Data processing method, device and equipment
A data processing and algorithm technology, applied in the field of data processing, can solve the problems of users' private data being easily stolen maliciously and poor security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Such as Figure 1A and Figure 1B As shown, the embodiment of this specification provides a data processing method. The execution body of the method may be a terminal device, and the terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, or a terminal device such as a personal computer, or a terminal device such as a Smart wearable devices such as smart watches. The method specifically may include the following steps:
[0033] In S102, a trigger execution instruction of the target user for the target service is received, and in response to the trigger execution instruction, a first image corresponding to the target user is acquired.
[0034] Among them, the target business can be any business that needs to authenticate the target user based on the target user's biometric data. Feature data, for example, the first image may include the face image, fingerprint information or iris information of the target user.
[0035] In implemen...
Embodiment 2
[0052] Such as figure 2 As shown, the embodiment of this specification provides a data processing method. The execution body of the method may be a terminal device, and the terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, or a terminal device such as a personal computer, or a terminal device such as a Smart wearable devices such as smart watches. The method specifically may include the following steps:
[0053] In S202, a trigger execution instruction of the target user for the target service is received, and in response to the trigger execution instruction, a first image corresponding to the target user is acquired.
[0054] Wherein, the first image may contain biometric data of the target user.
[0055] For the specific processing procedure of the above S202, reference may be made to the relevant content of S102 in the above Embodiment 1, which will not be repeated here.
[0056] In S204, the historical first image is acquired....
Embodiment 3
[0100] Such as Figure 5A and Figure 5B As shown, the embodiment of this specification provides a data processing method. The execution body of the method may be a server, and the server may be an independent server or a server cluster composed of multiple servers. The method specifically may include the following steps:
[0101] In S502, obtain a training data set for the target business.
[0102] Wherein, the training data set may include a plurality of first images, and the first images may include biometric data of the user.
[0103] In implementation, the server can acquire the first image sent by the client (ie, the terminal device) based on the preset model training period, wherein the server can store the first image in the corresponding training data set.
[0104] In S504, based on the first image, the first loss function and the second loss function, the image desensitization model constructed by the preset deep learning algorithm is trained to obtain the traine...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


