Face-recognition authentication method, device, and electronic device

A face recognition and to-be-recognized technology, applied in the field of identity recognition, can solve problems such as low efficiency, and achieve the effect of improving efficiency and reducing the amount of calculation.

Active Publication Date: 2018-12-25
HANVON CORP
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present application provides a face recognition identity verification method, which at least

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face-recognition authentication method, device, and electronic device
  • Face-recognition authentication method, device, and electronic device
  • Face-recognition authentication method, device, and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0059] Example one

[0060] A face recognition authentication method disclosed in this embodiment, such as figure 1 As shown, the method includes: step 110 to step 140.

[0061] Step 110: Obtain the communication device identification of the target group in the target detection area.

[0062] The communication device in the embodiment of the present application may be a communication device with a unique identifier bound to the user's identity information, such as a mobile phone, a phone watch, etc., where the communication device identifier may be a mobile phone number or a phone number of the phone watch. The target object may be the person to be identified.

[0063] In the specific implementation process of this application, the communication equipment held by the object in the object group in the target detection area can be detected through communication technology.

[0064] For example, the mobile base station broadcasts the communication query signal and receives the feedback si...

Example Embodiment

[0075] Example two

[0076] A face recognition authentication method disclosed in this embodiment, such as figure 2 As shown, the method includes: step 210 to step 250.

[0077] Step 210: Obtain a preset face library.

[0078] In some embodiments of the present application, the aforementioned face database includes a corresponding relationship consisting of at least a communication device identifier, identity information, and face information.

[0079] For example, the preset face database includes multiple sets of correspondences, and the format of each set of correspondences is as follows (communication device identification, identity information, face information). As more and more systems require real-name systems, such as mobile phone number or phone number application, bank account opening, and document information processing, a face database including mobile phone number, identity information, and face images is easy to obtain.

[0080] In specific implementation, the communica...

Example Embodiment

[0115] Example three

[0116] This embodiment discloses a face recognition identity verification device, such as image 3 As shown, the above device includes:

[0117] The communication device identification acquiring module 310 is used to acquire the communication device identification of the target group in the target detection area;

[0118] The to-be-identified target group database determining module 320 is configured to determine the to-be-identified target group database according to the identification of the communication device and the preset face database;

[0119] The target object face image acquisition module 330 is configured to acquire the face image of the target object to be verified in the target detection area;

[0120] The identity information determining module 340 is configured to compare and recognize the face image acquired by the target object face image acquisition module 330 based on the target group database to be identified determined by the target group dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for authenticating face recognition is disclosed by the present invention, belonging to the technical field of authentication, which solves the problem of poor real-time authentication in theprior art. The method comprises: a communication device identification of an object group within a target detection area is obtained, at that same time, according to the identification of the communication equipment and the preset face database, the target group database to be recognized is determined, the face image of the target object to be verified in the target detection area is obtained, and the obtained face image is compared and recognized based on the target group database to be recognized, and the identity information of the target object to be verified is determined. According to the method for authenticating face recognition disclosed in an embodiment of that present application, by acquiring the identification of the communication equipment of the object group in the target detection area, the face comparison range is narrowed, and the face comparison is carried out based on the reduced face database to determine the identity information of the target object, and the computational load is small, which is helpful to improve the efficiency of the authentication based on face recognition.

Description

technical field [0001] The present application relates to the technical field of identification, and in particular to a method, device, electronic device and storage medium for face recognition identity verification. Background technique [0002] Face recognition technology is a kind of biometric recognition technology. It combines image processing technology, computer graphics, pattern recognition and other research fields. It has broad development prospects and is an effective means of identity verification. The identity recognition method based on face recognition usually constructs a face database in advance. During identity verification, the image of the face to be verified is compared with the image in the face database one by one, and finally the successful comparison is determined. The identity information corresponding to the face image in the face database is used as the identity information of the face to be verified. [0003] However, because the faces in the fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00
CPCG06V40/168G06V40/172
Inventor 黄磊彭菲肖志宏张健
Owner HANVON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products