Identity recognition method and device, equipment and storage medium

A technology of identity recognition and equipment, applied in the electronic field, can solve problems such as relying on user cooperation, and achieve the effect of improving identity authentication efficiency and strengthening security

Pending Publication Date: 2021-08-06
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above solutions all have certain limitations, such as needing to depend on light conditions, user cooperation, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method and device, equipment and storage medium
  • Identity recognition method and device, equipment and storage medium
  • Identity recognition method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0092] figure 1 It is the flow of an identification method shown in the embodiment of the present disclosure Figure 1 ,Such as figure 1 As shown, the identification method applied to the first device includes the following steps:

[0093] S11. In response to detecting that the second device enters the preset first distance range, establish a connection with the second device;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity recognition method and device, equipment and a storage medium. The method is applied to a first device, and comprises the following steps: in response to detection that a second device enters a preset first distance range, establishing a connection with the second device; performing identity authentication on the second equipment based on the connection; if the identity authentication is passed, in response to detection that the second equipment enters a preset second distance range and the second equipment is in a preset direction range of the first equipment, determining that the second equipment is equipment with a preset user permission, wherein the preset second distance range is within the preset first distance range. Through the method, non-inductive user experience can be provided, and the use experience of the user is improved.

Description

technical field [0001] The present disclosure relates to the field of electronic technology, and in particular to an identification method and device, equipment and storage medium. Background technique [0002] With the development and progress of science and technology, the degree of intelligence in production and life in modern society is getting higher and higher, and the demand for personnel identification technology in various fields such as smart homes, smart buildings, and smart cities is becoming stronger and stronger. [0003] Common identification technologies include vision-based automatic identification technologies. Such as: face recognition, gesture recognition, etc., that is, when the recognized object triggers the recognition threshold, it starts to recognize, which is commonly used in community access control, face payment, etc. There is also a passive identification technology, such as radio frequency identification (Radio Frequency Identification, RFID), ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G01S5/02
CPCG06F21/44G01S5/0284H04W12/63H04W12/68H04W12/08H04W12/06G06F21/32G06F2221/2111H04L63/107H04W4/80H04W4/022H04W12/50H04W12/69H04W12/069H04W4/023
Inventor 乔光军
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products