Method, apparatus, and system for resource transfer

ABSTRACT

A method for resource transfer, includes: acquiring a front face image, and a side face image from at least one side, of a target user; performing a liveness detection and an identity recognition on the target user based on the front face image and the side face image; and executing, if a liveness detection result is that the target user is a live user and an identity recognition result is that the target user is an authorized user of a target electronic account, resource transfer on the target electronic account.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is based upon and claims priority to Chinese PatentApplication No. 201811024632.6, filed on Sep. 4, 2018, the entire intentof all of which is incorporated herein by reference.

TECHNICAL FIELD

The present application relates to the field of the Internet, and moreparticularly, to a method, apparatus, and system for resource transfer.

TECHNICAL BACKGROUND

With the rapid development of information technologies, people can useus terminals, such as mobile phones, tablet computers, and vendingmachines, to perform resource transfer. When a user intends to use aterminal for resource transfer, in order to protect the security of anelectronic account of the user, generally only after the user enters acorrect payment password, will resource transfer on the electronicaccount be executed, thereby completing resource transfer.

However, the mode of resource transfer by password authentication maycause password leakage, resulting in a problem of security risks inelectronic accounts. Or, when the user forgets the password, resourcetransfer cannot be carried out.

Therefore, how to improve the security of users' electronic accounts andenable users to transfer resources without entering their passwords hasbecome a technical problem to be solved.

SUMMARY

An objective of embodiments of the specification is to provide a method,apparatus, and system for resource transfer. During resource transfer,whether a target user is an authorized user of a target electronicaccount is verified by an identity recognition based on a front faceimage and a side face image of the target user, and resource transfercan be carried out without entering a password by a user, therebyavoiding a situation that resource transfer cannot be carried outbecause the user forgets the password. In addition, whether the targetuser is a live user is verified by a liveness detection based on thefront face image and the side face image, avoiding the problem ofsecurity risks in electronic accounts caused by face images of usersbeing acquired by others, thereby improving the security of theelectronic accounts. Moreover, more feature information is added bycombining the front face image and the side face image during theliveness detection and the identity recognition, thereby improving theaccuracy of the liveness detection and the identity recognition, andfurther protecting the security of users' electronic accounts.

In an embodiment, a method for resource transfer includes: acquiring afront face image, and a side face image from at least one side, of atarget user; performing a liveness detection and an identity recognitionon the target user based on the front face image and the side faceimage; and executing, if a liveness detection result is that the targetuser is a live user and an identity recognition result is that thetarget user is an authorized user of a target electronic account,resource transfer on the target electronic account.

In an embodiment, an apparatus for resource transfer includes: anacquisition module configured to acquire a front face image, and a sideface image from at least one side, of a target user; an identificationmodule configured to perform a liveness detection and an identityrecognition on the target user based on the front face image and theside face image; and an execution module configured to execute, if aliveness detection result is that the target user is a live user and anidentity recognition result is that the target user is an authorizeduser of a target electronic account, resource transfer on the targetelectronic account.

In an embodiment, a system for resource transfer includes: a clientterminal device and a resource transfer server, wherein the clientterminal device is provided with a front face image capturing device andat least one side face image capturing device; wherein the clientterminal device is configured to control the front face image capturingdevice to capture a front face image of a target user and the at leastone side face image capturing device to capture a side face image of thetarget user simultaneously; and send the front face image and the sideface image to the resource transfer server; and the resource transferserver is configured to acquire the front face image and the side faceimage of the target user; perform a liveness detection and an identityrecognition on the target user based on the front face image and theside face image; and execute, if a liveness detection result is that thetarget user is a live user and an identity recognition result is thatthe target user is an authorized user of a target electronic account,resource transfer on the target electronic account.

In an embodiment, a device for resource transfer includes: a processor;and a memory configured to store instructions, wherein the processor isconfigured to execute the instructions to: acquire; a front face image,and a side face image from at least one side, of a target user; performa liveness detection and an identity recognition on the target userbased on the front face image and the side face image; and execute, if aliveness detection result is that the target user is a live user and anidentity recognition result is that the target user is an authorizeduser of a target electronic account, resource transfer on the targetelectronic account.

In an embodiment, a storage medium has stored thereon computerexecutable instructions that, when executed by a process of a device,cause the device to perform a method for resource transfer, the methodincluding: acquiring a front face image, and a side face image from atleast one side, of a target user; performing a liveness detection and anidentity recognition on the target user based on the front face imageand the side face image; and executing, if a liveness detection resultis that the target user is a live user and an identity recognitionresult is that the target user is an authorized user of a targetelectronic account, resource transfer on the target electronic account.

According to the technical solutions provided in the embodiments,whether a target user is an authorized user of a target electronicaccount is verified by an identity recognition based on a front faceimage and a side face image of the target user during resource transfer,and resource transfer can be carried out without entering a password bya user, thereby avoiding a situation that resource transfer cannot becarried out because the user forgets the password. In addition, whetherthe target user is a live user is verified by a liveness detection basedon the front face image and the side face image, avoiding the problem ofsecurity risks in electronic accounts caused by face images of usersbeing acquired by others, thereby improving the security of theelectronic accounts. Moreover, more feature information is added bycombining the front face image and the side face image during theliveness detection and the identity recognition, thereby improving theaccuracy of the liveness detection and the identity recognition, andfurther protecting the security of users' electronic accounts.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate embodiments and, together withthe description, serve to explain the principles of the specification.

FIG. 1 is a flowchart of a method for resource transfer according to anembodiment.

FIG. 2(a) is a schematic diagram of a captured front face image of atarget user according to an embodiment.

FIG. 2(b) is a schematic diagram of a captured side face image of thetarget user according to an embodiment.

FIG. 3(a) is a flowchart of a method of performing a liveness detectionon a target user according to an embodiment.

FIG. 3(b) is a schematic diagram of a combined front face image and sideface image according to an embodiment.

FIG. 3(c) is a schematic diagram of a combined front face image and sideface image according to an embodiment.

FIG. 3(d) is a schematic diagram of a combined front face image and sideface image according to an embodiment.

FIG. 3(e) is a flowchart of a method of performing liveness detection ona target user according to an embodiment.

FIG. 4(a) is a schematic diagram of key points on a side face imageaccording to an embodiment.

FIG. 4(b) is a schematic diagram of a standard e face image afterconversion according to an embodiment.

FIG. 5 is a flowchart of a method for resource transfer according to anembodiment.

FIG. 6 is a flowchart of a method for resource transfer according to anembodiment

FIG. 7 is a flowchart of a method for resource transfer according to anembodiment.

FIG. 8 is a schematic diagram of an apparatus for resource transferaccording to an embodiment.

FIG. 9 is a schematic diagram of a system for resource transferaccording to an embodiment.

FIG. 10 is a schematic diagram of a system for resource transferaccording to an embodiment.

FIG. 11 is a schematic diagram of a client terminal device in a systemfor resource transfer according to an embodiment

FIG. 12 is a schematic diagram of a device for resource transferaccording to an embodiment.

DETAILED DESCRIPTION

Embodiments of the specification will be described below with referenceto the accompanying drawings. The described embodiments are merelyexamples, rather than all embodiments consistent with the specification.All other embodiments obtained by those of ordinary skill in the artbased on the described embodiments shall fall within the scope ofprotection of the present application.

The embodiments of the specification provide a method for resourcetransfer. In the method, based on a front face image and a side faceimage of a target user, a liveness detection and an identity recognitionon the target user are performed before executing resource transfer. Bycombining the front face image with the side face image, the accuracy ofthe identity recognition is improved. Moreover, the occurrence of fraudby using non-live images, such as photos, images displayed on a mobilephone screen, photos printed on paper and the like, can be preventedthrough the liveness detection, thereby improving the security of users'account numbers. Furthermore, resource transfer can be carried outwithout entering a password by a user, thereby avoiding a situation thatresource transfer cannot be carried out because the user forgets thepassword.

The method for resource transfer provided in the embodiments may beapplied to a server side, for example, an execution entity of the methodis a server. The resource mentioned in the embodiments of thespecification may be money, virtual currency, credits, etc. Accordingly,the resource transfer may be a payment operation, a virtual currencypayment operation, a credits exchange operation, or the like.

FIG. 1 is a flowchart of a method 100 for resource transfer according toan embodiment. The method 100 includes the following steps.

In step 102, a front face image, and a side face image from at least oneside, of a target user are acquired.

The side face image from at least one side may be a side face image fromany one side or side face images from two sides, and therefore, the step102 may include the following: three situations: acquiring the frontface image and a side face image of a left side of the target user;acquiring the front face image and a side face image of a right side ofthe target user; and acquiring the front face image, the side face imageof the left side, and the side face image of the right side of thetarget user.

The front face image may be an image photographed right in front of thetarget user and includes the entire face of the target user. A frontface image 200 is shown in FIG. 2(a) as an example. The side face imagemay be an image photographed from one side of the target user andgenerally does not include the entire face of the target user. A sideface image 210 is shown in FIG. 2(b) as an example.

In step 102, the front face image and the side face image of the targetuser may be acquired from a client terminal device. In an embodiment,the front face image, and the side face image from at least one side, ofthe target user may be captured by the client terminal device and sentto a server.

The client terminal device may be a terminal device, such as a mobilephone or a tablet computer, or may be a vending machine, or the like.The client terminal device may capture the front face image and the sideface image of the target user simultaneously or successively in asequential order. If the client terminal device captures the front faceimage and the side face image of the target user successively in asequential order, the client terminal device may first capture the frontface image of the target user, and then capture the side face image ofthe target user; or may first capture the side face image of the targetuser, and then capture the front face image of the target user.

The process of capturing the front face image and the side face image isillustrated below by taking the resource transfer being a paymentoperation as an example.

In an embodiment, a vending machine may be provided with a front faceimage capturing device and at least one side face image capturingdevice. In this embodiment, when a user purchases goods and intends tomake a payment through the vending machine, the user can put his/herface in a specific region under the guidance of the vending machine,thereby completing capturing of the front face image and the side faceimage.

In an embodiment, the vending machine may also be provided with merelyone image capturing device. In this embodiment, when the user purchasesgoods and intends to make a payment through the vending machine, theuser can put his/her face in a first specific region under the guidanceof the vending machine to capture the front face image. After completingcapturing of the front face image, the user puts his/her face in asecond specific region under the guidance of the vending machine tocapture the side face image.

In an embodiment, when the user is to make a payment using a terminaldevice, such as a mobile phone or a tablet computer, the user may alsofirst capture the front face image and then capture the side face imageas prompted by the terminal device.

Referring back to FIG. 1, in step 104, a liveness detection and anidentity recognition on the target user based on the front face imageand the side face image are performed.

In the embodiments of the specification, the liveness detection isperformed to prevent occurrence of a situation that a target electronicaccount is stolen by outputting an image of the target user, which isacquired by other users, to a carrier (such as a photo, a mobile phonescreen, paper printing, or a gum mask) to generate a non-liverepresentation of a user for identity recognition. The identityrecognition is performed to authenticate whether the target user is anauthorized user of the target electronic account.

In an embodiment, the liveness detection and the identity recognitionmay be performed simultaneously. In an embodiment, the livenessdetection may be performed first, and after the liveness detectionresult indicates that the target user is a live user, the identityrecognition is performed. In an embodiment, the identity recognition maybe performed first, and when the identity recognition result indicatesthat the target user is an authorized user of the target electronicaccount, the liveness detection is performed.

In the embodiments of the specification, if the liveness detection andthe identity recognition are performed simultaneously, then the timeconsumption of resource transfer may be shortened, resulting in betteruser experience. On the other hand, if the two processes are performedin a sequential order, resource transfer failure may be determined ifthe target user being not a live user or the target user being not anauthorized user of the target electronic account is first identified,and it is not necessary to further execute subsequent steps, therebyreducing workload of the server.

In step 106, if the liveness detection result is that the target user isa live user and the identity recognition result is that the target useris an authorized user of a target electronic account, resource transferon the target electronic account is executed.

For example, the executing resource transfer on the target electronicaccount may be executing money deducting operations, credits deductingoperations, or the like on the target electronic account.

In an embodiment, in step 104, the liveness detection is performed firstand then the identity recognition is performed. For example, theliveness detection and the identity recognition on the target user areperformed based on the front face image and the side face image, andstep 104 may include step (1) and step (2):

Step (1): performing the liveness detection on the target user based onthe front face image and the side face image.

Step (2): if the liveness detection result is that be target user is alive user, identifying whether the target user is an authorized user ofa target electronic account based on the front face image and the sideface image.

The authorized user of the target electronic account may be a targetelectronic account holder, or other users authorized by the targetelectronic account holder to use the target electronic account.

In the embodiments of the specification, performing the livenessdetection on the target user in the above step (1) may include approachI and approach II:

In approach I, performing the liveness detection on the target userbased on the front face image and the side face image may include step Iand step II.

Step I: inputting the front face image into a pre-trained first livenessdetection model for processing to acquire a first probability outputtedfrom the first liveness detection model; and inputting the side faceimage into a pre-trained second liveness detection model for processingto acquire a second probability outputted from the second livenessdetection model. The first probability and the second probability areeach a probability that the target user is a live user; or the firstprobability and the second probability are each a probability that thetarget user is a non-live representation of a user.

Step II: identifying whether the target user is a live user based on thefirst probability and the second probability. The first livenessdetection model and the second liveness detection model may be samemodels. In an embodiment, in order to shorten the time consumption ofthe liveness detection and improve the efficiency of the livenessdetection, the front face image and the side face image are inputtedinto two liveness detection models respectively, whilst performingliveness detection on the target user based on the front face image andthe side face image simultaneously.

In some embodiments, a liveness detection model may be pre-trained, thefront face image may be first inputted into the liveness detection modelfor processing to acquire a first probability outputted from theliveness detection model, and then the side face image may be inputtedinto the liveness detection model for processing to acquire a secondprobability outputted from the liveness detection model.

In some embodiments, if the side face image of the left side and theside face image of the right side of the target user are capturedsimultaneously, then three liveness detection models may be pre-trained,the front face image is inputted into a first one of the livenessdetection models for processing, the side face image of the left side isinputted into a second one of the liveness detection models forprocessing, and the side face image of the right side is inputted into athird one of the liveness detection models for processing, to obtainthree probabilities.

In an embodiment, a process of inputting the front face image into thefirst liveness detection model for processing may be the same as aprocess of inputting the side face image into the second livenessdetection model for processing. A specific process of obtaining thefirst probability from the first liveness detection model will beintroduced below by taking inputting the front face image into the firstliveness detection model as an example.

In an embodiment, the first liveness detection model and the secondliveness detection model may each be a Convolutional Neural Network(CNN) model. In the embodiments of the specification, a CNN binaryclassification model may be employed. The CNN binary classificationmodel may be trained by pre-collecting a face image sample of a liveuser and a face image sample of a non-live representation of a user, andannotating the face image sample of the live user and the face imagesample of the non-live: representation of a user, respectively.

After inputting the front face image of the target user into CNN,convolution processing is performed on the front face image using apre-trained convolutional kernel, a sum of a value obtained byconvolution and an offset parameter is inputted into an activationfunction, and an output of the activation function is used as a value ofa node in a next layer. The convolution processing is continued in thenext layer, a sum of a value obtained by convolution and the offsetparameter is inputted into the activation function to obtain an outputvalue of the activation function until the last layer, and the outputvalue of the activation function is used as the first probability.

The output value of the activation function may be the probability thatthe target user is a live user, or the probability that the target useris a non-live representation of a user, and may be set based on anactual application scenario.

Identifying whether the target user is a live user based on the firstprobability and the second probability in the above step II may includethe following processes: performing a fusion calculation on the firstprobability and the second probability to obtain a fusion resultcorresponding to the first probability and the second probability; andidentifying whether the target user is a live user based on the fusionresult and a set probability threshold.

In the embodiments of the specification, the first probability isdenoted as P₁, the second probability is denoted as P₂, and a fusioncalculation may be performed on the first probability and the secondprobability based on the following formula.

P=W ₁ *P ₁ W ₂ *P ₂

where W₁ is a weight coefficient corresponding to the first probability,W₂ is a weight coefficient corresponding to the second probability, andP is the fusion result of the first probability and the secondprobability.

If the first probability and the second probability are each theprobability that the target user is a live user, after calculating thefusion result of the first probability and the second probability, thefusion result may be compared with the set probability threshold. If thefusion result is greater than or equal to the set probability threshold,then the target user can be determined as a live user. On the otherhand, if the fusion result is less than the set probability threshold,then the target user can be determined as a non-live representation of auser.

If the first probability and the second probability are each theprobability that the target user is a non-live representation of a user,then after calculating the fusion result of the first probability andthe second probability, the fusion result may be compared with the setprobability threshold. If the fusion result is greater than or equal tothe set probability threshold, then the target user can be determined asa non-live representation of a user. On the other hand, if the fusionresult is less than the set probability threshold, then the target usercan be determined as a live user.

In an embodiment, the value of the set probability threshold when thefirst probability and the second probability are each the probabilitythat the target user is a live user, and the value of the setprobability threshold when the first probability and the secondprobability are each the probability that the target user is a non-liverepresentation of a user may be identical or different. For example, thevalues of the set probability threshold may be set based on an actualapplication scenario. This is not limited in the embodiments of thespecification.

FIG. 3(a) is a flowchart of a method 300 for identifying whether thetarget user is a live user, according to an embodiment. Referring toFIG. 3(a), in the method 300, a first liveness detection model and asecond liveness detection model are each a CNN model, the first livenessdetection model uses a CNN model 306, and the second liveness detectionmodel uses a CNN model 308. A front face image 302 of the target usermay be inputted into the CNN model 306, and the CNN model 306 processesthe front face image 302. A side face image 304 of the target user maybe inputted into the CNN model 308, and the CNN model 308 processes theside face image 304. The first probability that the target user is anon-live representation of a user is acquired from the CNN model 306(step 310), and the second probability that the target user is anon-live representation of a user is acquired from the CNN model 308(step 312). A fusion calculation is performed on the first probabilityand the second probability (step 314), and the fusion result is comparedwith the set probability threshold (step 316). If the fusion result isgreater than or equal to the set probability threshold, then the targetuser is considered as a non-live representation of a user, and if thefusion result is less than the set probability threshold, then thetarget user is considered as a live user (step 318).

In an embodiment, when the service is in a stage of just coming online,whether the target user is a live user can be identified by thisapproach. In the above approach I, there are low requirements fortraining sample data during model training, and an initial model can befast trained, thereby helping the service to quickly live through astart stage after coming online.

In approach II, performing the liveness detection on the target userbased on the front face image and the side face image may include:inputting the front face image and the side face image into apre-trained third liveness detection model for processing to acquire athird probability outputted from the third liveness detection model;where the third probability is a probability that the target user is alive user, or the third probability is a probability that the targetuser is a non-live representation of a user; and identifying whether thetarget user is a live user based on the third probability and the setprobability threshold.

In this approach, the front face image and the side face image areinputted into the same liveness detection model for processing. Forexample, after the front face image and the side face image are inputtedinto the liveness detection model, the third probability is obtained byfirst preprocessing the front face image and the side face image, andthen processing the preprocessed images.

FIGS. 3(b)-3(d) are schematic diagrams of combined front face images andside face images according to some embodiments. In an embodiment,preprocessing the front face image and the side face image may be fusionprocessing of the front face image and the side face image, for example,fusing the front face image and the side face image into one image. Inan embodiment, a size of the front face image is 640×480×3RGB, a size ofthe side face image is also 640×480×3RGB, and a fused image 320 is640×480×6RGB, as shown in FIG. 3(b). In an embodiment, the front faceimage and the side face image may also be laterally spliced, and aspliced image 330 is 1280×480×3RGB, as shown in FIG. 3(c). In anembodiment, the front face image and the side face image may also belongitudinally spliced, and a spliced image 340 is 640×960×3RGB, asshown in FIG. 3(d). In the embodiments, 640 represents a number of rowpixels in the image, 480 represents a number of column pixels in theimage, and the RGB represents an R value, a G value, and a B valuecorresponding to each pixel. R represents red, G represents green, and Brepresents blue.

In the embodiments, “3” in the 640×480×3RGB represents a total of threevalues, i.e., an R value, a B value, and a G value corresponding to eachpixel point in the image; and “6” in the 640×480×6RGB represents a totalof six values, two R values, two B values, and two G valuescorresponding to each pixel point in the image.

The above description is merely illustrative and does not constitute alimitation to sizes of the front face image and the side face image inthe embodiments of the specification.

In an embodiment, after preprocessing the front face image and the sideface image, a process of processing the preprocessed image may be thesame as the process of processing the front face image or processing theside face image in the above approach I. Reference can be made to theabove approach I for details, which will not be repeated here.

In an embodiment, identifying whether the target user is a live userbased on the third probability and the set probability threshold may bethe same as identifying whether the target user is a live user based onthe fusion result and the set probability threshold in the approach I.Reference can be made to the details in approach I, which will not berepeated here.

FIG. 3(e) is a flowchart of a method 350 for identifying whether thetarget user is a live user by the above described approach II, accordingto an embodiment. Referring to FIG. 3(e), in the method 350, a CNN model356 is used as a third liveness detection model. After inputting a frontface image 352 and a side face image 354 of a target user into the CNNmodel 356, a fused image is obtained by fusion processing of the frontface image 352 and the side face image 354, and then the fused image isprocessed to output the third probability that the target user is anon-live representation of a user. The third probability is comparedwith the set probability threshold (step 358). If the third probabilityis greater than or equal to the set probability threshold, then thetarget user is considered as a non-live representation of a user (step360). On the other hand, if the fusion result is less than be setprobability threshold, then the target user is considered as a live user(step 360).

In an embodiment, a relatively high amount of training sample data needsto be collected during the model training in approach II, for example,there are high requirements for the training sample data. Therefore,this approach may be adopted after the service comes on-line for aperiod of time.

In an embodiment, after the service comes on-line for a period of time,there is not only the liveness detection model in approach I, but alsothe liveness detection model in approach II. In this case, the fusionresult obtained in approach I is re-fused with the third probabilityobtained in approach II (linearly weighted), and whether the target useris a live user is determined based on the final fusion result.

In an embodiment, in the above step (2), performing the identityrecognition on the target user based on the front face image and theside face image includes step (A) and step (B) as follows.

Step (A): performing a similarity comparison between the front faceimage and a recorded front face image corresponding to the targetelectronic account; and performing a similarity comparison between theside face image and a recorded side face image corresponding to thetarget electronic account.

Step (B): performing an identity recognition on the target user based ona front face similarity and a side face similarity. For example,performing the identity recognition on the target user based on a frontface similarity and a side face similarity in step (B) may include:determining the target user as an authorized user of the targetelectronic account if the front face similarity is greater than a firstset threshold and the side face similarity is greater than a second setthreshold.

The first set threshold and the second set threshold are similaritiesthat are set based on an actual application scenario. For example, avalue of the first set threshold may be 95%, a value of the second setthreshold may be 90%, and the like. The description here is merelyillustrative and does not limit specific values of the first setthreshold and the second set threshold. The embodiments of thespecification do not limit the values of the first set threshold and thesecond set threshold. The values of the first set threshold and thesecond set threshold can be set based on an actual application scenario.In addition, the value of the first set threshold may be equal to, ordifferent from, the value of the second set threshold.

In the embodiments of the specification, after performing a similaritycomparison on the front face image and the recorded front face image,and performing a similarity comparison on the side face image and therecorded side face image, the front face similarity is compared with thefirst set threshold, and the side face similarity is compared with thesecond set threshold. If the front face similarity is greater than thefirst set threshold, and the side face similarity is greater than thesecond set threshold, then the target user identification is consideredsuccessful, for example, the target user can be determined as anauthorized user of the target electronic account.

In another embodiment, linear weighting on the front face similarity andthe side face similarity can also be calculated, for example,calculating a first product of the front face similarity and a weightcoefficient of the front face similarity, calculating a second productof the side face similarity and a weight coefficient of the side facesimilarity, then calculating a sum of the first product and the secondproduct, comparing the sum with a set threshold, determining the targetuser as an authorized user of the target electronic account if the sumis greater than or equal to the set threshold, and determining thetarget user as not an authorized user of the target electronic accountif the sum is less than the set threshold.

In an embodiment, performing the similarity comparison between the frontface image and a recorded front face image corresponding to the targetelectronic account in the above step (A) may be implemented through thefollowing processes.

Key points on the front face image are detected using a pre-trained keypoint detection model, where the key points may be both eyes, a nosetip, lips, eyebrows, and the like of the target user. After detectingthe key points on the front face image, the front face image iscalibrated based on positions of the key points. For example, theoriginal face may be biased and in a posture different from a facialposture on a pre-stored recorded front face image. The facial posture onthe front face image may be adjusted by affine transformation based onthese key points, or the front face image may also be zoomed, stretched,rotated, and the like, so that the adjusted front face image has thesame size as the recorded front face image, and has a facial postureconsistent with the facial posture in the recorded front face image.

Then, a convolution operation is performed on the adjusted front faceimage through the convolutional neural network to calculate a firstfront face feature vector of the target user. In addition, if a databasedirectly stores a second front face feature vector corresponding to therecorded front face image, then the second front face feature vectorcorresponding to the target electronic account is acquired directlyfront the database. If the database only stores the recorded front faceimage, then the convolution operation is performed on the recorded frontface image through the convolutional neural network to obtain the secondfront face feature vector corresponding to the target electronicaccount.

Finally, a Euclidean distance between the first front face featurevector and the second front face feature vector is calculated. The.Euclidean distance is determined as a similarity between the front faceimage and the recorded front face image of the target user. For example,traditional methods for calculating a Euclidean distance between twovectors may be used,

In an embodiment, performing the similarity comparison between the sideface image and a recorded side face image corresponding to the targetelectronic account in the above step (A) may be implemented through step(A1), step (A2), and step (A3) as follows:

Step (A1): standardizing the side face image to obtain a standard sideface image; where a size of the standard side face image is a set size,and a side face posture in the standard side face image is a setposture.

Step (A2): extracting a first side face feature vector of the targetuser based on the standard side face image; and acquiring a second sideface feature vector corresponding to the recorded side face image.

Step (A3): calculating a similarity between the side face image and therecorded side face image based on the first side face feature vector andthe second side face feature vector.

In an embodiment, the step (A1) may be performed by: determiningpositions of key points on the side face image; where the key pointsinclude: an ear hole center and a nose tip; and adjusting the side faceimage based on a position of the ear hole center on the side face image,a position of the nose tip on the side face image, and relativepositions of the ear hole center and the nose tip to obtain the standardside face image.

Prior to executing the method provided in the embodiments of thespecification, a large number of side face images of users may becaptured, and then the key points on the side face images are manuallyannotated. Side face images annotated with the key points are used astraining samples, and then a key point detection model is obtained bytraining using the Convolutional Neural Network (CNN).

In an embodiment, feature vectors of the key points may be trainedthrough the convolutional neural network to obtain the key pointdetection model. During key points detection, feature vectors of areason the side face image can be matched with the feature vectors of theabove key points to determine the positions of the key points on theside face image.

In an embodiment, the key point detection model training and the keypoint detection of the side face image may be the same as those of thefront face image, except for the key point selection, which isdifferent. Accordingly, the key points on the side face image may bedetected using the key point detection model obtained by training, andthe key points are annotated on the side face image.

FIG. 4(a) is a schematic diagram of key points on a side face imageaccording to an embodiment. Referring to FIG. 4(a), for example, the keypoints selected on a side face image 400 may be an ear hole center 410,a midpoint between eyebrows 412, a nose tip 414, a chin tip 416, and ajawbone joint 418. The selected key points on the side face image mayalso be other key points, and FIG. 4(a) is merely an illustrativeexample.

