[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108460266A - Method and apparatus for authenticating identity - Google Patents

Method and apparatus for authenticating identity Download PDF

Info

Publication number
CN108460266A
CN108460266A CN201810241989.3A CN201810241989A CN108460266A CN 108460266 A CN108460266 A CN 108460266A CN 201810241989 A CN201810241989 A CN 201810241989A CN 108460266 A CN108460266 A CN 108460266A
Authority
CN
China
Prior art keywords
certified
vivo detection
score
threshold value
predetermined threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810241989.3A
Other languages
Chinese (zh)
Inventor
孙颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201810241989.3A priority Critical patent/CN108460266A/en
Publication of CN108460266A publication Critical patent/CN108460266A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the present application discloses the method and apparatus for authenticating identity.One specific implementation mode of this method includes:The facial image of collected object to be certified is matched with pre-stored facial image, obtains face authentication score;It treats certification object and carries out In vivo detection, obtain In vivo detection score;In response to determining that the face authentication score of object to be certified is less than the In vivo detection score of the first predetermined threshold value and/or object to be certified less than the second predetermined threshold value, the identity of object to be certified is verified by preset fence operation.The embodiment is further verified by preset fence operation to treat the identity of certification object, and the accuracy rate of authentication is improved, and then improves the performance of security protection.

