Identity authentication method and device, and mobile terminal

An identity authentication and equipment technology, applied in the field of identity authentication technology, can solve problems such as affecting user experience, increasing the complexity and speed of iris recognition and face recognition, and increasing the complexity and cost of hardware system design.

Active Publication Date: 2016-12-21
徐鹤菲
View PDF5 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the iris and face image acquisition devices are independent of each other, which will lead to a significant increase in the complexity and cost of hardware system design, which is not conducive to the popul

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, and mobile terminal
  • Identity authentication method and device, and mobile terminal
  • Identity authentication method and device, and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0034] figure 1 A flow chart of an identity authentication method 100 based on multi-biometric feature recognition according to an embodiment of the present invention is shown.

[0035] According to an implementation manner, in addition to necessary configurations such as a memory interface, a data processor, a central processing unit, a peripheral interface, and a screen, the mobile terminal suitable for performing the method 100 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method. The method comprises the following steps: acquiring a face image of a user to be identified through a composite imaging device; performing human eye detection on the face image, and if human eyes are detected in a second area image, entering a face identification mode; determining whether the second area image satisfies a face identification condition; if so, performing face identification; according to a face identification result, preliminarily determining whether the user is legal; if the user is preliminarily determined as a legal user, entering an iris identification mode; re-obtaining a first area image, including the human eyes, of the user in a first area; positioning and cutting an eye image from the first area image, and determining whether the eye image satisfies an iris identification condition; if so, performing iris identification; and according to an iris identification result, re-determining whether the user is a legal user. The invention further discloses a corresponding identity authentication device and a mobile terminal.

Description

technical field [0001] The invention relates to the field of pattern recognition, and more specifically, to an identity authentication technology. Background technique [0002] In recent years, with the rapid development of computer and network technology and the improvement of people's living standards, the functions of mobile terminals have been continuously improved-users can use mobile terminals for entertainment, shopping, etc., which brings great convenience to users' lives, but at the same time, Security risks are also constantly emerging: user information is maliciously stolen, and there are huge security risks in mobile payment and mobile financial management... Therefore, the technology of identity authentication through biometric identification has been widely researched and applied in mobile terminals. [0003] Traditional biometric identification includes: fingerprint recognition, face recognition, iris recognition, voiceprint recognition, etc. Among them, face ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00
CPCG06V40/16G06V40/18
Inventor 王晓鹏邓翔
Owner 徐鹤菲
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products