Face authentication implementation method and device
An implementation method, face technology, applied in the field of network communication, can solve problems such as user loss, error, and enhance the security of face authentication, so as to achieve the effect of increasing difficulty and cost, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The embodiment of this specification proposes a new implementation method of face authentication, which collects the user's face visible light data and face radar data at the same time, obtains the face visible light feature from the two-dimensional face visible light data, and obtains the face visible light feature from the three-dimensional face Radar data is used to obtain face radar features. After verifying the matching of face visible light features and face radar features, the user is authenticated based on the user's verified face information, so that injection attacks need to provide matching 2D and 3D Only the data can pass the authentication, and the difficulty and time and energy of forging three-dimensional data are much higher than forging two-dimensional data, which greatly increases the threshold and cost of injection attacks, making face authentication more secure .
[0020] In the embodiments of this specification, face authentication can be performed ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


