CN107172084A - A kind of method and apparatus of authentication - Google Patents

A kind of method and apparatus of authentication Download PDF

Info

Publication number
CN107172084A
CN107172084A CN201710523271.9A CN201710523271A CN107172084A CN 107172084 A CN107172084 A CN 107172084A CN 201710523271 A CN201710523271 A CN 201710523271A CN 107172084 A CN107172084 A CN 107172084A
Authority
CN
China
Prior art keywords
verification mode
authentication
verification
environmental information
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710523271.9A
Other languages
Chinese (zh)
Inventor
胡胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Guangzhou Mobile R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Guangzhou Mobile R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Guangzhou Mobile R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Guangzhou Mobile R&D Center
Priority to CN201710523271.9A priority Critical patent/CN107172084A/en
Publication of CN107172084A publication Critical patent/CN107172084A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention provides a kind of method and apparatus of authentication.Methods described includes:When receiving authentication request, the parameter information of authentication is obtained;Verification mode for authentication is determined according to the parameter information of acquisition;Authentication is carried out using the verification mode of determination.The method and apparatus of authentication, obtains the parameter of authentication, optimal verification mode is automatically determined according to the parameter of authentication, verification mode is no longer single according to an embodiment of the invention.In addition, include environmental information in parameter, or including environmental information and during scene type, the verification mode of suitable environmental information and scene type can be automatically selected according to environmental information or according to environmental information and scene type, the security and efficiency of authentication is improved.

Description

A kind of method and apparatus of authentication
Technical field
The present invention relates to the technical field of safety verification.More particularly, it is related to a kind of method and apparatus of authentication.
Background technology
With the development of electronic technology, electronic equipment (such as mobile communication terminal, personal computer, tablet personal computer, game Machine or digital multimedia player etc.) more and more important role is play in the life of people.In user in electronic equipment During middle progress various activities, for the purpose of safety, it is often necessary to carry out authentication.The mode of authentication is carried out at present It is no longer confined to traditional mode (for example:Pattern verification mode, digital verification mode and nine grids verification mode etc.), it is various advanced Authentication mode (such as iris verification mode, face verification mode, fingerprint authentication mode and speech verification mode) Applied in the electronic device.At present, most electronic equipment in different authentications using acquiescence or by The authentication mode that user is set, verification mode is single.
The content of the invention
It is single to solve existing verification mode it is an object of the invention to provide a kind of method and apparatus of authentication The problem of.
An aspect of of the present present invention provides a kind of method of authentication, and this method includes:Receiving authentication request When, obtain the parameter information of authentication;Verification mode for authentication is determined according to the parameter information of acquisition;Using true Fixed verification mode carries out authentication.
Alternatively, the parameter information includes environmental information, wherein, determine to test for identity according to the parameter information of acquisition The step of verification mode of card, includes:, will be described excellent when environmental information meets the use condition of the verification mode preferentially used The verification mode first used is defined as the verification mode for authentication, wherein, the verification mode preferentially used is pre- The verification mode preferentially used in the multiple verification modes with priority level deposited.
Alternatively, the parameter information includes environmental information and scene type, wherein, determined according to the parameter information of acquisition The step of verification mode for authentication, includes:Determine that the preferential of authentication uses according to the scene type of authentication Verification mode;Determine whether environmental information meets the use condition of the verification mode preferentially used;When environmental information meets excellent During the use condition of the verification mode first used, the verification mode preferentially used is defined as the authentication for authentication Formula.
Alternatively, during the use condition for the verification mode for being unsatisfactory for preferentially using when environmental information, external environment condition is carried out Compensation, it is determined that whether the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used;Work as benefit When the environmental information of external environment condition after repaying meets the use condition of the verification mode preferentially used, by the authentication preferentially used Formula is defined as the verification mode for authentication;What the environmental information of external environment condition after compensation was unsatisfactory for preferentially using tests During the use condition of card mode, by the first predetermined authentication mode or by the level of security with the verification mode preferentially used Other verification modes of identical are defined as the verification mode for authentication.
Alternatively, the verification mode include it is following at least one:Iris verification mode, face verification mode, fingerprint inspection Card mode and speech verification mode and following at least zero:Pattern verification mode, digital verification mode, nine grids verification mode With signature verification mode.
Alternatively, the use condition of face verification mode includes intensity of illumination condition and direction of illumination condition, environmental information Including outside intensity of illumination and outside direction of illumination.
Alternatively, the intensity of illumination outside light sensor or camera acquisition is passed through.
Alternatively, render detection to obtain the direction of illumination of outside, Huo Zhetong by preceding camera progress high dynamic illumination Cross and the image that preceding camera is shot is carried out graphical analysis to obtain the direction of illumination of outside.
Alternatively, the use condition of face verification mode also includes the ornaments condition of user, and environmental information also includes user Whether the information of ornaments is worn, wherein, carry out graphical analysis to obtain whether user wears by the image for shooting preceding camera The information of wearing jewelry.
Alternatively, when the verification mode preferentially used is face verification mode, and environmental information is unsatisfactory for what is preferentially used During the use condition of verification mode, external environment condition is compensated in the following manner:By adjusting the brightness of screen or opening The flash lamp of camera is opened to compensate come the intensity of illumination to external environment condition.
Alternatively, the use condition of iris verification mode includes distance condition and angle conditions, and environmental information includes user Angle information between information and the iris and camera of user of iris and the distance between camera.
Alternatively, according to the scene type of authentication determine authentication it is preferential use verification mode the step of wrap Include:The level of security of authentication is determined according to the scene type of authentication;Determined according to the level of security of authentication excellent The verification mode first used.
Alternatively, the scene type include it is following at least one:Including e-payment scene, unlocking screen scene and step on Record scene.
Alternatively, the level of security of different scenes type puts in order from high to low by following:E-payment scene, login Scene and unlocking screen scene.
Alternatively, it is determined that preferentially use verification mode the step of in, the authentication higher for level of security The level of security of the verification mode preferentially used is higher, the preferential authentication used of the authentication lower for level of security The verifying speed of formula is faster.
Alternatively, in addition to:When carrying out authentication failure using the verification mode determined, using the second predetermined authentication Other verification modes with the level of security identical of the verification mode of the determination are carried out authentication by mode.
Alternatively, the verification mode of the determination is one or more verification modes.
A kind of equipment of authentication is provided according to another aspect of the present invention, and the equipment includes:Acquiring unit, is being received During to authentication request, the parameter information of authentication is obtained;Determining unit, determines to be used for body according to the parameter information of acquisition The verification mode of part checking;Authentication unit, authentication is carried out using the verification mode of determination.
Alternatively, the parameter information includes environmental information, wherein it is determined that unit meets what is preferentially used when environmental information During the use condition of verification mode, the verification mode preferentially used is defined as the verification mode for authentication, its In, the verification mode that preferentially uses is the authentication preferentially used in the multiple verification modes with priority level prestored Formula.
Alternatively, the parameter information includes environmental information and scene type, wherein, authentication unit is according to authentication Scene type determines the preferential verification mode used of authentication, determines whether environmental information meets the authentication preferentially used The use condition of formula, when environmental information meets the use condition of the verification mode preferentially used, by the authentication preferentially used Formula is defined as the verification mode for authentication.
Alternatively, authentication unit is when the use condition for the verification mode that environmental information is unsatisfactory for preferentially using, to outside Environment is compensated, it is determined that the environmental information of the external environment condition after compensation whether meet the verification mode that preferentially uses use bar Part, when the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used, will preferentially be used Verification mode be defined as verification mode for authentication, the environmental information of external environment condition after compensation is unsatisfactory for preferentially During the use condition of the verification mode used, by the first predetermined authentication mode or by with the verification mode preferentially used Other verification modes of level of security identical are defined as the verification mode for authentication.
Alternatively, the verification mode include it is following at least one:Iris verification mode, face verification mode, fingerprint inspection Card mode and speech verification mode and following at least zero:Pattern verification mode, digital verification mode, nine grids verification mode With signature verification mode.
Alternatively, the use condition of face verification mode includes intensity of illumination condition and direction of illumination condition, environmental information Including outside intensity of illumination and outside direction of illumination.
Alternatively, acquiring unit passes through the intensity of illumination outside light sensor or camera acquisition.
Alternatively, acquiring unit renders detection to obtain the illumination side of outside by preceding camera progress high dynamic illumination To, or by the image that shoots preceding camera carry out graphical analysis to obtain the direction of illumination of outside.
Alternatively, the use condition of face verification mode also includes the ornaments condition of user, and environmental information also includes user Whether the information of ornaments is worn, wherein, acquiring unit carries out graphical analysis to obtain use by the image for shooting preceding camera Whether the information of ornaments is worn in family.
Alternatively, when the verification mode preferentially used is face verification mode, and environmental information is unsatisfactory for what is preferentially used During the use condition of verification mode, authentication unit is compensated to external environment condition in the following manner:By adjusting the bright of screen The flash lamp of degree or unlatching camera compensates come the intensity of illumination to external environment condition.
Alternatively, the use condition of iris verification mode includes distance condition and angle conditions, and environmental information includes user Angle information between information and the iris and camera of user of iris and the distance between camera.
Alternatively, authentication unit comes to determine the preferential of authentication according to the scene type of authentication in the following manner The verification mode used:The level of security of authentication is determined according to the scene type of authentication;According to the peace of authentication Full rank determines the verification mode preferentially used.
Alternatively, the scene type include it is following at least one:Including e-payment scene, unlocking screen scene and step on Record scene.
Alternatively, the level of security of different scenes type puts in order from high to low by following:E-payment scene, login Scene and unlocking screen scene.
Alternatively, it is determined that preferentially use verification mode the step of in, the authentication higher for level of security The level of security of the verification mode preferentially used is higher, the preferential authentication used of the authentication lower for level of security The verifying speed of formula is faster.
Alternatively, when carrying out authentication failure using the verification mode determined, authentication unit makes a reservation for test using second Other verification modes with the level of security identical of the verification mode of the determination are carried out authentication by card mode.
Alternatively, the verification mode of the determination is one or more verification modes.
A kind of computer-readable recording medium is provided according to another aspect of the present invention, and the computer-readable recording medium is deposited Contain the programmed instruction for the method for causing computing device authentication as described above when being executed by a processor.
A kind of computing device is provided according to another aspect of the present invention, and the computing device includes:Processor;Memory, is used In storage when the programmed instruction for being executed by processor the method for causing computing device authentication as described above.
The method and apparatus of authentication, obtains the parameter of authentication, according to identity according to an embodiment of the invention The parameter of checking automatically determines optimal verification mode, and verification mode is no longer single.In addition, include environmental information in parameter, or , can be according to environmental information or according to environmental information and scene type come automatic when person includes environmental information and scene type Selection is adapted to the verification mode of environmental information and scene type, improves the security and efficiency of authentication.
By in following description partly illustrate the present invention it is other in terms of and/or advantage, some is by retouching State and will be apparent, or can be learnt by implementation of the invention.
Brief description of the drawings
By the detailed description carried out below in conjunction with the accompanying drawings, above and other objects of the present invention, feature and advantage will Become more fully apparent, wherein:
Fig. 1 is the flow chart for the method for showing authentication according to an embodiment of the invention;
Fig. 2 is flow chart the step of showing to determine verification mode according to an embodiment of the invention;
Fig. 3 is the block diagram for the equipment for showing authentication according to an embodiment of the invention.
Embodiment
Embodiments of the invention are described in detail with reference to the accompanying drawings.
Fig. 1 is the flow chart for the method for showing authentication according to an embodiment of the invention.According to the implementation of the present invention The method of authentication of example can be applied to various electronic equipments, for example, mobile communication terminal, personal computer, tablet personal computer, Game machine, digital multimedia player etc..
In step S10, when receiving authentication request, the parameter information of authentication is obtained.
In the case where needing authentication, such as unlocking screen, some applications of login, unlatching secret file or progress The situation of e-payment, will receive authentication request.
The parameter information of authentication is the information related to authentication.For example, the parameter information of authentication can be wrapped Include environmental information and/or scene type.Environmental information may include it is following at least one:Intensity of illumination, direction of illumination, environment are made an uproar Whether sound, user wear the distance between the information of ornaments, the iris of user and camera information and iris and the shooting of user Angle information between head etc..Below scene type at least one:Including e-payment scene, unlocking screen scene and login field Scape.
In step S20, the verification mode for authentication is determined according to the parameter information of acquisition.
Verification mode can be the various modes that can verify that identity.For example, verification mode may include it is following at least one:Rainbow Film verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern authentication Formula, digital verification mode, nine grids verification mode and signature verification mode.
The detailed process for the step of describing to determine verification mode hereinafter with reference to Fig. 2.
Fig. 2 is flow chart the step of showing to determine verification mode according to an embodiment of the invention.
In step S201, it is determined that the verification mode preferentially used.The verification mode preferentially used can be one or more.
Multiple verification modes with priority level can be prestored, the verification mode preferentially used is the plurality of authentication The verification mode preferentially used in formula.Here, multiple checkings of identical priority level can be set for all authentications Mode, also can just set multiple verification modes of different priority levels to different authentications.
In addition, the preferential verification mode used of authentication can be determined according to the scene type of authentication.Here, may be used Authentication for different scenes type sets the different preferential verification modes used.
For example, the level of security that can be verified according to different scenes identity determine authentication it is preferential use test Card mode.That is, first determining the level of security of authentication according to the scene type of authentication;Further according to authentication Level of security determine the verification mode that preferentially uses.The level of security of different scenes type by it is following put in order by height to It is low:E-payment scene, login scene and unlocking screen scene.The preferential of the authentication higher for level of security uses The level of security of verification mode is higher, the checking speed of the preferential verification mode used of the authentication lower for level of security Degree is faster.For example, the authentication for the higher e-payment scene of level of security can test the higher iris of level of security Card mode is used as the verification mode preferentially used.For another example, the authentication for the relatively low unlocking screen scene of level of security can It regard the faster face verification mode of verifying speed as the verification mode preferentially used.Here, the safe level of various verification modes Other and verifying speed can be set in advance.
In step S202, determine whether environmental information meets the use condition of the verification mode preferentially used.That is, Environmental information is contrasted with the use condition.Here, for different verification modes, its use condition difference is, it is necessary to right The environmental information of ratio is also differed.
For example, the use condition of face verification mode includes intensity of illumination condition and direction of illumination condition, it is necessary to contrast Environmental information includes outside intensity of illumination and outside direction of illumination.It can obtain outside by light sensor or camera Intensity of illumination.High dynamic illumination can be carried out by preceding camera to render detection to obtain the direction of illumination of outside, or is passed through The image that preceding camera is shot is carried out graphical analysis to obtain the direction of illumination of outside.
The use condition of face verification mode may also include the ornaments condition of user, it is necessary to which the environmental information of contrast can also be wrapped Include the information whether user wears ornaments.Here ornaments refer to the ornaments that influence is produced on face verification, such as to face Area covers larger ornaments (such as glasses, cap).Can be carried out by the image that is shot to preceding camera graphical analysis come Obtain the information whether user wears ornaments.
For example, the use condition of iris verification mode may include distance condition and angle conditions, it is necessary to the environment letter of contrast Breath may include the angle information between the distance between the iris and camera of user information and the iris and camera of user.Can The range information and angle information are obtained by camera.
For example, the use condition of speech verification mode may include noise intensity, it is necessary to which the environmental information of contrast may include outside The noise intensity in portion.
When the verification mode preferentially used is face verification mode, and environmental information is unsatisfactory for the verification mode that preferentially uses Use condition when, external environment condition is compensated in the following manner:By adjusting the brightness of screen or opening camera Flash lamp compensated come the intensity of illumination to external environment condition.
When environmental information meets the use condition of the verification mode preferentially used, step S203 is performed, will preferentially be used Verification mode be defined as verification mode for authentication.
When the use condition for the verification mode that environmental information is unsatisfactory for preferentially using, step S204 is performed, to external rings Border is compensated.For different verification modes, it can come to compensate external environment condition in different ways.For example, when excellent The verification mode first used is face verification mode, and external environment condition is compensated in the following manner:By adjusting screen The flash lamp of brightness or unlatching camera compensates come the intensity of illumination to external environment condition.
In step S205, it is determined that whether the environmental information of the external environment condition after compensation meets the verification mode that preferentially uses Use condition.
When the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used, step is performed Rapid S203, the verification mode for authentication is defined as by the verification mode preferentially used;External environment condition after compensation When environmental information is unsatisfactory for the use condition of the verification mode preferentially used, step S206 is performed, by the first predetermined authentication mode Or be defined as being used for authentication by other verification modes with the level of security identical of the verification mode preferentially used Verification mode.
Here, can be in all verification modes preferentially used in the case where the verification mode preferentially used is multiple Use condition do not compensated after the environmental information of external environment condition when meeting, just perform step S206, or preferential in part The use condition of the verification mode used do not compensated after the environmental information of external environment condition when meeting, also perform step S206. , can pin when the preferential verification mode used met in the environmental information of the external environment condition after use condition is not compensated is multiple To each preferential verification mode used, perform a step S206, that is to say, that for it is described each preferentially use Verification mode, by the first predetermined authentication mode corresponding with the verification mode or will be identical with the level of security of the verification mode Other verification modes replace the verification mode, and be used as and be used for the verification mode of authentication;Or all can preferentially use Verification mode, perform a step S206, that is to say, that it is pre- by first for all verification modes preferentially used Determine verification mode or replace other verification modes with the level of security identical of all verification modes preferentially used All verification modes preferentially used, and it is used as the verification mode for authentication.
In addition, in addition to it can determine verification mode according to the step shown in Fig. 2, can also be directly true according to scene type Surely it is used for the verification mode of authentication.Here, different verification modes can be set for the authentication of different scenes type. For example, the verification mode of authentication can be determined according to the level of security of different scenes identity checking.That is, first The level of security of authentication is determined according to the scene type of authentication;Checking is determined further according to the level of security of authentication Mode.The level of security of the verification mode of the authentication higher for level of security is higher, the body lower for level of security The verifying speed of the verification mode of part checking is faster.For example, for the authentication of the higher e-payment scene of level of security Can using the higher iris verification mode of level of security as determination verification mode.For another example, for the relatively low screen of level of security Unlock scene authentication can using the faster face verification mode of verifying speed as determination verification mode.Here, it is various The level of security and verifying speed of verification mode can be set in advance.
In step S30, authentication is carried out using the verification mode of determination.Here, it is determined that verification mode can be one Plant or a variety of verification modes.That is, it is determined that verification mode be a variety of verification modes when, it is possible to provide a variety of verification modes Authentication is carried out for user, user can carry out authentication using any one or more verification mode, be used as user When verification mode is not by authentication, user can be pointed out to be tested using other verification modes in the verification mode determined Card.
In addition, when the verification mode progress authentication using all determinations all fails, can also make a reservation for using second Other verification modes with the level of security identical of the verification mode of the determination are carried out authentication by verification mode.Example Such as, it is determined that verification mode be face verification mode in the case of, using face verification mode carry out authentication when, such as If fruit user has cosmetic, may result in can use iris verification mode (the second predetermined authentication after authentication failed, authentication failed Mode) carry out authentication.
Fig. 3 is the block diagram for the equipment for showing authentication according to an embodiment of the invention.Embodiments in accordance with the present invention The equipment of authentication can be various electronic equipments, for example, mobile communication terminal, personal computer, tablet personal computer, game Machine, digital multimedia player etc..Reference picture 3, according to an embodiment of the invention the equipment of authentication include acquiring unit 10th, determining unit 20 and authentication unit 30.
Acquiring unit 30 obtains the parameter information of authentication when receiving authentication request.
In the case where needing authentication, such as unlocking screen, some applications of login, unlatching secret file or progress The situation of e-payment, will receive authentication request.
The parameter information of authentication is the information related to authentication.For example, the parameter information of authentication can be wrapped Include environmental information and/or scene type.Environmental information may include it is following at least one:Intensity of illumination, direction of illumination, environment are made an uproar Whether sound, user wear the distance between the information of ornaments, the iris of user and camera information and iris and the shooting of user Angle information between head etc..Below scene type at least one:Including e-payment scene, unlocking screen scene and login field Scape.
Determining unit 20 determines the verification mode for authentication according to the parameter information of acquisition.
Verification mode can be the various modes that can verify that identity.For example, verification mode may include it is following at least one:Rainbow Film verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern authentication Formula, digital verification mode, nine grids verification mode and signature verification mode.
The detailed process for the step of determining unit 20 determines verification mode can refer to the step of the determination verification mode of Fig. 2 descriptions Rapid detailed process, or can refer to and above-mentioned the specific of the verification mode for authentication is directly determined according to scene type Process.
Authentication unit 30 carries out authentication using the verification mode determined.Here, it is determined that verification mode can be one Plant or a variety of verification modes.It is determined that verification mode be a variety of verification modes when, it is possible to provide a variety of verification modes are entered for user Row authentication, user can carry out authentication using any one or more verification mode, the verification mode used as user When not by authentication, user can be pointed out to be verified using other verification modes in the verification mode determined.
In addition, when the verification mode progress authentication using all determinations all fails, authentication unit 30 can also be used Other verification modes with the level of security identical of the verification mode of the determination are carried out body by the second predetermined authentication mode Part certification.For example, it is determined that verification mode be face verification mode in the case of, identity is being carried out using face verification mode During checking, if user has cosmetic, may result in after authentication failed, authentication failed can be using iris verification mode (the Two predetermined authentication modes) carry out authentication.
The method and apparatus of authentication, obtains the parameter of authentication, according to identity according to an embodiment of the invention The parameter of checking automatically determines optimal verification mode, and verification mode is no longer single.In addition, include environmental information in parameter, or , can be according to environmental information or according to environmental information and scene type come automatic when person includes environmental information and scene type Selection is adapted to the verification mode of environmental information and scene type, improves the security and efficiency of authentication.
Embodiments in accordance with the present invention also provide a kind of computer-readable recording medium.The computer-readable recording medium is deposited Contain the programmed instruction for the method for causing computing device authentication as described above when being executed by a processor.The computer Readable medium recording program performing is can to store the arbitrary data storage device of the data read by computer system.Computer-readable record is situated between The example of matter includes:Read-only storage, random access memory, read-only optical disc, tape, floppy disk, optical data storage devices and load Ripple (data transfer for such as passing through internet through wired or wireless transmission path).Computer readable recording medium storing program for performing also can be distributed in The computer system of network is connected, so that computer-readable code is stored and performed in a distributed manner.In addition, completing the work(of the present invention Can program, code and code segment can easily by the ordinary programmers in field related to the present invention within the scope of the present invention Explain.
Embodiments in accordance with the present invention also provide a kind of computing device.The computing device includes processor and memory.Deposit Reservoir is instructed for storage program.Described program instruction is executed by processor so that computing device authentication as described above Method programmed instruction.
In addition, according to an embodiment of the invention each program module in the equipment of authentication can completely by hardware Lai Realize, such as field programmable gate array or application specific integrated circuit;The mode that can also be combined by hardware and software is realized; It can also be realized completely by computer program with software mode.
Although being particularly shown and describing the present invention, those skilled in the art with reference to its exemplary embodiment It should be understood that in the case where not departing from the spirit and scope of the present invention that claim is limited, form can be carried out to it With the various changes in details.

Claims (36)

1. a kind of method of authentication, it is characterised in that including:
When receiving authentication request, the parameter information of authentication is obtained;
Verification mode for authentication is determined according to the parameter information of acquisition;
Authentication is carried out using the verification mode of determination.
2. according to the method described in claim 1, it is characterised in that the parameter information includes environmental information,
Wherein, the step of determining the verification mode for authentication according to the parameter information of acquisition includes:When environmental information is full During the use condition for the verification mode that foot is preferentially used, the verification mode preferentially used is defined as authentication Verification mode, wherein, the verification mode that preferentially uses is preferential in the multiple verification modes with priority level prestored The verification mode used.
3. according to the method described in claim 1, it is characterised in that the parameter information includes environmental information and scene type,
Wherein, the step of determining the verification mode for authentication according to the parameter information of acquisition includes:
The preferential verification mode used of authentication is determined according to the scene type of authentication;
Determine whether environmental information meets the use condition of the verification mode preferentially used;
When environmental information meets the use condition of the verification mode preferentially used, the verification mode preferentially used is defined as to use In the verification mode of authentication.
4. according to the method in claim 2 or 3, it is characterised in that when environmental information is unsatisfactory for the authentication that preferentially uses During the use condition of formula, external environment condition is compensated,
It is determined that whether the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used;
When the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used, will preferentially it use Verification mode be defined as verification mode for authentication;
It is pre- by first when the use condition for the verification mode that the environmental information of the external environment condition after compensation is unsatisfactory for preferentially using Determine verification mode or be defined as using by other verification modes with the level of security identical of the verification mode preferentially used In the verification mode of authentication.
5. according to any described method of claims 1 to 3, it is characterised in that the verification mode include it is following at least one: Iris verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern is verified Mode, digital verification mode, nine grids verification mode and signature verification mode.
6. method according to claim 5, it is characterised in that the use condition of face verification mode includes intensity of illumination bar Part and direction of illumination condition, environmental information include outside intensity of illumination and outside direction of illumination.
7. method according to claim 6, it is characterised in that pass through the light outside light sensor or camera acquisition According to intensity.
8. method according to claim 6, it is characterised in that by preceding camera carry out high dynamic illumination render detection come Direction of illumination outside obtaining, or carry out graphical analysis to obtain the illumination side of outside by the image for shooting preceding camera To.
9. method according to claim 6, it is characterised in that the use condition of face verification mode also includes the decorations of user Product condition, environmental information also includes the information whether user wears ornaments, wherein, carried out by the image shot to preceding camera Graphical analysis obtains the information whether user wears ornaments.
10. method according to claim 4, it is characterised in that when the verification mode preferentially used is face verification mode, And during the use condition of the environmental information verification mode that is unsatisfactory for preferentially using, external environment condition is mended in the following manner Repay:Compensated by the brightness for adjusting screen or the flash lamp for opening camera come the intensity of illumination to external environment condition.
11. method according to claim 5, it is characterised in that the use condition of iris verification mode includes distance condition And angle conditions, the iris and camera of the distance between the iris of environmental information including user and camera information and user it Between angle information.
12. method according to claim 3, it is characterised in that authentication is determined according to the scene type of authentication It is preferential use verification mode the step of include:
The level of security of authentication is determined according to the scene type of authentication;
The verification mode for determining preferentially to use according to the level of security of authentication.
13. method according to claim 12, it is characterised in that the scene type include it is following at least one:Including E-payment scene, unlocking screen scene and login scene.
14. method according to claim 13, it is characterised in that the level of security of different scenes type is suitable by following arrangement Sequence is from high to low:E-payment scene, login scene and unlocking screen scene.
15. method according to claim 14, it is characterised in that it is determined that preferentially use verification mode the step of in, The level of security of the preferential verification mode used of the authentication higher for level of security is higher, lower for level of security Authentication the preferential verification mode used verifying speed it is faster.
16. according to the method described in claim 1, it is characterised in that also include:When using the verification mode progress identity determined During authentication failed, using the second predetermined authentication mode or by with the level of security identical of the verification mode of the determination other Verification mode carries out authentication.
17. according to the method described in claim 1, it is characterised in that the verification mode of the determination is verified to be one or more Mode.
18. a kind of equipment of authentication, it is characterised in that including:
Acquiring unit, when receiving authentication request, obtains the parameter information of authentication;
Determining unit, the verification mode for authentication is determined according to the parameter information of acquisition;
Authentication unit, authentication is carried out using the verification mode of determination.
19. equipment according to claim 18, it is characterised in that the parameter information includes environmental information,
Wherein it is determined that unit is preferentially used when environmental information meets the use condition of the verification mode preferentially used by described Verification mode be defined as verification mode for authentication, wherein, the verification mode preferentially used is the tool prestored The verification mode preferentially used in the multiple verification modes for having priority level.
20. equipment according to claim 18, it is characterised in that the parameter information includes environmental information and scene class Type,
Wherein, authentication unit determines the preferential verification mode used of authentication according to the scene type of authentication, it is determined that Whether environmental information meets the use condition of the verification mode preferentially used,
When environmental information meets the use condition of the verification mode preferentially used, the verification mode preferentially used is defined as to use In the verification mode of authentication.
21. the equipment according to claim 19 or 20, it is characterised in that authentication unit is unsatisfactory for preferentially making when environmental information During the use condition of verification mode, external environment condition is compensated, it is determined that the environmental information of the external environment condition after compensation is The no use condition for meeting the verification mode preferentially used, the environmental information of external environment condition after compensation meets what is preferentially used During the use condition of verification mode, the verification mode preferentially used is defined as the verification mode for authentication,
It is pre- by first when the use condition for the verification mode that the environmental information of the external environment condition after compensation is unsatisfactory for preferentially using Determine verification mode or be defined as using by other verification modes with the level of security identical of the verification mode preferentially used In the verification mode of authentication.
22. according to any described equipment of claim 18 to 20, it is characterised in that the verification mode includes following at least one It is individual:Iris verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern Verification mode, digital verification mode, nine grids verification mode and signature verification mode.
23. equipment according to claim 22, it is characterised in that the use condition of face verification mode includes intensity of illumination Condition and direction of illumination condition, environmental information include outside intensity of illumination and outside direction of illumination.
24. equipment according to claim 23, it is characterised in that acquiring unit is obtained by light sensor or camera Take the intensity of illumination of outside.
25. equipment according to claim 23, it is characterised in that acquiring unit carries out high dynamic illumination by preceding camera Detection is rendered to obtain the direction of illumination of outside, or graphical analysis is carried out come outside obtaining by the image shot to preceding camera The direction of illumination in portion.
26. equipment according to claim 23, it is characterised in that the use condition of face verification mode also includes user's Ornaments condition, environmental information also includes the information whether user wears ornaments, wherein, acquiring unit to preceding camera by shooting Image carry out graphical analysis and obtain the information whether user wears ornaments.
27. equipment according to claim 21, it is characterised in that when the verification mode preferentially used is face verification side Formula, and during the use condition of the environmental information verification mode that is unsatisfactory for preferentially using, authentication unit is in the following manner to outside Environment is compensated:Entered by the brightness for adjusting screen or the flash lamp for opening camera come the intensity of illumination to external environment condition Row compensation.
28. equipment according to claim 22, it is characterised in that the use condition of iris verification mode includes distance condition And angle conditions, the iris and camera of the distance between the iris of environmental information including user and camera information and user it Between angle information.
29. equipment according to claim 20, it is characterised in that authentication unit comes according to authentication in the following manner Scene type determine the preferential verification mode used of authentication:
The level of security of authentication is determined according to the scene type of authentication;
The verification mode for determining preferentially to use according to the level of security of authentication.
30. equipment according to claim 29, it is characterised in that the scene type include it is following at least one:Including E-payment scene, unlocking screen scene and login scene.
31. equipment according to claim 30, it is characterised in that the level of security of different scenes type is suitable by following arrangement Sequence is from high to low:E-payment scene, login scene and unlocking screen scene.
32. equipment according to claim 31, it is characterised in that it is determined that preferentially use verification mode the step of in, The level of security of the preferential verification mode used of the authentication higher for level of security is higher, lower for level of security Authentication the preferential verification mode used verifying speed it is faster.
33. equipment according to claim 18, it is characterised in that when using the verification mode progress authentication mistake determined When losing, authentication unit using the second predetermined authentication mode or by with the level of security identical of the verification mode of the determination its He carries out authentication at verification mode.
34. equipment according to claim 19, it is characterised in that the verification mode of the determination is verified to be one or more Mode.
35. a kind of computer-readable recording medium, is stored with and causes computing device such as claim 1 when being executed by a processor The programmed instruction of the method for the authentication described in any one into 17.
36. a kind of computing device, including:
Processor;
Memory, any one institute caused in computing device such as claim 1 to 17 is executed by processor for storing to work as The programmed instruction of the method for the authentication stated.
CN201710523271.9A 2017-06-30 2017-06-30 A kind of method and apparatus of authentication Pending CN107172084A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710523271.9A CN107172084A (en) 2017-06-30 2017-06-30 A kind of method and apparatus of authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710523271.9A CN107172084A (en) 2017-06-30 2017-06-30 A kind of method and apparatus of authentication

Publications (1)

Publication Number Publication Date
CN107172084A true CN107172084A (en) 2017-09-15

Family

ID=59827872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710523271.9A Pending CN107172084A (en) 2017-06-30 2017-06-30 A kind of method and apparatus of authentication

Country Status (1)

Country Link
CN (1) CN107172084A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal
CN108173864A (en) * 2017-12-29 2018-06-15 咪咕文化科技有限公司 A kind of Information Authentication mode method of adjustment and device and storage medium
CN108337253A (en) * 2018-01-29 2018-07-27 苏州南尔材料科技有限公司 A kind of computer based intelligent electrical appliance control
CN108427873A (en) * 2018-02-12 2018-08-21 维沃移动通信有限公司 A kind of biological feather recognition method and mobile terminal
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium
CN108718372A (en) * 2018-04-12 2018-10-30 Oppo广东移动通信有限公司 Image processing apparatus, method, electronic equipment and storage medium
CN108830081A (en) * 2018-06-14 2018-11-16 安徽鼎龙网络传媒有限公司 A kind of virtual lock emergency feedback system on micro- scene backstage
CN108875352A (en) * 2018-06-26 2018-11-23 维沃移动通信有限公司 Verification method, device and the mobile terminal of user identity
CN109409044A (en) * 2018-09-19 2019-03-01 维沃移动通信有限公司 A kind of verifying interface display method and terminal
CN109618314A (en) * 2018-11-19 2019-04-12 中国地质大学(武汉) A kind of expansible identity identifying method based on environment sensing and bio-identification
CN110532744A (en) * 2019-07-22 2019-12-03 平安科技(深圳)有限公司 Face login method, device, computer equipment and storage medium
CN111352390A (en) * 2020-03-03 2020-06-30 马鞍山职业技术学院 Visual intelligent robot control system based on real-time analysis
CN111445604A (en) * 2020-04-03 2020-07-24 深圳市阿尔垎智能科技有限公司 Intelligent door and door lock opening method
CN112466025A (en) * 2020-11-24 2021-03-09 安徽三人信息科技有限公司 Access control method and access control device based on identity authentication
CN112562147A (en) * 2020-12-01 2021-03-26 安徽三人信息科技有限公司 Access control user identity recognition method, device and system
CN112671707A (en) * 2020-11-25 2021-04-16 紫光云技术有限公司 Multi-factor fusion authentication identity recognition model based on JWT (just-in-the-word)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761463A (en) * 2014-01-13 2014-04-30 联想(北京)有限公司 Information processing method and electronic device
CN105590045A (en) * 2015-09-14 2016-05-18 ***股份有限公司 Environmental self-adaptation identity authentication method and terminal
CN105868611A (en) * 2016-05-04 2016-08-17 广东欧珀移动通信有限公司 Biological-information authentication method and device and mobile terminal
US9432193B1 (en) * 2015-02-05 2016-08-30 Sensory, Incorporated Face-based authentication with situational adaptivity
CN106372483A (en) * 2016-08-31 2017-02-01 厦门中控生物识别信息技术有限公司 Information verification method and system
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761463A (en) * 2014-01-13 2014-04-30 联想(北京)有限公司 Information processing method and electronic device
US9432193B1 (en) * 2015-02-05 2016-08-30 Sensory, Incorporated Face-based authentication with situational adaptivity
CN105590045A (en) * 2015-09-14 2016-05-18 ***股份有限公司 Environmental self-adaptation identity authentication method and terminal
CN105868611A (en) * 2016-05-04 2016-08-17 广东欧珀移动通信有限公司 Biological-information authentication method and device and mobile terminal
CN106372483A (en) * 2016-08-31 2017-02-01 厦门中控生物识别信息技术有限公司 Information verification method and system
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal
CN108173864B (en) * 2017-12-29 2020-12-15 咪咕文化科技有限公司 Information verification mode adjusting method and device and storage medium
CN108173864A (en) * 2017-12-29 2018-06-15 咪咕文化科技有限公司 A kind of Information Authentication mode method of adjustment and device and storage medium
CN108337253A (en) * 2018-01-29 2018-07-27 苏州南尔材料科技有限公司 A kind of computer based intelligent electrical appliance control
CN108427873A (en) * 2018-02-12 2018-08-21 维沃移动通信有限公司 A kind of biological feather recognition method and mobile terminal
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium
CN108718372A (en) * 2018-04-12 2018-10-30 Oppo广东移动通信有限公司 Image processing apparatus, method, electronic equipment and storage medium
CN108718372B (en) * 2018-04-12 2021-03-26 Oppo广东移动通信有限公司 Image processing apparatus, image processing method, electronic device, and storage medium
CN108830081A (en) * 2018-06-14 2018-11-16 安徽鼎龙网络传媒有限公司 A kind of virtual lock emergency feedback system on micro- scene backstage
CN108875352A (en) * 2018-06-26 2018-11-23 维沃移动通信有限公司 Verification method, device and the mobile terminal of user identity
CN108875352B (en) * 2018-06-26 2020-09-01 维沃移动通信有限公司 User identity verification method and device and mobile terminal
CN109409044A (en) * 2018-09-19 2019-03-01 维沃移动通信有限公司 A kind of verifying interface display method and terminal
CN109618314A (en) * 2018-11-19 2019-04-12 中国地质大学(武汉) A kind of expansible identity identifying method based on environment sensing and bio-identification
CN109618314B (en) * 2018-11-19 2020-02-14 中国地质大学(武汉) Extensible identity authentication method based on environmental perception and biological recognition
CN110532744A (en) * 2019-07-22 2019-12-03 平安科技(深圳)有限公司 Face login method, device, computer equipment and storage medium
CN111352390A (en) * 2020-03-03 2020-06-30 马鞍山职业技术学院 Visual intelligent robot control system based on real-time analysis
CN111445604A (en) * 2020-04-03 2020-07-24 深圳市阿尔垎智能科技有限公司 Intelligent door and door lock opening method
CN112466025A (en) * 2020-11-24 2021-03-09 安徽三人信息科技有限公司 Access control method and access control device based on identity authentication
CN112671707A (en) * 2020-11-25 2021-04-16 紫光云技术有限公司 Multi-factor fusion authentication identity recognition model based on JWT (just-in-the-word)
CN112562147A (en) * 2020-12-01 2021-03-26 安徽三人信息科技有限公司 Access control user identity recognition method, device and system

Similar Documents

Publication Publication Date Title
CN107172084A (en) A kind of method and apparatus of authentication
US9773180B2 (en) Online pseudonym verification and identity validation
CN109117700A (en) Face authentication method and apparatus
TWI701605B (en) Living body detection method, device and computer readable storage medium
US20160019420A1 (en) Multispectral eye analysis for identity authentication
US20160019421A1 (en) Multispectral eye analysis for identity authentication
US20170091550A1 (en) Multispectral eye analysis for identity authentication
CN110069970A (en) Activity test method and equipment
CN100585616C (en) Authentication apparatus and authentication method
CN113557427A (en) Electronic device valuation system
CN107316029B (en) A kind of living body verification method and equipment
CN109033942A (en) Authentication device and authentication method
CN109389153A (en) A kind of holographic false proof code check method and device
Kim et al. A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system
GB2544915A (en) Online pseudonym verification and identity validation
CN108875338A (en) unlocking method, device and system and storage medium
CN108875484A (en) Face unlocking method, device and system and storage medium for mobile terminal
CN109213610A (en) Data processing method, device, computer readable storage medium and electronic equipment
CN109034029A (en) Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body
CN113240673A (en) Defect detection method, defect detection device, electronic equipment and storage medium
CN108985255A (en) Data processing method, device, computer readable storage medium and electronic equipment
Goicoechea-Telleria et al. An evaluation of presentation attack detection of fingerprint biometric systems applying ISO/IEC 30107-3
US9508006B2 (en) System and method for identifying trees
JP7269897B2 (en) Data registration device, biometric authentication device, and data registration program
CN109952593A (en) Organism authentication apparatus and organism authentication program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915

RJ01 Rejection of invention patent application after publication