CN107172084A - A kind of method and apparatus of authentication - Google Patents
A kind of method and apparatus of authentication Download PDFInfo
- Publication number
- CN107172084A CN107172084A CN201710523271.9A CN201710523271A CN107172084A CN 107172084 A CN107172084 A CN 107172084A CN 201710523271 A CN201710523271 A CN 201710523271A CN 107172084 A CN107172084 A CN 107172084A
- Authority
- CN
- China
- Prior art keywords
- verification mode
- authentication
- verification
- environmental information
- mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention provides a kind of method and apparatus of authentication.Methods described includes:When receiving authentication request, the parameter information of authentication is obtained;Verification mode for authentication is determined according to the parameter information of acquisition;Authentication is carried out using the verification mode of determination.The method and apparatus of authentication, obtains the parameter of authentication, optimal verification mode is automatically determined according to the parameter of authentication, verification mode is no longer single according to an embodiment of the invention.In addition, include environmental information in parameter, or including environmental information and during scene type, the verification mode of suitable environmental information and scene type can be automatically selected according to environmental information or according to environmental information and scene type, the security and efficiency of authentication is improved.
Description
Technical field
The present invention relates to the technical field of safety verification.More particularly, it is related to a kind of method and apparatus of authentication.
Background technology
With the development of electronic technology, electronic equipment (such as mobile communication terminal, personal computer, tablet personal computer, game
Machine or digital multimedia player etc.) more and more important role is play in the life of people.In user in electronic equipment
During middle progress various activities, for the purpose of safety, it is often necessary to carry out authentication.The mode of authentication is carried out at present
It is no longer confined to traditional mode (for example:Pattern verification mode, digital verification mode and nine grids verification mode etc.), it is various advanced
Authentication mode (such as iris verification mode, face verification mode, fingerprint authentication mode and speech verification mode)
Applied in the electronic device.At present, most electronic equipment in different authentications using acquiescence or by
The authentication mode that user is set, verification mode is single.
The content of the invention
It is single to solve existing verification mode it is an object of the invention to provide a kind of method and apparatus of authentication
The problem of.
An aspect of of the present present invention provides a kind of method of authentication, and this method includes:Receiving authentication request
When, obtain the parameter information of authentication;Verification mode for authentication is determined according to the parameter information of acquisition;Using true
Fixed verification mode carries out authentication.
Alternatively, the parameter information includes environmental information, wherein, determine to test for identity according to the parameter information of acquisition
The step of verification mode of card, includes:, will be described excellent when environmental information meets the use condition of the verification mode preferentially used
The verification mode first used is defined as the verification mode for authentication, wherein, the verification mode preferentially used is pre-
The verification mode preferentially used in the multiple verification modes with priority level deposited.
Alternatively, the parameter information includes environmental information and scene type, wherein, determined according to the parameter information of acquisition
The step of verification mode for authentication, includes:Determine that the preferential of authentication uses according to the scene type of authentication
Verification mode;Determine whether environmental information meets the use condition of the verification mode preferentially used;When environmental information meets excellent
During the use condition of the verification mode first used, the verification mode preferentially used is defined as the authentication for authentication
Formula.
Alternatively, during the use condition for the verification mode for being unsatisfactory for preferentially using when environmental information, external environment condition is carried out
Compensation, it is determined that whether the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used;Work as benefit
When the environmental information of external environment condition after repaying meets the use condition of the verification mode preferentially used, by the authentication preferentially used
Formula is defined as the verification mode for authentication;What the environmental information of external environment condition after compensation was unsatisfactory for preferentially using tests
During the use condition of card mode, by the first predetermined authentication mode or by the level of security with the verification mode preferentially used
Other verification modes of identical are defined as the verification mode for authentication.
Alternatively, the verification mode include it is following at least one:Iris verification mode, face verification mode, fingerprint inspection
Card mode and speech verification mode and following at least zero:Pattern verification mode, digital verification mode, nine grids verification mode
With signature verification mode.
Alternatively, the use condition of face verification mode includes intensity of illumination condition and direction of illumination condition, environmental information
Including outside intensity of illumination and outside direction of illumination.
Alternatively, the intensity of illumination outside light sensor or camera acquisition is passed through.
Alternatively, render detection to obtain the direction of illumination of outside, Huo Zhetong by preceding camera progress high dynamic illumination
Cross and the image that preceding camera is shot is carried out graphical analysis to obtain the direction of illumination of outside.
Alternatively, the use condition of face verification mode also includes the ornaments condition of user, and environmental information also includes user
Whether the information of ornaments is worn, wherein, carry out graphical analysis to obtain whether user wears by the image for shooting preceding camera
The information of wearing jewelry.
Alternatively, when the verification mode preferentially used is face verification mode, and environmental information is unsatisfactory for what is preferentially used
During the use condition of verification mode, external environment condition is compensated in the following manner:By adjusting the brightness of screen or opening
The flash lamp of camera is opened to compensate come the intensity of illumination to external environment condition.
Alternatively, the use condition of iris verification mode includes distance condition and angle conditions, and environmental information includes user
Angle information between information and the iris and camera of user of iris and the distance between camera.
Alternatively, according to the scene type of authentication determine authentication it is preferential use verification mode the step of wrap
Include:The level of security of authentication is determined according to the scene type of authentication;Determined according to the level of security of authentication excellent
The verification mode first used.
Alternatively, the scene type include it is following at least one:Including e-payment scene, unlocking screen scene and step on
Record scene.
Alternatively, the level of security of different scenes type puts in order from high to low by following:E-payment scene, login
Scene and unlocking screen scene.
Alternatively, it is determined that preferentially use verification mode the step of in, the authentication higher for level of security
The level of security of the verification mode preferentially used is higher, the preferential authentication used of the authentication lower for level of security
The verifying speed of formula is faster.
Alternatively, in addition to:When carrying out authentication failure using the verification mode determined, using the second predetermined authentication
Other verification modes with the level of security identical of the verification mode of the determination are carried out authentication by mode.
Alternatively, the verification mode of the determination is one or more verification modes.
A kind of equipment of authentication is provided according to another aspect of the present invention, and the equipment includes:Acquiring unit, is being received
During to authentication request, the parameter information of authentication is obtained;Determining unit, determines to be used for body according to the parameter information of acquisition
The verification mode of part checking;Authentication unit, authentication is carried out using the verification mode of determination.
Alternatively, the parameter information includes environmental information, wherein it is determined that unit meets what is preferentially used when environmental information
During the use condition of verification mode, the verification mode preferentially used is defined as the verification mode for authentication, its
In, the verification mode that preferentially uses is the authentication preferentially used in the multiple verification modes with priority level prestored
Formula.
Alternatively, the parameter information includes environmental information and scene type, wherein, authentication unit is according to authentication
Scene type determines the preferential verification mode used of authentication, determines whether environmental information meets the authentication preferentially used
The use condition of formula, when environmental information meets the use condition of the verification mode preferentially used, by the authentication preferentially used
Formula is defined as the verification mode for authentication.
Alternatively, authentication unit is when the use condition for the verification mode that environmental information is unsatisfactory for preferentially using, to outside
Environment is compensated, it is determined that the environmental information of the external environment condition after compensation whether meet the verification mode that preferentially uses use bar
Part, when the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used, will preferentially be used
Verification mode be defined as verification mode for authentication, the environmental information of external environment condition after compensation is unsatisfactory for preferentially
During the use condition of the verification mode used, by the first predetermined authentication mode or by with the verification mode preferentially used
Other verification modes of level of security identical are defined as the verification mode for authentication.
Alternatively, the verification mode include it is following at least one:Iris verification mode, face verification mode, fingerprint inspection
Card mode and speech verification mode and following at least zero:Pattern verification mode, digital verification mode, nine grids verification mode
With signature verification mode.
Alternatively, the use condition of face verification mode includes intensity of illumination condition and direction of illumination condition, environmental information
Including outside intensity of illumination and outside direction of illumination.
Alternatively, acquiring unit passes through the intensity of illumination outside light sensor or camera acquisition.
Alternatively, acquiring unit renders detection to obtain the illumination side of outside by preceding camera progress high dynamic illumination
To, or by the image that shoots preceding camera carry out graphical analysis to obtain the direction of illumination of outside.
Alternatively, the use condition of face verification mode also includes the ornaments condition of user, and environmental information also includes user
Whether the information of ornaments is worn, wherein, acquiring unit carries out graphical analysis to obtain use by the image for shooting preceding camera
Whether the information of ornaments is worn in family.
Alternatively, when the verification mode preferentially used is face verification mode, and environmental information is unsatisfactory for what is preferentially used
During the use condition of verification mode, authentication unit is compensated to external environment condition in the following manner:By adjusting the bright of screen
The flash lamp of degree or unlatching camera compensates come the intensity of illumination to external environment condition.
Alternatively, the use condition of iris verification mode includes distance condition and angle conditions, and environmental information includes user
Angle information between information and the iris and camera of user of iris and the distance between camera.
Alternatively, authentication unit comes to determine the preferential of authentication according to the scene type of authentication in the following manner
The verification mode used:The level of security of authentication is determined according to the scene type of authentication;According to the peace of authentication
Full rank determines the verification mode preferentially used.
Alternatively, the scene type include it is following at least one:Including e-payment scene, unlocking screen scene and step on
Record scene.
Alternatively, the level of security of different scenes type puts in order from high to low by following:E-payment scene, login
Scene and unlocking screen scene.
Alternatively, it is determined that preferentially use verification mode the step of in, the authentication higher for level of security
The level of security of the verification mode preferentially used is higher, the preferential authentication used of the authentication lower for level of security
The verifying speed of formula is faster.
Alternatively, when carrying out authentication failure using the verification mode determined, authentication unit makes a reservation for test using second
Other verification modes with the level of security identical of the verification mode of the determination are carried out authentication by card mode.
Alternatively, the verification mode of the determination is one or more verification modes.
A kind of computer-readable recording medium is provided according to another aspect of the present invention, and the computer-readable recording medium is deposited
Contain the programmed instruction for the method for causing computing device authentication as described above when being executed by a processor.
A kind of computing device is provided according to another aspect of the present invention, and the computing device includes:Processor;Memory, is used
In storage when the programmed instruction for being executed by processor the method for causing computing device authentication as described above.
The method and apparatus of authentication, obtains the parameter of authentication, according to identity according to an embodiment of the invention
The parameter of checking automatically determines optimal verification mode, and verification mode is no longer single.In addition, include environmental information in parameter, or
, can be according to environmental information or according to environmental information and scene type come automatic when person includes environmental information and scene type
Selection is adapted to the verification mode of environmental information and scene type, improves the security and efficiency of authentication.
By in following description partly illustrate the present invention it is other in terms of and/or advantage, some is by retouching
State and will be apparent, or can be learnt by implementation of the invention.
Brief description of the drawings
By the detailed description carried out below in conjunction with the accompanying drawings, above and other objects of the present invention, feature and advantage will
Become more fully apparent, wherein:
Fig. 1 is the flow chart for the method for showing authentication according to an embodiment of the invention;
Fig. 2 is flow chart the step of showing to determine verification mode according to an embodiment of the invention;
Fig. 3 is the block diagram for the equipment for showing authentication according to an embodiment of the invention.
Embodiment
Embodiments of the invention are described in detail with reference to the accompanying drawings.
Fig. 1 is the flow chart for the method for showing authentication according to an embodiment of the invention.According to the implementation of the present invention
The method of authentication of example can be applied to various electronic equipments, for example, mobile communication terminal, personal computer, tablet personal computer,
Game machine, digital multimedia player etc..
In step S10, when receiving authentication request, the parameter information of authentication is obtained.
In the case where needing authentication, such as unlocking screen, some applications of login, unlatching secret file or progress
The situation of e-payment, will receive authentication request.
The parameter information of authentication is the information related to authentication.For example, the parameter information of authentication can be wrapped
Include environmental information and/or scene type.Environmental information may include it is following at least one:Intensity of illumination, direction of illumination, environment are made an uproar
Whether sound, user wear the distance between the information of ornaments, the iris of user and camera information and iris and the shooting of user
Angle information between head etc..Below scene type at least one:Including e-payment scene, unlocking screen scene and login field
Scape.
In step S20, the verification mode for authentication is determined according to the parameter information of acquisition.
Verification mode can be the various modes that can verify that identity.For example, verification mode may include it is following at least one:Rainbow
Film verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern authentication
Formula, digital verification mode, nine grids verification mode and signature verification mode.
The detailed process for the step of describing to determine verification mode hereinafter with reference to Fig. 2.
Fig. 2 is flow chart the step of showing to determine verification mode according to an embodiment of the invention.
In step S201, it is determined that the verification mode preferentially used.The verification mode preferentially used can be one or more.
Multiple verification modes with priority level can be prestored, the verification mode preferentially used is the plurality of authentication
The verification mode preferentially used in formula.Here, multiple checkings of identical priority level can be set for all authentications
Mode, also can just set multiple verification modes of different priority levels to different authentications.
In addition, the preferential verification mode used of authentication can be determined according to the scene type of authentication.Here, may be used
Authentication for different scenes type sets the different preferential verification modes used.
For example, the level of security that can be verified according to different scenes identity determine authentication it is preferential use test
Card mode.That is, first determining the level of security of authentication according to the scene type of authentication;Further according to authentication
Level of security determine the verification mode that preferentially uses.The level of security of different scenes type by it is following put in order by height to
It is low:E-payment scene, login scene and unlocking screen scene.The preferential of the authentication higher for level of security uses
The level of security of verification mode is higher, the checking speed of the preferential verification mode used of the authentication lower for level of security
Degree is faster.For example, the authentication for the higher e-payment scene of level of security can test the higher iris of level of security
Card mode is used as the verification mode preferentially used.For another example, the authentication for the relatively low unlocking screen scene of level of security can
It regard the faster face verification mode of verifying speed as the verification mode preferentially used.Here, the safe level of various verification modes
Other and verifying speed can be set in advance.
In step S202, determine whether environmental information meets the use condition of the verification mode preferentially used.That is,
Environmental information is contrasted with the use condition.Here, for different verification modes, its use condition difference is, it is necessary to right
The environmental information of ratio is also differed.
For example, the use condition of face verification mode includes intensity of illumination condition and direction of illumination condition, it is necessary to contrast
Environmental information includes outside intensity of illumination and outside direction of illumination.It can obtain outside by light sensor or camera
Intensity of illumination.High dynamic illumination can be carried out by preceding camera to render detection to obtain the direction of illumination of outside, or is passed through
The image that preceding camera is shot is carried out graphical analysis to obtain the direction of illumination of outside.
The use condition of face verification mode may also include the ornaments condition of user, it is necessary to which the environmental information of contrast can also be wrapped
Include the information whether user wears ornaments.Here ornaments refer to the ornaments that influence is produced on face verification, such as to face
Area covers larger ornaments (such as glasses, cap).Can be carried out by the image that is shot to preceding camera graphical analysis come
Obtain the information whether user wears ornaments.
For example, the use condition of iris verification mode may include distance condition and angle conditions, it is necessary to the environment letter of contrast
Breath may include the angle information between the distance between the iris and camera of user information and the iris and camera of user.Can
The range information and angle information are obtained by camera.
For example, the use condition of speech verification mode may include noise intensity, it is necessary to which the environmental information of contrast may include outside
The noise intensity in portion.
When the verification mode preferentially used is face verification mode, and environmental information is unsatisfactory for the verification mode that preferentially uses
Use condition when, external environment condition is compensated in the following manner:By adjusting the brightness of screen or opening camera
Flash lamp compensated come the intensity of illumination to external environment condition.
When environmental information meets the use condition of the verification mode preferentially used, step S203 is performed, will preferentially be used
Verification mode be defined as verification mode for authentication.