Description

Method and apparatus for authenticating identity
Technical field
The invention relates to field of computer technology, and in particular to the method and apparatus for being used for authenticating identity.
Background technology
With the development of biometrics identification technology, face recognition technology is widely used to field of identity authentication.Pass through Recognition of face can carry out authentication, to improve safety to active user.But in practical application, might have illegal Molecule is with the face of the counterfeit user such as the human face photo of user or video, to carry out authentication.
In the prior art, in order to improve the safety of authentication, during carrying out authentication to user, not only It needs to carry out face authentication to user, it is also necessary to carry out In vivo detection to user.And meet body in face authentication and In vivo detection It can just determine that the authentication of user passes through when part authentication condition.In general, face authentication not by or In vivo detection it is obstructed It is out-of-date, that is, determine that the authentication of user does not pass through.
Invention content
The embodiment of the present application proposes the method and apparatus for authenticating identity.
In a first aspect, the embodiment of the present application provides a kind of method for authenticating identity, this method includes:It will collect The facial image of object to be certified matched with pre-stored facial image, obtain face authentication score;To be certified Object carries out In vivo detection, obtains In vivo detection score;In response to determining that the face authentication score of object to be certified is less than the The In vivo detection score of one predetermined threshold value and/or object to be certified is less than the second predetermined threshold value, passes through preset fence operation school Test the identity of object to be certified.
In some embodiments, the identity of object to be certified is verified by preset fence operation, including:It is pre- to increase second If threshold value;The facial image of collected object to be certified again is matched with pre-stored facial image, is prevented Face authentication score in shield operation;It treats certification object and carries out In vivo detection again, obtain the In vivo detection in fence operation Score;In response to determining that the face authentication score in fence operation is greater than or equal in the first predetermined threshold value and fence operation In vivo detection score is greater than or equal to the second predetermined threshold value after increasing, and determines that object to be certified passes through authentication.
In some embodiments, the identity of object to be certified is verified by preset fence operation, including:Prompt is sent out to wait for The prompt message of the default verification content of certification object input;In response to the content for determining object input to be certified and default verification Content matches, and determines that object to be certified passes through authentication.
In some embodiments, it treats certification object and carries out In vivo detection, obtain In vivo detection score, including:It sends out pre- If action command, and obtain the video information that collected object to be certified is acted in response to preset action command execution; In response to determining that the face in video information matches with the face in collected facial image, will be detected in video information To action matched with the action indicated by preset action command, obtain In vivo detection score.
In some embodiments, method further includes:In response to determine the face authentication score of object to be certified be more than or It is greater than or equal to the second predetermined threshold value equal to the In vivo detection score of the first predetermined threshold value and object to be certified, it is to be certified right to determine The authentication of elephant passes through.
Second aspect, the embodiment of the present application provide a kind of device for authenticating identity, and device includes:Matching unit, It is configured to match the facial image of collected object to be certified with pre-stored facial image, obtains face and recognize Demonstrate,prove score;In vivo detection unit is configured to treat certification object progress In vivo detection, obtains In vivo detection score;Verification is single Member is configured to be less than the first predetermined threshold value and/or to be certified right in response to the face authentication score for determining object to be certified The In vivo detection score of elephant is less than the second predetermined threshold value, and the identity of object to be certified is verified by preset fence operation.
In some embodiments, verification unit is further configured to verify the body of object to be certified as follows Part:Increase the second predetermined threshold value;By the facial image of collected object to be certified again and pre-stored facial image into Row matching, obtains the face authentication score in fence operation;It treats certification object and carries out In vivo detection again, obtain fence operation In In vivo detection score;In response to determine the face authentication score in fence operation be greater than or equal to the first predetermined threshold value and In vivo detection score in fence operation is greater than or equal to the second predetermined threshold value after increasing, and determines that object to be certified passes through identity Certification.
In some embodiments, verification unit is further configured to verify the body of object to be certified as follows Part:Send out the prompt message for prompting the default verification content of object input to be certified;In response to determining object input to be certified Content matches with default verification content, determines that object to be certified passes through authentication.
In some embodiments, In vivo detection unit is further configured to treat certification object progress as follows In vivo detection:Preset action command is sent out, and obtains collected object to be certified and is executed in response to preset action command The video information of action;In response to determining that the face in video information matches with the face in collected facial image, The action detected in video information is matched with the action indicated by preset action command, obtains In vivo detection point Number.
In some embodiments, device further includes:Determination unit is configured to the people in response to determining object to be certified Face certification score is greater than or equal to the first predetermined threshold value and the In vivo detection score of object to be certified is default more than or equal to second Threshold value determines that the authentication of object to be certified passes through.
Method and apparatus provided by the embodiments of the present application for authenticating identity, by by collected object to be certified Facial image, which with pre-stored facial image match, can obtain face authentication score, then treat certification object progress In vivo detection can obtain In vivo detection score, finally in response to determining that the face authentication score of object to be certified is less than first Predetermined threshold value and/or In vivo detection score are less than the second predetermined threshold value, and certification object is treated by preset fence operation Identity is further verified, and the accuracy rate of authentication is improved, and then improves security protection performance.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is that this application can be applied to exemplary system architecture figures therein;
Fig. 2 is the flow chart according to one embodiment of the method for authenticating identity of the application;
Fig. 3 is the schematic diagram according to an application scenarios of the method for authenticating identity of the application;
Fig. 4 is the flow chart according to another embodiment of the method for authenticating identity of the application;
Fig. 5 is the structural schematic diagram according to one embodiment of the device for authenticating identity of the application;
Fig. 6 is adapted for the structural schematic diagram of the computer system for realizing the embodiment of the present application electronic equipment.
Specific implementation mode
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, is illustrated only in attached drawing and invent relevant part with related.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the implementation of the method for authenticating identity or the device for authenticating identity that can apply the application The exemplary system architecture 100 of example.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105. Network 104 between terminal device 101,102,103 and server 105 provide communication link medium.Network 104 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be interacted by network 104 with server 105 with using terminal equipment 101,102,103, to receive or send out Send message etc..Various telecommunication customer end applications can be installed, such as photography and vedio recording class is answered on terminal device 101,102,103 With the application of, image processing class, searching class application etc..
Terminal device 101,102,103 can be the various electronic equipments for having camera and supporting Image Acquisition, packet Include but be not limited to image acquisition device, smart mobile phone, tablet computer, pocket computer on knee and desktop computer etc..Service Device 105 can be to provide the server of various services, such as provide support to 101,102,103 the image collected of terminal device Background server.Background server can carry out the data such as collected facial image the processing such as to analyze, and processing is tied Fruit (such as identity authentication result) feeds back to terminal device.
It should be noted that the method for authenticating identity that the embodiment of the present application is provided generally is held by server 105 Row, correspondingly, the device for authenticating identity is generally positioned in server 105.
It should be noted that server can be hardware, can also be software.When server is hardware, may be implemented At the distributed server cluster that multiple servers form, individual server can also be implemented as.It, can when server is software To be implemented as multiple softwares or software module (such as providing multiple software modules of Distributed Services), can also be implemented as Single software or software module.It is not specifically limited herein.
It may also be noted that can also be equipped with image processing class application in terminal device 101,102,103, terminal is set Standby 101,102,103 can also treat certification object based on image processing class application carries out face authentication and In vivo detection, at this point, Method for authenticating identity can also be executed by terminal device 101,102,103, correspondingly, be used for the device of authenticating identity It can be set in terminal device 101,102,103.At this point, server 105 and net can be not present in exemplary system architecture 100 Network 104.
It should be understood that the number of the terminal device, network and server in Fig. 1 is only schematical.According to realization need It wants, can have any number of terminal device, network and server.
With continued reference to Fig. 2, the flow of one embodiment of the method for authenticating identity according to the application is shown 200.This is used for the method for authenticating identity, includes the following steps:
Step 201, the facial image of collected object to be certified is matched with pre-stored facial image, is obtained To face authentication score.
In the present embodiment, any object to be certified can be referred to as by the user object of authentication.It waits recognizing It can be the image for the face area for including the object to be certified in the facial image of card object.Pre-stored facial image can To be registered face image, the corresponding user of the registered face image can be the user for having specified permission.For certification body The executive agent of the method for part can prestore above-mentioned registered face image.Then, which may be used various hands Section matches the facial image of collected object to be certified with pre-stored registered face image, so as to obtain The face authentication score of object to be certified.The face authentication score can characterize the facial image of collected object to be certified with Similarity between pre-stored registered face image.It is understood that obtained face authentication score is higher, indicate to wait for Certification object is that the possibility of the user corresponding to pre-stored registered face image is bigger.
In some optional realization methods of the present embodiment, the face authentication mould for face authentication can be trained in advance Type, the face authentication model can be used for characterizing the similarity of two facial images of input.Therefore, above-mentioned executive agent can be with The facial image of collected object to be certified and pre-stored registered face image are inputted into face authentication model, the face Authentication model can export the face authentication score of object to be certified.Above-mentioned face authentication model can train in the following way It obtains:Obtain the facial image of multiple users;Acquired facial image is normalized to obtain, there is identical size Facial image;Multiple facial images with identical size are marked, so as to belong to the facial image tool of different user There is different label symbols, forms training facial image;Obtain CNN to be trained (Convolutional Neural Network, Convolutional neural networks) model original model parameter, the parameter of CNN models is continued to optimize using above-mentioned trained facial image, and Using the parameter of the CNN models optimized as the model parameter of faceform.It is understood that those skilled in the art may be used also By using it is other it is appropriate in a manner of obtain the face authentication score of object to be certified, do not limit specifically here.For example, directly From face characteristic is extracted in the facial image and pre-stored facial image of object to be certified, utilize extracted face special Sign calculates Euclidean distance or cosine similarity between the facial image and pre-stored facial image of object to be certified etc., from And the face authentication score of object to be identified can be obtained.
It should be noted that the camera shooting for acquiring image can be provided on electronic equipment where above-mentioned executive agent Head, and pre-stored facial image can also be stored directly in the local of the electronic equipment where executive agent.At this point, holding Row main body can directly acquire the facial image of collected object to be certified and pre-stored facial image, and by the two into Row matching.In addition, the electronic equipment where above-mentioned executive agent can not have the camera for acquiring image, at this point, should Executive agent can be connected with other electronic equipments for acquiring image.It at this moment, can for acquiring the electronic equipment of image The facial image of the object to be certified of acquisition is sent to above-mentioned execution by wired connection mode or radio connection Main body.Wherein, above-mentioned radio connection can include but is not limited to 3G/4G connections, WiFi connections, bluetooth connection, WiMAX companies Connect, Zigbee connections, UWB (ultra wideband) connections and other it is currently known or in the future exploitation wireless connection sides Formula.
Step 202, it treats certification object and carries out In vivo detection, obtain In vivo detection score.
In the present embodiment, object to be certified is during carrying out authentication, in addition to can be by to be certified right Obtained except the facial image of object to be certified as I carries out Image Acquisition, can also by treat certification object photo, Video obtains the facial image of object to be certified with the progress such as face of mask Image Acquisition.Therefore, in order to ensure to scheme Picture acquisition target is object to be certified, rather than the photo of object to be certified, video or the face etc. with mask, also It needs to treat certification object progress In vivo detection.Above-mentioned executive agent, can be with after treating certification object and carrying out In vivo detection Obtain the In vivo detection score of the object to be certified.It is understood that obtained In vivo detection score is higher, indicate that image is adopted The object to be certified for integrating object is bigger as the possibility of biological living.
In vivo detection on ordinary meaning refers to judging that this is acquired when obtaining biological information from validated user Whether biological information is to be obtained from the validated user with biological living.Here, validated user can refer to above-mentioned Object to be certified.The method of In vivo detection is mainly by identifying the physiologic information on live body the detection that carries out, it can be Physiologic information distinguishes the biological characteristic forged with the non-living matter such as photo, silica gel, plastics as vital signs.
In some optional realization methods of the present embodiment, the method that near-infrared face In vivo detection may be used is treated Certification object carries out In vivo detection.Specifically, image sequence is obtained it is possible, firstly, to treat certification object and carry out Image Acquisition.And Afterwards, according to optical flow method, respective pixel position is determined using the time domain variation and correlation of the pixel intensity data in image sequence " movement " set, obtains the operation information of each pixel from image sequence.Later, using Difference of Gaussian filter, LBP (Local Binary Pattern, local binary patterns) feature and support vector machines etc. carries out data statistic analysis, so as to To obtain the In vivo detection score of object to be certified.Because optical flow field is more sensitive to object of which movement, therefore can using optical flow field The In vivo detection of certification object is treated with realizations such as the unified eyeball movement for detecting object to be certified and blinks.It is appreciated that It is that those skilled in the art can also be treated certification object using other modes appropriate and carry out In vivo detection, not had here Limit to body.For example, shooting face using 3D cameras, the 3D data of corresponding human face region are obtained, and be based on these data It is further analyzed, obtains the result of In vivo detection.
Step 203, in response to determining the face authentication score of object to be certified less than the first predetermined threshold value and/or waiting recognizing The In vivo detection score for demonstrate,proving object is less than the second predetermined threshold value, and the identity of object to be certified is verified by preset fence operation.
In the present embodiment, whether above-mentioned executive agent can pre-set the face authentication for verifying object to be certified By the first predetermined threshold value and for verify object to be certified In vivo detection whether by the second predetermined threshold value.Based on step The In vivo detection score that rapid 201 obtained face authentication scores and step 202 obtain, the people that above-mentioned executive agent can will obtain Face certification score and the first predetermined threshold value compare, and obtained In vivo detection score and the second predetermined threshold value are compared, and acquisition pair Compare result.It should be noted that being less than the first predetermined threshold value in the face authentication score for determining object to be certified and/or waiting recognizing When demonstrate,proving the In vivo detection score of object less than the second predetermined threshold value, it may be considered that the authentication of object to be certified is not logical It crosses.At this moment, above-mentioned executive agent can continue to verify the identity of object to be certified by preset fence operation.This is preset anti- Shield operation is the further verification for the identity that certification object is treated on the basis of face authentication and In vivo detection.
Herein, preset fence operation may include:Pass through other biological feather recognition method combination In vivo detections Mode verify the identity of object to be certified.Such as the iris image of object to be identified, acquisition finger print information, palm can be acquired Venous information etc. combines corresponding In vivo detection based on living body iris feature, fingerprint recognition to combine by using iris recognition Corresponding In vivo detection, palm vein based on finger print information, which identify, combines the corresponding live body based on live body palm vein feature The methods of detection further carries out authentication.
In some optional realization methods of the present embodiment, above-mentioned executive agent is in the face for determining object to be certified Certification score is greater than or equal to the first predetermined threshold value, and the In vivo detection score of object to be certified is greater than or equal to second and presets In the case of threshold value, then it can determine that the authentication of the object to be certified passes through.
It is understood that being less than the first predetermined threshold value in the face authentication score for determining object to be certified and/or waiting for In the case that the In vivo detection score of certification object is less than the second predetermined threshold value, it is believed that the authentication of object to be certified is not Pass through.And cause the authentication of object to be certified not by the reason of be likely to identity authorization system and attacked by live body It hits, i.e., non-object to be certified carries out authentication using photo, mask of object to be certified etc..And existing authentication System does not ensure that the entirely accurate of authentication, therefore, non-object to be certified using object to be certified photo, Mask etc. carries out being likely to the case where certification passes through occur during dozens or even hundreds of secondary authentication.The application is real The method for authenticating identity for applying example offer, the authentication of object to be certified caused by live body occur and attack etc. do not pass through The case where when, then can execute preset for verifying the fence operation of object identity to be certified.The fence operation can be into one Step ground increase authentication by difficulty, to improve the accuracy rate of authentication.
Show that one of the application scenarios of the method for authenticating identity according to this implementation shows with continued reference to Fig. 3, Fig. 3 It is intended to.In the application scenarios of Fig. 3, which can be used for mobile phone unlock.First, the camera of mobile phone The facial image that object to be certified can be acquired, in order to background server can by collected facial image with prestore Facial image matched to obtain face authentication score;Then, background server can treat certification object and carry out live body inspection Measure In vivo detection score;Finally, the face authentication score for determining object to be certified be less than the first predetermined threshold value and/or When In vivo detection score is less than the second predetermined threshold value, determine that authentication does not pass through, and the interface of mobile phone is automatically brought to protection The operation indicating page, as shown in figure 3, in order to which background server can verify object to be certified with used preset fence operation Identity.
The method for authenticating identity that above-described embodiment of the application provides, by by collected object to be certified Facial image, which with pre-stored facial image match, can obtain face authentication score, then treat certification object progress In vivo detection can obtain In vivo detection score, finally in response to determining that the face authentication score of object to be certified is less than first Predetermined threshold value and/or In vivo detection score are less than the second predetermined threshold value, and certification object is treated by preset fence operation Identity is further verified, and the accuracy rate of authentication is improved, and then improves the performance of security protection.
In some embodiments, the face authentication score for determining object to be certified be less than the first predetermined threshold value and/or In the case that the In vivo detection score of object to be certified is less than the second default threshold, it may be considered that the face of the object to be certified is recognized Card and/or authentication do not pass through.At this point, identity authorization system has been most likely subject to live body attack.In order to improve authentication The safety of system, above-mentioned executive agent can increase the In vivo detection for verifying object to be certified whether by it is second pre- If threshold value.This method can increase In vivo detection by difficulty, improve the accuracy rate of authentication.Then, above-mentioned execution Main body can match the facial image of collected object to be certified again with pre-stored facial image, so as to To obtain the face authentication score in fence operation.Later, it treats certification object and carries out In vivo detection again, so as to obtain In vivo detection score in fence operation.Finally, it is greater than or equal in response to the face authentication score determined in fence operation In vivo detection score in first predetermined threshold value and fence operation is greater than or equal to the second predetermined threshold value after increasing, then can be true Fixed object to be certified passes through authentication.
In some embodiments, the face authentication score for determining object to be certified be less than the first predetermined threshold value and/or When the In vivo detection score of object to be certified is less than the second predetermined threshold value, above-mentioned executive agent can send out prompt message.This is carried Show that information can be used for prompting the default verification content of object input to be certified.Here default verification content may include setting in advance The close guarantor's problem set or gesture password etc..Object to be certified can input corresponding content in response to the prompt message.Then, on Stating executive agent can match the content that object to be certified inputs with default verification content, and obtain matching result.Into One step, in the case where the content for determining that matching result is object to be certified input matches with default verification content, then It can determine that the object to be certified passes through authentication.It is understood that if obtained matching result is that object to be certified is defeated The content entered is mismatched with default verification content, at this point, above-mentioned executive agent can also directly determine that object identity to be certified is recognized Card does not pass through, alternatively, can also continue to execute other preset identification steps such as fingerprint authentication.
Referring next to 4, it illustrates the flows 400 of another embodiment of the method for authenticating identity.The use In the flow 400 of the method for authenticating identity, include the following steps:
Step 401, the facial image of collected object to be certified is matched with pre-stored facial image, is obtained To face authentication score.
In the present embodiment, pre-stored facial image can be registered face image, which corresponds to User can be the user for having specified permission.The executive agent of method for authenticating identity can prestore above-mentioned note Volume facial image.Then, the executive agent may be used various means by the facial image of collected object to be certified with it is pre- The registered face image first stored is matched, so as to obtain the face authentication score of object to be certified.The face authentication Score can characterize the similarity between the facial image of collected object to be certified and pre-stored registered face image. It is understood that obtained face authentication score is higher, indicate object to be certified for pre-stored registered face image institute The possibility of corresponding user is bigger.
Step 402, preset action command is sent out, and obtains collected object to be certified and refers in response to preset action The video information for enabling execution act.
In the present embodiment, above-mentioned executive agent can be pre-set for instructing object to be certified to execute blink, opening one's mouth The action command of equal actions.Then, above-mentioned executive agent can send out preset action command, in order to which object to be certified can be with Execute the action indicated by sent out action command.Finally, acquire what object to be certified was acted in response to action command execution Video information, in order to which above-mentioned executive agent can obtain the collected video information of institute.
Step 403, in response to determining that the face in video information matches with the face in collected facial image, The action detected in video information the action indicated with deliberate action instruction is matched, In vivo detection score is obtained.
In the present embodiment, it is based on the collected video information of step 402, above-mentioned executive agent can be to the video information It is analyzed, to obtain the face in video information.Then, the face in obtained video information is waited for collected Face in the facial image of certification object is matched, and matching result is obtained.Finally, determining that the matching result is video In the case that face in information matches with face in collected facial image, the action that will be detected in video information It is matched to obtain matching result with the action indicated by preset action command.The matching result may include matching score, In vivo detection score can be obtained according to matching result, such as can be using matching score as In vivo detection score.
As an example, after obtaining collected video information, above-mentioned executive agent can will be in the video information Video is divided into continuous picture frame sequence.Then, Face datection is carried out to picture frame sequence, and is determining to detect face In the case of matching with the face in the facial image of collected object to be certified, successively to each figure in picture frame sequence As frame is detected to obtain the action of object execution to be certified.Finally, by the action detected from picture frame sequence with it is preset Action indicated by action command is matched, and according to the action detected and the action indicated by preset action command The degree to match obtains the score of In vivo detection.It is understood that indicated by action and preset instruction to detecting Action matching, be not limited only to the matching variation (i.e. expression shape change) of face position, the variation of position (i.e. action change Change) etc., the sequence of the variations such as face position, position can also be matched.
Step 404, in response to determining the face authentication score of object to be certified less than the first predetermined threshold value and/or waiting recognizing The In vivo detection score for demonstrate,proving object is less than the second predetermined threshold value, and the identity of object to be certified is verified by preset fence operation.
In the present embodiment, the In vivo detection point that the face authentication score and step 403 obtained based on step 401 is obtained Face authentication score and the first predetermined threshold value can be compared, In vivo detection score and second preset by number, above-mentioned executive agent Threshold comparison, and obtain comparing result.And the face authentication score for determining object to be certified be less than the first predetermined threshold value and/ Or in the case that the In vivo detection score of object to be certified is less than the second predetermined threshold value, assert that the authentication of object to be certified does not have Have and passes through.At this moment, above-mentioned executive agent can continue to verify the identity of object to be certified by preset fence operation.This is default Fence operation be the identity that certification object is treated on the basis of face authentication and In vivo detection further verification.
Figure 4, it is seen that compared with the corresponding embodiments of Fig. 2, the method for authenticating identity in the present embodiment Flow 400 highlight by treating the action recognition of certification object come the step of carrying out In vivo detection.The present embodiment is retouched as a result, The scheme stated can promote the reliability of In vivo detection, to improve the safety of authentication.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, this application provides one kind being used for certification body One embodiment of the device of part, the device embodiment is corresponding with embodiment of the method shown in Fig. 2, which can specifically answer For in various electronic equipments.
As shown in figure 5, the device 500 for authenticating identity of the present embodiment includes:Matching unit 501, In vivo detection list Member 502 and verification unit 503.Wherein, matching unit 501 be configured to by the facial image of collected object to be certified with it is pre- The facial image first stored is matched, and face authentication score is obtained;In vivo detection unit 502 is configured to treat certification object In vivo detection is carried out, In vivo detection score is obtained;Verification unit 503 is configured to the face in response to determining object to be certified Certification score is less than the first predetermined threshold value and/or the In vivo detection score of object to be certified is less than the second predetermined threshold value, by pre- If fence operation verify the identity of object to be certified.
In the present embodiment, above-mentioned matching unit 501 can by the facial image of collected object to be certified and in advance The registered face image of storage obtains the face authentication score of object to be certified by way of calculating face characteristic etc., so as to Judge in registered face image whether to include the pre-registered facial image of object to be certified in using the face authentication score. Above-mentioned In vivo detection unit 502 can treat certification object progress In vivo detection and obtain In vivo detection score, so as to judge Go out whether collected facial image is collected from live body object to be identified.Also, determining object to be certified Face authentication score be less than the In vivo detection score of the first predetermined threshold value and/or object to be certified and be less than the second predetermined threshold value In the case of, verification unit 503 can verify the identity of object to be certified by preset fence operation, in order to which it can be treated The identity of certification object is further verified.
In some optional realization methods of the present embodiment, verification unit 503 is further configured to according to such as lower section Formula verifies the identity of object to be certified:Increase the second predetermined threshold value;By the facial image of collected object to be certified again with Pre-stored facial image is matched, and the face authentication score in fence operation is obtained;Certification object is treated to carry out again In vivo detection obtains the In vivo detection score in fence operation;In response to determining that the face authentication score in fence operation is big In vivo detection score in the first predetermined threshold value and fence operation is greater than or equal to the second predetermined threshold value after increasing, Determine that object to be certified passes through authentication.
In some optional realization methods of the present embodiment, verification unit 503 is further configured to according to such as lower section Formula verifies the identity of object to be certified:Send out the prompt message for prompting the default verification content of object input to be certified;In response to true The content and default verification content for making object input to be certified match, and determine that object to be certified passes through authentication.
In some optional realization methods of the present embodiment, In vivo detection unit 502 is further configured to according to such as Under type treats certification object and carries out In vivo detection:Preset action command is sent out, and obtains collected object to be certified and rings The video information that should be acted in preset action command execution;In response to determining the face in video information and collected people Face in face image matches, and the action detected in video information is carried out with the action indicated by preset action command Matching, obtains In vivo detection score.
In some optional realization methods of the present embodiment, the device 500 for authenticating identity further includes:Determination unit (not shown), be configured in response to determine object to be certified face authentication score be greater than or equal to the first predetermined threshold value and The In vivo detection score of object to be certified is greater than or equal to the second predetermined threshold value, determines that the authentication of object to be certified passes through.
All units described in device 500 are corresponding with reference to each step in figure 2 and the method for Fig. 4 descriptions.As a result, Operation and feature above with respect to method description are equally applicable to device 500 and unit wherein included, and details are not described herein.
Device provided by the embodiments of the present application for authenticating identity is waited for by using matching unit 501 by collected The facial image of certification object and pre-stored facial image are matched, so as to obtain face authentication score, then In vivo detection is carried out to treat certification object using In vivo detection unit 502, so as to obtain In vivo detection score, finally, It is less than the In vivo detection score of the first predetermined threshold value and/or object to be certified in the face authentication score for determining object to be certified In the case of the second predetermined threshold value, verification unit 503 can verify the body of object to be certified by preset fence operation Part.The device for being used for authenticating identity can improve the accuracy rate of authentication, and then improve the security protection of authentication Performance.
Below with reference to Fig. 6, it illustrates the computer systems 600 suitable for the electronic equipment for realizing the embodiment of the present application Structural schematic diagram.Electronic equipment shown in Fig. 6 is only an example, to the function of the embodiment of the present application and should not use model Shroud carrys out any restrictions.
As shown in fig. 6, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and Execute various actions appropriate and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data. CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always Line 604.
It is connected to I/O interfaces 605 with lower component:Importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loud speaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on driver 610, as needed in order to be read from thereon Computer program be mounted into storage section 608 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed by communications portion 609 from network, and/or from detachable media 611 are mounted.When the computer program is executed by central processing unit (CPU) 601, limited in execution the present processes Above-mentioned function.It should be noted that computer-readable medium described herein can be computer-readable signal media or Computer readable storage medium either the two arbitrarily combines.Computer readable storage medium for example can be --- but Be not limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or arbitrary above combination. The more specific example of computer readable storage medium can include but is not limited to:Electrical connection with one or more conducting wires, Portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only deposit Reservoir (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory Part or above-mentioned any appropriate combination.In this application, computer readable storage medium can any be included or store The tangible medium of program, the program can be commanded the either device use or in connection of execution system, device.And In the application, computer-readable signal media may include the data letter propagated in a base band or as a carrier wave part Number, wherein carrying computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but not It is limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer Any computer-readable medium other than readable storage medium storing program for executing, the computer-readable medium can send, propagate or transmit use In by instruction execution system, device either device use or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to:Wirelessly, electric wire, optical cable, RF etc., Huo Zheshang Any appropriate combination stated.
The calculating of the operation for executing the application can be write with one or more programming languages or combinations thereof Machine program code, described program design language include object oriented program language-such as Java, Smalltalk, C+ +, further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute on the user computer, partly execute, executed as an independent software package on the user computer, Part executes or executes on a remote computer or server completely on the remote computer on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including LAN (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of the various embodiments of the application, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, program segment, or code of table, the module, program segment, or code includes one or more uses The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it to note Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard The mode of part is realized.Described unit can also be arranged in the processor, for example, can be described as:A kind of processor packet Include matching unit, In vivo detection unit and verification unit.Wherein, the title of these units is not constituted to this under certain conditions The restriction of unit itself, for example, matching unit is also described as " by the facial image of collected object to be certified and in advance The facial image first stored is matched, and the unit of face authentication score is obtained ".
As on the other hand, present invention also provides a kind of computer-readable medium, which can be Included in device described in above-described embodiment;Can also be individualism, and without be incorporated the device in.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the device so that should Device:The facial image of collected object to be certified is matched with pre-stored facial image, obtains face authentication Score;It treats certification object and carries out In vivo detection, obtain In vivo detection score;In response to determining that the face of object to be certified is recognized It demonstrate,proves score and is less than the second predetermined threshold value less than the In vivo detection score of the first predetermined threshold value and/or object to be certified, by default Fence operation verify the identity of object to be certified.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art Member should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Other technical solutions of arbitrary combination and formation.Such as features described above has similar work(with (but not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (12)

1. a kind of method for authenticating identity, including:
The facial image of collected object to be certified is matched with pre-stored facial image, obtains face authentication point Number;
In vivo detection is carried out to the object to be certified, obtains In vivo detection score;
In response to determining that the face authentication score of the object to be certified is less than the first predetermined threshold value and/or described to be certified right The In vivo detection score of elephant is less than the second predetermined threshold value, and the identity of the object to be certified is verified by preset fence operation.
2. described to verify the object to be certified by preset fence operation according to the method described in claim 1, wherein Identity, including:
Increase second predetermined threshold value;
The facial image of collected object to be certified again is matched with pre-stored facial image, is obtained described anti- Face authentication score in shield operation;In vivo detection is carried out again to the object to be certified, is obtained in the fence operation In vivo detection score;In response to determining that the face authentication score in the fence operation is greater than or equal to the described first default threshold In vivo detection score in value and the fence operation is greater than or equal to second predetermined threshold value after increasing, and is waited for described in determination Certification object passes through authentication.
3. described to verify the object to be certified by preset fence operation according to the method described in claim 1, wherein Identity, including:
Send out the prompt message for prompting the default verification content of object input to be certified;
In response to determining that the content of the object input to be certified matches with the default verification content, wait recognizing described in determination Card object passes through authentication.
4. it is described that In vivo detection is carried out to the object to be certified according to the method described in claim 1, wherein, obtain live body Score is detected, including:
Preset action command is sent out, and it is dynamic in response to the execution of preset action command to obtain the collected object to be certified The video information of work;
In response to determining that the face in the video information matches with the face in collected facial image, regarded by described in The action detected in frequency information is matched with the action indicated by the preset action command, obtains the In vivo detection Score.
5. according to the method described in one of claim 1-4, wherein the method further includes:
In response to determining that the face authentication score of the object to be certified is greater than or equal to first predetermined threshold value and described The In vivo detection score of object to be certified is greater than or equal to second predetermined threshold value, determines that the identity of the object to be certified is recognized Card passes through.
6. a kind of device for authenticating identity, including:
Matching unit is configured to the facial image of collected object to be certified and the progress of pre-stored facial image Match, obtains face authentication score;
In vivo detection unit is configured to carry out In vivo detection to the object to be certified, obtains In vivo detection score;
Verification unit is configured to be less than the first predetermined threshold value in response to the face authentication score for determining the object to be certified And/or the In vivo detection score of the object to be certified is less than the second predetermined threshold value, described in the verification of preset fence operation The identity of object to be certified.
7. device according to claim 6, wherein the verification unit is further configured to verify as follows The identity of the object to be certified:
Increase second predetermined threshold value;
The facial image of collected object to be certified again is matched with pre-stored facial image, is obtained described anti- Face authentication score in shield operation;In vivo detection is carried out again to the object to be certified, is obtained in the fence operation In vivo detection score;In response to determining that the face authentication score in the fence operation is greater than or equal to the described first default threshold In vivo detection score in value and the anti-shield operation is greater than or equal to second predetermined threshold value after increasing, determine described in wait for Certification object passes through authentication.
8. device according to claim 6, wherein the verification unit is further configured to verify as follows The identity of the object to be certified:
Send out the prompt message for prompting the default verification content of object input to be certified;
In response to determining that the content of the object input to be certified matches with the default verification content, wait recognizing described in determination Card object passes through authentication.
9. device according to claim 6, wherein the In vivo detection unit is further configured to as follows In vivo detection is carried out to the object to be certified:
Preset action command is sent out, and it is dynamic in response to the execution of preset action command to obtain the collected object to be certified The video information of work;
In response to determining that the face in the video information matches with the face in collected facial image, regarded by described in The action detected in frequency information is matched with the action indicated by the preset action command, obtains the In vivo detection Score.
10. according to the device described in one of claim 6-9, wherein described device further includes:
Determination unit is configured to be greater than or equal to described the in response to the face authentication score for determining the object to be certified The In vivo detection score of one predetermined threshold value and the object to be certified is greater than or equal to second predetermined threshold value, is waited for described in determination The authentication of certification object passes through.
11. a kind of electronic equipment, including:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now method as described in any in claim 1-5.
12. a kind of computer-readable medium, is stored thereon with computer program, wherein real when described program is executed by processor The now method as described in any in claim 1-5.
CN201810241989.3A 2018-03-22 2018-03-22 Method and apparatus for authenticating identity Pending CN108460266A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810241989.3A CN108460266A (en) 2018-03-22 2018-03-22 Method and apparatus for authenticating identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810241989.3A CN108460266A (en) 2018-03-22 2018-03-22 Method and apparatus for authenticating identity