After determining the positions of the key points on the side faceimage, the side face image may be calibrated by using any two or morekey points thereof.

A specific process of adjusting the side face image to obtain a standardside face image will be described below by taking adjusting the sideface image based on two key points (the ear hole center and the nosetip) as an example.

First, as shown in FIG. 4(b), a coordinate system may be establishedwith a top left corner of the side face image as the origin (0,0), ahorizontal side edge as the horizontal axis X, and a vertical side faceas the longitudinal axis Y, and the side face image is compressed,stretched, cut, or otherwise processed so that coordinates of the earhole center in the coordinate system are (W/2, H/2), that is, causingthe ear hole center to be at a center point of the side face image,where W represents a length of the side face image, and H represents aheight of the side face image. Then, the side face image begins torotate with the ear hole center as the center point, until a connectionline between the ear hole center and the nose tip is parallel to thehorizontal axis X in the coordinate system. Finally, the side face imageis compressed or stretched again, so that coordinates of the nose tip inthe coordinate system are (3W/4, H/2). A standard side face image 410obtained after the adjustment is shown in FIG. 4(b).

The above description merely shows an example of standardizing the sideface image. The side face image may also be standardized using other keypoints. The above standard side face image is not limited to aparticular form, and may also be in other forms.

The purpose of standardizing the side face image is to keep the size ofand a facial posture in the side face image consistent with the size ofand the facial posture in the recorded side face image. For example, inthe embodiments, the recorded side face image s stored in a form of thestandard side face image. In an embodiment, when performing thesimilarity comparison on the side face image, the side face image isadjusted to have the same size and posture as the recorded side faceimage, in order to improve the accuracy of the side face similaritycomparison.

In step (A2), after obtaining the standard side face image, the sideface image is processed, and a convolution operation is performed on thestandard side face image through the convolutional neural network toobtain the first side face feature vector of the side face image.

In the embodiments, the database may only pre-store the recorded sideface image corresponding to the authorized user of the target electronicaccount. The recorded side face image is stored in the form of thestandard side face image. Therefore, in step (A2), a convolutionoperation may be performed on the recorded side face image through theconvolutional neural network to extract the second side face featurevector. The second side face feature vector corresponding to therecorded side face image may also be acquired in advance, and the secondside face feature vector and the recorded side face image are storedtogether in the database in this case, in step (A2), it is onlynecessary to acquire the second side face feature vector from thedatabase.

In an embodiment, calculating a similarity between the side face imageand the recorded side face image based on the first side face featurevector and the second side face feature vector in the above step (A3)includes: calculating a Euclidean distance between the first side facefeature vector and the second side face feature vector; and determiningthe Euclidean distance as a similarity between the side face image andthe recorded side face image. The details of calculating the Euclideandistance between two vectors is omitted here.

FIG. 5 is a flowchart of a method 500 for resource transfer according anembodiment. An executing entity of the method 500 may be a server side.Referring to FIG. 5, the method 500 includes the following steps:

Step 502: acquiring a front face image, and a side face image from atleast one side, of a target user. In the embodiment, the front faceimage and the side face image of the target user may be captured by aclient terminal device. Therefore, the server acquires the front faceimage and the side face image of the target user from the clientterminal device.

Step 504: inputting the front face image into a pre-trained firstliveness detection model for processing to acquire a first probabilityoutputted from the first liveness detection model; and inputting theside face image into a pre-trained second liveness detection model forprocessing to acquire a second probability outputted from the secondliveness detection model.

The first probability and the second probability may be a probabilitythat the target user is a live user; or a probability that the targetuser is a non-live representation of a user. In the embodimentcorresponding to FIG. 5, the description is provided by taking the firstprobability and the second probability being a probability that thetarget user is a non-live representation of a user as an example.

Step 506: performing a fusion calculation n the first probability andthe second probability to obtain a fusion result corresponding to thefirst probability and the second probability.

Step 508: determining whether the fusion result is greater than or equalto a set probability threshold; and executing step 516 if the fusionresult is greater than or equal to the set probability threshold;otherwise, executing step 510.

Step 510: performing a similarity comparison between the front faceimage and a recorded front face image corresponding to a targetelectronic account; and performing a similarity comparison between theside face image and a recorded side face image corresponding to thetarget electronic account.

Step 512: determining whether the front face similarity is greater thana first similarity, and whether the side face similarity is greater thana second similarity; and executing step 514 if the front face similarityis greater than the first similarity, and the side face similarity isgreater than the second similarity; otherwise, executing step 518.

Step 514: executing resource transfer on the target electronic account.

Step 516: determining the target user as a non-live representation of auser, and sending a prompt message of resource transfer failure to aclient terminal device.

Step 518: sending a prompt message of re-capturing face images orresource transfer failure to the client terminal device.

Specific implementation processes of the steps in the embodimentcorresponding to FIG. 5 may be the same as the specific implementationprocesses of the steps in the method corresponding to the aboveembodiments.

FIG. 6 is a flowchart of a method 600 for resource transfer according toan embodiment. The method 600 shown in FIG. 6 takes the resourcetransfer being a payment as an example, and a specific applicationscenario is that a user is to make a payment when purchasing goods on avending machine. The vending machine is provided with a front face imagecapturing device and a side face image capturing device, and is providedwith a payment client terminal. Therefore, the vending machine may alsobecome a client terminal device. Referring to FIG. 6, the method 600includes the following steps:

Step 602: the client terminal device sends a request for logging in toan electronic account to a server, the request carrying a mobile phonenumber. When a user selects goods and is to make a payment through thevending machine, the user sends the request for logging in to theelectronic account number to the server through the client terminaldevice provided on the vending machine.

Step 604: the server determines whether there is an electronic accountcorresponding to the mobile phone number; and executes step 606 if thereis the electronic account corresponding to the mobile phone number;otherwise, executes step 622.

Step 606: the server sends an identity recognition instruction to theclient terminal.

Step 608: the client terminal device controls an image capturing deviceprovided on a vending machine to capture a front face image and a sideface image of a target user after receiving identity recognitioninstruction sent by the server.

A front face image capturing device and a side face image capturingdevice are provided at corresponding positions on the vending machine,and the client terminal device controls the front face image capturingdevice to capture a front face image of the target user and the sideface image capturing device to capture a side face image of the targetuser simultaneously.

Step 610: the client terminal device sends the captured front face imageand side face image of the target user to the server.

Step 612: the server inputs the front face image and the side face imageinto a pre-trained liveness detection model to process the images, andacquires a probability outputted from the liveness detection model. Theprobability nay be a probability that the target user is a live user.

Step 614: the server determines whether the probability is greater thanor equal to a set probability threshold; and executes step 616 if theprobability is greater than or equal to the set probability threshold;otherwise, executes step 624.

Step 616: the server calculates a similarity between the front faceimage and a recorded front face image corresponding to the electronicaccount, and calculates a similarity between the side face image and arecorded side face image corresponding to the electronic account.

Step 618: the server detects whether the front face similarity isgreater than a first set threshold, and whether the side face similarityis greater than a second set threshold; and executes step 620 if thefront face similarity is greater than the first set threshold, and theside face similarity is greater than the second set threshold,otherwise, executes step 626.

Step 620: the server executes a deducting operation on the electronicaccount.

Step 622: the server sends a prompt message of registering an electronicaccount or re-entering the mobile phone number to the client terminaldevice.

Step 624: the server determines the target user as a non-liverepresentation of a user, and sends a prompt message of payment failureto the client terminal device.

Step 626: the server sends a prompt message of re-capturing face imagesor payment failure to the client terminal device.

Specific implementation processes of the steps in the embodimentcorresponding to FIG. 6 may be the same as the specific implementationprocesses of the steps in the embodiments corresponding to the aboveFIG. 1 to FIG. 4(b).

FIG. 7 is a flowchart of a method 700 for resource transfer according toan embodiment. The method 700 shown in FIG. 7 takes the resourcetransfer being a payment as an example, and a specific applicationscenario is that a user is to make a payment through a terminal device,such as a mobile phone or a tablet computer. Referring to FIG. 7, themethod 700 includes the following steps:

Step 702: a terminal device sends a payment request to a server, wherethe payment request carries a payment amount. For example, aftercompleting shopping offline or online, a user opens a paymentapplication program installed on the terminal device to make a payment.

Step 704: the server sends an identity recognition instruction to theterminal device.

Step 706: the terminal device captures a front face image of a targetuser through a camera provided on the terminal device after receivingthe identity recognition instruction sent by the server. In anembodiment, in step 706, the terminal device may display a front facecontour on its display screen, prompt the target user to put his/herfront face within the front face contour area, and capture the frontface image of the target user through the camera after the target userputs his/her front face within the above area.

Step 708: the camera provided on the terminal device captures a sideface image of the target user after completing capturing of the frontface image. In an embodiment, in step 708, the terminal device maydisplay a side face contour on its display screen, prompt the targetuser to put his/her side face within the side face contour area, andcapture the side face image of the target user through the camera afterthe target user puts his/her side face within the above area.

Step 710: the terminal device sends the captured front face image andside face image of the target user to the server.

Step 712: the server inputs the front face image into a pre-trainedfirst liveness detection model for processing to acquire a firstprobability outputted from the first liveness detection model: andinputs the side face image into a pre-trained second liveness detectionmodel for processing to acquire; a second probability outputted from thesecond liveness detection model.

