Privacy protection method for face verification
A face verification and privacy protection technology, which is applied in the privacy protection field of face verification, can solve problems such as user privacy threats, achieve the effects of improving privacy protection, avoiding theft, and improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] see Figure 1-Figure 2 , the present invention provides a technical solution, including a recognition device, the recognition device includes a preview window, a camera, and a touch screen, specifically including the following steps:
[0029] Step 1: The user starts the recognition device at the required link by the application program by standing in front of the recognition device;
[0030] Step 3: Put the puppet into the preview window and send the verification command by the puppet, and the puppet can respond and recognize the current facial state of the user, and perform face recognition on the user;
[0031] Step 4: After the verification fails, identify the number of verification failures:
[0032] Verification failure times <= 3: return to the face verification link;
[0033] Verification failure times > 3: return to the main menu;
[0034] Step 5: The verification is successfully completed. After the verification user completes the target operation, return to...
Embodiment 2
[0041] see image 3 , on the basis of Embodiment 1, the present invention provides a technical solution: perform doll type recommendation by sensing the user's gender through portraits or allow the user to click on the touch screen to select the doll category; Perform video synthesis on still photos and import the corresponding voice package for interactive use, and then put the puppet into the preview window through the application to replace the user's facial features.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


