Data processing method and device
A technology of data and biometrics, applied in character and pattern recognition, instruments, computing, etc., can solve the problems of complex review process, time-consuming, and low efficiency of evaluation results, and achieve the effect of improving review efficiency, reducing steps, and obtaining accurate results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] According to an embodiment of the present invention, a method embodiment of a data processing method is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0028] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal according to a data processing method in an embodiment of the present invention. like figure 1 As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor...
Embodiment 2
[0170] According to an embodiment of the present invention, an embodiment of an apparatus for implementing the above data processing method is also provided, Figure 5 is a schematic structural diagram of a data processing device according to Embodiment 2 of the present invention. like Figure 5 As shown, the device includes: a collection module 50 , an identification module 52 , and an analysis module 54 .
[0171] Acquisition module 50, for collecting the face image data of the user who uses the application platform;
[0172] Corresponding to the collection of face image data in step S20 in the first embodiment, the embodiment of the present invention can be applied to any image acquisition device for collecting face image data, for example, a camera embedded in a mobile terminal device, a video camera or a camera with an image upload function , wherein the mobile terminal equipment may at least include: smart phones, notebook computers, tablet computers, palmtop computers...
Embodiment 3
[0223] Embodiments of the present invention may provide a mobile terminal, and the mobile terminal may be any mobile terminal device in a mobile terminal group. Optionally, in this embodiment, the foregoing mobile terminal may also be replaced with a terminal device such as a mobile terminal.
[0224] Optionally, in this embodiment, the foregoing mobile terminal may be located in at least one network device among multiple network devices of the computer network.
[0225] In this embodiment, the above-mentioned mobile terminal can execute the program code of the following steps in the vulnerability detection method of the application program: collecting the face image data of the user using the application platform; Personal face feature value, wherein the face feature value is used to represent the feature value of any biological feature of the face; according to multiple face feature values, the behavior result matching the face image data is obtained, wherein the behavior re...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


