CN113204754A - Authentication method and device based on augmented reality glasses, medium and electronic equipment - Google Patents
Authentication method and device based on augmented reality glasses, medium and electronic equipment Download PDFInfo
- Publication number
- CN113204754A CN113204754A CN202110467018.2A CN202110467018A CN113204754A CN 113204754 A CN113204754 A CN 113204754A CN 202110467018 A CN202110467018 A CN 202110467018A CN 113204754 A CN113204754 A CN 113204754A
- Authority
- CN
- China
- Prior art keywords
- depth
- authentication
- augmented reality
- reality glasses
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The disclosure provides an authentication method based on augmented reality glasses, an authentication device based on the augmented reality glasses, a computer readable storage medium and an electronic device, and relates to the technical field of augmented reality. The authentication method based on the augmented reality glasses comprises the following steps: determining depth information of the first object using a depth sensor provided with augmented reality glasses; the depth information of the first object is displayed on a display interface of the augmented reality glasses; if the depth information of the first object meets the pre-configured authentication requirement, the authentication is passed. The present disclosure can improve security of authentication.
Description
Technical Field
The present disclosure relates to the field of augmented reality technologies, and in particular, to an authentication method based on augmented reality glasses, an authentication apparatus based on augmented reality glasses, a computer-readable storage medium, and an electronic device.
Background
The security authentication plays an increasingly important role in daily work and life, and can be applied to various terminal application scenes such as unlocking, payment and awakening.
At present, security authentication mainly includes password input authentication, fingerprint authentication, face authentication, and the like. However, in public places, the password input authentication mode may have the risk of password leakage, and the biometric-based authentication modes such as fingerprints and human faces may also have the problem of personal privacy leakage.
Disclosure of Invention
The present disclosure provides an authentication method of augmented reality glasses, an authentication apparatus based on augmented reality glasses, a computer-readable storage medium, and an electronic device, thereby overcoming, at least to some extent, the problem of insecurity of authentication due to privacy disclosure.
According to a first aspect of the present disclosure, there is provided an authentication method based on augmented reality glasses, the augmented reality glasses being equipped with a depth sensor, the authentication method comprising: determining, with a depth sensor, depth information of a first object; the depth information of the first object is displayed on a display interface of the augmented reality glasses; if the depth information of the first object meets the pre-configured authentication requirement, the authentication is passed.
According to a second aspect of the present disclosure, there is provided an authentication apparatus based on augmented reality glasses, the augmented reality glasses being equipped with a depth sensor, the authentication apparatus comprising: a depth information determination module for determining depth information of the first object using the depth sensor; the depth information of the first object is displayed on a display interface of the augmented reality glasses; and the authentication module is used for passing the authentication if the depth information of the first object meets the preconfigured authentication requirement.
According to a third aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described augmented reality glasses-based authentication method.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising a processor; a memory for storing one or more programs which, when executed by the processor, cause the processor to implement the augmented reality glasses-based authentication method described above.
In some embodiments of the present disclosure, a depth sensor provided in augmented reality glasses is used to determine depth information of a first object, and the depth information is displayed on a display interface of the augmented reality glasses, and when the depth information of the first object meets a pre-configured authentication requirement, it is determined that the authentication is passed. The distance of this disclosure with the help of augmented reality glasses detection object realizes the authentication, because only the person of wearing of augmented reality glasses can see the degree of depth information on the glasses interface, has reduced the risk of information leakage, has guaranteed the security of authentication.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty. In the drawings:
FIG. 1 illustrates a schematic diagram of an exemplary system architecture for an augmented reality glasses-based authentication scheme to which embodiments of the present disclosure may be applied;
fig. 2 shows a stylistic schematic of augmented reality glasses of an embodiment of the present disclosure;
FIG. 3 shows a schematic structural diagram of an electronic device of an embodiment of the disclosure;
fig. 4 schematically illustrates a flow chart of an augmented reality glasses-based authentication method according to an exemplary embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart of an authentication requirement entry process according to an embodiment of the present disclosure;
FIG. 6 schematically shows a flow diagram of an authentication requirement entry process according to another embodiment of the present disclosure;
FIG. 7 is a schematic diagram illustrating a scenario of authentication based on the enhanced display glasses authentication method according to the present disclosure;
fig. 8 schematically illustrates a block diagram of an augmented reality glasses-based authentication apparatus according to an exemplary embodiment of the present disclosure;
fig. 9 schematically illustrates a block diagram of an augmented reality glasses-based authentication apparatus according to another exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the steps. For example, some steps may be decomposed, and some steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation. In addition, all of the following terms "first" and "second" are used for distinguishing purposes only and should not be construed as limiting the present disclosure.
Fig. 1 shows a schematic diagram of an exemplary system architecture of an augmented reality glasses-based authentication scheme to which embodiments of the present disclosure may be applied.
As shown in fig. 1, the system architecture may include augmented reality glasses 11 and another terminal device 12, such as a cell phone. Although the terminal device 12 is illustrated as a mobile phone in fig. 1, the terminal device 12 may also include a tablet computer, a personal computer, and the like. In addition, the augmented reality glasses 11 may be in communication connection with the terminal device 12 in a wired or wireless manner, and for example, in a wireless manner, the communication connection may be performed in a bluetooth manner, a WiFi manner, or the like.
The augmented reality glasses 11 may be equipped with a depth sensor, and the present disclosure does not limit the type of the depth sensor, and may be, for example, structured light, ToF (Time of Flight), or the like.
In the case where the augmented reality glasses 11 establish control trust with the terminal device 12, authentication confirmation for the terminal device 12 may be implemented using the augmented reality glasses 11.
Specifically, the augmented reality glasses 11 may determine the depth information of the first object by using a depth sensor equipped in the augmented reality glasses, and display the depth information of the first object on a display interface of the augmented reality glasses. It should be noted that the depth information described in the present disclosure may include one or more depth values. Next, the augmented reality glasses 11 may determine whether the depth information of the first object satisfies a pre-configured authentication requirement, and if so, the authentication passes. At this time, the augmented reality glasses 11 may transmit information representing that the authentication is passed to the terminal device 12, so that the terminal device 12 performs operations after the authentication is passed, for example, but not limited to unlocking a screen, paying, waking up an application, and any other operations requiring authentication.
With the trend that the functions of the augmented reality glasses 11 are more and more abundant, the authentication may also be for the augmented reality glasses 11 themselves, for example, waking up a microphone, turning off a power supply, and other device functions. In this case, only augmented reality glasses 11 are included in the system architecture.
Taking the scene of waking up the microphone as an example, the augmented reality glasses 11 may determine the depth information of the first object by using the depth sensor, and when the depth information of the first object meets the pre-configured authentication requirement corresponding to the waking up microphone, the authentication is passed, and the augmented reality glasses 11 turn on the microphone equipped by themselves.
In addition, the process of determining whether the authentication requirement is satisfied according to the present disclosure may also be performed by the terminal device 12, that is, the augmented reality glasses 11 are only used for collecting the depth information and displaying the depth information on the display interface. Meanwhile, the augmented reality glasses 11 send the collected depth information to the terminal device 12, and the terminal device 12 determines whether the detected depth information meets the pre-configured authentication requirement. If the augmented reality glasses 11 perform the operation after the authentication, the terminal device 12 may send the information representing that the authentication is passed to the augmented reality glasses 11, so that the augmented reality glasses 11 perform the operation after the authentication is passed. If the terminal device 12 performs the operation after the authentication, the terminal device 12 may directly perform the operation after the authentication is passed.
Fig. 2 shows a model schematic diagram of augmented reality glasses according to an embodiment of the present disclosure.
Referring to fig. 2, augmented reality glasses of the present disclosure may include a depth sensor 21, a processor 22, a light engine 23, and a displayable lens 24. It should be understood that the augmented reality glasses of the present disclosure may include a light engine and a display lens on only one side corresponding to the human eye, and the depth information can only be displayed on the displayable lens 24, taking fig. 2 as an example. However, in other embodiments, the optical engine and the display lens are included on both sides of the augmented reality glasses, that is, the depth information can be displayed on both lenses of the glasses.
In the authentication scheme based on augmented reality glasses according to the embodiment of the present disclosure, the depth sensor 21 may detect depth information of an object in a scene, and the processor 22 analyzes the depth data and displays the depth information of the object on the displayable lens 24 by means of the optical machine 23.
Meanwhile, the processor 22 may determine whether the depth information satisfies a pre-configured authentication requirement, and if so, the authentication is passed. If the depth information does not meet the pre-configured authentication requirement after a preset time elapses since the start of the detection, the information of the authentication failure is displayed on the displayable lens 24 by means of the optical machine 23.
Fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. The augmented reality glasses of the exemplary embodiments of the present disclosure may be configured as in fig. 3. It should be noted that the electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
The electronic device of the present disclosure includes at least a processor and a memory for storing one or more programs, which when executed by the processor, cause the processor to implement the authentication method of the exemplary embodiments of the present disclosure.
Specifically, as shown in fig. 3, the electronic device 3 may include: a processor 31, a memory 32, an input-output unit 33 and a communication unit 34. Among them, the input-output unit 33 may include at least one display part 331, an optical part 332, a sensor 333, and an audio part 334.
It is to be understood that the illustrated structure of the embodiment of the present disclosure does not constitute a specific limitation to the electronic device 3. In other embodiments of the present disclosure, the electronic device 3 may include more or fewer components than illustrated, or combine certain components, or split certain components, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The input-output unit 33 may be used to acquire data from the outside or transmit data to the outside.
At least one display member 331 may be used to display images, generally referred to as displayable lenses.
The sensor 333 may include, for example, an infrared sensor, a temperature sensor, an acceleration sensor, etc., in addition to the depth sensor described in the present disclosure. In addition, the present disclosure does not limit the arrangement position of the sensor, and for example, the depth sensor may be arranged on a frame of the glasses.
The communication unit 34 may include a wired and/or wireless communication module for transmitting signals with an external device.
The present disclosure also provides a computer-readable storage medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device.
A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable storage medium may transmit, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The computer-readable storage medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method as described in the embodiments below.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
In the following, the authentication method according to the embodiment of the present disclosure is performed by using augmented reality glasses as an example, and in this case, the authentication device described below may be disposed in the augmented reality glasses.
Fig. 4 schematically illustrates a flowchart of an augmented reality glasses-based authentication method of an exemplary embodiment of the present disclosure. Referring to fig. 4, the augmented reality glasses-based authentication method may include the steps of:
s42, determining depth information of the first object by using a depth sensor; the depth information of the first object is displayed on a display interface of the augmented reality glasses.
In an exemplary embodiment of the present disclosure, the first object is a real object in the real world. The first object may be a living object, such as an animal like a cat, a dog, a human hand, a user other than a user wearing augmented reality glasses, or the like. In addition, the first object may also be a non-living object, such as a display screen, book, box, or the like.
In a scene in which the first object is a specific object, an RGB camera equipped with augmented reality glasses may be used to capture an image, and image recognition is performed to determine whether the image includes the first object, and if it is determined that the image includes the first object, the depth sensor may be used to determine depth information of the first object.
In the case where a plurality of objects are included in the depth map acquired by the depth sensor, a region of each object may be displayed on a display interface (an interface corresponding to a displayable lens) of the augmented reality glasses, and the region is generally configured in the form of a rectangular frame. In this case, the user can move the head to move the alignment center, and thus the object corresponding to the alignment center is regarded as the first object without manual operation. In addition, the user may select one object from the plurality of objects as the first object through buttons of the augmented reality glasses.
In addition, in a case that the depth value of each point on the first object is not exactly the same, the depth values of all the points may be averaged, for example, to obtain the depth values of the augmented reality glasses and the first object. For another example, the depth value of the center point of the first object may be taken as the depth value of the augmented reality glasses and the first object. For another example, a number of points on the first object may be randomly selected, and the depth of the points may be averaged to obtain the depth values of the augmented reality glasses and the first object.
According to some embodiments of the present disclosure, the depth information of the first object is one depth value. That is, the scheme process described below uses only one depth value to determine whether authentication passes.
According to other embodiments of the present disclosure, in a case where a user wearing the augmented reality glasses moves or the first object moves, a distance between the augmented reality glasses and the first object changes, and at this time, the determined depth information includes a plurality of depth values determined in chronological order.
In case the depth sensor continuously acquires depths, the plurality of depth values may be consecutive depth values. For example, 30cm to 10 cm.
In the case where the depth sensor collects depths at time intervals, the plurality of depth values may be discrete depth values. Taking the example of acquiring 5 depth values, for example: 30cm, 28cm, 25cm, 20cm, 10 cm.
In addition, in order to make the collected depth value better controlled by the user's intention, during the user's movement, if the user has hardly moved for a certain period of time, that is, the depth value of the detected number is stabilized at a value and the offset is smaller than a depth threshold, the depth value in this case is recorded. For example, the resulting depth values may be 10cm, 15cm, and 20 cm.
It can be appreciated that since the depth information of the first object can be displayed on the display interface of the augmented reality glasses in real time, the user is facilitated to adjust the distance from the first object. In addition, the privacy is guaranteed just because the depth information is on the augmented reality glasses.
And S44, if the depth information of the first object meets the preset authentication requirement, the authentication is passed.
In the case where the depth information of the first object is only one depth value, the detected depth value may be compared with a preset depth value, and if the two depth values are identical, the authentication may pass. Wherein the preset depth value may be a user pre-configured depth value, e.g., 52 cm. If the preconfigured depth value is the same person as the user who wants to authenticate at present, the user must know that 52cm is the set preset depth value, and the user can move to a place having a depth value of 52cm from the first object by means of the depth value displayed on the augmented reality glasses. At this point, the user may stay for a certain time (e.g., 3s, 5s, etc.) to complete the authentication. Alternatively, the user may complete the authentication by voice or by touching a control.
The following describes a case where the depth information of the first object includes a plurality of depth values determined in chronological order.
According to some embodiments of the present disclosure, it may be determined whether the plurality of depth values includes a plurality of preset depth values arranged in a predetermined order with respect to each other, it should be noted that the preset depth values are ordered with respect to each other.
If it is determined that the plurality of depth values includes a plurality of preset depth values arranged in a predetermined order with respect to each other, it is determined that the depth information of the first object satisfies a pre-configured authentication requirement.
If it is determined that the plurality of depth values do not include a plurality of preset depth values arranged in a predetermined order with respect to each other, it is determined that the depth information of the first object does not satisfy a pre-configured authentication requirement.
For example, in the case where the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, 30cm, if a plurality of preset depth values arranged in a predetermined order with respect to each other are 15cm, 10cm, 30cm, it is determined that the depth information of the first object satisfies the authentication requirement arranged in advance. If the plurality of preset depth values arranged in the predetermined order are 10cm, 15cm, 30cm, it is determined that the depth information of the first object does not satisfy the authentication requirement arranged in advance.
Therefore, when judging whether the preset authentication requirements are met, not only is it judged whether the detected depth information contains the preset depth values, but also whether the preset appearance sequence of each preset depth value is met.
Referring to fig. 5, a process of determining the preset depth value in advance is exemplified.
In step S502, a plurality of depth values of the augmented reality glasses and the second object are determined as depth information of the second object using the depth sensor. The second object may be the same as or different from the first object, and in fact, the disclosed solution does not concern what the object is, but only concerns the depth of the object. For example, 10 depth values of the second object are obtained.
In step S504, a plurality of depth values are determined as a plurality of preset depth values from the depth information of the second object. For example, 3 depth values are determined as the preset depth values from the 10 depth values determined in step S502. Specifically, the preset depth values may be selected by the user, or may be selected by the augmented reality glasses, and then the preset depth values are displayed through the display interface of the augmented reality glasses, so that the user can know the preset depth values.
It should be understood that the process of detecting the depth values in step S42 is a process of detecting in real time, that is, each time a depth value is detected, the depth value is displayed on the display interface of the augmented reality glasses, and a determination process of whether the authentication requirement is satisfied is performed.
Changing a display style of the current depth value on the display interface if the determined current depth value corresponds to a target depth value among a plurality of preset depth values arranged in a predetermined order with respect to each other.
Still by way of example, in the case where the plurality of preset depth values arranged in a predetermined order among each other are 15cm, 10cm, 30cm, if the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, 30cm, the display styles of the depth values on the display interface are changed when the current depth values are 15cm, 10cm, 30cm, respectively. Therefore, the function of reminding the user is achieved.
Specifically, the change of the display style includes, but is not limited to, changing the font size, changing the font color, changing the font flicker degree, and the like, which is not limited by the present disclosure.
According to further embodiments of the present disclosure, first, feature values corresponding to a plurality of depth values in the depth information of the first object may be determined. Specifically, the mapping relationship table between the depth values and the feature values may be used to determine the feature value corresponding to each depth value, for example, 10cm corresponds to the feature value 1, and 12cm corresponds to the feature value 2. Such a mapping table may be configured and stored by the user in advance.
It will be appreciated that where the determined depth values are arranged chronologically, the determined corresponding feature values are also chronologically ordered.
Next, it is determined whether the plurality of feature values sorted in time-series order include a plurality of preset feature values arranged in a predetermined order therebetween.
And if the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values configured among each other according to a preset sequence, determining that the depth information of the first object meets the pre-configured authentication requirement.
And if the plurality of characteristic values arranged according to the time sequence do not comprise a plurality of preset characteristic values configured according to a preset sequence, determining that the depth information of the first object does not meet the pre-configured authentication requirement.
For example, when the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, or 30cm, the characteristic values determined in chronological order by the above-described mapping relationship table are respectively 5, 3, 2, 1, 0.8, 4, or 8, and if a plurality of preset characteristic values arranged in a predetermined order from one another are 3, 1, or 8, it is determined that the depth information of the first object satisfies the authentication requirement configured in advance. And if the plurality of preset characteristic values which are arranged in a predetermined sequence among each other are 2, 1 and 4, determining that the depth information of the first object does not meet the preset authentication requirement.
It can be seen that, when determining whether the preset authentication requirement is met, not only is the determined characteristic value included in the preset characteristic values, but also whether the preset appearance sequence of each preset characteristic value is met is determined.
Referring to fig. 6, a process of determining the preset characteristic value in advance is exemplified.
In step S602, a plurality of depth values of the augmented reality glasses and the second object are determined as depth information of the second object by using the depth sensor. As described above, the second object may be the same as the first object or may be different from the first object. For example, 10 depth values of the second object are obtained.
In step S604, a plurality of depth values are determined as depth values to be converted from the second object depth information, wherein each depth value to be converted is a depth value to be converted into a feature value, which are arranged in chronological order of detection by the depth sensor. For example, 3 depth values to be converted are determined from the 10 depth values. Specifically, the depth values to be converted may be selected by the user, or may be selected by the augmented reality glasses, and then the depth values to be converted are displayed through the display interface of the augmented reality glasses, so that the user can know the depth values.
In step S606, a feature value corresponding to each depth value to be converted may be determined as a preset feature value by using a pre-configured mapping relationship table.
It should be understood that the process of detecting the depth values in step S42 is a process of detecting in real time, that is, each time a depth value is detected, the depth value is displayed on the display interface of the augmented reality glasses, and a determination process of whether the authentication requirement is satisfied is performed.
And changing a display style of the current depth value on the display interface if the determined feature value of the current depth value corresponds to a target feature value among a plurality of preset feature values arranged in a predetermined order with respect to each other.
Still by way of example, in the case where the plurality of preset feature values arranged in a predetermined order among each other are 3, 1, 8, if the depth information of the first object is 20cm, 15cm, 12cm, 10cm, 8cm, 18cm, 30cm, the display styles of these on the display interface are changed respectively in the case where the current depth values are 15cm, 10cm, 30cm, respectively. Therefore, the function of reminding the user is achieved.
Specifically, the change of the display style includes, but is not limited to, changing the font size, changing the font color, changing the font flicker degree, and the like, which is not limited by the present disclosure.
In addition, in the case that the augmented reality glasses are in communication connection with a terminal device and the whole authentication process is an authentication process for the terminal device, after the augmented reality glasses determine that the authentication passes, the augmented reality glasses may send information representing that the authentication passes to the terminal device, so that the terminal device performs an operation after the authentication passes. For example, the terminal device completes unlocking, payment and the like.
It should be understood that the authentication scheme of the present disclosure may replace the existing scheme of authentication using password input, fingerprint, facial recognition, etc., and can help to improve the security of authentication.
In addition, in other embodiments of the present disclosure, after a preset time elapses after the depth sensor of the augmented reality glasses is turned on, for example, 60s after the depth sensor starts to detect the depth, if the determined depth information of the first object does not satisfy the preconfigured authentication requirement, the authentication failure is indicated, and the information of the authentication failure may be displayed on the display interface of the augmented reality glasses.
An application scenario of the disclosed solution will be explained with reference to fig. 7.
When a user wants to unlock a corresponding function (e.g., a computing, rendering, etc. function) of an application, this may be accomplished by means of augmented reality glasses 71.
Specifically, the user may preset an authentication password corresponding to the function, for example, the authentication password is a feature value 5, 2, or 3. In the case where the correspondence relationship between the feature value and the depth value is known in advance, the depth values corresponding to the feature values 5, 2, and 3 can be obtained as 15cm, 6cm, and 9 cm. Just as the mobile phone needs to be unlocked at present, the user knows the unlocking password.
In the authenticated scenario, the user needs to wear augmented reality glasses 71, and in the case of turning on the depth sensor, the user can select one box 72 in the real world as the object for sensing depth.
At this time, the depth value of the box 72 may be displayed in real time on the display interface of the augmented reality glasses 71. Such as showing a current depth value of 30cm on the lens.
When the user sees the box 72 with a depth value of 30cm, he can know that it is farther from the box 72 than the first 15cm of the password, and at this time, he can move toward the box 72.
In the case where 15cm is displayed on the lens, the user may stay for a certain time (e.g., 3s, 5s, etc.) as one digit of the password. Alternatively, the user may confirm the current depth value as one bit of the password by voice or by touching a control on the glasses. In this case, the augmented reality glasses would record the depth value and compare it with the pre-configured password.
Subsequently, the user continues to move forward, and in the case of 6cm displayed on the lens, the user confirms the current depth value as one bit of the password, for example, by staying for a certain time or by voice or by touching and pressing a control on the glasses. In this case, the augmented reality glasses continue to record the comparison.
Next, the user may move back, and in the case that 9cm is displayed on the lens, the user may determine another password by using the same manner of confirming the depth.
Thus, the augmented reality glasses record the depth of 15cm, 6cm, 9cm, and correspond to the feature values of 5, 2, 3, thereby passing the authentication. In this case, the augmented reality glasses unlock the corresponding function by themselves.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Further, the present example embodiment also provides an authentication device based on augmented reality glasses.
Fig. 8 schematically illustrates a block diagram of an augmented reality glasses-based authentication apparatus according to an exemplary embodiment of the present disclosure. Augmented reality glasses are equipped with depth sensors. Referring to fig. 8, the augmented reality glasses-based authentication apparatus 8 according to an exemplary embodiment of the present disclosure may include a depth information determination module 81 and an authentication module 83.
In particular, the depth information determining module 81 may be configured to determine depth information of the first object using a depth sensor; the depth information of the first object is displayed on a display interface of the augmented reality glasses; the authentication module 83 may be configured to pass the authentication if the depth information of the first object meets a pre-configured authentication requirement.
According to an exemplary embodiment of the present disclosure, in a case where a distance between the augmented reality glasses and the first object is changed, the depth information of the first object includes a plurality of depth values determined in chronological order.
According to an example embodiment of the present disclosure, the authentication module 83 may be configured to perform: judging whether the plurality of depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence; and if the plurality of depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence, determining that the depth information of the first object meets the preset authentication requirement.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: determining depth information of a second object by using a depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed; a plurality of depth values are determined as a plurality of preset depth values from the depth information of the second object.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: changing a display style of the current depth value on the display interface if the determined current depth value corresponds to a target depth value among a plurality of preset depth values arranged in a predetermined order with respect to each other.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: determining characteristic values corresponding to the depth values, wherein the characteristic values are arranged according to time sequence; judging whether the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values configured according to a preset sequence; and if the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values which are configured according to a preset sequence, determining that the depth information of the first object meets the pre-configured authentication requirement.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: determining depth information of a second object by using a depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed; determining a plurality of depth values as depth values to be converted from the depth information of the second object; wherein, the depth values to be converted are arranged according to the time sequence detected by the depth sensor; and determining a characteristic value corresponding to each depth value to be converted as a preset characteristic value.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: and changing a display style of the current depth value on the display interface if the determined feature value of the current depth value corresponds to a target feature value among a plurality of preset feature values arranged in a predetermined order with respect to each other.
According to an exemplary embodiment of the present disclosure, the augmented reality glasses are communicatively connected with a terminal device, in this case, referring to fig. 9, the augmented reality glasses-based authentication apparatus 9 may further include an information transmission module 91 compared to the augmented reality glasses-based authentication apparatus 8.
Specifically, after the augmented reality glasses determine that the authentication is passed, information representing that the authentication is passed is sent to the terminal device, so that the terminal device executes the operation after the authentication is passed.
According to an exemplary embodiment of the present disclosure, the authentication module 83 may be further configured to perform: and after a preset time passes since the depth sensor is started, if the depth information of the first object does not meet the pre-configured authentication requirement, displaying the information of authentication failure on a display interface.
Since each functional module of the authentication device based on augmented reality glasses according to the embodiment of the present disclosure is the same as that in the embodiment of the method described above, it is not described herein again.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Furthermore, the above-described figures are merely schematic illustrations of processes included in methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the terms of the appended claims.
Claims (13)
1. An augmented reality glasses-based authentication method, wherein the augmented reality glasses are equipped with a depth sensor, the authentication method comprising:
determining, with the depth sensor, depth information of a first object; wherein the depth information of the first object is displayed on a display interface of the augmented reality glasses;
and if the depth information of the first object meets the preset authentication requirement, the authentication is passed.
2. The authentication method according to claim 1, wherein the depth information of the first object includes a plurality of depth values determined in chronological order when the distance between the augmented reality glasses and the first object changes.
3. The authentication method according to claim 2, characterized in that the authentication method comprises:
judging whether the depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence;
and if the depth values determined according to the time sequence comprise a plurality of preset depth values configured according to a preset sequence, determining that the depth information of the first object meets the preset authentication requirement.
4. The authentication method according to claim 3, further comprising:
determining depth information of a second object by using the depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed;
determining a plurality of depth values as the plurality of preset depth values from the depth information of the second object.
5. The authentication method according to claim 3, further comprising:
changing a display style of the current depth value on the display interface if the determined current depth value corresponds to a target depth value among the plurality of preset depth values arranged in a predetermined order therebetween.
6. The authentication method according to claim 2, characterized in that the authentication method comprises:
determining characteristic values corresponding to the depth values, wherein the characteristic values are arranged according to time sequence;
judging whether the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values configured according to a preset sequence;
and if the plurality of characteristic values arranged according to the time sequence comprise a plurality of preset characteristic values configured according to a preset sequence, determining that the depth information of the first object meets the preset authentication requirement.
7. The authentication method of claim 6, further comprising:
determining depth information of a second object by using the depth sensor in advance under the condition that the distance between the augmented reality glasses and the second object is changed;
determining a plurality of depth values from the depth information of the second object as depth values to be converted; the depth values to be converted are arranged according to the time sequence detected by the depth sensor;
and determining a characteristic value corresponding to each depth value to be converted as the preset characteristic value.
8. The authentication method of claim 6, further comprising:
changing a display style of the current depth value on the display interface if the determined feature value of the current depth value corresponds to a target feature value among the plurality of preset feature values arranged in a predetermined order with respect to each other.
9. The authentication method of claim 1, wherein the augmented reality glasses are communicatively connected to a terminal device, the authentication method further comprising:
and after the augmented reality glasses determine that the authentication is passed, sending information representing that the authentication is passed to the terminal equipment so that the terminal equipment can execute the operation after the authentication is passed.
10. The authentication method according to any one of claims 1 to 9, characterized in that the authentication method further comprises:
and after a preset time elapses since the depth sensor is started, if the depth information of the first object does not meet the pre-configured authentication requirement, displaying information of authentication failure on the display interface.
11. An augmented reality glasses-based authentication apparatus, the augmented reality glasses being equipped with a depth sensor, the authentication apparatus comprising:
a depth information determination module for determining depth information of the first object using the depth sensor; wherein the depth information of the first object is displayed on a display interface of the augmented reality glasses;
and the authentication module is used for passing the authentication if the depth information of the first object meets the pre-configured authentication requirement.
12. A computer-readable storage medium on which a computer program is stored, the program, when executed by a processor, implementing an augmented reality glasses-based authentication method according to any one of claims 1 to 10.
13. An electronic device, comprising:
a processor;
a memory for storing one or more programs that, when executed by the processor, cause the processor to implement the augmented reality glasses-based authentication method of any one of claims 1 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110467018.2A CN113204754B (en) | 2021-04-28 | 2021-04-28 | Authentication method and device, medium and electronic equipment based on augmented reality glasses |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110467018.2A CN113204754B (en) | 2021-04-28 | 2021-04-28 | Authentication method and device, medium and electronic equipment based on augmented reality glasses |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113204754A true CN113204754A (en) | 2021-08-03 |
CN113204754B CN113204754B (en) | 2023-01-31 |
Family
ID=77029195
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110467018.2A Active CN113204754B (en) | 2021-04-28 | 2021-04-28 | Authentication method and device, medium and electronic equipment based on augmented reality glasses |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113204754B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140125574A1 (en) * | 2012-11-05 | 2014-05-08 | Mike Scavezze | User authentication on display device |
CN104036169A (en) * | 2014-06-06 | 2014-09-10 | 北京智谷睿拓技术服务有限公司 | Biometric authentication method and biometric authentication device |
CN104038489A (en) * | 2014-06-06 | 2014-09-10 | 北京智谷睿拓技术服务有限公司 | Biological authentication method and biological authentication device |
US9147061B1 (en) * | 2013-11-22 | 2015-09-29 | Google Inc. | Multi-level authentication |
US20160012631A1 (en) * | 2014-07-09 | 2016-01-14 | Lg Electronics Inc. | Display device having scope of accreditation in cooperation with depth of virtual object and controlling method thereof |
US20160378968A1 (en) * | 2015-06-27 | 2016-12-29 | Intel Corporation | Technologies for depth-based user authentication |
US20190370527A1 (en) * | 2018-06-01 | 2019-12-05 | Lg Electronics Inc. | Biometric authentication device |
-
2021
- 2021-04-28 CN CN202110467018.2A patent/CN113204754B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140125574A1 (en) * | 2012-11-05 | 2014-05-08 | Mike Scavezze | User authentication on display device |
US9147061B1 (en) * | 2013-11-22 | 2015-09-29 | Google Inc. | Multi-level authentication |
CN104036169A (en) * | 2014-06-06 | 2014-09-10 | 北京智谷睿拓技术服务有限公司 | Biometric authentication method and biometric authentication device |
CN104038489A (en) * | 2014-06-06 | 2014-09-10 | 北京智谷睿拓技术服务有限公司 | Biological authentication method and biological authentication device |
US20160012631A1 (en) * | 2014-07-09 | 2016-01-14 | Lg Electronics Inc. | Display device having scope of accreditation in cooperation with depth of virtual object and controlling method thereof |
US20160378968A1 (en) * | 2015-06-27 | 2016-12-29 | Intel Corporation | Technologies for depth-based user authentication |
US20190370527A1 (en) * | 2018-06-01 | 2019-12-05 | Lg Electronics Inc. | Biometric authentication device |
Also Published As
Publication number | Publication date |
---|---|
CN113204754B (en) | 2023-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3692461B1 (en) | Removing personally identifiable data before transmission from a device | |
US10565763B2 (en) | Method and camera device for processing image | |
US9607138B1 (en) | User authentication and verification through video analysis | |
EP3447685A1 (en) | Method for obtaining biometric information using light source sets with different properties corresponding to biometric information and electronic device thereof | |
CN104933344A (en) | Mobile terminal user identity authentication device and method based on multiple biological feature modals | |
US12175791B2 (en) | Fingerprint recognition method and electronic device | |
TW201814572A (en) | Facial recognition-based authentication | |
TWI706270B (en) | Identity recognition method, device and computer readable storage medium | |
CN105278670A (en) | Eyewear-type terminal and method for controlling the same | |
CN111432245B (en) | Multimedia information playing control method, device, equipment and storage medium | |
KR20170000128A (en) | Mobile electric document system of multiple biometric | |
CN111131702A (en) | Method and device for acquiring image, storage medium and electronic equipment | |
KR20190121758A (en) | Information processing apparatus, information processing method, and program | |
CN108351960A (en) | Electronic device with improved iris recognition and method thereof | |
US20180150722A1 (en) | Photo synthesizing method, device, and medium | |
CN111783674A (en) | Face recognition method and system based on AR glasses | |
CN108363939A (en) | The acquisition methods and acquisition device of characteristic image, user authen method | |
KR20190021049A (en) | Electronic device and method for identifying object based on setting region-of-interest by using the same | |
CN103870735A (en) | Unlocking processing method and device | |
KR20190048630A (en) | Electric terminal and method for controlling the same | |
CN113204754A (en) | Authentication method and device based on augmented reality glasses, medium and electronic equipment | |
JP2015082685A (en) | Camera and program | |
KR101314687B1 (en) | Providing device of eye scan path and mehtod for providing eye scan path | |
CN117095456A (en) | Examination behavior detection method and device, electronic equipment and storage medium | |
CN113239887B (en) | Living body detection method and device, computer readable storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |