Unlock instant, AI-driven research and patent intelligence for your innovation.

Face authentication implementation method and device

An implementation method, face technology, applied in the field of network communication, can solve problems such as user loss, error, and enhance the security of face authentication, so as to achieve the effect of increasing difficulty and cost, and improving security

Active Publication Date: 2021-07-02
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, the application of face authentication has also created new security risks
For example, an injection attack on a camera can disguise a face photo or video taken in advance as a live photo or video taken from the camera, making the device responsible for user authentication through face recognition mistakenly think that the user is doing regular Face authentication, drawing wrong conclusions, causing losses to users
Enhancing the security of face authentication has become a new technical challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face authentication implementation method and device
  • Face authentication implementation method and device
  • Face authentication implementation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The embodiment of this specification proposes a new implementation method of face authentication, which collects the user's face visible light data and face radar data at the same time, obtains the face visible light feature from the two-dimensional face visible light data, and obtains the face visible light feature from the three-dimensional face Radar data is used to obtain face radar features. After verifying the matching of face visible light features and face radar features, the user is authenticated based on the user's verified face information, so that injection attacks need to provide matching 2D and 3D Only the data can pass the authentication, and the difficulty and time and energy of forging three-dimensional data are much higher than forging two-dimensional data, which greatly increases the threshold and cost of injection attacks, making face authentication more secure .

[0020] In the embodiments of this specification, face authentication can be performed ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a face authentication implementation method. The face authentication implementation method comprises the steps of obtaining face visible light data and face radar data of a to-be-authenticated user, wherein the face visible light data and the face radar data are collected by the terminal at the same time; recognizing face visible light features based on the face visible light data; recognizing face radar features based on the face radar data; and when the face visible light feature is matched with the face radar feature, authenticating the user by adopting the face visible light data and the verified face information of the user.

Description

technical field [0001] This specification relates to the field of network communication technologies, and in particular to a method and device for implementing face authentication. Background technique [0002] Face recognition is a biometric technology for identification based on human facial feature information. With the rapid development of computer vision technology, big data, machine learning and other technologies in recent years, the technology of user authentication through face recognition has become more and more widely used in financial transactions, unmanned retail, security monitoring, public transportation and other fields , has brought great convenience to people's work and life. [0003] At the same time, the application of face authentication has also created new security risks. For example, an injection attack on a camera can disguise a face photo or video taken in advance as a live photo or video taken from the camera, making the device responsible for u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06K9/62
CPCG06V40/168G06V40/172G06F18/22
Inventor 贺三元
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD