A face recognition method and system

A face recognition and face recognition technology, applied in the field of recognition, can solve the problem of low security of the human biometric system, and achieve the effect of avoiding system application defects and improving safety and effectiveness.

Active Publication Date: 2021-12-28
SHENZHEN FANHAI SANJIANG TECH DEV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem mainly solved by the present invention is the low security problem of the existing human body biometric identification system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A face recognition method and system
  • A face recognition method and system
  • A face recognition method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0034] Embodiment two: if image 3 The shown face recognition system includes: input and output modules, a processor and a memory, and also includes: a face recognition module, a key verification module, and an information management module. The difference from Example 1 is:

[0035] First, the information base in the information management module pre-stores a copy of face and facial feature information, and simultaneously pre-stores a first key corresponding to the identification code and facial feature information;

[0036] Secondly, the key verification module is used to randomly generate a new second key after receiving the face recognition success information, and all keys are different; when the system pre-stores, the first key in the information database is sent to the person The facial feature information corresponds to the mobile terminal bound by the user; the newly generated second key is sent to the mobile terminal and the system information base corresponding to ...

Embodiment 3

[0048] Embodiment three: the face recognition method of this embodiment also includes: the face recognition process supports collecting images or videos of one or more users at a time, and uses the Harr classifier to detect one or more face regions respectively for the ASM algorithm The facial feature information is identified sequentially and matched one by one. If the matching is consistent, a face recognition success message is sent, corresponding to the subsequent password verification process, otherwise a face recognition error message is returned.

[0049] The above-mentioned Haar classifier and ASM algorithm used for face area detection and facial feature determination are all existing technologies, and this embodiment is for example only, and is not limited to the above-mentioned technologies.

[0050] The embodiment of the present invention can solve the main defect that the existing face recognition method is easy to crack through the application of the method of face...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a face recognition method and system, wherein the face recognition method mainly includes a face recognition process and a key verification process. The face recognition process includes: collecting the user's face image or video, detecting the face area and determining the facial feature information required for recognition, matching the collected facial feature information with the facial feature information pre-stored in the system, and if the match is consistent Then send face recognition success information. The key verification process includes: after receiving the successful face recognition information, randomly generate a new key and send it to the user's mobile terminal and system information database, the user enters the received key, and compares it with the key stored in the system Compare and record the information if it is correct. The present invention adopts the double verification method of face recognition and random key, avoids the system application defects that may occur when only relying on the face recognition method or the key verification method, and simply and effectively improves the safety and effectiveness of the system.

Description

technical field [0001] The invention relates to the technical field of recognition, in particular to a face recognition method and system. Background technique [0002] With the rapid development of science and technology informatization, people's demand for intelligence is becoming more and more clear. The existing access control and time attendance system mainly uses fingerprints, cards, keys, voice and other identification methods, which generally have disadvantages such as low security performance, invasion of other people's privacy, and easy infection of diseases. For example, fingerprint identification is easily affected by fingerprint pollution and damage, resulting in low recognition rate, greatly increased probability of infectious diseases, and suspected of violating personal privacy; when performing card identification, the system can only display the person, but not The cardholder performs identification; the key input type is easily affected by the forgotten ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00H04L9/08
CPCH04L9/0861G06V40/172G06V40/161G06V40/168
Inventor 陈继斌徐有亮
Owner SHENZHEN FANHAI SANJIANG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products