Identity authentication method, storage medium, processor and system

A technology of identity authentication and identity information, applied in the field of identity authentication, can solve the problems of increasing the target search range, increasing the cost of server hardware, and reducing the recognition accuracy, so as to achieve the effect of improving accurate search capabilities, fast server resources, and reducing the number of searches

Pending Publication Date: 2020-12-29
西安光启智能技术有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Computing resource consumption is high
Existing AI technology will use high-performance servers to perform calculations on the premise of satisfying QPS and TPS. However, in the case of massive data, performing a full database comparison search will occupy a large amount of machine computing resources and will not release them, resulting in a backlog of tasks. Unable to output results in real time
[0004] The huge portrait library leads to a decrease in recognition accuracy
At present, the LWF face recognition accuracy rate reaches 99.83%, but it is only limited to the results of fixed competition sets. In actual scenes, due to various factors in the image quality of the face database, when the portrait database is too large, the recognition accuracy will decrease when comparing and searching the target person. Dropped significantly
It leads to an increase in the misidentification rate, which leads to identification errors. If it is used in the security and financial fields, it will cause certain losses.
[0005] The portrait database cannot be accurately positioned and searched
The traditional portrait library does not know when and where the target person appears in a certain portrait database. As a result, when building the portrait database, the target person and the non-target person will share the same portrait database, which cannot accurately locate and compare the database. When comparing the identity of the controlled person , will search and compare the whole library, increase the target search range, and reduce the QPS of the server
[0006] High cost of server hardware
In the industry, because it is impossible to accurately locate when the target person will appear, the portrait database exists as a global database. When comparing 1:N and M:N, a violent comparison method is used. When the data volume of the portrait database is huge, the consumed The computing resources are large, and the corresponding server hardware cost will also increase under the condition of satisfying QPS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, storage medium, processor and system
  • Identity authentication method, storage medium, processor and system
  • Identity authentication method, storage medium, processor and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] figure 1 It is a flowchart of an identity authentication method of the present invention. Such as figure 1 As shown, an identity authentication method includes steps:

[0058] S11. Receive GPS information sent by the photoelectric radar site, MAC information of the mobile terminal carried by the object to be identified, user registration information, and image information of the object to be identified;

[0059] S12. Process and save the GPS information, the MAC information of the mobile terminal carried by the object to be identified, the user registration information, and the image information of the object to be identified;

[0060] S13, collide with GPS and MAC, and update the data in the local dynamic database regularly through server scheduling for the feature database data after GPS and MAC collision;

[0061] S14. Extract biometric information from the image information of the object to be identified, and match the biometric information with the local dynamic...

Embodiment 2

[0081] An embodiment of the present invention also provides a storage medium, the storage medium includes a stored program, wherein the above-mentioned identity authentication method process is executed when the above-mentioned program is running.

[0082] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store program codes for executing the following flow of the face attribute recognition method:

[0083] S11. Receive GPS information sent by the photoelectric radar site, MAC information of the mobile terminal carried by the object to be identified, user registration information, and image information of the object to be identified;

[0084] S12. Process and save the GPS information, the MAC information of the mobile terminal carried by the object to be identified, the user registration information, and the image information of the object to be identified;

[0085] S13, collide with GPS and MAC, and update the data in the local dynamic da...

Embodiment 3

[0090] An embodiment of the present invention also provides a processor, which is used to run a program, wherein the steps in the above identity authentication method are executed when the program is running.

[0091] Optionally, in this embodiment, the above program is used to perform the following steps:

[0092] S11. Receive GPS information sent by the photoelectric radar site, MAC information of the mobile terminal carried by the object to be identified, user registration information, and image information of the object to be identified;

[0093] S12. Process and save the GPS information, the MAC information of the mobile terminal carried by the object to be identified, the user registration information, and the image information of the object to be identified;

[0094] S13, collide with GPS and MAC, and update the data in the local dynamic database regularly through server scheduling for the feature database data after GPS and MAC collision;

[0095] S14. Extract biometr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method, a storage medium, a processor and a system. The method comprises the steps of receiving GPS information, mobile terminal information carried by a to-be-identified body and image information of the to-be-identified body; colliding the GPS information and the mobile terminal information, and scheduling the feature library data collided by theGPS information and the mobile terminal by a server to update the data to a local dynamic database at regular time; and extracting biological characteristic information from the to-be-identified bodyimage information, matching the biological characteristic information with the local dynamic database, and if matching succeeds, determining that the to-be-identified body passes authentication. Theoperation capability can be improved, the comparison time can be shortened, the portrait library can be reduced, the personnel identity recognition accuracy can be improved, the portrait library accurate search capability can be improved, and the hardware server cost can be reduced.

Description

【Technical field】 [0001] The technical field of identity authentication of the present invention relates in particular to an identity authentication method, storage medium, processor and system. 【Background technique】 [0002] At present, the violent comparison method mainly used in portrait comparison in the existing technology needs to consume a lot of computing resources and hardware costs under the premise of satisfying QPS and TPS. The accuracy rate of face recognition will also decrease with the increase of the face database, which will also bring corresponding risks in identity authentication. The main flaws are as follows: [0003] Computing resource consumption is high. Existing AI technology will use high-performance servers to perform calculations on the premise of satisfying QPS and TPS. However, in the case of massive data, performing a full database comparison search will occupy a large amount of machine computing resources and will not release them, resultin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06K9/00
CPCG06F21/32G06F21/31G06V40/70
Inventor 刘若鹏栾琳季春霖邵俊
Owner 西安光启智能技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products