CN108900700A - Authentication method and system based on the double verification that recognition of face and sight position - Google Patents
Authentication method and system based on the double verification that recognition of face and sight position Download PDFInfo
- Publication number
- CN108900700A CN108900700A CN201810562255.5A CN201810562255A CN108900700A CN 108900700 A CN108900700 A CN 108900700A CN 201810562255 A CN201810562255 A CN 201810562255A CN 108900700 A CN108900700 A CN 108900700A
- Authority
- CN
- China
- Prior art keywords
- sight
- information
- face
- recognition
- positioning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/673—Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
Abstract
The invention discloses a kind of authentication method and systems of double verification mechanism positioned based on recognition of face and sight, on the basis of user carries out recognition of face and tests living, the further encrypted message that verifying user provides, reach double verification, using sight positioning and tracer technique, in conjunction with mobile phone locking screen interface, user's operation bidirectional is reduced as far as possible, under the premise of not influencing user experience, the safety that face tests mechanism living is further increased, thus preferably guarantees the safety of user mobile phone.Utilize technical solution of the present invention, it does not need to modify existing Face datection and tests method living, but use sight position monitor again on the basis of existing technology, reach to the further perfect of recognition of face certification, the safety of recognition of face is further increased, 3D headgear even twins can be fought with this and attacked.
Description
Technical field
The invention belongs to smart phone (system) technical field of security authentication, are related to image procossing, depth learning technology, especially
It is related to a kind of authentication method and system of double verification mechanism positioned based on recognition of face and sight.
Background technique
With the increasing popularization of smart mobile phone with the continuous enhancing of function, in addition mobile payment in recent years is universal, intelligence
Mobile phone has become article indispensable in people's daily life;People connect internet and social network using smart phone
Network, same to friend, household keep in touch, and carry out shopping online, pay under line, record life, amusement etc., therefore, intelligence
Mobile phone role ever more important in daily life, the safety of smart phone is also extremely important, and smart phone is once lose
Or stolen, the value of not only equipment of loss, it is also possible to will lead to privacy leakage and property safety problem itself.
Smart phone is lost or is used after stolen by illegal user, an authentication mechanism powerful enough/be in order to prevent
System can play a crucial role the safety of mobile phone.The Verification System of smart phone is also in continuous development and complete at present
Kind, existing user authentication mode mainly includes following several:
(1) the shortcomings that swipe to the right unlock, this mode is dangerous;
(2) text password unlocks, disadvantage:It is not easy to remember, unlocked time is longer, needs repeatedly to click screen, user's body
Test difference;
(3) nine grids unlock, disadvantage:Easily stolen use, it is dangerous;
(4) speech unlocking, disadvantage:Success rate is low, is easy to be attacked by recording;
(5) unlocked by fingerprint, disadvantage:Success rate is low, and fingerprint is easy to be affected, and fingerprint is easy to be obtained by third party, pacifies
Full property is not high.
(6) recognition of face unlocks, disadvantage:It is easy the attack by forms such as photo, video and 3D headgears, needs to carry out
Work is tested, and face recognition is highly susceptible to twinborn crack.
In recent years, with the development of artificial intelligence technology, face recognition technology is also increasingly advanced, mature, and due to
The convenience of recognition of face, face recognition technology are also gradually applied to handset identities verifying this respect, such as apple
The recognition of face etc. of FaceID and Samsung Galaxy S8.But due to the particularity of face, recognition of face verifying is frequently suffered from
Some picture attacks, video playback attack and the attack of 3D headgear, or even can be attacked by twins.These face recognition technologies are all
It has a problem that, can not exactly solve the problems, such as that twins crack and be attacked with 3D headgear.For example the end of the year 2017 one is Bkav
Security firm of Vietnam, they with 3D printing go out face mask, the face identification system Face ID for apple of easily having out-tricked,
IPhone X is successfully unlocked.For another example the Galaxy S8 of Samsung's production, user only need the photo of a high definition can be at
Function cheats its face identification system, completes unlock.And most of face identification system can not defend twins at all at this stage
Attack, therefore each major company all tests technology living using various one after another, for example, the side such as the detection of 3D modeling, quality, validation-cross
Formula.But as the attack initiated for recognition of face is more and more, some attack methods can successfully cheat existing people
Face identifying system.
Summary of the invention
The present invention is directed to the problem of existing smart phone face authentication process, proposes a kind of based on recognition of face
The authentication method and system of the double verification mechanism positioned with sight, on the basis of user carries out recognition of face and tests living, into
The encrypted message that one step card user provides, reaches double verification, using sight positioning and tracer technique, in conjunction with mobile phone screen locking circle
Face, as far as possible reduction user's operation bidirectional further increase the safety that face tests mechanism living under the premise of not influencing user experience
Property, thus preferably guarantee the safety of user mobile phone.
Core of the invention thought is:In conjunction with existing recognition of face and tests technology living and increase sight positioning on the basis of this again
Module judges recognition of face and tests whether user's sight in stage living positions the range of visibility set before user, if so,
Prove that face recognition result is user itself, rather than other people, it is verified;Otherwise it verifies and does not pass through.Specifically, pass through first
Information collection, the essential information for collecting user's progress recognition of face (carry out recognition of face including user and test needed for the stage living
Information) and user's selection eye position coordinate range, after information collecting step, in Qualify Phase, advanced pedestrian's face is known
It not and tests biopsy survey, if recognition of face and testing biopsy survey and passing through, then carries out the detection of sight positioning, it is fixed to detect sight
Position, if belong in the eye position coordinate range of user's selection, be verified if belonging to, if being not belonging to verify mistake
It loses.
Technical solution provided by the invention is:
A kind of authentication method of the double verification positioned based on recognition of face and sight, is included the following steps:
1) acquisition and typing recognition of face and information needed living, positioning password information needed are tested;Position password information needed
Including specified visibility region;
11) recognition of face and information needed living is tested, according to 3D modeling, needs to acquire and typing recognition of face and test living
Pictorial information;It is verified according to interactive mode, needs to acquire and typing includes the video of interactive information;
12) encrypted message is positioned, can be selected in conjunction with mobile phone screen protection, facilitate memory of the user for encrypted message.
13) typing for positioning encrypted message, according to sight positioning accuracy, by selecting suitable magnitude range region as encrypted message,
Positioning accuracy is higher, and range areas is smaller, and password space is bigger, while screen is bigger, and password space is bigger.
2) sight positioning is calibrated, including the calibration and the far and near caused view of user's off screen curtain to Eye-controlling focus precision
The calibration of line position disparity;
21) sight positioning calibration can allow mobile phone that different location coordinate information point is randomly generated, allow user with it is different away from
From (middle distance etc.), different postures (is faced, side view etc.), watches coordinate information point in mobile phone, fixed to Eye-controlling focus to complete
The calibration of position precision.
3) information that acquisition is verified for mobile phone in real time;Information includes information point needed for sight positioning;
4) recognition of face detection is carried out:It is compared by the information of the information and step 1) typing that acquire step 3),
Face datection is carried out, judges whether to belong to same face;
5) it carries out testing work, judges whether collected information belongs to a living body, ensures that information is not from identical photograph
Piece or video etc.;
This stage can prevent most of picture for recognition of face and video attack, but not prevent to be similar to
3D headgear or further twins attack;
6) sight detection and localization is carried out:Information point needed for information sight positioning according to step 3) acquisition (such as pupil
Position), the detection of sight positioning is carried out using corresponding algorithm, judges sight model selected before whether the sight of eyes belongs to
It encloses, success, otherwise, authentification failure is authenticated if belonging to.
The present invention also provides a kind of authentication method and systems of double verification positioned based on recognition of face and sight, mainly
Including following six big modules:Data input module, sight positioning calibration module, information acquisition module, recognition of face detection module,
Test flexible module, sight position monitor module.It is to be described in detail below:
1, data input module:This module is mainly used to typing recognition of face and tests selection that is living and realizing positioning password
Information, wherein recognition of face with test it is living needed for the information that acquires, need the specific recognition of face according to used in system and test
Method living, for example, information collecting step then needs to acquire 3D modeling institute if system uses the 3D modeling information of FaceID
Then the characteristic point needed constructs 3D model, after having acquired recognition of face and having tested information living, what is acquired in next step is exactly
The location information of screen, for example can be certain characteristic points of screen protection photo, facilitate user to remember, naturally it is also possible in conjunction with oneself
Mobile phone, select specific visibility region.
2, sight positions calibration module:This module, which is mainly used for positioning sight, calibrates, and sight may be implemented at present
There are many technology of positioning and tracking, such as pupil simulator locating, the methods of infrared eyeball tracking positioning, the verifying of each method
Mode and precision are all different, and therefore, this module is mainly the calibration to Eye-controlling focus precision, and there are also be exactly that user's off screen curtain is remote
The calibration of close caused sight position disparity.
3, information acquisition module:This module be primarily used to acquisition mobile phone verifying information, such as using 3D modeling when
It waits, the data input stage will acquire recognition of face and test the picture of information living;If using interactive verifying it is necessary to
Acquisition includes the video of interactive information.
4, recognition of face detection module:This module is the information for acquiring a upper module, the information with first stage typing
It compares, carries out Face datection, judge that the information of data input module acquisition and the acquisition of information collecting step before information are
It is no to belong to same face.
5, flexible module is tested:This module, which is substantially carried out, tests work, judges the collected information of information acquisition module from one
Living body also comes from photo either video etc., this stage can prevent most of picture for being directed to recognition of face
It is attacked with video, but does not prevent to be similar to 3D headgear or further twins attack.
6, sight detection and localization module:This module is substantially carried out sight position monitor, acquires from information acquisition module
Information point needed for sight positioning, such as pupil position, then using corresponding algorithm (such as with the difference of dynamic point and reference point
Direction of gaze and the position of human eye are calculated, dynamic point uses pupil center, because it can accurately reflect the variation of eyeball, reference
Point uses canthus point, because canthus point is a highly stable point on face.) carry out sight positioning detection, judge eyes
Sight whether belong to before selected range of visibility, success, otherwise, authentification failure are authenticated if belonging to.
Compared with prior art, the beneficial effects of the invention are as follows:
The present invention provides a kind of authentication method and system of double verification mechanism positioned based on recognition of face and sight,
User carry out recognition of face and test it is living on the basis of, further verify the encrypted message that user provides, reach double verification, utilization
Sight positioning and tracer technique, in conjunction with mobile phone locking screen interface, as far as possible reduction user's operation bidirectional, before not influencing user experience
It puts, further increases the safety that face tests mechanism living, thus preferably guarantee the safety of user mobile phone.
The technical advantages of the present invention are that:It does not need to modify existing Face datection and tests method living, but existing
Sight positioning and monitoring method/module is used on the basis of technology again, to reach to the further perfect of recognition of face certification, is made up
Existing face tests the deficiency of technology living, further increases the safety of recognition of face, and it is even double to fight 3D headgear with this
The attack of born of the same parents' tire.
Detailed description of the invention
Fig. 1 is the structural block diagram of Verification System comprising modules provided by the invention.
Fig. 2 is the flow diagram of authentication method provided by the invention.
Specific embodiment
With reference to the accompanying drawing, the present invention is further described by embodiment, but the model that the invention is not limited in any way
It encloses.
The present invention provides a kind of authentication method and system of double verification mechanism positioned based on recognition of face and sight,
User carry out recognition of face and test it is living on the basis of, further verify the encrypted message that user provides, reach double verification, utilization
Sight positioning and tracer technique, in conjunction with mobile phone locking screen interface, as far as possible reduction user's operation bidirectional, before not influencing user experience
It puts, further increases the safety that face tests mechanism living, thus preferably guarantee the safety of user mobile phone.
Fig. 1 is the structural block diagram of Verification System comprising modules provided by the invention;System includes six big modules:Data input
Module, information acquisition module, recognition of face detection module, tests flexible module, sight position monitor mould at sight positioning calibration module
Block.
Fig. 2 is the flow diagram of authentication method provided by the invention;A specific embodiment of the invention is as follows:
1) typing is judged whether by mobile phone first and stores recognition of face and tests required information living;If
Typing then directly carries out verification information acquisition, after information collection, into Qualify Phase;If being carried out first without typing
Data input after typing, then carries out aforesaid operations.
2) typing information including recognition of face and tests required information point and sight localization region living;The positioning of typing sight
Screen protection photo specifically may be selected in the method in region, chooses sight localization region by touch screen, then will choose area coordinate range
Incoming database is saved as encrypted message;
User prompts successively to carry out data input according to mobile phone, first typing recognition of face with test required information living
Point, such as this system are just needed in this stage typing user human face region 3D data and individual features point;Then screen protection is selected
Picture, touch screen choose sight localization region, and area size is fixed, and regional scope is determined by sight positioning accuracy, such as this system
Face++Detect API is used to do sight estimation, sight estimation and sight actual position gap size are about 3.5mm,
Therefore, the sight localization region range size of selection be 5mm*5mm, as long as sight positioning herein within the scope of, even if verifying at
Function.(selecting screen protection photo reason as memory area information can be more convenient in conjunction with picture user).
3) after the completion of data input, mobile phone prompts user with different distances, different postures, the different position of viewing mobile phone
Set, carry out to user's sight position it is calibrated, user's calibrating mode that this system uses for, prompt user from mobile phone with normal
Viewing distance (15cm), nearlyr viewing distance (10cm), the different distances such as viewing distance (20cm) watch mobile phone farther out, meanwhile,
Mobile phone random display different location information point allows user that sight is locked in the region, and mobile phone is according to user's sight situation, adjustment
Modify sight and estimate parameter, such iteration, until sight estimated location and sight actual position, gap size in 3.5mm or so,
Stop iteration, calibration is completed.
4) Qualify Phase specifically performs the following operations:User carries out recognition of face using mobile phone, and camera faces face
And an appropriately distance is kept, state is opened in eyes holding, is dig-inned the sight localization region oneself chosen, is verified.
5) mobile phone according to selected recognition of face and tests mode living and acquires required information, while obtaining verifying sight positioning
Required information, such as pupil coordinate etc..For example the recognition of face mode that this system recognition of face uses is characterized a detection, adopts
Collect 128 characteristic point datas of user's face, testing mode living is 3D modeling mode, shoots face using 3D camera, is obtained corresponding
Human face region 3D data, and be further analyzed based on these data, finally judge that this face is from living body
Or non-living body.Sight estimation positioning needs to acquire the pupil center location of user using face++Detect API, and
The location coordinate informations such as canthus point.
6) mobile phone carries out face recognition features' point comparison according to selected recognition of face mode, judges whether to belong to user's
Characteristic point enters next stage verifying if belonging to, otherwise directly returns to authentication failed result.In this system, mobile phone is directed to and adopts
128 facial feature points collected and the characteristic point information of first stage typing are compared, and judge whether to belong to same user
Characteristic information, if belonging to enter next stage verify, otherwise return authentication failed result.
7) mobile phone carries out In vivo detection according to selected mode living of testing, and judges whether the information of typing comes from true man either
Video and picture carry out next stage verifying if belonging to true man, if being not belonging to true man, directly return to authentication failed result.
In this system, testing principle living is the 3D human face data based on living body and non-living body, utilizes Machine learning classifiers model, selection
The most feature (such as EGI feature) of discrimination trains classifier, finally distinguishes living body using trained classifier
And non-living body.Mobile phone is according to the resulting 3D data of human face region that 3D camera is shot, typing trained machine learning
Model obtains classification results, judges whether to belong to living body.
8) mobile phone estimates coordinate of the eye position in screen, then judges according to the sight location information point of typing
The selected range of visibility of user, is proved to be successful if belonging to before whether eye position belongs to, and otherwise, returns to authentication failed knot
Fruit.This system is the gaze estimation method using face++Detect API, by our collected data, is passed to API, just
Available corresponding right and left eyes eyeball position and direction of visual lines information, we obtain direction of visual lines information, so that it may analyze view
Whether line coordinates belongs in our the selected range of visibility of first stage typing information, is proved to be successful if belonging to, otherwise, tests
Card failure.
If 9) authentication failed number is more than predetermined number of times, text password input can only be carried out and be unlocked.
By the above method, it in existing recognition of face and need to only test in mechanism living, add a sight detection and localization mould
Block, so that it may greatly improve the safety of recognition of face.
It should be noted that the purpose for publicizing and implementing example is to help to further understand the present invention, but the skill of this field
Art personnel are understood that:It is not departing from the present invention and spirit and scope of the appended claims, various substitutions and modifications are all
It is possible.Therefore, the present invention should not be limited to example disclosure of that, and the scope of protection of present invention is with claims
Subject to the range defined.
Claims (7)
1. a kind of authentication method based on recognition of face and sight positioning double verification, includes the following steps:
1) acquisition and typing recognition of face and information needed living, positioning password information needed are tested;
11) recognition of face and information needed living is tested:According to 3D modeling, needs to acquire and typing recognition of face and test picture living
Information;It is verified according to interactive mode, needs to acquire and typing includes the video of interactive information;
12) positioning password information needed includes specified visibility region;
2) sight positioning is calibrated, it is fixed including sight caused by the calibration and user's off screen curtain distance to Eye-controlling focus precision
The different calibration of potential difference;Specifically:Different location coordinate information point is randomly generated in mobile phone, and user is with different distances, different appearances
State watches the coordinate information point in mobile phone, is achieved in the calibration to Eye-controlling focus positioning accuracy;
3) information that acquisition is verified for mobile phone in real time;Information includes information point needed for sight positioning;
4) recognition of face detection is carried out:It is compared, is carried out by the information of the information and step 1) typing that acquire step 3)
Face datection judges whether to belong to same face;
5) it carries out testing work, judges whether collected information belongs to a living body, exclude collected information from identical photograph
Piece or video;
6) sight detection and localization is carried out:Information point needed for information sight positioning according to step 3) acquisition, is positioned using sight
Detection algorithm carries out the detection of sight positioning, judges whether the sight of eyes belongs to selected range of visibility;
Success is authenticated if the sight of eyes belongs to selected range of visibility;Otherwise, authentification failure;
It is achieved in the certification based on recognition of face and sight positioning double verification.
2. the authentication method based on recognition of face and sight positioning double verification as described in claim 1, characterized in that step 1)
It acquires and typing positioning password information needed is especially by mobile phone screen protection selection visibility region, be convenient for user's memory cipher information;
Positioning accuracy is higher, and visibility region range is smaller, and password space is bigger;Screen is bigger, and password space is bigger.
3. the authentication method based on recognition of face and sight positioning double verification as described in claim 1, characterized in that step 2)
To user's sight positioning carry out it is calibrated, specifically, by prompt user from mobile phone with normal viewing distance, compared with close up see away from
From, farther out viewing distance watch mobile phone;Meanwhile mobile phone random display different location information point, allow user that sight is locked in this
Region;Mobile phone estimates parameter according to user's sight situation, redjustment and modification sight;Such iteration, until sight estimated location and view
The gap size of line actual position stops iteration in 3.5mm or so, and calibration is completed.
4. the authentication method based on recognition of face and sight positioning double verification as described in claim 1, characterized in that step 3)
Information point needed for the information sight positioning of acquisition includes pupil position and eye corner location.
5. the authentication method based on recognition of face and sight positioning double verification as described in claim 1, characterized in that step 6)
Sight detection and localization algorithm is specifically direction of gaze and the position that human eye is calculated with the difference of dynamic point and reference point;Wherein move point
Using pupil center, reference point uses canthus point.
6. the authentication method based on recognition of face and sight positioning double verification as described in claim 1, characterized in that step 6)
The specific gaze estimation method for using face++Detect API, inputs sight location information point, obtains corresponding right and left eyes eyeball
Position and direction of visual lines information;Obtain whether LOS coordinate belongs to the selected sight of typing information further according to direction of visual lines information
In range.
7. a kind of Verification System of the double verification positioned based on recognition of face and sight, including:Data input module, sight are fixed
Position calibration module, recognition of face detection module, tests flexible module, sight position monitor module at information acquisition module;
The data input module is for typing recognition of face and tests work, realizes the selection of positioning encrypted message;Wherein face is known
It does not include for the characteristic point of 3D modeling, for the view comprising interactive information of interactive mode verifying with the information for testing required acquisition living
Frequently;Positioning encrypted message includes characteristic point or the specific line of sight region of screen protection photo;
Sight positioning calibration module is used to calibrate sight positioning, including to Eye-controlling focus precision calibration and user
The calibration of sight position disparity caused by off screen curtain distance;
The information acquisition module is used to acquire the information of mobile phone verifying;
The information of information and the typing of data input module that the recognition of face detection module acquires information acquisition module carries out
Comparison carries out Face datection, judges whether the information of data input module acquisition and information acquisition module acquisition information belong to together
One face;
The flexible module of testing for carrying out testing work, judge the collected information of information acquisition module from a living body, still
From a photo or video;
The sight detection and localization module is for carrying out sight position monitor, the sight positioning institute acquired from information acquisition module
The information point needed carries out the detection of sight positioning using sight detection and localization algorithm, before judging whether the sight of eyes belongs to
Selected range of visibility;Success, otherwise, authentification failure are authenticated if belonging to.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810562255.5A CN108900700A (en) | 2018-06-04 | 2018-06-04 | Authentication method and system based on the double verification that recognition of face and sight position |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810562255.5A CN108900700A (en) | 2018-06-04 | 2018-06-04 | Authentication method and system based on the double verification that recognition of face and sight position |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108900700A true CN108900700A (en) | 2018-11-27 |
Family
ID=64344009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810562255.5A Pending CN108900700A (en) | 2018-06-04 | 2018-06-04 | Authentication method and system based on the double verification that recognition of face and sight position |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108900700A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109819114A (en) * | 2019-02-20 | 2019-05-28 | 北京市商汤科技开发有限公司 | Screen locking processing method and processing device, electronic equipment and storage medium |
CN109934187A (en) * | 2019-03-19 | 2019-06-25 | 西安电子科技大学 | Based on face Activity determination-eye sight line random challenge response method |
CN110929286A (en) * | 2019-11-20 | 2020-03-27 | 四川虹美智能科技有限公司 | Method for dynamically detecting operation authorization and intelligent equipment |
CN111291701A (en) * | 2020-02-20 | 2020-06-16 | 哈尔滨理工大学 | Sight tracking method based on image gradient and ellipse fitting algorithm |
CN111324878A (en) * | 2020-02-05 | 2020-06-23 | 重庆特斯联智慧科技股份有限公司 | Identity verification method and device based on face recognition, storage medium and terminal |
CN111881431A (en) * | 2020-06-28 | 2020-11-03 | 百度在线网络技术(北京)有限公司 | Man-machine verification method, device, equipment and storage medium |
CN113064792A (en) * | 2021-03-26 | 2021-07-02 | 联想(北京)有限公司 | Information processing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101770613A (en) * | 2010-01-19 | 2010-07-07 | 北京智慧眼科技发展有限公司 | Social insurance identity authentication method based on face recognition and living body detection |
US7756301B2 (en) * | 2005-01-26 | 2010-07-13 | Honeywell International Inc. | Iris recognition system and method |
CN102981736A (en) * | 2012-10-29 | 2013-03-20 | 华为终端有限公司 | Screen unlocking method and screen unlocking terminal |
CN105184277A (en) * | 2015-09-29 | 2015-12-23 | 杨晴虹 | Living body human face recognition method and device |
-
2018
- 2018-06-04 CN CN201810562255.5A patent/CN108900700A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7756301B2 (en) * | 2005-01-26 | 2010-07-13 | Honeywell International Inc. | Iris recognition system and method |
CN101770613A (en) * | 2010-01-19 | 2010-07-07 | 北京智慧眼科技发展有限公司 | Social insurance identity authentication method based on face recognition and living body detection |
CN102981736A (en) * | 2012-10-29 | 2013-03-20 | 华为终端有限公司 | Screen unlocking method and screen unlocking terminal |
CN105184277A (en) * | 2015-09-29 | 2015-12-23 | 杨晴虹 | Living body human face recognition method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109819114A (en) * | 2019-02-20 | 2019-05-28 | 北京市商汤科技开发有限公司 | Screen locking processing method and processing device, electronic equipment and storage medium |
CN109934187A (en) * | 2019-03-19 | 2019-06-25 | 西安电子科技大学 | Based on face Activity determination-eye sight line random challenge response method |
CN109934187B (en) * | 2019-03-19 | 2023-04-07 | 西安电子科技大学 | Random challenge response method based on face activity detection-eye sight |
CN110929286A (en) * | 2019-11-20 | 2020-03-27 | 四川虹美智能科技有限公司 | Method for dynamically detecting operation authorization and intelligent equipment |
CN111324878A (en) * | 2020-02-05 | 2020-06-23 | 重庆特斯联智慧科技股份有限公司 | Identity verification method and device based on face recognition, storage medium and terminal |
CN111291701A (en) * | 2020-02-20 | 2020-06-16 | 哈尔滨理工大学 | Sight tracking method based on image gradient and ellipse fitting algorithm |
CN111291701B (en) * | 2020-02-20 | 2022-12-13 | 哈尔滨理工大学 | Sight tracking method based on image gradient and ellipse fitting algorithm |
CN111881431A (en) * | 2020-06-28 | 2020-11-03 | 百度在线网络技术(北京)有限公司 | Man-machine verification method, device, equipment and storage medium |
CN111881431B (en) * | 2020-06-28 | 2023-08-22 | 百度在线网络技术(北京)有限公司 | Man-machine verification method, device, equipment and storage medium |
CN113064792A (en) * | 2021-03-26 | 2021-07-02 | 联想(北京)有限公司 | Information processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108900700A (en) | Authentication method and system based on the double verification that recognition of face and sight position | |
AU2018203747B2 (en) | System and method for authorizing access to access-controlled environments | |
CN106068512B (en) | Method and apparatus for verifying user on the mobile device | |
US9996684B2 (en) | System and method for authorizing access to access-controlled environments | |
JP2021184265A (en) | Method for registering and authenticating user in recognition system, facial recognition system, and method for authenticating user in authentication system | |
CN103324879B (en) | Mobile device is based on recognition of face and the authentication system of smart card and method | |
US10929849B2 (en) | Method and a system for performing 3D-based identity verification of individuals with mobile devices | |
CN106156578A (en) | Auth method and device | |
CN105426827A (en) | Living body verification method, device and system | |
CN105005779A (en) | Face verification anti-counterfeit recognition method and system thereof based on interactive action | |
CN103514440A (en) | Facial recognition | |
CN104063690A (en) | Identity authentication method based on face recognition technology, device thereof and system thereof | |
CN106485118A (en) | Electronic equipment and its identifying system, decryption method | |
CN204695313U (en) | Based on the mobile communication terminal device that iris recognition unlocks | |
CN109766785A (en) | A kind of biopsy method and device of face | |
CN105426730A (en) | Login authentication processing method and device as well as terminal equipment | |
CN109756458A (en) | Identity identifying method and system | |
CN109034029A (en) | Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body | |
CN105184267A (en) | Face-identification-based secondary-deformation auxiliary authorization method | |
CN208351494U (en) | Face identification system | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
CN111695509A (en) | Identity authentication method, identity authentication device, machine readable medium and equipment | |
CN108647650B (en) | Human face in-vivo detection method and system based on corneal reflection and optical coding | |
Sharp et al. | Authentication for drone delivery through a novel way of using face biometrics | |
CN112069954B (en) | Living body micro-expression detection method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181127 |