Publications (1)

Publication Number Publication Date
CN108460266A true CN108460266A (en) 2018-08-28

Family

ID=63237184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810241989.3A Pending CN108460266A (en) 2018-03-22 2018-03-22 Method and apparatus for authenticating identity

Country Status (1)

Country Link
CN (1) CN108460266A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110414346A (en) * 2019-06-25 2019-11-05 北京迈格威科技有限公司 Biopsy method, device, electronic equipment and storage medium
CN110570597A (en) * 2019-08-30 2019-12-13 南京领行科技股份有限公司 identity recognition method, system and storage medium
CN110795714A (en) * 2019-09-10 2020-02-14 中国平安财产保险股份有限公司 Identity authentication method and device, computer equipment and storage medium
CN111126229A (en) * 2019-12-17 2020-05-08 中国建设银行股份有限公司 Data processing method and device
CN111427911A (en) * 2020-03-25 2020-07-17 平安医疗健康管理股份有限公司 Data query method and device, computer equipment and storage medium
CN111563454A (en) * 2020-05-08 2020-08-21 浙江大学 Hand vein identification method and device for double in-vivo verification
CN113614731A (en) * 2019-03-21 2021-11-05 创新先进技术有限公司 Authentication verification using soft biometrics
CN113705428A (en) * 2021-08-26 2021-11-26 北京市商汤科技开发有限公司 Living body detection method and apparatus, electronic device, and computer-readable storage medium
US11379441B1 (en) * 2021-12-17 2022-07-05 Capped Out Media System and methods for self-input information validation and correction

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130219480A1 (en) * 2012-02-21 2013-08-22 Andrew Bud Online Pseudonym Verification and Identity Validation
CN103678984A (en) * 2013-12-20 2014-03-26 湖北微模式科技发展有限公司 Method for achieving user authentication by utilizing camera
US20140337948A1 (en) * 2013-05-13 2014-11-13 Hoyos Labs Corp. System and method for determining liveness
CN104348778A (en) * 2013-07-25 2015-02-11 信帧电子技术(北京)有限公司 Remote identity authentication system, terminal and method carrying out initial face identification at handset terminal
CN105426723A (en) * 2015-11-20 2016-03-23 北京得意音通技术有限责任公司 Voiceprint identification, face identification and synchronous in-vivo detection-based identity authentication method and system
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN105844203A (en) * 2015-01-12 2016-08-10 阿里巴巴集团控股有限公司 Human face vivo detection method and device
CN106302330A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 Auth method, device and system
CN107133608A (en) * 2017-05-31 2017-09-05 天津中科智能识别产业技术研究院有限公司 Identity authorization system based on In vivo detection and face verification

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130219480A1 (en) * 2012-02-21 2013-08-22 Andrew Bud Online Pseudonym Verification and Identity Validation
US20140337948A1 (en) * 2013-05-13 2014-11-13 Hoyos Labs Corp. System and method for determining liveness
CN104348778A (en) * 2013-07-25 2015-02-11 信帧电子技术(北京)有限公司 Remote identity authentication system, terminal and method carrying out initial face identification at handset terminal
CN103678984A (en) * 2013-12-20 2014-03-26 湖北微模式科技发展有限公司 Method for achieving user authentication by utilizing camera
CN105844203A (en) * 2015-01-12 2016-08-10 阿里巴巴集团控股有限公司 Human face vivo detection method and device
CN106302330A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 Auth method, device and system
CN105426723A (en) * 2015-11-20 2016-03-23 北京得意音通技术有限责任公司 Voiceprint identification, face identification and synchronous in-vivo detection-based identity authentication method and system
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN107133608A (en) * 2017-05-31 2017-09-05 天津中科智能识别产业技术研究院有限公司 Identity authorization system based on In vivo detection and face verification

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113614731A (en) * 2019-03-21 2021-11-05 创新先进技术有限公司 Authentication verification using soft biometrics
CN110414346A (en) * 2019-06-25 2019-11-05 北京迈格威科技有限公司 Biopsy method, device, electronic equipment and storage medium
CN110570597A (en) * 2019-08-30 2019-12-13 南京领行科技股份有限公司 identity recognition method, system and storage medium
CN110795714A (en) * 2019-09-10 2020-02-14 中国平安财产保险股份有限公司 Identity authentication method and device, computer equipment and storage medium
CN111126229A (en) * 2019-12-17 2020-05-08 中国建设银行股份有限公司 Data processing method and device
CN111427911A (en) * 2020-03-25 2020-07-17 平安医疗健康管理股份有限公司 Data query method and device, computer equipment and storage medium
CN111563454A (en) * 2020-05-08 2020-08-21 浙江大学 Hand vein identification method and device for double in-vivo verification
CN111563454B (en) * 2020-05-08 2023-08-08 浙江大学 Dual living body verification hand vein recognition method and device
CN113705428A (en) * 2021-08-26 2021-11-26 北京市商汤科技开发有限公司 Living body detection method and apparatus, electronic device, and computer-readable storage medium
CN113705428B (en) * 2021-08-26 2024-07-19 北京市商汤科技开发有限公司 Living body detection method and device, electronic equipment and computer readable storage medium
US11379441B1 (en) * 2021-12-17 2022-07-05 Capped Out Media System and methods for self-input information validation and correction

Similar Documents

Publication Publication Date Title
CN108460266A (en) Method and apparatus for authenticating identity
CN109711133B (en) Identity information authentication method and device and server
US20190251571A1 (en) Transaction verification system
CN108491805B (en) Identity authentication method and device
CN106068512B (en) Method and apparatus for verifying user on the mobile device
US10108792B2 (en) Biometric-based authentication method, apparatus and system
CN111898108B (en) Identity authentication method, device, terminal and server
KR102434562B1 (en) Method and apparatus for detecting fake fingerprint, method and apparatus for recognizing fingerprint
CN109684806A (en) Auth method, device, system and medium based on physiological characteristic information
CN108351932A (en) CAPTCHA challenges based on image
CN108229419A (en) For clustering the method and apparatus of image
KR20160144419A (en) Method and system for verifying identities
CN104700094B (en) A kind of face identification method for intelligent robot and system
CN108494778A (en) Identity identifying method and device
US11494474B2 (en) Brain activity-based authentication
CN106888204B (en) Implicit identity authentication method based on natural interaction
CN107038784B (en) Safe verification method and device
CN108932774A (en) information detecting method and device
CN110164455A (en) Device, method and the storage medium of user identity identification
CN108449514A (en) Information processing method and device
KR20160126842A (en) Method and apparatus for verifying fingerprint
US11568681B2 (en) Iris authentication device, iris authentication method and recording medium
KR102558736B1 (en) Method and apparatus for recognizing finger print
KR102205495B1 (en) Method and apparatus for recognizing finger print
CN110276313B (en) Identity authentication method, identity authentication device, medium and computing equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180828