Authentication and authentication mode determination method, apparatus, and electronic device

ABSTRACT

An authentication method includes: acquiring a front face feature and a side face feature of a first user in response to a face authentication request of the first user; searching, based on the front face feature and the side face feature of the first user, a first list of users of multiple births corresponding to the first user for a candidate user matching both the front face feature and the side face feature of the first user, wherein the first list of users of multiple births corresponding to the first user is a list of users of multiple births with similar front face features and non-similar side face features; and determining, based on consistency between the candidate user and the first user in the front face feature and the side face feature, whether the first user succeeds in authentication.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is based upon and claims priority to Chinese PatentApplication No. 201811050088.2, filed on Sep. 10, 2018, the entirecontent of all of which is incorporated herein by reference.

TECHNICAL FIELD

This application relates to the field of computer technologies, and inparticular, to an authentication and authentication mode determinationmethod, apparatus and electronic device.

BACKGROUND

With the continuous development of pattern recognition and artificialintelligence technologies, the face recognition technology has been moreand more widely applied. At present, face scan payment based on the facerecognition technology has been gradually applied to people's dailylife.

Face scan payment can use a human face feature as a password, thuseliminating the need for manually inputting a password and greatlysimplifying an electronic payment process of a user. However, for usersof multiple births, due to the great similarity of their face features,it may be difficult for face scan payment to simply carry out identityrecognition based on face features. Multiple births include two or morepersons born in one pregnancy such as twins and triplets.

Therefore, when users of multiple births use face scan payment, it maystill be necessary to provide a further solution for how to identifysuch users.

SUMMARY

Embodiments of the specification provide an authentication andauthentication mode determination method, apparatus and electronicdevice.

In a first aspect, an authentication method comprises: acquiring a frontface feature and a side face feature of a first user in response to aface authentication request of the first user; searching, based on thefront face feature and the side face feature of the first user, a firstlist of users of multiple births corresponding to the first user for acandidate user matching both the front face feature and the side facefeature of the first user, wherein the first list of users of multiplebirths corresponding to the first user is a list of users of multiplebirths with similar front face features and non-similar side facefeatures; and determining, based on consistency between the candidateuser and the first user in the front face feature and the side facefeature, whether the first user succeeds in authentication.

In a second aspect, an electronic device comprises: a processor; and amemory storing instructions executable by the processor, wherein theprocessor is configured to: acquire a front face feature and a side facefeature of a first user in response to a face authentication request ofthe first user; search, based on the front face feature and the sideface feature of the first user, a first list of users of multiple birthscorresponding to the first user for a candidate user matching both thefront face feature and the side face feature of the first user, whereinthe first list of users of multiple births corresponding to the firstuser is a list of users of multiple births with similar front facefeatures and non-similar side face features; and determining, based onconsistency between the candidate user and the first user in the frontface feature and the side face feature, whether the first user succeedsin authentication.

In a third aspect, a non-transitory computer-readable storage medium hasstored thereon instructions that, when executed by a processor of anelectronic device, cause the electronic device to perform anauthentication method, the method comprising: acquiring a front facefeature and a side face feature of a first user in response to a faceauthentication request of the first user; searching, based on the frontface feature and the side face feature of the first user, a first listof users of multiple births corresponding to the first user for acandidate user matching both the front face feature and the side facefeature of the first user, wherein the first list of users of multiplebirths corresponding to the first user is a list of users of multiplebirths with similar front face features and non-similar side facefeatures; and determining, based on consistency between the candidateuser and the first user in the front face feature and the side facefeature, whether the first user succeeds in authentication.

The technical solutions in the embodiments of this specification canachieve at least the following technical effects.

A front face feature and a side face feature of a user are acquired inresponse to a face authentication request of the user, then a list ofusers of multiple births corresponding to the user is searched, based onthe front face feature and the side face feature of the user, for acandidate user matching both the front face feature and the side facefeature of the user, wherein the list of users of multiple birthscorresponding to the user is a list of users of multiple births withsimilar front face features and non-similar side face features, andfinally, it can be determined, based on consistency between thecandidate user and the user in the front face feature and the side facefeature, whether the user succeeds in the authentication. As such, whenthe authenticated user is a user of multiple births, the front facefeature and the side face feature of the user can be acquired and thencompared with front face features and side face features of users in thepre-established list of users of multiple births to determine whetherthe user succeeds in the authentication, thus solving the problem ofidentifying using face features of a user of multiple births in theprior art.

In addition, in some embodiments, user information of a user is acquiredin response to a request for activating a face authentication mode fromthe user, and then an authentication mode is determined for the userbased on first user information with similar front face features andsecond user information with similar front face features and similarside face features in a list of users of multiple births, and the userinformation of the user. As such, when the user to activate the faceauthentication mode is a user of multiple births, a specificauthentication mode can be determined for the user by determiningwhether the user is a user only with a similar front face feature in thelist of users of multiple births, a user with both a similar front facefeature and a similar side face feature in the list of users of multiplebirths, or a user with a non-similar front face feature in the list ofusers of multiple births, so that some users in the list of users ofmultiple births can also activate a face authentication mode.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings are incorporated into the specification, andtogether with the description, illustrate embodiments and explain theprinciple disclosed in the specification.

FIG. 1 is a flow chart of an authentication method according to anembodiment.

FIGS. 2(a) and 2(b) are schematic diagrams of a construction process ofa list of users of multiple births according to an embodiment.

FIG. 3 is a flow chart of an authentication mode determination methodaccording to an embodiment.

FIG. 4 is a flow chart of an authentication mode determination methodaccording to an embodiment.

FIG. 5 is a schematic diagram of an authentication apparatus accordingto an embodiment.

FIG. 6 is a schematic diagram of an authentication mode determinationapparatus according to an embodiment.

FIG. 7 is a schematic diagram of an electronic device according to anembodiment.

FIG. 8 is a schematic diagram of another electronic device according toan embodiment.

DETAILED DESCRIPTION

Embodiments of the specification will be described below with referenceto the accompanying drawings. The embodiments described are merelyexamples, rather than all the embodiments consistent with thespecification. All other embodiments obtained by those of ordinary skillin the art based on the described embodiments without creative effortsare encompassed in the protection scope of this application.

In order to solve the problem in the prior art that users of multiplebirths may not be identified based on face features, an authenticationmethod and an authentication mode determination method are provided inthe embodiments of this specification. The method provided in theembodiments of this specification may be executed by, but not limitedto, a user terminal, such as s mobile phone, a tablet computer, and apersonal computer.

FIG. 1 is a flow chart of an authentication method 100 according to anembodiment. For example, the method 100 may be performed by a terminaldevice, and include the following steps.

In step 110, a front face feature and a side face feature of a user areacquired in response to a face authentication request of the user.

In an embodiment, acquiring a front face feature and a side face featureof a user can specifically be: first determining whether the user isincluded in a list of users of multiple births with similar front facefeatures; and then acquiring the front face feature and the side facefeature of the user if it is determined that the user is included in thelist of users of multiple births with similar front face features.

It should be appreciated that the multiple births in the embodimentinclude two or more persons born in one pregnancy, for example, twins,triplets, quadruplets, and so on. The multiple births mentioned below inother embodiments are similar to this, and will not be described indetail.

In the embodiment, as users in the list of users of multiple births maynot have the same front face features, for example, there are somedifferences in face features between fraternal twins, it can bedetermined whether the user is included in the list of users of multiplebirths with similar front face features, and the front face feature andthe side face feature of the user are acquired when it is determinedthat the user is included in the list of users of multiple births withsimilar front face features.

In an embodiment, whether the user is included in the list of users ofmultiple births can be determined by acquiring a user ID and determiningwhether the user ID is included in the list of users of multiple births.The user information included in the list of users of multiple birthscan include user IDs, and each user ID corresponds to a unique user. Inother words, the user ID is unique identification information of theuser.

For users of multiple births, the similarity of their face features isoften high. If face authentication is performed on the users with highsimilarity of face features, the result of authentication may beinaccurate. When the users with high similarity of face features, suchas twins, want to activate or use a face authentication function, theymay be prompted to use another authentication mode.

However, although the problem of the inaccurate result of authenticationcaused when the users use face authentication is avoided by forbiddingthe users with high similarity of face features from using the faceauthentication function, some inconveniences may be brought about to theusers. That is, when the users perform operations requiringauthentication such as payment, they may need to perform authenticationthrough some relatively cumbersome operations, such as entering apassword. In one or more embodiments of this specification, in order tosolve this problem to enable users of multiple births to also use a faceauthentication mode, a list of users of multiple births is constructedin advance based on user information and similarities in face featuresof all users.

FIG. 2(a) is a flow chart of a method 200 for constructing a list ofusers of multiple births according to an embodiment. Referring to FIG.2(a), the method 200 includes the following steps.

In step 21, a list of users of multiple births is acquired based on userinformation of all users.

By taking a payment application for payment as an example, userinformation of all users using the payment application, such as date ofbirth, registered permanent residence, residence and other information,can be acquired in advance to determine which users in all the usersusing the payment application are users of multiple births, thusacquiring a list of users of multiple births. As shown in FIG. 2(b), thecircle with the largest range in FIG. 2(b) represents the list of usersof multiple births acquired.

In step 22, front face features and side face features of users areacquired for each group of users of multiple births on the list.

By continuing to take the foregoing payment application as an example,in order to improve the level of information security, avatarinformation of a user can be collected when the user registers thepayment application. For example, a front face image and a side faceimage of the user are acquired, and then a front face feature and a sideface feature of the user are acquired based on the front face image andthe side face image of the user.

In step 23, a list of users with similar front face features is acquiredbased on whether front face features of each group of users of multiplebirths are similar.

For example, the list of users with similar front face features isdetermined from the list of users of multiple births by collecting frontface features of the users in the list of users of multiple births forcomparison. As shown in FIG. 2(b), the list of users with similar frontface features is acquired based on the list of users of multiple births,and thus is included in the range of the list of users of multiplebirths.

In step 24, a list of users with similar front face features and similarside face features is acquired for each group of users with similarfront face features based on whether their side face features aresimilar.

In the embodiment, for each group of users with similar front facefeatures, a list of users with similar front face features and similarside face features can be acquired by collecting side face features ofthe users for comparison and determining whether side face features ofthe users with similar front face features are also similar. As shown inFIG. 2(b), the list of users with similar front face features andsimilar side face features is acquired based on the list of users withsimilar front face features, and thus is included in the range of thelist of users with similar front faces.

Referring back to FIG. 1, in step 120, a list of users of multiplebirths corresponding to the user is searched, based on the front facefeature and the side face feature of the user, for a candidate usermatching both the front face feature and the side face feature of theuser.

The list of users of multiple births corresponding to the user is a listof users of multiple births with similar front face features andnon-similar side face features, that is, the list of users of multiplebirths corresponding to the shaded area shown in FIG. 2(b).

In step 130, it is determined, based on consistency between thecandidate user and the user in the front face feature and the side facefeature, whether the user succeeds in the authentication.

In an embodiment, the determining, based on consistency between thecandidate user and the user in the front face feature and the side facefeature, whether the user succeeds in the authentication includes thefollowing two situations: 1. determining that the user succeeds in theauthentication if the candidate user is consistent with the user in boththe front face feature and the side face feature; and 2. determiningthat the user fails in the authentication if the candidate user isinconsistent with the user in the front face feature or the side facefeature.

In the embodiment, a front face feature and a side face feature of auser are acquired in response to a face authentication request of theuser, then a list of users of multiple births corresponding to the useris searched, based on the front face feature and the side face featureof the user, for a candidate user matching both the front face featureand the side face feature of the user, wherein the list of users ofmultiple births corresponding to the user is a list of users of multiplebirths with similar front face features and non-similar side facefeatures, and finally, it can be determined, based on consistencybetween the candidate user and the user in the front face feature andthe side face feature, whether the user succeeds in the authentication.As such, when the authenticated user is a user of multiple births, thefront face feature and the side face feature of the user can be acquiredand then compared with front face features and side face features ofusers in the pre-established list of users of multiple births todetermine whether the user succeeds in the authentication, thus solvingthe problem of identifying using face features of a user of multiplebirths in the prior art.

An authentication mode determination method is further provided in anembodiment of this specification. FIG. 3 is a flow chart of anauthentication mode determination method 300 according to an embodiment.The method 300 includes the following steps.

In step 310, user information of a user is acquired in response to arequest for activating a face authentication mode from the user.

In the embodiment, if a request for activating a face authenticationmode is received from a user, user information of the user is acquiredin response to the request for activating a face authentication modefrom the user. The user information of the user may specifically be anID of the user, i.e., the unique identification information of the useras described above.

In step 320, an authentication mode is determined for the user based onfirst user information with similar front face features and non-similarside face features in a list of users of multiple births, second userinformation with similar front face features and similar side facefeatures in the list of users of multiple births, and the userinformation of the user.

In an embodiment, the determining an authentication mode for the userbased on the first user information with similar front face features andnon-similar side face features in the list of users of multiple births,the second user information with similar front face features and similarside face features in the list of users of multiple births, and the userinformation of the user includes the following situations.

In Situation i, a front face feature and a side face feature of the userare acquired if the user information of the user is included in thefirst user information; and an authentication mode is determined for theuser based on the front face feature and the side face feature of theuser. As the first user information corresponds to similar front facefeatures and non-similar side face features in the list of users ofmultiple births, i.e., the user information corresponding to the shadedarea shown in FIG. 2(b), the front face feature and the side facefeature of the user may be collected as comparison features forperforming face authentication on the user. When face authentication isperformed on the user, a front face picture and a side face picture ofthe user may be collected at the same time, and the front face featureand the side face feature corresponding to the front face picture andthe side face picture collected when face authentication is performed onthe user are compared with the front face feature and the side facefeature of the user collected when the user activates the faceauthentication mode, and it is determined based on a comparison resultwhether the user succeeds in the authentication.

In Situation ii, a front face feature of the user is acquired if theuser information of the user is not included in the first userinformation; and the authentication mode is determined for the userbased on the front face feature of the user. In this situation, if theuser information of the user is not included in the first userinformation, it can be determined that the user information of the useris not included in the second user information, either. In other words,the user does not belong to the users with similar front face features.Therefore, when the user activates the face authentication mode on aterminal device, the terminal device can collect only a front facefeature of the user as a comparison feature for performing faceauthentication on the user. Then, when face authentication is performedon the user, the terminal device can collect a front face picture of theuser, compare a front face feature corresponding to the front facepicture collected when face authentication is performed on the user withthe front face feature collected when the user activates theauthentication mode, and determine based on a comparison result whetherthe user succeeds in the authentication.

In Situation iii, the user is prompted to activate an authenticationmode other than the face authentication mode, if the user information ofthe user is included in the second user information. If the userinformation of the user is included in the second user information, itindicates that the user is included in the list of users of multiplebirths with similar front face features and similar side face features.In this situation, in order to improve the accuracy of theauthentication result and ensure the security of the user information,the user can be prompted to activate another authentication mode, i.e.,an authentication mode other than the face authentication mode, such asfingerprint recognition, password verification, and SMS verificationcode.

FIG. 4 is a flow chart of an authentication mode determination method 40according to an embodiment. For example, the method 40 may be performedby a terminal device. As shown in FIG. 4, the method 400 includes thefollowing steps.

In step 41, a user ID is acquired in response to a request foractivating a face authentication mode from the user.

In step 42, it is determined based on the user ID whether the user hasactivated the face authentication mode, and if it is determined that theuser has activated the face authentication mode, step 43 is performed.

In step 43, if it is determined that the user has activated the faceauthentication mode, the user is allowed to directly use the faceauthentication mode.

In step 44, if it is determined that the user has not activated the faceauthentication mode, it is prompted that the user is required toauthorize activation of the face authentication mode.

In step 45, it is determined whether the user is included in the seconduser information described above, if it is determined that the user isincluded in the second user information, step 46 is performed, and if itis determined that the user is not included in the second userinformation, step 47 is performed.

In step 46, if it is determined that the user is included in the seconduser information, the user is prompted that activation of the faceauthentication mode fails.

In this case, in order to protect the security of user information andimprove the accuracy of the authentication result, the user can beprompted to use another authentication mode, that is, an authenticationmode other than the face authentication mode.

In step 47, if it is determined that the user is not included in thesecond user information, it is determined whether the user is includedin the first user information described above.

In step 48, if it is determined that the user is included in the firstuser information, a front face feature and a side face feature of theuser are collected, and the authentication mode is determined for theuser based on the front face feature and the side face feature of theuser.

That is, the front face feature and the side face feature of the userare collected as comparison features of the face authentication mode ofthe user. When face authentication is performed on the user, a frontface picture and a side face picture of the user are collected, a frontface feature and a side face feature corresponding to the front facepicture and the side face picture are extracted and compared with thefront face feature and the side face feature collected when the useractivates the face authentication mode, if the comparison is successful,the user succeeds in the face authentication, and if the comparison isnot successful, the user fails in the face authentication.

In step 49, a front face feature of the user is collected if the userinformation of the user is not included in the first user information;and the authentication mode is determined for the user based on thefront face feature of the user.

In this situation, the terminal device can only collect the front facefeature of the user. When face authentication is performed on the user,the terminal device can only collect a front face picture of the user,extract a front face feature corresponding to the front face picture andcompare the front face feature with the front face feature collectedwhen the user activates the face authentication mode. If the comparisonis successful, the user succeeds in the face authentication, and if thecomparison is not successful, the user fails in the face authentication.

In step 410, a list of users who have activated the face authenticationmode is updated.

In the embodiment, user information of a user is acquired in response toa request for activating a face authentication mode from the user, andthen an authentication mode is determined for the user based on firstuser information with similar front face features in a list of users ofmultiple births, second user information with similar front facefeatures and similar side face features in the list of users of multiplebirths, and the user information of the user. As such, when the user toactivate the face authentication mode is a user of multiple births, aspecific authentication mode can be determined for the user bydetermining whether the user is a user only with a similar front facefeature in the list of users of multiple births, a user with both asimilar front face feature and a similar side face feature in the listof users of multiple births, or a user with a non-similar front facefeature in the list of users of multiple births, so that some users inthe list can also activate the face authentication mode.

FIG. 5 is a schematic diagram of an authentication apparatus 500according to an embodiment. Referring to FIG. 5, the authenticationapparatus 500 can include an acquisition unit 501, a searching unit 502,and a determination unit 503.

The acquisition unit 501 is configured to acquire a front face featureand a side face feature of a user in response to a face authenticationrequest of the user.

The searching unit 502 is configured to search, based on the front facefeature and the side face feature of the user, a list of users ofmultiple births corresponding to the user for a candidate user matchingboth the front face feature and the side face feature of the user,wherein the list of users of multiple births corresponding to the useris a list of users of multiple births with similar front face featuresand non-similar side face features.

The determination unit 503 is configured to determine, based onconsistency between the candidate user and the user in the front facefeature and the side face feature, whether the user succeeds in theauthentication.

In an embodiment, the acquisition unit 501 is configured to: determinewhether the user is included in a list of users of multiple births withsimilar front faces; and acquire the front face feature and the sideface feature of the user if the user is included in the list of users ofmultiple births with similar front face features.

In an embodiment, the determination unit 503 is configured to: determinethat the user succeeds in the authentication if the candidate user isconsistent with the user in both the front face feature and the sideface feature; and determine that the user fails in the authentication ifthe candidate user is inconsistent with the user in the front facefeature or the side face feature.

The authentication apparatus 500 can implement the method in the methodembodiment of FIG. 1 and FIGS. 2(a) and 2(b). Reference can be made tothe authentication method in the embodiments of FIG. 1 and FIGS. 2(a)and (2 b) for detail.

FIG. 6 is a schematic diagram of an authentication mode determinationapparatus 600 according to an embodiment. Referring to FIG. 6, theauthentication mode determination apparatus 600 can include anacquisition unit 601 and a determination unit 602.

The acquisition unit 601 is configured to acquire user information of auser in response to a request for activating a face authentication modefrom the user.

The determination unit 602 is configured to determine an authenticationmode for the user based on first user information with similar frontface features and non-similar side face features in a list of users ofmultiple births, second user information with similar front facefeatures and similar side face features in the list of users of multiplebirths, and the user information of the user.

In an embodiment, the determination unit 602 is configured to: acquire afront face feature and a side face feature of the user if the userinformation of the user is included in the first user information; anddetermine the authentication mode for the user based on the front facefeature and the side face feature of the user.

In an embodiment, the determination unit 602 is configured to: acquire afront face feature of the user if the user information of the user isnot included in the first user information; and determine theauthentication mode for the user based on the front face feature of theuser.

In an embodiment, the determination unit 602 is configured to: promptthe user to activate an authentication mode other than the faceauthentication mode if the user information of the user is included inthe second user information.

The authentication mode determination apparatus 600 can implement themethod in the method embodiment of FIG. 3 and FIG. 4. Reference can bemade to the authentication mode determination method in the embodimentsshown in FIG. 3 and FIG. 4 for detail.

FIG. 7 is a schematic diagram of an electronic device 700 according toan embodiment. Referring to FIG. 7, the electronic device 700 includes aprocessor 702, and optionally further includes an internal bus 704, anetwork interface 706, and a memory. The memory may include an internalmemory 708 such as a high-speed Random-Access Memory (RAM), or mayfurther include a non-volatile memory 710 such as at least one magneticdisk memory. The electronic device 700 may further include hardwarerequired by other services.

The processor 702, the network interface 706, and the memory 708 and 710may be interconnected through the internal bus 704, and the internal bus704 may be an Industry Standard Architecture (ISA) bus, a PeripheralComponent Interconnect (PCI) bus, an Extended Industry StandardArchitecture (EISA) bus, or the like. The internal bus 704 may be anaddress bus, a data bus, a control bus, and the like. For ease ofrepresentation, only one double-sided arrow is shown in FIG. 7 torepresent the internal bus 704, but it does not mean that there is onlyone bus or one type of buses.

The memory is configured to store a program. The program may includeprogram codes including a computer operation instruction. The memory mayinclude the internal memory 708 and the non-volatile memory 710, andprovides an instruction and data to the processor 702.

The processor 702 reads, from the non-volatile memory 710, thecorresponding computer program into the internal memory 708 and runs thecomputer program to perform the above described authentication method(FIGS. 1, 2(a), and 2(b)), thus forming an authentication apparatus atthe logic level. The processor 702 executes the program stored in thememory 708 and 710, and is configured to perform the followingoperations: acquiring a front face feature and a side face feature of auser in response to a face authentication request of the user;searching, based on the front face feature and the side face feature ofthe user, a list of users of multiple births corresponding to the userfor a candidate user matching both the front face feature and the sideface feature of the user, wherein the list of users of multiple birthscorresponding to the user is a list of users of multiple births withsimilar front face features and non-similar side face features; anddetermining, based on consistency between the candidate user and theuser in the front face feature and the side face feature, whether theuser succeeds in the authentication.

The processor 702 may be an integrated circuit chip having a signalprocessing capability. In the process of implementation, various stepsof the above method may be completed by an integrated logic circuit ofhardware in the processor 702 or an instruction in the form of software.The processor 702 may be a general-purpose processor, including aCentral Processing Unit (CPU), a Network Processor (NP), etc.; or may bea Digital Signal Processor (DSP), an Application Specific IntegratedCircuit (ASIC), a Field-Programmable Gate Array (FPGA) or anotherprogrammable logic device, discrete gate or transistor logic device, ordiscrete hardware component. The methods, steps, and logical blockdiagrams disclosed in the embodiments of this specification can beimplemented or performed. The general-purpose processor may be amicroprocessor, or the processor may be any conventional processor orthe like. The steps of the method disclosed in one or more embodimentsof this specification may be directly performed by a hardware decodingprocessor, or may be performed by a combination of hardware and softwaremodules in the decoding processor. The software module can be located ina mature storage medium in the field, such as a random-access memory, aflash memory, a read-only memory, a programmable read-only memory or anelectrically erasable programmable memory, and a register. The storagemedium is located in the memory, and the processor reads the informationin the memory and implements the steps of the above method incombination with its hardware.

FIG. 8 is a schematic diagram of an electronic device 800 according toan embodiment. Referring to FIG. 8, the electronic device 800 includes aprocessor 802, and optionally further includes an internal bus 804, anetwork interface 806, and a memory. The memory may include an internalmemory 808 such as a high-speed Random-Access Memory (RAM), or mayfurther include a non-volatile memory 810 such as at least one magneticdisk memory. The electronic device 800 may further include hardwarerequired by other services.

The processor 802, the network interface 806, and the memory 808 and 810may be interconnected through the internal bus 804, and the internal bus804 may be an Industry Standard Architecture (ISA) bus, a PeripheralComponent Interconnect (PCI) bus, an Extended Industry StandardArchitecture (EISA) bus, or the like. The internal bus 804 may be anaddress bus, a data bus, a control bus, and the like. For ease ofrepresentation, only one double-sided arrow is shown in FIG. 8 torepresent the internal bus 804, but it does not mean that there is onlyone bus or one type of buses.

The memory is configured to store a program. The program may includeprogram codes including a computer operation instruction. The memory mayinclude the internal memory 808 and the non-volatile memory 810, andprovides an instruction and data to the processor 802.

The processor 802 reads, from the non-volatile memory 810, thecorresponding computer program into the internal memory 808 and runs thecomputer program to perform the above described authentication modedetermination method (FIGS. 3 and 4), thus forming an authenticationmode determination apparatus at the logic level. The processor 802executes the program stored in the memory 808 and 810, and is configuredto perform the following operations: acquiring user information of auser in response to a request for activating a face authentication modefrom the user; and determining an authentication mode for the user basedon first user information with similar front face features andnon-similar side face features in a list of users of multiple births,second user information with similar front face features and similarside face features in the list of users of multiple births, and the userinformation of the user.

The processor 802 may be an integrated circuit chip having a signalprocessing capability. In the process of implementation, various stepsof the above method may be completed by an integrated logic circuit ofhardware in the processor 802 or an instruction in the form of software.The processor 802 may be a general-purpose processor, including aCentral Processing Unit (CPU), a Network Processor (NP), etc.; or may bea Digital Signal Processor (DSP), an Application Specific IntegratedCircuit (ASIC), a Field-Programmable Gate Array (FPGA) or anotherprogrammable logic device, discrete gate or transistor logic device, ordiscrete hardware component. The methods, steps, and logical blockdiagrams disclosed in the embodiments of this specification can beimplemented or performed. The general-purpose processor may be amicroprocessor, or the processor may be any conventional processor orthe like. The steps of the method disclosed in one or more embodimentsof this application may be directly performed by a hardware decodingprocessor, or may be performed by a combination of hardware and softwaremodules in the decoding processor. The software module can be located ina mature storage medium in the field, such as a random-access memory, aflash memory, a read-only memory, a programmable read-only memory or anelectrically erasable programmable memory, and a register. The storagemedium is located in the memory, and the processor reads the informationin the memory and implements the steps of the above method incombination with its hardware.

The above description is merely example embodiments of thisspecification, and is not intended to limit the protection scope of thisspecification. Any modification, equivalent replacement, improvement andthe like made within the spirit and principle of one or more embodimentsof this specification should be included in the protection scope of thisspecification.

The system, apparatus, module or unit illustrated in the aboveembodiments may be implemented by a computer chip or an entity, or by aproduct having a certain function. A typical implementation device is acomputer. For example, the computer may be a personal computer, a laptopcomputer, a cellular phone, a camera phone, a smart phone, a personaldigital assistant, a media player, a navigation device, an email device,a game console, a tablet computer, a wearable device, or a combinationof any of these devices.

The computer readable medium includes non-volatile and volatile media aswell as movable and non-movable media, and may implement informationstorage by means of any method or technology. The information may be acomputer readable instruction, a data structure, and a module of aprogram or other data. Examples of the storage medium of a computerinclude, but are not limited to, a phase change memory (PRAM), a staticrandom access memory (SRAM), a dynamic random access memory (DRAM),other types of RAMs, a ROM, an electrically erasable programmableread-only memory (EEPROM), a flash memory or other memory technologies,a compact disk read-only memory (CD-ROM), a digital versatile disc (DVD)or other optical storages, a cassette tape, a magnetic tape/magneticdisk storage or other magnetic storage devices, or any othernon-transmission medium, and can be used to store information accessibleto a computing device. The computer readable medium does not includetransitory media, such as a modulated data signal and a carrier. [00%]It should be further noted that the terms “include,” “comprise” or othervariations thereof are intended to cover non-exclusive inclusion, sothat a process, method, article or device including a series of elementsnot only includes the elements, but also includes other elements notexpressly listed, or further includes elements inherent to the process,method, article or device. In the absence of more limitations, anelement defined by “including a/an . . . ” does not exclude that theprocess, method, article or device including the element further hasother identical elements.

Various embodiments in this specification are described progressively.The same or similar parts between the embodiments may be referenced toone another. In each embodiment, the focus of description is on the partthat is different from other embodiment. Particularly, the systemembodiment is described in a relatively simple manner because it issimilar to the method embodiment, and for related parts, reference canbe made to the parts described in the method embodiment.

1.-20. (canceled)
 21. An authentication mode determination method,comprising: acquiring user information of a user in response to arequest for activating a face authentication mode from the user; anddetermining an authentication mode for the user based on first userinformation of users with similar front face features and non-similarside face features in a list of users of multiple births, second userinformation of users with similar front face features and similar sideface features in the list of users of multiple births, and the userinformation of the user.
 22. The method of claim 21, wherein thedetermining an authentication mode for the user further comprises:acquiring a front face feature and a side face feature of the user ifthe user information of the user is included in the first userinformation; and determining the authentication mode for the user basedon the front face feature and the side face feature of the user.
 23. Themethod of claim 21, wherein the determining an authentication mode forthe user further comprises: acquiring a front face feature of the userif the user information of the user is not included in the first userinformation; and determining the authentication mode for the user basedon the front face feature of the user.
 24. The method of claim 21,wherein the determining an authentication mode for the user furthercomprises: prompting the user to activate an authentication mode otherthan a face authentication mode, if the user information of the user isincluded in the second user information.
 25. The method of claim 21,wherein the user is a first user, and the method further comprises:acquiring a front face feature and a side face feature of the first userin response to a face authentication request of the first user;searching, based on the front face feature and the side face feature ofthe first user, a first list of users of multiple births correspondingto the first user for a candidate user matching both the front facefeature and the side face feature of the first user, wherein the firstlist of users of multiple births corresponding to the first user is alist of users of multiple births with similar front face features andnon-similar side face features; and determining, based on consistencybetween the candidate user and the first user in the front face featureand the side face feature, whether the first user succeeds in theauthentication.
 26. The method of claim 25, wherein the acquiring afront face feature and a side face feature of the first user comprises:determining whether the first user is in the list of users of multiplebirths; and acquiring the front face feature and the side face featureof the first user if it is determined that the first user is in the listof users of multiple births.
 27. The method of claim 25, wherein thedetermining, based on consistency between the candidate user and thefirst user in the front face feature and the side face feature, whetherthe first user succeeds in the authentication comprises: determiningthat the first user succeeds in the authentication if the candidate useris consistent with the first user in both the front face feature and theside face feature; and determining that the first user fails in theauthentication if the candidate user is inconsistent with the first userin the front face feature or the side face feature.
 28. An electronicdevice, comprising: a processor; and a memory storing instructionsexecutable by the processor; wherein the processor is configured to:acquire user information of a user in response to a request foractivating a face authentication mode from the user; and determine anauthentication mode for the user based on first user information ofusers with similar front face features and non-similar side facefeatures in a list of users of multiple births, second user informationof users with similar front face features and similar side face featuresin the list of users of multiple births, and the user information of theuser.
 29. The electronic device of claim 28, wherein in determining anauthentication mode for the user, the processor is further configuredto: acquire a front face feature and a side face feature of the user ifthe user information of the user is included in the first userinformation; and determine the authentication mode for the user based onthe front face feature and the side face feature of the user.
 30. Theelectronic device of claim 28, wherein in determining an authenticationmode for the user, the processor is further configured to: acquire afront face feature of the user if the user information of the user isnot included in the first user information; and determine theauthentication mode for the user based on the front face feature of theuser.
 31. The electronic device of claim 28, wherein in determining anauthentication mode for the user, the processor is further configuredto: prompt the user to activate an authentication mode other than a faceauthentication mode, if the user information of the user is included inthe second user information.
 32. The electronic device of claim 28,wherein the user is a first user, and the processor is furtherconfigured to: acquire a front face feature and a side face feature ofthe first user in response to a face authentication request of the firstuser; search, based on the front face feature and the side face featureof the first user, a first list of users of multiple birthscorresponding to the first user for a candidate user matching both thefront face feature and the side face feature of the first user, whereinthe first list of users of multiple births corresponding to the firstuser is a list of users of multiple births with similar front facefeatures and non-similar side face features; and determine, based onconsistency between the candidate user and the first user in the frontface feature and the side face feature, whether the first user succeedsin the authentication.
 33. The electronic device of claim 32, wherein inacquiring a front face feature and a side face feature of the firstuser, the processor is further configured to: determine whether thefirst user is in the list of users of multiple births; and acquire thefront face feature and the side face feature of the first user if it isdetermined that the first user is in the list of users of multiplebirths.
 34. The electronic device of claim 32, wherein in determining,based on consistency between the candidate user and the first user inthe front face feature and the side face feature, whether the first usersucceeds in the authentication, the processor is further configured to:determine that the first user succeeds in the authentication if thecandidate user is consistent with the first user in both the front facefeature and the side face feature; and determine that the first userfails in the authentication if the candidate user is inconsistent withthe first user in the front face feature or the side face feature.
 35. Anon-transitory computer-readable storage medium having stored thereoninstructions that, when executed by a processor of a device, cause thedevice to perform an authentication mode determination method, themethod comprising: acquiring user information of a user in response to arequest for activating a face authentication mode from the user; anddetermining an authentication mode for the user based on first userinformation of users with similar front face features and non-similarside face features in a list of users of multiple births, second userinformation of users with similar front face features and similar sideface features in the list of users of multiple births, and the userinformation of the user.
 36. The non-transitory computer-readablestorage medium of claim 35, wherein the determining an authenticationmode for the user further comprises: acquiring a front face feature anda side face feature of the user if the user information of the user isincluded in the first user information; and determining theauthentication mode for the user based on the front face feature and theside face feature of the user.
 37. The non-transitory computer-readablestorage medium of claim 35, wherein the determining an authenticationmode for the user further comprises: acquiring a front face feature ofthe user if the user information of the user is not included in thefirst user information; and determining the authentication mode for theuser based on the front face feature of the user.
 38. The non-transitorycomputer-readable storage medium of claim 35, wherein the determining anauthentication mode for the user further comprises: prompting the userto activate an authentication mode other than a face authenticationmode, if the user information of the user is included in the second userinformation.
 39. The non-transitory computer-readable storage medium ofclaim 35, wherein the user is a first user, and the method furthercomprises: acquiring a front face feature and a side face feature of thefirst user in response to a face authentication request of the firstuser; searching, based on the front face feature and the side facefeature of the first user, a first list of users of multiple birthscorresponding to the first user for a candidate user matching both thefront face feature and the side face feature of the first user, whereinthe first list of users of multiple births corresponding to the firstuser is a list of users of multiple births with similar front facefeatures and non-similar side face features; and determining, based onconsistency between the candidate user and the first user in the frontface feature and the side face feature, whether the first user succeedsin the authentication.