Movatterモバイル変換


[0]ホーム

URL:


CN105407098A - Identity verification method and device - Google Patents

Identity verification method and device
Download PDF

Info

Publication number
CN105407098A
CN105407098ACN201510845602.1ACN201510845602ACN105407098ACN 105407098 ACN105407098 ACN 105407098ACN 201510845602 ACN201510845602 ACN 201510845602ACN 105407098 ACN105407098 ACN 105407098A
Authority
CN
China
Prior art keywords
app account
authentication
current app
facial image
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510845602.1A
Other languages
Chinese (zh)
Inventor
陈志军
龙飞
侯文迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi IncfiledCriticalXiaomi Inc
Priority to CN201510845602.1ApriorityCriticalpatent/CN105407098A/en
Publication of CN105407098ApublicationCriticalpatent/CN105407098A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention relates to an identity verification method and device. The identity verification method comprises the steps of obtaining a face image and performing face identification based on the face image if a preset behavior of a current APP account is detected to be triggered; if the face identification result shows that the face similarity is greater than a preset threshold, indicating that the identity verification is successful; and if the face identification result shows that the face similarity is smaller than or equal to the preset threshold, indicating that the identity verification is failed. According to the embodiment of the identity verification method and device, the face image is obtained when the preset behavior of the current APP account is triggered, the face identification is carried out based on the face image, the identity verification is successful when the face similarity is greater than the preset threshold, and the identity verification is failed when the face similarity is smaller than or equal to the preset threshold, so that by means of the identity verification method, efficient identity verificationcan be achieved.

