Unlock instant, AI-driven research and patent intelligence for your innovation.

Face authentication method and system

An authentication method and authentication system technology, applied in the direction of character and pattern recognition, instruments, computer parts, etc., can solve problems such as unusable, ineffective anti-counterfeiting, and insufficient convenience, and achieve the effect of speeding up processing and avoiding interference

Pending Publication Date: 2020-02-14
HUNAN CHUANGHE FUTURE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The cameras currently used are generally two types of visible light cameras and near-infrared cameras. However, the identification equipment corresponding to the visible light camera has the following problems: 1. It uses visible light sources for identification, which cannot be used in dark environments, and supplementary light is required at night.
2. It is easy to use flat photos or other non-real faces for false authentication, which cannot effectively prevent counterfeiting
The identification equipment corresponding to the near-infrared camera also has the following problems: 1. It uses the short-wave light source in the near-infrared band and relies on the reflected light source for imaging, so it cannot be used in direct sunlight; 2. Although it can effectively prevent counterfeiting, it must be in the terminal Registering facial features on the device is not convenient enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face authentication method and system
  • Face authentication method and system
  • Face authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them.

[0067] Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0068] Such as figure 1 As shown, a face authentication method includes the following steps,

[0069] S1. Register face storage features;

[0070] There are two ways to register face storage features: the first way, the administrator enters the user management menu after face authentication, and collects the face storage featur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a face authentication method, which comprises the following steps of: registering face storage characteristics; setting a storage feature mark and a storage feature source of face storage features; acquiring human face detection features; setting a detection feature mark and a detection feature source of a face detection feature; comparing the storage feature source with the detection feature source, and comparing the storage feature mark with the detection feature mark; if the comparison is successful, comparing the face storage feature with the face detection feature;and if the face storage feature is successfully compared with the face detection feature, passing the face authentication. The face authentication method disclosed by the invention can improve the compatibility of face recognition products, and is suitable for various occasions with different environments.

Description

technical field [0001] The present invention relates to the technical field of face recognition, and more specifically, to a face authentication method and system. Background technique [0002] Face recognition technology is a kind of biometric technology. It is a kind of biometric recognition technology that automatically performs identity identification based on the unique physiological characteristics of the face. It has non-contact data collection, convenient and fast, and strong interactivity. It is easy to trace back and other advantages. [0003] The existing face recognition has a wide range of applications. For example, a common access control system can also use a face recognition system, that is, collect face data through a camera, and compare the collected face data with the pre-stored authentication data. If the comparison If successful, the face recognition is successful. If the comparison fails, the face recognition fails. [0004] The cameras currently use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00
CPCG06V40/166G06V40/168G06V40/172
Inventor 曹明威伍军辉
Owner HUNAN CHUANGHE FUTURE TECH CO LTD