Content data recommendation method, device and storage medium based on identity verification device
A technology for authentication and content data, applied in the field of information processing, can solve the problems of no push function, no display of commercial information, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] figure 1 It is a flow chart of a method for recommending content data based on an identity verification device according to Embodiment 1 of the present invention. Such as figure 1 As shown, the method for recommending content data based on an identity verification device in this embodiment includes the following steps:
[0060] In step S101, in response to an identity verification operation, a first image of the user is obtained, and attribute information of the user is obtained from the first image.
[0061] Wherein, the first image may be a video image in a sequence of video frames. Specifically, the first image may include a user's head image. The attribute information includes, but is not limited to, the user's hairstyle features, skin color features, and the like. The identity verification device is an electronic device with an identity verification function.
[0062] In a specific implementation manner, the attribute information of the user may be obtained fr...
Embodiment 2
[0069] figure 2 It is a flowchart of a method for recommending content data based on an identity verification device according to Embodiment 2 of the present invention.
[0070] In this embodiment, the method for recommending content data in the embodiment of the present invention is described by taking an electronic device with a face recognition function as an execution subject. However, those skilled in the art should understand that in practical applications, other execution methods The main body can refer to this embodiment to realize the recommendation operation of corresponding content data.
[0071] Such as figure 2 As shown, the method for recommending content data based on an identity verification device in this embodiment includes the following steps:
[0072] In step S201, the identity information of the user is extracted from the certificate information.
[0073] In a specific embodiment, when acquiring the user's first image, the method further includes: acq...
Embodiment 3
[0099] image 3 It is a flow chart of a method for recommending content data based on an identity verification device according to Embodiment 3 of the present invention. Such as image 3 As shown, the method for recommending content data based on an identity verification device in this embodiment includes the following steps:
[0100] In step S301, user attribute information sent by a terminal device is received.
[0101] In this embodiment, the terminal device captures the user's image in response to the identity verification operation, and acquires the user's attribute information from the user's image. After acquiring the attribute information of the user, the terminal device sends the attribute information of the user to the content server, and the content server receives the attribute information of the user sent by the terminal device. Wherein, the content server may be a server with an advertisement distribution function, and the attribute information of the user inc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


