Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for achieving user authentication by utilizing camera

An identity verification and camera technology, applied in the fields of digital data authentication, character and pattern recognition, deception detection, etc., can solve the problems of loss, theft, easy forgetting, etc., to improve security, ensure picture quality, improve reliability and The effect of accuracy

Inactive Publication Date: 2014-03-26
湖北微模式科技发展有限公司
View PDF5 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This verification method solves the above-mentioned problems of being easily forgotten, stolen or lost, but there are also some problems at the same time. For example, the quality problem when the image is taken will affect the reliability of the identity verification. Portraits or sculptures to replace real human faces, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for achieving user authentication by utilizing camera
  • Method for achieving user authentication by utilizing camera

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Such as figure 1 As shown, a method for using a camera to implement identity verification described in this embodiment includes the following steps:

[0037] S100: Pre-collect the user's face image.

[0038] There are two methods of image collection: one is to use the camera to take pictures on the spot, and the other is to use the system photo upload function to upload electronic photos with the user's front profile picture.

[0039] S200: Carry out face image quality evaluation on the image collected in step S100.

[0040] The function of image quality evaluation is to judge the quality of face imaging. The quality of face image will directly affect the accuracy and reliability of the identity verification system. Therefore, before establishing the face image database for identity verification, it is necessary to The image quality of the face image obtained by taking the photo and the uploaded photo is judged, including the following judging elements:

[0041] (1) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for achieving user authentication by utilizing a camera. The method comprises the following steps: (1) pre-collecting and storing a facial image of a user, (2) performing vivo detection on a facial image of a current user through the camera in the field use process, executing the step (3) if the detection succeeds, and prompting that the detection fails if not, (3) performing field photographing on the current user through the camera and performing storing, (4) comparing the stored facial image of the user with the pre-collected facial image of the user to obtain the degree of similarity, and (5) comparing the degree of similarity and a preset threshold value and determining whether the two compared facial images belong to the same person, wherein it is determined that the two compared facial images belong to the same person if the degree of similarity is greater than or equal to the preset threshold value, and the authentication cannot be passed if the degree of similarity is smaller than the preset threshold value. According to the method for achieving the user authentication by utilizing the camera, because dual detection is performed through a facial recognition system and the vivo detection, the situation of easily invading the system can be effectively controlled, and the security of user data is promoted.

Description

technical field [0001] The invention relates to the research field of computer identity verification, in particular to a method for realizing user identity verification by using a camera. Background technique [0002] The traditional identity verification methods mainly include passwords, fingerprints, tokens or magnetic cards, etc., but there are certain defects, for example: (1) The password is the most widely used device startup verification, and the user sets the startup password in the system setting module after the startup. When the user turns on the device next time, the correct password can be entered to open the device. Although the password method is more convenient, people's memory will often be forgotten with the passage of time or the increase in memory; if the password is written down in the notebook, it is easy to be stolen or lost; (2) Token or magnetic card to verify identity , the user installs an electronic identity verification system on the device, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32
CPCG06F21/32G06V40/16G06V40/45
Inventor 王先基陈友斌
Owner 湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products