Face-recognition authentication method, device, and electronic device
A face recognition and to-be-recognized technology, applied in the field of identity recognition, can solve problems such as low efficiency, and achieve the effect of improving efficiency and reducing the amount of calculation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0059] Example one
[0060] A face recognition authentication method disclosed in this embodiment, such as figure 1 As shown, the method includes: step 110 to step 140.
[0061] Step 110: Obtain the communication device identification of the target group in the target detection area.
[0062] The communication device in the embodiment of the present application may be a communication device with a unique identifier bound to the user's identity information, such as a mobile phone, a phone watch, etc., where the communication device identifier may be a mobile phone number or a phone number of the phone watch. The target object may be the person to be identified.
[0063] In the specific implementation process of this application, the communication equipment held by the object in the object group in the target detection area can be detected through communication technology.
[0064] For example, the mobile base station broadcasts the communication query signal and receives the feedback si...
Example Embodiment
[0075] Example two
[0076] A face recognition authentication method disclosed in this embodiment, such as figure 2 As shown, the method includes: step 210 to step 250.
[0077] Step 210: Obtain a preset face library.
[0078] In some embodiments of the present application, the aforementioned face database includes a corresponding relationship consisting of at least a communication device identifier, identity information, and face information.
[0079] For example, the preset face database includes multiple sets of correspondences, and the format of each set of correspondences is as follows (communication device identification, identity information, face information). As more and more systems require real-name systems, such as mobile phone number or phone number application, bank account opening, and document information processing, a face database including mobile phone number, identity information, and face images is easy to obtain.
[0080] In specific implementation, the communica...
Example Embodiment
[0115] Example three
[0116] This embodiment discloses a face recognition identity verification device, such as image 3 As shown, the above device includes:
[0117] The communication device identification acquiring module 310 is used to acquire the communication device identification of the target group in the target detection area;
[0118] The to-be-identified target group database determining module 320 is configured to determine the to-be-identified target group database according to the identification of the communication device and the preset face database;
[0119] The target object face image acquisition module 330 is configured to acquire the face image of the target object to be verified in the target detection area;
[0120] The identity information determining module 340 is configured to compare and recognize the face image acquired by the target object face image acquisition module 330 based on the target group database to be identified determined by the target group dat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap