Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Big-data-based face charming authentication method and system

An authentication method and big data technology, applied in network data retrieval, network data indexing, electrical digital data processing, etc., can solve problems such as difficult to effectively solve face value authentication, unable to reflect the impression of beauty or beauty and ugliness, and blunt judgments

Inactive Publication Date: 2017-04-12
江苏子求网络科技有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the first method embodies this starting point, it is difficult to effectively solve the problem of audition or a large number of user face value authentication. For a large number of users to be evaluated or user photos that emerge at the same time when the number reaches a certain number, For example, when evaluating the appearance and ranking of 100,000 beauties in a certain area, whether it is review experts or ordinary people participating in the interaction, it will be difficult to make an objective evaluation of all users or user photos; and the second judgment scheme It includes prior knowledge (for example, people themselves know the shape and characteristics of eyes, nose, mouth, etc., and know their mutual positions, so that the computer can judge based on this) and statistical methods (that is, through machine learning) to judge), but the judgment methods of these two methods are relatively blunt judgments, which cannot reflect people’s impression of the beauty or ugliness of the evaluation object, and the scoring results can be used as entertainment results, but have no practical significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big-data-based face charming authentication method and system
  • Big-data-based face charming authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to better understand the technical content of the present invention, specific embodiments are given together with the attached drawings for description as follows.

[0030] Aspects of the invention are described in this disclosure with reference to the accompanying drawings, which show a number of illustrated embodiments. Embodiments of the present disclosure are not necessarily intended to include all aspects of the invention. It should be appreciated that the various concepts and embodiments described above, as well as those described in more detail below, can be implemented in any of numerous ways, since the concepts and embodiments disclosed herein are not limited to any implementation. In addition, some aspects of the present disclosure may be used alone or in any suitable combination with other aspects of the present disclosure.

[0031] to combine figure 1 , figure 2 As shown, the present invention proposes a beauty authentication system based on bi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a big-data-based face charming authentication method. The method comprises: at least one storage region is provided at a server to store a photo of a to-be-evaluated object, wherein the photo and the to-be-evaluated object form a one-to-one-correspondence mapping relationship; according to a set rule, two groups of photos are selected, and charming degree evaluation requests are pushed to a plurality of evaluation users; the server receives evaluation results and carries out face farming ranking on to-be-evaluated objects corresponding to the two groups of photos; the above-mentioned steps are repeated and a face charming ranking result of all to-be-evaluated objects is formed; and on the basis of the face charming ranking result, grade classification is carried out by combining a set face charming score curve, so that a face charming score of each face charming grade in the face charming ranking result is obtained. According to the face charming authentication method, on the one hand, data expresses themselves and thus a face charming score and rank of a user is formed naturally, so that manual intervention and analysis can be reduced or avoided; and on the other hand, on the basis of big data accumulation, the face charming ranking result is close to the real information.

Description

technical field [0001] The present invention relates to the technical field of computer and internet reference, in particular to a method and system for face value authentication based on big data. Background technique [0002] "Appearance is also productivity", this sentence reflects people's deep pursuit of beauty. A person's appearance is very important in many cases. According to an online survey in the UK, three out of five people form an impression of each other within 5 seconds of meeting, and more than one third of people think that appearance is the first to form an impression. All elements of impression. [0003] At present, in the era of vigorous development of various dating software, the appearance of users (especially the appearance of beautiful women) has a great influence on the activity and popularity of the software. At the same time, the user's appearance also plays a very important role in identifying the target group for making friends. By selecting th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
CPCG06F16/50G06F16/951
Inventor 朱冰心
Owner 江苏子求网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products