Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Face-recognition authentication method, device, and electronic device

A face recognition and to-be-recognized technology, applied in the field of identity recognition, can solve problems such as low efficiency, and achieve the effect of improving efficiency and reducing the amount of calculation.

Active Publication Date: 2018-12-25
HANVON CORP
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present application provides a face recognition identity verification method, which at least solves the problem of inefficiency in identity verification based on face recognition in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face-recognition authentication method, device, and electronic device
  • Face-recognition authentication method, device, and electronic device
  • Face-recognition authentication method, device, and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] A face recognition identity verification method disclosed in this embodiment, such as figure 1 As shown, the method includes: step 110 to step 140.

[0061] Step 110, acquiring communication device identifiers of object groups in the object detection area.

[0062] The communication device in the embodiment of the present application may be: a mobile phone, a phone watch, etc., which has a unique identifier bound to the user's identity information, wherein the communication device identifier may be a phone number or a phone number of the phone watch. The target object may be a person to be identified.

[0063] In the specific implementation process of the present application, the communication equipment held by the object in the object group in the target detection area can be detected through communication technology.

[0064] For example, the mobile base station broadcasts a communication query signal, and receives a feedback signal from a communication device, and ...

Embodiment 2

[0076] A face recognition identity verification method disclosed in this embodiment, such as figure 2 As shown, the method includes: Step 210 to Step 250.

[0077] Step 210, acquiring a preset face library.

[0078] In some embodiments of the present application, the above-mentioned face library includes a corresponding relationship consisting of at least a communication device identifier, identity information, and face information.

[0079] For example, the preset face library includes multiple sets of correspondences, and the format of each set of correspondences is as follows (communication device identification, identity information, face information). As more and more systems require real-name registration, such as mobile phone numbers or phone number applications, opening bank accounts, and handling certificate information, face databases including mobile phone numbers, identity information, and face images are easy to obtain.

[0080] During specific implementation, ...

Embodiment 3

[0116] A face recognition authentication device disclosed in this embodiment, such as image 3 As shown, the above-mentioned devices include:

[0117] A communication device identification acquisition module 310, configured to acquire communication device identifications of object groups in the target detection area;

[0118] The target group database to be identified module 320 is used to determine the target group database to be identified according to the communication device identification and the preset face library;

[0119] The face image acquisition module 330 of the target object is used to acquire the face image of the target object to be verified in the target detection area;

[0120]The identity information determination module 340 is used to compare and identify the face images obtained by the target object face image acquisition module 330 based on the target group database to be identified determined by the target group database determination module 320 to dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authenticating face recognition is disclosed by the present invention, belonging to the technical field of authentication, which solves the problem of poor real-time authentication in theprior art. The method comprises: a communication device identification of an object group within a target detection area is obtained, at that same time, according to the identification of the communication equipment and the preset face database, the target group database to be recognized is determined, the face image of the target object to be verified in the target detection area is obtained, and the obtained face image is compared and recognized based on the target group database to be recognized, and the identity information of the target object to be verified is determined. According to the method for authenticating face recognition disclosed in an embodiment of that present application, by acquiring the identification of the communication equipment of the object group in the target detection area, the face comparison range is narrowed, and the face comparison is carried out based on the reduced face database to determine the identity information of the target object, and the computational load is small, which is helpful to improve the efficiency of the authentication based on face recognition.

Description

technical field [0001] The present application relates to the technical field of identification, and in particular to a method, device, electronic device and storage medium for face recognition identity verification. Background technique [0002] Face recognition technology is a kind of biometric recognition technology. It combines image processing technology, computer graphics, pattern recognition and other research fields. It has broad development prospects and is an effective means of identity verification. The identity recognition method based on face recognition usually constructs a face database in advance. During identity verification, the image of the face to be verified is compared with the image in the face database one by one, and finally the successful comparison is determined. The identity information corresponding to the face image in the face database is used as the identity information of the face to be verified. [0003] However, because the faces in the fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00
CPCG06V40/168G06V40/172
Inventor 黄磊彭菲肖志宏张健
Owner HANVON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products