Face identification security mobile phone and implementation method thereof

A face recognition and realization method technology, applied in character and pattern recognition, computer security device, telephone structure, etc., can solve the problem that users cannot pass the authentication smoothly, achieve privacy and business security, avoid direct contact, reliable high sex effect

Inactive Publication Date: 2011-06-15
HUAQIN TECH CO LTD
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a face recognition security mobile phone and its implementation method to solve the defect that the user cannot successfully pass the authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face identification security mobile phone and implementation method thereof
  • Face identification security mobile phone and implementation method thereof
  • Face identification security mobile phone and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] like figure 1 As shown, the face recognition security mobile phone provided by this embodiment includes a housing, a main board, a baseband processing unit 1 and a storage module 2; Processing unit 1 is connected.

[0016] The baseband processing unit 1 is provided with a GPIO interface that can be used as an interrupt, and the face recognition module is connected to the baseband processing unit 1 through the GPIO interface. Those skilled in the art can understand that the face recognition module can send a high-level signal and a low-level signal to the baseband processing unit 1, so that the level on the GPIO interface changes. Unit 1 enters the interrupt according to the level change on the GPIO interface, and controls the mobile phone to run related operations.

[0017] Described facial recognition module comprises facial image input module 3, facial feature extraction module 4 and feature data storage module 5; Described facial image input module 3 and described ...

Embodiment 2

[0022] like figure 2 As shown, it is another embodiment of the face recognition security mobile phone of the present invention, which adds the following content on the basis of the first embodiment above:

[0023] The face recognition module also includes a format conversion module 7 , the input end of the format conversion module 7 is connected to the baseband processing unit 1 and the output end is connected to the facial feature extraction module 4 . Those skilled in the art can understand that the pictures sent to the mobile phone through the camera or various interfaces can include multiple data formats, such as JPG format, JPEG format, GIF format, PNG format or BMP format, etc., the format conversion module 7 It is used to convert the pictures of the above-mentioned multiple data formats into a format recognizable by the facial feature extraction module 4 . Those skilled in the art can understand that the image data format recognized by the facial feature extraction mo...

Embodiment 3

[0028] like image 3 As shown, this embodiment provides a method for implementing a facial recognition security mobile phone, which includes in turn:

[0029] Step 1) A step for inputting a face image and saving it; this step can be realized by using a camera or various interfaces.

[0030] Step 2) a step for extracting facial feature data and saving the facial feature data;

[0031] Step 3) A step for comparing facial feature data and sending a control signal according to the comparison result.

[0032] Described step 2) also comprises: the step that is used to carry out format conversion to the facial picture of input; The picture data format that described facial feature extraction module 4 identification can be set in the present embodiment is TIFF format, as described in step 1 If the input picture format is JPG format, JPEG format, GIF format, PNG format or BMP format, the above format must be converted to TIFF format.

[0033] like Figure 4 As shown, the step 3) co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a face identification security mobile phone and an implementation method thereof. The mobile phone comprises a shell, a main board, a base band processing unit, a memory module and a face identification module, wherein the face identification module is connected with the base band processing unit. The method sequentially comprises the steps: 1) inputting and memorizing a face image; 2) extracting and memorizing face characteristic data; and 3) comparing with the face characteristic data and transmitting a control signal according to a comparison result. The face identification security mobile phone and the implementation method thereof are high in reliability, so that a user can be guaranteed to smoothly pass the identification. The invention is combined with the functions such as mobile phone unlocking, address list, file information and the like, so that the privacy and the commerce security of the user can be effectively guaranteed.

Description

technical field [0001] The invention relates to the field of electronic communication, in particular to a facial recognition security mobile phone and its implementation method. Background technique [0002] Mobile phones in the prior art all perform user identification and authentication by operating buttons and inputting passwords. This identification method is not only complicated in operation and low in reliability, but also needs to memorize the key operation sequence or password. When the user forgets the key operation sequence or password, the user often cannot pass the authentication. [0003] Biometric authentication is a method of identifying or authenticating a living person based on their physical and behavioral characteristics. There are many kinds of human biometrics. Until now, biometric authentication technologies that have been put into use include fingerprints, hand shape, face shape, voice, iris, retina, signature, keystroke dynamics, etc. On March 2, 20...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06F21/00H04M1/21G06F21/32
Inventor 吴飞
Owner HUAQIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products