Identity authentication method and equipment

An identity authentication and device technology, applied in the field of pattern recognition, can solve problems such as face matching failure and easy changes in human appearance, so as to improve accuracy, simplify the identity authentication process, and improve user experience

Inactive Publication Date: 2016-11-23
BEIJING SENSETIME TECH DEV CO LTD
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Face information is also a kind of commonly used human biometrics, but the disadvantage of the existing method is that the appearance of people is easy to change, and the difference in the appearance of the face each time for identity authentication may lead to the failure of face matching. It also requires the user to cooperate in the initial and subsequent face image collection process, including facing the camera at the correct angle, removing makeup, removing facial accessories, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and equipment
  • Identity authentication method and equipment
  • Identity authentication method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Various embodiments of the present disclosure will be described below with reference to the accompanying drawings. The following description includes specific details to aid in understanding, but these specific details should be considered as exemplary only. Accordingly, those of ordinary skill in the art will understand that various changes and modifications of the embodiments described herein can be made without departing from the spirit and scope of the present disclosure. In addition, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.

[0033] figure 1 A schematic diagram of an identity authentication device 100 according to an embodiment of the present disclosure is shown.

[0034] exist figure 1 Among them, the identity authentication device 100 may include: a housing 110 , a collection device 120 , a facial feature extraction device 130 , an authentication device 140 , a first feature screening device 150 and a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and equipment. The method comprises the steps that an identity authentication request of a user under authentication is received; the identity authentication request is responded and the face image of the user under authentication is automatically acquired; the face features are extracted from the acquired face image of the user under authentication; and existence of face feature templates matched with the face features extracted from the acquired face image of the user under authentication is determined in a preregistered face feature template library, representative feature screening is performed according to the face features extracted from the acquired face image of the user under authentication and the face feature templates if the judgment result is yes, and the face feature template library is updated by using the selected features through screening.

Description

technical field [0001] The present disclosure relates to the technical field of pattern recognition, in particular to an identity authentication method and device based on face recognition and comparison. Background technique [0002] In many occasions in daily life, authentication of personnel identity is required, such as device login, access control, payment, etc. As people's requirements for security are getting higher and higher, traditional identity authentication methods can no longer meet people's needs. Many identity authentication methods based on biometrics have emerged, such as fingerprints, voiceprints, and iris recognition. Unique to individuals and relatively difficult to imitate, it has also become the mainstream identity authentication method. [0003] In common applications of identity authentication, such as inputting passwords, fingerprint scanning, etc., the user needs to cooperate and perform some operations. If the collection of user identity authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
Inventor 马堃李诚汤晓鸥
Owner BEIJING SENSETIME TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products