The first probability and the second probability may be a probabilitythat the target user is a live user: or a probability that the targetuser is a non-live representation of a user. In the embodimentcorresponding to FIG. 7, the description is provided by taking the firstprobability and the second probability being a probability that thetarget user is a live user as an example.

Step 714: the server performs a fusion calculation on the firstprobability and the second probability to obtain a fusion resultcorresponding to the first probability and the second probability.

Step 716: the server determines whether the fusion result is greaterthan or equal to a set probability threshold; and executes step 718 ifthe fusion result is greater than or equal to the set probabilitythreshold; otherwise, executes step 724.

Step 718: the server calculates a similarity between the front faceimage and a recorded front face image corresponding to the electronicaccount, and calculates a similarity between the side face image and arecorded side face image corresponding to the electronic account.

Step 720: the server detects whether the front face similarity isgreater than a first set threshold, and whether the side face similarityis greater than a second set threshold; and executes step 722 if thefront face similarity is greater than the first set threshold, and theside face similarity is mater than the second set threshold, otherwise,executes step 726.

Step 722: the server executes a deducting operation on the electronicaccount.

Step 724: the server determines the target user as a non-liverepresentation of a user, and sends a prompt message of payment failureto the terminal device.

Step 726: the server sends a prompt message of re-capturing face imagesor payment failure to the terminal device.

Specific implementation processes of the steps in the embodimentcorresponding to FIG. 7 may be the same as the specific implementationprocesses of the steps in the embodiments corresponding to the aboveFIG. 1 to FIG. 4(b).

In the methods for resource transfer provided in the embodiments of thespecification, whether a target user is an authorized user of a targetelectronic account may be verified by an identity recognition based on afront face image and a side face image of the target user duringresource transfer, and resource transfer can be carried out withoutentering a password by a user, thereby avoiding a situation thatresource transfer cannot be carried out because the user forgets thepassword. In addition, whether the target user is a live user may beverified by an liveness detection based on the front face image and theside face image, avoiding the problem of security risks in electronicaccounts caused by face images of users being acquired by others,thereby improving the security of the electronic accounts. Moreover,more feature information is added by combining the front face image andthe side face image during the liveness detection and the identityrecognition, thereby improving the accuracy of the liveness detectionand the identity recognition, and further protecting the security ofusers' electronic accounts.

The embodiments of the specification further provide an apparatus forresource transfer configured to execute the methods for resourcetransfer provided in the embodiments. The apparatus for resourcetransfer may be applied to a server side. FIG. 8 is a schematic diagramof an apparatus 800 for resource transfer provided in an embodiment.Referring to FIG. 8, the apparatus 800 includes: an acquisition module802 configured to acquire a front face image, and a side face image fromat least one side, of a target user; an identification module 804configured to perform a liveness detection and an identity recognitionon the target user based on the front face image and the side faceimage; and an execution module 806 configured to execute, if theliveness detection result is that the target user is a live user and theidentity recognition result is that the target user is an authorizeduser of a target electronic account, resource transfer on the targetelectronic account.

In an embodiment, the identification module 804 includes: a firstidentification unit configured to perform a liveness detection on thetarget user based on the front face image and the side face image; and asecond identification unit configured to perform an identity recognitionon the target user based on the front face image and the side face imageif the liveness detection result is that the target user is a live user.

In an embodiment, the first identification unit is configured to: inputthe front face image into a pre-trained first liveness detection modelfor processing to acquire a first probability outputted from the firstliveness detection model; and input the side face image into apre-trained second liveness detection model for processing to acquire asecond probability outputted front the second liveness detection model;where the first probability and the second probability are each aprobability that the target user is a live user; or the firstprobability and the second probability are each a probability that thetarget user is a non-live representation of a user; and identify whetherthe target user is a live user based on the first probability and thesecond probability.

In an embodiment, the first identification unit is further configuredto: perform a fusion calculation on the first probability and the secondprobability to obtain a fusion result corresponding to the firstprobability and the second probability; and identify whether the targetuser is a live user based on the fusion result and a set probabilitythreshold.

In an embodiment, the first identification unit is further configuredto: input the front face image and the side face image into apre-trained third liveness detection model for processing to acquire athird probability outputted from the third liveness detection model;where the third probability is a probability that the target user is alive user, or the third probability is a probability that the targetuser is a non-live representation of a user; and identify whether thetarget user is a live user based on the third probability and the setprobability threshold.

In an embodiment, the second identification unit is configured to:perform a similarity comparison between the front face image and arecorded front face image corresponding to the target electronicaccount; perform a similarity comparison between the side face image anda recorded side face image corresponding to the target electronicaccount; and perform an identity recognition on the target user based ona front face similarity and a side face similarity.

In an embodiment, the second identification unit is further configuredto: standardize the side face image to obtain a standard side faceimage; where a size of the standard side face image is a set size, and aside face posture in the standard side face image is a set posture;extract a first side face feature vector of the target user based on thestandard side face image; and acquire a second side face feature vectorcorresponding to the recorded side face image; and calculate asimilarity between the side face image and the recorded side face imagebased on the first side face feature vector and the second side facefeature vector.

In an embodiment, the second identification unit is further configuredto: determine the target user as an authorized user of the targetelectronic account if the front face similarity is greater than a firstset threshold and the side face similarity is greater than a second setthreshold.

Specific implementation of the functions corresponding to the modulesand units in the embodiments may be the same as the methods illustratedin FIG. 1 to FIG. 7. Therefore, the details of the specificimplementation will not be repeated here.

In the apparatus for resource transfer provided in the embodiments,whether a target user is an authorized user of a target electronicaccount is verified by an identity recognition based on a front faceimage and a side face image of the target user during resource transfer,and resource transfer can be carried out without entering a password bya user, thereby avoiding a situation that resource transfer cannot becarried out because the user forgets the password. In addition, whetherthe target user is a live user is verified by a liveness detection basedon the front face image and the side face image, avoiding the problem ofsecurity risks in electronic accounts caused by face images of usersbeing acquired by others, thereby improving the security of theelectronic accounts. Moreover, more feature information is added bycombining the front face image and the side face image during theliveness detection and the identity recognition, thereby improving theaccuracy of the liveness detection and the identity recognition, andfurther protecting the security of users' electronic accounts.

The embodiments of the specification further provide a system forresource transfer. FIG. 9 is a schematic diagram of a system 900 forresource transfer according to an embodiment. Referring to FIG. 9, thesystem 900 includes: a client terminal device 901 and a resourcetransfer server 902. The client terminal device 901 is provided with afront face image capturing device 9011 and at least one side face imagecapturing device 9012.

The client terminal device 901 may be configured to control, when atarget user intends to make a payment using a target electronic account,the front face image capturing device 9011 to capture a front face imageof the target user and the side face image capturing device 9012 tocapture a side face image of the target user simultaneously; and sendthe captured front face image and side face image to the resourcetransfer server 902.

The resource transfer server 902 may be configured to acquire the frontface image and the side face image of the target user; perform aliveness detection and an identity recognition on the target user basedon the front face image and the side face image; and execute, if theliveness detection result is that the target user is a live user and theidentity recognition result is that the target user is an authorizeduser of the target electronic account, resource transfer on the targetelectronic account.

The client terminal device 901 may be provided with one side face imagecapturing device or two side face image capturing devices. The system900 in FIG. 9 shows an example of providing one side face imagecapturing device on the client terminal device 901. However, FIG. 9 ismerely an illustrative example and does not constitute a limitation o anumber of side face image capturing devices.

FIG. 10 is a schematic diagram of a system 1000 for resource transferaccording to an embodiment. Referring to FIG. 10, in the system 1000, inorder to achieve the client terminal device being capable of controllingthe front face image capturing device 9011 to capture the front faceimage of the target user and the side face image capturing devices 9012to capture the side face age(s) of the target user simultaneously, theclient terminal device 901 may also be provided with an image capturecontroller 9013, as shown in FIG. 10. The image capture controller 9013is connected to the front face image capturing device 9011 and the sideface image capturing devices 9012, and is configured to control thefront face image capturing device 9011 to capture the front face imageof the target user and the side face image capturing device(s) 9012 tocapture the side face image(s) of the target user simultaneously.

The system 1000 in FIG. 10 is provided with two side face imagecapturing devices 9012 on the client terminal device 901. However, FIG.10 is merely an illustrative example, and does not constitute alimitation to the number of side face image capturing devices.

In an embodiment, the resource transfer server 902 is configured to:perform a liveness detection on the target user based on the front faceimage and the side face image; and perform an identity recognition onthe target user based on the front face image and the side face image ifthe liveness detection result is that the target user is a live user.

In an embodiment, the resource transfer server 902 is further configuredto: input the front face image into a pre-trained first livenessdetection model for processing to acquire a first probability outputtedfrom the first liveness detection model; and input the side face imageinto a pre-trained second liveness detection model for processing toacquire a second probability outputted from the second livenessdetection model; where the first probability and the second probabilityare each a probability that the target user is a live user; or the firstprobability and the second probability are each a probability that thetarget user is a non-live representation of a user; and identify whetherthe target user is a live user based on the first probability and thesecond probability.

In an embodiment, the resource transfer server 902 is further configuredto: perform a fusion calculation on the first probability and the secondprobability to obtain a fusion result corresponding to the firstprobability and the second probability; and identify whether the targetuser is a live user based on the fusion result and a set probabilitythreshold.

In an embodiment, the resource transfer server 902 is further configuredto: input the front face image and the side face image into apre-trained third liveness detection model for processing to acquire athird probability outputted from the third liveness detection model;where the third probability is a probability that the target user is alive user, or the third probability is a probability that the targetuser is a non-live representation of a user; and identify whether thetarget user is a live user based on the third probability and the setprobability threshold.

In an embodiment, the resource transfer server 902 is further configuredto: perform a similarity comparison between the front face image and arecorded front face image corresponding to the target electronicaccount; perform a similarity comparison between the side face image anda recorded side face image corresponding to the target electronicaccount; and perform an identity recognition on the target user based ona front face similarity and a side face similarity.

In an embodiment, the resource transfer server 902 is further configuredto: standardize the side face image to obtain a standard side faceimage, where a size of the standard side face image is a set size, and aside face posture in the standard side face image is a set posture;extract a first side face feature vector of the target user based on thestandard side face image; acquire a second side face feature vectorcorresponding to the recorded side face image; and calculate asimilarity between the side face image and the recorded side face imagebased on the first side face feature vector and the second side facefeature vector.

In an embodiment, the resource transfer server 902 is further configuredto: determine the target user as an authorized user of the targetelectronic account if the front face similarity is greater than a firstset threshold and the side face similarity is greater than a second setthreshold.

Specific implementation of the functions corresponding to the resourcetransfer server 902 in the embodiments may be the same as the methodsillustrated in FIG. 1 to FIG. 7. Therefore, the specific implementationof the functions corresponding to the resource transfer server 902 willnot be repeated here.

FIG. 11 is a schematic diagram of a client terminal device 1100 in asystem for resource transfer according to an embodiment. Referring toFIG. 11, the client terminal device 1100 may be a vending machine,including a left-side face image capturing device 1104, a right-sideface image capturing device 1108, and a front face image capturingdevice 1106. In an embodiment, the front face image capturing device1106 is placed in the center, the left-side face image capturing device1104 is placed on a left side of the front face image capturing device1106, and the right-side face image capturing device 1108 is placed on aright side of the front face image capturing device 1106.

In an embodiment, the left-side face image capturing device 1104, thefront face image capturing device 1106, and the right-side face imagecapturing device 1108 may be cameras, and the three image capturingdevices may to be connected to an image capture controller 1110, so thatthe image capture controller 1110 controls the three image capturers tocapture face images of the target user simultaneously.

In an embodiment, the left-side face image capturing device 1104, theright-side face image capturing device 1108, the front face imagecapturing device 1106, and the image capture controller 1110 areintegrated onto the vending machine provided with a payment clientterminal to obtain a specific payment system, where the image capturecontroller 1110 may be a control circuit board.

In an embodiment, when making a payment sing the vending machine shownin FIG. 11, a human face may face to the front face image capturingdevice 1106.

In the system for resource transfer provided in the embodiments, whethera target user is an authorized user of a target electronic account isverified by an identity recognition based on a front face image and aside face image of the target user during resource transfer, andresource transfer can be carried out without entering a password by theuser, thereby avoiding a situation that resource transfer cannot becarried out because the user forgets the password. In addition, whetherthe target user is a live user is verified by a liveness detection basedon the front face image and the side face image, avoiding the problem ofsecurity risks in electronic accounts caused by face images of usersbeing acquired by others, thereby improving the security of theelectronic accounts. Moreover, more feature information is added bycombining a front face image and a side face image during the livenessdetection and the identity recognition, thereby improving the accuracyof the liveness detection and the identity recognition, and furtherprotecting the security of users' electronic accounts.

FIG. 12 is a schematic diagram of a resource transfer device 1200according to an embodiment. For example, the resource transfer device1200 may implement any of the above described terminal device, server,or system for resource transfer. Referring to FIG. 12, the resourcetransfer device 1200 may include one or more processors 1201 and amemory 1202. The memory 1202 may store one or more storage applicationprograms or data. The memory 1:202 may be temporary storage orpersistent storage. An application program stored in the memory 1202 mayinclude one or more modules (not shown in the figure). Each module mayinclude a series of computer executable instructions in the resourcetransfer device 1200. The processor 1201 may communicate with the memory1202 to execute the series of computer executable instructions in thememory 1202 on the resource transfer device. The resource transferdevice 1200 may further include one or more power sources 1203, one ormore wired or wireless network interfaces 1204, one or more input andoutput interfaces 1205, one or more keyboards 1206, and the like.

In an embodiment, one or more programs are stored in the memory 1202,and the one or more programs may include one or more modules. Eachmodule may include a series of computer executable instructions in theresource transfer device 1200. The one or more processors 1201 areconfigured to execute the one or more programs to perform a methodincluding: acquiring a front face image, and a side face image from atleast one side, of a target user performing a liveness detection and anidentity recognition on the target user based on the front face imageand the side face image; and executing, if the liveness detection resultis that the target user is a live user and the identity recognitionresult is that the target user is an authorized user of a targetelectronic account, resource transfer on the target electronic account.

In an embodiment, when the computer executable instructions areexecuted, performing the liveness detection and the identity recognitionon the target user based on the front face image and the side face imagemay include: performing a liveness detection on the target user based onthe front face image and the side face image; and performing an identityrecognition on the target user based on the front face image and theside face image if the liveness detection result is that the target useris a live user.

In an embodiment, when the computer executable instructions areexecuted, performing the liveness detection on the target user based onthe front face image and the side face image may include: inputting thefront face image into a pre-trained first liveness detection model forprocessing to acquire a first probability outputted from the firstliveness detection model; and inputting the side face image into apre-trained second liveness detection model for processing to acquire asecond probability outputted from the second liveness detection model;where the first probability and the second probability are each aprobability that the target user is a live user; or the firstprobability and the second probability are each a probability that thetarget user is a non-live representation of a user; and identifyingwhether the target user is a live user based on the first probabilityand the second probability.

In an embodiment, when the computer executable instructions areexecuted, identifying whether the target user is a live user based onthe first probability and the second probability may include: performinga fusion calculation on the first probability and the second probabilityto obtain a fusion result corresponding to the first probability and thesecond probability; and identifying whether the target user is a liveuser based on the fusion result and a set probability threshold.

In an embodiment, when the computer executable instructions areexecuted, performing the liveness detection on the target user based onthe front face image and the side face image may include: inputting thefront face image and the side face image into a pre-trained thirdliveness detection model for processing to acquire a third probabilityoutputted from the third liveness detection model; where the thirdprobability is a probability that the target user is a live user, or thethird probability is a probability that the target user is a non-liverepresentation of a user; and identifying whether the target user is alive user based on the third probability and the set probabilitythreshold.

In an embodiment, when the computer executable instructions areexecuted, performing the identity recognition on the target user basedon the front face image and the side face image may include: performinga similarity comparison between the front face image and a recordedfront face image corresponding to the target electronic account; andperforming a similarity comparison between side face image and arecorded side face image corresponding to the target electronic account;and performing identity recognition on the target user based on a frontface similarity and a side face similarity.

In an embodiment, when the computer executable instructions areexecuted, the performing a similarity comparison between the side faceimage and a recorded side face image corresponding to the targetelectronic account may include: standardizing the side face image toobtain a standard side face image; where a size of the standard sideface image is a set size, and a side face posture in the standard sideface image is a set posture; extracting a first side face feature vectorof the target user based on the standard side face image; and acquiringa second side face feature vector corresponding to the recorded sideface image; and calculating a similarity between the side face image andthe recorded side face image based on the first side face feature vectorand the second side face feature vector.

In an embodiment, when the computer executable instructions areexecuted, the performing an identity recognition on the target userbased on a front face similarity and a side face similarity may include:determining the target user as an authorized user of the targetelectronic account if the front face similarity is greater than a firstset threshold and the side face similarity is greater than a second setthreshold.

In the device for resource transfer provided in the embodiments of thespecification, whether a target user is an authorized user of a targetelectronic account is verified by an identity recognition based on afront face image and a side face image of the target user duringresource transfer, and resource transfer can be carried out withoutentering a password by a user, thereby avoiding a situation thatresource transfer cannot be carried out because the user forgets thepassword. In addition, whether the target user is a live user isverified by a liveness detection based on the front face image and theside face image, avoiding the problem of security risks in electronicaccounts caused by face images of users being acquired by others,thereby improving the security of the electronic accounts. Moreover,more feature information is added by combining a front face image and aside face image during the liveness detection and the identityrecognition, thereby improving the accuracy of the liveness detectionand the identity recognition, and further protecting the security ofusers' electronic accounts.

The embodiments of the specification further provide a storage mediumconfigured to store a computer executable instruction. In an embodiment,the storage medium may be a USB flash disk, an optical disk, a harddisk, or the like. The computer executable instruction stored in thestorage medium, when executed by a processor, may perform a methodincluding: acquiring a front face image, and a side face image from atleast one side, of a target user; performing a liveness detection and anidentity recognition on the target user based on the front face imageand the side face image; and executing, if the liveness detection resultis that the target user is a live user and the identity recognitionresult is that the target user is an authorized user of a targetelectronic account, resource transfer on the target electronic account.

In an embodiment, when the computer executable instruction stored in thestorage medium is executed by a processor, the performing a livenessdetection and an identity recognition on the target user based on thefront face image and the side face image may include: performing aliveness detection on the target user based on the front face image andthe side face image; and performing an identity recognition on thetarget user based on the front face image and the side face image if theliveness detection result is that the target user is a live user.

In an embodiment, when the computer executable instruction stored in thestorage medium is executed by a processor, the performing a livenessdetection on the target user based on the front face image and the sideface image may include: inputting the front face image into apre-trained first liveness detection model for processing to acquire afirst probability outputted from the first liveness detection model; andinputting the side face image into a pre-trained second livenessdetection model for processing to acquire a second probability outputtedfrom the second liveness detection model; where the first probabilityand the second probability are each a probability that the target useris a live user; or the first probability and the second probability areeach a probability that the target user is a non-live representation ofa user; and identifying whether the target user is a live user based onthe first probability and the second probability.

In an embodiment, when the computer executable instruction stored in thestorage medium is executed by a processor, the identifying whether thetarget user is a live user based on the first probability and the secondprobability may include: performing a fusion calculation on the firstprobability and the second probability to obtain a fusion resultcorresponding to the first probability and the second probability; andidentifying whether the target user is a live user based on the fusionresult and the set probability threshold.

In an embodiment, when the computer executable instruction stored in thestorage medium is executed by a processor, the performing a livenessdetection on the target user based on the front face image and the sideface image may include: inputting the front face image and the side faceimage into a pre-trained third liveness detection model for processingto acquire a third probability outputted from the third livenessdetection model; where the third probability is a probability that thetarget user is a live user, or the third probability is a probabilitythat the target user is a non-live representation of a user; andidentifying whether the target user is a live user based on the thirdprobability and the set probability threshold.

In an embodiment, when the computer executable instruction stored in thestorage medium is executed by a processor, the performing an identityrecognition on the target user based on the front face image and theside face image may include: performing a similarity comparison betweenthe front face image and a recorded front face image corresponding tothe target electronic account; performing a similarity comparisonbetween the side face image and a recorded side face image correspondingto the target electronic account; and performing an identity recognitionon the target user based on a front face similarity and a side facesimilarity.

In an embodiment, when the computer executable instruction stored in thestorage medium is executed by a processor, the performing a similaritycomparison between the side face image and a recorded side face imagecorresponding to the target electronic account may include:standardizing the side face image to obtain a standard side face image;where a size of the standard side face image is a set size, and a sideface posture in the standard side face image is a set posture;extracting a first side face feature vector of the target user based onthe standard side face image; acquiring a second side face featurevector corresponding to the recorded side face image; and calculating asimilarity between the side face image and the recorded side face imagebased on the first side face feature vector and the second side facefeature vector.

In an embodiment, when the computer executable instruction stored in thestorage medium is executed by a processor, the performing an identityrecognition on the target user based on a front face similarity and aside face similarity may include: determining the target user as anauthorized user of the target electronic account if the front facesimilarity is greater than a first set threshold and the side facesimilarity is greater than a second set threshold.

In an embodiment, when the computer executable instructions stored inthe storage medium are executed by a processor, whether a target user isan authorized user of a target electronic account is verified by anidentity recognition based on a front face image and a side face imageof the target user during resource transfer, and resource transfer canbe carried out without entering a password by a user, thereby avoiding asituation that resource transfer cannot be carried out because the userforgets the password. In addition, whether the target user is a liveuser is verified by liveness detection based on the front face image andthe side face image, avoiding the problem of security risks inelectronic accounts caused by face images of users being acquired byothers, thereby improving the security of the electronic accounts.Moreover, more feature information is added by combining a front faceimage and a side face image during the liveness detection and theidentity recognition, thereby improving the accuracy of the livenessdetection and the identity recognition, and further protecting thesecurity of users' electronic accounts.

Each of the above described methods, models, modules, and units may beimplemented as software, or hardware, or a combination of software andhardware. For example, a Programmable Logic Device (PLD) (e.g., a FieldProgrammable Gate Array (FPGA)) is such an integrated circuit that itslogic function is determined by a user through programming the device. Adesigner integrates a digital system onto a piece of PLD by independentprogramming without the need for requesting a chip manufacturer todesign and make an application specific integrated circuit chip.Moreover, at present, instead of manually making an integrated circuitchip, this programming is also mostly implemented using logic compilersoftware, which is similar to a software compiler used for programdevelopment and writing. However, original code before the compilationneeds to be written using a specific programming language, which isknown as a Hardware Description Language (HDL). There is not just one,but many kinds of HDLs, such as ABEL (Advanced Boolean ExpressionLanguage), AHDL (Altera Hardware Description Language), Confluence, CUPL(Cornell University Programming Language), HDCal, JHDL (Java HardwareDescription Language), Lava, Lola, MyHDL, PALASM, and RHDL (RubyHardware Description Language). At present, VHDL (Very-High-SpeedIntegrated Circuit Hardware Description Language) and Verilog are mostwidely used. Those skilled in the art should also be clear that, just bysimple logic programming of a process using the above hardwaredescription languages and programming the process into an integratedcircuit, it will be very easy to obtain a hardware circuit implementingthe logical process.

A controller can be implemented by any suitable approach in the abovedescribed device. For example, the controller can take a form of, e.g.,a microprocessor or processor, a computer readable medium storing acomputer readable program code (e.g., software or firmware) that can beexecuted by the (micro)processor, a logic gate, a switch, an ApplicationSpecific Integrated Circuit (ASIC), a programmable logic controller, oran embedded microcontroller. Examples of the controller include, but arenot limited to, the following microcontrollers: ARC 625D, Atmel AT9ISAM,Microchip PICI 8F26K20, and Silicone Labs C8051F320. The memorycontroller may also be implemented as a part of control logic of thememory. Those skilled in the art also know that, in addition toimplementing the controller by a pure computer readable program code,the controller can also be caused to implement identical functions inthe form of the logic gate, the switch, the application specificintegrated circuit, the programmable logic controller, the embeddedmicrocontroller, or the like completely by logic programming of processsteps. Therefore, such a controller may also be considered as a hardwarecomponent, and an apparatus configured to implement various functionswithin the controller may also be considered as a structure within thehardware component. The apparatus configured to implement variousfunctions may be considered as not only a software module implementing amethod, but also a structure within the hardware component.

The system, apparatus, modules or units illustrated in theabove-described embodiments may be specifically implemented by acomputer chip or entity, or by a product having a certain function. Atypical implementing device is a computer. Specifically, for example,the computer may be a personal computer, a laptop computer, a cellphone, a camera phone, a smart phone, a personal digital assistant, amedia player, a navigation device, an e-mail device, a game console, atablet computer, a wearable device, or a combination of any devices ofthese devices.

For ease of description, the above apparatus is described by dividing itinto various units based on functions, and then the units are describedrespectively. The apparatus may also be implemented by implementingfunctions of the units in a given piece or more pieces of softwareand/or hardware.

It should be appreciated by those skilled in the art that theembodiments of the present application may be provided as a method,system, or computer program product. Accordingly, the embodiments maytake the form of complete hardware embodiments, complete softwareembodiments, or embodiments combining software and hardware. Further,the embodiments may take a form of one or more computer program productsimplemented on a computer usable storage medium (including but notlimited to a disk storage, a CD-ROM, an optical memory, etc.) containinga computer usable program code.

The present application is described with reference to the flowchartsand/or block diagrams of the method, device (system), and computerprogram product according to the embodiments of the presentspecification it should be understood that each process and/or block inthe flowcharts and/or block diagrams, and a combination of processesand/or blocks in the flowcharts and/or block diagrams may be implementedby computer program instructions. The computer program instructions canbe provided to a general purpose computer, a special purpose computer,an embedded processor, or a processor of another programmable dataprocessing device to produce a machine, causing the instructionsexecuted by a computer or the processor of another programmable dataprocessing device to produce an apparatus configured to implementfunctions specified in one or more processes of the flowcharts and/orone or more blocks of the block diagrams.

These computer program instructions may also be stored in a computerreadable memory capable of directing the computer or anotherprogrammable data processing device to function in a particular manner,such that e instructions stored in the computer readable memory producean article of manufacture including an instructing apparatus. Theinstructing apparatus implements the functions specified in one or moreprocesses of the flowcharts and/or one or more blocks of the blockdiagrams.

The computer program instructions can also be loaded into the computeror another programmable data processing device, causing a series ofoperation steps to be executed on the computer or another programmabledevice, to produce computer-implemented processing. Therefore, theinstructions executed on the computer or another programmable deviceprovide steps used for implementing the functions specified in one ormore processes of the flowcharts and/or one or more blocks of the blockdiagrams.

The computer readable medium includes permanent/non-permanent media andremovable/non-removable media that can achieve information storage byany method or technology. The information may be a computer readableinstruction, a data structure, a program module, or other data. Examplesof the computer storage medium include, but are not limited to, aphase-change random access memory (PRAM), a static random access memory(SRAM), a dynamic random access memory (DRAM), a random access memory(RAM) of other types, a read only memory (ROM), an electrically erasableprogrammable read only memory (EEPROM), flash RAM or other internalmemory technologies, a compact disc read only memory (CD-ROM), a digitalversatile disc (DVD) or other optical storage, a magnetic cassette tape,and a magnetic tape or magnetic disk storage or other magnetic storagedevice, or any other non-transmission medium, which can be configured tostore information that can be accessed by the computing device. Thecomputer readable medium excludes transitory media, e.g., a modulateddata signal or a carrier wave.

It should also be noted that the terms “include,” “comprise,” or anyother variations thereof are intended to cover a non-exclusiveinclusion, such that a process, method, article, or device thatcomprises a list of elements not only includes those elements butfurther includes other elements not expressly listed, or furtherincludes elements inherent to such process, method, article, or device.An element defined by “comprising . . . a” does not, without moreconstraints, preclude the existence of additional identical elements inthe process, method, article, or device that comprises the element.

The embodiments may be implemented with a computer executableinstruction executed by the computer, such as a program module.Generally, the program module includes a routine, a program, an object,a component, a data structure, and the like executing particular tasksor implementing particular abstract data types. The present applicationmay also be practiced in distributed computing environments. In thedistributed computing environments, tasks are executed by remoteprocessing devices that are linked through a communication network. Inthe distributed computing environments, the program module may belocated in local and remote computer storage media including a storagedevice.

Various embodiments in the present specification are described in aprogressive manner, and identical or similar portions between the,various embodiments may be referred to mutually. Each embodiment mainlydescribes differences from other embodiments. In particular, since thesystem embodiments are substantially similar to the method embodiments,the description is relatively simple, and for the relevant part,reference may be made to the description of the part of the methodembodiments.

Although the specification has been described in conjunction withspecific embodiments, may alternatives, modifications and variationswill be apparent to those skilled in the art. Accordingly, the followingclaims embrace all such alternatives, modifications and variations thatfall within the terms of the claims.

1. A method for resource transfer, comprising: acquiring a front faceimage, and a side face image from at least one side, of a target user;performing a liveness detection and an identity recognition on thetarget user based on the front face image and the side face image; andexecuting, if a liveness detection result is that the target user is alive user and an identity recognition result is that the target user isan authorized user of a target electronic account, resource transfer onthe target electronic account.
 2. The method according to claim 1,wherein the performing the liveness detection and the identityrecognition on the target user based on the front face image and theside face image comprises: performing the liveness detection on thetarget user based on the front face image and the side face image; andperforming the identity recognition on the target user based on thefront face image and the side face image if the liveness detectionresult is that the target user is a live user.
 3. The method accordingto claim 2, wherein the performing the liveness detection on the targetuser based on the front face image and the side face image comprises:inputting the front face image into a pre-trained first livenessdetection model for processing to acquire a first probability outputtedfrom the first liveness detection model; inputting the side face imageinto a pre-trained second liveness detection model for processing toacquire a second probability outputted from the second livenessdetection model; and identifying whether the target user is a live userbased on the first probability and the second probability, wherein thefirst probability and the second probability are: each a probabilitythat the target user is a live user, or each a probability that thetarget user is a non-live representation of a user.
 4. The methodaccording to claim 3, wherein the identifying whether the target user isa live user based on the first probability and the second probabilitycomprises: performing a fusion calculation on the first probability andthe second probability to obtain a fusion result corresponding to thefirst probability and the second probability; and identifying whetherthe target user is a live user based on the fusion result and a setprobability threshold.
 5. The method according to claim 2, wherein theperforming the liveness detection on the target user based on the frontface image and the side face image comprises: inputting the front faceimage and the side face image into a pre-trained third livenessdetection model for processing to acquire a third probability outputtedfrom the third liveness detection model; and identifying whether thetarget user is a live user based on the third probability and a setprobability threshold, wherein the third probability is: a probabilitythat the target user is a live user, or a probability that the targetuser is a non-live representation of a user.
 6. The method according toclaim 2, wherein the performing the identity recognition on the targetuser based on the front face image and the side face image comprises:performing a first similarity comparison between the front face image ofthe target user and a recorded front face image corresponding to thetarget electronic account; performing a second similarity comparisonbetween the side face image of the target user and a recorded side faceimage corresponding to the target electronic account; and performing theidentity recognition on the target user based on a front face similaritydetermined from the first similarity comparison and a side facesimilarity determined from the second similarity comparison.
 7. Themethod according to claim 6, wherein the performing the secondsimilarity comparison between the side face image of the target user andthe recorded side face image corresponding to the target electronicaccount comprises: standardizing the side face image of the target userto obtain a standard side face image, wherein a size of the standardside face image is a set size, and a side face posture in the standardside face image is a set posture; extracting a first side face featurevector of the target user based on the standard side face image;acquiring a second side face feature vector corresponding to therecorded side face image; and calculating a similarity between the sideface image of the target user and the recorded side face image based onthe first side face feature vector and the second side face featurevector.
 8. The method according to claim 6, wherein the performing theidentity recognition on the target user based on the first similarityand the second similarity comprises: determining the target user as anauthorized user of the target electronic account if the front facesimilarity is greater than a first set threshold and the side facesimilarity is greater than a second set threshold.
 9. A device forresource transfer, comprising: a processor; and a memory configured tostore instructions, wherein the processor is configured to execute theinstructions to: acquire a front face image, and a side face image fromat least one side, of a target user; perform a liveness detection and anidentity recognition on the target user based on the front face imageand the side face image; and execute, if a liveness detection result isthat the target user is a live user and an identity recognition resultis that the target user is an authorized user of a target electronicaccount, resource transfer on the target electronic account.
 10. Thedevice according to claim 9, wherein the processor is further configuredto execute the instructions to: perform the liveness detection on thetarget user based on the front face image and the side face image; andperform the identity recognition on the target user based on the frontface image and the side face image if the liveness detection result isthat the target user is a live user.
 11. The device according to claim10, herein the processor is further configured to execute theinstructions to: input the front face image into a pre-trained firstliveness detection model for processing to acquire a first probabilityoutputted from the first liveness detection model; input the side faceimage into a pre-trained second liveness detection model for processingto acquire a second probability outputted from the second livenessdetection model; and identify whether the target user is a live userbased on the first probability and the second probability, wherein thefirst probability and the second probability are: each a probabilitythat the target user is a live user; or each a probability that thetarget user is a non-live representation of a user.
 12. The deviceaccording to claim 10, wherein the processor is further configured toexecute the instructions to: input the front face image and the sideface image into a pre-trained third liveness detection model forprocessing to acquire a third probability outputted from the thirdliveness detection model; and identify whether the target user is a liveuser based on the third probability and a set probability threshold,wherein the third probability is: a probability that the target user isa live user, or a probability that the target user is a non-liverepresentation of a user.
 13. The device according to claim 10, whereinthe processor is further configured to execute the instructions to:perform a first similarity comparison between the front face image ofthe target user and a recorded front face image corresponding to thetarget electronic account; perform a second similarity comparisonbetween the side face image of the target user and a recorded side faceimage corresponding to the target electronic account; and perform theidentity recognition on the target user based on a front face similaritydetermined from the first similarity comparison and a side facesimilarity determined from the second similarity comparison.
 14. Thedevice according to claim 13, wherein the processor is furtherconfigured to execute the instructions to: standardize the side faceimage of the target user to obtain a standard side face image, wherein asize of the standard side face image is a set size, and a side faceposture in the standard side face image is a set posture; extract afirst side face feature vector of the target user based on the standardside face image; and acquire a second side face feature vectorcorresponding to the recorded side face image; and calculate a secondsimilarity between the side face image of the target user and therecorded side face image based on the first side face feature vector andthe second side face feature vector.
 15. A system for resource transfer,comprising: a client terminal device; and a resource transfer server,wherein the client terminal device is provided with a front face imagecapturing device and at least one side face image capturing device,wherein the client terminal device is configured to control the frontface image capturing device to capture a front face image of a targetuser and the side face image capturing device to capture a side faceimage of the target user simultaneously; and send the front face imageand the side face image to the resource transfer server, and wherein theresource transfer server is configured to acquire the front face imageand the side face image of the target user; perform a liveness detectionand an identity recognition on the target user based on the front faceimage and the side face image; and execute, if a liveness detectionresult is that the target user is a live user and an identityrecognition result is that the target user is an authorized user of atarget electronic account, resource transfer on the target electronicaccount.
 16. The system according to claim 15, wherein the resourcetransfer server is configured to: perform the liveness detection on thetarget user based on the front face image and the side face image; andperform the identity recognition on the target user based on the frontface image and the side face image if the liveness detection result isthat the target user is a live user.
 17. The system according to claim16, wherein the resource transfer server is further configured to: inputthe front face image into a pre-trained first liveness detection modelfor processing to acquire a first probability outputted from the firstliveness detection model; input the side face image into a pre-trainedsecond liveness detection model for processing to acquire a secondprobability outputted from the second liveness detection model; andidentify whether the target user is a live user based on the firstprobability and the second probability, wherein the first probabilityand the second probability are: each a probability that the target useris a live user; or each a probability that the target user is a non-liverepresentation of a user.
 18. The system according to claim 16, whereinthe resource transfer server is further configured to: input the frontface image and the side face image into a pre-trained third livenessdetection model for processing to acquire a third probability outputtedfrom the third liveness detection model; and identify whether the targetuser is a live user based on the third probability and a set probabilitythreshold, wherein the third probability is: a probability that thetarget user is a live user, or a probability that the target user is anon-live representation of a user.
 19. The system according to claim 16,wherein the resource transfer server is further configured to: perform afirst similarity comparison between the front face image of the targetuser and a recorded front face image corresponding to the targetelectronic account; perform a second similarity comparison between theside face image of the target user and a recorded side face imagecorresponding to the target electronic account; and perform the identityrecognition on the target user based on a front face similaritydetermined from the first similarity comparison and a side facesimilarity determined from the second similarity comparison.