CN110705990A - Verification method, verification device, terminal and storage medium - Google Patents

Verification method, verification device, terminal and storage medium Download PDF

Info

Publication number
CN110705990A
CN110705990A CN201910883621.1A CN201910883621A CN110705990A CN 110705990 A CN110705990 A CN 110705990A CN 201910883621 A CN201910883621 A CN 201910883621A CN 110705990 A CN110705990 A CN 110705990A
Authority
CN
China
Prior art keywords
face image
server
request
verification
face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910883621.1A
Other languages
Chinese (zh)
Inventor
张明星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201910883621.1A priority Critical patent/CN110705990A/en
Publication of CN110705990A publication Critical patent/CN110705990A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application discloses a verification method, a verification device, verification equipment and a storage medium. The method comprises the following steps: displaying a face acquisition interface; acquiring a face image acquired based on a face acquisition interface; responding to the fact that the network is detected to be out of order and cannot send a verification request for verifying the face image to the server, storing the face image and displaying the certificate; and after detecting that the network is recovered to be normal, sending an authentication request to the server. According to the technical scheme provided by the embodiment of the application, after the service provider checks the certificate, the service provider can provide the service for the user firstly, and normal service provision is ensured, so that the service can be provided normally under the condition of network failure, and the verification request is automatically initiated after the terminal detects that the network is recovered to be normal, so that the operation is simple and convenient, the time is saved, and the timeliness and the success rate of executing the target process are effectively improved.

Description

Verification method, verification device, terminal and storage medium
Technical Field
The embodiment of the application relates to the technical field of internet, in particular to a verification method, a verification device, a verification terminal and a storage medium.
Background
Currently, when a user uses a mobile phone to pay, the user can be authenticated by swiping a face.
In the related art, the flow of online payment by a user through face brushing is as follows: the method comprises the steps that an application client acquires a face image of a user, the client sends a verification request to a server through a network, and the verification request can comprise a user account for logging in the client and the acquired face image; after receiving the verification request, the server verifies whether the face image carried in the request is matched with a face image prestored in the user account, and if the face image is matched with the face image prestored in the user account, the server determines that the user identity verification is passed and executes a deduction process.
Disclosure of Invention
The embodiment of the application provides a verification method, a verification device, a terminal and a storage medium. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a verification method, where the method includes:
displaying a face acquisition interface;
acquiring a face image acquired based on the face acquisition interface;
in response to the detection of the network failure, storing the face image and displaying a certificate, wherein the certificate is used for indicating that the face image is input and executing a target process after the face image is passed through verification;
and after detecting that the network is recovered to be normal, sending the verification request to the server, wherein the verification request comprises the face image, and the verification request is used for requesting the server to execute the target process after the face image is verified to be passed.
In another aspect, an embodiment of the present application provides an authentication apparatus, where the apparatus includes:
the interface display module is used for displaying a face acquisition interface;
the image acquisition module is used for acquiring a face image acquired based on the face acquisition interface;
the image storage module is used for responding to the detection that the network fails, storing the face image and displaying a certificate, wherein the certificate is used for indicating that the face image is input and executing a target process after the face image is passed through verification;
and the request sending module is used for sending the verification request to the server after the network is detected to be normal, wherein the verification request comprises the face image, and the verification request is used for requesting the server to execute the target process after the face image is verified to be passed.
In another aspect, an embodiment of the present application provides a terminal, where the terminal includes a processor and a memory, where the memory stores a computer program, and the computer program is loaded and executed by the processor to implement the above-mentioned authentication method.
In yet another aspect, the present application provides a non-transitory computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the above-mentioned authentication method.
In a further aspect, a computer program product is provided, which, when run on a terminal, causes the terminal to perform the above authentication method.
According to the technical scheme, under the condition of network failure, the terminal stores the face image firstly, the certificate is displayed, then the terminal automatically sends the verification request carrying the face image to the server after the network is recovered to be normal, and as the certificate represents that the user inputs the face image and executes the target process after the face image is verified to be passed, the service provider can provide service for the user firstly after checking the certificate, normal service providing is ensured, and therefore the purpose that the service can be provided normally under the condition of network failure is achieved. For example, in a payment scenario, after the merchant views the credential, the merchant may first provide goods or services to the user to ensure normal transaction, thereby achieving normal transaction completion even in the case of network failure.
In addition, after the network is recovered to be normal, the terminal automatically sends a verification request carrying the face image to the server, and the server is requested to execute the target process after the face image is verified to be passed.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic illustration of an implementation environment provided by one embodiment of the present application;
FIG. 2 is a flow diagram of a verification method provided by one embodiment of the present application;
FIG. 3 illustrates a schematic diagram of a payment interface and a face capture interface;
FIG. 4 illustrates a schematic diagram of a solicitation request presentation interface;
FIG. 5 illustrates a flow chart of another authentication method of the present application;
FIG. 6 is a block diagram of an authentication device provided in one embodiment of the present application;
FIG. 7 is a block diagram of an authentication device provided in another embodiment of the present application;
fig. 8 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, a schematic diagram of an implementation environment provided by an embodiment of the present application is shown. The implementation environment may include: a terminal 10 and a server 20.
The terminal 10 may be a portable electronic device such as a mobile phone, a tablet computer, an electronic book reader, a multimedia playing device, a wearable device, and the like. Alternatively, the user may install a client of a target application, which may be an application having an authentication function, in the terminal 10.
Taking a payment scenario as an example, the target application is an application with a payment verification function as an example, optionally, the terminal 10 may be a terminal used by a consumer, and the terminal has a payment function; alternatively, the terminal 10 may be a terminal used by a merchant, and the terminal has a money receiving function, such as an electronic device like a money receiving machine, a Point of sale (POS) machine, and a money receiving terminal.
The server 20 is configured to provide background services for the terminal 10, for example, perform authentication on a face image submitted by the terminal 10, and execute a target process if the authentication is passed. The server 20 may be a server, a server cluster composed of a plurality of servers, or a cloud computing service center. Optionally, the server 20 provides background services for applications in multiple terminals 10 simultaneously.
The terminal 10 and the server 20 can communicate with each other through the network 30. The network 30 may be a wired network or a wireless network.
In the embodiment of the method of the present application, the execution subject of each step may be a terminal, such as a client of the above application program running in the terminal.
The present application is described in detail below by using several embodiments, and it should be noted that an application scenario of the technical solution of the present application may be various scenarios that need to perform identity authentication, such as an examination scenario, a withdrawal scenario, or a payment scenario, and the like, which is not limited in the embodiments of the present application. In the following embodiments, the technical solution of the present application is mainly described by taking a payment scenario as an example.
Referring to fig. 2, a flowchart of an authentication method according to an embodiment of the present application is shown. The method can be applied to the terminal 10 in the implementation environment shown in fig. 1, for example, the execution subject of each step can be a client of a target application installed in the terminal 10. The method comprises the following steps (201-204):
step 201, displaying a face acquisition interface.
The face acquisition interface is a user interface for acquiring a face image of a user. In the face acquisition interface, prompt information for prompting a user to input a face image can be displayed. The face image is an image for authenticating a user.
Taking a payment scenario as an example, the face acquisition interface may further display other information such as a payment amount, a payee, an order number, and the like, which is not limited in the embodiment of the present application. Alternatively, the face acquisition interface may be displayed in several possible cases as follows: 1. the terminal scans a graphic code for collecting money provided by a merchant and displays a face acquisition interface; 2. the terminal displays the graphic code for payment, and after the merchant scans the graphic code for payment, the terminal displays a face acquisition interface. Of course, the above cases are merely exemplary and explanatory, and the embodiments of the present application do not limit this. Illustratively, referring to fig. 3 in combination, taking as an example that a first user (e.g. a consumer) scans a graphic code provided by a second user (e.g. a merchant) for collecting money, after the first user scans the graphic code provided by the second user, the terminal displays a payment interface 30, the payment interface 30 may include an avatar 31 of the second user and a name 32 of the second user, the first user inputs a payment amount "XX" in a payment amount column 33, clicks a "confirm payment" button 34, and the terminal displays a face acquisition interface 35, and the face acquisition interface 35 includes a face image scanning box 36 and a payment mode 37. Wherein the terminal uses the camera to collect the face image of the first user in the face image scanning frame 36. It should be noted that the face image scanning frame 36 may be a circle, a rectangle, a diamond, or the like, which is not limited in the embodiment of the present application.
Step 202, acquiring a face image acquired based on a face acquisition interface.
The user can input the corresponding face image according to the prompt information of the face acquisition interface. Optionally, the face image is acquired by a terminal, for example, the terminal may acquire the face image through a camera.
Optionally, after the step 202, the following sub-steps are further included:
1. and carrying out living body recognition on the face image.
Optionally, after acquiring the face image, the terminal performs living body recognition on the face image, and determines that a person with a living body feature is recorded in the face image. Alternatively, the living body characteristics refer to vital signs that a person exhibits in daily life.
2. And responding to the face image passing through the living body recognition, and sending a verification request to a server.
Optionally, after determining that the face image has the living body feature, the terminal sends an authentication request to the server through the network, where the authentication request may include a user account and the face image.
Step 203, responding to the detected network failure, saving the face image and displaying the certificate.
After the terminal acquires the face image, the accuracy of the face image needs to be verified, and the verification process needs to be executed by a server. The terminal sends an authentication request for authenticating the face image to the server through the network, and requests the server to authenticate the face image. The authentication request may include a user account and a face image.
The network failure means that the network cannot support the terminal to send information to the server, that is, the network cannot support the terminal to send a verification request for verifying the face image to the server. Causes of network failure include, but are not limited to, at least one of: unavailability of a wireless network to which the terminal is connected, operator-provided network anomalies, server downtime or failure, and so on.
In the embodiment of the application, when the terminal detects that the network fails, the face image is stored locally. In a possible implementation manner, in order to ensure the security of the face image in the saving process, the face image is encrypted to obtain an encrypted face image, and the terminal saves the encrypted face image. In the embodiment of the present application, the encryption method of the face image is not limited, and any encryption method that is helpful for improving the security of information storage may be used. In the embodiment of the application, the terminal stores the face image under the condition that the network fails, and the purpose is to directly use the stored face image to authenticate the identity of the user after the subsequent network is recovered to be normal without acquiring the face image of the user again.
When a network failure is detected, the terminal stores a face image on one hand and generates a certificate on the other hand, and then displays the certificate. The voucher is used for indicating that the face image is input and the target process is executed after the face image passes the verification. The target process refers to a subsequent process after the face verification is passed, and the subsequent process is different in different application scenes. For example, in a payment scenario, a user may display a credential displayed by a terminal to a merchant for viewing, so that the merchant confirms that the user has completed a process of inputting a face image, the face image is not verified temporarily because a current network of the terminal has a fault, and a subsequent target process may be entered after the face image passes verification, where the subsequent target process is a deduction process.
Optionally, the certificate is a graphic code, such as a two-dimensional code or a bar code. Before displaying the certificate, the terminal may further perform the following steps:
1. acquiring metadata information for generating a graphic code;
optionally, the metadata information includes: order information and/or user identity information. Taking the payment scenario as an example, the metadata information includes: the information of the commodity order and/or the user identity information, wherein the commodity order information refers to information related to the commodity order, and may include information such as an order number, a commodity name, a commodity quantity, a payment amount and the like. The user identity information refers to information related to the user identity, such as a user account, personal basic information (such as a name, a mobile phone number, an address, and the like) of the user, a user rating, and the like.
2. And generating the graphic code according to the metadata information.
The terminal encodes the metadata information to generate a graphic code. In a payment scene, in such a way, after the merchant stores the graphic code, the merchant can obtain corresponding commodity order information and/or user identity information by tracing the source, so that a promotion flow can be initiated conveniently, and the promotion flow can be a money promotion flow.
Optionally, the graphic code may be recorded by taking a picture or screenshot, and the metadata information for generating the graphic code may be viewed by scanning the graphic code. For example, in a payment scenario, a merchant may record the credential by taking a picture, or may acquire metadata information included in the credential by scanning a graphic code. Referring collectively to FIG. 4, after the merchant's terminal records the two-dimensional code as a voucher 41, the corresponding "see details" button 42 and "urge to pay" button 43 may be displayed. When the merchant clicks the "see details" button 42, the merchant's terminal displays a details interface 44. The detailed content interface 44 may include user information 45, purchased goods 46, payment amount 47, payment duration 48, and the like. It should be noted that the certificate (e.g., graphic code) does not have a payment function, and only has a function of viewing the commodity order information and/or the user identity information.
And step 204, after detecting that the network is recovered to be normal, sending an authentication request to the server.
After the face image is saved, the terminal can detect whether the network is normal or not in real time or in a timing mode. After detecting that the network is recovered to be normal, the terminal sends an authentication request to the server through the network, wherein the authentication request is used for requesting the server to execute the target process after the server passes the authentication of the face image. The payment verification request may include a user account and a face image acquired by the face acquisition interface.
And after receiving the verification request, the server verifies the face image included in the request. For example, the server acquires a pre-stored face image corresponding to the user account from the database, then compares whether the pre-stored face image is matched with the face image in the request, if so, determines that the face image in the request passes the verification, and if not, determines that the face image in the request fails the verification. And under the condition that the verification is passed, the server executes a target process, for example, in a payment scene, after the server determines that the face image in the verification request is matched with a face image prestored in a corresponding user account, the server transfers the payment amount from the account corresponding to the user account to the account of the merchant.
In addition, the server may transmit a notification (e.g., a payment success response) to the terminal indicating to complete the target process after the target process is successfully executed. When the server does not successfully execute the target process, for example, the face image fails to pass the verification, or although the face image passes the verification, the account corresponding to the user account has insufficient funds, the server may also send a notification (for example, a payment unsuccessful response) indicating that the target process is not completed to the terminal, where the notification may carry a reason for the target process not being completed. After receiving the notification indicating that the target process is not completed, the terminal can initiatively restart the face image acquisition process. Taking the payment scenario as an example, after receiving the notification indicating that payment is not completed, the merchant may actively contact the user to remind the user to initiate the payment process again.
Optionally, after receiving an execution completion response sent by the server, the terminal may delete the stored face image; wherein the execution completion response is used to indicate that the server has successfully executed the target flow. Through the mode, the release of the terminal storage resources is realized.
To sum up, in the technical solution provided in this embodiment of the application, in the case of a network failure, the terminal stores the face image, and displays the certificate, and then, after the network is restored to normal, the terminal automatically sends the authentication request carrying the face image to the server. For example, in a payment scenario, after the merchant views the credential, the merchant may first provide goods or services to the user to ensure normal transaction, thereby achieving normal transaction completion even in the case of network failure.
In addition, after the network is recovered to be normal, the terminal automatically sends a verification request carrying the face image to the server, and the server is requested to execute the target process after the face image is verified to be passed.
In addition, because the face image has uniqueness, even if a malicious user bypasses a target process through the technical scheme of the application, the malicious user can be found through the face image, and in a payment scene, on one hand, the malicious user can be restrained from being subjected to a payment evasion behavior, and on the other hand, the rights and interests of merchants can be guaranteed.
In an exemplary embodiment, after the step 203, the following steps may be further included:
1. and receiving an urging request sent by the server, wherein the urging request is a request sent when the target process is not executed successfully.
The server may automatically send a promotion request to the terminal, for example, the server may send a promotion request to the terminal in response to detecting that the target process is not successfully executed for more than a preset time period (e.g., 1 hour). The server may transmit the urging request to the terminal after receiving the instruction to transmit the urging request. Taking a payment scenario as an example, a merchant clicks a "urge to pay" button in fig. 4, and sends an urge instruction to the server, and the server sends an urge request to the terminal after receiving the urge instruction.
Optionally, the preset time duration may be different for different user accounts. For example, the corresponding preset time length is set according to the credit rating of the user account. For example, the higher the credit rating of the user account is, the longer the corresponding preset time duration is; on the contrary, the lower the credit rating of the user account is, the shorter the corresponding preset time duration is.
2. And generating reminding information according to the urging request, wherein the reminding information is used for reminding the user to execute the target process.
When the reminding information is a text or image-text message, the terminal can display the reminding information. Optionally, in the payment scenario, the reminder information includes at least one of: commodity order information, order payment status, etc.
Alternatively, if the target flow is not successfully executed because the face image is not verified, the user needs to re-input the face image.
By the method, a prompting function is provided, and timeliness and success rate of executing the target process are improved.
In addition, with reference to fig. 5, a face brushing payment scenario is taken as an example to explain the technical solution of the present application. The method may include the steps of:
step 51, collecting a face image;
step 52, identifying the living body of the face image;
step 53, after the living body identification is passed, sending a payment verification request for verifying the face image to a server;
step 54, if the payment verification request fails to be sent due to the network failure, the face image is encrypted and stored;
step 55, displaying the payment voucher;
step 56, after detecting that the network is recovered to normal, sending a payment verification request to a server, wherein the payment verification request comprises the face image; the payment verification request can comprise an encrypted face image and can also comprise an unencrypted face image;
and 57, deleting the stored face image after the payment is successful.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Referring to fig. 6, a block diagram of an authentication apparatus according to an embodiment of the present application is shown. The device has the function of realizing the verification method, and the function can be realized by hardware or by hardware executing corresponding software. The device may be a terminal or may be provided in a terminal. The apparatus 600 may include: an interface display module 601, an information acquisition module 602, an information storage module 603 and a request sending module 604.
And the interface display module 601 is used for displaying a face acquisition interface.
An image obtaining module 602, configured to obtain a face image collected based on the face collection interface.
And the image saving module 603 is configured to, in response to detecting that a network fails, save the face image to a server, and display a certificate, where the certificate is used to indicate that the face image has been input and a target process is executed after the face image passes verification.
A request sending module 604, configured to send the verification request to the server after detecting that the network is recovered to normal, where the verification request includes the facial image, and the verification request is used to request the server to execute the target process after the facial image is verified to pass.
In an exemplary embodiment, the credential is a graphical code; as shown in fig. 7, the apparatus 600 further includes: a credential generation module 605.
And the credential generating module 605 is configured to obtain metadata information used for generating the graphic code, and generate the graphic code according to the metadata information.
In an exemplary embodiment, the metadata information includes: order information and/or user identity information.
In an exemplary embodiment, the image saving module 603 is further configured to encrypt the face image to obtain an encrypted face image, and save the encrypted face image.
In an exemplary embodiment, as shown in fig. 7, the apparatus 600 further includes: a living body identification module 606.
And a living body recognition module 606, configured to perform living body recognition on the face image.
The request sending module 604 is further configured to send the verification request to the server in response to that the face image passes through living body recognition.
In an exemplary embodiment, as shown in fig. 7, the apparatus 600 further includes: an information deletion module 607.
An information deleting module 607, configured to delete the stored face image after receiving an execution completion response sent by the server; wherein the execution completion response is used to indicate that the server has successfully executed the target process.
In an exemplary embodiment, as shown in fig. 7, the apparatus further includes: a request receiving module 608 and a prompt reminding module 609.
A request receiving module 608, configured to receive a solicitation request sent by the server, where the solicitation request is a request sent in response to the target process being unsuccessfully executed.
And the urging prompting module 609 is configured to generate prompting information according to the urging request, where the prompting information is used to prompt a user to execute the target process.
To sum up, in the technical solution provided in this embodiment of the application, in the case of a network failure, the terminal stores the face image, and displays the certificate, and then, after the network is restored to normal, the terminal automatically sends the authentication request carrying the face image to the server. For example, in a payment scenario, after the merchant views the credential, the merchant may first provide goods or services to the user to ensure normal transaction, thereby achieving normal transaction completion even in the case of network failure.
In addition, after the network is recovered to be normal, the terminal automatically sends a verification request carrying the face image to the server, and the server is requested to execute the target process after the face image is verified to be passed.
It should be noted that, in the apparatus provided in the foregoing embodiment, in response to the implementation of the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the above functions may be distributed by different functional modules according to needs, that is, the internal structure of the apparatus is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
Referring to fig. 8, a block diagram of a terminal 800 according to an embodiment of the present application is shown. The terminal 800 may be an electronic device such as a mobile phone, a tablet computer, an e-book reader, a multimedia playing device, a wearable device, a cash register, a point of sale (POS) machine, a cash register terminal, and so on. The terminal is used for implementing the authentication method provided in the above embodiment. The terminal may be the terminal 10 in the implementation environment shown in fig. 1. Specifically, the method comprises the following steps:
in general, the terminal 800 includes: a processor 801 and a memory 802.
The processor 801 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so forth. The processor 801 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (field Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 801 may also include a main processor and a coprocessor, where the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 801 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 801 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 802 may include one or more computer-readable storage media, which may be non-transitory. Memory 802 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 802 is used to store a computer program that is loaded and executed by the processor to implement the authentication method described above.
In some embodiments, the terminal 800 may further include: a peripheral interface 803 and at least one peripheral. The processor 801, memory 802 and peripheral interface 803 may be connected by bus or signal lines. Various peripheral devices may be connected to peripheral interface 803 by a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of a radio frequency circuit 804, a touch screen display 805, a camera 807, an audio circuit 807, a positioning component 808, and a power supply 809.
Those skilled in the art will appreciate that the configuration shown in fig. 8 is not intended to be limiting of terminal 800 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
In an exemplary embodiment, a non-transitory computer-readable storage medium is also provided, on which a computer program is stored, which computer program, when executed by a processor, is to carry out the above-mentioned authentication method.
Optionally, the computer-readable storage medium may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a Solid State Drive (SSD), or an optical disc. The Random Access Memory may include a resistive Random Access Memory (ReRAM) and a Dynamic Random Access Memory (DRAM).
In an exemplary embodiment, a computer program product is also provided, which, when executed by a processor, is adapted to implement the above-mentioned authentication method.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. In addition, the step numbers described herein only exemplarily show one possible execution sequence among the steps, and in some other embodiments, the steps may also be executed out of the numbering sequence, for example, two steps with different numbers are executed simultaneously, or two steps with different numbers are executed in a reverse order to the order shown in the figure, which is not limited by the embodiment of the present application.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. A method of authentication, the method comprising:
displaying a face acquisition interface;
acquiring a face image acquired based on the face acquisition interface;
in response to the detection of the network failure, storing the face image and displaying a certificate, wherein the certificate is used for indicating that the face image is input and executing a target process after the face image is passed through verification;
and after detecting that the network is recovered to be normal, sending a verification request to the server, wherein the verification request comprises the face image, and the verification request is used for requesting the server to execute the target process after the face image is verified to be passed.
2. The method of claim 1, wherein the credential is a graphical code;
before the displaying of the certificate, the method further comprises:
acquiring metadata information for generating the graphic code;
and generating the graphic code according to the metadata information.
3. The method of claim 2, wherein the metadata information comprises: order information and/or user identity information.
4. The method of claim 1, wherein saving the face image comprises:
encrypting the face image to obtain an encrypted face image;
and storing the encrypted face image.
5. The method of claim 1, wherein after acquiring the face image acquired based on the face acquisition interface, further comprising:
performing living body recognition on the face image;
and responding to the face image passing through living body recognition, and sending the verification request to the server.
6. The method according to any one of claims 1 to 5, wherein after sending the authentication request to the server, further comprising:
after receiving an execution completion response sent by the server, deleting the stored face image;
wherein the execution completion response is used to indicate that the server has successfully executed the target process.
7. The method according to any one of claims 1 to 5, wherein after saving the face image and displaying the certificate, the method further comprises:
receiving a prompting request sent by the server, wherein the prompting request is a request responding to the target process which is not successfully executed and sent;
and generating reminding information according to the urging request, wherein the reminding information is used for reminding a user to execute the target process.
8. An authentication apparatus, the apparatus comprising:
the interface display module is used for displaying a face acquisition interface;
the image acquisition module is used for acquiring a face image acquired based on the face acquisition interface;
the image storage module is used for responding to the detection that the network fails, storing the face image and displaying a certificate, wherein the certificate is used for indicating that the face image is input and executing a target process after the face image is passed through verification;
and the request sending module is used for sending the verification request to the server after the network is detected to be normal, wherein the verification request comprises the face image, and the verification request is used for requesting the server to execute the target process after the face image is verified to be passed.
9. A terminal, characterized in that it comprises a processor and a memory, in which a computer program is stored, which computer program is loaded and executed by the processor to implement the authentication method according to any one of claims 1 to 7.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the authentication method according to any one of claims 1 to 7.
CN201910883621.1A 2019-09-18 2019-09-18 Verification method, verification device, terminal and storage medium Pending CN110705990A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910883621.1A CN110705990A (en) 2019-09-18 2019-09-18 Verification method, verification device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910883621.1A CN110705990A (en) 2019-09-18 2019-09-18 Verification method, verification device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN110705990A true CN110705990A (en) 2020-01-17

Family

ID=69194559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910883621.1A Pending CN110705990A (en) 2019-09-18 2019-09-18 Verification method, verification device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110705990A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275448A (en) * 2020-02-22 2020-06-12 腾讯科技(深圳)有限公司 Face data processing method and device and computer equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275448A (en) * 2020-02-22 2020-06-12 腾讯科技(深圳)有限公司 Face data processing method and device and computer equipment

Similar Documents

Publication Publication Date Title
US10643207B2 (en) Authentication of card-not-present transactions
CN107851254B (en) Seamless transactions with minimized user input
CN106688004B (en) Transaction authentication method and device, mobile terminal, POS terminal and server
EP3401861A1 (en) Data interaction method and device, and offline credit payment method and device
CN107067056A (en) Two-dimensional code generation method and its equipment and two-dimensional code identification method and its equipment
US20220108309A1 (en) Systems and methods for securely opening apis with cardholder authentication and consent
WO2016075530A1 (en) User controlled remote credit and bank card transaction verification system
WO2021082466A1 (en) Offline payment
US11854090B1 (en) Augmented reality account statement
US20130198079A1 (en) Verification of Online Transactions
US10395232B2 (en) Methods for enabling mobile payments
US11601279B2 (en) Systems and methods for payment authentication
US9262422B1 (en) System and method of verifying a payment cardholder's identity using an interactive payment card
CN110705990A (en) Verification method, verification device, terminal and storage medium
US20220188814A1 (en) Appending local contextual information to a record of a remotely generated record log
KR101639045B1 (en) Method and system for issuing electronic receipts
US20220300943A1 (en) Information processing apparatus, payment processing system, method, and program
US20230125814A1 (en) Credit score management apparatus, credit score management method, and computer readable recording medium
CN113627931A (en) Payment limiting method and electronic equipment
TWM549906U (en) System using electronic device for payment
CN113094688A (en) Outsourcing marketing terminal business processing system and method
CN111833046A (en) Digital electronic cash management method and device
CN206147740U (en) Finance dealing data transmission device and financial dealing data transmission monitoring system
US20240257129A1 (en) Methods and systems for blocking multi-rail contactless fraud
US11507952B1 (en) Mobile payment signature processing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination