmation server is received, the data voucher is authorized to the user, and the acquired credential information of the user is updated and stored in association with the face image of the user.
  • the data voucher can be authorized to the user after authorization confirmation by the authorization confirmation server 300.
  • the obtained credential information of the user can be updated, and the updated information can be compared with the user’s personal information.
  • the face image is stored in association for the next use.
  • the data voucher is an electronic ticket.
  • the technical solution of this application can effectively prevent ticket sellers from robbing tickets. Authentication, because in the prior art, most of the methods to prevent ticket sellers from grabbing tickets are through real-name authentication. For this method, ticket sellers can purchase through multiple certificates, and can also obtain a large number of tickets. One method is to limit the number of tickets purchased at a time. For this method, ticket sellers can achieve their goals by purchasing a small number of times.
  • this application uses face recognition, a method of authenticating biological information with a unique identification function, to sell tickets, so as to prevent ticket sellers from selling tickets.
  • the specific principle is that the user’s face The information is bound to its ticket purchase information, and the ticket purchase information includes the number of tickets purchased, and the start time.
  • the ticket purchase information includes the number of tickets purchased, and the start time.
  • the ticket sellers cannot achieve the purpose of obtaining a large number of tickets by using multiple certificates of different people. This can effectively prevent the ticket sellers from disrupting the market, allowing consumers to obtain tickets fairly, and making consumers The ticketing platform is more trusted.
  • FIG. 3 is a detailed description of step S120 in the data voucher authorization method according to the embodiment corresponding to FIG. 2.
  • step S120 may include the following steps:
  • Step S121 processing the user's face image into a preset size
  • the device used may be different when acquiring the face image of the user, when recognizing the face image of the user, in order to facilitate the recognition, it is necessary to preprocess the image of the user, namely After the user’s face image is cropped except for the background of the face portion, the cropped image is converted into a predetermined size and predetermined pixels.
  • the predetermined size is 4.8 cm by 3.3. cm
  • the predetermined pixel is 600 ppi.
  • Step S123 Scan the user's face image of a preset size, extract the user's facial features, and form a facial feature vector, where the facial features include the length, width, and length or width of the face , At least one of the length or width of the lips, and the skin color of the face.
  • the facial features include the length and width of the human face, the distance from the nose to the lips, the distance from the eyes to the nose, the interpupillary distance of the human face, and the skin color of the human face, and the feature vector is composed of
  • c, w, l nl , l ne , d and r, g, b respectively represent the length and width of the face, the distance from the nose to the lips, the distance from the eyes to the nose, the interpupillary distance of the face, and the skin color of the face.
  • Step S125 Input the face feature vector of the user into a first machine learning model, and the first machine learning model outputs the identity of the user.
  • the feature vector Input the machine learning model, and the machine learning model compares the feature vectors one by one For each value in the identities of the user, those that are consistent with these characteristic values are found as the identity of the user.
  • Step S127 according to the user's identity, query the acquired credential information associated with the user's identity.
  • the obtained credential information associated with the user's identity can be queried.
  • the first machine learning model is trained as follows:
  • each face image sample in the face image sample set has a user identity label attached in advance
  • the face feature vectors of the face image samples are input into the first machine learning model one by one.
  • the first machine learning model outputs the determined user identity and compares it with the posted user identity. If it is inconsistent, adjust the first machine
  • the learning model makes the user identity output by the first machine learning model consistent with the label.
  • the identity tag Since the identity tag has been affixed to the sample, the identity of the face image is known. Use the known result as the desired output to train the machine learning model.
  • the learning method is: constantly changing the connection weight of the network under the stimulation of the external input sample. The essence of learning is to dynamically adjust the weight of each connection. Since the expected output is known, if the output of the machine learning model does not match the expected output, the weight of each connection is automatically adjusted until the output obtained is consistent with the expected output. In this way, the first machine learning model is trained. When the first machine learning model is well trained, as long as the feature vectors extracted from the user's face image are input into the first machine learning model in a group, the first machine learning model will be the face image identity of.
  • FIG. 4 is a detailed description of step S120 in the data voucher authorization method according to the embodiment corresponding to FIG. 2.
  • step S120 may include the following steps:
  • Step S122 Scan the face image of the user and the stored face image of the user respectively, and obtain the face features of the face image of the user and the face features of the stored face image of the user.
  • the face image of the user specifically refers to the face image of the user who requests to obtain data credentials. That is, the face image of the user who is currently requesting to obtain data credentials and the face image of the user who have been stored are scanned separately.
  • the face feature includes the length and width of the face and the length and width of the facial features in the face image.
  • Step S124 The facial features of the user's facial image and the stored facial features of the user's facial image are input into a second machine learning model together, and the second machine learning model outputs the user's facial image The result is the same as the stored user's face image.
  • the machine learning model After acquiring the facial features, the machine learning model compares the two sets of facial features one by one, and obtains the difference between each of the two sets of facial features, and then calculates the average of the differences And the variance, and then put it into the formula f(x), the expression of the formula f(x) is
  • Step S126 If the face image of the user is the same as the stored face image of the user, retrieve the acquired credential information associated with the face image.
  • the acquired credential information associated with the face image can be retrieved for subsequent processing. If the person of the user is determined If the face image is not the same as the stored all face images, set the acquired credential information associated with the face image to be 0, and proceed to the next step.
  • the second machine learning model is trained as follows:
  • the positive sample pair and the negative sample pair constitute a sample pair set