Description

Auth method and device
Technical field
The disclosure relates to mobile internet technical field, particularly relates to a kind of auth method and device.
Background technology
Along with burning the wind of Internet technology, the life networking day by day of people, informationization.Nowadays user can carry out the business such as shopping online, online increment by the Internet, and user, when by application program (APP), such as Alipay pays, needs to carry out necessary authentication.
Current authentication process itself is: APP is after the account receiving user's input and password, and the mobile phone to binding sends an identifying code, and user just can log in this APP after inputting this identifying code, thus can carry out subsequent operation.
Summary of the invention
For overcoming Problems existing in correlation technique, the disclosure provides a kind of auth method and device.
According to the first aspect of disclosure embodiment, a kind of auth method is provided, comprises:
If detect, the default behavior of current APP account is triggered, then obtain facial image, and carry out recognition of face according to described facial image;
If face recognition result is human face similarity degree be greater than predetermined threshold value, then by authentication, if described face recognition result is described human face similarity degree be less than or equal to described predetermined threshold value, then do not pass through authentication.
In one embodiment, described method also comprises:
Before described acquisition facial image, the legitimacy of authentication of users number, if Subscriber Number is legal, then performs described acquisition facial image.
In one embodiment, described in detect that the default behavior of current APP account is triggered, comprising:
Detect that the current registration terminal of described current APP account is different from historical log terminal; Or
The current login place of described current APP account and history being detected, conventional to log in place different; Or
Detect that the password retrieval function of described current APP account is triggered; Or
Detect that the current registration terminal number of described current APP account is different from historical log termination number.
In one embodiment, described acquisition facial image, and carry out recognition of face according to described facial image, comprising:
Obtain the facial image under preset posture, and feature extraction is carried out to described facial image;
The face characteristic that prestores in the face characteristic of current extraction and described current APP account is compared, to obtain described face recognition result.
In one embodiment, described method also comprises:
Before facial image under described acquisition preset posture, display reminding information, described information is taken pictures according to described preset posture for pointing out user.
In one embodiment, described method also comprises:
Described detect that the password retrieval function of described current APP account is triggered after, if by authentication, then receive and preserve the new password of described current APP account.
In one embodiment, described method also comprises:
Described detect that the current registration terminal number of described current APP account is different from historical log termination number after, if pass through authentication, then delete the described historical log termination number bound with described current APP account, upgrade and preserve the current registration terminal number setting up binding relationship with described current APP account.
In one embodiment, described Subscriber Number comprises one or more in the ID card No. of the mobile terminal number bound with described current APP account, the self-defining number of mobile phone users bound with described current APP account and described mobile phone users.
According to the second aspect of disclosure embodiment, a kind of authentication means is provided, comprises:
Detect and obtain identification module, detect that if be configured to the default behavior of current APP account is triggered, then obtain facial image, and carry out recognition of face according to described facial image;
Authentication module, if being configured to the described face recognition result detecting acquisition identification module is that human face similarity degree is greater than predetermined threshold value, then by authentication, if described face recognition result is described human face similarity degree be less than or equal to described predetermined threshold value, then do not pass through authentication.
In one embodiment, described device also comprises:
Number verification module, be configured to before described detection obtains identification module acquisition facial image, the legitimacy of authentication of users number, if Subscriber Number is legal, then performs described acquisition facial image.
In one embodiment, described detection acquisition identification module comprises:
First detection sub-module, is configured to detect that the current registration terminal of described current APP account is different from historical log terminal; Or
Second detection sub-module, being configured to detect the current login place of described current APP account and history, conventional to log in place different; Or
3rd detection sub-module, is configured to detect that the password retrieval function of described current APP account is triggered; Or
4th detection sub-module, is configured to detect that the current registration terminal number of described current APP account is different from historical log termination number.
In one embodiment, described detection acquisition identification module comprises:
Obtain and extract submodule, be configured to the facial image under acquisition preset posture, and feature extraction is carried out to described facial image;
Comparer module, is configured to the described face characteristic that prestores obtained in the face characteristic and described current APP account extracting the current extraction of submodule to compare, to obtain described face recognition result.
In one embodiment, described device also comprises:
Display module, before being configured to the facial image under described detection obtains identification module acquisition preset posture, display reminding information, described information is taken pictures according to described preset posture for pointing out user.
In one embodiment, described device also comprises:
Receive and preserve module, be configured to after described 3rd detection sub-module detects that the password retrieval function of described current APP account is triggered, if by authentication, then receive and preserve the new password of described current APP account.
In one embodiment, described device also comprises:
Delete to upgrade and preserve module, be configured to after described 4th detection sub-module 414 detects that the current registration terminal number of described current APP account is different from historical log termination number, if pass through authentication, then delete the described historical log termination number bound with described current APP account, upgrade and preserve the current registration terminal number setting up binding relationship with described current APP account.
In one embodiment, described Subscriber Number comprises one or more in the ID card No. of the mobile terminal number bound with described current APP account, the self-defining number of mobile phone users bound with described current APP account and described mobile phone users.
According to the third aspect of disclosure embodiment, a kind of authentication means is provided, comprises:
Processor;
For the memory of storage of processor executable instruction;
Wherein, processor is configured to:
If detect, the default behavior of current APP account is triggered, then obtain facial image, and carry out recognition of face according to described facial image;
If face recognition result is human face similarity degree be greater than predetermined threshold value, then by authentication, if described face recognition result is described human face similarity degree be less than or equal to described predetermined threshold value, then do not pass through authentication.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: obtain facial image when being triggered by the default behavior of current APP account, and carry out recognition of face according to facial image, and when human face similarity degree is greater than predetermined threshold value, pass through authentication, when human face similarity degree is less than or equal to predetermined threshold value, not by authentication, above-mentioned auth method can complete authentication effectively.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in specification and to form the part of this specification, shows embodiment according to the invention, and is used from specification one and explains principle of the present invention.
Fig. 1 is the flow chart of a kind of auth method according to an exemplary embodiment.
Fig. 2 is the flow chart of the another kind of auth method according to an exemplary embodiment.
Fig. 3 is the flow chart of the another kind of auth method according to an exemplary embodiment.
Fig. 4 is the block diagram of a kind of authentication means according to an exemplary embodiment.
Fig. 5 is the block diagram of the another kind of authentication means according to an exemplary embodiment.
Fig. 6 is the block diagram of the another kind of authentication means according to an exemplary embodiment.
Fig. 7 is the block diagram of the another kind of authentication means according to an exemplary embodiment.
Fig. 8 is the block diagram of the another kind of authentication means according to an exemplary embodiment.
Fig. 9 is the block diagram of the another kind of authentication means according to an exemplary embodiment.
Figure 10 is the block diagram of the another kind of authentication means according to an exemplary embodiment.
Figure 11 is a kind of block diagram being applicable to authentication means according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the present invention.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present invention are consistent.
Fig. 1 is the flow chart of a kind of auth method according to an exemplary embodiment, as shown in Figure 1, this auth method can be applicable on terminal equipment, this terminal equipment can including, but not limited to equipment such as mobile phone, panel computers (PAD), and this auth method comprises the following steps S101-S102:
In step S101, if detect, the default behavior of current APP account is triggered, then obtain facial image, and carry out recognition of face according to facial image.
In this embodiment, the default behavior of current APP account can be one or more in following behavior:
The current registration terminal of current APP account is different from historical log terminal, conventional to log in place different for the current login place of current APP account and history, the password retrieval function of current APP account is triggered, and the current registration terminal number of current APP account and historical log termination number not equal.
In this embodiment, if above-mentioned arbitrary default behavior of current APP account is triggered, then can obtains facial image, and carry out recognition of face according to facial image; Also can the legitimacy of authentication of users number, if Subscriber Number is legal, then obtain facial image, and carry out recognition of face according to facial image.
Wherein, Subscriber Number can be one or more in the ID card No. of the mobile terminal number bound with current APP account, the self-defining number of mobile phone users bound with current APP account and mobile phone users.
In this embodiment, obtain facial image, and according to the process that facial image carries out recognition of face can be: obtain the facial image under preset posture, and feature extraction is carried out to facial image, then the face characteristic that prestores in the face characteristic of current extraction and current APP account is compared, to obtain face recognition result.
In this embodiment, the facial image obtained under preset posture is to prevent user from taking photo to carry out alternative live body.
In addition, user, after the current APP account of registration, can preserve face characteristic in current APP account, for face characteristic comparison.
In step s 102, if face recognition result is human face similarity degree be greater than predetermined threshold value, then by authentication, if face recognition result is human face similarity degree be less than or equal to predetermined threshold value, then do not pass through authentication.
In this embodiment, predetermined threshold value can be arranged as required flexibly, such as, be 80%, 90% etc.If be that human face similarity degree is greater than predetermined threshold value according to the face recognition result after facial image carries out recognition of face, be then indicated as same people and log in current APP account, by authentication, otherwise, do not pass through authentication.
From above-mentioned default behavior and authentication process itself, even if present terminal such as mobile phone goes out active, shuts down or the abnormal conditions such as the number of changing, the auth method provided by the present embodiment also can complete authentication.
Above-mentioned auth method embodiment, facial image is obtained when being triggered by the default behavior of current APP account, and carry out recognition of face according to facial image, and when human face similarity degree is greater than predetermined threshold value, pass through authentication, when human face similarity degree is less than or equal to predetermined threshold value, not by authentication, above-mentioned auth method can complete authentication effectively.
Fig. 2 is the flow chart of the another kind of auth method according to an exemplary embodiment, and as shown in Figure 2, this auth method comprises the steps:
In step s 201, if detect, the password retrieval function of current APP account is triggered, then the legitimacy of authentication of users number.
In this embodiment, user is when accessing to your password retrieval function, " password retrieval function " button or option can be clicked, now, terminal equipment can detect that the password retrieval function of current APP account is triggered, then user inputs Subscriber Number such as cell-phone number, and the correctness of this cell-phone number verified by terminal equipment.
In step S202, if Subscriber Number is legal, then display reminding information, this information is taken pictures according to preset posture for pointing out user.
If Subscriber Number is legal, such as cell-phone number is correct, then display reminding information, is taken pictures according to preset posture by this information prompting user.
In step S203, obtain the facial image under preset posture, and feature extraction is carried out to facial image.
In this embodiment, the camera that user can open mobile phone is taken pictures.User poses (mainly preventing user from taking photo to carry out alternative live body) according to preset posture, then carries out feature extraction to the facial image under current pose.
In step S204, the face characteristic that prestores in the face characteristic of current extraction and current APP account is compared, to obtain face recognition result.
In step S205, judge whether face recognition result is that human face similarity degree is greater than predetermined threshold value, if face recognition result is human face similarity degree be greater than predetermined threshold value, then pass through authentication, turn to step S206, if face recognition result is human face similarity degree be less than or equal to predetermined threshold value, then not by authentication, operation terminates.
In step S206, receive and preserve the new password of current APP account.
User by after authentication, user can give password for change, and inputs new password.
As can be seen here, above-described embodiment, when user terminal is lost, still can complete authentication.
Above-mentioned auth method embodiment, can complete authentication effectively, and can give password for change.
Fig. 3 is the flow chart of the another kind of auth method according to an exemplary embodiment, and as shown in Figure 3, this auth method comprises the steps:
In step S301, if detect, the current registration terminal number of current APP account is different from historical log termination number, then the legitimacy of authentication of users number.
In this embodiment, the mobile phone that current APP account is bound can revise the cell-phone number of binding after stopping using in the following manner.
In this embodiment, first user inputs Subscriber Number such as ID card No., and the correctness of this ID card No. verified by terminal equipment.
In step s 302, if Subscriber Number is legal, then display reminding information, this information is taken pictures according to preset posture for pointing out user.
If Subscriber Number is legal, such as ID card No. is correct, then display reminding information, is taken pictures according to preset posture by this information prompting user.
In step S303, obtain the facial image under preset posture, and feature extraction is carried out to facial image.
In this embodiment, the camera that user can open mobile phone is taken pictures.User poses (mainly preventing user from taking photo to carry out alternative live body) according to preset posture, then carries out feature extraction to the facial image under current pose.
In step s 304, the face characteristic that prestores in the face characteristic of current extraction and current APP account is compared, to obtain face recognition result.
In step S305, judge whether face recognition result is that human face similarity degree is greater than predetermined threshold value, if face recognition result is human face similarity degree be greater than predetermined threshold value, then pass through authentication, turn to step S306, if face recognition result is human face similarity degree be less than or equal to predetermined threshold value, then not by authentication, operation terminates.
In step S306, delete the historical log termination number bound with current APP account, upgrade and preserve the current registration terminal number setting up binding relationship with current APP account.
User by after authentication, the historical log termination number bound with current APP account can be deleted, upgrade and preserve the current registration terminal number setting up binding relationship with current APP account.
As can be seen here, above-described embodiment, when user terminal such as stop using by mobile phone, still can complete authentication.
Above-mentioned auth method embodiment, can complete authentication effectively, and can revise the cell-phone number of current APP account binding.
Corresponding with aforementioned auth method embodiment, the disclosure additionally provides authentication means embodiment.
Fig. 4 is the block diagram of a kind of authentication means according to an exemplary embodiment, and as shown in Figure 4, authentication means comprises: detect and obtain identification module 41 and authentication module 42.
Obtain identification module 41 if detect to be configured to detect that the default behavior of current APP account is triggered, then obtain facial image, and carry out recognition of face according to facial image.
In this embodiment, the default behavior of current APP account can be one or more in following behavior:
The current registration terminal of current APP account is different from historical log terminal, conventional to log in place different for the current login place of current APP account and history, the password retrieval function of current APP account is triggered, and the current registration terminal number of current APP account and historical log termination number not equal.
In this embodiment, if above-mentioned arbitrary default behavior of current APP account is triggered, then can obtains facial image, and carry out recognition of face according to facial image; Also can the legitimacy of authentication of users number, if Subscriber Number is legal, then obtain facial image, and carry out recognition of face according to facial image.
Wherein, Subscriber Number can be one or more in the ID card No. of the mobile terminal number bound with current APP account, the self-defining number of mobile phone users bound with current APP account and mobile phone users.
In this embodiment, obtain facial image, and according to the process that facial image carries out recognition of face can be: obtain the facial image under preset posture, and feature extraction is carried out to facial image, then the face characteristic that prestores in the face characteristic of current extraction and current APP account is compared, to obtain face recognition result.
In this embodiment, the facial image obtained under preset posture is to prevent user from taking photo to carry out alternative live body.
In addition, user, after the current APP account of registration, can preserve face characteristic in current APP account, for face characteristic comparison.
If it is that human face similarity degree is greater than predetermined threshold value that authentication module 42 is configured to detect the face recognition result obtaining identification module 41, then by authentication, if face recognition result is human face similarity degree be less than or equal to predetermined threshold value, then do not pass through authentication.
In this embodiment, predetermined threshold value can be arranged as required flexibly, such as, be 80%, 90% etc.If be that human face similarity degree is greater than predetermined threshold value according to the face recognition result after facial image carries out recognition of face, be then indicated as same people and log in current APP account, by authentication, otherwise, do not pass through authentication.
From above-mentioned default behavior and authentication process itself, even if present terminal such as mobile phone goes out active, shuts down or the abnormal conditions such as the number of changing, the auth method provided by the present embodiment also can complete authentication.
Device is as shown in Figure 4 for realizing above-mentioned method flow as shown in Figure 1, and the related content related to describes identical, does not repeat herein.
Above-mentioned authentication means embodiment, facial image is obtained when being triggered by the default behavior of current APP account, and carry out recognition of face according to facial image, and when human face similarity degree is greater than predetermined threshold value, pass through authentication, when human face similarity degree is less than or equal to predetermined threshold value, not by authentication, above-mentioned auth method can complete authentication effectively.
Fig. 5 is the block diagram of the another kind of authentication means according to an exemplary embodiment, and as shown in Figure 5, on above-mentioned basis embodiment illustrated in fig. 4, this device also can comprise: number verification module 43.
Number verification module 43 is configured to before detection acquisition identification module 41 obtains facial image, and the legitimacy of authentication of users number if Subscriber Number is legal, then performs and obtains facial image.
Wherein, Subscriber Number can be one or more in the ID card No. of the mobile terminal number bound with current APP account, the self-defining number of mobile phone users bound with current APP account and mobile phone users.
Device is as shown in Figure 5 for realizing the method flow shown in as shown in Figure 1, Figure 2 above-mentioned or Fig. 3, and the related content related to describes identical, does not repeat herein.
Above-described embodiment, after Subscriber Number is legal, performs the operation obtaining facial image, makes the accuracy rate of authentication higher.
Fig. 6 is the block diagram of the another kind of authentication means according to an exemplary embodiment, as shown in Figure 6, on above-mentioned basis embodiment illustrated in fig. 5, detect and obtain identification module 41 and can comprise: at least one in the first detection sub-module 411, second detection sub-module 412, the 3rd detection sub-module 413 and the 4th detection sub-module 414.
First detection sub-module 411 is configured to detect that the current registration terminal of current APP account is different from historical log terminal.
Second detection sub-module 412 is configured to detect the current login place of current APP account and history, and conventional to log in place different.
3rd detection sub-module 413 is configured to detect that the password retrieval function of current APP account is triggered.
4th detection sub-module 414 is configured to detect that the current registration terminal number of current APP account is different from historical log termination number.
Device is as shown in Figure 6 for realizing above-mentioned method flow as shown in Figure 1, and the related content related to describes identical, does not repeat herein.
Above-described embodiment, describes the various ways of default behavior, show this verification method can application scenarios more, practical.
Fig. 7 is the block diagram of the another kind of authentication means according to an exemplary embodiment, and as shown in Figure 7, on above-mentioned basis embodiment illustrated in fig. 4, detecting acquisition identification module 41 can comprise: obtain and extract submodule 415 and comparer module 416.
Acquisition extraction submodule 415 is configured to the facial image under acquisition preset posture, and carries out feature extraction to facial image.
Comparer module 416 is configured to the face characteristic that prestores in the face characteristic of the current extraction of acquisition extraction submodule 415 and current APP account to compare, to obtain face recognition result.
Device is as shown in Figure 7 for realizing the method flow shown in as shown in Figure 1, Figure 2 above-mentioned or Fig. 3, and the related content related to describes identical, does not repeat herein.
Above-described embodiment, carries out recognition of face by the facial image obtained under preset posture, can prevent user from taking photo to carry out alternative live body, improve checking accuracy rate.
Fig. 8 is the block diagram of the another kind of authentication means according to an exemplary embodiment, and as shown in Figure 8, on above-mentioned basis embodiment illustrated in fig. 7, this device also can comprise: display module 44.
Before display module 44 is configured to the facial image under detection acquisition identification module 41 obtains preset posture, display reminding information, information is taken pictures according to preset posture for pointing out user.
Device is as shown in Figure 8 for realizing above-mentioned method flow as shown in Figure 2 or Figure 3, and the related content related to describes identical, does not repeat herein.
Above-described embodiment, is taken pictures according to preset posture by display reminding information prompting user, thus provides condition for recognition of face.
Fig. 9 is the block diagram of the another kind of authentication means according to an exemplary embodiment, and as shown in Figure 9, on above-mentioned basis embodiment illustrated in fig. 6, this device also can comprise: receive and preserve module 45.
Receive and preserve module 45 and be configured to after the 3rd detection sub-module 413 detects that the password retrieval function of current APP account is triggered, if by authentication, then receive and preserve the new password of current APP account.
Device is as shown in Figure 9 for realizing above-mentioned method flow as shown in Figure 2, and the related content related to describes identical, does not repeat herein.
Above-described embodiment, can complete authentication effectively, and can give password for change.
Figure 10 is the block diagram of the another kind of authentication means according to an exemplary embodiment, and as shown in Figure 10, on above-mentioned basis embodiment illustrated in fig. 6, this device also can comprise:
Deleting renewal preservation module 46 is configured to after the 4th detection sub-module 414 detects that the current registration terminal number of current APP account is different from historical log termination number, if pass through authentication, then delete the historical log termination number bound with current APP account, upgrade and preserve the current registration terminal number setting up binding relationship with current APP account.
Device is as shown in Figure 10 for realizing above-mentioned method flow as shown in Figure 3, and the related content related to describes identical, does not repeat herein.
Above-described embodiment, can complete authentication effectively, and can revise the cell-phone number of current APP account binding.
About the device in above-described embodiment, wherein the concrete mode of modules, submodule executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Figure 11 is a kind of block diagram being applicable to authentication means according to an exemplary embodiment.Such as, device 1100 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant, aircraft etc.
With reference to Figure 11, device 1100 can comprise following one or more assembly: processing components 1102, memory 1104, power supply module 1106, multimedia groupware 1108, audio-frequency assembly 1110, the interface 1112 of I/O (I/O), sensor cluster 1114, and communications component 1116.
The integrated operation of the usual control device 1100 of processing components 1102, such as with display, call, data communication, camera operation and record operate the operation be associated.Treatment element 1102 can comprise one or more processor 1120 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 1102 can comprise one or more module, and what be convenient between processing components 1102 and other assemblies is mutual.Such as, processing unit 1102 can comprise multi-media module, mutual with what facilitate between multimedia groupware 1108 and processing components 1102.
Memory 1104 is configured to store various types of data to be supported in the operation of equipment 1100.The example of these data comprises for any application program of operation on device 1100 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 1104 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
The various assemblies that electric power assembly 1106 is device 1100 provide electric power.Electric power assembly 1106 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 1100 and be associated.
Multimedia groupware 1108 is included in the screen providing an output interface between described device 1100 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 1108 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 1100 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 1110 is configured to export and/or input audio signal.Such as, audio-frequency assembly 1110 comprises a microphone (MIC), and when device 1100 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal received can be stored in memory 1104 further or be sent via communications component 1116.In certain embodiments, audio-frequency assembly 1110 also comprises a loud speaker, for output audio signal.
I/O interface 1112 is for providing interface between processing components 1102 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 1114 comprises one or more transducer, for providing the state estimation of various aspects for device 1100.Such as, sensor cluster 1114 can detect the opening/closing state of equipment 1100, the relative positioning of assembly, such as described assembly is display and the keypad of device 1100, the position of all right checkout gear 1100 of sensor cluster 1114 or device 1100 assemblies changes, the presence or absence that user contacts with device 1100, the variations in temperature of device 1100 orientation or acceleration/deceleration and device 1100.Sensor cluster 1114 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 1114 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 1114 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 1116 is configured to the communication being convenient to wired or wireless mode between device 1100 and other equipment.Device 1100 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communication component 1116 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communication component 1116 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1100 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the memory 1104 of instruction, above-mentioned instruction can perform said method by the processor 1120 of device 1100.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
Those skilled in the art, at consideration specification and after putting into practice disclosed herein disclosing, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Specification and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (17)

CN201510845602.1A2015-11-262015-11-26Identity verification method and devicePendingCN105407098A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510845602.1ACN105407098A (en)2015-11-262015-11-26Identity verification method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510845602.1ACN105407098A (en)2015-11-262015-11-26Identity verification method and device

Publications (1)

Publication NumberPublication Date
CN105407098Atrue CN105407098A (en)2016-03-16

Family

ID=55472353

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510845602.1APendingCN105407098A (en)2015-11-262015-11-26Identity verification method and device

Country Status (1)

CountryLink
CN (1)CN105407098A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106778198A (en)*2016-11-232017-05-31北京小米移动软件有限公司Perform the safety certifying method and device of operation
CN106845267A (en)*2016-12-192017-06-13广东欧珀移动通信有限公司The processing method and mobile terminal of applicating history information
CN106970552A (en)*2017-02-092017-07-21中控智慧科技股份有限公司A kind of method of controlling switch, intelligent switch and mobile terminal
CN107229892A (en)*2016-03-242017-10-03阿里巴巴集团控股有限公司A kind of identification method of adjustment and equipment based on face recognition products
CN107370758A (en)*2017-08-292017-11-21维沃移动通信有限公司A kind of login method and mobile terminal
CN107483474A (en)*2017-09-052017-12-15深圳支点电子智能科技有限公司One kind communication account login method and device
CN107508803A (en)*2017-08-092017-12-22广州云从信息科技有限公司A kind of face identification method for online game security checking
CN107786487A (en)*2016-08-242018-03-09腾讯科技(深圳)有限公司A kind of authentification of message processing method, system and relevant device
CN107862311A (en)*2017-10-272018-03-30上海京颐科技股份有限公司User profile acquisition method and device, computer-readable recording medium
CN108401070A (en)*2016-08-312018-08-14安溪钟泰专利技术转移有限公司A kind of mobile phone and unbundlings based reminding method
CN108830592A (en)*2018-06-122018-11-16南京熊猫电子股份有限公司A kind of subscriber authentication and authority recognition method and system
CN109067767A (en)*2018-08-312018-12-21上海艾融软件股份有限公司A kind of recognition of face authentication method and system
WO2018232668A1 (en)*2017-06-212018-12-27深圳支点电子智能科技有限公司 Communication account login method and device
CN109271771A (en)*2018-09-202019-01-25平安科技(深圳)有限公司Account information method for retrieving, device, computer equipment
CN112989937A (en)*2021-02-072021-06-18支付宝(杭州)信息技术有限公司Method and device for user identity authentication

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101174948A (en)*2006-11-022008-05-07上海银晨智能识别科技有限公司Network login system and method with face authentication
US20110161232A1 (en)*2009-12-282011-06-30Brown Kerry DVirtualization of authentication token for secure applications
CN102375970A (en)*2010-08-132012-03-14北京中星微电子有限公司Identity authentication method based on face and authentication apparatus thereof
WO2012105085A1 (en)*2011-01-312012-08-09Necソフト株式会社Image authentication device, image authentication method, program, and recording medium
CN103235909A (en)*2013-04-252013-08-07广东欧珀移动通信有限公司Method and device for resetting password and mobile device
CN103384234A (en)*2012-05-042013-11-06深圳市腾讯计算机系统有限公司Method and system for face identity authentication
CN103778360A (en)*2012-10-262014-05-07华为技术有限公司Face unlocking method and device based on motion analysis
CN104732396A (en)*2015-03-242015-06-24广东欧珀移动通信有限公司Payment control method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101174948A (en)*2006-11-022008-05-07上海银晨智能识别科技有限公司Network login system and method with face authentication
US20110161232A1 (en)*2009-12-282011-06-30Brown Kerry DVirtualization of authentication token for secure applications
CN102375970A (en)*2010-08-132012-03-14北京中星微电子有限公司Identity authentication method based on face and authentication apparatus thereof
WO2012105085A1 (en)*2011-01-312012-08-09Necソフト株式会社Image authentication device, image authentication method, program, and recording medium
CN103384234A (en)*2012-05-042013-11-06深圳市腾讯计算机系统有限公司Method and system for face identity authentication
CN103778360A (en)*2012-10-262014-05-07华为技术有限公司Face unlocking method and device based on motion analysis
CN103235909A (en)*2013-04-252013-08-07广东欧珀移动通信有限公司Method and device for resetting password and mobile device
CN104732396A (en)*2015-03-242015-06-24广东欧珀移动通信有限公司Payment control method and device

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107229892A (en)*2016-03-242017-10-03阿里巴巴集团控股有限公司A kind of identification method of adjustment and equipment based on face recognition products
CN107786487A (en)*2016-08-242018-03-09腾讯科技(深圳)有限公司A kind of authentification of message processing method, system and relevant device
CN108401070A (en)*2016-08-312018-08-14安溪钟泰专利技术转移有限公司A kind of mobile phone and unbundlings based reminding method
CN108401070B (en)*2016-08-312021-04-23安溪钟泰专利技术转移有限公司Mobile phone and unbinding reminding method
CN106778198A (en)*2016-11-232017-05-31北京小米移动软件有限公司Perform the safety certifying method and device of operation
CN106845267A (en)*2016-12-192017-06-13广东欧珀移动通信有限公司The processing method and mobile terminal of applicating history information
CN106845267B (en)*2016-12-192019-10-29Oppo广东移动通信有限公司The processing method and mobile terminal of applicating history information
CN106970552A (en)*2017-02-092017-07-21中控智慧科技股份有限公司A kind of method of controlling switch, intelligent switch and mobile terminal
CN106970552B (en)*2017-02-092023-11-14中控智慧科技股份有限公司Switch control method, intelligent switch and mobile terminal
WO2018232668A1 (en)*2017-06-212018-12-27深圳支点电子智能科技有限公司 Communication account login method and device
CN107508803A (en)*2017-08-092017-12-22广州云从信息科技有限公司A kind of face identification method for online game security checking
CN107370758A (en)*2017-08-292017-11-21维沃移动通信有限公司A kind of login method and mobile terminal
CN107370758B (en)*2017-08-292019-12-31维沃移动通信有限公司 A login method and mobile terminal
CN107483474A (en)*2017-09-052017-12-15深圳支点电子智能科技有限公司One kind communication account login method and device
CN107862311A (en)*2017-10-272018-03-30上海京颐科技股份有限公司User profile acquisition method and device, computer-readable recording medium
CN108830592A (en)*2018-06-122018-11-16南京熊猫电子股份有限公司A kind of subscriber authentication and authority recognition method and system
CN109067767A (en)*2018-08-312018-12-21上海艾融软件股份有限公司A kind of recognition of face authentication method and system
CN109067767B (en)*2018-08-312021-02-19上海艾融软件股份有限公司Face recognition authentication method and system
CN109271771A (en)*2018-09-202019-01-25平安科技(深圳)有限公司Account information method for retrieving, device, computer equipment
CN112989937A (en)*2021-02-072021-06-18支付宝(杭州)信息技术有限公司Method and device for user identity authentication

Similar Documents

PublicationPublication DateTitle
CN105407098A (en)Identity verification method and device
US20210326429A1 (en)Access control method and device, electronic device and storage medium
CN104185304B (en)A kind of method and device accessing WI-FI network
CN104484593B (en)terminal verification method and device
CN104732380A (en)Method and device for conducting account transfer processing
CN104484200A (en)Method and device for updating firmware
CN104850827A (en)Fingerprint identification method and apparatus
CN105468767A (en)Method and device for acquiring calling card information
CN104391712B (en)Closedown method and device
CN105162784B (en)The treating method and apparatus of verification information input
CN105224349A (en)The deletion reminding method of application program and device
CN104766005A (en)Management method and device for application software access authority
CN104216742A (en)Upgrade control method and device based on password
CN105095717A (en)Processing method and processing device of exception event, and electronic equipment
CN104331668A (en)Wrong password prompting method and device
CN104376248A (en)Method and device for carrying out user authentication on password input interface
CN104331228A (en)Screen locking method and device
CN105407070A (en)Logging-in authorization method and device
CN105392141A (en)Device control method and device
CN106603815B (en)Message processing method and device
CN104217328A (en)Multi-verification payment method and multi-verification payment device
CN105282162A (en)Processing method and device for account management business
CN104125267A (en)Account protection method, device and terminal equipment
CN105426210A (en)Method and device for upgrading system
CN104239095A (en)Operating-system starting method, device and terminal equipment

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20160316

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp