Safety protection method and system based on face recognition
A face recognition and security protection technology, applied in character and pattern recognition, instruments, data processing applications, etc., can solve the problems of inflexible detection range, easy misjudgment, and dependence, so as to improve diversity and adaptability The effect of ability, timely response
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] Such as figure 1 As shown, this embodiment provides a security protection method based on face recognition, including:
[0052] S3: When the first device is awakened, collect an image of the target range, and perform face recognition on the image of the target range to generate a recognition result;
[0053] S4: judging whether the recognition result matches the preset face, if not, go to S5;
[0054] S5: Send the target range image to a second device bound to the first device for display and warning.
[0055]In modern life, parents are often worried about the safety of their children, fearing that their children will become the targets of crimes such as kidnapping and trafficking. In order to solve the above problems, take a kindergarten as an example, a camera is generally set up at a high place at the entrance of the kindergarten, and a fixed camera is used to perform face recognition on people close to the child. Kindergarten administrators issued a warning.
[...
Embodiment 2
[0062] Such as figure 2 As shown, this embodiment provides a security protection method based on face recognition, including:
[0063] S0: Entering a preset face and the communication identification of the second device into the first device.
[0064] S1: Obtain sensing data transmitted by a sensor set on the first device;
[0065] S2: According to the sensing data, judge whether the first device is in an abnormal state through a pre-established risk control model, and if so, go to S3;
[0066] S3: When the first device is awakened, collect an image of the target range, and perform face recognition on the image of the target range to generate a recognition result;
[0067] S4: judging whether the recognition result matches the preset face, if not, go to S5;
[0068] S5: Send the target range image to a second device bound to the first device for display and warning.
[0069] In this embodiment, since the types of risks are various, that is, criminals may try to unlock Xia...
Embodiment 3
[0073] Such as image 3 As shown, this embodiment provides a security protection method based on face recognition, including:
[0074] S0: Entering the preset face and the communication identification of the second device into the first device;
[0075] S1: Obtain sensing data transmitted by a sensor set on the first device;
[0076] S2: According to the sensing data, judge whether the first device is in an abnormal state through a pre-established risk control model, and if so, go to S3;
[0077] S3: When the first device is awakened, collect an image of the target range, and perform face recognition on the image of the target range to generate a recognition result;
[0078] S4: judging whether the recognition result matches the preset face, if not, go to S5;
[0079] S5-1: The first device sends the target range image and the communication identifier of the second device to a server;
[0080] S5-2: The server forwards the target range image to the corresponding second dev...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


