WO2022142330A1 - Identity authentication method and apparatus, and electronic device and storage medium - Google Patents

Identity authentication method and apparatus, and electronic device and storage medium Download PDF

Info

Publication number
WO2022142330A1
WO2022142330A1 PCT/CN2021/109820 CN2021109820W WO2022142330A1 WO 2022142330 A1 WO2022142330 A1 WO 2022142330A1 CN 2021109820 W CN2021109820 W CN 2021109820W WO 2022142330 A1 WO2022142330 A1 WO 2022142330A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity authentication
face information
information
face
requesting user
Prior art date
Application number
PCT/CN2021/109820
Other languages
French (fr)
Chinese (zh)
Inventor
祁凯悦
伍俊
范亦卿
陶莹
许亮
Original Assignee
上海商汤临港智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海商汤临港智能科技有限公司 filed Critical 上海商汤临港智能科技有限公司
Priority to JP2023521973A priority Critical patent/JP2023546837A/en
Publication of WO2022142330A1 publication Critical patent/WO2022142330A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present disclosure relates to the field of computer technologies, and in particular, to an identity authentication method and apparatus, an electronic device, and a storage medium.
  • unlocking methods are more and more used in all walks of life, such as car unlocking, door unlocking, gate unlocking and so on.
  • the traditional unlocking methods include key unlocking, fingerprint unlocking, etc.
  • face recognition unlocking methods are also widely used in various unlocking objects.
  • the present disclosure proposes an identity authentication technical solution.
  • an identity authentication method including:
  • the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication benchmark is adjusted based on the face information information.
  • the identity authentication reference information includes: a reference face information database;
  • the adjusting the identity authentication reference information based on the face information includes:
  • the face information is added to the reference face information set associated with the requesting user in the reference face information database.
  • the identity authentication reference information includes: reference parameters used for identity authentication.
  • the reference parameters include preset parameters of the neural network
  • the performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
  • the adjusting the identity authentication reference information based on the face information includes:
  • the parameters of the preset neural network are adjusted based on the training samples.
  • the adjusting the parameters of the preset neural network based on the training samples includes:
  • the parameters of the preset neural network are adjusted, so that the identity authentication result of the adjusted preset neural network to the face information is authentication passed.
  • the reference parameters used for identity authentication include: a matching degree threshold of face information
  • the performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
  • the adjusting the identity authentication reference information based on the face information includes:
  • the lowering of the matching degree threshold includes:
  • the matching degree threshold is adjusted down to the target matching degree threshold.
  • the method further includes:
  • the performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
  • weighting the unoccluded area in the face information based on the first matching weight to obtain first weighted information, and based on the second matching weight weighting the unoccluded area in the face information based on the first matching weight to obtain first weighted information, and based on the second matching weight
  • the occlusion area in the face information is weighted to obtain the second weighted information
  • the adjusting the identity authentication reference information based on the face information includes: in response to detecting that the face has an occlusion area, increasing the first matching weight, and/or decreasing the second matching weight.
  • the method further includes:
  • a prompt message is sent to the requesting user, and the prompt message is used to prompt the requesting user to adjust the identity authentication reference information; and the adjustment of the identity authentication reference information based on the face information includes:
  • the identity authentication reference information is adjusted based on the face information.
  • the method further includes:
  • the adjusting the identity authentication reference information based on the face information includes:
  • the identity authentication reference information is adjusted based on the face information.
  • the object to be unlocked includes at least one of the following devices:
  • an identity authentication device comprising:
  • an acquisition unit used for acquiring face information for requesting the unlocking of the object to be unlocked
  • an authentication unit configured to perform identity authentication on the requesting user who issued the request based on the face information and preset identity authentication reference information
  • An adjustment unit configured to adjust the to-be-unlocked object based on the preset unlocking operation in response to the unsuccessful unlocking of the to-be-unlocked object based on the identity authentication result of the requesting user, and to adjust based on the face information
  • the identity authentication reference information configured to adjust the to-be-unlocked object based on the preset unlocking operation in response to the unsuccessful unlocking of the to-be-unlocked object based on the identity authentication result of the requesting user, and to adjust based on the face information The identity authentication reference information.
  • the identity authentication reference information includes: a reference face information database;
  • the adjusting unit is configured to add the face information to the reference face information set associated with the requesting user in the reference face information database.
  • the identity authentication reference information includes: reference parameters used for identity authentication.
  • the reference parameters include preset parameters of the neural network
  • the authentication unit configured to use the preset neural network to verify whether the requesting user is an authenticated user based on the face information
  • the adjustment unit is configured to construct a training sample by using the face information; and adjust the parameters of the preset neural network based on the training sample.
  • the adjustment unit is configured to use the face information as the input of the preset neural network to obtain an output result; in response to the output result being that the authentication fails, the The parameters of the preset neural network are adjusted, so that the adjusted result of the identity authentication of the face information by the preset neural network is authentication passed.
  • the reference parameters used for identity authentication include: a matching degree threshold of face information
  • the authentication unit is configured to determine the degree of matching between the face information and the face information of the authenticated user; in response to the degree of matching between the face information and the face information of the authenticated user exceeding the degree of matching Threshold, to determine that the requesting user has passed the authentication;
  • the adjustment unit is configured to lower the matching degree threshold.
  • the adjusting unit is configured to adjust the matching degree threshold to the target matching degree threshold in response to the ambient brightness being lower than the set brightness threshold.
  • the apparatus further includes:
  • a detection unit configured to detect whether the face corresponding to the face information has an occlusion area
  • the authentication unit is configured to, in response to detecting that the face corresponding to the face information has an occluded area, weight the unoccluded area in the face information based on the first matching weight to obtain first weighting information, and based on the first matching weight.
  • Two matching weights weight the occlusion area in the face information to obtain second weighting information; perform identity authentication on the requesting user based on the first weighting information and the second weighting information;
  • the adjusting unit is configured to increase the first matching weight, and/or decrease the second matching weight in response to detecting that the face has an occlusion area.
  • the apparatus further includes:
  • a prompting unit configured to send a prompt message to the requesting user in response to the object to be unlocked being successfully unlocked based on a preset unlocking operation when the object to be unlocked is not successfully unlocked according to the user's identity authentication result , the prompt information is used to prompt the requesting user to adjust the identity authentication reference information;
  • the adjustment unit is configured to adjust the identity authentication reference information based on the face information in response to detecting that the requesting user issues an adjustment instruction based on the prompt information.
  • the apparatus further includes:
  • a time interval determination unit configured to obtain the time interval between the requesting user sending the request and executing the preset unlocking operation
  • the adjustment unit is configured to adjust the identity authentication reference information based on the face information in response to the time interval being less than a set duration threshold.
  • the object to be unlocked includes at least one of the following devices:
  • an electronic device comprising: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to invoke the instructions stored in the memory to execute the above method.
  • a computer-readable storage medium having computer program instructions stored thereon, the computer program instructions implementing the above method when executed by a processor.
  • a computer program comprising computer-readable code, which when the computer-readable code is executed in an electronic device, is executed by a processor in the electronic device for implementing the above method.
  • the identity authentication of the requesting user who made the request is performed, and then in response to the If the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.
  • the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user may be a user with unlocking authority, then based on the face information and the preset identity authentication benchmark information
  • the process of identity authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, improve the success rate of unlocking, and improve user experience. better.
  • FIG. 1 shows a flowchart of an identity authentication method according to an embodiment of the present disclosure.
  • FIG. 2 shows a block diagram of an identity authentication apparatus provided by an embodiment of the present disclosure.
  • FIG. 3 shows a block diagram of an electronic device provided by an embodiment of the present disclosure.
  • FIG. 4 shows a block diagram of an electronic device provided by an embodiment of the present disclosure.
  • an embodiment of the present disclosure provides an identity authentication method. After obtaining face information for requesting unlocking, based on the face information and preset identity authentication reference information, the requesting user who sends the request will be authenticated. Identity authentication, and then adjust the identity authentication reference information based on the face information in response to the fact that the to-be-unlocked object is successfully unlocked based on the preset unlocking operation when the to-be-unlocked object is not successfully unlocked according to the identity authentication result of the requesting user.
  • the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user may be a user with unlocking authority, then based on the face information and the preset identity authentication benchmark information
  • the process of identity authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, improve the success rate of unlocking, and improve user experience. better.
  • the identity authentication method may be performed by an electronic device such as a terminal device or a server, and the terminal device may be a user equipment (User Equipment, UE), a mobile device, a user terminal, a terminal, a cellular phone, a cordless Telephone, personal digital assistant (Personal Digital Assistant, PDA), handheld device, computing device, vehicle-mounted device, wearable device, etc.
  • the method can be implemented by the processor calling the computer-readable instructions stored in the memory.
  • the method may be performed by a server.
  • the object to be unlocked includes at least one of the following devices: a vehicle door lock, a house door lock, and a turnstile.
  • the execution subject of the identity authentication method provided by the embodiment of the present disclosure may be the identity authentication device located in the above-mentioned unlocking object, or the above-mentioned unlocking object itself.
  • the execution subject of the identity authentication method may be an identity authentication device, and the implementation of the method will be described hereinafter by taking the execution subject as an identity authentication device as an example. It can be understood that the execution subject of the method is an identity authentication device is only an exemplary description, and should not be construed as a limitation of the method.
  • FIG. 1 shows a flowchart of an identity authentication method according to an embodiment of the present disclosure. As shown in FIG. 1 , the identity authentication method includes:
  • step S11 face information for requesting to unlock the object to be unlocked is obtained.
  • the request for unlocking the object to be unlocked may be triggered by a user operation.
  • the user may send a request for unlocking the object to be unlocked through face information through a physical button or a virtual button on the object to be unlocked.
  • the request for unlocking the object to be unlocked is triggered when the user's face information is detected, and the above electronic device can continuously detect whether a face object appears in the video stream collected by the camera used for face unlocking, and when it appears In the case of a face object, wake up the face unlock function, and automatically generate a request to unlock the object to be unlocked.
  • the face information can be acquired through an image acquisition device associated with the object to be unlocked, and the specific acquisition method is not limited in this disclosure.
  • step S12 based on the face information and preset identity authentication reference information, identity authentication is performed on the requesting user who sent the request.
  • the identity authentication here can be the process of confirming the identity of the user, specifically, confirming the specific identity information corresponding to the user based on the face information, or it can also confirm whether the user belongs to the authenticated user with unlocking authority based on the face information. .
  • Identity authentication is based on preset identity authentication benchmark information, where the identity authentication benchmark information can be benchmark information used to authenticate face information, and based on the identity authentication benchmark information, face information can be identified. Certification.
  • the identity authentication reference information includes a reference face database
  • the reference face database may contain reference face information with known user identities, or a reference with the user identity being an authenticated user with unlocking authority face information.
  • the face information of the requesting user may be a face image, or may be a face feature value
  • the reference face information in the reference face information database may also be a face image, or may be a person face eigenvalues.
  • the face information can be matched with the reference face information in the reference face information database to obtain The matching degree between the face information and the reference face information; then determine whether the matching degree exceeds the matching degree threshold, and if the matching degree exceeds the matching degree threshold, it is determined that the requesting user is an authenticated user, that is, the authentication is passed.
  • the identity authentication reference information includes reference parameters used for identity authentication.
  • the reference parameter can be, for example, a parameter of an artificial intelligence module for identity authentication, such as a preset neural network parameter.
  • the identity authentication can be performed on the face information through the preset neural network to obtain the identity authentication result.
  • the specific process of performing identity authentication through a neural network is not specifically limited in the present disclosure.
  • an unlock instruction is issued to the unlocking object to instruct the unlocking object to unlock; when the result of identity authentication indicates that the requesting user is a non-authenticated user If it is displayed, it informs the user that the authentication fails and the unlocking fails.
  • step S13 in response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the adjustment is made based on the face information.
  • the identity authentication reference information in response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the adjustment is made based on the face information.
  • the identity authentication reference information in response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user.
  • the preset unlocking operation may be performed after the object to be unlocked is unsuccessfully unlocked according to the identity authentication result of the requesting user. Try unlocking again.
  • the present disclosure does not specifically limit the specific manner of the preset unlocking operation, for example, it may be unlocking through a physical key, unlocking through a fingerprint, unlocking through a face, unlocking through a password, and the like.
  • the preset unlocking operation here may be the operation performed by the requesting user described in the present disclosure, that is, in the case where the requesting user fails to request the unlocking through the face information, the unlocking operation based on the physical key, fingerprint, password, etc. succeeds again After unlocking, it can be considered that the requesting user is a user with unlocking authority, and the failure of requesting the user to request unlocking through face information may be caused by inaccurate identity authentication reference information. Therefore, in this case, it can be based on face information. to adjust the authentication baseline information.
  • the adjustment of the identity authentication reference information based on the face information may be by adjusting the identity authentication reference information, so that the authentication result of the identity authentication based on the obtained face information and the identity authentication reference information can unlock the object to be unlocked.
  • the face information is added to the face template information base as the identity authentication reference information, or the threshold of face recognition is adjusted, and so on.
  • the identity authentication of the requesting user who made the request is performed, and then in response to the If the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.
  • the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user may be a user with unlocking authority, then based on the face information and the preset identity authentication benchmark information
  • the process of identity authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, improve the success rate of unlocking, and improve user experience. better.
  • the identity authentication reference information includes: a reference face information database; the adjusting the identity authentication reference information based on the face information includes: adding the face information to all The reference face information set associated with the requesting user in the reference face information database.
  • the identity authentication reference information may be a reference face information database. Then, in the process of performing identity authentication on the requesting user based on the face information and the preset identity authentication reference information, the identity authentication reference information may be The face information is matched with the reference face information in the reference face information database, and the matching degree between the face information and the reference face information is obtained; then it is judged whether the matching degree exceeds the matching degree threshold, and if the matching degree exceeds the matching degree threshold Then, it can be considered that the acquired face information is successfully matched with the reference face information, and the requesting user is determined to be an authenticated user, that is, the authentication is passed.
  • the requesting user is a user with unlocking authority, and the requesting user fails to request unlocking through face information, which may be because the benchmark face information in the benchmark face information database cannot be used. It is caused by the successful matching with the face information of the requesting user. Therefore, in this case, the obtained face information can be added to the reference face information database. Therefore, in the case where the requesting user requests unlocking through the face information next time, the unlocking success rate can be improved, and the user experience is better.
  • the reference face information database may contain reference face information of multiple authenticated users, and a single authenticated user may correspond to a reference face information set.
  • identity authentication after the face of the requesting user is matched with the reference face information in the reference face information database, the authenticated user to which the matched reference face information belongs will correspond to for the requesting user.
  • the face information may be added to the reference face information set associated with the requesting user in the reference face information database.
  • the face information when the identity authentication reference information includes a reference face information database, the face information may be added to the reference face information set associated with the requesting user in the reference face information database, thereby, In the case where the requesting user requests for unlocking through the face information next time, the unlocking success rate can be improved, and the user experience is better.
  • the identity authentication reference information includes: reference parameters used for identity authentication.
  • the benchmark parameter can be a parameter that affects the authentication result.
  • it can be a parameter of an artificial intelligence module for identity authentication, such as a preset neural network parameter. Therefore, in response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on the preset unlocking operation, and the reference parameters used for identity authentication are adjusted based on the face information, which can improve the The accuracy of identity authentication based on face information and benchmark parameters improves the success rate of unlocking and provides a better user experience.
  • the reference parameters include preset parameters of the neural network; the performing identity authentication on the requesting user based on the face information and the preset identity authentication reference information includes: the face information, and using the preset neural network to verify whether the requesting user is an authenticated user; the adjusting the identity authentication benchmark information based on the face information, including: using the face information to construct a training sample ; Adjust the parameters of the preset neural network based on the training samples.
  • the parameters of the neural network can be parameters such as the weight value of the nodes in the neural network.
  • the parameters in the neural network can affect the prediction results of the neural network.
  • the parameters of the neural network are often adjusted by training samples to Tuning neural network performance.
  • a preset neural network can be used to verify whether the requesting user is an authenticated user based on the face information.
  • the neural network can be an end-to-end neural network, the input can be face information, and the output is the identity authentication result.
  • the preset neural network can be obtained by training based on the training samples. Then, the training samples can be constructed by using the face information, and the parameters of the preset neural network can be adjusted based on the constructed training samples.
  • the adjusting the parameters of the preset neural network based on the training samples includes: taking the face information as an input of the preset neural network, and obtaining an output Result: in response to the output result being that the authentication fails, adjust the parameters of the preset neural network, so that the adjusted result of the authentication of the face information by the preset neural network is authentication pass.
  • the face information in the process of adjusting the parameters of the preset neural network based on the training samples, can also be merged with the existing training samples, and the neural network can be iteratively trained by using the new training samples , to adjust the parameters of the neural network.
  • the preset neural network is used to verify whether the requesting user is an authenticated user, then, the training sample is constructed by using the face information, and based on Adjusting the parameters of the neural network by the training samples can improve the accuracy of identity authentication performed by the preset neural network, improve the unlocking success rate when unlocking the requested user, and provide a better user experience.
  • the preset neural network parameters can be adjusted, so that the adjusted preset
  • the identity authentication result of the set neural network for the face information is authentication passed, which can improve the success rate of the preset neural network to authenticate the requesting user, and improve the unlocking success rate when the requesting user is unlocked, and the user experience is better.
  • the reference parameter used for identity authentication includes a matching degree threshold of face information; the requesting user is subjected to a matching degree threshold based on the face information and preset identity authentication reference information.
  • Identity authentication including: determining the degree of matching between the face information and the face information of the authenticated user; in response to the degree of matching between the face information and the face information of the authenticated user exceeding the matching degree threshold, Determining that the requesting user has passed the authentication; and adjusting the identity authentication reference information based on the face information includes: lowering the matching degree threshold.
  • the matching degree here may be, for example, the similarity between the face information of the requesting user and the face information of the authenticated user, and the similarity may be the cosine similarity between vectors corresponding to the face information.
  • the similarity may be the cosine similarity between vectors corresponding to the face information.
  • Whether the requesting user has passed the authentication can be measured by the matching degree threshold. If the matching degree between the information and the face information of the authenticated user exceeds the matching degree threshold, it is determined that the requesting user has passed the authentication.
  • the matching degree threshold here can be set according to experience, or can be dynamically adjusted, and the matching degree threshold can be, for example, 90%. Then, if the matching degree between the face information of the requesting user and the face information of the authenticated user exceeds 90%, it is determined that the requesting user has passed the authentication.
  • the identity authentication result obtained based on the face information and the matching degree threshold fails to unlock the object to be unlocked successfully, because the object to be unlocked is successfully unlocked based on the preset unlocking operation, it can be considered that the requesting user is a user with unlocking authority, and The failure to request the user to unlock through face information may be caused by the high matching threshold. Therefore, in this case, the matching threshold can be lowered. Therefore, when the user requests for unlocking through the face information next time, the unlocking success rate can be improved, and the user experience is better.
  • the specific range of lowering the matching degree threshold may be set by the user, for example, it may be lowered by 5%, and the matching degree threshold may be lowered from 90% to 85%.
  • the lowering of the matching degree threshold includes: in response to the ambient brightness being lower than a set brightness threshold value, lowering the matching degree threshold value to a target matching degree threshold value.
  • the unsuccessful unlocking of the identity authentication result obtained based on the face information and the matching degree threshold may be caused by the low ambient brightness, it may be that the ambient brightness is lower than the set brightness threshold. , the matching degree threshold is lowered to the target matching degree threshold, which improves the unlocking success rate when the ambient brightness is low, and the user experience is better.
  • the ambient brightness can be detected by an ambient light sensor, which can detect the ambient brightness around the object to be unlocked.
  • the method further includes: detecting whether the face corresponding to the face information has an occlusion area;
  • Requesting the user to perform identity authentication includes: in response to detecting that the face corresponding to the face information has an occluded area, weighting the unoccluded area in the face information based on the first matching weight to obtain first weighting information, based on the first matching weight.
  • the second matching weight weights the occlusion area in the face information to obtain second weighting information; performs identity authentication on the requesting user based on the first weighting information and the second weighting information;
  • the information adjustment of the identity authentication reference information includes: in response to detecting that the face has an occluded area, increasing the first matching weight, and/or decreasing the second matching weight.
  • the key point detection of the face is often used to detect whether there is a face in the image, or also Whether there is a face in the image can be determined through semantic segmentation, and for the detected face, it can be further determined whether there is an occlusion in the face.
  • determining whether there is occlusion in a face For example, it can be identified based on the color of the face area. When a color that is significantly different from the skin color is detected on the face, it can be considered that the face is occluded; or Through the method of target object recognition, when the target object is recognized in the face, it is determined that the face is occluded.
  • the target object can be a mask, scarf, glasses, etc.; or, a neural network can also be trained to identify facial occlusion .
  • the occluded area can be further determined. Because the occluded area is often unable to accurately reflect the features of the face, when it is detected that the face corresponding to the face information has an occluded area, in the process of identity authentication based on the face information, the first matching The weights weight the unoccluded areas in the face information to obtain the first weighting information, and weight the occluded areas in the face information based on the second matching weight to obtain the second weighting information; then based on the first weighting information and the second weighting information Authenticate the requesting user.
  • the first matching weight and the second matching weight may be specific weight values, and in the case of detecting that there is an occluded area on the face, the first matching weight may be increased, and/or the first matching weight may be decreased.
  • Two matching weights For example, the first matching weight may be increased from 0.6 to 0.7, and/or the second matching weight may be decreased from 0.4 to 0.3.
  • the first matching weight and the second matching weight are used to adjust the degree of influence of the occluded area and the unoccluded area in the face information on the identity authentication result during the identity authentication process.
  • the greater the weight the greater the influence on the identity authentication result. ;
  • the smaller the weight the smaller the impact on the authentication result.
  • the first matching weight in the case where there is an occluded area on the face, in the process of identity authentication based on the face information, the first matching weight can be increased, so as to improve the identity authentication result of the unoccluded area in the face information. In order to improve the accuracy of identity authentication; or, the second matching weight can be reduced to reduce the influence of the occluded area in the face information on the identity authentication result.
  • the accuracy of identity authentication is improved.
  • the method further includes: in response to the fact that the object to be unlocked is unsuccessfully unlocked according to the user's identity authentication result, the object to be unlocked succeeds based on a preset unlocking operation unlocking, and sending prompt information to the requesting user, where the prompt information is used to prompt the requesting user to adjust the identity authentication reference information; the adjusting the identity authentication reference information based on the face information includes: responding to It is detected that the requesting user sends an adjustment instruction based on the prompt information, and the identity authentication reference information is adjusted based on the face information.
  • the user is reminded to adjust the identity authentication reference information by sending reminder information to the user, and only when an adjustment instruction is detected, the identity authentication reference information is adjusted based on the face information, so as to prevent illegal users from adjusting the identity authentication reference information.
  • the face information is used to adjust the identity authentication benchmark information, which is more secure.
  • the method further includes: acquiring a time interval between the requesting user sending the request and executing the preset unlocking operation; the adjusting the The identity authentication reference information includes: in response to the time interval being less than a set duration threshold, adjusting the identity authentication reference information based on the face information.
  • the two unlockings are likely to be done by the same person; and when the time interval is long, the two unlocking operations are performed by the same person. Most likely not by the same person. Therefore, in the embodiment of the present disclosure, by setting the duration threshold, when the time interval is smaller than the set duration threshold, the identity authentication reference information is adjusted based on the face information, which has high security.
  • the set duration threshold may be, for example, 30 seconds, and the set duration threshold may be set based on experience, which is not specifically limited in the present disclosure.
  • the object to be unlocked is the door lock of the vehicle.
  • the user requests face unlocking; the identity authentication device in the door lock obtains the user's face information through the camera, and matches the face information with the benchmark face information in the benchmark face information database to obtain The matching degree between the face information and the reference face information; the identity authentication device determines whether the matching degree exceeds the matching degree threshold, and if the matching degree does not exceed the matching degree threshold, it determines that the requesting user is a non-authenticated user and has not been successfully unlocked; the user The door is successfully unlocked by key unlocking; after the user enters the car, the vehicle sends a prompt message to the user, asking the user whether to add the face information used for face unlocking to the benchmark face information database; the vehicle responds to The user adds the face information to the reference face information database based on the adjustment instruction issued by the prompt information.
  • the present disclosure also provides identity authentication devices, electronic devices, computer-readable storage media, and programs, all of which can be used to implement any identity authentication method provided by the present disclosure.
  • identity authentication devices electronic devices, computer-readable storage media, and programs, all of which can be used to implement any identity authentication method provided by the present disclosure.
  • FIG. 2 shows a block diagram of an identity authentication apparatus according to an embodiment of the present disclosure. As shown in FIG. 2 , the apparatus includes:
  • Obtaining unit 21 is used to obtain the face information for requesting the unlocking of the object to be unlocked;
  • An authentication unit 22 configured to perform identity authentication on the requesting user who issued the request based on the face information and preset identity authentication reference information;
  • the adjustment unit 23 is configured to respond to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, based on the face information Adjust the identity authentication reference information.
  • the identity authentication reference information includes: a reference face information database;
  • the adjusting unit 23 is configured to add the face information to the reference face information set associated with the requesting user in the reference face information database.
  • the identity authentication reference information includes: reference parameters used for identity authentication.
  • the reference parameters include preset parameters of the neural network
  • the authentication unit 22 is configured to use the preset neural network to verify whether the requesting user is an authenticated user based on the face information;
  • the adjusting unit 23 is configured to use the face information to construct a training sample; and adjust the preset neural network parameters based on the training sample.
  • the adjustment unit 23 is configured to use the face information as the input of the preset neural network to obtain an output result; in response to the output result being that the authentication fails, correct the The parameters of the preset neural network are adjusted, so that the adjusted result of the identity authentication of the face information by the preset neural network is authentication passed.
  • the reference parameters used for identity authentication include: a matching degree threshold of face information
  • the authentication unit 22 is configured to determine the matching degree between the face information and the face information of the authenticated user; in response to the matching degree between the face information and the face information of the authenticated user exceeding the matching
  • the degree threshold is determined to determine that the requesting user has passed the authentication
  • the adjustment unit 23 is configured to lower the matching degree threshold.
  • the adjusting unit 23 is configured to lower the matching degree threshold to the target matching degree threshold in response to the ambient brightness being lower than the set brightness threshold.
  • the apparatus further includes:
  • a detection unit configured to detect whether the face corresponding to the face information has an occlusion area
  • the authentication unit 22 is configured to, in response to detecting that the face corresponding to the face information has an occluded area, weight the unoccluded area in the face information based on the first matching weight to obtain the first weighting information, based on the first matching weight.
  • the second matching weight weights the occlusion area in the face information to obtain second weighting information; based on the first weighting information and the second weighting information, the requesting user is authenticated;
  • the adjusting unit 23 is configured to increase the first matching weight, and/or decrease the second matching weight in response to detecting that the face has an occlusion area.
  • the apparatus further includes:
  • a prompting unit configured to send a prompt message to the requesting user in response to the object to be unlocked being successfully unlocked based on a preset unlocking operation when the object to be unlocked is not successfully unlocked according to the user's identity authentication result , the prompt information is used to prompt the requesting user to adjust the identity authentication reference information;
  • the adjustment unit 23 is configured to adjust the identity authentication reference information based on the face information in response to detecting that the requesting user issues an adjustment instruction based on the prompt information.
  • the apparatus further includes:
  • a time interval determination unit configured to obtain the time interval between the requesting user sending the request and executing the preset unlocking operation
  • the adjusting unit 23 is configured to adjust the identity authentication reference information based on the face information in response to the time interval being less than a set duration threshold.
  • the object to be unlocked includes at least one of the following devices:
  • the functions or modules included in the apparatuses provided in the embodiments of the present disclosure may be used to execute the methods described in the above method embodiments.
  • the identity authentication of the requesting user who made the request is performed, and then in response to the If the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information.
  • the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user has a high probability of being a user with unlocking authority, then based on the face information and the preset identity authentication benchmark.
  • the process of information authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, and improve the unlocking success rate. Better experience.
  • Embodiments of the present disclosure further provide a computer-readable storage medium, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the foregoing method is implemented.
  • the computer-readable storage medium may be a volatile computer-readable storage medium or a non-volatile computer-readable storage medium.
  • An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to invoke the instructions stored in the memory to execute the above method.
  • Embodiments of the present disclosure also provide a computer program product, including computer-readable codes.
  • a processor in the device executes a method for implementing the identity authentication method provided by any of the above embodiments. instruction.
  • An embodiment of the present disclosure further provides another computer program product for storing computer-readable instructions, which, when executed, cause the computer to perform the operations of the identity authentication method provided by any of the foregoing embodiments.
  • the electronic device may be provided as a terminal, server or other form of device.
  • FIG. 3 shows a block diagram of an electronic device 800 according to an embodiment of the present disclosure.
  • electronic device 800 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, etc. terminal.
  • electronic device 800 may include one or more of the following components: processing component 802, memory 804, power supply component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814 , and the communication component 816 .
  • the processing component 802 generally controls the overall operation of the electronic device 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 can include one or more processors 820 to execute instructions to perform all or some of the steps of the methods described above.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operation at electronic device 800 . Examples of such data include instructions for any application or method operating on electronic device 800, contact data, phonebook data, messages, pictures, videos, and the like. Memory 804 may be implemented by any type of volatile or nonvolatile storage device or combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • Power supply assembly 806 provides power to various components of electronic device 800 .
  • Power supply components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to electronic device 800 .
  • Multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • a touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action.
  • the multimedia component 808 includes a front-facing camera and/or a rear-facing camera. When the electronic device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each of the front and rear cameras can be a fixed optical lens system or have focal length and optical zoom capability.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) that is configured to receive external audio signals when electronic device 800 is in operating modes, such as calling mode, recording mode, and voice recognition mode.
  • the received audio signal may be further stored in memory 804 or transmitted via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: home button, volume buttons, start button, and lock button.
  • Sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of electronic device 800 .
  • the sensor assembly 814 can detect the on/off state of the electronic device 800, the relative positioning of the components, such as the display and the keypad of the electronic device 800, the sensor assembly 814 can also detect the electronic device 800 or one of the electronic device 800 Changes in the position of components, presence or absence of user contact with the electronic device 800 , orientation or acceleration/deceleration of the electronic device 800 and changes in the temperature of the electronic device 800 .
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a complementary metal oxide semiconductor (CMOS) or charge coupled device (CCD) image sensor, for use in imaging applications.
  • CMOS complementary metal oxide semiconductor
  • CCD charge coupled device
  • the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communication between electronic device 800 and other devices.
  • the electronic device 800 may access a wireless network based on a communication standard, such as wireless network (WiFi), second generation mobile communication technology (2G) or third generation mobile communication technology (3G), or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module may be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • electronic device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A programmed gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A programmed gate array
  • controller microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • a non-volatile computer-readable storage medium such as memory 804 comprising computer program instructions executable by processor 820 of electronic device 800 to perform the above-described method.
  • FIG. 4 shows a block diagram of an electronic device 1900 according to an embodiment of the present disclosure.
  • the electronic device 1900 may be provided as a server. 4
  • electronic device 1900 includes processing component 1922, which further includes one or more processors, and a memory resource represented by memory 1932 for storing instructions executable by processing component 1922, such as applications.
  • An application program stored in memory 1932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 1922 is configured to execute instructions to perform the above-described methods.
  • the electronic device 1900 may also include a power supply assembly 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input output (I/O) interface 1958 .
  • the electronic device 1900 can operate based on an operating system stored in the memory 1932, such as a Microsoft server operating system (Windows Server TM ), a graphical user interface based operating system (Mac OS X TM ) introduced by Apple, a multi-user multi-process computer operating system (Unix TM ), Free and Open Source Unix-like Operating System (Linux TM ), Open Source Unix-like Operating System (FreeBSD TM ) or the like.
  • Microsoft server operating system Windows Server TM
  • Mac OS X TM graphical user interface based operating system
  • Uniix TM multi-user multi-process computer operating system
  • Free and Open Source Unix-like Operating System Linux TM
  • FreeBSD TM Open Source Unix-like Operating System
  • a non-volatile computer-readable storage medium such as memory 1932 comprising computer program instructions executable by processing component 1922 of electronic device 1900 to perform the above-described method.
  • the present disclosure may be a system, method and/or computer program product.
  • the computer program product may include a computer-readable storage medium having computer-readable program instructions loaded thereon for causing a processor to implement various aspects of the present disclosure.
  • a computer-readable storage medium may be a tangible device that can hold and store instructions for use by the instruction execution device.
  • the computer-readable storage medium may be, for example, but not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Non-exhaustive list of computer readable storage media include: portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM) or flash memory), static random access memory (SRAM), portable compact disk read only memory (CD-ROM), digital versatile disk (DVD), memory sticks, floppy disks, mechanically coded devices, such as printers with instructions stored thereon Hole cards or raised structures in grooves, and any suitable combination of the above.
  • RAM random access memory
  • ROM read only memory
  • EPROM erasable programmable read only memory
  • flash memory static random access memory
  • SRAM static random access memory
  • CD-ROM compact disk read only memory
  • DVD digital versatile disk
  • memory sticks floppy disks
  • mechanically coded devices such as printers with instructions stored thereon Hole cards or raised structures in grooves, and any suitable combination of the above.
  • Computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (eg, light pulses through fiber optic cables), or through electrical wires transmitted electrical signals.
  • the computer readable program instructions described herein may be downloaded to various computing/processing devices from a computer readable storage medium, or to an external computer or external storage device over a network such as the Internet, a local area network, a wide area network, and/or a wireless network.
  • the network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or network interface in each computing/processing device receives computer-readable program instructions from a network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
  • Computer program instructions for carrying out operations of the present disclosure may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or instructions in one or more programming languages.
  • Source or object code written in any combination, including object-oriented programming languages, such as Smalltalk, C++, etc., and conventional procedural programming languages, such as the "C" language or similar programming languages.
  • the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement.
  • the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider through the Internet connect).
  • LAN local area network
  • WAN wide area network
  • custom electronic circuits such as programmable logic circuits, field programmable gate arrays (FPGAs), or programmable logic arrays (PLAs) can be personalized by utilizing state information of computer readable program instructions.
  • Computer readable program instructions are executed to implement various aspects of the present disclosure.
  • These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer or other programmable data processing apparatus to produce a machine that causes the instructions when executed by the processor of the computer or other programmable data processing apparatus , resulting in means for implementing the functions/acts specified in one or more blocks of the flowchart and/or block diagrams.
  • These computer readable program instructions can also be stored in a computer readable storage medium, these instructions cause a computer, programmable data processing apparatus and/or other equipment to operate in a specific manner, so that the computer readable medium on which the instructions are stored includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks of the flowchart and/or block diagrams.
  • Computer readable program instructions can also be loaded onto a computer, other programmable data processing apparatus, or other equipment to cause a series of operational steps to be performed on the computer, other programmable data processing apparatus, or other equipment to produce a computer-implemented process , thereby causing instructions executing on a computer, other programmable data processing apparatus, or other device to implement the functions/acts specified in one or more blocks of the flowcharts and/or block diagrams.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more functions for implementing the specified logical function(s) executable instructions.
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented in dedicated hardware-based systems that perform the specified functions or actions , or can be implemented in a combination of dedicated hardware and computer instructions.
  • the computer program product can be specifically implemented by hardware, software or a combination thereof.
  • the computer program product is embodied as a computer storage medium, and in another optional embodiment, the computer program product is embodied as a software product, such as a software development kit (Software Development Kit, SDK), etc. Wait.
  • a software development kit Software Development Kit, SDK

Abstract

An identity authentication method and apparatus, and an electronic device and a storage medium. The method comprises: acquiring facial information used for requesting to unlock an object to be unlocked (S11); on the basis of the facial information and pre-set identity authentication reference information, performing identity authentication on a requesting user that sends out the request (S12); and in response to said object not being successfully unlocked according to an identity authentication result of the requesting user, said object being successfully unlocked on the basis of a pre-set unlocking operation, and on the basis of the facial information, adjusting the identity authentication reference information (S13).

Description

一种身份认证方法及装置、电子设备和存储介质An identity authentication method and device, electronic device and storage medium 技术领域technical field
本公开涉及计算机技术领域,尤其涉及一种身份认证方法及装置、电子设备和存储介质。The present disclosure relates to the field of computer technologies, and in particular, to an identity authentication method and apparatus, an electronic device, and a storage medium.
背景技术Background technique
随着人工智能技术的发展,智能解锁的方式越来越多地被应用于各行各业中,例如应用于汽车解锁、房门解锁、闸机解锁等等。传统的解锁方式有钥匙解锁、指纹解锁等,随着计算机视觉技术的发展,人脸识别解锁的方式也被广泛应用于各种解锁对象。With the development of artificial intelligence technology, intelligent unlocking methods are more and more used in all walks of life, such as car unlocking, door unlocking, gate unlocking and so on. The traditional unlocking methods include key unlocking, fingerprint unlocking, etc. With the development of computer vision technology, face recognition unlocking methods are also widely used in various unlocking objects.
发明内容SUMMARY OF THE INVENTION
本公开提出了一种身份认证技术方案。The present disclosure proposes an identity authentication technical solution.
根据本公开的一方面,提供了一种身份认证方法,包括:According to an aspect of the present disclosure, an identity authentication method is provided, including:
获取用于请求对待解锁对象进行解锁的人脸信息;Obtain the face information used to request the unlocking of the object to be unlocked;
基于所述人脸信息和预设的身份认证基准信息,对发出所述请求的请求用户进行身份认证;Based on the face information and the preset identity authentication reference information, perform identity authentication on the requesting user who sent the request;
响应于在根据所述请求用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,基于所述人脸信息调整所述身份认证基准信息。In response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication benchmark is adjusted based on the face information information.
在一种可能的实现方式中,所述身份认证基准信息包括:基准人脸信息库;In a possible implementation manner, the identity authentication reference information includes: a reference face information database;
所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
将所述人脸信息加入到所述基准人脸信息库中与所述请求用户关联的基准人脸信息集合。The face information is added to the reference face information set associated with the requesting user in the reference face information database.
在一种可能的实现方式中,所述身份认证基准信息包括:用于身份认证的基准参数。In a possible implementation manner, the identity authentication reference information includes: reference parameters used for identity authentication.
在一种可能的实现方式中,所述基准参数包括预设的神经网络的参数;In a possible implementation manner, the reference parameters include preset parameters of the neural network;
所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:The performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
基于所述人脸信息,采用所述预设的神经网络验证所述请求用户是否为认证用户;Based on the face information, using the preset neural network to verify whether the requesting user is an authenticated user;
所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
利用所述人脸信息构建训练样本;Use the face information to construct training samples;
基于所述训练样本对所述预设的神经网络的参数进行调整。The parameters of the preset neural network are adjusted based on the training samples.
在一种可能的实现方式中,所述基于所述训练样本对所述预设的神经网络的参数进行调整,包括:In a possible implementation manner, the adjusting the parameters of the preset neural network based on the training samples includes:
将所述人脸信息作为所述预设的神经网络的输入,得到输出结果;Using the face information as the input of the preset neural network to obtain an output result;
响应于所述输出结果为认证不通过,对所述预设的神经网络的参数进行调整,以使 得调整后的所述预设的神经网络对所述人脸信息的身份认证结果为认证通过。In response to the output result being that the authentication fails, the parameters of the preset neural network are adjusted, so that the identity authentication result of the adjusted preset neural network to the face information is authentication passed.
在一种可能的实现方式中,所述用于身份认证的基准参数包括:人脸信息的匹配度阈值;In a possible implementation manner, the reference parameters used for identity authentication include: a matching degree threshold of face information;
所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:The performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
确定所述人脸信息与认证用户的人脸信息之间的匹配度;determining the degree of matching between the face information and the face information of the authenticated user;
响应于所述人脸信息与认证用户的人脸信息之间的匹配度超过所述匹配度阈值,确定所述请求用户通过认证;In response to the matching degree between the face information and the face information of the authenticated user exceeding the matching degree threshold, it is determined that the requesting user has passed the authentication;
所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
调低所述匹配度阈值。Decrease the match threshold.
在一种可能的实现方式中,所述调低所述匹配度阈值,包括:In a possible implementation manner, the lowering of the matching degree threshold includes:
响应于环境亮度低于设定亮度阈值,将所述匹配度阈值调低至目标匹配度阈值。In response to the ambient brightness being lower than the set brightness threshold, the matching degree threshold is adjusted down to the target matching degree threshold.
在一种可能的实现方式中,所述方法还包括:In a possible implementation, the method further includes:
检测所述人脸信息对应的人脸是否存在遮挡区域;Detecting whether the face corresponding to the face information has an occlusion area;
所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:The performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
响应于检测到所述人脸信息对应的人脸存在遮挡区域,基于第一匹配权重对所述人脸信息中的未遮挡区域进行加权得到第一加权信息,基于第二匹配权重对所述人脸信息中的遮挡区域进行加权得到第二加权信息;In response to detecting that the face corresponding to the face information has an occluded area, weighting the unoccluded area in the face information based on the first matching weight to obtain first weighted information, and based on the second matching weight The occlusion area in the face information is weighted to obtain the second weighted information;
基于所述第一加权信息和第二加权信息对所述请求用户进行身份认证;Perform identity authentication on the requesting user based on the first weighting information and the second weighting information;
所述基于所述人脸信息调整所述身份认证基准信息,包括:响应于检测到所述人脸存在遮挡区域,增加第一匹配权重,和/或,减小所述第二匹配权重。The adjusting the identity authentication reference information based on the face information includes: in response to detecting that the face has an occlusion area, increasing the first matching weight, and/or decreasing the second matching weight.
在一种可能的实现方式中,所述方法还包括:In a possible implementation, the method further includes:
响应于在根据所述用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,向所述请求用户发出提示信息,所述提示信息用于提示请求用户对所述身份认证基准信息进行调整;所述基于所述人脸信息调整所述身份认证基准信息,包括:In response to the fact that the object to be unlocked is not successfully unlocked according to the user's identity authentication result, the object to be unlocked is successfully unlocked based on a preset unlocking operation, a prompt message is sent to the requesting user, and the prompt message is used to prompt the requesting user to adjust the identity authentication reference information; and the adjustment of the identity authentication reference information based on the face information includes:
响应于检测到所述请求用户基于所述提示信息发出调整指令,基于所述人脸信息调整所述身份认证基准信息。In response to detecting that the requesting user issues an adjustment instruction based on the prompt information, the identity authentication reference information is adjusted based on the face information.
在一种可能的实现方式中,所述方法还包括:In a possible implementation, the method further includes:
获取所述请求用户发出所述请求和执行所述预设的解锁操作之间的时间间隔;Obtain the time interval between the requesting user sending the request and executing the preset unlocking operation;
所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
响应于所述时间间隔小于设定时长阈值,基于所述人脸信息调整所述身份认证基准信息。In response to the time interval being less than a set duration threshold, the identity authentication reference information is adjusted based on the face information.
在一种可能的实现方式中,所述待解锁对象包括下述至少一种设备:In a possible implementation manner, the object to be unlocked includes at least one of the following devices:
车门锁、房门锁、闸机。Door locks, door locks, turnstiles.
根据本公开的一方面,提供了一种身份认证装置,包括:According to an aspect of the present disclosure, an identity authentication device is provided, comprising:
获取单元,用于获取用于请求对待解锁对象进行解锁的人脸信息;an acquisition unit, used for acquiring face information for requesting the unlocking of the object to be unlocked;
认证单元,用于基于所述人脸信息和预设的身份认证基准信息,对发出所述请求的请求用户进行身份认证;an authentication unit, configured to perform identity authentication on the requesting user who issued the request based on the face information and preset identity authentication reference information;
调整单元,用于响应于在根据所述请求用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,基于所述人脸信息调整所述身份认证基准信息。An adjustment unit, configured to adjust the to-be-unlocked object based on the preset unlocking operation in response to the unsuccessful unlocking of the to-be-unlocked object based on the identity authentication result of the requesting user, and to adjust based on the face information The identity authentication reference information.
在一种可能的实现方式中,所述身份认证基准信息包括:基准人脸信息库;In a possible implementation manner, the identity authentication reference information includes: a reference face information database;
所述调整单元,用于将所述人脸信息加入到所述基准人脸信息库中与所述请求用户关联的基准人脸信息集合。The adjusting unit is configured to add the face information to the reference face information set associated with the requesting user in the reference face information database.
在一种可能的实现方式中,所述身份认证基准信息包括:用于身份认证的基准参数。In a possible implementation manner, the identity authentication reference information includes: reference parameters used for identity authentication.
在一种可能的实现方式中,所述基准参数包括预设的神经网络的参数;In a possible implementation manner, the reference parameters include preset parameters of the neural network;
所述认证单元,用于基于所述人脸信息,采用所述预设的神经网络验证所述请求用户是否为认证用户;the authentication unit, configured to use the preset neural network to verify whether the requesting user is an authenticated user based on the face information;
所述调整单元,用于利用所述人脸信息构建训练样本;基于所述训练样本对所述预设的神经网络的参数进行调整。The adjustment unit is configured to construct a training sample by using the face information; and adjust the parameters of the preset neural network based on the training sample.
在一种可能的实现方式中,所述调整单元,用于将所述人脸信息作为所述预设的神经网络的输入,得到输出结果;响应于所述输出结果为认证不通过,对所述预设的神经网络的参数进行调整,以使得调整后的所述预设的神经网络对所述人脸信息的身份认证结果为认证通过。In a possible implementation manner, the adjustment unit is configured to use the face information as the input of the preset neural network to obtain an output result; in response to the output result being that the authentication fails, the The parameters of the preset neural network are adjusted, so that the adjusted result of the identity authentication of the face information by the preset neural network is authentication passed.
在一种可能的实现方式中,所述用于身份认证的基准参数包括:人脸信息的匹配度阈值;In a possible implementation manner, the reference parameters used for identity authentication include: a matching degree threshold of face information;
所述认证单元,用于确定所述人脸信息与认证用户的人脸信息之间的匹配度;响应于所述人脸信息与认证用户的人脸信息之间的匹配度超过所述匹配度阈值,确定所述请求用户通过认证;The authentication unit is configured to determine the degree of matching between the face information and the face information of the authenticated user; in response to the degree of matching between the face information and the face information of the authenticated user exceeding the degree of matching Threshold, to determine that the requesting user has passed the authentication;
所述调整单元,用于调低所述匹配度阈值。The adjustment unit is configured to lower the matching degree threshold.
在一种可能的实现方式中,所述调整单元,用于响应于环境亮度低于设定亮度阈值,将所述匹配度阈值调低至目标匹配度阈值。In a possible implementation manner, the adjusting unit is configured to adjust the matching degree threshold to the target matching degree threshold in response to the ambient brightness being lower than the set brightness threshold.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the apparatus further includes:
检测单元,用于检测所述人脸信息对应的人脸是否存在遮挡区域;a detection unit, configured to detect whether the face corresponding to the face information has an occlusion area;
所述认证单元,用于响应于检测到所述人脸信息对应的人脸存在遮挡区域,基于第一匹配权重对所述人脸信息中的未遮挡区域进行加权得到第一加权信息,基于第二匹配权重对所述人脸信息中的遮挡区域进行加权得到第二加权信息;基于所述第一加权信息和第二加权信息对所述请求用户进行身份认证;The authentication unit is configured to, in response to detecting that the face corresponding to the face information has an occluded area, weight the unoccluded area in the face information based on the first matching weight to obtain first weighting information, and based on the first matching weight. Two matching weights weight the occlusion area in the face information to obtain second weighting information; perform identity authentication on the requesting user based on the first weighting information and the second weighting information;
所述调整单元,用于响应于检测到所述人脸存在遮挡区域,增加第一匹配权重,和/或,减小所述第二匹配权重。The adjusting unit is configured to increase the first matching weight, and/or decrease the second matching weight in response to detecting that the face has an occlusion area.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the apparatus further includes:
提示单元,用于响应于在根据所述用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,向所述请求用户发出提示信息,所述提示信息用于提示请求用户对所述身份认证基准信息进行调整;a prompting unit, configured to send a prompt message to the requesting user in response to the object to be unlocked being successfully unlocked based on a preset unlocking operation when the object to be unlocked is not successfully unlocked according to the user's identity authentication result , the prompt information is used to prompt the requesting user to adjust the identity authentication reference information;
所述调整单元,用于响应于检测到所述请求用户基于所述提示信息发出调整指令,基于所述人脸信息调整所述身份认证基准信息。The adjustment unit is configured to adjust the identity authentication reference information based on the face information in response to detecting that the requesting user issues an adjustment instruction based on the prompt information.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the apparatus further includes:
时间间隔确定单元,用于获取所述请求用户发出所述请求和执行所述预设的解锁操作之间的时间间隔;a time interval determination unit, configured to obtain the time interval between the requesting user sending the request and executing the preset unlocking operation;
所述调整单元,用于响应于所述时间间隔小于设定时长阈值,基于所述人脸信息调整所述身份认证基准信息。The adjustment unit is configured to adjust the identity authentication reference information based on the face information in response to the time interval being less than a set duration threshold.
在一种可能的实现方式中,所述待解锁对象包括下述至少一种设备:In a possible implementation manner, the object to be unlocked includes at least one of the following devices:
车门锁、房门锁、闸机。Door locks, door locks, turnstiles.
根据本公开的一方面,提供了一种电子设备,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为调用所述存储器存储的指令,以执行上述方法。According to an aspect of the present disclosure, there is provided an electronic device, comprising: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to invoke the instructions stored in the memory to execute the above method.
根据本公开的一方面,提供了一种计算机可读存储介质,其上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现上述方法。According to an aspect of the present disclosure, there is provided a computer-readable storage medium having computer program instructions stored thereon, the computer program instructions implementing the above method when executed by a processor.
根据本公开的一方面,提供了一种计算机程序,包括计算机可读代码,当所述计算机可读代码在电子设备中运行时,所述电子设备中的处理器执行用于实现上述方法。According to an aspect of the present disclosure, there is provided a computer program comprising computer-readable code, which when the computer-readable code is executed in an electronic device, is executed by a processor in the electronic device for implementing the above method.
在本公开实施例中,在获取用于请求对解锁进行解锁的人脸信息后,会基于人脸信息和预设的身份认证基准信息,对发出请求的请求用户进行身份认证,然后响应于在根据请求用户的身份认证结果未成功解锁待解锁对象的情况下,待解锁对象基于预设的解锁操作成功解锁,基于人脸信息调整身份认证基准信息。由于待解锁对象基于预设的解锁操作成功解锁,而根据请求用户的身份认证结果未成功解锁,表明该请求用户可能是具备解锁权限的用户,那么基于人脸信息和预设的身份认证基准信息进行身份认证的过程可以进一步优化,因此,基于人脸信息调整身份认证基准信息,能够提高基于人脸信息和预设的身份认证基准信息进行身份认证的准确率,提高了解锁成功率,用户体验较好。In the embodiment of the present disclosure, after obtaining the face information for requesting unlocking, based on the face information and the preset identity authentication reference information, the identity authentication of the requesting user who made the request is performed, and then in response to the If the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information. Since the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user may be a user with unlocking authority, then based on the face information and the preset identity authentication benchmark information The process of identity authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, improve the success rate of unlocking, and improve user experience. better.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,而非限制本公开。根据下面参考附图对示例性实施例的详细说明,本公开的其它特征及方面将变得清楚。It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure. Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments with reference to the accompanying drawings.
附图说明Description of drawings
此处的附图被并入说明书中并构成本说明书的一部分,这些附图示出了符合本公开的实施例,并与说明书一起用于说明本公开的技术方案。The accompanying drawings, which are incorporated into and constitute a part of this specification, illustrate embodiments consistent with the present disclosure, and together with the description, serve to explain the technical solutions of the present disclosure.
图1示出根据本公开实施例的身份认证方法的流程图。FIG. 1 shows a flowchart of an identity authentication method according to an embodiment of the present disclosure.
图2示出本公开实施例提供的身份认证装置的框图。FIG. 2 shows a block diagram of an identity authentication apparatus provided by an embodiment of the present disclosure.
图3示出本公开实施例提供的一种电子设备的框图。FIG. 3 shows a block diagram of an electronic device provided by an embodiment of the present disclosure.
图4示出本公开实施例提供的一种电子设备的框图。FIG. 4 shows a block diagram of an electronic device provided by an embodiment of the present disclosure.
具体实施方式Detailed ways
以下将参考附图详细说明本公开的各种示例性实施例、特征和方面。附图中相同的附图标记表示功能相同或相似的元件。尽管在附图中示出了实施例的各种方面,但是除非特别指出,不必按比例绘制附图。Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures denote elements that have the same or similar functions. While various aspects of the embodiments are shown in the drawings, the drawings are not necessarily drawn to scale unless otherwise indicated.
在这里专用的词“示例性”意为“用作例子、实施例或说明性”。这里作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中术语“至少一种”表示多种中的任意一种或多种中的至少两种的任意组合,例如,包括A、B、C中的至少一种,可以表示包括从A、B和C构成的集合中选择的任意一个或多个元素。The term "and/or" in this article is only an association relationship to describe the associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and A and B exist independently B these three cases. In addition, the term "at least one" herein refers to any combination of any one of the plurality or at least two of the plurality, for example, including at least one of A, B, and C, and may mean including from A, B, and C. Any one or more elements selected from the set of B and C.
另外,为了更好地说明本公开,在下文的具体实施方式中给出了众多的具体细节。本领域技术人员应当理解,没有某些具体细节,本公开同样可以实施。在一些实例中,对于本领域技术人员熟知的方法、手段、元件和电路未作详细描述,以便于凸显本公开的主旨。In addition, in order to better illustrate the present disclosure, numerous specific details are set forth in the following detailed description. It will be understood by those skilled in the art that the present disclosure may be practiced without certain specific details. In some instances, methods, means, components and circuits well known to those skilled in the art have not been described in detail so as not to obscure the subject matter of the present disclosure.
随着人工智能技术的发展,智能解锁的方式越来越多,例如,基于计算机视觉技术的人脸识别解锁。人脸识别解锁往往会存在一定的准确率,因此,亟需对解锁过程进行优化,以提高用户体验。With the development of artificial intelligence technology, there are more and more ways of intelligent unlocking, for example, face recognition unlocking based on computer vision technology. Face recognition unlocking often has a certain accuracy rate. Therefore, it is urgent to optimize the unlocking process to improve user experience.
基于此,本公开实施例提供一种身份认证方法,在获取用于请求对解锁进行解锁的人脸信息后,会基于人脸信息和预设的身份认证基准信息,对发出请求的请求用户进行身份认证,然后响应于在根据请求用户的身份认证结果未成功解锁待解锁对象的情况下,待解锁对象基于预设的解锁操作成功解锁,基于人脸信息调整身份认证基准信息。由于待解锁对象基于预设的解锁操作成功解锁,而根据请求用户的身份认证结果未成功解锁,表明该请求用户可能是具备解锁权限的用户,那么基于人脸信息和预设的身份认证基准信息进行身份认证的过程可以进一步优化,因此,基于人脸信息调整身份认证基准信息,能够提高基于人脸信息和预设的身份认证基准信息进行身份认证的准确率,提高了解锁成功率,用户体验较好。Based on this, an embodiment of the present disclosure provides an identity authentication method. After obtaining face information for requesting unlocking, based on the face information and preset identity authentication reference information, the requesting user who sends the request will be authenticated. Identity authentication, and then adjust the identity authentication reference information based on the face information in response to the fact that the to-be-unlocked object is successfully unlocked based on the preset unlocking operation when the to-be-unlocked object is not successfully unlocked according to the identity authentication result of the requesting user. Since the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user may be a user with unlocking authority, then based on the face information and the preset identity authentication benchmark information The process of identity authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, improve the success rate of unlocking, and improve user experience. better.
在一种可能的实现方式中,所述身份认证方法可以由终端设备或服务器等电子设备执行,终端设备可以为用户设备(User Equipment,UE)、移动设备、用户终端、终端、蜂窝电话、无绳电话、个人数字处理(Personal Digital Assistant,PDA)、手持设备、计算设备、车载设备、可穿戴设备等,所述方法可以通过处理器调用存储器中存储的计算 机可读指令的方式来实现。或者,可通过服务器执行所述方法。In a possible implementation manner, the identity authentication method may be performed by an electronic device such as a terminal device or a server, and the terminal device may be a user equipment (User Equipment, UE), a mobile device, a user terminal, a terminal, a cellular phone, a cordless Telephone, personal digital assistant (Personal Digital Assistant, PDA), handheld device, computing device, vehicle-mounted device, wearable device, etc., the method can be implemented by the processor calling the computer-readable instructions stored in the memory. Alternatively, the method may be performed by a server.
在一种可能的实现方式中,所述待解锁对象包括下述至少一种设备:车门锁、房门锁、闸机。相应地,本公开实施例提供的身份认证方法的执行主体可以是位于上述解锁对象中的身份认证设备,或者是上述解锁对象本身。In a possible implementation manner, the object to be unlocked includes at least one of the following devices: a vehicle door lock, a house door lock, and a turnstile. Correspondingly, the execution subject of the identity authentication method provided by the embodiment of the present disclosure may be the identity authentication device located in the above-mentioned unlocking object, or the above-mentioned unlocking object itself.
为便于描述,本说明书一个或多个实施例中,身份认证方法的执行主体可以是身份认证设备,后文以执行主体为身份认证设备为例,对该方法的实施方式进行介绍。可以理解,该方法的执行主体为身份认证设备只是一种示例性的说明,并不应理解为对该方法的限定。For ease of description, in one or more embodiments of this specification, the execution subject of the identity authentication method may be an identity authentication device, and the implementation of the method will be described hereinafter by taking the execution subject as an identity authentication device as an example. It can be understood that the execution subject of the method is an identity authentication device is only an exemplary description, and should not be construed as a limitation of the method.
图1示出根据本公开实施例的身份认证方法的流程图,如图1所示,所述身份认证方法包括:FIG. 1 shows a flowchart of an identity authentication method according to an embodiment of the present disclosure. As shown in FIG. 1 , the identity authentication method includes:
在步骤S11中,获取用于请求对待解锁对象进行解锁的人脸信息。In step S11, face information for requesting to unlock the object to be unlocked is obtained.
对待解锁对象进行解锁的请求可以是用户操作触发的,例如,用户可以通过待解锁对象上的物理按键或虚拟按键发出通过人脸信息对待解锁对象进行解锁的请求。或者,对待解锁对象进行解锁的请求是在检测到用户的人脸信息的情况下触发的,上述电子设备可以持续检测用于人脸解锁的摄像头采集的视频流中是否出现人脸对象,在出现人脸对象的情况下唤醒人脸解锁功能,自动生成对待解锁对象进行解锁的请求。The request for unlocking the object to be unlocked may be triggered by a user operation. For example, the user may send a request for unlocking the object to be unlocked through face information through a physical button or a virtual button on the object to be unlocked. Or, the request for unlocking the object to be unlocked is triggered when the user's face information is detected, and the above electronic device can continuously detect whether a face object appears in the video stream collected by the camera used for face unlocking, and when it appears In the case of a face object, wake up the face unlock function, and automatically generate a request to unlock the object to be unlocked.
人脸信息可以通过与待解锁对象关联的影像采集设备来获取,对于具体的获取方式本公开不作限定。The face information can be acquired through an image acquisition device associated with the object to be unlocked, and the specific acquisition method is not limited in this disclosure.
在步骤S12中,基于所述人脸信息和预设的身份认证基准信息,对发出所述请求的请求用户进行身份认证。In step S12, based on the face information and preset identity authentication reference information, identity authentication is performed on the requesting user who sent the request.
这里的身份认证可以是对用户的身份进行确认的过程,具体可以是基于人脸信息确认用户所对应的具体身份信息,或者,也可以是基于人脸信息确认用户是否属于具备解锁权限的认证用户。The identity authentication here can be the process of confirming the identity of the user, specifically, confirming the specific identity information corresponding to the user based on the face information, or it can also confirm whether the user belongs to the authenticated user with unlocking authority based on the face information. .
身份认证是基于预设的身份认证基准信息进行的,这里的身份认证基准信息可以是用于对人脸信息进行身份认证的基准信息,基于该身份认证的基准信息,可以对人脸信息进行身份认证。Identity authentication is based on preset identity authentication benchmark information, where the identity authentication benchmark information can be benchmark information used to authenticate face information, and based on the identity authentication benchmark information, face information can be identified. Certification.
在一种可能的实现方式中,该身份认证基准信息包括基准人脸库,基准人脸库中可以包含用户身份已知的基准人脸信息,或者是用户身份为具备解锁权限的认证用户的基准人脸信息。本公开实施例中,请求用户的人脸信息可以是人脸图像,或者可以是人脸特征值,那么基准人脸信息库中的基准人脸信息具体也可以是人脸图像,或者可以是人脸特征值。In a possible implementation manner, the identity authentication reference information includes a reference face database, and the reference face database may contain reference face information with known user identities, or a reference with the user identity being an authenticated user with unlocking authority face information. In the embodiment of the present disclosure, the face information of the requesting user may be a face image, or may be a face feature value, then the reference face information in the reference face information database may also be a face image, or may be a person face eigenvalues.
那么,在基于人脸信息和预设的身份认证基准信息,对发出请求的请求用户进行身份认证的过程中,可以将人脸信息与基准人脸信息库中的基准人脸信息进行匹配,得到人脸信息与基准人脸信息的匹配度;然后判断该匹配度是否超过匹配度阈值,在匹配度超过匹配度阈值的情况下,确定请求用户为认证用户,即认证通过。Then, in the process of performing identity authentication on the requesting user based on the face information and the preset identity authentication reference information, the face information can be matched with the reference face information in the reference face information database to obtain The matching degree between the face information and the reference face information; then determine whether the matching degree exceeds the matching degree threshold, and if the matching degree exceeds the matching degree threshold, it is determined that the requesting user is an authenticated user, that is, the authentication is passed.
在一种可能的实现方式中,该身份认证基准信息包括用于身份认证的基准参数。该 基准参数例如可以是用于身份认证的人工智能模块的参数,例如可以是预设的神经网络的参数。In a possible implementation manner, the identity authentication reference information includes reference parameters used for identity authentication. The reference parameter can be, for example, a parameter of an artificial intelligence module for identity authentication, such as a preset neural network parameter.
那么,在基于人脸信息和预设的身份认证基准信息,对发出请求的请求用户进行身份认证的过程中,可以通过该预设的神经网络对人脸信息进行身份认证,得到身份认证结果,具体通过神经网络进行身份认证的过程本公开不作具体限定。Then, in the process of performing identity authentication on the requesting user based on the face information and the preset identity authentication reference information, the identity authentication can be performed on the face information through the preset neural network to obtain the identity authentication result. The specific process of performing identity authentication through a neural network is not specifically limited in the present disclosure.
需要说明的是,以上示例性地提供了本公开进行身份认证的几种可能的实现方式,在本公开的实际应用中,本领域技术人员根据实际需求选择的其它身份认证方式,都属于本申请保护的范围,对于更多的身份认证方式,此处不作赘述。It should be noted that the above exemplarily provides several possible implementations of the present disclosure for performing identity authentication. In the practical application of the present disclosure, other identity authentication methods selected by those skilled in the art according to actual needs belong to this application. The scope of protection, for more identity authentication methods, will not be repeated here.
在得到身份认证的结果后,当身份认证结果表征请求用户为认证用户的情况下,则向解锁对象发出解锁的指令,以指示解锁对象解锁;当身份认证结果表征请求用户为非认证用户的情况下,则告知用户身份认证失败,解锁失败。After obtaining the result of identity authentication, when the result of identity authentication indicates that the requesting user is an authenticated user, an unlock instruction is issued to the unlocking object to instruct the unlocking object to unlock; when the result of identity authentication indicates that the requesting user is a non-authenticated user If it is displayed, it informs the user that the authentication fails and the unlocking fails.
在步骤S13中,响应于在根据所述请求用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,基于所述人脸信息调整所述身份认证基准信息。In step S13, in response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the adjustment is made based on the face information. The identity authentication reference information.
预设的解锁操作可以是在根据所述请求用户的身份认证结果未成功解锁所述待解锁对象后进行的,例如,请求用户在通过人脸信息请求对待解锁对象进行解锁失败后,通过解锁操作再次尝试解锁。The preset unlocking operation may be performed after the object to be unlocked is unsuccessfully unlocked according to the identity authentication result of the requesting user. Try unlocking again.
对于预设的解锁操作的具体方式,本公开不作具体限定,例如可以是通过实体钥匙解锁、通过指纹解锁、通过人脸解锁、通过密码进行解锁等等。The present disclosure does not specifically limit the specific manner of the preset unlocking operation, for example, it may be unlocking through a physical key, unlocking through a fingerprint, unlocking through a face, unlocking through a password, and the like.
这里的预设的解锁操作可以是由本公开所述的请求用户执行的操作,也就是说,在请求用户通过人脸信息请求解锁失败的情况下,再次基于实体钥匙、指纹、密码等解锁操作成功解锁后,那么可以认为请求用户是具备解锁权限的用户,而请求用户通过人脸信息请求解锁失败可能是由于身份认证基准信息不准确导致的,因此,在这种情况下,可以基于人脸信息来调整身份认证基准信息。The preset unlocking operation here may be the operation performed by the requesting user described in the present disclosure, that is, in the case where the requesting user fails to request the unlocking through the face information, the unlocking operation based on the physical key, fingerprint, password, etc. succeeds again After unlocking, it can be considered that the requesting user is a user with unlocking authority, and the failure of requesting the user to request unlocking through face information may be caused by inaccurate identity authentication reference information. Therefore, in this case, it can be based on face information. to adjust the authentication baseline information.
这里的基于人脸信息调整身份认证基准信息,可以是通过调整身份认证基准信息,以使得基于获取的人脸信息和身份认证基准信息进行身份认证的认证结果能够解锁待解锁对象,例如可以将人脸信息加入作为身份认证基准信息的人脸模板信息库,或者调整人脸识别的阈值,等等。具体调整方式可以有多种,可参见后文本公开提供的可能的实现方式,此处不作赘述。The adjustment of the identity authentication reference information based on the face information here may be by adjusting the identity authentication reference information, so that the authentication result of the identity authentication based on the obtained face information and the identity authentication reference information can unlock the object to be unlocked. The face information is added to the face template information base as the identity authentication reference information, or the threshold of face recognition is adjusted, and so on. There may be various specific adjustment manners, and reference may be made to possible implementation manners disclosed in the following text, which will not be repeated here.
在本公开实施例中,在获取用于请求对解锁进行解锁的人脸信息后,会基于人脸信息和预设的身份认证基准信息,对发出请求的请求用户进行身份认证,然后响应于在根据请求用户的身份认证结果未成功解锁待解锁对象的情况下,待解锁对象基于预设的解锁操作成功解锁,基于人脸信息调整身份认证基准信息。由于待解锁对象基于预设的解锁操作成功解锁,而根据请求用户的身份认证结果未成功解锁,表明该请求用户可能是具备解锁权限的用户,那么基于人脸信息和预设的身份认证基准信息进行身份认证的过程可以进一步优化,因此,基于人脸信息调整身份认证基准信息,能够提高基于人脸信 息和预设的身份认证基准信息进行身份认证的准确率,提高了解锁成功率,用户体验较好。In the embodiment of the present disclosure, after obtaining the face information for requesting unlocking, based on the face information and the preset identity authentication reference information, the identity authentication of the requesting user who made the request is performed, and then in response to the If the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information. Since the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user may be a user with unlocking authority, then based on the face information and the preset identity authentication benchmark information The process of identity authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, improve the success rate of unlocking, and improve user experience. better.
在一种可能的实现方式中,所述身份认证基准信息包括:基准人脸信息库;所述基于所述人脸信息调整所述身份认证基准信息,包括:将所述人脸信息加入到所述基准人脸信息库中与所述请求用户关联的基准人脸信息集合。In a possible implementation manner, the identity authentication reference information includes: a reference face information database; the adjusting the identity authentication reference information based on the face information includes: adding the face information to all The reference face information set associated with the requesting user in the reference face information database.
在本实现方式中,身份认证基准信息可以是基准人脸信息库,那么,在基于人脸信息和预设的身份认证基准信息,对发出请求的请求用户进行身份认证的过程中,可以将人脸信息与基准人脸信息库中的基准人脸信息进行匹配,得到人脸信息与基准人脸信息的匹配度;然后判断该匹配度是否超过匹配度阈值,在匹配度超过匹配度阈值的情况下,可以认为获取的人脸信息与基准人脸信息匹配成功,确定请求用户为认证用户,即认证通过。In this implementation manner, the identity authentication reference information may be a reference face information database. Then, in the process of performing identity authentication on the requesting user based on the face information and the preset identity authentication reference information, the identity authentication reference information may be The face information is matched with the reference face information in the reference face information database, and the matching degree between the face information and the reference face information is obtained; then it is judged whether the matching degree exceeds the matching degree threshold, and if the matching degree exceeds the matching degree threshold Then, it can be considered that the acquired face information is successfully matched with the reference face information, and the requesting user is determined to be an authenticated user, that is, the authentication is passed.
待解锁对象基于预设的解锁操作成功解锁后,可以认为请求用户是具备解锁权限的用户,而请求用户通过人脸信息请求解锁失败,可能是由于基准人脸信息库中的基准人脸信息无法与请求用户的人脸信息匹配成功导致的,因此,在这种情况下,可以将获取的人脸信息加入到基准人脸信息库中。由此,在该请求用户在下次通过人脸信息请求解锁的情况下,能够提高解锁成功率,用户体验较好。After the unlocking object is successfully unlocked based on the preset unlocking operation, it can be considered that the requesting user is a user with unlocking authority, and the requesting user fails to request unlocking through face information, which may be because the benchmark face information in the benchmark face information database cannot be used. It is caused by the successful matching with the face information of the requesting user. Therefore, in this case, the obtained face information can be added to the reference face information database. Therefore, in the case where the requesting user requests unlocking through the face information next time, the unlocking success rate can be improved, and the user experience is better.
在基准人脸信息库中,可以包含多个认证用户的基准人脸信息,单个认证用户可以对应于一个基准人脸信息集合。在这种情况下,在进行身份认证的过程中,在将请求用户的人脸与基准人脸信息库中的基准人脸信息进行匹配后,匹配成功的基准人脸信息所属的认证用户即对应于该请求用户。The reference face information database may contain reference face information of multiple authenticated users, and a single authenticated user may correspond to a reference face information set. In this case, in the process of identity authentication, after the face of the requesting user is matched with the reference face information in the reference face information database, the authenticated user to which the matched reference face information belongs will correspond to for the requesting user.
那么,在将获取的人脸信息加入到基准人脸信息库中的过程中,可以将人脸信息加入到基准人脸信息库中与请求用户关联的基准人脸信息集合中。Then, in the process of adding the acquired face information to the reference face information database, the face information may be added to the reference face information set associated with the requesting user in the reference face information database.
在本公开实施例中,在身份认证基准信息包括基准人脸信息库的情况下,可以将人脸信息加入到基准人脸信息库中与请求用户关联的基准人脸信息集合中,由此,在该请求用户在下次通过人脸信息请求解锁的情况下,能够提高解锁成功率,用户体验较好。In the embodiment of the present disclosure, when the identity authentication reference information includes a reference face information database, the face information may be added to the reference face information set associated with the requesting user in the reference face information database, thereby, In the case where the requesting user requests for unlocking through the face information next time, the unlocking success rate can be improved, and the user experience is better.
在一种可能的实现方式中,所述身份认证基准信息包括:用于身份认证的基准参数。该基准参数可以是影响身份验证结果的参数。例如可以是用于身份认证的人工智能模块的参数,例如可以是预设的神经网络的参数。由此,响应于在根据请求用户的身份认证结果未成功解锁待解锁对象的情况下,待解锁对象基于预设的解锁操作成功解锁,基于人脸信息调整用于身份认证的基准参数,能够提高基于人脸信息和基准参数进行身份认证的准确率,提高了解锁成功率,用户体验较好。In a possible implementation manner, the identity authentication reference information includes: reference parameters used for identity authentication. The benchmark parameter can be a parameter that affects the authentication result. For example, it can be a parameter of an artificial intelligence module for identity authentication, such as a preset neural network parameter. Therefore, in response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on the preset unlocking operation, and the reference parameters used for identity authentication are adjusted based on the face information, which can improve the The accuracy of identity authentication based on face information and benchmark parameters improves the success rate of unlocking and provides a better user experience.
在一种可能的实现方式中,基准参数包括预设的神经网络的参数;所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:基于所述人脸信息,采用所述预设的神经网络验证所述请求用户是否为认证用户;所述基于所述人脸信息调整所述身份认证基准信息,包括:利用所述人脸信息构建训练样本;基于所述训练样本对所述预设的神经网络的参数进行调整。In a possible implementation manner, the reference parameters include preset parameters of the neural network; the performing identity authentication on the requesting user based on the face information and the preset identity authentication reference information includes: the face information, and using the preset neural network to verify whether the requesting user is an authenticated user; the adjusting the identity authentication benchmark information based on the face information, including: using the face information to construct a training sample ; Adjust the parameters of the preset neural network based on the training samples.
神经网络的参数例如可以是神经网络中节点的权重值等参数,神经网络中的参数能够影响神经网络的预测结果,在对神经网络的训练中,往往通过训练样本来调整神经网络的参数,以调优神经网络的性能。For example, the parameters of the neural network can be parameters such as the weight value of the nodes in the neural network. The parameters in the neural network can affect the prediction results of the neural network. In the training of the neural network, the parameters of the neural network are often adjusted by training samples to Tuning neural network performance.
在本实现方式中,可以基于人脸信息采用预设的神经网络验证请求用户是否为认证用户,该神经网络可以是端到端的神经网络,其输入可以是人脸信息,输出为身份认证结果。In this implementation, a preset neural network can be used to verify whether the requesting user is an authenticated user based on the face information. The neural network can be an end-to-end neural network, the input can be face information, and the output is the identity authentication result.
该预设的神经网络可以基于训练样本进行训练得到,那么,可以利用人脸信息构建训练样本,并基于构建的训练样本对预设的神经网络的参数进行调整。The preset neural network can be obtained by training based on the training samples. Then, the training samples can be constructed by using the face information, and the parameters of the preset neural network can be adjusted based on the constructed training samples.
在一种可能的实现方式中,所述基于所述训练样本对所述预设的神经网络的参数进行调整,包括:将所述人脸信息作为所述预设的神经网络的输入,得到输出结果;响应于所述输出结果为认证不通过,对所述预设的神经网络的参数进行调整,以使得调整后的所述预设的神经网络对所述人脸信息的身份认证结果为认证通过。In a possible implementation manner, the adjusting the parameters of the preset neural network based on the training samples includes: taking the face information as an input of the preset neural network, and obtaining an output Result: in response to the output result being that the authentication fails, adjust the parameters of the preset neural network, so that the adjusted result of the authentication of the face information by the preset neural network is authentication pass.
在一种可能的实现方式中,在基于训练样本对预设的神经网络的参数进行调整的过程中,还可以将人脸信息与已有的训练样本合并,利用新的训练样本迭代训练神经网络,对神经网络的参数进行调整。In a possible implementation, in the process of adjusting the parameters of the preset neural network based on the training samples, the face information can also be merged with the existing training samples, and the neural network can be iteratively trained by using the new training samples , to adjust the parameters of the neural network.
在本公开实施例中,在基准参数包括预设的神经网络的参数的情况下,采用预设的神经网络来验证请求用户是否为认证用户,那么,利用人脸信息来构建训练样本,并基于训练样本对神经网络的参数进行调整,可以提高预设的神经网络进行身份认证的准确度,提高对该请求用户解锁时的解锁成功率,用户体验较好。In the embodiment of the present disclosure, in the case where the reference parameters include the parameters of the preset neural network, the preset neural network is used to verify whether the requesting user is an authenticated user, then, the training sample is constructed by using the face information, and based on Adjusting the parameters of the neural network by the training samples can improve the accuracy of identity authentication performed by the preset neural network, improve the unlocking success rate when unlocking the requested user, and provide a better user experience.
此外,在具体训练的过程中,可以在预设的神经网络对人脸信息的身份认证结果为认证不通过的情况下,可以对预设的神经网络的参数进行调整,以使得调整后的预设的神经网络对人脸信息的身份认证结果为认证通过,可以提高预设的神经网络对该请求用户进行身份认证的成功率,提高对该请求用户解锁时的解锁成功率,用户体验较好。In addition, in the specific training process, when the preset neural network authentication result of the face information is that the authentication fails, the preset neural network parameters can be adjusted, so that the adjusted preset The identity authentication result of the set neural network for the face information is authentication passed, which can improve the success rate of the preset neural network to authenticate the requesting user, and improve the unlocking success rate when the requesting user is unlocked, and the user experience is better. .
在一种可能的实现方式中,所述用于身份认证的基准参数包括人脸信息的匹配度阈值;所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:确定所述人脸信息与认证用户的人脸信息之间的匹配度;响应于所述人脸信息与认证用户的人脸信息之间的匹配度超过所述匹配度阈值,确定所述请求用户通过认证;所述基于所述人脸信息调整所述身份认证基准信息,包括:调低所述匹配度阈值。In a possible implementation manner, the reference parameter used for identity authentication includes a matching degree threshold of face information; the requesting user is subjected to a matching degree threshold based on the face information and preset identity authentication reference information. Identity authentication, including: determining the degree of matching between the face information and the face information of the authenticated user; in response to the degree of matching between the face information and the face information of the authenticated user exceeding the matching degree threshold, Determining that the requesting user has passed the authentication; and adjusting the identity authentication reference information based on the face information includes: lowering the matching degree threshold.
这里的匹配度例如可以是请求用户的人脸信息与认证用户的人脸信息之间的相似度,该相似度可以人脸信息对应的向量之间的余弦相似度。对于确定人脸信息之间相似度的过程可参照相关技术,此处不作赘述。The matching degree here may be, for example, the similarity between the face information of the requesting user and the face information of the authenticated user, and the similarity may be the cosine similarity between vectors corresponding to the face information. For the process of determining the similarity between face information, reference may be made to related technologies, which will not be repeated here.
而对于请求用户是否通过认证,可以通过匹配度阈值来衡量,通过将请求用户的人脸信息与认证用户的人脸信息之间的匹配度对与匹配度阈值进行比较,在请求用户的人脸信息与认证用户的人脸信息之间的匹配度超过匹配度阈值的情况下,则确定请求用户通过认证。Whether the requesting user has passed the authentication can be measured by the matching degree threshold. If the matching degree between the information and the face information of the authenticated user exceeds the matching degree threshold, it is determined that the requesting user has passed the authentication.
这里的匹配度阈值可以根据经验设定,或者可以动态调整,匹配度阈值例如可以是 90%。那么在请求用户的人脸信息与认证用户的人脸信息之间的匹配度超过90%的情况下,则确定请求用户通过认证。The matching degree threshold here can be set according to experience, or can be dynamically adjusted, and the matching degree threshold can be, for example, 90%. Then, if the matching degree between the face information of the requesting user and the face information of the authenticated user exceeds 90%, it is determined that the requesting user has passed the authentication.
在基于人脸信息和匹配度阈值得到的身份认证结果未成功解锁待解锁对象的情况下,由于待解锁对象基于预设的解锁操作成功解锁,那么可以认为请求用户是具备解锁权限的用户,而请求用户通过人脸信息请求解锁失败,可能是由于匹配度阈值设置过高导致的,因此,在这种情况下,可以调低匹配度阈值。由此,用户在下次通过人脸信息请求解锁的情况下,能够提高解锁成功率,用户体验较好。In the case where the identity authentication result obtained based on the face information and the matching degree threshold fails to unlock the object to be unlocked successfully, because the object to be unlocked is successfully unlocked based on the preset unlocking operation, it can be considered that the requesting user is a user with unlocking authority, and The failure to request the user to unlock through face information may be caused by the high matching threshold. Therefore, in this case, the matching threshold can be lowered. Therefore, when the user requests for unlocking through the face information next time, the unlocking success rate can be improved, and the user experience is better.
而具体对匹配度阈值进行调低的幅度,可以由用户自行设定,例如,可以是调低5%,将匹配度阈值从90%调低至85%。The specific range of lowering the matching degree threshold may be set by the user, for example, it may be lowered by 5%, and the matching degree threshold may be lowered from 90% to 85%.
在一种可能的实现方式中,所述调低所述匹配度阈值,包括:响应于环境亮度低于设定亮度阈值,将所述匹配度阈值调低至目标匹配度阈值。In a possible implementation manner, the lowering of the matching degree threshold includes: in response to the ambient brightness being lower than a set brightness threshold value, lowering the matching degree threshold value to a target matching degree threshold value.
在本公开实施例中,考虑到基于人脸信息和匹配度阈值得到的身份认证结果未成功解锁可能是由于环境亮度较低引起的,因此,可以是在环境亮度低于设定亮度阈值的情况下,将匹配度阈值调低至目标匹配度阈值,提高了环境亮度较低的情况下的解锁成功率,用户体验较好。In the embodiment of the present disclosure, considering that the unsuccessful unlocking of the identity authentication result obtained based on the face information and the matching degree threshold may be caused by the low ambient brightness, it may be that the ambient brightness is lower than the set brightness threshold. , the matching degree threshold is lowered to the target matching degree threshold, which improves the unlocking success rate when the ambient brightness is low, and the user experience is better.
环境亮度可以通过环境光传感器检测得到,该环境光传感器能够检测待解锁对象周围的环境亮度。The ambient brightness can be detected by an ambient light sensor, which can detect the ambient brightness around the object to be unlocked.
在一种可能的实现方式中,所述方法还包括:检测所述人脸信息对应的人脸是否存在遮挡区域;所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:响应于检测到所述人脸信息对应的人脸存在遮挡区域,基于第一匹配权重对所述人脸信息中的未遮挡区域进行加权得到第一加权信息,基于第二匹配权重对所述人脸信息中的遮挡区域进行加权得到第二加权信息;基于所述第一加权信息和第二加权信息对所述请求用户进行身份认证;所述基于所述人脸信息调整所述身份认证基准信息,包括:响应于检测到所述人脸存在遮挡区域,增加第一匹配权重,和/或,减小所述第二匹配权重。In a possible implementation manner, the method further includes: detecting whether the face corresponding to the face information has an occlusion area; Requesting the user to perform identity authentication includes: in response to detecting that the face corresponding to the face information has an occluded area, weighting the unoccluded area in the face information based on the first matching weight to obtain first weighting information, based on the first matching weight. The second matching weight weights the occlusion area in the face information to obtain second weighting information; performs identity authentication on the requesting user based on the first weighting information and the second weighting information; The information adjustment of the identity authentication reference information includes: in response to detecting that the face has an occluded area, increasing the first matching weight, and/or decreasing the second matching weight.
在本实现方式中,可以检测人脸信息对应的人脸是否存在遮挡区域,具体来说,针对影像采集设备采集的图像,往往通过人脸关键点检测来检测图像中是否存在人脸,或者也可以通过语义分割来确定图像中是否存在人脸,而针对检测到的人脸,可以进一步确定人脸中是否存在遮挡。In this implementation, it is possible to detect whether there is an occlusion area on the face corresponding to the face information. Specifically, for the image collected by the image acquisition device, the key point detection of the face is often used to detect whether there is a face in the image, or also Whether there is a face in the image can be determined through semantic segmentation, and for the detected face, it can be further determined whether there is an occlusion in the face.
确定人脸中是否存在遮挡的方式可以有多种,例如,可以基于面部区域的颜色来识别,当检测到面部存在与肤色差别较大的颜色的情况下,即可认为面部存在遮挡;或者可以通过目标物识别的方式,在人脸中识别到目标物的情况下即确定人脸存在遮挡,目标物具体可以是口罩、围巾、眼镜等;或者,还可以通过训练神经网络,来识别面部遮挡。There are many ways to determine whether there is occlusion in a face. For example, it can be identified based on the color of the face area. When a color that is significantly different from the skin color is detected on the face, it can be considered that the face is occluded; or Through the method of target object recognition, when the target object is recognized in the face, it is determined that the face is occluded. The target object can be a mask, scarf, glasses, etc.; or, a neural network can also be trained to identify facial occlusion .
在确定人脸中存在遮挡后,可进一步确定出存在遮挡的区域。由于遮挡区域往往无法准确地反映出人脸的特征,因此,在检测到人脸信息对应的人脸存在遮挡区域的情况 下,在基于人脸信息进行身份认证的过程中,可以基于第一匹配权重对人脸信息中的未遮挡区域进行加权得到第一加权信息,基于第二匹配权重对人脸信息中的遮挡区域进行加权得到第二加权信息;然后基于第一加权信息和第二加权信息对请求用户进行身份认证。After it is determined that there is occlusion in the face, the occluded area can be further determined. Because the occluded area is often unable to accurately reflect the features of the face, when it is detected that the face corresponding to the face information has an occluded area, in the process of identity authentication based on the face information, the first matching The weights weight the unoccluded areas in the face information to obtain the first weighting information, and weight the occluded areas in the face information based on the second matching weight to obtain the second weighting information; then based on the first weighting information and the second weighting information Authenticate the requesting user.
作为该实现方式的一个示例,第一匹配权重和第二匹配权重可以是具体的权重值,在检测到人脸存在遮挡区域的情况下,可以增加第一匹配权重,和/或,减小第二匹配权重。例如第一匹配权重可以从0.6增加至0.7,和/或,第二匹配权重可以从0.4减小至0.3。As an example of this implementation, the first matching weight and the second matching weight may be specific weight values, and in the case of detecting that there is an occluded area on the face, the first matching weight may be increased, and/or the first matching weight may be decreased. Two matching weights. For example, the first matching weight may be increased from 0.6 to 0.7, and/or the second matching weight may be decreased from 0.4 to 0.3.
第一匹配权重和第二匹配权重用于调整人脸信息中的遮挡区域和未遮挡区域在身份认证过程中,对身份认证结果的影响程度,权重越大,则对身份认证结果的影响越大;权重越小,则对身份认证结果的影响越小。The first matching weight and the second matching weight are used to adjust the degree of influence of the occluded area and the unoccluded area in the face information on the identity authentication result during the identity authentication process. The greater the weight, the greater the influence on the identity authentication result. ; The smaller the weight, the smaller the impact on the authentication result.
在本公开实施例中,在人脸存在遮挡区域的情况下,在基于人脸信息进行身份认证的过程中,可以提高第一匹配权重,以提高人脸信息中的未遮挡区域对身份认证结果的影响程度,以提高身份认证的准确率;或者,可以降低第二匹配权重,以降低人脸信息中的遮挡区域对身份认证结果的影响程度,在用户戴口罩、墨镜、帽子等存在人脸遮挡的情况下,提高身份认证的准确率。In the embodiment of the present disclosure, in the case where there is an occluded area on the face, in the process of identity authentication based on the face information, the first matching weight can be increased, so as to improve the identity authentication result of the unoccluded area in the face information. In order to improve the accuracy of identity authentication; or, the second matching weight can be reduced to reduce the influence of the occluded area in the face information on the identity authentication result. When the user wears masks, sunglasses, hats, etc. In the case of occlusion, the accuracy of identity authentication is improved.
在一种可能的实现方式中,所述方法还包括:响应于在根据所述用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,向所述请求用户发出提示信息,所述提示信息用于提示请求用户对所述身份认证基准信息进行调整;所述基于所述人脸信息调整所述身份认证基准信息,包括:响应于检测到所述请求用户基于所述提示信息发出调整指令,基于所述人脸信息调整所述身份认证基准信息。In a possible implementation manner, the method further includes: in response to the fact that the object to be unlocked is unsuccessfully unlocked according to the user's identity authentication result, the object to be unlocked succeeds based on a preset unlocking operation unlocking, and sending prompt information to the requesting user, where the prompt information is used to prompt the requesting user to adjust the identity authentication reference information; the adjusting the identity authentication reference information based on the face information includes: responding to It is detected that the requesting user sends an adjustment instruction based on the prompt information, and the identity authentication reference information is adjusted based on the face information.
在本公开实施例中,通过向用户发出提醒信息,来提醒用户对身份认证基准信息进行调整,并且在检测到调整指令的情况下,才基于人脸信息调整身份认证基准信息,防止基于非法用户的人脸信息来调整身份认证基准信息,安全性较高。In the embodiment of the present disclosure, the user is reminded to adjust the identity authentication reference information by sending reminder information to the user, and only when an adjustment instruction is detected, the identity authentication reference information is adjusted based on the face information, so as to prevent illegal users from adjusting the identity authentication reference information. The face information is used to adjust the identity authentication benchmark information, which is more secure.
在一种可能的实现方式中,所述方法还包括:获取所述请求用户发出所述请求和执行所述预设的解锁操作之间的时间间隔;所述基于所述人脸信息调整所述身份认证基准信息,包括:响应于所述时间间隔小于设定时长阈值,基于所述人脸信息调整所述身份认证基准信息。In a possible implementation manner, the method further includes: acquiring a time interval between the requesting user sending the request and executing the preset unlocking operation; the adjusting the The identity authentication reference information includes: in response to the time interval being less than a set duration threshold, adjusting the identity authentication reference information based on the face information.
在请求用户发出请求和执行预设的解锁操作之间的时间间隔较短的情况下,则这两次解锁大概率是同一人所为;而当时间间隔较长的情况下,则两次解锁很有可能不是同一人所为。因此,在本公开实施例中,通过设定时长阈值,在时间间隔小于设定时长阈值的情况下,基于人脸信息调整身份认证基准信息,安全性较高。When the time interval between requesting the user to issue a request and performing the preset unlocking operation is short, the two unlockings are likely to be done by the same person; and when the time interval is long, the two unlocking operations are performed by the same person. Most likely not by the same person. Therefore, in the embodiment of the present disclosure, by setting the duration threshold, when the time interval is smaller than the set duration threshold, the identity authentication reference information is adjusted based on the face information, which has high security.
作为该实现方式的一个示例,设定时长阈值例如可以是30秒,设定时长阈值可以根据经验设定,本公开对此不作具体限定。As an example of this implementation, the set duration threshold may be, for example, 30 seconds, and the set duration threshold may be set based on experience, which is not specifically limited in the present disclosure.
下面对本公开实施例的一个应用场景进行说明。在该应用场景中,待解锁对象为车辆的车门锁。用户在进入车内前,请求进行人脸解锁;车门锁中的身份认证设备通过摄 像头获取用户的人脸信息,并将人脸信息与基准人脸信息库中的基准人脸信息进行匹配,得到人脸信息与基准人脸信息的匹配度;身份认证设备判断该匹配度是否超过匹配度阈值,在匹配度不超过匹配度阈值的情况下,确定请求用户为非认证用户,未成功解锁;用户通过钥匙开锁的方式,对车门成功解锁;用户进入车内后,车辆向用户发出提示信息,询问用户是否将人脸解锁时所使用的人脸信息加入到基准人脸信息库中;车辆响应于用户基于提示信息发出的调整指令,将人脸信息加入到基准人脸信息库中。An application scenario of the embodiment of the present disclosure will be described below. In this application scenario, the object to be unlocked is the door lock of the vehicle. Before entering the car, the user requests face unlocking; the identity authentication device in the door lock obtains the user's face information through the camera, and matches the face information with the benchmark face information in the benchmark face information database to obtain The matching degree between the face information and the reference face information; the identity authentication device determines whether the matching degree exceeds the matching degree threshold, and if the matching degree does not exceed the matching degree threshold, it determines that the requesting user is a non-authenticated user and has not been successfully unlocked; the user The door is successfully unlocked by key unlocking; after the user enters the car, the vehicle sends a prompt message to the user, asking the user whether to add the face information used for face unlocking to the benchmark face information database; the vehicle responds to The user adds the face information to the reference face information database based on the adjustment instruction issued by the prompt information.
可以理解,本公开提及的上述各个方法实施例,在不违背原理逻辑的情况下,均可以彼此相互结合形成结合后的实施例,限于篇幅,本公开不再赘述。本领域技术人员可以理解,在具体实施方式的上述方法中,各步骤的具体执行顺序应当以其功能和可能的内在逻辑确定。It can be understood that the above-mentioned method embodiments mentioned in the present disclosure can be combined with each other to form a combined embodiment without violating the principle and logic. Those skilled in the art can understand that, in the above method of the specific embodiment, the specific execution order of each step should be determined by its function and possible internal logic.
此外,本公开还提供了身份认证装置、电子设备、计算机可读存储介质、程序,上述均可用来实现本公开提供的任一种身份认证方法,相应技术方案和描述和参见方法部分的相应记载,不再赘述。In addition, the present disclosure also provides identity authentication devices, electronic devices, computer-readable storage media, and programs, all of which can be used to implement any identity authentication method provided by the present disclosure. For the corresponding technical solutions and descriptions, refer to the corresponding records in the Methods section. ,No longer.
图2示出根据本公开实施例的身份认证装置的框图,如图2所示,所述装置包括:FIG. 2 shows a block diagram of an identity authentication apparatus according to an embodiment of the present disclosure. As shown in FIG. 2 , the apparatus includes:
获取单元21,用于获取用于请求对待解锁对象进行解锁的人脸信息;Obtaining unit 21 is used to obtain the face information for requesting the unlocking of the object to be unlocked;
认证单元22,用于基于所述人脸信息和预设的身份认证基准信息,对发出所述请求的请求用户进行身份认证;An authentication unit 22, configured to perform identity authentication on the requesting user who issued the request based on the face information and preset identity authentication reference information;
调整单元23,用于响应于在根据所述请求用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,基于所述人脸信息调整所述身份认证基准信息。The adjustment unit 23 is configured to respond to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, based on the face information Adjust the identity authentication reference information.
在一种可能的实现方式中,所述身份认证基准信息包括:基准人脸信息库;In a possible implementation manner, the identity authentication reference information includes: a reference face information database;
所述调整单元23,用于将所述人脸信息加入到所述基准人脸信息库中与所述请求用户关联的基准人脸信息集合。The adjusting unit 23 is configured to add the face information to the reference face information set associated with the requesting user in the reference face information database.
在一种可能的实现方式中,所述身份认证基准信息包括:用于身份认证的基准参数。In a possible implementation manner, the identity authentication reference information includes: reference parameters used for identity authentication.
在一种可能的实现方式中,所述基准参数包括预设的神经网络的参数;In a possible implementation manner, the reference parameters include preset parameters of the neural network;
所述认证单元22,用于基于所述人脸信息,采用所述预设的神经网络验证所述请求用户是否为认证用户;The authentication unit 22 is configured to use the preset neural network to verify whether the requesting user is an authenticated user based on the face information;
所述调整单元23,用于利用所述人脸信息构建训练样本;基于所述训练样本对所述预设的神经网络的参数进行调整。The adjusting unit 23 is configured to use the face information to construct a training sample; and adjust the preset neural network parameters based on the training sample.
在一种可能的实现方式中,所述调整单元23,用于将所述人脸信息作为所述预设的神经网络的输入,得到输出结果;响应于所述输出结果为认证不通过,对所述预设的神经网络的参数进行调整,以使得调整后的所述预设的神经网络对所述人脸信息的身份认证结果为认证通过。In a possible implementation manner, the adjustment unit 23 is configured to use the face information as the input of the preset neural network to obtain an output result; in response to the output result being that the authentication fails, correct the The parameters of the preset neural network are adjusted, so that the adjusted result of the identity authentication of the face information by the preset neural network is authentication passed.
在一种可能的实现方式中,所述用于身份认证的基准参数包括:人脸信息的匹配度阈值;In a possible implementation manner, the reference parameters used for identity authentication include: a matching degree threshold of face information;
所述认证单元22,用于确定所述人脸信息与认证用户的人脸信息之间的匹配度;响应于所述人脸信息与认证用户的人脸信息之间的匹配度超过所述匹配度阈值,确定所述请求用户通过认证;The authentication unit 22 is configured to determine the matching degree between the face information and the face information of the authenticated user; in response to the matching degree between the face information and the face information of the authenticated user exceeding the matching The degree threshold is determined to determine that the requesting user has passed the authentication;
所述调整单元23,用于调低所述匹配度阈值。The adjustment unit 23 is configured to lower the matching degree threshold.
在一种可能的实现方式中,所述调整单元23,用于响应于环境亮度低于设定亮度阈值,将所述匹配度阈值调低至目标匹配度阈值。In a possible implementation manner, the adjusting unit 23 is configured to lower the matching degree threshold to the target matching degree threshold in response to the ambient brightness being lower than the set brightness threshold.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the apparatus further includes:
检测单元,用于检测所述人脸信息对应的人脸是否存在遮挡区域;a detection unit, configured to detect whether the face corresponding to the face information has an occlusion area;
所述认证单元22,用于响应于检测到所述人脸信息对应的人脸存在遮挡区域,基于第一匹配权重对所述人脸信息中的未遮挡区域进行加权得到第一加权信息,基于第二匹配权重对所述人脸信息中的遮挡区域进行加权得到第二加权信息;基于所述第一加权信息和第二加权信息对所述请求用户进行身份认证;The authentication unit 22 is configured to, in response to detecting that the face corresponding to the face information has an occluded area, weight the unoccluded area in the face information based on the first matching weight to obtain the first weighting information, based on the first matching weight. The second matching weight weights the occlusion area in the face information to obtain second weighting information; based on the first weighting information and the second weighting information, the requesting user is authenticated;
所述调整单元23,用于响应于检测到所述人脸存在遮挡区域,增加第一匹配权重,和/或,减小所述第二匹配权重。The adjusting unit 23 is configured to increase the first matching weight, and/or decrease the second matching weight in response to detecting that the face has an occlusion area.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the apparatus further includes:
提示单元,用于响应于在根据所述用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,向所述请求用户发出提示信息,所述提示信息用于提示请求用户对所述身份认证基准信息进行调整;a prompting unit, configured to send a prompt message to the requesting user in response to the object to be unlocked being successfully unlocked based on a preset unlocking operation when the object to be unlocked is not successfully unlocked according to the user's identity authentication result , the prompt information is used to prompt the requesting user to adjust the identity authentication reference information;
所述调整单元23,用于响应于检测到所述请求用户基于所述提示信息发出调整指令,基于所述人脸信息调整所述身份认证基准信息。The adjustment unit 23 is configured to adjust the identity authentication reference information based on the face information in response to detecting that the requesting user issues an adjustment instruction based on the prompt information.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the apparatus further includes:
时间间隔确定单元,用于获取所述请求用户发出所述请求和执行所述预设的解锁操作之间的时间间隔;a time interval determination unit, configured to obtain the time interval between the requesting user sending the request and executing the preset unlocking operation;
所述调整单元23,用于响应于所述时间间隔小于设定时长阈值,基于所述人脸信息调整所述身份认证基准信息。The adjusting unit 23 is configured to adjust the identity authentication reference information based on the face information in response to the time interval being less than a set duration threshold.
在一种可能的实现方式中,所述待解锁对象包括下述至少一种设备:In a possible implementation manner, the object to be unlocked includes at least one of the following devices:
车门锁、房门锁、闸机。Door locks, door locks, turnstiles.
在一些实施例中,本公开实施例提供的装置具有的功能或包含的模块可以用于执行上文方法实施例描述的方法,其具体实现可以参照上文方法实施例的描述,为了简洁,这里不再赘述。In some embodiments, the functions or modules included in the apparatuses provided in the embodiments of the present disclosure may be used to execute the methods described in the above method embodiments. For specific implementation, reference may be made to the descriptions of the above method embodiments. For brevity, here No longer.
在本公开实施例中,在获取用于请求对解锁进行解锁的人脸信息后,会基于人脸信息和预设的身份认证基准信息,对发出请求的请求用户进行身份认证,然后响应于在根据请求用户的身份认证结果未成功解锁待解锁对象的情况下,待解锁对象基于预设的解锁操作成功解锁,基于人脸信息调整身份认证基准信息。由于待解锁对象基于预设的解锁操作成功解锁,而根据请求用户的身份认证结果未成功解锁,表明该请求用户大概率是具备解锁权限的用户,那么基于人脸信息和预设的身份认证基准信息进行身份认证的 过程可以进一步优化,因此,基于人脸信息调整身份认证基准信息,能够提高基于人脸信息和预设的身份认证基准信息进行身份认证的准确率,提高了解锁成功率,用户体验较好。In the embodiment of the present disclosure, after obtaining the face information for requesting unlocking, based on the face information and the preset identity authentication reference information, the identity authentication of the requesting user who made the request is performed, and then in response to the If the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication reference information is adjusted based on the face information. Since the object to be unlocked is successfully unlocked based on the preset unlocking operation, but is not successfully unlocked according to the identity authentication result of the requesting user, it indicates that the requesting user has a high probability of being a user with unlocking authority, then based on the face information and the preset identity authentication benchmark The process of information authentication can be further optimized. Therefore, adjusting the identity authentication benchmark information based on face information can improve the accuracy of identity authentication based on face information and preset identity authentication benchmark information, and improve the unlocking success rate. Better experience.
本公开实施例还提出一种计算机可读存储介质,其上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现上述方法。计算机可读存储介质可以是易失性计算机可读存储介质或非易失性计算机可读存储介质。Embodiments of the present disclosure further provide a computer-readable storage medium, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the foregoing method is implemented. The computer-readable storage medium may be a volatile computer-readable storage medium or a non-volatile computer-readable storage medium.
本公开实施例还提出一种电子设备,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为调用所述存储器存储的指令,以执行上述方法。An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to invoke the instructions stored in the memory to execute the above method.
本公开实施例还提供了一种计算机程序产品,包括计算机可读代码,当计算机可读代码在设备上运行时,设备中的处理器执行用于实现如上任一实施例提供的身份认证方法的指令。Embodiments of the present disclosure also provide a computer program product, including computer-readable codes. When the computer-readable codes are run on a device, a processor in the device executes a method for implementing the identity authentication method provided by any of the above embodiments. instruction.
本公开实施例还提供了另一种计算机程序产品,用于存储计算机可读指令,指令被执行时使得计算机执行上述任一实施例提供的身份认证方法的操作。An embodiment of the present disclosure further provides another computer program product for storing computer-readable instructions, which, when executed, cause the computer to perform the operations of the identity authentication method provided by any of the foregoing embodiments.
电子设备可以被提供为终端、服务器或其它形态的设备。The electronic device may be provided as a terminal, server or other form of device.
图3示出根据本公开实施例的一种电子设备800的框图。例如,电子设备800可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等终端。FIG. 3 shows a block diagram of an electronic device 800 according to an embodiment of the present disclosure. For example, electronic device 800 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, etc. terminal.
参照图3,电子设备800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。3, electronic device 800 may include one or more of the following components: processing component 802, memory 804, power supply component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814 , and the communication component 816 .
处理组件802通常控制电子设备800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。The processing component 802 generally controls the overall operation of the electronic device 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations. The processing component 802 can include one or more processors 820 to execute instructions to perform all or some of the steps of the methods described above. Additionally, processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
存储器804被配置为存储各种类型的数据以支持在电子设备800的操作。这些数据的示例包括用于在电子设备800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。 Memory 804 is configured to store various types of data to support operation at electronic device 800 . Examples of such data include instructions for any application or method operating on electronic device 800, contact data, phonebook data, messages, pictures, videos, and the like. Memory 804 may be implemented by any type of volatile or nonvolatile storage device or combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
电源组件806为电子设备800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为电子设备800生成、管理和分配电力相关联的组件。 Power supply assembly 806 provides power to various components of electronic device 800 . Power supply components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to electronic device 800 .
多媒体组件808包括在所述电子设备800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多 个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当电子设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。 Multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. A touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action. In some embodiments, the multimedia component 808 includes a front-facing camera and/or a rear-facing camera. When the electronic device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each of the front and rear cameras can be a fixed optical lens system or have focal length and optical zoom capability.
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当电子设备800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。 Audio component 810 is configured to output and/or input audio signals. For example, audio component 810 includes a microphone (MIC) that is configured to receive external audio signals when electronic device 800 is in operating modes, such as calling mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or transmitted via communication component 816 . In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。The I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: home button, volume buttons, start button, and lock button.
传感器组件814包括一个或多个传感器,用于为电子设备800提供各个方面的状态评估。例如,传感器组件814可以检测到电子设备800的打开/关闭状态,组件的相对定位,例如所述组件为电子设备800的显示器和小键盘,传感器组件814还可以检测电子设备800或电子设备800一个组件的位置改变,用户与电子设备800接触的存在或不存在,电子设备800方位或加速/减速和电子设备800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如互补金属氧化物半导体(CMOS)或电荷耦合装置(CCD)图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。 Sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of electronic device 800 . For example, the sensor assembly 814 can detect the on/off state of the electronic device 800, the relative positioning of the components, such as the display and the keypad of the electronic device 800, the sensor assembly 814 can also detect the electronic device 800 or one of the electronic device 800 Changes in the position of components, presence or absence of user contact with the electronic device 800 , orientation or acceleration/deceleration of the electronic device 800 and changes in the temperature of the electronic device 800 . Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. Sensor assembly 814 may also include a light sensor, such as a complementary metal oxide semiconductor (CMOS) or charge coupled device (CCD) image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
通信组件816被配置为便于电子设备800和其他设备之间有线或无线方式的通信。电子设备800可以接入基于通信标准的无线网络,如无线网络(WiFi),第二代移动通信技术(2G)或第三代移动通信技术(3G),或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。 Communication component 816 is configured to facilitate wired or wireless communication between electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as wireless network (WiFi), second generation mobile communication technology (2G) or third generation mobile communication technology (3G), or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module may be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
在示例性实施例中,电子设备800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。In an exemplary embodiment, electronic device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A programmed gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
在示例性实施例中,还提供了一种非易失性计算机可读存储介质,例如包括计算机程序指令的存储器804,上述计算机程序指令可由电子设备800的处理器820执行以完成上 述方法。In an exemplary embodiment, a non-volatile computer-readable storage medium is also provided, such as memory 804 comprising computer program instructions executable by processor 820 of electronic device 800 to perform the above-described method.
图4示出根据本公开实施例的一种电子设备1900的框图。例如,电子设备1900可以被提供为一服务器。参照图4,电子设备1900包括处理组件1922,其进一步包括一个或多个处理器,以及由存储器1932所代表的存储器资源,用于存储可由处理组件1922的执行的指令,例如应用程序。存储器1932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1922被配置为执行指令,以执行上述方法。FIG. 4 shows a block diagram of an electronic device 1900 according to an embodiment of the present disclosure. For example, the electronic device 1900 may be provided as a server. 4, electronic device 1900 includes processing component 1922, which further includes one or more processors, and a memory resource represented by memory 1932 for storing instructions executable by processing component 1922, such as applications. An application program stored in memory 1932 may include one or more modules, each corresponding to a set of instructions. Additionally, the processing component 1922 is configured to execute instructions to perform the above-described methods.
电子设备1900还可以包括一个电源组件1926被配置为执行电子设备1900的电源管理,一个有线或无线网络接口1950被配置为将电子设备1900连接到网络,和一个输入输出(I/O)接口1958。电子设备1900可以操作基于存储在存储器1932的操作系统,例如微软服务器操作系统(Windows Server TM),苹果公司推出的基于图形用户界面操作系统(Mac OS X TM),多用户多进程的计算机操作系统(Unix TM),自由和开放原代码的类Unix操作系统(Linux TM),开放原代码的类Unix操作系统(FreeBSD TM)或类似。 The electronic device 1900 may also include a power supply assembly 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input output (I/O) interface 1958 . The electronic device 1900 can operate based on an operating system stored in the memory 1932, such as a Microsoft server operating system (Windows Server ), a graphical user interface based operating system (Mac OS X ) introduced by Apple, a multi-user multi-process computer operating system (Unix ), Free and Open Source Unix-like Operating System (Linux ), Open Source Unix-like Operating System (FreeBSD ) or the like.
在示例性实施例中,还提供了一种非易失性计算机可读存储介质,例如包括计算机程序指令的存储器1932,上述计算机程序指令可由电子设备1900的处理组件1922执行以完成上述方法。In an exemplary embodiment, a non-volatile computer-readable storage medium is also provided, such as memory 1932 comprising computer program instructions executable by processing component 1922 of electronic device 1900 to perform the above-described method.
本公开可以是系统、方法和/或计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于使处理器实现本公开的各个方面的计算机可读程序指令。The present disclosure may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions loaded thereon for causing a processor to implement various aspects of the present disclosure.
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是(但不限于)电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。A computer-readable storage medium may be a tangible device that can hold and store instructions for use by the instruction execution device. The computer-readable storage medium may be, for example, but not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (non-exhaustive list) of computer readable storage media include: portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM) or flash memory), static random access memory (SRAM), portable compact disk read only memory (CD-ROM), digital versatile disk (DVD), memory sticks, floppy disks, mechanically coded devices, such as printers with instructions stored thereon Hole cards or raised structures in grooves, and any suitable combination of the above. Computer-readable storage media, as used herein, are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (eg, light pulses through fiber optic cables), or through electrical wires transmitted electrical signals.
这里所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。The computer readable program instructions described herein may be downloaded to various computing/processing devices from a computer readable storage medium, or to an external computer or external storage device over a network such as the Internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer-readable program instructions from a network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
用于执行本公开操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言—诸 如Smalltalk、C++等,以及常规的过程式编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读程序指令,从而实现本公开的各个方面。Computer program instructions for carrying out operations of the present disclosure may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or instructions in one or more programming languages. Source or object code, written in any combination, including object-oriented programming languages, such as Smalltalk, C++, etc., and conventional procedural programming languages, such as the "C" language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider through the Internet connect). In some embodiments, custom electronic circuits, such as programmable logic circuits, field programmable gate arrays (FPGAs), or programmable logic arrays (PLAs), can be personalized by utilizing state information of computer readable program instructions. Computer readable program instructions are executed to implement various aspects of the present disclosure.
这里参照根据本公开实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本公开的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理器,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理器执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer or other programmable data processing apparatus to produce a machine that causes the instructions when executed by the processor of the computer or other programmable data processing apparatus , resulting in means for implementing the functions/acts specified in one or more blocks of the flowchart and/or block diagrams. These computer readable program instructions can also be stored in a computer readable storage medium, these instructions cause a computer, programmable data processing apparatus and/or other equipment to operate in a specific manner, so that the computer readable medium on which the instructions are stored includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks of the flowchart and/or block diagrams.
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。Computer readable program instructions can also be loaded onto a computer, other programmable data processing apparatus, or other equipment to cause a series of operational steps to be performed on the computer, other programmable data processing apparatus, or other equipment to produce a computer-implemented process , thereby causing instructions executing on a computer, other programmable data processing apparatus, or other device to implement the functions/acts specified in one or more blocks of the flowcharts and/or block diagrams.
附图中的流程图和框图显示了根据本公开的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more functions for implementing the specified logical function(s) executable instructions. In some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It is also noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented in dedicated hardware-based systems that perform the specified functions or actions , or can be implemented in a combination of dedicated hardware and computer instructions.
该计算机程序产品可以具体通过硬件、软件或其结合的方式实现。在一个可选实施例中,所述计算机程序产品具体体现为计算机存储介质,在另一个可选实施例中,计算机程序产品具体体现为软件产品,例如软件开发包(Software Development Kit,SDK)等等。The computer program product can be specifically implemented by hardware, software or a combination thereof. In an optional embodiment, the computer program product is embodied as a computer storage medium, and in another optional embodiment, the computer program product is embodied as a software product, such as a software development kit (Software Development Kit, SDK), etc. Wait.
以上已经描述了本公开的各实施例,上述说明是示例性的,并非穷尽性的,并且也 不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中的技术的改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。Various embodiments of the present disclosure have been described above, and the foregoing descriptions are exemplary, not exhaustive, and not limiting of the disclosed embodiments. Numerous modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the various embodiments, the practical application or improvement over the technology in the marketplace, or to enable others of ordinary skill in the art to understand the various embodiments disclosed herein.

Claims (15)

  1. 一种身份认证方法,其特征在于,包括:An identity authentication method, comprising:
    获取用于请求对待解锁对象进行解锁的人脸信息;Obtain the face information used to request the unlocking of the object to be unlocked;
    基于所述人脸信息和预设的身份认证基准信息,对发出所述请求的请求用户进行身份认证;Based on the face information and the preset identity authentication reference information, perform identity authentication on the requesting user who sent the request;
    响应于在根据所述请求用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,基于所述人脸信息调整所述身份认证基准信息。In response to the fact that the object to be unlocked is not successfully unlocked according to the identity authentication result of the requesting user, the object to be unlocked is successfully unlocked based on a preset unlocking operation, and the identity authentication benchmark is adjusted based on the face information information.
  2. 根据权利要求1所述的方法,其特征在于,所述身份认证基准信息包括:基准人脸信息库;The method according to claim 1, wherein the identity authentication reference information comprises: a reference face information database;
    所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
    将所述人脸信息加入到所述基准人脸信息库中与所述请求用户关联的基准人脸信息集合。The face information is added to the reference face information set associated with the requesting user in the reference face information database.
  3. 根据权利要求1所述的方法,其特征在于,所述身份认证基准信息包括:用于身份认证的基准参数。The method according to claim 1, wherein the identity authentication reference information comprises: reference parameters used for identity authentication.
  4. 根据权利要求3所述的方法,其特征在于,所述基准参数包括预设的神经网络的参数;The method according to claim 3, wherein the reference parameters comprise preset parameters of the neural network;
    所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:The performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
    基于所述人脸信息,采用所述预设的神经网络验证所述请求用户是否为认证用户;Based on the face information, using the preset neural network to verify whether the requesting user is an authenticated user;
    所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
    利用所述人脸信息构建训练样本;Use the face information to construct training samples;
    基于所述训练样本对所述预设的神经网络的参数进行调整。The parameters of the preset neural network are adjusted based on the training samples.
  5. 根据权利要求4所述的方法,其特征在于,所述基于所述训练样本对所述预设的神经网络的参数进行调整,包括:The method according to claim 4, wherein the adjusting the parameters of the preset neural network based on the training samples comprises:
    将所述人脸信息作为所述预设的神经网络的输入,得到输出结果;Using the face information as the input of the preset neural network to obtain an output result;
    响应于所述输出结果为认证不通过,对所述预设的神经网络的参数进行调整,以使得调整后的所述预设的神经网络对所述人脸信息的身份认证结果为认证通过。In response to the output result being that the authentication fails, the parameters of the preset neural network are adjusted, so that the adjusted result of the identity authentication of the face information by the preset neural network is authentication passed.
  6. 根据权利要求3所述的方法,其特征在于,所述用于身份认证的基准参数包括:人脸信息的匹配度阈值;The method according to claim 3, wherein the reference parameter for identity authentication comprises: a matching degree threshold of face information;
    所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:The performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
    确定所述人脸信息与认证用户的人脸信息之间的匹配度;determining the degree of matching between the face information and the face information of the authenticated user;
    响应于所述人脸信息与认证用户的人脸信息之间的匹配度超过所述匹配度阈值,确定所述请求用户通过认证;In response to the matching degree between the face information and the face information of the authenticated user exceeding the matching degree threshold, it is determined that the requesting user has passed the authentication;
    所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
    调低所述匹配度阈值。Decrease the match threshold.
  7. 根据权利要求6所述的方法,其特征在于,所述调低所述匹配度阈值,包括:The method according to claim 6, wherein the lowering the matching degree threshold comprises:
    响应于环境亮度低于设定亮度阈值,将所述匹配度阈值调低至目标匹配度阈值。In response to the ambient brightness being lower than the set brightness threshold, the matching degree threshold is adjusted down to the target matching degree threshold.
  8. 根据权利要求3所述的方法,其特征在于,所述方法还包括:The method according to claim 3, wherein the method further comprises:
    检测所述人脸信息对应的人脸是否存在遮挡区域;Detecting whether the face corresponding to the face information has an occlusion area;
    所述基于所述人脸信息和预设的身份认证基准信息,对所述请求用户进行身份认证,包括:The performing identity authentication on the requesting user based on the face information and the preset identity authentication benchmark information includes:
    响应于检测到所述人脸信息对应的人脸存在遮挡区域,基于第一匹配权重对所述人脸信息中的未遮挡区域进行加权得到第一加权信息,基于第二匹配权重对所述人脸信息中的遮挡区域进行加权得到第二加权信息;In response to detecting that the face corresponding to the face information has an occluded area, weighting the unoccluded area in the face information based on the first matching weight to obtain first weighted information, and based on the second matching weight The occlusion area in the face information is weighted to obtain the second weighted information;
    基于所述第一加权信息和第二加权信息对所述请求用户进行身份认证;Perform identity authentication on the requesting user based on the first weighting information and the second weighting information;
    所述基于所述人脸信息调整所述身份认证基准信息,包括:响应于检测到所述人脸存在遮挡区域,增加第一匹配权重,和/或,减小所述第二匹配权重。The adjusting the identity authentication reference information based on the face information includes: increasing the first matching weight and/or decreasing the second matching weight in response to detecting that the face has an occluded area.
  9. 根据权利要求1-8任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-8, wherein the method further comprises:
    响应于在根据所述用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,向所述请求用户发出提示信息,所述提示信息用于提示请求用户对所述身份认证基准信息进行调整;所述基于所述人脸信息调整所述身份认证基准信息,包括:In response to the fact that the object to be unlocked is not successfully unlocked according to the user's identity authentication result, the object to be unlocked is successfully unlocked based on a preset unlocking operation, a prompt message is sent to the requesting user, and the prompt message is used to prompt the requesting user to adjust the identity authentication reference information; the adjustment of the identity authentication reference information based on the face information includes:
    响应于检测到所述请求用户基于所述提示信息发出调整指令,基于所述人脸信息调整所述身份认证基准信息。In response to detecting that the requesting user issues an adjustment instruction based on the prompt information, the identity authentication reference information is adjusted based on the face information.
  10. 根据权利要求1-8任一所述方法,其特征在于,所述方法还包括:The method according to any one of claims 1-8, wherein the method further comprises:
    获取所述请求用户发出所述请求和执行所述预设的解锁操作之间的时间间隔;Obtain the time interval between the requesting user sending the request and executing the preset unlocking operation;
    所述基于所述人脸信息调整所述身份认证基准信息,包括:The adjusting the identity authentication reference information based on the face information includes:
    响应于所述时间间隔小于设定时长阈值,基于所述人脸信息调整所述身份认证基准信息。In response to the time interval being less than a set duration threshold, the identity authentication reference information is adjusted based on the face information.
  11. 根据权利要求1-10任一所述方法,其特征在于,所述待解锁对象包括下述至少一种设备:The method according to any one of claims 1-10, wherein the object to be unlocked comprises at least one of the following devices:
    车门锁、房门锁、闸机。Door locks, door locks, turnstiles.
  12. 一种身份认证装置,其特征在于,包括:An identity authentication device, comprising:
    获取单元,用于获取用于请求对待解锁对象进行解锁的人脸信息;an acquisition unit, used for acquiring face information for requesting the unlocking of the object to be unlocked;
    认证单元,用于基于所述人脸信息和预设的身份认证基准信息,对发出所述请求的请求用户进行身份认证;an authentication unit, configured to perform identity authentication on the requesting user who issued the request based on the face information and preset identity authentication reference information;
    调整单元,用于响应于在根据所述请求用户的身份认证结果未成功解锁所述待解锁对象的情况下,所述待解锁对象基于预设的解锁操作成功解锁,基于所述人脸信息调整所述身份认证基准信息。An adjustment unit, configured to adjust the to-be-unlocked object based on the preset unlocking operation in response to the unsuccessful unlocking of the to-be-unlocked object based on the identity authentication result of the requesting user, and to adjust based on the face information The identity authentication reference information.
  13. 一种电子设备,其特征在于,包括:An electronic device, comprising:
    处理器;processor;
    用于存储处理器可执行指令的存储器;memory for storing processor-executable instructions;
    其中,所述处理器被配置为调用所述存储器存储的指令,以执行权利要求1至11中任意一项所述的方法。wherein the processor is configured to invoke instructions stored in the memory to perform the method of any one of claims 1-11.
  14. 一种计算机可读存储介质,其上存储有计算机程序指令,其特征在于,所述计算机程序指令被处理器执行时实现权利要求1至11中任意一项所述的方法。A computer-readable storage medium on which computer program instructions are stored, characterized in that, when the computer program instructions are executed by a processor, the method described in any one of claims 1 to 11 is implemented.
  15. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在电子设备中运行时,所述电子设备中的处理器执行用于实现权利要求1-11中的任一权利要求所述的方法。A computer program, comprising computer readable code, when the computer readable code is executed in an electronic device, a processor in the electronic device executes the code for implementing any one of claims 1-11. Methods.
PCT/CN2021/109820 2020-12-31 2021-07-30 Identity authentication method and apparatus, and electronic device and storage medium WO2022142330A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2023521973A JP2023546837A (en) 2020-12-31 2021-07-30 Identity authentication methods and devices, electronic devices and storage media

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011631815.1A CN112667984A (en) 2020-12-31 2020-12-31 Identity authentication method and device, electronic equipment and storage medium
CN202011631815.1 2020-12-31

Publications (1)

Publication Number Publication Date
WO2022142330A1 true WO2022142330A1 (en) 2022-07-07

Family

ID=75413047

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/109820 WO2022142330A1 (en) 2020-12-31 2021-07-30 Identity authentication method and apparatus, and electronic device and storage medium

Country Status (3)

Country Link
JP (1) JP2023546837A (en)
CN (1) CN112667984A (en)
WO (1) WO2022142330A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112667984A (en) * 2020-12-31 2021-04-16 上海商汤临港智能科技有限公司 Identity authentication method and device, electronic equipment and storage medium
CN113256832A (en) * 2021-05-11 2021-08-13 南开大学 Intelligent sign-in system and intelligent sign-in management method
CN113628376A (en) * 2021-07-19 2021-11-09 杭州奥声物业有限公司 Property management system based on non-contact recognition

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008821A (en) * 2019-02-02 2019-07-12 阿里巴巴集团控股有限公司 A kind of prediction portrait base map more new method and apparatus
CN110489952A (en) * 2014-09-30 2019-11-22 华为技术有限公司 Identity authentication method, device and user equipment
WO2020113571A1 (en) * 2018-12-07 2020-06-11 深圳市欢太科技有限公司 Face recognition data processing method and apparatus, mobile device and computer readable storage medium
CN111554006A (en) * 2020-04-13 2020-08-18 绍兴埃瓦科技有限公司 Intelligent lock and intelligent unlocking method
CN111898561A (en) * 2020-08-04 2020-11-06 腾讯科技(深圳)有限公司 Face authentication method, device, equipment and medium
CN112667984A (en) * 2020-12-31 2021-04-16 上海商汤临港智能科技有限公司 Identity authentication method and device, electronic equipment and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295482B (en) * 2015-06-11 2019-10-29 中移信息技术有限公司 A kind of update method and device of face database
CN108229120B (en) * 2017-09-07 2020-07-24 北京市商汤科技开发有限公司 Face unlocking method, face unlocking information registration device, face unlocking information registration equipment, face unlocking program and face unlocking information registration medium
CN107679473B (en) * 2017-09-22 2020-12-08 Oppo广东移动通信有限公司 Unlocking control method and related product
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108256451B (en) * 2018-01-05 2022-09-27 百度在线网络技术(北京)有限公司 Method and device for detecting human face
CN108830061A (en) * 2018-05-25 2018-11-16 努比亚技术有限公司 Terminal unlock method, mobile terminal and readable storage medium storing program for executing based on recognition of face
CN108830062B (en) * 2018-05-29 2022-10-04 浙江水科文化集团有限公司 Face recognition method, mobile terminal and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489952A (en) * 2014-09-30 2019-11-22 华为技术有限公司 Identity authentication method, device and user equipment
WO2020113571A1 (en) * 2018-12-07 2020-06-11 深圳市欢太科技有限公司 Face recognition data processing method and apparatus, mobile device and computer readable storage medium
CN110008821A (en) * 2019-02-02 2019-07-12 阿里巴巴集团控股有限公司 A kind of prediction portrait base map more new method and apparatus
CN111554006A (en) * 2020-04-13 2020-08-18 绍兴埃瓦科技有限公司 Intelligent lock and intelligent unlocking method
CN111898561A (en) * 2020-08-04 2020-11-06 腾讯科技(深圳)有限公司 Face authentication method, device, equipment and medium
CN112667984A (en) * 2020-12-31 2021-04-16 上海商汤临港智能科技有限公司 Identity authentication method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
JP2023546837A (en) 2023-11-08
CN112667984A (en) 2021-04-16

Similar Documents

Publication Publication Date Title
JP7110413B2 (en) Data update method and device, electronic device and storage medium
WO2022142330A1 (en) Identity authentication method and apparatus, and electronic device and storage medium
EP3133528B1 (en) Method and apparatus for fingerprint identification
US20200169550A1 (en) Methods and devices for authenticating smart card
US20170289181A1 (en) Payment method, apparatus and medium
CN104850827B (en) Fingerprint identification method and device
US20180157817A1 (en) Unlocking method and apparatus, and storage medium
US10102505B2 (en) Server-implemented method, terminal-implemented method and device for acquiring business card information
CN105847243B (en) Method and device for accessing intelligent camera
WO2021036382A9 (en) Image processing method and apparatus, electronic device and storage medium
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
WO2021057171A1 (en) Identity verification method and apparatus, and electronic device and computer readable storage medium
US10515224B2 (en) Method, device and storage medium for printing information
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
CN105281907B (en) Encrypted data processing method and device
US11100735B2 (en) Method and apparatus for controlling entrance guard
EP3163834B1 (en) Method and device for equipment control
WO2020259026A1 (en) Access control method and apparatus, and electronic device and storage medium
WO2022099989A1 (en) Liveness identification and access control device control methods, apparatus, electronic device, storage medium, and computer program
CN107231338B (en) Network connection method, device and device for network connection
CN107133551B (en) Fingerprint verification method and device
CN106027601B (en) Remote control method and device
CN114664009A (en) Unlocking method and device, electronic equipment, storage medium and intelligent door lock
WO2018232652A1 (en) Mobile terminal having high privacy level and related product
CN109873823B (en) Verification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21913078

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2023521973

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.11.2023)