Security check method based on face identification, application server and computer readable storage medium

An application server, face recognition technology, applied in the direction of instruments, time registers, single input/output port registers, etc. The effect of experience

Active Publication Date: 2018-04-20
PING AN TECH (SHENZHEN) CO LTD
View PDF12 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has one of the most serious problems, that is, the speed is very slow, and the passengers stay for a long time as a whole, which will cause a large number of follow-up personnel to be crowded
From the verification of the ticket and ID card to the subsequent identification, the whole operation will last about 3-5 seconds, which will cause a large number of queues during peak hours

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security check method based on face identification, application server and computer readable storage medium
  • Security check method based on face identification, application server and computer readable storage medium
  • Security check method based on face identification, application server and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] It should be noted that the descriptions involving "first", "second", etc. in the present invention are only for descriptive purposes, and should not be understood as indicating or implying their relative importance or implicitly indicating the number of indicated technical features . Thus, the features defined as "first" and "second" may explicitly or implicitly include at least o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security check method based on face identification. The method comprises: when an identity information card is detected, obtaining an image of the identity information card;when the image of the identity information card is successfully obtained, unlatching the door of a first gate; when the door of the first gate is unlatched, controlling multiple cameras to capture head portraits of a passenger for many times; comparing the head portraits captured by the multiple cameras and performing screening to obtain the face portrait of the passenger; comparing the captured face portrait with the obtained image of the identity information card; and when the face portrait successfully matches the obtained image of the identity information card, unlatching the door of a second gate. The invention further provides an application server and a computer readable storage medium. According to the security check method based on face identification, the application server and the computer readable storage medium, the face identification is completed during travelling of a passenger. The passenger doesn't have to wait, so that time of the passenger isn't occupied, and jam isprevented.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a face recognition-based security inspection method, an application server and a computer-readable storage medium. Background technique [0002] With the continuous advancement of informatization, biometric identification technology has become a safer and more convenient personal identification technology, and has attracted more and more attention. Face recognition technology is based on human facial feature information for identity recognition. It is a new biometric recognition technology that has emerged with the rapid advancement of computer, image processing, pattern recognition and other technologies in recent years. More and more applications In information security, identity authentication, security, intelligent monitoring and other fields. [0003] In particular, real-name authentication is now fully implemented at stations, and the use of face recognition for ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/32G07C9/37G07C9/38
Inventor 陈林张国辉
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products