CN110766841A - User registration and verification method and device - Google Patents
User registration and verification method and device Download PDFInfo
- Publication number
- CN110766841A CN110766841A CN201910504106.8A CN201910504106A CN110766841A CN 110766841 A CN110766841 A CN 110766841A CN 201910504106 A CN201910504106 A CN 201910504106A CN 110766841 A CN110766841 A CN 110766841A
- Authority
- CN
- China
- Prior art keywords
- user
- photo
- verification password
- face
- account information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The invention relates to a user registration and verification method and a device, wherein the method comprises the following steps: collecting account information of an access control card of a user; when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user; collecting voice information of a user reading verification password; judging whether the verification password read by the user is correct or not according to the voice information; if the verification password read by the user is correct, acquiring a face photo of the user; and binding and storing the account information, the verification password and the face photo to finish the registration process. The photo collection process of the invention is self-aided in the whole course, centralized collection and manual intervention are not needed, manpower and material resources are saved, and the illegal user can be discriminated by verifying the password for users with similar growth, so that the problems that the illegal user can not be prevented from carrying out illegal invasion by changing appearance and holding an illegally obtained access card by the user registration and verification device based on the existing face recognition technology can be solved.
Description
Technical Field
The invention relates to the field of identity information management, in particular to a user registration and verification method and device.
Background
The face recognition technology is mature day by day, and the application range is wider and wider at present. In some occasions where people are concentrated, the collection of face photos is always a difficult problem for users. The traditional human face photo collecting method comprises the following steps: 1, all the persons take photos in batches to a specified place within a specified time, and then the taken photos are imported into a face recognition system; 2, the recognized person provides a photo by himself, names the photo with an appointed name, submits the photo to a corresponding manager, and then imports the photo into a face recognition system.
The two methods have respective advantages and disadvantages, wherein in the scheme 1, a large number of people need to be concentrated, all people reach a designated place within a relatively fixed time range, the identity is verified manually, and then the picture is taken, so that time and labor are wasted; in the scheme 2, although the concentration of required personnel is reduced, some illegal users may change their appearances into legal users through ways such as makeup, and then use illegally acquired access cards to achieve the purpose of illegal intrusion.
Disclosure of Invention
In view of the above technical problems, the present invention provides a method and an apparatus for user registration and authentication.
The technical scheme for solving the technical problems is as follows:
a user registration method, comprising the steps of:
collecting account information of an access control card of a user;
when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
collecting voice information of a user reading verification password;
judging whether the verification password read by the user is correct or not according to the voice information;
if the verification password read by the user is correct, acquiring a face photo of the user;
and binding and storing the account information, the verification password and the face photo to finish the registration process.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, before binding and storing the account information, the verification password and the face photo, the method further comprises the following steps:
collecting an identity card photo of a user;
comparing the identity card picture with the face picture;
and if the identity card photo and the face photo are successfully compared, executing the step of binding and storing the account information, the verification password and the face photo.
Further, comparing the identity card photo with the face photo specifically comprises:
and comparing the similarity of the face in the identity card photo and the face photo, if the similarity exceeds a preset threshold value, successfully comparing the identity card photo and the face photo, and otherwise, failing to compare.
In order to achieve the above object, the present invention further provides a user authentication method, including the steps of:
collecting account information of an access control card of a user;
acquiring a verification password and a face photo which are bound and stored with account information;
collecting voice information of a user reading verification password;
extracting an authentication password from the voice information;
acquiring a face photo of a user;
respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and if the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information, generating a verification passing result.
Further, whether the acquired face photo is matched with the acquired face photo bound and stored with the account information or not is verified, and the method specifically comprises the following steps:
and comparing the similarity of the face in the acquired face picture and the acquired face picture bound and stored with the account information, if the similarity exceeds a preset threshold value, matching the acquired face picture with the acquired face picture bound and stored with the account information, and otherwise, not matching.
The present invention also provides a user registration apparatus, including:
the first acquisition module is used for acquiring account information of an access control card of a user;
the first generation module is used for randomly generating a verification password and sending the verification password to the client when a registration instruction is received so as to display the verification password to a user;
the second acquisition module is used for acquiring voice information of the authentication password read by the user;
the judging module is used for judging whether the verification password read by the user is correct or not according to the voice information;
the third acquisition module is used for acquiring a face photo of the user if the judgment module judges that the verification password read by the user is correct;
and the storage module is used for binding and storing the account information, the verification password and the face photo to complete the registration process.
Further, still include:
the fourth acquisition module is used for acquiring the identity card photo of the user;
the comparison module is used for comparing the identity card photo with the face photo;
and the storage module is used for binding and storing the account information, the verification password and the face photo if the comparison module successfully compares the information with the verification password.
Further, the comparison module is specifically configured to compare similarity of faces in the identity card photo and the face photo, and if the similarity exceeds a preset threshold, the identity card photo and the face photo are successfully compared, otherwise, the comparison fails.
The present invention also provides a user authentication apparatus, comprising:
the fifth acquisition module is used for acquiring account information of the access control card of the user;
the acquisition module is used for acquiring the verification password and the face photo which are bound and stored with the account information;
the sixth acquisition module is used for acquiring voice information of the authentication password read by the user;
the extraction module is used for extracting the authentication password from the voice information;
the seventh acquisition module is used for acquiring a face photo of the user;
the verification module is used for respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and the second generation module is used for generating a verification passing result if the verification password extracted by the extraction module and the face photo collected by the seventh acquisition module are matched with the verification password and the face photo which are acquired by the acquisition module and are bound and stored with the account information.
Further, the verification module is specifically configured to compare the similarity between the face picture acquired by the seventh acquisition module and the face in the face picture acquired by the acquisition module and stored in a binding manner with the account information, and if the similarity exceeds a preset threshold, the acquired face picture is matched with the acquired face picture stored in a binding manner with the account information, otherwise, the acquired face picture is not matched.
The invention has the beneficial effects that: the photo collection process is self-aided in the whole process, centralized collection and manual intervention are not needed, manpower and material resources are saved, and users similar in length can be screened out of illegal users through verifying passwords, so that the problem that the illegal users cannot be prevented from carrying out illegal invasion through changing appearances and holding illegally obtained access control cards by user registration and verification devices based on the existing face recognition technology can be solved.
Drawings
Fig. 1 is a flowchart of a user registration method according to an embodiment of the present invention;
fig. 2 is a flowchart of another user registration method according to an embodiment of the present invention;
fig. 3 is a flowchart of a user authentication method according to an embodiment of the present invention;
fig. 4 is a block diagram illustrating a structure of a user registration apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of another user registration apparatus according to an embodiment of the present invention;
fig. 6 is a block diagram of a user authentication device according to an embodiment of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
Fig. 1 is a flowchart of a user registration method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
11. collecting account information of an access control card of a user;
specifically, when the user is registered, the user firstly swipes an access card on the card reader, and a self-service acquisition flow is started.
12. When a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
specifically, a user can send a registration instruction through the operation of a card reader and send the registration instruction to a background server, the server starts a registration process, a verification password is generated through a random algorithm, for example, a string of numbers or a session and the like, and then the server displays the verification password to the user through a client side for the user to read.
The randomly generated authentication password can be used as a subsequent authentication item to prevent similar illegal users from invading.
13. Collecting voice information of a user reading verification password;
specifically, the user can read the authentication password through a microphone and other radio equipment, and the radio equipment sends the voice information to the server.
14. Judging whether the verification password read by the user is correct or not according to the voice information;
specifically, the server can analyze the voice information by using the existing voice recognition algorithm, extract the verification password read by the user, verify whether the extracted verification password is matched with the randomly generated verification password, if so, the verification password read by the user is correct, otherwise, the user needs to be prompted to read again.
15. If the verification password read by the user is correct, acquiring a face photo of the user;
specifically, the server starts the camera, presents the user's image that the camera was shot at the display screen, according to the face information that the camera was gathered, reminds the user to adjust the people's face angle, shoots many photos, and specific process is, shows out the approximate outline of simulated people's face on the display screen earlier, divides the face region into four quadrants about, down, left and right. The upper quadrant corresponds to the eyebrows and eyes of a person, the lower quadrant corresponds to the mouth of a person, the left quadrant corresponds to the left face of a person, and the right quadrant corresponds to the right face of a person. The system prompts a user to adjust the angles of the face areas to be respectively positioned in the corresponding quadrants, so that the face can be ensured to be over against the screen. And starting a capturing action when the face is detected to coincide with the four quadrants until a certain number of photos are captured successfully, and then selecting a photo with the best illumination from the shot photos.
16. And binding and storing the account information, the verification password and the face photo to finish the registration process.
Specifically, the server binds the account information, the verification password and the face photo, and then transmits the information to the background database through the TCP network for storage, thereby completing the registration process.
The user registration method provided by the embodiment of the invention has the following advantages:
the photo collection process is self-aided in the whole process, centralized collection and manual intervention are not needed, manpower and material resources are saved, account information, verification passwords and face photos are bound and stored, when a user swipes a card, verification of the face and the verification passwords is carried out, illegal users can be effectively prevented from swiping the card by using illegally obtained access control cards, and face verification is carried out in a mode of changing appearances, so that illegal invasion is carried out.
Alternatively, as an embodiment of the present invention, as shown in fig. 2, the method includes:
21. collecting account information of an access control card of a user;
22. when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
23. collecting voice information of a user reading verification password;
24. judging whether the verification password read by the user is correct or not according to the voice information;
25. if the verification password read by the user is correct, acquiring a face photo and an identity card photo of the user;
specifically, gather user's ID card photo accessible multiple mode and realize, for example, the user can brush the ID card on the ID card reader, reads the ID card photo that contains in the ID card chip by the ID card reader, also can shoot the positive mode of ID card and acquire the ID card photo through the camera.
26. Comparing the identity card picture with the face picture;
specifically, the similarity of the faces in the identity card photo and the face photo can be compared through an open source algorithm, if the similarity is larger than a preset threshold value, the comparison is successful, otherwise, the user is prompted to fail in comparison, and the face photo is collected again. Identity verification is performed through comparison of the identity card and the real face, and the situation that the picture does not correspond to the real face is prevented.
27. If the identity card photo and the face photo are successfully compared, the account information, the verification password and the face photo are bound and stored, and the registration process is completed.
Fig. 3 is a flowchart of a user authentication method according to an embodiment of the present invention, and as shown in fig. 3, the method includes the following steps:
31. collecting account information of an access control card of a user;
32. acquiring a verification password and a face photo which are bound and stored with account information;
33. collecting voice information of a user reading verification password;
34. extracting an authentication password from the voice information;
35. acquiring a face photo of a user;
36. respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
37. and if the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information, generating a verification passing result.
The related technical principles involved in the above steps can refer to the contents in the foregoing embodiments, and are not described herein again.
The user verification method provided by the embodiment of the invention has the following advantages:
after the user swipes the card, the face and the verification password are verified, so that the condition that an illegal user swipes the card by using an illegally acquired access control card can be effectively prevented, and the face verification is carried out in a mode of changing the appearance, so that illegal invasion is carried out.
Optionally, in this embodiment, verifying whether the acquired face photograph is matched with the acquired face photograph bound and stored with the account information specifically includes:
and comparing the similarity of the face in the acquired face picture and the acquired face picture bound and stored with the account information, if the similarity exceeds a preset threshold value, matching the acquired face picture with the acquired face picture bound and stored with the account information, and otherwise, not matching.
Fig. 4 is a block diagram of a user registration apparatus according to an embodiment of the present invention, and as shown in fig. 4, the apparatus includes:
the first acquisition module is used for acquiring account information of an access control card of a user;
the first generation module is used for randomly generating a verification password and sending the verification password to the client when a registration instruction is received so as to display the verification password to a user;
the second acquisition module is used for acquiring voice information of the authentication password read by the user;
the judging module is used for judging whether the verification password read by the user is correct or not according to the voice information;
the third acquisition module is used for acquiring a face photo of the user if the judgment module judges that the verification password read by the user is correct;
and the storage module is used for binding and storing the account information, the verification password and the face photo to complete the registration process.
Optionally, as an embodiment of the present invention, as shown in fig. 5, the apparatus further includes:
the fourth acquisition module is used for acquiring the identity card photo of the user;
the comparison module is used for comparing the identity card photo with the face photo;
and the storage module is used for binding and storing the account information, the verification password and the face photo if the comparison module successfully compares the information with the verification password.
Optionally, in this embodiment, the comparison module is specifically configured to compare similarity between faces in the identification card photo and the face photo, and if the similarity exceeds a preset threshold, the identification card photo and the face photo are successfully compared, otherwise, the comparison fails.
Fig. 6 is a block diagram of a user authentication device according to an embodiment of the present invention, and as shown in fig. 6, the device includes:
the fifth acquisition module is used for acquiring account information of the access control card of the user;
the acquisition module is used for acquiring the verification password and the face photo which are bound and stored with the account information;
the sixth acquisition module is used for acquiring voice information of the authentication password read by the user;
the extraction module is used for extracting the authentication password from the voice information;
the seventh acquisition module is used for acquiring a face photo of the user;
the verification module is used for respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and the second generation module is used for generating a verification passing result if the verification password extracted by the extraction module and the face photo collected by the seventh acquisition module are matched with the verification password and the face photo which are acquired by the acquisition module and are bound and stored with the account information.
Optionally, in this embodiment, the verification module is specifically configured to compare the similarity between the face picture acquired by the seventh acquisition module and a face in the face picture acquired by the acquisition module and stored in a bound manner with the account information, and if the similarity exceeds a preset threshold, match the acquired face picture with the acquired face picture stored in a bound manner with the account information, otherwise, not match the acquired face picture.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (10)
1. A user registration method, comprising the steps of:
collecting account information of an access control card of a user;
when a registration instruction is received, randomly generating a verification password and sending the verification password to a client so as to display the verification password to a user;
collecting voice information of the verification password read by the user;
judging whether the verification password read by the user is correct or not according to the voice information;
if the verification password read by the user is correct, acquiring a face photo of the user;
and binding and storing the account information, the verification password and the face photo to finish the registration process.
2. The method of claim 1, further comprising, before the binding and saving the account information, the authentication password and the face photo:
collecting an identity card photo of a user;
comparing the identity card photo with the face photo;
and if the identity card photo and the face photo are successfully compared, executing the step of binding and storing the account information, the verification password and the face photo.
3. The method of claim 2, wherein comparing the identification card photo with the face photo specifically comprises:
and comparing the similarity of the faces in the identity card photo and the face photo, if the similarity exceeds a preset threshold value, the identity card photo and the face photo are successfully compared, and otherwise, the comparison fails.
4. A method of user authentication, comprising the steps of:
collecting account information of an access control card of a user;
acquiring a verification password and a face photo which are bound and stored with the account information;
collecting voice information of a user reading verification password;
extracting an authentication password from the voice information;
acquiring a face photo of a user;
respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and if the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information, generating a verification passing result.
5. The method according to claim 4, wherein the verifying whether the acquired face photograph matches the acquired face photograph stored in a manner of being bound to the account information specifically includes:
and comparing the similarity of the face in the acquired face picture and the acquired face picture bound and stored with the account information, if the similarity exceeds a preset threshold value, matching the acquired face picture with the acquired face picture bound and stored with the account information, and otherwise, not matching.
6. A user registration apparatus, comprising:
the first acquisition module is used for acquiring account information of an access control card of a user;
the first generation module is used for randomly generating a verification password and sending the verification password to the client when a registration instruction is received so as to display the verification password to a user;
the second acquisition module is used for acquiring the voice information of the verification password read by the user;
the judging module is used for judging whether the verification password read by the user is correct or not according to the voice information;
the third acquisition module is used for acquiring a face photo of the user if the judgment module judges that the verification password read by the user is correct;
and the storage module is used for binding and storing the account information, the verification password and the face photo to finish the registration process.
7. The apparatus of claim 6, further comprising:
the fourth acquisition module is used for acquiring the identity card photo of the user;
the comparison module is used for comparing the identity card photo with the face photo;
and the storage module is used for binding and storing the account information, the verification password and the face photo if the comparison module successfully compares the account information, the verification password and the face photo.
8. The apparatus of claim 7, wherein the comparison module is specifically configured to compare similarity between faces in the identification card photo and the face photo, and if the similarity exceeds a preset threshold, the identification card photo and the face photo are successfully compared, otherwise, the comparison fails.
9. A user authentication apparatus, comprising:
the fifth acquisition module is used for acquiring account information of the access control card of the user;
the acquisition module is used for acquiring the verification password and the face photo which are bound and stored with the account information;
the sixth acquisition module is used for acquiring voice information of the authentication password read by the user;
the extraction module is used for extracting the authentication password from the voice information;
the seventh acquisition module is used for acquiring a face photo of the user;
the verification module is used for respectively verifying whether the extracted verification password and the collected face photo are matched with the obtained verification password and the acquired face photo which are bound and stored with the account information;
and the second generation module is used for generating a verification passing result if the verification password extracted by the extraction module and the face photo collected by the seventh acquisition module are matched with the verification password and the face photo which are acquired by the acquisition module and are bound and stored with the account information.
10. The apparatus according to claim 9, wherein the verification module is specifically configured to compare similarity between the face photograph acquired by the seventh acquisition module and a face in the face photograph acquired by the acquisition module and stored in a bound manner with the account information, and if the similarity exceeds a preset threshold, match the acquired face photograph with the acquired face photograph stored in a bound manner with the account information, otherwise, do not match.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910504106.8A CN110766841A (en) | 2019-06-12 | 2019-06-12 | User registration and verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910504106.8A CN110766841A (en) | 2019-06-12 | 2019-06-12 | User registration and verification method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110766841A true CN110766841A (en) | 2020-02-07 |
Family
ID=69329063
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910504106.8A Pending CN110766841A (en) | 2019-06-12 | 2019-06-12 | User registration and verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110766841A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111460435A (en) * | 2020-04-02 | 2020-07-28 | 广西通途科技有限公司 | User registration method, verification method and registration device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0973118A2 (en) * | 1998-07-07 | 2000-01-19 | Lsi Card Corporation | Fingerprint checking system, fingerprint checking method and memory card used for the same |
CN103268549A (en) * | 2013-04-24 | 2013-08-28 | 徐明亮 | Mobile payment verification system based on facial features |
CN104598796A (en) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | Method and system for identifying identity |
CN107992728A (en) * | 2016-10-27 | 2018-05-04 | 腾讯科技(深圳)有限公司 | Face verification method and device |
CN108537028A (en) * | 2018-04-17 | 2018-09-14 | 西安电子科技大学 | A kind of computer identity identifying system and method |
CN109117707A (en) * | 2018-06-20 | 2019-01-01 | 安徽继远软件有限公司 | A kind of trusted identity authentication method and user terminal |
CN109215184A (en) * | 2018-07-24 | 2019-01-15 | 石数字技术成都有限公司 | Face registration, verification method, face registration system and the application in gate inhibition |
CN109560937A (en) * | 2019-01-04 | 2019-04-02 | 平安科技(深圳)有限公司 | Command identifying method, device and computer readable storage medium |
-
2019
- 2019-06-12 CN CN201910504106.8A patent/CN110766841A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0973118A2 (en) * | 1998-07-07 | 2000-01-19 | Lsi Card Corporation | Fingerprint checking system, fingerprint checking method and memory card used for the same |
CN103268549A (en) * | 2013-04-24 | 2013-08-28 | 徐明亮 | Mobile payment verification system based on facial features |
CN104598796A (en) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | Method and system for identifying identity |
CN107992728A (en) * | 2016-10-27 | 2018-05-04 | 腾讯科技(深圳)有限公司 | Face verification method and device |
CN108537028A (en) * | 2018-04-17 | 2018-09-14 | 西安电子科技大学 | A kind of computer identity identifying system and method |
CN109117707A (en) * | 2018-06-20 | 2019-01-01 | 安徽继远软件有限公司 | A kind of trusted identity authentication method and user terminal |
CN109215184A (en) * | 2018-07-24 | 2019-01-15 | 石数字技术成都有限公司 | Face registration, verification method, face registration system and the application in gate inhibition |
CN109560937A (en) * | 2019-01-04 | 2019-04-02 | 平安科技(深圳)有限公司 | Command identifying method, device and computer readable storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111460435A (en) * | 2020-04-02 | 2020-07-28 | 广西通途科技有限公司 | User registration method, verification method and registration device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101997371B1 (en) | Identity authentication method and apparatus, terminal and server | |
CN106803289A (en) | A kind of false proof method and system of registering of intelligent mobile | |
CN103731271B (en) | A kind of online face identity authentication based on homomorphic cryptography and Chaotic Scrambling | |
US20060280340A1 (en) | Conjunctival scans for personal identification | |
CN113177437A (en) | Face recognition method and device | |
CN108573202A (en) | Identity identifying method, device and system and terminal, server and storage medium | |
CN105224842B (en) | Method and device for confirming user identity in VTM system | |
CN103384234A (en) | Method and system for face identity authentication | |
CN104700094B (en) | A kind of face identification method for intelligent robot and system | |
WO2010001311A1 (en) | Networked face recognition system | |
CN103279764A (en) | Real-name network authentication system based on face identification | |
CN110765830B (en) | Full self-service registration method, system, medium and equipment for human face | |
CN111831995A (en) | Trusted identity authentication method and system based on eID and human body biological information | |
CN111753271A (en) | Account opening identity verification method, account opening identity verification device, account opening identity verification equipment and account opening identity verification medium based on AI identification | |
CN109492555A (en) | Newborn identity identifying method, electronic device and computer readable storage medium | |
CN108629259A (en) | Identity identifying method and device and storage medium | |
CN114218543A (en) | Encryption and unlocking system and method based on multi-scene expression recognition | |
CN111611437A (en) | Method and device for preventing face voiceprint verification and replacement attack | |
CN110766841A (en) | User registration and verification method and device | |
CN111325053A (en) | Identity authentication method based on multiple biological characteristics and non-biological characteristics | |
CN103425978A (en) | Method and system for comparing wanted men on Internet quickly with hidden video collecting | |
US20120219192A1 (en) | Method of controlling a session at a self-service terminal, and a self-service terminal | |
CN107241309A (en) | A kind of identity identifying method, authentication device and Verification System | |
CN103440327A (en) | Method and system for quick comparison of online wanted men through hidden video | |
WO2022222957A1 (en) | Method and system for identifying target |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200207 |