Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Human face identification method and system

A face recognition and identification code technology, applied in the field of recognition, can solve the problems of low security of human biometric identification systems, and achieve the effect of avoiding system application defects and improving safety and effectiveness.

Active Publication Date: 2018-06-15
SHENZHEN FANHAI SANJIANG TECH DEV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem mainly solved by the present invention is the low security problem of the existing human body biometric identification system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Human face identification method and system
  • Human face identification method and system
  • Human face identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0034] Embodiment 2: as image 3 The shown face recognition system includes: an input, an output module, a processor and a memory, and further includes: a face recognition module, a key verification module, and an information management module. The difference from Example 1 is that:

[0035] First of all, the information database in the information management module pre-stores a piece of face and facial feature information, and at the same time pre-stores a first key corresponding to the identification code and the facial feature information;

[0036] Secondly, the key verification module is used to randomly generate a new second key after receiving the face recognition success information, all keys are different; when the system is pre-stored, the first key in the information base is sent to the person The facial feature information corresponds to the mobile terminal bound by the user; the newly generated second key is simultaneously sent to the mobile terminal and the syste...

Embodiment 3

[0048] Embodiment 3: The face recognition method of this embodiment further includes: the face recognition process supports the collection of images or videos of one or more users at a time, and uses the Harr classifier to detect one or more face regions respectively, which are used for the ASM algorithm. Identify the facial feature information in turn, and perform one-to-one matching. Each time the match is consistent, a face recognition success message is sent, corresponding to the subsequent password verification process, otherwise a face recognition error message is returned.

[0049] The above-mentioned Haar classifier and ASM algorithm for face region detection and facial feature determination are all existing technologies, and this embodiment is only an example, and is not limited to the above-mentioned technologies.

[0050] The embodiment of the present invention can solve the main defect that the existing face recognition method is easy to crack by applying the method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a human face identification method and system. The human face identification method mainly comprises a human face identification process and a key verification process. The human face identification process comprises the steps of collecting a human face image or video of a user; detecting out a human face region and determining facial feature information required for identification; matching the collected facial feature information with facial feature information pre-stored in the system; and if the matching succeeds, sending human face identification success information. The key verification process comprises the steps of randomly generating a new key after the human face identification success information is received; sending the new key to a mobile terminal of the user and an information library of the system; inputting the received key by the user; comparing the key with a key pre-stored in the system; and if the key is correct, performing information recording. The human face identification and random key double verification method is adopted, so that system application defects possibly occurring in depending on single human face identification method or key verification method are overcome, and the security and validity of the system are simply and effectively improved.

Description

technical field [0001] The invention relates to the technical field of recognition, in particular to a method and system for face recognition. Background technique [0002] With the rapid development of science and technology informatization, people's demand for intelligence has become more and more clear. Existing access control and attendance systems mainly use fingerprints, cards, keys, voice and other identification methods, and generally have shortcomings such as low security performance, invasion of others' privacy, and easy infection of diseases. For example, fingerprint recognition is easily affected by fingerprint contamination and damage, resulting in a low recognition rate, a greatly increased probability of infectious diseases, and a suspicion of violating personal privacy; when performing card identification, the system can only display the person, not the person. The cardholder performs identification; the key input type is easily affected by the forgotten key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00H04L9/08
CPCH04L9/0861G06V40/172G06V40/161G06V40/168
Inventor 陈继斌徐有亮
Owner SHENZHEN FANHAI SANJIANG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products