  • the face feature vectors of two of each sample pair in the sample pair set are input into the second machine learning model one by one for learning. If a positive sample outputs a different judgment result to the second machine learning model, Or, for negative samples, the same judgment result is output to the second machine learning model, and the second machine learning model is adjusted so that the second machine learning model outputs the opposite judgment result.
  • the learning method is: constantly changing the connection weight of the network under the stimulation of the external input sample.
  • the essence of learning is to dynamically adjust the weight of each connection. Since the expected output is known, if the output of the machine learning model does not match the expected output, the weight of each connection is automatically adjusted until the output obtained is consistent with the expected output. In this way, the first machine learning model is trained.
  • the second machine learning model is well trained, as long as the two sets of facial features extracted from the face photos are input into the second machine learning model, the second machine learning model will output the user’s person The result of whether the face image is the same as the stored user face image.
  • FIG. 5 is a detailed description of step S130 in the data voucher authorization method according to the embodiment corresponding to FIG. 2.
  • the obtained voucher information includes information about the data voucher obtained by the user.
  • the quantity and the expiration time of the acquired data voucher, step S130 may include the following steps:
  • Step S131 judging whether the number of data vouchers with the same valid time as the data vouchers requested by the user that the user has obtained exceeds an alarm threshold according to the acquired credential information associated with the user's face information;
  • Step S132 If the alarm threshold is exceeded, send the acquired credential information associated with the user's face information, the user's request for data credential acquisition, and the alarm information to the authorization confirmation server, so that the authorization confirmation server refuses to contact the user.
  • the user authorization If the alarm threshold is exceeded, send the acquired credential information associated with the user's face information, the user's request for data credential acquisition, and the alarm information to the authorization confirmation server, so that the authorization confirmation server refuses to contact the user. The user authorization.
  • the alarm threshold may be 1, 2, 6, etc., set according to the characteristics of the data voucher, or calculated according to a formula.
  • the formula for determining the warning threshold may be:
  • n is the warning threshold reference value
  • the warning threshold is set to n
  • n is the minimum number of people scheduled to issue the data voucher
  • j is the popularity index of the data voucher.
  • the values of W, i, and j are all deployed in the authorization confirmation server 300 before authorization is started.
  • the authorization confirmation server 300 is a server used by the authorized administrator. First, the computer device determines whether the number of data vouchers that have the same validity time as the data vouchers requested by the user exceeds the alarm threshold, and if it exceeds the alarm threshold, sends the acquired information associated with the user's face information The credential information, the user's request for obtaining data credential, and the alarm information are sent to the authorization confirmation server. If the alarm threshold is not exceeded, the alarm information is not sent to the authorization confirmation server 300.
  • the authorization confirmation server 300 After the authorization confirmation server 300 receives the user's request for obtaining data credentials, the obtained credentials information associated with the user's face information, and the alarm information, the authorized administrator confirms the information received by the server 300 according to the authorization , Carry out a risk assessment, and use the warning information as a basis for denying authorization to the user.
  • FIG. 6 is a detailed description of step S130 in the data voucher authorization method according to the embodiment corresponding to FIG. 2.
  • the obtained voucher information includes information about the data voucher obtained by the user.
  • the quantity and the expiration time of the acquired data voucher, step S130 may include the following steps:
  • Step S131 According to the acquired credential information associated with the face information of the user, determine whether the number of data credential that the user has acquired with the same valid time as the data credential requested by the user exceeds an alarm threshold;
  • Step S133 If the alarm threshold is exceeded, send the acquired credential information associated with the user's face information, the user's request for data credential acquisition, and the authorization prohibition instruction to the authorization confirmation server to prohibit the authorization confirmation server from pairing The user authorization.
  • the computer device 100 first determines whether the number of data vouchers that have been obtained by the user and the valid time of the data vouchers requested by the user exceeds the alarm If the threshold exceeds the alarm threshold, an authorization prohibition instruction is sent to the authorization confirmation server 300 to prohibit the authorization confirmation server 300 from authorizing the user. This ensures that even if the authorization confirmation server is manipulated, the user cannot be authorized.
  • the data voucher is an electronic ticket.
  • the method of setting a warning threshold is mainly used to increase the matching of ticket sellers.
  • the alarm threshold can be set according to the popularity of the ticket. For hot tickets, a lower alarm threshold can be set, for example, 5, 3, or 2 tickets. For particularly popular tickets, It can even be set to one, and for relatively unpopular tickets, it can be set to a relatively high threshold such as 6, 8, or 9 to achieve the purpose of regulation.
  • a data voucher authorization device is provided.
  • the data voucher authorization device may be integrated in the above-mentioned computer equipment 100, and may specifically include a face image acquisition unit 110 and a voucher information query unit. 120.
  • the face image obtaining unit 110 is configured to receive a user's request for obtaining data credentials, and obtain a face image of the user;
  • the credential information query unit 120 is configured to query the acquired credential information associated with the face information of the user according to the face image of the user, wherein the acquired credential information includes the data vouchers that the user has acquired The quantity and the expiration time of the obtained data certificate;
  • the authorization information confirmation unit 130 is configured to send the obtained credential information associated with the user's face information to the authorization confirmation server, so that the authorization confirmation server can perform authorization confirmation;
  • the data voucher authorization unit 140 is configured to receive an authorization confirmation instruction from the authorization confirmation server, authorize the data voucher to the user, and update the user's acquired credential information with the user's face image Associated storage.
  • modules or units of the device for action execution are mentioned in the above detailed description, this division is not mandatory.
  • the features and functions of two or more modules or units described above may be embodied in one module or unit.
  • the features and functions of a module or unit described above can be further divided into multiple modules or units to be embodied.
  • the example embodiments described here can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which can be a personal computer, a server, a mobile terminal, or a network device, etc.) execute the method according to the embodiments of the present disclosure.
  • a computing device which can be a personal computer, a server, a mobile terminal, or a network device, etc.
  • an electronic device capable of implementing the above method is also provided.
  • the electronic device 500 according to this embodiment of the present application will be described below with reference to FIG. 8.
  • the electronic device 500 shown in FIG. 8 is only an example, and should not bring any limitation to the functions and scope of use of the embodiments of the present application.
  • the electronic device 500 is represented in the form of a general-purpose computing device.
  • the components of the electronic device 500 may include, but are not limited to: the aforementioned at least one processing unit 510, the aforementioned at least one storage unit 520, and a bus 530 connecting different system components (including the storage unit 520 and the processing unit 510).
  • the storage unit stores program code, and the program code can be executed by the processing unit 510, so that the processing unit 510 executes the various exemplary methods described in the “exemplary method” section of this specification.
  • the processing unit 510 may perform step S110 as shown in FIG. 2 to receive a request from a user to obtain a data voucher, and obtain a face image of the user, wherein the request includes the data to be obtained by the user.
  • step S120 query the acquired credential information associated with the user’s face information according to the user’s face image
  • step S130 send the credential information associated with the user’s face information
  • step S140 receiving the authorization confirmation server
  • the authorization confirmation instruction is to authorize the data voucher to the user, and update the obtained credential information of the user and store it in association with the face image of the user.
  • the storage unit 520 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 5201 and/or a cache storage unit 5202, and may further include a read-only storage unit (ROM) 5203.
  • RAM random access storage unit
  • ROM read-only storage unit
  • the storage unit 520 may also include a program/utility tool 5204 having a set (at least one) program module 5205.
  • program module 5205 includes but is not limited to: an operating system, one or more application programs, other program modules, and program data, Each of these examples or some combination may include the implementation of a network environment.
  • the bus 530 may represent one or more of several types of bus structures, including a storage unit bus or a storage unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or a local area using any bus structure among multiple bus structures. bus.
  • the electronic device 500 may also communicate with one or more external devices 700 (such as keyboards, pointing devices, Bluetooth devices, etc.), and may also communicate with one or more devices that enable users to interact with the electronic device 500, and/or communicate with Any device (such as a router, modem, etc.) that enables the electronic device 500 to communicate with one or more other computing devices. This communication can be performed through an input/output (I/O) interface 550.
  • the electronic device 500 may also communicate with one or more networks (such as a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through the network adapter 560. As shown in the figure, the network adapter 560 communicates with other modules of the electronic device 500 through the bus 530.
  • the example embodiments described here can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which may be a personal computer, server, terminal device, or network device, etc.) execute the method according to the embodiments of the present disclosure.
  • a non-volatile storage medium can be a CD-ROM, U disk, mobile hard disk, etc.
  • Including several instructions to make a computing device which may be a personal computer, server, terminal device, or network device, etc.
  • a computer-readable storage medium is also provided, on which a program product capable of implementing the above method of this specification is stored.
  • the storage medium may be non-volatile or volatile.
  • various aspects of the present application can also be implemented in the form of a program product, which includes program code.
  • the program product runs on a terminal device, the program code is used to enable the The terminal device executes the steps according to various exemplary implementations of the present application described in the above "Exemplary Method" section of this specification.
  • a program product 600 for implementing the above method according to an embodiment of the present application is described. It can adopt a portable compact disk read-only memory (CD-ROM) and include program code, and can be installed in a terminal device, For example, running on a personal computer.
  • CD-ROM compact disk read-only memory
  • the program product of this application is not limited to this.
  • the readable storage medium can be any tangible medium that contains or stores a program, and the program can be used by or combined with an instruction execution system, device, or device.
  • the program product can use any combination of one or more readable media.
  • the readable medium may be a readable signal medium or a readable storage medium.
  • the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination of the above. More specific examples (non-exhaustive list) of readable storage media include: electrical connections with one or more wires, portable disks, hard drives, random access memory (RAM), read-only memory (ROM), erasable Type programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, and readable program code is carried therein. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the readable signal medium may also be any readable medium other than a readable storage medium, and the readable medium may send, propagate, or transmit a program for use by or in combination with the instruction execution system, apparatus, or device.
  • the program code contained on the readable medium can be transmitted by any suitable medium, including but not limited to wireless, wired, optical cable, RF, etc., or any suitable combination of the foregoing.
  • the program code used to perform the operations of this application can be written in any combination of one or more programming languages.
  • the programming languages include object-oriented programming languages—such as Java, C++, etc., as well as conventional procedural programming languages. Programming language-such as "C" language or similar programming language.
  • the program code can be executed entirely on the user's computing device, partly on the user's device, executed as an independent software package, partly on the user's computing device and partly executed on the remote computing device, or entirely on the remote computing device or server Executed on.
  • the remote computing device can be connected to a user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or can be connected to an external computing device (for example, using Internet service providers) Business to connect via the Internet).
  • LAN local area network
  • WAN wide area network
  • Internet service providers Internet service providers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

La présente invention concerne un procédé et un dispositif d'autorisation de certificat de données, un dispositif informatique et un support d'enregistrement, se rapportant au domaine technique de l'intelligence artificielle. Le procédé d'autorisation de certificat de données consiste à : recevoir une demande d'acquisition d'un certificat de données provenant d'un utilisateur et acquérir une image faciale de l'utilisateur, la demande comprenant des informations de certificat du certificat de données que l'utilisateur a l'intention d'acquérir; rechercher, sur la base de l'image faciale de l'utilisateur, des informations de certificat acquises associées aux informations faciales de l'utilisateur; transmettre les informations de certificat acquises associées aux informations faciales de l'utilisateur et la demande d'acquisition du certificat de données provenant de l'utilisateur à un serveur de confirmation d'autorisation, ce qui permet au serveur de confirmation d'autorisation d'effectuer une confirmation d'autorisation; recevoir une instruction de confirmation d'autorisation en provenance du serveur de confirmation d'autorisation, autoriser le certificat de données pour l'utilisateur et mettre à jour les informations de certificat acquises de l'utilisateur, puis les stocker en association avec l'image faciale de l'utilisateur. Ainsi, l'utilisateur peut acquérir un nombre excessif de certificats de données autorisés.
PCT/CN2020/087474 2019-05-24 2020-04-28 Procédé et dispositif d'autorisation de certificat de données, dispositif informatique et support d'enregistrement WO2020238534A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910441359.5 2019-05-24
CN201910441359.5A CN110348195A (zh) 2019-05-24 2019-05-24 数据凭证授权方法、装置、计算机设备和存储介质

Publications (1)

Publication Number Publication Date
WO2020238534A1 true WO2020238534A1 (fr) 2020-12-03

Family

ID=68174363

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/087474 WO2020238534A1 (fr) 2019-05-24 2020-04-28 Procédé et dispositif d'autorisation de certificat de données, dispositif informatique et support d'enregistrement

Country Status (2)

Country Link
CN (1) CN110348195A (fr)
WO (1) WO2020238534A1 (fr)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348195A (zh) * 2019-05-24 2019-10-18 深圳壹账通智能科技有限公司 数据凭证授权方法、装置、计算机设备和存储介质
CN112905981A (zh) * 2019-12-04 2021-06-04 上海博泰悦臻电子设备制造有限公司 用于信息分享的方法、电子设备和计算机可读存储介质
CN111368101B (zh) * 2020-03-05 2021-06-18 腾讯科技(深圳)有限公司 多媒体资源信息的展示方法、装置、设备以及存储介质
CN111523862B (zh) * 2020-04-27 2024-02-23 广东电网有限责任公司培训与评价中心 一种获取人才数据的方法和相关设备
CN112699355A (zh) * 2020-12-22 2021-04-23 湖南麒麟信安科技股份有限公司 一种用户与主机解耦的动态人脸认证方法及系统
CN116842494B (zh) * 2023-09-04 2023-11-10 杭州嘉识科技有限公司 一种基于大数据的设备控制方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116238A1 (en) * 2001-02-06 2002-08-22 Himes Jennifer Ann Method, system and storage medium for obtaining certificates of analysis
CN102096950A (zh) * 2010-12-10 2011-06-15 汉王科技股份有限公司 用于售票系统的人脸识别装置和识别方法
CN106022317A (zh) * 2016-06-27 2016-10-12 北京小米移动软件有限公司 人脸识别方法及装置
CN108805048A (zh) * 2018-05-25 2018-11-13 腾讯科技(深圳)有限公司 一种人脸识别模型的调整方法、装置和存储介质
CN109614780A (zh) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 生物信息认证方法及装置、存储介质、电子设备
CN110348195A (zh) * 2019-05-24 2019-10-18 深圳壹账通智能科技有限公司 数据凭证授权方法、装置、计算机设备和存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108604990A (zh) * 2016-12-02 2018-09-28 华为技术有限公司 终端中本地授权凭证的使用方法及装置
CN108573004B (zh) * 2017-03-14 2021-02-05 平安科技(深圳)有限公司 基于保险业务信息处理方法与装置
CN108665946B (zh) * 2018-05-08 2023-01-17 创新先进技术有限公司 一种业务数据的访问方法和装置
CN109064620A (zh) * 2018-08-06 2018-12-21 北京三快在线科技有限公司 一种景区排队方法、系统及可读存储介质
CN109033774B (zh) * 2018-08-31 2020-08-07 阿里巴巴集团控股有限公司 获取、反馈用户资源的方法、装置及电子设备
CN109194673B (zh) * 2018-09-20 2021-08-03 江苏满运软件科技有限公司 基于用户授权信息的认证方法、系统、设备及存储介质
CN109523259A (zh) * 2018-11-13 2019-03-26 吴浩 一种电子消费凭证管理系统、方法及终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116238A1 (en) * 2001-02-06 2002-08-22 Himes Jennifer Ann Method, system and storage medium for obtaining certificates of analysis
CN102096950A (zh) * 2010-12-10 2011-06-15 汉王科技股份有限公司 用于售票系统的人脸识别装置和识别方法
CN106022317A (zh) * 2016-06-27 2016-10-12 北京小米移动软件有限公司 人脸识别方法及装置
CN108805048A (zh) * 2018-05-25 2018-11-13 腾讯科技(深圳)有限公司 一种人脸识别模型的调整方法、装置和存储介质
CN109614780A (zh) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 生物信息认证方法及装置、存储介质、电子设备
CN110348195A (zh) * 2019-05-24 2019-10-18 深圳壹账通智能科技有限公司 数据凭证授权方法、装置、计算机设备和存储介质

Also Published As

Publication number Publication date
CN110348195A (zh) 2019-10-18

Similar Documents

Publication Publication Date Title
WO2020238534A1 (fr) Procédé et dispositif d'autorisation de certificat de données, dispositif informatique et support d'enregistrement
US9628478B2 (en) Technologies for secure storage and use of biometric authentication information
CN111611908B (zh) 用于在在线教育中进行实时用户验证的系统和方法
AU2012261635B2 (en) Methods and Systems for Increasing the Security of Network- Based Transactions
US20170093851A1 (en) Biometric authentication system
US8630956B2 (en) Obscuring image of person in picture when consent to share image is denied
US10348709B2 (en) Cumulative authentication for step-up increased authentication factors
US9641526B1 (en) Location based authentication methods and systems
WO2017193826A1 (fr) Procédé d'authentification de connexion à un bureau en nuage, système de commande de bureau en nuage et client
US20140230019A1 (en) Authentication to a first device using a second device
TWI616821B (zh) Bar code generation method, bar code based authentication method and related terminal
KR20160124833A (ko) 모바일 디바이스들을 위한 신뢰 브로커 인증 방법
US11636261B2 (en) Capturing and sending one-time passwords using augmented reality glasses
US20110157347A1 (en) Unintrusive biometric capture device, system and method for logical access control
US20180336327A1 (en) System for provisioning and allowing secure access to a virtual credential
US11063935B2 (en) Systems and methods for providing remote desktop access
US20150215672A1 (en) Display apparatus and control method thereof
WO2018233584A1 (fr) Procédé, dispositif, appareil informatique, et support de stockage pour transférer une valeur de compte
WO2021248385A1 (fr) Procédé et appareil d'enregistrement de caractéristique biologique et dispositif de communication et support de stockage
US10936705B2 (en) Authentication method, electronic device, and computer-readable program medium
KR101433079B1 (ko) 지문등록 시스템의 출입통제 단말기의 지문등록 방법
JP2008040607A (ja) 人物紹介サーバ、人物紹介システム、その方法およびプログラム
US20220414193A1 (en) Systems and methods for secure adaptive illustrations
EP3001342A1 (fr) Procédés et systèmes permettant d'afficher des données biométriques pendant une saisie
WO2016141561A1 (fr) Système et accessoire d'authentification d'identité d'iris

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20814824

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20814824

Country of ref document: EP

Kind code of ref document: A1