Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms
It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will be comprehensively and complete
It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure
Same or similar part, thus repetition thereof will be omitted.
Described feature, structure or characteristic can be incorporated in one or more embodiments in any suitable manner
In.In the following description, many details are provided to provide and fully understand to embodiments of the present invention.However,
It will be appreciated by persons skilled in the art that technical solution of the present invention can be practiced and omit it is one or more in specific detail,
Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side
Method, device, realization or operation are to avoid fuzzy each aspect of the present invention.
Attached drawing is only schematic illustrations of the invention, and identical appended drawing reference indicates same or similar part in figure, because
And repetition thereof will be omitted.Some block diagrams shown in the drawings not necessarily must with it is physically or logically independent
Entity is corresponding.These functional entitys can be realized using software form, or in one or more hardware modules or integrated electricity
These functional entitys are realized in road, or these function are realized in heterogeneous networks and/or processor device and/or microcontroller device
It can entity.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and step, nor
It must be executed by described sequence.For example, the step of having can also decompose, and the step of having can merge or part merges,
Therefore the sequence actually executed is possible to change according to the actual situation.
Example embodiment of the present invention is described in detail with reference to the accompanying drawing.
Fig. 1 is the system block diagram of a kind of auth method and device shown according to an exemplary embodiment.
Server 105 can be to provide the server of various services, such as utilize terminal device 101,102,103 to user
The authentication system operated provides the back-stage management server (merely illustrative) supported.Back-stage management server can be with
Analyze etc. processing to data such as the authentication requests received, and by processing result (such as authentication result -- only
For example) feed back to terminal device.
Server 105 can for example obtain the user information of the target object of client;Server 105 can be for example based on described
User information, which is extracted, puts question to data to be sent to the client;Server 105 can for example receive the client end response in described
Put question to the feedback data of data.Server 105 can be for example according to the feedback data and the user information to the target pair
As carrying out authentication, wherein auth method includes that inquiry logic verifying, reaction time verifying and facial characteristics are tested
Card.
Server 105 can be the server of an entity, also may be, for example, that multiple servers form, in server 105
A part can will execute authentication order for obtaining for example as the authentication task submission system in the disclosure
Task;And a part in server 105 can also be for example as the authentication system in the disclosure, for obtaining client
The user information of the target object at end;Being extracted based on the user information puts question to data to be sent to the client;Receive institute
Client end response is stated in the feedback data for puing question to data;According to the feedback data and the user information to the target
Object carries out authentication, wherein auth method includes that inquiry logic verifying, reaction time verifying and facial characteristics are tested
Card.
According to the auth method and device of the disclosure, generated by user information and put question to data, and according to response in
The feedback data for puing question to data and the user information carry out authentication, can be improved the adaptation of living body authentication
Property, accuracy and reliability.
Fig. 2 is a kind of flow chart of auth method shown according to an exemplary embodiment.The embodiment of the present disclosure mentions
The auth method of confession can by arbitrarily having an execution of the electronic equipment of calculation processing ability, such as terminal device 101,102,
103 and/or server 105 be illustrated so that server executes the method as an example in the following embodiments, but this
It is open that it's not limited to that.Auth method 20 may include step S202 to S208.
As shown in Fig. 2, obtaining the user information of the target object of client in step S202.
Wherein, the client such as mobile phone, the computer configured with camera can be used for shooting video information.It can be according to visitor
It is corresponding that the mark (such as user user name) used when logging in the client at family end extracts its from User Information Database
User information.User information can be such as, but not limited to name, age, the Chinese zodiac, birthplace, ownership place, registration cell-phone number, registration
Mailbox, pre-set close breath information-preserving etc..The corresponding use of user's unique identification that user information can be bound according to client identification
Family information obtains the corresponding user of the user for example, can extract from the customer data base of server-side according to user's unique identification
Information.
In one embodiment, the video information of the face comprising target object of client can also be obtained;From the view
At least one image is extracted in frequency information;Face datection is carried out at least one described image;When not detecting face, then
The video information of the secondary face comprising the target object for obtaining client.It wherein, can be in visitor when obtaining video information again
Family end shows voice messaging or text information, includes described to obtain again to prompt the target object face camera
It can succeed when the video information of the face of target object.
In one embodiment, also In vivo detection can be carried out to the target object according to the video information, with verifying
Whether the target object is true man.Biopsy method can be such as, but not limited to: motion information detection method, three-dimensional structure
Light biopsy method, offline near-infrared biopsy method etc..For example, face-image letter can be extracted based on the video information
Breath, to verify whether the target object is living object.Specifically, the video information can be split, it is more to obtain
A image;Face datection is carried out to described multiple images, to obtain multiple facial images;Detect the mesh of the multiple facial image
Cursor position point;The target is verified according to the variation track of the source location of the multiple facial image and the action command
Whether object is living object.Wherein, it is detected by the motion information of the source location to facial image.For example, if
Command information is blink, includes eye position information in source location.Multiple facial images are sorted with time shaft.Can by pair
Than the variation track of eye position information in multiple facial images, whether the variation track reserved with blink instruction is consistent, to test
Demonstrate,prove whether the target object is living object.
In step S204, is extracted based on the user information and data is putd question to be sent to the client.
Wherein, it puts question to data to be used to put question to user, and receives the answer of user feedback.
In one embodiment, put question to data may be, for example, video format enquirement data, and can by client into
Row is played to put question to user.For example, the enquirement video with pervasive degree can be recorded in advance.Put question to the subject of question of video can example
Such as with the age, the Chinese zodiac, birthplace, ownership place, registration cell-phone number, registration mailbox, pre-set close breath essential information information-preserving
It is related.The question formulation for puing question to video may be, for example, closed enquirement, for example, age-related question formulation may be, for example:
Does is your age 30 years old? by using the question formulation of closed enquirement, the answer of user feedback is "Yes" or "no",
It can reduce the difficulty of the answer of processing user feedback, and then help to improve recognition accuracy.The enquirement data of the application are simultaneously
Be not limited with the enquirement data of video format, can be also the enquirement data of written form or audio form, and can by
Client is shown to put question to user.
In one embodiment, can from put question to be randomly selected in video database at least one under same label first mention
Ask video;At least one second enquirement video is filtered out from least one described enquirement video according to the user information, with
Generate the enquirement data;The enquirement data are sent to the client.Wherein, multiple first can be prerecorded and put question to view
Frequency collects.First in video set can be putd question to put question to the same label of video configuration for every one first.For example, can be recorded by same personnel
Multiple first put question to video, and can record for the personnel multiple first put question to the same label of video configuration;It can be different personnel
The the first enquirement video set recorded configures different labels.In another example the subject of question putd question in video under each label
Can be it is identical, i.e., shaped like: " your age is 30 years old? " the problem of corresponding one first enquirement under each label
Video.
In one embodiment, it puts question in each video in video database, may include mentioning on a small quantity after enquirement
It asks dynamic video when personnel's silencing, client can be made when playing enquirement video, make to audit online true to nature.
Second enquirement its subject of question of video that screening obtains is matched with user information.For example, it is described at least
Include in one enquirement video: problem 1, " your age is 30 years old? ", problem 2, " your Chinese zodiac is mouse? ", problem
3 " your birthplace is Beijing? " if lacking the birthplace information of the user in the user information of a certain user, in life
At the user enquirement data when, problem 3 corresponding first can be deleted and put question to video, and by problem 1 and problem 2 corresponding first
Put question to video as at least one the second enquirement video.
In step S206, the client end response is received in the feedback data for puing question to data.
Wherein, feedback data can be user when operating client progress authentication, put question to the content of data in viewing
When the information fed back.Client can include the video of the face of active user by recording as feedback data, can also pass through
The acoustic information of user's answer is recorded as feedback data, or even also can receive user and made by the text information that client inputs
For the feedback data, the disclosure is not construed as limiting the acquisition form of feedback data.
In step S208, identity is carried out to the target object with the user information according to the feedback data and is tested
Card, wherein auth method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
Wherein, it is whether consistent with user information that feedback data can be compared, if so, authentication result passes through, otherwise not
Pass through.
In one embodiment, the method, which may also include that, obtains institute according to the enquirement data and the feedback data
State the answer reaction time of target object;If described reply the reaction time greater than the normal reaction time threshold for puing question to data
Value, then authentication result is not pass through.Wherein, replying the reaction time is to learn the content for puing question to data from target object
Afterwards, to the time answered a question.Reaction time threshold value can rule of thumb data be configured.For example, collecting normal response feelings
Multiple feedback data under condition, and the reaction time for replying in multiple feedback data is counted, further according in multiple video datas
The reaction time for replying determines reaction time threshold value.If target object is not living object, answer in answer to a question
Reaction time will be longer.The present embodiment can be judged by the length in the answer reaction time of target object target object whether be
Living object.
In one embodiment, if the method may also include that the answer reaction time is greater than the enquirement data
Normal reaction time threshold then determines suspicious index according to the answer reaction time and the normal reaction time threshold;If
The suspicious index is greater than suspicious threshold value, then authentication result is not pass through.Wherein, suspicious index can be calculated according to the following formula:
Suspicious index=answer reaction time-normal reaction time threshold.Suspicious threshold value is to judge whether the identity of target object can be with
Relaxation index.When suspicious index is greater than suspicious threshold value, it is believed that the answer reaction time is noticeably greater than the normal reaction time, confirms institute
The authentication result for stating target object is not pass through.
In one embodiment, the feedback data may include voice feedback data;Can to the voice feedback data into
Row speech recognition, to generate text feedback data;By the text feedback data and the user information carry out content compare with
Logic compares, to carry out authentication to the target object.Wherein, voice feedback data can answer "Yes", "No" for user
Audio-frequency information.Can by speech recognition to text feedback data and user information carry out content and compare to compare with logic to test
Whether the answer for demonstrate,proving target object is correct.
In one embodiment, the feedback data may include video feed data;It can be from the video feed data
It extracts image and carries out Face datection, to obtain at least one facial image;Expression is carried out at least one described facial image
Identification, with the expression type of the determination face;It is raw based on the user information when the expression type is first kind expression
Data are putd question to be sent to the client at the update different from the enquirement data;Receive the client end response in it is described more
The new update feedback data for puing question to data, and according to the updates feedback data and the user information to the target object into
Row authentication.Wherein, video feed data can record facial state of the target object when answering.Expression Recognition algorithm can be known
Other expression is for example glad, it is angry, surprised, fear, sadness etc..First kind expression refers to that target object in answer to a question, only exists
Be easy the expression betrayed when being intended in the presence of deception, such as fear, is surprised etc..When expression type is first kind expression, to mesh
It marks whether object is that target user holds the suspicious attitude, data can be putd question to mention target object again by sending to update again
It asks.And described update puts question to the subject of question of data can be different from enquirement data above-mentioned.
According to the auth method that disclosure embodiment provides, is generated according to user information and put question to data and sent out
It send to client, the enquirement data that can be adapted to according to the generation of user information with the user;By that data will be putd question to be sent to
Client can be realized the interaction with target object;Client end response is being received after the feedback data for puing question to data, it can
Authentication is carried out to target object based on feedback data and user information, improves the accuracy and reliability of authentication.
The auth method of the disclosure is generated by user information and puts question to data, and according to response in the feedback coefficient for puing question to data
Authentication is carried out according to the user information, can be improved the suitability, accuracy and reliability of auth method.
It will be clearly understood that the present disclosure describes how to form and use particular example, but the principle of the disclosure is not limited to
These exemplary any details.On the contrary, the introduction based on disclosure disclosure, these principles can be applied to many other
Embodiment.
Fig. 3 is a kind of flow chart of the auth method shown according to another exemplary embodiment.Auth method
30 may include step S302 to S318.
As shown in figure 3, in step s 302, obtaining the image information and user information of the face comprising target object.Its
In, can by client receive image information, for example, client obtain comprising target object face video information after,
It therefrom intercepts multiple and includes the picture of face, and be integrated into image information.User information be, for example, current target object wish into
The registration information of user of row verifying, backstage user information database (associated with the identity coding of user accurate my information)
Middle acquisition can inquiry message.
In step s 304, Face datection is carried out to image information.Wherein, the face in Face datection detectable image into
Row source location.
In step S306, judge whether to detect face.If so, executing step S308, otherwise it re-execute the steps
S304。
In step S308, prompt information is sent to client.Prompt information is informed for being shown to target object
It will carry out enquirement verification by true man's line.
In step s310, the video set of a certain personnel's version is randomly choosed.Wherein, multiple personnel's versions can be prerecorded
Enquirement video set, subject of question may include the basic question information such as year, the Chinese zodiac, ownership place, birthplace.In each enquirement video
In, it also may include that (user plays a small amount of dynamic video putd question to when personnel's silencing when answering, and makes to audit online and force after enquirement
Very).Put question to video in propose the problem of can be alternative closed question, such as: " your age is 30 years old? ", return
Answering option includes: "Yes", "no".
In step S312, according to user information with video set generation for the enquirement video subset of target object, and
Randomly choosing at least one in enquirement video subset puts question to video to be sent to client.Wherein, the enquirement in video subset is putd question to
Content can be the question information to match with user information.Meanwhile it can also be generated to put question in video subset according to user information and mentioned
Ask the model answer of content.For example, age of user is 30 years old in user information.Put question to a certain enquirement for puing question to video in sub-video
Content are as follows: " your age is 30 years old? ", then corresponding model answer of enquirement video are as follows: "Yes".Model answer can be used for
Logic in step S316 compares.
In step S314, the feedback data of client is received.Wherein, feedback data is to put question to regard in response at least one
The feedback data of frequency.
In step S316, logic checking is carried out to user information and feedback data, to generate authentication result.Its
In, feedback data may include the voice messaging that target object is answered.It can be by being identified to voice messaging, to obtain text lattice
The feedback data of formula.
In step S318, judge whether the answer reaction time in feedback data is less than normal reaction time threshold, with
Carry out reaction time verifying.If so,
In step s 320, Expression Recognition is carried out based on feedback information and obtains expression type, and whether judge expression type
For first kind expression, to complete facial signature verification.
In step S322, logic-based verification result, reaction time verification result and facial characteristics verification result are raw
At authentication result.
In one embodiment, if logic checking result, reaction time verification result, in facial characteristics verification result at least
Have one for by when, can confirm authentication result be pass through.In another example (such as being related in the stronger business scenario of privacy
Important operations such as financial contact, bank card binding etc.), if logic checking result, reaction time verification result, facial characteristics are verified
Result is to pass through, and can confirm that authentication result is to pass through.
In one embodiment, logic checking result, reaction time verification result, facial characteristics verification result can be inputted mind
Through network model, to confirm verification result according to the output of neural network model.
In one embodiment, if logic checking result, reaction time verification result, in facial characteristics verification result at least
One verification result is not pass through, and can calculate suspicious index according at least one verification result, be greater than in suspicious index suspicious
When threshold value, confirmation authentication result is not pass through.
For example, reaction time verification result is not pass through with facial characteristics verification result if logic checking result is to pass through,
Reaction time suspicious index can be calculated according to the mode for replying reaction time-normal reaction time threshold;For first kind table
Multiple expressions in feelings assign the suspicious index of expression, the suspicious index of expression to determine current label type.It can be by the reaction time
Suspicious index is added the final suspicious index to determine target object with the suspicious index of expression.It is greater than in final suspicious index suspicious
When threshold value, confirmation authentication result is not pass through, and otherwise authentication result is to pass through.Wherein, small in final suspicious index
When being equal to suspicious threshold value, the update different from the enquirement data can be also generated based on the user information, data is putd question to send
To the client;Receive the client end response in it is described update put question to data update feedback data, and according to it is described more
New feedback data and the user information carry out authentication to the target object.
Fig. 4 is a kind of flow chart of the auth method shown according to another exemplary embodiment.
As shown in figure 4, above-mentioned steps S318 may further include following steps in the embodiment of the present invention.
In step S3182, speech recognition is carried out to acquired video, obtains the text information in video.
In step S3184, is extracted in text information and obtain user's answer information.Wherein, text information may include
Interfere text, such as the redundant information etc. that the misrecognition of environmental noise, user are answered.Interference information can be rejected by extracting,
It obtains user and answers information.
In step S3186, the accurate information in person of user is extracted in user information database.
In step S3188, answers user to information and be compared with my accurate information, detection information similarity, with
Authentication is carried out to the user.
According to the auth method that disclosure embodiment provides, target pair is obtained by closed question question formulation
The voice messaging of elephant, and logic verify is carried out based on voice messaging of the user information to target object, it is able to verify that target object
Identity.
According to disclosure embodiment provide auth method, by inform target object will carry out true line into
Row, which is putd question to, to be verified, and can be applied pressure to the target object of improper identity, effectively be rejected cheating user, increase authentication
Accuracy.
According to the auth method that disclosure embodiment provides, the registration information and back-end data of user can be passed through
Whether the relevant identity for puing question to test-target object is target user.
It, can also be by replying reaction time test-target object according to the auth method that disclosure embodiment provides
Identity whether be living object, enhance the reliability of inspection result.
It will be appreciated by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as by centre
Manage the computer program that device CPU is executed.When the computer program is executed by central processor CPU, execute what the disclosure provided
Above-mentioned function defined by the above method.The program can store in a kind of computer readable storage medium, the storage
Medium can be read-only memory, disk or CD etc..
Further, it should be noted that above-mentioned attached drawing is only the place according to included by the method for disclosure exemplary embodiment
Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these
The time sequencing of reason.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device
Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 5 is a kind of block diagram of authentication means shown according to an exemplary embodiment.Referring to Fig. 5, authentication
Device 50 may include: data obtaining module 502, put question to data transmission blocks 504, feedback data receiving module 506 and body
Part authentication module 508.
In the authentication means, data obtaining module 502 can be used for obtaining the user of the target object of client identification
Information.
In one embodiment, data obtaining module 502 can also be used in the face comprising target object for obtaining client
Video information;At least one image is extracted from the video information;Face datection is carried out at least one described image;?
When not detecting face, the video information of the face comprising the target object of client is obtained again.
In one embodiment, data obtaining module 502 can also be used according to the video information to the target object
In vivo detection is carried out, to verify whether the target object is true man.Biopsy method can be such as, but not limited to: movement letter
Cease detection method, three-dimensional structure light biopsy method, offline near-infrared biopsy method etc..
It puts question to data transmission blocks 504 to can be used for extracting enquirement data based on the user information and is sent to the client
End.
In one embodiment, data transmission blocks 504 is putd question to can be used for from enquirement video database randomly selecting together
At least one first enquirement video under one label;It is filtered out from least one described enquirement video according to the user information
At least one second enquirement video, to generate the enquirement data;The enquirement data are sent to the client.
Feedback data receiving module 506 can be used for receiving the client end response in the feedback data for puing question to data.
Authentication module 508 can be used for carrying out the target object according to the feedback data and the user information
Authentication, wherein auth method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
In one embodiment, authentication module 508 can be used for being obtained according to the enquirement data and the feedback data
Take the answer reaction time of the target object;If described reply the reaction time greater than the normal reaction time for puing question to data
Threshold value, then authentication result is not pass through.
In one embodiment, if authentication module 508 can be used for the answer reaction time greater than the enquirement number
According to normal reaction time threshold, then suspicious finger is determined according to the answer reaction time and the normal reaction time threshold
Number;If the suspicious index is greater than suspicious threshold value, authentication result is not pass through.
In one embodiment, the feedback data may include voice feedback data.Authentication module 508 can be used for pair
The voice feedback data carry out speech recognition, to generate text feedback data;By the text feedback data and the user
Information carries out content comparison and logic, to carry out authentication to the target object.
In one embodiment, the feedback data may include video feed data.Authentication module 508 can be used for from
Image is extracted in the video feed data and carries out Face datection, to obtain at least a facial image;To it is described at least one
Facial image carries out Expression Recognition, with the tag types of the determination face;When the expression type is first kind expression, then
Generating the update different from the enquirement data based on the user information puts question to data to be sent to the client;Described in reception
Client end response is believed in the update feedback data for updating enquirement data, and according to the update feedback data and the user
Breath carries out authentication to the target object.
According to the authentication means that disclosure embodiment provides, is generated according to user information and put question to data and sent out
It send to client, the enquirement data that can be adapted to according to the generation of user information with the user;By that data will be putd question to be sent to
Client can be realized the interaction with target object;Client end response is being received after the feedback data for puing question to data, it can
Based on feedback data and user information verifying target object whether be living object, improve authentication accuracy and
Reliability.The auth method of the disclosure is generated by user information and puts question to data, and according to response in the enquirement data
Feedback data and the user information carry out authentication, can be improved the suitability of auth method, accuracy with can
By property.
Fig. 6 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
The electronic equipment 200 of this embodiment according to the disclosure is described referring to Fig. 6.The electronics that Fig. 6 is shown
Equipment 200 is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in fig. 6, electronic equipment 200 is showed in the form of universal computing device.The component of electronic equipment 200 can wrap
It includes but is not limited to: at least one processing unit 210, at least one storage unit 220, (including the storage of the different system components of connection
Unit 220 and processing unit 210) bus 230, display unit 240 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 210
Row, so that the processing unit 210 executes described in this specification above-mentioned electronic prescription circulation processing method part according to this
The step of disclosing various illustrative embodiments.For example, the processing unit 210 can be executed such as Fig. 2, Fig. 3, shown in Fig. 4
The step of.
The storage unit 220 may include the readable medium of volatile memory cell form, such as random access memory
Unit (RAM) 2201 and/or cache memory unit 2202 can further include read-only memory unit (ROM) 2203.
The storage unit 220 can also include program/practical work with one group of (at least one) program module 2205
Tool 2204, such program module 2205 includes but is not limited to: operating system, one or more application program, other programs
It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 200 can also be with one or more external equipments 300 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 200 communicate, and/or with make
Any equipment (such as the router, modulation /demodulation that the electronic equipment 200 can be communicated with one or more of the other calculating equipment
Device etc.) communication.This communication can be carried out by input/output (I/O) interface 250.Also, electronic equipment 200 can be with
By network adapter 260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network,
Such as internet) communication.Network adapter 260 can be communicated by bus 230 with other modules of electronic equipment 200.It should
Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 200, including but unlimited
In: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and number
According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server or network equipment etc.) executes the above method according to disclosure embodiment.
Fig. 7 schematically shows a kind of computer readable storage medium schematic diagram in disclosure exemplary embodiment.
Refering to what is shown in Fig. 7, describing the program product for realizing the above method according to embodiment of the present disclosure
400, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device,
Such as it is run on PC.However, the program product of the disclosure is without being limited thereto, in this document, readable storage medium storing program for executing can be with
To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed
Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism
Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing
Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet
Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by one
When the equipment executes, so that the computer-readable medium implements function such as: obtaining the user information of the target object of client;
Being extracted based on the user information puts question to data to be sent to the client;The client end response is received in the enquirement data
Feedback data;Authentication is carried out to the target object according to the feedback data and the user information, wherein identity
Verification method includes inquiry logic verifying, reaction time verifying and facial characteristics verifying.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, it can also
Uniquely it is different from one or more devices of the present embodiment with carrying out corresponding change.The module of above-described embodiment can be merged into
One module, can also be further split into multiple submodule.
By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein
It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implemented according to the disclosure
The technical solution of example can be embodied in the form of software products, which can store in a non-volatile memories
In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a calculating equipment (can
To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present disclosure.
It is particularly shown and described the exemplary embodiment of the disclosure above.It should be appreciated that the present disclosure is not limited to
Detailed construction, set-up mode or implementation method described herein;On the contrary, disclosure intention covers included in appended claims
Various modifications and equivalence setting in spirit and scope.