Authentication method, device and system

An identity verification method and identity verification technology, applied in the fields of identity verification methods, devices and systems, can solve the problems of legitimate users' personal privacy or property security threats, potential safety hazards, lack of interactive linkage, etc., to make up for limitations and improve security , the effect of increased hardware support

Active Publication Date: 2016-05-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing identity verification technology based on face recognition has certain security risks. The background server unilaterally receives the face recognition results of the terminal device, and lacks interaction with the front-end face recognition software. Against the limitations of cheating, malicious users can use various unconventional means to break thr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system
  • Authentication method, device and system
  • Authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Example

[0046] First embodiment

[0047] Figure 4 It is a flowchart of the identity verification method provided by the first embodiment of the present invention. The identity verification method provided in this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Figure 4 As shown, the method includes:

[0048] Step S11: When a service processing request sent by a terminal device is received, at least one first shooting parameter is issued to the terminal device, so that the terminal device controls the shooting device to collect the user’s information for identity verification according to the first shooting parameter. Face image

[0049] The server 200 receives a service processing request sent by the terminal device 100, and the service processing request may include: the service identifier of the service to be processed and the account number of the terminal device 100. Among them, the account of the terminal device ...

Example

[0062] Second embodiment

[0063] Figure 5 It is a flowchart of the identity verification method provided by the second embodiment of the present invention. The identity verification method provided in this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Figure 5 As shown, the method includes:

[0064] Step S21: When a service processing request sent by a terminal device is received, at least one shooting parameter is randomly determined from the candidate shooting parameters, and is sent to the terminal device as the first shooting parameter, so that the terminal device controls the shooting device according to the first shooting parameter. A photographing parameter collection of the face image of the user for identity verification;

[0065] The service processing request may include: the service identifier of the service to be processed and the account number of the terminal device 100. Among them, the accou...

Example

[0095] The third embodiment

[0096] Image 6 It is a flowchart of the identity verification method provided by the third embodiment of the present invention. The identity verification method provided in this embodiment can pass figure 1 The server 200 shown implements identity verification based on face recognition. Such as Image 6 As shown, the method includes:

[0097] Step S31: When the service processing request sent by the terminal device is received, the model of the terminal device is obtained, and at least one shooting parameter corresponding to the model is obtained according to the model, and is sent to the terminal device as the first shooting parameter, so that the terminal device controls The photographing device collects the face image of the user for identity verification according to the first photographing parameter;

[0098] The service processing request sent by the terminal device 100 may include: the service identifier of the service to be processed and the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An authentication method comprises the following steps of transmitting at least one first shooting parameter to a terminal device when a service processing request sent from the terminal device is received, and controlling a shooting device to acquire a face image for an authentication user by the terminal device according to the first shooting parameter; receiving the face image sent from the terminal device, matching a second shooting parameter of the face image with the first shooting parameter, and simultaneously matching the face image with a preset face image; and determining whether the authentication of the user is passed or not according to a matching result. Further, the invention also provides an authentication device and system. With the above authentication method, device and system, the safety of the authentication based on face recognition can be improved.

Description

Technical field [0001] The present invention relates to the field of computer technology, in particular to an identity verification method, device and system. Background technique [0002] Face recognition is a kind of biometric recognition technology based on human facial feature information. Using a camera or camera to collect images or video streams containing human faces, and automatically detect and track human faces in the images, and then perform a series of related technologies on the detected faces, usually also called face recognition and facial recognition. As a method of identity verification, face recognition has been widely used in government, military, banking, social welfare reporting, e-commerce, security defense, mobile payment and other fields. [0003] However, the existing face recognition-based authentication technology has certain security risks. The back-end server unilaterally receives the face recognition results of the terminal device, and lacks interact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32H04L9/32
Inventor 廖晨王进张东蕊许灿冲张杰
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products