Identity recognition method and device, electronic equipment and medium
A technology of identity recognition and identity information, applied in the field of identity recognition, can solve problems that affect social order and are difficult to distinguish
Pending Publication Date: 2021-05-11
HANGZHOU HIKVISION SYST TECH
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
However, when buying a ticket, it is not difficult to fraudulently use/borrow someone else’s identity information to buy a ticket because you only need to show your ID card or provide your ID number
Moreover, only the ticket is required when taking public transportation, and it is difficult for the staff to distinguish whether the actual identity information of the person holding the tick...
Abstract
The embodiment of the invention provides an identity recognition method and device, electronic equipment and a medium, relates to the technical field of intelligent recognition, and can recognize a person who illegally uses/borrows identity information of others to take a public transport means. According to the scheme of the embodiment of the invention, the method comprises the steps: obtaining a target face image collected in a designated area; and if the face image matched with the target face image exists in the specified information base, determining that the actual identity information of the target person corresponding to the target face image is identity information corresponding to the face image matched with the target face image stored in the specified information base; matching the actual identity information of the target person with the identity information in an identity information record, wherein the identity information record comprises the identity information provided by the person entering the designated area within the preset time period; and if the actual identity information of the target person does not exist in the identity information record, determining that the identity information provided by the target person is not consistent with the actual identity information.
Application Domain
Character and pattern recognitionMetadata still image retrieval +2
Technology Topic
EngineeringData science +7
Image
Examples
- Experimental program(1)
Example Embodiment
[0046] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0047] see figure 1 , the embodiment of the present invention provides an identity recognition system, the system includes: a monitoring module, an analysis module, a platform for swiping an ID card and a central platform.
[0048]Among them, the monitoring module is used to collect face images in a designated area.
[0049] The analysis module is used to analyze the identity of the person corresponding to the face image collected by the monitoring module.
[0050] The ID card swiping platform is used to collect the identity information provided by those who enter the designated area.
[0051] The central platform is used to display the analysis results of the analysis module.
[0052] The monitoring module can be a camera, and the analysis module and the central platform can be deployed in the same electronic device or in different electronic devices. The electronic device may be a mobile phone, a tablet computer, a server, or the like. The platform for swiping the ID card can be a gate.
[0053] combine figure 1 , an embodiment of the present invention also provides an identity recognition method, see figure 2 , this method can be applied to figure 1 The electronic device deployed with the analysis module in the system of identification as shown includes the following steps:
[0054] Step 201: Acquire a target face image collected in a designated area.
[0055] It can be understood that the target face image can be any face image collected in a designated area.
[0056] In one embodiment, the video information collected in the designated area sent by the monitoring module can be received, and the target face image can be extracted from the video information.
[0057] For example, the analysis module can extract key frames from the received video according to the preset sampling frequency, and then identify and extract the target face image in each key frame.
[0058] In another embodiment, when the camera deployed with the camera module is a smart camera capable of face recognition, the analysis module can receive the target face image collected in the designated area and sent by the monitoring module.
[0059] Step 202, if there is a face image matching the target face image in the designated information base, then determine that the actual identity information of the target person corresponding to the target face image is: a person matching the target face image stored in the designated information base. The identity information corresponding to the face image.
[0060] Exemplarily, the actual identity information in this embodiment of the present invention may be the ID number of the target person.
[0061] Step 203: Match the actual identity information of the target person with the identity information in the identity information record.
[0062] The identity information record includes identity information provided by persons entering the designated area within a preset time period.
[0063] For example, when the designated area is a train waiting hall or an airplane waiting hall, the person needs to verify the ticket at the gate when entering the waiting hall. At this time, the gate can obtain the identity information corresponding to the ticket held by the person, and the identity information is the identity information provided by the person.
[0064] It is understandable that when the monitoring module is set inside the designated area and the ID card swiping platform is set at the entrance of the designated area, the ID card swiping platform first collects the identity information provided by the personnel, and then the monitoring module collects the information of the personnel entering the designated area. Therefore, the preset time period can be set to be the time period between the time when the monitoring module collects the face image of the target person and the time before and a preset time period from this time. For example, the time when the monitoring module collects the face image of the target person is 10:00, the preset time period is 1 minute, the time when the distance from 10:00 to 10:00 is 1 minute before 10:00 is 9:59, and the preset time period is Time period between 9:59 and 10:00.
[0065] When the monitoring module and the ID card swiping platform are both set at the entrance of the designated area, the moment when the monitoring module collects the face image of the target person is before/after the moment when the ID card swipe platform collects the identity information provided by the target person. Therefore, the preset time period may be a time period between two times of preset duration from the time when the monitoring module collects the face image of the target person. For example, the time when the monitoring module collects the face image of the target person is 10:00, the preset time period is 1 minute, and the two times that are 1 minute away from 10:00 are 9:59 and 10:01, and the preset time period It is between 9:59 and 10:01.
[0066] It is understandable that the same person may enter the designated area multiple times. In order to accurately identify whether the identity information provided by the person in the designated area when entering the designated area is the actual identity information, you can set the identity information record to include the preset time. The identity information provided by the person entering the designated area within the segment is to reduce the impact of the identity information provided by the person entering the designated area before on determining whether the identity information provided by the person entering the designated area this time is his actual identity information.
[0067] In addition, since the identity information collected by the ID card swiping platform within the preset time period is less, it can be reduced to compare the actual identity information corresponding to the collected face image with the identity information collected by the ID card swiping platform within the preset time period. The amount of matching calculation increases the matching efficiency.
[0068] Step 204, if the actual identity information of the target person does not exist in the identity information record, it is determined that the identity information provided by the target person does not match the actual identity information.
[0069] It is understandable that the identity information record includes the identity information provided by the person entering the designated area within the preset time period. If the actual identity information of the target person does not exist in the identity record, it means that the identity information provided by the target person when entering the designated area is the same as that provided by the target person. The actual identity information of the target person does not match.
[0070] Optionally, if the actual identity information of the target person exists in the identity information record, it is determined that the identity information provided by the target person is consistent with the actual identity information.
[0071] Beneficial effects of the embodiments of the present invention: because the embodiments of the present invention can determine that the actual identity information of the target person corresponding to the target face image is Specifies the identity information stored in the information database corresponding to the face image that matches the target face image. When the actual identity information of the target person does not exist in the identity information record, it means that the identity information provided by the target person when entering the designated area does not match the actual identity information. Therefore, the embodiments of the present invention can identify persons who fraudulently use/borrow the identity information of others to take public transportation.
[0072] Optionally, in the foregoing step 202, there are two situations in which the specified information base is the overall information base or the second concerned person information base, so that the identification method provided by the embodiment of the present invention includes the following two ways. Wherein, the overall information database includes preset identity information corresponding to each face image, and the second person of interest information library includes identity information corresponding to the face image of each person of interest.
[0073] Method 1, see image 3 , when the designated information base is the overall information base, the identity recognition method provided by the embodiment of the present invention includes:
[0074] Step 301: Acquire a target face image collected in a designated area.
[0075] Step 302: Acquire the actual identity information of the target person corresponding to the target face image from the overall information database.
[0076] Step 303: Determine whether the actual identity information of the target person is included in the first concerned person information database. If the actual identity information of the target person is included in the first concerned person information database, step 304 is performed; if the first concerned person information database does not include the actual identity information of the target person, step 305 is performed.
[0077] Wherein, the first concerned person information database includes the identity information of each concerned person.
[0078] Exemplarily, the concerned person may be a person corresponding to the personnel information recorded in the blacklist of the EMU train, or the concerned person may also be a person with a bad record. The embodiment of the present invention does not specifically limit the person concerned.
[0079] Step 304: Determine the target person as the concerned person.
[0080] Step 305, it is determined that the target person is not a person of interest.
[0081] Step 306: Match the actual identity information of the target person with the identity information in the identity information record.
[0082] Step 307 , if the target person is a concerned person, and the identity information provided by the target person does not match the actual identity information, it is determined that the target person is a concerned person and enters the designated area by pretending to be someone else.
[0083] Step 308 , if the target person is a concerned person, and the identity information provided by the target person is consistent with the actual identity information, then determine that the target person is a concerned person and enter the designated area.
[0084] Step 309, if the target person is not a concerned person, and the identity information provided by the target person does not match the actual identity information, it is determined that the target person pretends to be another person to enter the designated area.
[0085] Step 310 , if the target person is not a person of interest, and the identity information provided by the target person is consistent with the actual identity information, it is determined that the identity information provided by the target person when entering the designated area is the actual identity information.
[0086] Method 2, see Figure 4 , when the designated information base is the second concerned person information base, the identification method provided by the embodiment of the present invention includes:
[0087] Step 401: Acquire a target face image collected in a designated area.
[0088] Step 402, if there is a face image that matches the target face image in the second person of interest information database, then determine the target person as a person of interest, and obtain a face that matches the target face image from the second person of interest information database. The actual identity information corresponding to the image.
[0089] Step 403, if there is no face image matching the target face image in the second concerned person information base, then determine that the target person is not a concerned person, and obtain a face image matching the target face image from the overall information base Corresponding actual identity information.
[0090] Step 404: Match the actual identity information of the target person with the identity information in the identity information record.
[0091] Step 405 , if the target person is a concerned person, and the identity information provided by the target person does not match the actual identity information, it is determined that the target person is a concerned person and enters the designated area by pretending to be someone else.
[0092] Step 406 , if the target person is a concerned person, and the identity information provided by the target person is consistent with the actual identity information, it is determined that the target person is a concerned person and enters the designated area.
[0093] Step 407, if the target person is not a concerned person, and the identity information provided by the target person does not match the actual identity information, it is determined that the target person pretends to be another person to enter the designated area.
[0094] Step 408 , if the target person is not a concerned person, and the identity information provided by the target person is consistent with the actual identity information, it is determined that the identity information provided by the target person when entering the designated area is the actual identity information.
[0095] It can be seen that, in the embodiment of the present invention, while determining the identity information of the target person, it can also determine whether the target person is a person of interest. Therefore, the embodiments of the present invention can also play a role of real-time supervision, which is beneficial to creating a social environment of integrity.
[0096]Optionally, the electronic device in the embodiment of the present invention may also send alarm information to the central platform when the identity information provided by the target person does not match the actual identity information, and/or the target person is a concerned person.
[0097] Understandably, when the identity information provided by the target person does not match the actual identity information, the alarm information sent to the central platform may include the identity information of the target person, the target person's face image, and the target person using/borrowing the identity of others. The prompt information that the information enters the designated area.
[0098] When the target person is the person of interest, the alarm information sent to the central platform may include the identity information of the target person, the target face image of the target person, and the prompt information that the target person is the person of interest.
[0099] It can be seen that the embodiment of the present invention can use the camera in the designated area to collect the face image of the person, and then analyze whether the designated area includes the person of interest, and whether there is a person who fakes the identity information of others in the designated area. There are cameras, so in the embodiment of the present invention, existing equipment can be used to realize identity recognition, which improves resource utilization.
[0100] Corresponding to the above method embodiments, the embodiments of the present invention further provide an identity recognition device, see Figure 5 , the apparatus includes: an acquisition module 501 , a determination module 502 and a matching module 503 .
[0101] The acquisition module 501 is configured to acquire the target face image collected in the designated area;
[0102] The determining module 502 is configured to, if there is a face image matching the target face image acquired by the acquiring module 501 in the designated information base, then determine the actual identity information of the target person corresponding to the target face image as: storing in the designated information base The identity information corresponding to the face image that matches the target face image;
[0103] The matching module 503 is configured to match the actual identity information of the target person determined by the determining module 502 with the identity information in the identity information record, and the identity information record includes the identity information provided by the personnel entering the designated area within the preset time period;
[0104] The determining module 502 is further configured to determine that the identity information provided by the target person does not match the actual identity information if the actual identity information of the target person does not exist in the identity information record.
[0105] Optionally, the designated information base is an overall information base, and the overall information base includes preset identity information corresponding to each face image; the device further includes: a judgment module;
[0106] The judgment module is configured to judge the information of the first concerned person after determining that the actual identity information of the target person corresponding to the target face image is: the identity information corresponding to the face image that matches the target face image stored in the designated information database Whether the actual identity information of the target person is included in the database, the first concerned person information database includes the identity information of each concerned person;
[0107] The determining module 502 is further configured to determine that the target person is a person of interest if the actual identity information of the target person is included in the first person of interest information database;
[0108] The determining module 502 is further configured to determine that the target person is not the person of interest if the actual identity information of the target person is not included in the first person of interest information base.
[0109] Optionally, the designated information database is a second person of interest information library, and the second person of interest information library includes identity information corresponding to the face images of each person of interest;
[0110] The determining module 502 can also be configured to, before matching the actual identity information of the target person with the identity information in the identity information record, if there is no face image matching the target face image in the second concerned person information database, Then it is determined that the target person is not a person of interest, and the actual identity information corresponding to the face image matching the target face image is queried from the overall information database, which includes the preset identity information corresponding to each face image.
[0111] Optionally, the device may further include: a sending module;
[0112] The sending module is configured to send alarm information to the central platform if the identity information provided by the target person does not match the actual identity information, and/or the target person is a concerned person.
[0113] The embodiment of the present invention also provides an electronic device, such as Image 6 As shown, it includes a processor 601, a communication interface 602, a memory 603 and a communication bus 604, wherein the processor 601, the communication interface 602, and the memory 603 complete the communication with each other through the communication bus 604,
[0114] a memory 603 for storing computer programs;
[0115] The processor 601 is configured to implement the steps performed by the electronic device in the foregoing method embodiments when executing the program stored in the memory 603 .
[0116] The communication bus mentioned in the above electronic device may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like. The communication bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.
[0117] The communication interface is used for communication between the above electronic device and other devices.
[0118] The memory may include random access memory (Random Access Memory, RAM), or may include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk storage. Optionally, the memory may also be at least one storage device located away from the aforementioned processor.
[0119] The above-mentioned processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; may also be a digital signal processor (Digital Signal Processing, DSP), an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
[0120] In another embodiment provided by the present invention, a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, any one of the above-mentioned identifications can be realized. steps of the method.
[0121] In yet another embodiment provided by the present invention, there is also provided a computer program product containing instructions, which, when running on a computer, enables the computer to execute any of the identity recognition methods in the foregoing embodiments.
[0122] In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), among others.
[0123] It should be noted that, in this document, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any relationship between these entities or operations. any such actual relationship or sequence exists. Moreover, the terms "comprising", "comprising" or any other variation thereof are intended to encompass non-exclusive inclusion such that a process, method, article or device comprising a list of elements includes not only those elements, but also includes not explicitly listed or other elements inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.
[0124] Each embodiment in this specification is described in a related manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the apparatus embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for related parts.
[0125] The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.