Authentication method and device, electronic equipment and computer readable storage medium
An authentication method and computer program technology, applied in the field of computer-readable storage media, authentication methods and devices, can solve problems such as cumbersome operation process, and achieve the effect of improving accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0033] figure 1 It is a schematic diagram of the application environment of the authentication method in an embodiment. Such as figure 1 As shown, the application environment can include a camera device 102, which can be an electronic device with a digital image capture function, for example, the camera device 102 can be used for identity authentication, such as a face recognition device, a smart phone, a tablet computer, etc. . The imaging device 102, when authentication is detected, acquires the phase difference of each pixel in the face image, which is generated base...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


