Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Face recognition authentication method, device, and electronic equipment

A technology of face recognition and identification, which is applied in the field of identity recognition, can solve problems such as low efficiency, and achieve the effect of improving efficiency and reducing the amount of calculation

Active Publication Date: 2020-06-09
HANVON CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present application provides a face recognition identity verification method, which at least solves the problem of inefficiency in identity verification based on face recognition in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition authentication method, device, and electronic equipment
  • Face recognition authentication method, device, and electronic equipment
  • Face recognition authentication method, device, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] A face recognition identity verification method disclosed in this embodiment, such as figure 1 As shown, the method includes: step 110 to step 140.

[0061] Step 110, acquiring communication device identifiers of object groups in the object detection area.

[0062] The communication device in the embodiment of the present application may be: a mobile phone, a phone watch, etc., which has a unique identifier bound to the user's identity information, wherein the communication device identifier may be a phone number or a phone number of the phone watch. The target object may be a person to be identified.

[0063] In the specific implementation process of the present application, the communication equipment held by the object in the object group in the target detection area can be detected through communication technology.

[0064] For example, the mobile base station broadcasts a communication query signal, and receives a feedback signal from a communication device, and ...

Embodiment 2

[0076] A face recognition identity verification method disclosed in this embodiment, such as figure 2 As shown, the method includes: Step 210 to Step 250.

[0077] Step 210, acquiring a preset face library.

[0078] In some embodiments of the present application, the above-mentioned face library includes a corresponding relationship consisting of at least a communication device identifier, identity information, and face information.

[0079] For example, the preset face library includes multiple sets of correspondences, and the format of each set of correspondences is as follows (communication device identification, identity information, face information). As more and more systems require real-name registration, such as mobile phone numbers or phone number applications, opening bank accounts, and handling certificate information, face databases including mobile phone numbers, identity information, and face images are easy to obtain.

[0080] During specific implementation, ...

Embodiment 3

[0116] A face recognition authentication device disclosed in this embodiment, such as image 3 As shown, the above-mentioned devices include:

[0117] A communication device identification acquisition module 310, configured to acquire communication device identifications of object groups in the target detection area;

[0118] The target group database to be identified module 320 is used to determine the target group database to be identified according to the communication device identification and the preset face library;

[0119] The face image acquisition module 330 of the target object is used to acquire the face image of the target object to be verified in the target detection area;

[0120]The identity information determination module 340 is used to compare and identify the face images obtained by the target object face image acquisition module 330 based on the target group database to be identified determined by the target group database determination module 320 to dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a face recognition identity verification method, which belongs to the field of identity recognition technology and solves the problem of poor real-time identity verification in the prior art. The method includes: obtaining the communication device identification of the object group in the target detection area, and Determine the target group database to be identified according to the communication device identification and the preset face database, and obtain the face image of the target object to be verified in the target detection area, and compare and identify the acquired face images based on the target group database to be identified , to determine the identity information of the target object to be verified. In the face recognition authentication method disclosed in the embodiment of the present application, the range of face comparison is narrowed by obtaining the communication device identification of the target group in the target detection area, and the face comparison is further performed based on the reduced face database to determine The identity information of the target object has a small amount of calculation, which helps to improve the efficiency of identity verification based on face recognition.

Description

technical field [0001] The present application relates to the technical field of identification, and in particular to a method, device, electronic device and storage medium for face recognition identity verification. Background technique [0002] Face recognition technology is a kind of biometric recognition technology. It combines image processing technology, computer graphics, pattern recognition and other research fields. It has broad development prospects and is an effective means of identity verification. The identity recognition method based on face recognition usually constructs a face database in advance. During identity verification, the image of the face to be verified is compared with the image in the face database one by one, and finally the successful comparison is determined. The identity information corresponding to the face image in the face database is used as the identity information of the face to be verified. [0003] However, because the faces in the fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00
CPCG06V40/168G06V40/172
Inventor 黄磊彭菲肖志宏张健
Owner HANVON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products