Face authentication method and system
An authentication method and authentication system technology, applied in the direction of character and pattern recognition, instruments, computer parts, etc., can solve problems such as unusable, ineffective anti-counterfeiting, and insufficient convenience, and achieve the effect of speeding up processing and avoiding interference
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them.
[0067] Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.
[0068] Such as figure 1 As shown, a face authentication method includes the following steps,
[0069] S1. Register face storage features;
[0070] There are two ways to register face storage features: the first way, the administrator enters the user management menu after face authentication, and collects the face storage featur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


