Identity verification method and device, computer equipment and storage medium

An identity verification method and identity verification technology, applied in the direction of digital data authentication, etc., can solve the problems of face recognition system attack, password theft, illegal acquisition of user's head, eye and mouth movements, etc.

Pending Publication Date: 2020-04-03
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the traditional identity authentication scheme, there is still the problem of password or password being stolen, and in the face recognition technology, there are also pre-recorded videos including the user's face, illegally obtained the user's head, eye and mouth movements, etc. , to attack the face recognition system, resulting in the problem that the security of identity authentication is too low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device, computer equipment and storage medium
  • Identity verification method and device, computer equipment and storage medium
  • Identity verification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0060] The identity verification method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through a network. When the server 104 detects the login operation of the object to be detected at the terminal 102, it triggers the face detection instruction, performs face detection on the object to be detected according to the face detection instruction, obtains the face detection result, and generates a random display according to the face detection result A code seque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication method and device based on a password technology, computer equipment and a storage medium. The method comprises the following steps: performing facedetection on a to-be-detected object to obtain a face detection result, and generating a random display code sequence according to the face detection result; extracting lip action features of the to-be-detected object, and performing feature analysis on the lip action features by utilizing the lip language recognition model to obtain a lip action feature display code; extracting interpretation audios of the to-be-detected object, converting the interpretation audios into voice text display codes, comparing the lip action feature display codes and the voice text display codes with the random display code sequence, and performing living body detection on the to-be-detected object when the lip action feature display codes and the voice text display codes conform to the random display code sequence; when living body detection is passed, comparing the face image file of the to-be-detected object with the face detection result to obtain an identity authentication result. According to the method, face, lip language and voice recognition is combined, and the reliability and safety of identity authentication are enhanced.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an identity verification method, device, computer equipment and storage medium. Background technique [0002] With the increasing development of information technology, people's lifestyles are also constantly changing. In the fields of mobile payment and identity verification, how to quickly and effectively confirm the user's personal identity and protect the user's personal information security has become particularly important. important. [0003] Traditional identity authentication schemes include the use of passwords or passphrases to determine personal identities. For example, when a user uses a certain application, the application background can confirm the user's identity according to the login password entered by the user, or enter the SMS verification code when the user forgets the password. It also includes using face recognition technology to confirm the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 余龙龙
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products