Method for achieving user authentication by utilizing camera
An identity verification and camera technology, applied in the fields of digital data authentication, character and pattern recognition, deception detection, etc., can solve the problems of loss, theft, easy forgetting, etc., to improve security, ensure picture quality, improve reliability and The effect of accuracy
Inactive Publication Date: 2014-03-26
湖北微模式科技发展有限公司
5 Cites 66 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention discloses a method for achieving user authentication by utilizing a camera. The method comprises the following steps: (1) pre-collecting and storing a facial image of a user, (2) performing vivo detection on a facial image of a current user through the camera in the field use process, executing the step (3) if the detection succeeds, and prompting that the detection fails if not, (3) performing field photographing on the current user through the camera and performing storing, (4) comparing the stored facial image of the user with the pre-collected facial image of the user to obtain the degree of similarity, and (5) comparing the degree of similarity and a preset threshold value and determining whether the two compared facial images belong to the same person, wherein it is determined that the two compared facial images belong to the same person if the degree of similarity is greater than or equal to the preset threshold value, and the authentication cannot be passed if the degree of similarity is smaller than the preset threshold value. According to the method for achieving the user authentication by utilizing the camera, because dual detection is performed through a facial recognition system and the vivo detection, the situation of easily invading the system can be effectively controlled, and the security of user data is promoted.
Application Domain
Digital data authenticationSpoof detection
Technology Topic
User authenticationFacial recognition system +3
Image
Examples
- Experimental program(1)
- Effect test(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Foodstuff monitoring method and device
Owner:XIAOMI INC
Cookie-based secure single sign-on method and unified authentication service system thereof
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD
Method, device and system for carrying out service access control on third-party application
Owner:ALIBABA GRP HLDG LTD
Multifunctional carry-on power supply
Owner:NANKAI UNIV
Classification and recommendation of technical efficacy words
- Guaranteed picture quality
- improve security
An image processing method and apparatus
ActiveCN109427047Aprevent image degradationGuaranteed picture quality
Owner:BOE TECH GRP CO LTD +1