Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety protection method and system based on face recognition

A face recognition and security protection technology, applied in character and pattern recognition, instruments, data processing applications, etc., can solve the problems of inflexible detection range, easy misjudgment, and dependence, so as to improve diversity and adaptability The effect of ability, timely response

Pending Publication Date: 2021-07-16
GUANGDONG IMOO ELECTRONIC TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But this method has serious problems. First of all, it is fixed in a certain place, and the detection range is not flexible, and it is fixed in a limited area. On the other hand, it relies heavily on the knowledge base. In the library, it is very easy to misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and system based on face recognition
  • Safety protection method and system based on face recognition
  • Safety protection method and system based on face recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Such as figure 1 As shown, this embodiment provides a security protection method based on face recognition, including:

[0052] S3: When the first device is awakened, collect an image of the target range, and perform face recognition on the image of the target range to generate a recognition result;

[0053] S4: judging whether the recognition result matches the preset face, if not, go to S5;

[0054] S5: Send the target range image to a second device bound to the first device for display and warning.

[0055]In modern life, parents are often worried about the safety of their children, fearing that their children will become the targets of crimes such as kidnapping and trafficking. In order to solve the above problems, take a kindergarten as an example, a camera is generally set up at a high place at the entrance of the kindergarten, and a fixed camera is used to perform face recognition on people close to the child. Kindergarten administrators issued a warning.

[...

Embodiment 2

[0062] Such as figure 2 As shown, this embodiment provides a security protection method based on face recognition, including:

[0063] S0: Entering a preset face and the communication identification of the second device into the first device.

[0064] S1: Obtain sensing data transmitted by a sensor set on the first device;

[0065] S2: According to the sensing data, judge whether the first device is in an abnormal state through a pre-established risk control model, and if so, go to S3;

[0066] S3: When the first device is awakened, collect an image of the target range, and perform face recognition on the image of the target range to generate a recognition result;

[0067] S4: judging whether the recognition result matches the preset face, if not, go to S5;

[0068] S5: Send the target range image to a second device bound to the first device for display and warning.

[0069] In this embodiment, since the types of risks are various, that is, criminals may try to unlock Xia...

Embodiment 3

[0073] Such as image 3 As shown, this embodiment provides a security protection method based on face recognition, including:

[0074] S0: Entering the preset face and the communication identification of the second device into the first device;

[0075] S1: Obtain sensing data transmitted by a sensor set on the first device;

[0076] S2: According to the sensing data, judge whether the first device is in an abnormal state through a pre-established risk control model, and if so, go to S3;

[0077] S3: When the first device is awakened, collect an image of the target range, and perform face recognition on the image of the target range to generate a recognition result;

[0078] S4: judging whether the recognition result matches the preset face, if not, go to S5;

[0079] S5-1: The first device sends the target range image and the communication identifier of the second device to a server;

[0080] S5-2: The server forwards the target range image to the corresponding second dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety protection method and system based on face recognition, and the method comprises the steps: collecting a target range image when first equipment is awakened, and carrying out the face recognition of the target range image, so as to generate a recognition result; and judging whether the recognition result accords with a preset face, and if not, sending the target range image to second equipment bound with the first equipment for display and warning. The method has the technical effects that (1) the acquisition range is not fixed at a specific point any more, and video acquisition is carried out along with a user, so that the problem that the acquisition range is possibly limited in the traditional acquisition process is solved; and (2) the method does not depend on a knowledge base, and does not need to know the face images of all people, because only a small number of people rather than a large number of people need to unlock the intelligent equipment, only the head portraits of a small number of people needing to unlock need to be known under the condition, and the head portraits of a large number of people are not needed.

Description

technical field [0001] The invention relates to the field of safety monitoring, in particular to a face recognition-based safety protection method and system. Background technique [0002] In modern life, parents are often worried about the safety of their children, fearing that their children will become the targets of crimes such as kidnapping and trafficking. In order to solve the above problems, taking a kindergarten as an example, a camera is generally set up at a high place at the entrance of the kindergarten, and a fixed camera is used to perform face recognition on people close to the child. Kindergarten administrators issued a warning. [0003] But this method has serious problems. First of all, it is fixed in a certain place, and the detection range is not flexible, and it is fixed in a limited area. On the other hand, it relies heavily on the knowledge base. In the library, it is very easy to misjudgment. Contents of the invention [0004] In order to solve t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06Q50/26
CPCG06Q50/265G06V40/166G06V40/172
Inventor 冼立涛
Owner GUANGDONG IMOO ELECTRONIC TECH CO LTD