Authentication method and device

An identity verification method and identity verification technology, applied in the field of identity verification methods and devices, can solve problems such as low terminal accuracy, and achieve the effect of improving accuracy

Active Publication Date: 2016-11-23
SHENZHEN TENCENT COMP SYST CO LTD
View PDF7 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor found that the above-mentioned technology has at least the following problems: when the criminals steal the user's photo and then use the photo for identity verification, the terminal will still pass the verification, which makes the terminal's identity verification process difficult. less accurate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] Please refer to figure 1 , which shows a method flowchart of an identity verification method provided by an embodiment of the present invention, the identity verification method may include:

[0029] Step 101, providing prompt information for prompting a user to perform a target verification action, where the target verification action includes facial expressions and / or head movements.

[0030] Step 102, collecting at least one fra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and device and belongs to the technical field of information security. The authentication method comprises the following steps: providing a prompting message, used for prompting to make an object authentication action, for a user, wherein the object authentication action comprises facial expression and/or head movement; acquiring at least one frame image; detecting whether authentication action information of the user in at least one frame image is matched with a reference action message when the object authentication action is made, and if the authentication action information of the user is matched with the reference action information, determining that authentication of the user passes. The authentication method and device can be used for solving the problem that accuracy of terminal during authentication is relative low as a photograph can be adopted for authentication in the prior art; and the effects of user participation in an authentication process and improving authentication accuracy are achieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity verification method and device. Background technique [0002] With the increasing maturity of face recognition technology, face recognition technology has become one of the commonly used technologies for identity verification. [0003] The identity verification method based on face recognition technology includes: the terminal collects an image containing the user's face; detects whether the collected face matches the face in the preset face database; if it matches, determines that the user has passed the verification. [0004] In the process of realizing the present invention, the inventor found that the above-mentioned technology has at least the following problems: when the criminals steal the user's photo and then use the photo for identity verification, the terminal will still pass the verification, which makes the terminal's identity verification pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32G06F2221/2133G06F2221/2103G06V40/165G06V40/172G06V40/174G06N20/00G06F30/20
Inventor 任杰
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products