When the use condition for the verification mode that environmental information is unsatisfactory for preferentially using, step S204 is performed, to external rings
Border is compensated.For different verification modes, it can come to compensate external environment condition in different ways.For example, when excellent
The verification mode first used is face verification mode, and external environment condition is compensated in the following manner:By adjusting screen
The flash lamp of brightness or unlatching camera compensates come the intensity of illumination to external environment condition.
In step S205, it is determined that whether the environmental information of the external environment condition after compensation meets the verification mode that preferentially uses
Use condition.
When the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used, step is performed
Rapid S203, the verification mode for authentication is defined as by the verification mode preferentially used;External environment condition after compensation
When environmental information is unsatisfactory for the use condition of the verification mode preferentially used, step S206 is performed, by the first predetermined authentication mode
Or be defined as being used for authentication by other verification modes with the level of security identical of the verification mode preferentially used
Verification mode.
Here, can be in all verification modes preferentially used in the case where the verification mode preferentially used is multiple
Use condition do not compensated after the environmental information of external environment condition when meeting, just perform step S206, or preferential in part
The use condition of the verification mode used do not compensated after the environmental information of external environment condition when meeting, also perform step S206.
, can pin when the preferential verification mode used met in the environmental information of the external environment condition after use condition is not compensated is multiple
To each preferential verification mode used, perform a step S206, that is to say, that for it is described each preferentially use
Verification mode, by the first predetermined authentication mode corresponding with the verification mode or will be identical with the level of security of the verification mode
Other verification modes replace the verification mode, and be used as and be used for the verification mode of authentication;Or all can preferentially use
Verification mode, perform a step S206, that is to say, that it is pre- by first for all verification modes preferentially used
Determine verification mode or replace other verification modes with the level of security identical of all verification modes preferentially used
All verification modes preferentially used, and it is used as the verification mode for authentication.
In addition, in addition to it can determine verification mode according to the step shown in Fig. 2, can also be directly true according to scene type
Surely it is used for the verification mode of authentication.Here, different verification modes can be set for the authentication of different scenes type.
For example, the verification mode of authentication can be determined according to the level of security of different scenes identity checking.That is, first
The level of security of authentication is determined according to the scene type of authentication;Checking is determined further according to the level of security of authentication
Mode.The level of security of the verification mode of the authentication higher for level of security is higher, the body lower for level of security
The verifying speed of the verification mode of part checking is faster.For example, for the authentication of the higher e-payment scene of level of security
Can using the higher iris verification mode of level of security as determination verification mode.For another example, for the relatively low screen of level of security
Unlock scene authentication can using the faster face verification mode of verifying speed as determination verification mode.Here, it is various
The level of security and verifying speed of verification mode can be set in advance.
In step S30, authentication is carried out using the verification mode of determination.Here, it is determined that verification mode can be one
Plant or a variety of verification modes.That is, it is determined that verification mode be a variety of verification modes when, it is possible to provide a variety of verification modes
Authentication is carried out for user, user can carry out authentication using any one or more verification mode, be used as user
When verification mode is not by authentication, user can be pointed out to be tested using other verification modes in the verification mode determined
Card.
In addition, when the verification mode progress authentication using all determinations all fails, can also make a reservation for using second
Other verification modes with the level of security identical of the verification mode of the determination are carried out authentication by verification mode.Example
Such as, it is determined that verification mode be face verification mode in the case of, using face verification mode carry out authentication when, such as
If fruit user has cosmetic, may result in can use iris verification mode (the second predetermined authentication after authentication failed, authentication failed
Mode) carry out authentication.
Fig. 3 is the block diagram for the equipment for showing authentication according to an embodiment of the invention.Embodiments in accordance with the present invention
The equipment of authentication can be various electronic equipments, for example, mobile communication terminal, personal computer, tablet personal computer, game
Machine, digital multimedia player etc..Reference picture 3, according to an embodiment of the invention the equipment of authentication include acquiring unit
10th, determining unit 20 and authentication unit 30.
Acquiring unit 30 obtains the parameter information of authentication when receiving authentication request.
In the case where needing authentication, such as unlocking screen, some applications of login, unlatching secret file or progress
The situation of e-payment, will receive authentication request.
The parameter information of authentication is the information related to authentication.For example, the parameter information of authentication can be wrapped
Include environmental information and/or scene type.Environmental information may include it is following at least one:Intensity of illumination, direction of illumination, environment are made an uproar
Whether sound, user wear the distance between the information of ornaments, the iris of user and camera information and iris and the shooting of user
Angle information between head etc..Below scene type at least one:Including e-payment scene, unlocking screen scene and login field
Scape.
Determining unit 20 determines the verification mode for authentication according to the parameter information of acquisition.
Verification mode can be the various modes that can verify that identity.For example, verification mode may include it is following at least one:Rainbow
Film verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern authentication
Formula, digital verification mode, nine grids verification mode and signature verification mode.
The detailed process for the step of determining unit 20 determines verification mode can refer to the step of the determination verification mode of Fig. 2 descriptions
Rapid detailed process, or can refer to and above-mentioned the specific of the verification mode for authentication is directly determined according to scene type
Process.
Authentication unit 30 carries out authentication using the verification mode determined.Here, it is determined that verification mode can be one
Plant or a variety of verification modes.It is determined that verification mode be a variety of verification modes when, it is possible to provide a variety of verification modes are entered for user
Row authentication, user can carry out authentication using any one or more verification mode, the verification mode used as user
When not by authentication, user can be pointed out to be verified using other verification modes in the verification mode determined.
In addition, when the verification mode progress authentication using all determinations all fails, authentication unit 30 can also be used
Other verification modes with the level of security identical of the verification mode of the determination are carried out body by the second predetermined authentication mode
Part certification.For example, it is determined that verification mode be face verification mode in the case of, identity is being carried out using face verification mode
During checking, if user has cosmetic, may result in after authentication failed, authentication failed can be using iris verification mode (the
Two predetermined authentication modes) carry out authentication.
The method and apparatus of authentication, obtains the parameter of authentication, according to identity according to an embodiment of the invention
The parameter of checking automatically determines optimal verification mode, and verification mode is no longer single.In addition, include environmental information in parameter, or
, can be according to environmental information or according to environmental information and scene type come automatic when person includes environmental information and scene type
Selection is adapted to the verification mode of environmental information and scene type, improves the security and efficiency of authentication.
Embodiments in accordance with the present invention also provide a kind of computer-readable recording medium.The computer-readable recording medium is deposited
Contain the programmed instruction for the method for causing computing device authentication as described above when being executed by a processor.The computer
Readable medium recording program performing is can to store the arbitrary data storage device of the data read by computer system.Computer-readable record is situated between
The example of matter includes:Read-only storage, random access memory, read-only optical disc, tape, floppy disk, optical data storage devices and load
Ripple (data transfer for such as passing through internet through wired or wireless transmission path).Computer readable recording medium storing program for performing also can be distributed in
The computer system of network is connected, so that computer-readable code is stored and performed in a distributed manner.In addition, completing the work(of the present invention
Can program, code and code segment can easily by the ordinary programmers in field related to the present invention within the scope of the present invention
Explain.
Embodiments in accordance with the present invention also provide a kind of computing device.The computing device includes processor and memory.Deposit
Reservoir is instructed for storage program.Described program instruction is executed by processor so that computing device authentication as described above
Method programmed instruction.
In addition, according to an embodiment of the invention each program module in the equipment of authentication can completely by hardware Lai
Realize, such as field programmable gate array or application specific integrated circuit;The mode that can also be combined by hardware and software is realized;
It can also be realized completely by computer program with software mode.
Although being particularly shown and describing the present invention, those skilled in the art with reference to its exemplary embodiment
It should be understood that in the case where not departing from the spirit and scope of the present invention that claim is limited, form can be carried out to it
With the various changes in details.
Claims (36)
1. a kind of method of authentication, it is characterised in that including:
When receiving authentication request, the parameter information of authentication is obtained;
Verification mode for authentication is determined according to the parameter information of acquisition;
Authentication is carried out using the verification mode of determination.
2. according to the method described in claim 1, it is characterised in that the parameter information includes environmental information,
Wherein, the step of determining the verification mode for authentication according to the parameter information of acquisition includes:When environmental information is full
During the use condition for the verification mode that foot is preferentially used, the verification mode preferentially used is defined as authentication
Verification mode, wherein, the verification mode that preferentially uses is preferential in the multiple verification modes with priority level prestored
The verification mode used.
3. according to the method described in claim 1, it is characterised in that the parameter information includes environmental information and scene type,
Wherein, the step of determining the verification mode for authentication according to the parameter information of acquisition includes:
The preferential verification mode used of authentication is determined according to the scene type of authentication;
Determine whether environmental information meets the use condition of the verification mode preferentially used;
When environmental information meets the use condition of the verification mode preferentially used, the verification mode preferentially used is defined as to use
In the verification mode of authentication.
4. according to the method in claim 2 or 3, it is characterised in that when environmental information is unsatisfactory for the authentication that preferentially uses
During the use condition of formula, external environment condition is compensated,
It is determined that whether the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used;
When the environmental information of the external environment condition after compensation meets the use condition of the verification mode preferentially used, will preferentially it use
Verification mode be defined as verification mode for authentication;
It is pre- by first when the use condition for the verification mode that the environmental information of the external environment condition after compensation is unsatisfactory for preferentially using
Determine verification mode or be defined as using by other verification modes with the level of security identical of the verification mode preferentially used
In the verification mode of authentication.
5. according to any described method of claims 1 to 3, it is characterised in that the verification mode include it is following at least one:
Iris verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern is verified
Mode, digital verification mode, nine grids verification mode and signature verification mode.
6. method according to claim 5, it is characterised in that the use condition of face verification mode includes intensity of illumination bar
Part and direction of illumination condition, environmental information include outside intensity of illumination and outside direction of illumination.
7. method according to claim 6, it is characterised in that pass through the light outside light sensor or camera acquisition
According to intensity.
8. method according to claim 6, it is characterised in that by preceding camera carry out high dynamic illumination render detection come
Direction of illumination outside obtaining, or carry out graphical analysis to obtain the illumination side of outside by the image for shooting preceding camera
To.
9. method according to claim 6, it is characterised in that the use condition of face verification mode also includes the decorations of user
Product condition, environmental information also includes the information whether user wears ornaments, wherein, carried out by the image shot to preceding camera
Graphical analysis obtains the information whether user wears ornaments.
10. method according to claim 4, it is characterised in that when the verification mode preferentially used is face verification mode,
And during the use condition of the environmental information verification mode that is unsatisfactory for preferentially using, external environment condition is mended in the following manner
Repay:Compensated by the brightness for adjusting screen or the flash lamp for opening camera come the intensity of illumination to external environment condition.
11. method according to claim 5, it is characterised in that the use condition of iris verification mode includes distance condition
And angle conditions, the iris and camera of the distance between the iris of environmental information including user and camera information and user it
Between angle information.
12. method according to claim 3, it is characterised in that authentication is determined according to the scene type of authentication
It is preferential use verification mode the step of include:
The level of security of authentication is determined according to the scene type of authentication;
The verification mode for determining preferentially to use according to the level of security of authentication.
13. method according to claim 12, it is characterised in that the scene type include it is following at least one:Including
E-payment scene, unlocking screen scene and login scene.
14. method according to claim 13, it is characterised in that the level of security of different scenes type is suitable by following arrangement
Sequence is from high to low:E-payment scene, login scene and unlocking screen scene.
15. method according to claim 14, it is characterised in that it is determined that preferentially use verification mode the step of in,
The level of security of the preferential verification mode used of the authentication higher for level of security is higher, lower for level of security
Authentication the preferential verification mode used verifying speed it is faster.
16. according to the method described in claim 1, it is characterised in that also include:When using the verification mode progress identity determined
During authentication failed, using the second predetermined authentication mode or by with the level of security identical of the verification mode of the determination other
Verification mode carries out authentication.
17. according to the method described in claim 1, it is characterised in that the verification mode of the determination is verified to be one or more
Mode.
18. a kind of equipment of authentication, it is characterised in that including:
Acquiring unit, when receiving authentication request, obtains the parameter information of authentication;
Determining unit, the verification mode for authentication is determined according to the parameter information of acquisition;
Authentication unit, authentication is carried out using the verification mode of determination.
19. equipment according to claim 18, it is characterised in that the parameter information includes environmental information,
Wherein it is determined that unit is preferentially used when environmental information meets the use condition of the verification mode preferentially used by described
Verification mode be defined as verification mode for authentication, wherein, the verification mode preferentially used is the tool prestored
The verification mode preferentially used in the multiple verification modes for having priority level.
20. equipment according to claim 18, it is characterised in that the parameter information includes environmental information and scene class
Type,
Wherein, authentication unit determines the preferential verification mode used of authentication according to the scene type of authentication, it is determined that
Whether environmental information meets the use condition of the verification mode preferentially used,
When environmental information meets the use condition of the verification mode preferentially used, the verification mode preferentially used is defined as to use
In the verification mode of authentication.
21. the equipment according to claim 19 or 20, it is characterised in that authentication unit is unsatisfactory for preferentially making when environmental information
During the use condition of verification mode, external environment condition is compensated, it is determined that the environmental information of the external environment condition after compensation is
The no use condition for meeting the verification mode preferentially used, the environmental information of external environment condition after compensation meets what is preferentially used
During the use condition of verification mode, the verification mode preferentially used is defined as the verification mode for authentication,
It is pre- by first when the use condition for the verification mode that the environmental information of the external environment condition after compensation is unsatisfactory for preferentially using
Determine verification mode or be defined as using by other verification modes with the level of security identical of the verification mode preferentially used
In the verification mode of authentication.
22. according to any described equipment of claim 18 to 20, it is characterised in that the verification mode includes following at least one
It is individual:Iris verification mode, face verification mode, fingerprint authentication mode and speech verification mode and following at least zero:Pattern
Verification mode, digital verification mode, nine grids verification mode and signature verification mode.
23. equipment according to claim 22, it is characterised in that the use condition of face verification mode includes intensity of illumination
Condition and direction of illumination condition, environmental information include outside intensity of illumination and outside direction of illumination.
24. equipment according to claim 23, it is characterised in that acquiring unit is obtained by light sensor or camera
Take the intensity of illumination of outside.
25. equipment according to claim 23, it is characterised in that acquiring unit carries out high dynamic illumination by preceding camera
Detection is rendered to obtain the direction of illumination of outside, or graphical analysis is carried out come outside obtaining by the image shot to preceding camera
The direction of illumination in portion.
26. equipment according to claim 23, it is characterised in that the use condition of face verification mode also includes user's
Ornaments condition, environmental information also includes the information whether user wears ornaments, wherein, acquiring unit to preceding camera by shooting
Image carry out graphical analysis and obtain the information whether user wears ornaments.
27. equipment according to claim 21, it is characterised in that when the verification mode preferentially used is face verification side
Formula, and during the use condition of the environmental information verification mode that is unsatisfactory for preferentially using, authentication unit is in the following manner to outside
Environment is compensated:Entered by the brightness for adjusting screen or the flash lamp for opening camera come the intensity of illumination to external environment condition
Row compensation.
28. equipment according to claim 22, it is characterised in that the use condition of iris verification mode includes distance condition
And angle conditions, the iris and camera of the distance between the iris of environmental information including user and camera information and user it
Between angle information.
29. equipment according to claim 20, it is characterised in that authentication unit comes according to authentication in the following manner
Scene type determine the preferential verification mode used of authentication:
The level of security of authentication is determined according to the scene type of authentication;
The verification mode for determining preferentially to use according to the level of security of authentication.
30. equipment according to claim 29, it is characterised in that the scene type include it is following at least one:Including
E-payment scene, unlocking screen scene and login scene.
31. equipment according to claim 30, it is characterised in that the level of security of different scenes type is suitable by following arrangement
Sequence is from high to low:E-payment scene, login scene and unlocking screen scene.
32. equipment according to claim 31, it is characterised in that it is determined that preferentially use verification mode the step of in,
The level of security of the preferential verification mode used of the authentication higher for level of security is higher, lower for level of security
Authentication the preferential verification mode used verifying speed it is faster.
33. equipment according to claim 18, it is characterised in that when using the verification mode progress authentication mistake determined
When losing, authentication unit using the second predetermined authentication mode or by with the level of security identical of the verification mode of the determination its
He carries out authentication at verification mode.
34. equipment according to claim 19, it is characterised in that the verification mode of the determination is verified to be one or more
Mode.
35. a kind of computer-readable recording medium, is stored with and causes computing device such as claim 1 when being executed by a processor
The programmed instruction of the method for the authentication described in any one into 17.
36. a kind of computing device, including:
Processor;
Memory, any one institute caused in computing device such as claim 1 to 17 is executed by processor for storing to work as
The programmed instruction of the method for the authentication stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710523271.9A CN107172084A (en) | 2017-06-30 | 2017-06-30 | A kind of method and apparatus of authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710523271.9A CN107172084A (en) | 2017-06-30 | 2017-06-30 | A kind of method and apparatus of authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107172084A true CN107172084A (en) | 2017-09-15 |
Family
ID=59827872
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710523271.9A Pending CN107172084A (en) | 2017-06-30 | 2017-06-30 | A kind of method and apparatus of authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107172084A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107749844A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | Auth method and mobile terminal |
CN108173864A (en) * | 2017-12-29 | 2018-06-15 | 咪咕文化科技有限公司 | A kind of Information Authentication mode method of adjustment and device and storage medium |
CN108337253A (en) * | 2018-01-29 | 2018-07-27 | 苏州南尔材料科技有限公司 | A kind of computer based intelligent electrical appliance control |
CN108427873A (en) * | 2018-02-12 | 2018-08-21 | 维沃移动通信有限公司 | A kind of biological feather recognition method and mobile terminal |
CN108512986A (en) * | 2018-04-03 | 2018-09-07 | Oppo广东移动通信有限公司 | Auth method, electronic device and computer readable storage medium |
CN108718372A (en) * | 2018-04-12 | 2018-10-30 | Oppo广东移动通信有限公司 | Image processing apparatus, method, electronic equipment and storage medium |
CN108830081A (en) * | 2018-06-14 | 2018-11-16 | 安徽鼎龙网络传媒有限公司 | A kind of virtual lock emergency feedback system on micro- scene backstage |
CN108875352A (en) * | 2018-06-26 | 2018-11-23 | 维沃移动通信有限公司 | Verification method, device and the mobile terminal of user identity |
CN109409044A (en) * | 2018-09-19 | 2019-03-01 | 维沃移动通信有限公司 | A kind of verifying interface display method and terminal |
CN109618314A (en) * | 2018-11-19 | 2019-04-12 | 中国地质大学(武汉) | A kind of expansible identity identifying method based on environment sensing and bio-identification |
CN110532744A (en) * | 2019-07-22 | 2019-12-03 | 平安科技(深圳)有限公司 | Face login method, device, computer equipment and storage medium |
CN111352390A (en) * | 2020-03-03 | 2020-06-30 | 马鞍山职业技术学院 | Visual intelligent robot control system based on real-time analysis |
CN111445604A (en) * | 2020-04-03 | 2020-07-24 | 深圳市阿尔垎智能科技有限公司 | Intelligent door and door lock opening method |
CN112466025A (en) * | 2020-11-24 | 2021-03-09 | 安徽三人信息科技有限公司 | Access control method and access control device based on identity authentication |
CN112562147A (en) * | 2020-12-01 | 2021-03-26 | 安徽三人信息科技有限公司 | Access control user identity recognition method, device and system |
CN112671707A (en) * | 2020-11-25 | 2021-04-16 | 紫光云技术有限公司 | Multi-factor fusion authentication identity recognition model based on JWT (just-in-the-word) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761463A (en) * | 2014-01-13 | 2014-04-30 | 联想(北京)有限公司 | Information processing method and electronic device |
CN105590045A (en) * | 2015-09-14 | 2016-05-18 | ***股份有限公司 | Environmental self-adaptation identity authentication method and terminal |
CN105868611A (en) * | 2016-05-04 | 2016-08-17 | 广东欧珀移动通信有限公司 | Biological-information authentication method and device and mobile terminal |
US9432193B1 (en) * | 2015-02-05 | 2016-08-30 | Sensory, Incorporated | Face-based authentication with situational adaptivity |
CN106372483A (en) * | 2016-08-31 | 2017-02-01 | 厦门中控生物识别信息技术有限公司 | Information verification method and system |
CN107872433A (en) * | 2016-09-27 | 2018-04-03 | 腾讯科技(深圳)有限公司 | A kind of auth method and its equipment |
-
2017
- 2017-06-30 CN CN201710523271.9A patent/CN107172084A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761463A (en) * | 2014-01-13 | 2014-04-30 | 联想(北京)有限公司 | Information processing method and electronic device |
US9432193B1 (en) * | 2015-02-05 | 2016-08-30 | Sensory, Incorporated | Face-based authentication with situational adaptivity |
CN105590045A (en) * | 2015-09-14 | 2016-05-18 | ***股份有限公司 | Environmental self-adaptation identity authentication method and terminal |
CN105868611A (en) * | 2016-05-04 | 2016-08-17 | 广东欧珀移动通信有限公司 | Biological-information authentication method and device and mobile terminal |
CN106372483A (en) * | 2016-08-31 | 2017-02-01 | 厦门中控生物识别信息技术有限公司 | Information verification method and system |
CN107872433A (en) * | 2016-09-27 | 2018-04-03 | 腾讯科技(深圳)有限公司 | A kind of auth method and its equipment |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107749844A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | Auth method and mobile terminal |
CN108173864B (en) * | 2017-12-29 | 2020-12-15 | 咪咕文化科技有限公司 | Information verification mode adjusting method and device and storage medium |
CN108173864A (en) * | 2017-12-29 | 2018-06-15 | 咪咕文化科技有限公司 | A kind of Information Authentication mode method of adjustment and device and storage medium |
CN108337253A (en) * | 2018-01-29 | 2018-07-27 | 苏州南尔材料科技有限公司 | A kind of computer based intelligent electrical appliance control |
CN108427873A (en) * | 2018-02-12 | 2018-08-21 | 维沃移动通信有限公司 | A kind of biological feather recognition method and mobile terminal |
CN108512986A (en) * | 2018-04-03 | 2018-09-07 | Oppo广东移动通信有限公司 | Auth method, electronic device and computer readable storage medium |
CN108718372A (en) * | 2018-04-12 | 2018-10-30 | Oppo广东移动通信有限公司 | Image processing apparatus, method, electronic equipment and storage medium |
CN108718372B (en) * | 2018-04-12 | 2021-03-26 | Oppo广东移动通信有限公司 | Image processing apparatus, image processing method, electronic device, and storage medium |
CN108830081A (en) * | 2018-06-14 | 2018-11-16 | 安徽鼎龙网络传媒有限公司 | A kind of virtual lock emergency feedback system on micro- scene backstage |
CN108875352A (en) * | 2018-06-26 | 2018-11-23 | 维沃移动通信有限公司 | Verification method, device and the mobile terminal of user identity |
CN108875352B (en) * | 2018-06-26 | 2020-09-01 | 维沃移动通信有限公司 | User identity verification method and device and mobile terminal |
CN109409044A (en) * | 2018-09-19 | 2019-03-01 | 维沃移动通信有限公司 | A kind of verifying interface display method and terminal |
CN109618314A (en) * | 2018-11-19 | 2019-04-12 | 中国地质大学(武汉) | A kind of expansible identity identifying method based on environment sensing and bio-identification |
CN109618314B (en) * | 2018-11-19 | 2020-02-14 | 中国地质大学(武汉) | Extensible identity authentication method based on environmental perception and biological recognition |
CN110532744A (en) * | 2019-07-22 | 2019-12-03 | 平安科技(深圳)有限公司 | Face login method, device, computer equipment and storage medium |
CN111352390A (en) * | 2020-03-03 | 2020-06-30 | 马鞍山职业技术学院 | Visual intelligent robot control system based on real-time analysis |
CN111445604A (en) * | 2020-04-03 | 2020-07-24 | 深圳市阿尔垎智能科技有限公司 | Intelligent door and door lock opening method |
CN112466025A (en) * | 2020-11-24 | 2021-03-09 | 安徽三人信息科技有限公司 | Access control method and access control device based on identity authentication |
CN112671707A (en) * | 2020-11-25 | 2021-04-16 | 紫光云技术有限公司 | Multi-factor fusion authentication identity recognition model based on JWT (just-in-the-word) |
CN112562147A (en) * | 2020-12-01 | 2021-03-26 | 安徽三人信息科技有限公司 | Access control user identity recognition method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107172084A (en) | A kind of method and apparatus of authentication | |
US9773180B2 (en) | Online pseudonym verification and identity validation | |
CN109117700A (en) | Face authentication method and apparatus | |
TWI701605B (en) | Living body detection method, device and computer readable storage medium | |
US20160019420A1 (en) | Multispectral eye analysis for identity authentication | |
US20160019421A1 (en) | Multispectral eye analysis for identity authentication | |
US20170091550A1 (en) | Multispectral eye analysis for identity authentication | |
CN110069970A (en) | Activity test method and equipment | |
CN100585616C (en) | Authentication apparatus and authentication method | |
CN113557427A (en) | Electronic device valuation system | |
CN107316029B (en) | A kind of living body verification method and equipment | |
CN109033942A (en) | Authentication device and authentication method | |
CN109389153A (en) | A kind of holographic false proof code check method and device | |
Kim et al. | A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system | |
GB2544915A (en) | Online pseudonym verification and identity validation | |
CN108875338A (en) | unlocking method, device and system and storage medium | |
CN108875484A (en) | Face unlocking method, device and system and storage medium for mobile terminal | |
CN109213610A (en) | Data processing method, device, computer readable storage medium and electronic equipment | |
CN109034029A (en) | Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body | |
CN113240673A (en) | Defect detection method, defect detection device, electronic equipment and storage medium | |
CN108985255A (en) | Data processing method, device, computer readable storage medium and electronic equipment | |
Goicoechea-Telleria et al. | An evaluation of presentation attack detection of fingerprint biometric systems applying ISO/IEC 30107-3 | |
US9508006B2 (en) | System and method for identifying trees | |
JP7269897B2 (en) | Data registration device, biometric authentication device, and data registration program | |
CN109952593A (en) | Organism authentication apparatus and organism authentication program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170915 |
|
RJ01 | Rejection of invention patent application after publication |