CN108491709A - The method and apparatus of permission for identification - Google Patents
The method and apparatus of permission for identification Download PDFInfo
- Publication number
- CN108491709A CN108491709A CN201810236679.2A CN201810236679A CN108491709A CN 108491709 A CN108491709 A CN 108491709A CN 201810236679 A CN201810236679 A CN 201810236679A CN 108491709 A CN108491709 A CN 108491709A
- Authority
- CN
- China
- Prior art keywords
- user
- identified
- permission
- application
- mentioned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000001815 facial effect Effects 0.000 claims abstract description 84
- 238000010276 construction Methods 0.000 claims description 21
- 230000004044 response Effects 0.000 claims description 16
- 238000012545 processing Methods 0.000 claims description 12
- 238000012512 characterization method Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 6
- 239000003795 chemical substances by application Substances 0.000 description 36
- 238000013507 mapping Methods 0.000 description 16
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 238000013527 convolutional neural network Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 238000012549 training Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 244000221110 common millet Species 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 210000004709 eyebrow Anatomy 0.000 description 2
- 210000004072 lung Anatomy 0.000 description 2
- 230000005291 magnetic effect Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 210000003127 knee Anatomy 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The method and apparatus that the embodiment of the present application discloses permission for identification.One specific implementation mode of this method includes:Obtain facial image to be identified;Facial image to be identified is identified, determines the identity information of the target user corresponding to facial image to be identified;According to the identity information of target user, the authority information of target user is determined using preset authority recognition model, wherein authority recognition model is used to characterize the correspondence between the authority information of permission possessed by the identity information and pre-set user of pre-set user.The embodiment realizes the protection of user information.
Description
Technical field
The invention relates to field of computer technology, and in particular to the method and apparatus of permission for identification.
Background technology
With the development of Internet technology, face recognition technology has been applied to more and more fields.For example, can pass through
Recognition of face unlocks terminal device etc..When the electronic equipment for borrowing household or friend carries out some shirtsleeve operations (for example,
Weather lookup, music etc.), it usually needs it, could be to electronic equipment after the holder of electronic equipment unlocks electronic equipment
It is used.
Invention content
The method and apparatus that the embodiment of the present application proposes permission for identification.
In a first aspect, the embodiment of the present application provides a kind of method of permission for identification, including:Obtain face to be identified
Image;Facial image to be identified is identified, determines the identity information of the target user corresponding to facial image to be identified;Root
According to the identity information of target user, the authority information of target user is determined using preset authority recognition model, wherein permission is known
Other model is used to characterize the corresponding pass between the identity information of pre-set user and the authority information of permission possessed by pre-set user
System.
In some embodiments, this method further includes:Obtain the note corresponding to registered face image and registered face image
The identity information of volume user;Obtain the authority information of permission possessed by registration user;According to registration user identity information with
The correspondence registered between the authority information of permission possessed by user builds authority recognition model.
In some embodiments, identity information includes the identity information using face characteristic set characterization.
In some embodiments, this method further includes:Registered face image is obtained, the face in registered face image is extracted
Feature;Obtain the authority information of permission possessed by the registration user corresponding to registered face image;According to face characteristic and note
Correspondence between the authority information of permission possessed by volume user builds authority recognition model.
In some embodiments, the identity information of the target user corresponding to facial image to be identified is determined, including:Judge
Whether the target user corresponding to facial image to be identified is registered users;It is registered in response to judging target user not
Facial image to be identified is sent on destination service end by user.
In some embodiments, authority information includes the application identities set of the operable application of user;And this method
Further include:In response to detecting that target user executes operation for intended application, determine whether the application identities of intended application deposit
It is in the application identities set of the operable application of target user;In response to determining that the application identities of intended application are present in
In the application identities set of the operable application of target user, determine that target user has the acquisition to the data in intended application
Permission.
Second aspect, the embodiment of the present application provide a kind of device of permission for identification, including:First acquisition unit,
For obtaining facial image to be identified;Recognition unit determines face figure to be identified for facial image to be identified to be identified
As the identity information of corresponding target user;Determination unit, for the identity information according to target user, using preset power
Limit identification model determines the authority information of target user, wherein authority recognition model is used to characterize the identity information of pre-set user
Correspondence between the authority information of permission possessed by pre-set user.
In some embodiments, which further includes:First construction unit, the first construction unit are used for:Obtain registrant
The identity information of registration user corresponding to face image and registered face image;Obtain the permission of permission possessed by registration user
Information;It is built according to the correspondence between the authority information of permission possessed by the identity information of registration user and registration user
Authority recognition model.
In some embodiments, identity information includes the identity information using face characteristic set characterization.
In some embodiments, which further includes:Second construction unit, the second construction unit are used for:Obtain registrant
Face image extracts the face characteristic in registered face image;It obtains possessed by the registration user corresponding to registered face image
The authority information of permission;It is built according to the correspondence between the authority information of permission possessed by face characteristic and registration user
Authority recognition model.
In some embodiments, recognition unit is further used for determining as follows corresponding to facial image to be identified
Target user identity information:Judge whether the target user corresponding to facial image to be identified is registered users;Response
It is registered users in judging target user not, facial image to be identified is sent on destination service end.
In some embodiments, authority information includes the application identities set of the operable application of user;And the device
Further include processing unit, processing unit is used for:In response to detecting that target user executes operation for intended application, target is determined
The application identities of application whether there is in the application identities set of the operable application of target user;In response to determining target
The application identities of application are present in the application identities set of the operable application of target user, determine that target user has to mesh
The acquisition permission of data in mark application.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, including:One or more processors;Storage dress
It sets, for storing one or more programs, when one or more programs are executed by one or more processors so that one or more
A processor realizes the method such as any embodiment in the method for permission for identification.
Fourth aspect, the embodiment of the present application provide a kind of computer-readable medium, are stored thereon with computer program, should
The method such as any embodiment in the method for permission for identification is realized when program is executed by processor.
The method and apparatus of permission for identification provided by the embodiments of the present application pass through the face figure to be identified to getting
As being identified, determines the identity information of the target user corresponding to facial image to be identified, then used according to above-mentioned target
The identity information at family determines the authority information of above-mentioned target user using preset authority recognition model, wherein authority recognition mould
Type is used to characterize the correspondence between the authority information of permission possessed by the identity information and pre-set user of pre-set user, from
And realize the protection of user information.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is that this application can be applied to exemplary system architecture figures therein;
Fig. 2 is the flow chart according to one embodiment of the method for the permission for identification of the application;
Fig. 3 is the schematic diagram according to an application scenarios of the method for the permission for identification of the application;
Fig. 4 is the flow chart according to another embodiment of the method for the permission for identification of the application;
Fig. 5 is the structural schematic diagram according to one embodiment of the device of the permission for identification of the application;
Fig. 6 is adapted for the structural schematic diagram of the computer system of the electronic equipment for realizing the embodiment of the present application.
Specific implementation mode
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, is illustrated only in attached drawing and invent relevant part with related.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the method that can apply the permission for identification of the application or for identification device of permission
Embodiment exemplary system architecture 100.
As shown in Figure 1, system architecture 100 may include user terminal 1011,1012, network 1021,1022,1023 is known
Other server 103 and destination server 104.Wherein, network 1021 is in user terminal 1011,1012 and destination server
The medium of communication link is provided between 104;Network 1022 is between user terminal 1011,1012 and identification server 103
The medium of communication link is provided;Network 1023 to identification server 103 and destination server 104 between communication link is provided
Medium.Network 1021,1022,1023 may include various connection types, such as wired, wireless communication link or optical fiber electricity
Cable etc..
User can use user terminal 1011,1012 by network 1022 with identification server 103 interact, with transmission or
Receive message etc.;User can also be interacted by network 1021 with destination server 104 using user terminal 1011,1012, with
Send or receive message etc..
User terminal 1011,1012 can be hardware, can also be software.When user terminal 1011,1012 is hardware,
Can be the various electronic equipments that there is camera and support information exchange, including but not limited to smart mobile phone, tablet computer,
E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image
Expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic shadow
As expert's compression standard audio level 4) player, pocket computer on knee and desktop computer etc..Work as user terminal
1011,1012 when being software, may be mounted in above-mentioned cited electronic equipment.Multiple softwares or software may be implemented into it
Module can also be implemented as single software or software module.It is not specifically limited herein.
Identification server 103 can be to provide the server of identification service, such as on user terminal 1011,1012
The facial image identification server that the facial image to be identified passed is identified.Facial image identifies that server can be to receiving
Facial image to be identified carry out feature extraction, the processing such as characteristic matching, and by handling result (such as facial image to be identified institute
The authority information of the user of instruction) feed back to user terminal.
Destination server 104 can be to provide the server of various services, for example, receive user terminal 1011,1012 or
Identify the server for user's facial image that server 103 uploads.
It should be noted that the method for the permission for identification that the embodiment of the present application is provided can be by identification server
103 execute, and correspondingly, the device of permission can be set in identification server 103 for identification.
It should also be noted that, user terminal 1011,1012 can also be in local to indicated by facial image to be identified
The authority information of user is identified, at this point, the method for permission can be executed by user terminal 1011,1012 for identification, phase
Ying Di, for identification the device of permission can be set in user terminal 1011,1012.At this point, exemplary system architecture 100 can
Identification server 103 and network 1022 is not present.
It should be pointed out that the local of identification server 103 can also directly store facial image to be identified, identification service
Device 103 can directly acquire local facial image to be identified and carry out authority recognition, at this point, exemplary system architecture 100 can be with
There is no user terminal 1011,1012 and networks 1022.
It should be noted that identification server, client can be hardware, can also be software.As identification server, visitor
When family end is hardware, the distributed apparatus cluster of multiple equipment composition may be implemented into, individual equipment can also be implemented as.Work as knowledge
When other server, client are software, multiple softwares or software module may be implemented into (such as providing Distributed Services
Multiple software modules), single software or software module can also be implemented as.It is not specifically limited herein.
It should be understood that the number of the user terminal, network, identification server and destination server in Fig. 1 is only to illustrate
Property.According to needs are realized, can have any number of user terminal, network, identification server and destination server.
With continued reference to Fig. 2, the flow of one embodiment of the method for the permission for identification according to the application is shown
200.The method of the permission for identification, includes the following steps:
Step 201, facial image to be identified is obtained.
In the present embodiment, executive agent (such as user terminal shown in FIG. 1 or clothes of the method for permission for identification
Business device) facial image to be identified can be obtained.Above-mentioned facial image to be identified is typically the image for including face, for example, comprising
The image of front face or side face.If above-mentioned executive agent is user terminal, user is unlocked using face needing user
Terminal utilizes in the application scenarios such as face login user account, and above-mentioned executive agent can usually acquire at least one and wait knowing
Others' face image;If above-mentioned executive agent is server, after user terminal collects an at least facial image to be identified,
Above-mentioned executive agent can obtain facial image to be identified from user terminal.
Step 202, facial image to be identified is identified, determines the target user's corresponding to facial image to be identified
Identity information.
In the present embodiment, above-mentioned executive agent can be to the facial image to be identified that is got in step 201 into pedestrian
Face identifies, determines the identity information of the target user corresponding to above-mentioned facial image to be identified.Above-mentioned executive agent may be used
Facial image to be identified is identified based on the human face detection tech of template matches, recognition methods may include steps of:
Chartered facial image template or facial image feature templates are extracted from database first, later according to preset template
Matching strategy matches facial image to be identified with chartered facial image template, or to facial image to be identified
Feature matched with chartered facial image feature templates, determine the highest facial image template of matching degree or face
The corresponding identity information of characteristics of image template is the identity information of target user.Optionally, face recognition result can also include
Facial size and face location information etc..Above-mentioned executive agent can be in the identity of the face recognition result and user that pre-establish
The identity information of the target user corresponding to the face recognition result identified is searched in the mapping table of information.Identity information
The relation information between the holder of address name, user and user terminal be can include but is not limited to (for example, holder's sheet
People, the parent of holder, stranger etc.) and Customs Assigned Number etc..
Step 203, according to the identity information of target user, the power of target user is determined using preset authority recognition model
Limit information.
In the present embodiment, above-mentioned executive agent can be known according to the identity information of target user using preset permission
Other model determines the authority information of target user.Authority information can include but is not limited to user for the operable of user terminal
Period and operable time length.The identity information that above-mentioned authority recognition model can be used for characterizing pre-set user is used with default
Correspondence between the authority information of permission possessed by family.As an example, above-mentioned authority recognition model can be used for table
The mapping table between the authority information of permission possessed by the identity information and pre-set user of pre-set user is levied, for example, on
It can be for characterizing the user identifier of pre-set user with pre-set user for the operable of user terminal to state authority recognition model
Mapping table between period can also be relation information between pre-set user and the holder of user terminal with it is default
User is for the mapping table between the operable time length of user terminal.Above-mentioned executive agent can pass through above-mentioned correspondence
Relation table finds authority information corresponding with the identity information of target user.
As an example, if the identity information of target user is " daughter ", can be determined using above-mentioned authority recognition model
The authority information of permission possessed by " daughter " is:To the operable time length of a hour of user terminal.
The method that above-described embodiment of the application provides is by identifying that facial image to be identified determines corresponding user
The authority information of possessed permission realizes the protection of user information while promoting user and obtaining the convenience of information.
In some optional realization methods of the present embodiment, if above-mentioned executive agent is user terminal, user makes
During carrying out face registration with above-mentioned executive agent, above-mentioned executive agent can obtain the active user's (registration taken
User) registered face image and obtain the identity letter of the registration user corresponding to above-mentioned registered face image input by user
Breath, for example, name is " Zhang San ", relationship is " younger brother ".Later, permission possessed by above-mentioned registration user input by user is obtained
Authority information, for example, user can fill in or select in permission equipment interface above-mentioned registration user be directed to above-mentioned execution
The operable time length of main body, operable time section etc..Finally, above-mentioned executive agent can be according to above-mentioned registration user's
Correspondence between the authority information of permission possessed by identity information and above-mentioned registration user builds above-mentioned authority recognition mould
Type.Above-mentioned executive agent can establish the permission of the identity information and permission possessed by above-mentioned registration user of above-mentioned registration user
The mapping table of foundation is determined as authority recognition model by the mapping table between information.If above-mentioned executive agent is clothes
When business device, user can utilize user terminal to above-mentioned executive agent during carrying out face registration using user terminal
Send registration request.Later, user terminal can shoot the registered face image of active user (registration user), and it is defeated to receive user
The authority information of permission possessed by the identity information of the above-mentioned registration user entered and above-mentioned registration user.Then, above-mentioned execution
Main body can obtain the registered face image that above-mentioned user terminal takes, and obtain the registration corresponding to above-mentioned registered face image
The authority information of permission possessed by the identity information of user and above-mentioned registration user.Finally, above-mentioned executive agent can root
According to the correspondence structure between the authority information of permission possessed by the identity information of above-mentioned registration user and above-mentioned registration user
Build above-mentioned authority recognition model.Above-mentioned executive agent can establish the identity information of above-mentioned registration user and above-mentioned registration user institute
The mapping table of foundation is determined as authority recognition model by the mapping table between the authority information for the permission having.
In some optional realization methods of the present embodiment, above-mentioned identity information may include using face characteristic set
The identity information of characterization.Face characteristic usually may include Euclidean distance, the curvature between the characteristic point (key point) on face
With angle etc..Face is made of positions such as eyebrow, eyes, nose, mouth, chins, can by the size at these positions, shape and
The geometric description of structural relation is determined as face characteristic between them.Face characteristic can also include face color characteristic, texture
Feature, contour feature etc..
In some optional realization methods of the present embodiment, above-mentioned executive agent can obtain registered face figure first
Picture can extract the face characteristic in above-mentioned registered face image later.Above-mentioned executive agent can utilize ASM (Active
Shape Model) the above-mentioned registration of the extraction such as algorithm, convolutional neural networks (CNN, Convolutional Neural Network)
Face characteristic in facial image.ASM algorithms are a kind of based on points distribution models (PDM, Point Distribution
Model algorithm).In PDM, the geometry of shape similar object, such as face, human hand, heart, lung etc. can lead to
The coordinate for crossing several key feature points (landmarks) is sequentially connected in series to form a shape vector to indicate.ASM algorithms need logical
It crosses the method manually demarcated and first demarcates training set, obtain shape by training, then specific by the matching realization of key point
The matching of object.The characteristics of image of facial image to be identified can be input to training in advance for identification by above-mentioned executive agent
In the convolutional neural networks of face characteristic, face characteristic set is obtained.Later, it can obtain corresponding to above-mentioned registered face image
Registration user possessed by permission authority information, for example, for the operable time length, operable of above-mentioned executive agent
Period etc..Finally, above-mentioned executive agent can be according to permission possessed by above-mentioned face characteristic and above-mentioned registration user
Correspondence between authority information builds above-mentioned authority recognition model.Above-mentioned executive agent can establish above-mentioned face characteristic with
Mapping table between the authority information of permission possessed by above-mentioned registration user, the mapping table of foundation is determined as weighing
Limit identification model.
In some optional realization methods of the present embodiment, above-mentioned executive agent is in the face figure to be identified to getting
As after being identified, the identity information of the corresponding target user of facial image to be identified can be determined as follows:Sentence
Whether the target user broken corresponding to above-mentioned facial image to be identified is registered users.Herein, above-mentioned executive agent can be with
Determine to facial image to be identified be identified obtained face recognition result whether there is in the associated people of user terminal
In face recognition result set.If above-mentioned face recognition result be present in in the associated face recognition result set of user terminal,
Then illustrate that the target user corresponding to above-mentioned facial image to be identified is registered users.If above-mentioned face recognition result is not present
In with the associated face recognition result set of user terminal, then illustrate the target user corresponding to above-mentioned facial image to be identified
It is not registered users, for example, stranger, at this point, above-mentioned facial image to be identified can be sent to mesh by above-mentioned executive agent
It marks in server-side.The current location information of user terminal can also be sent on above-mentioned destination service end by above-mentioned executive agent.
Above-mentioned destination service end can be the clothes for the information (photo, music, document etc.) in user terminal to be backed up, managed
Business end.After user logs in the account corresponding to above-mentioned destination service end on miscellaneous equipment, it can view and utilize user's end
End carries out the photo of the stranger of face unlock.The photo upload of this stranger that face unlock will be carried out using user terminal
Method to destination service end can contribute to be promoted information to user, property security protection performance.
It is a signal according to the application scenarios of the method for the permission for identification of the present embodiment with continued reference to Fig. 3, Fig. 3
Figure.In the application scenarios of Fig. 3, the executive agent (such as mobile phone) of permission can first turn on camera for identification, to working as
The face of preceding user is taken pictures, to get facial image to be identified (as shown in label 301).Then, this can be waited knowing
Others is identified face image, determines the identity information of the target user corresponding to facial image to be identified (such as 302 institute of label
Show) it is " elder brother ".It should be noted that the image indicated by label 301 is only to illustrate.Finally, preset permission may be used
Identification model determines that the authority information (as shown in label 303) corresponding to identity information " elder brother " is that operating time length three is small
When.
With further reference to Fig. 4, it illustrates the flows 400 of another embodiment of the method for permission for identification.The use
In the flow 400 of the method for identification permission, include the following steps:
Step 401, facial image to be identified is obtained.
Step 402, facial image to be identified is identified, determines the target user's corresponding to facial image to be identified
Identity information.
Step 403, according to the identity information of target user, the power of target user is determined using preset authority recognition model
Limit information.
In the present embodiment, step 401, step 402, step 403 operation respectively with step 201 in previous embodiment,
Step 202, the operation of step 203 are essentially identical, and details are not described herein.
Step 404, in response to detecting that target user executes operation for intended application, the application mark of intended application is determined
Know with the presence or absence of in the application identities set of the operable application of target user.
In the present embodiment, above-mentioned authority information may include the application identities set of the operable application of user.Using
Mark may include Apply Names, application numbers etc..If above-mentioned executive agent detects that above-mentioned target user is directed to intended application
Operation is executed, above-mentioned executive agent can determine that the application identities of above-mentioned intended application whether there is and can be grasped in above-mentioned target user
In the application identities set of the application of work.Intended application can be the targeted application of the operation of current time user.User institute
The operation of execution may include accessing the operation using data, deleting application operating and the moving operation etc. to application icon.
Step 405, in response to determining that the application identities of intended application are present in answering for the operable application of target user
With in logo collection, determining that target user has to the acquisition permissions of the data in intended application.
In the present embodiment, if the application identities of above-mentioned intended application are present in the operable application of above-mentioned target user
In application identities set, it may be said that bright above-mentioned target user has the permission for executing operation to above-mentioned intended application, then above-mentioned to hold
Row main body can determine that target user has the acquisition permission to the data in above-mentioned intended application.If above-mentioned target user is directed to
Above-mentioned intended application performs the operation accessed using data, then the page of above-mentioned intended application can be presented in above-mentioned executive agent
Information;If above-mentioned target user performs moving operation for the icon of above-mentioned intended application, above-mentioned executive agent can incite somebody to action
The icon of above-mentioned intended application is moved on the position indicated by user.
Optionally, if the application identities of above-mentioned intended application are not present in the application of the operable application of above-mentioned target user
In logo collection, it can be said that bright above-mentioned target user does not have the permission for executing operation to above-mentioned intended application, above-mentioned execution
Main body can determine that target user does not have the acquisition permission to the data in intended application, be used so as to generate to be used to characterize
Family does not have the prompt message for the permission that operation is executed to intended application, for example, " you do not have to the access rights of photo " or
Person's " accessing failure " etc..
Figure 4, it is seen that compared with the corresponding embodiments of Fig. 2, the method for the permission for identification in the present embodiment
Flow 400 increase in response to detecting that target user executes operation for intended application, determine the application mark of intended application
Know with the presence or absence of in the application identities set of the operable application of target user step 404 and in response to determining that target is answered
Application identities are present in the application identities set of the operable application of target user, determine that target user has to target
The step 405 of the acquisition permission of data in.The scheme of the present embodiment description can not need equipment holder as a result,
In the case of being unlocked to equipment, target user corresponding to facial image to be identified is allowed operable to apply into enforcement its
With to improve the flexibility that equipment uses.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, this application provides one kind to weigh for identification
One embodiment of the device of limit, the device embodiment is corresponding with embodiment of the method shown in Fig. 2, which can specifically answer
For in various electronic equipments.
As shown in figure 5, the device 500 of the permission for identification of the present embodiment includes:First acquisition unit 501, identification are single
Member 502 and determination unit 503.Wherein, first acquisition unit 501 is for obtaining facial image to be identified;Recognition unit 502 is used for
Facial image to be identified is identified, determines the identity information of the target user corresponding to facial image to be identified;It determines single
Member 503 determines the authority information of target user using preset authority recognition model for the identity information according to target user,
Wherein, authority recognition model be used for characterize permission possessed by the identity information and pre-set user of pre-set user authority information it
Between correspondence.
In some optional realization methods of the present embodiment, the device 500 of above-mentioned permission for identification can also include
First construction unit (not shown).If the device 500 of above-mentioned permission for identification is user terminal, user is into pedestrian
During face is registered, above-mentioned first construction unit can obtain the registered face figure of the active user (registration user) taken
Picture and the identity information for obtaining the registration user corresponding to above-mentioned registered face image input by user, for example, name is " to open
Three ", relationship is " younger brother ".Later, above-mentioned first construction unit can obtain possessed by above-mentioned registration user input by user
The authority information of permission, for example, user can fill in or select in permission equipment interface, above-mentioned registration user's is operable
Time span, operable time section etc..Finally, above-mentioned first construction unit can be according to the identity information of above-mentioned registration user
Correspondence between the authority information of permission possessed by above-mentioned registration user builds above-mentioned authority recognition model.Above-mentioned
One construction unit can establish the authority information of the identity information and permission possessed by above-mentioned registration user of above-mentioned registration user
Between mapping table, the mapping table of foundation is determined as authority recognition model.If the dress of above-mentioned permission for identification
Set 500 for server when, user can utilize user terminal to above-mentioned during carrying out face registration using user terminal
The device 500 of permission sends registration request for identification.Later, user terminal can shoot the note of active user (registration user)
The power of permission possessed by volume facial image, the identity information of reception above-mentioned registration user input by user and above-mentioned registration user
Limit information.Then, above-mentioned first construction unit can obtain the registered face image that above-mentioned user terminal takes, and obtain above-mentioned
The identity information of registration user corresponding to registered face image, and the registration obtained corresponding to above-mentioned registered face image are used
The authority information of permission possessed by family.Finally, above-mentioned first construction unit can be according to the identity information of above-mentioned registration user
Correspondence between the authority information of permission possessed by above-mentioned registration user builds above-mentioned authority recognition model.Above-mentioned
One construction unit can establish the authority information of the identity information and permission possessed by above-mentioned registration user of above-mentioned registration user
Between mapping table, the mapping table of foundation is determined as authority recognition model.
In some optional realization methods of the present embodiment, above-mentioned identity information may include using face characteristic set
The identity information of characterization.Face characteristic usually may include Euclidean distance, the curvature between the characteristic point (key point) on face
With angle etc..Face is made of positions such as eyebrow, eyes, nose, mouth, chins, can by the size at these positions, shape and
The geometric description of structural relation is determined as face characteristic between them.Face characteristic can also include face color characteristic, texture
Feature, contour feature etc..
In some optional realization methods of the present embodiment, the device 500 of above-mentioned permission for identification can also include
Second construction unit (not shown).Above-mentioned second construction unit can obtain registered face image first, can carry later
Take the face characteristic in above-mentioned registered face image.Above-mentioned second construction unit can utilize ASM algorithms, convolutional neural networks etc.
Extract the face characteristic in above-mentioned registered face image.ASM algorithms are a kind of algorithms based on points distribution models.In PDM, outside
The geometry of shape similar object, such as face, human hand, heart, lung etc. can pass through the coordinate of several key feature points
It is sequentially connected in series to form a shape vector to indicate.ASM algorithms need the method by manually demarcating first to demarcate training set, pass through
Training obtains shape, then the matching of certain objects is realized by the matching of key point.Above-mentioned second construction unit can incite somebody to action
The characteristics of image of facial image to be identified is input in the convolutional neural networks of the face characteristic for identification of training in advance, is obtained
Face characteristic set.Later, above-mentioned second construction unit can obtain the registration user institute corresponding to above-mentioned registered face image
The authority information for the permission having, for example, being directed to the operable time length of above-mentioned executive agent, operable time section etc..
Finally, above-mentioned second construction unit can be according to the authority information of permission possessed by above-mentioned face characteristic and above-mentioned registration user
Between correspondence build above-mentioned authority recognition model.Above-mentioned second construction unit can establish above-mentioned face characteristic with it is above-mentioned
The mapping table between the authority information of permission possessed by user is registered, the mapping table of foundation, which is determined as permission, to be known
Other model.
In some optional realization methods of the present embodiment, above-mentioned recognition unit, which can be determined as follows, to be waited knowing
The identity information of the corresponding target user of others' face image:Judge whether is target user corresponding to above-mentioned facial image to be identified
For registered users.Herein, above-mentioned recognition unit can be determined is identified obtained face to facial image to be identified
Recognition result whether there is in in the associated face recognition result set of user terminal.If above-mentioned face recognition result is present in
With in the associated face recognition result set of user terminal, then illustrate that the target user corresponding to above-mentioned facial image to be identified is
Registered users.If above-mentioned face recognition result is not present in, with the associated face recognition result set of user terminal, saying
Target user corresponding to bright above-mentioned facial image to be identified is not registered users, for example, stranger, at this point, above-mentioned identification
Above-mentioned facial image to be identified can be sent on destination service end by unit.Above-mentioned executive agent can also be by user terminal
Current location information is sent on above-mentioned destination service end.Above-mentioned destination service end can be for the information in user terminal
The server-side that (photo, music, document etc.) is backed up, managed.When user logs in above-mentioned destination service end on miscellaneous equipment
After corresponding account, the photo for the stranger that face unlock is carried out using user terminal can be viewed.This will utilize is used
The method that family terminal carries out photo upload to the destination service end of the stranger of face unlock can contribute to be promoted to user's
The security protection performance of information, property.
In some optional realization methods of the present embodiment, above-mentioned authority information includes answering for the operable application of user
Use logo collection.Application identities may include Apply Names, application numbers etc..The device 500 of above-mentioned permission for identification may be used also
To include processing unit unit (not shown).If detecting, above-mentioned target user executes operation for intended application, above-mentioned
Processing unit can determine that the application identities of above-mentioned intended application whether there is answering in the operable application of above-mentioned target user
With in logo collection.Intended application can be the targeted application of the operation of current time user.Operation performed by user can
With including accessing the operation using data, deleting application operating and to the moving operation etc. of application icon.If above-mentioned target is answered
Application identities are present in the application identities set of the operable application of above-mentioned target user, it may be said that bright above-mentioned target is used
Family has the permission that operation is executed to above-mentioned intended application, then above-mentioned processing unit can determine that target user has to above-mentioned mesh
The acquisition permission of data in mark application.If above-mentioned target user performs the behaviour accessed using data for above-mentioned intended application
Make, then the page info of above-mentioned intended application can be presented;If above-mentioned target user executes for the icon of above-mentioned intended application
The icon of above-mentioned intended application, then can be moved on the position indicated by user by moving operation.
Optionally, if the application identities of above-mentioned intended application are not present in answering for the operable application of above-mentioned target user
With in logo collection, it can be said that bright above-mentioned target user does not have the permission that operation is executed to above-mentioned intended application, it can be true
The user that sets the goal does not have to the acquisition permissions of the data in intended application, does not have pair for characterizing user so as to generate
Intended application executes the prompt message of the permission of operation, for example, " you do not have the access rights to photo " or " access mistake
Lose " etc..
All units described in device 500 are corresponding with reference to each step in figure 2 and the method for Fig. 4 descriptions.As a result,
Operation and feature above with respect to method description are equally applicable to device 500 and unit wherein included, and details are not described herein.
The device for the permission for identification that the above embodiments of the present application provide, passes through the facial image to be identified to getting
It is identified, determines the identity information of the target user corresponding to facial image to be identified, then according to above-mentioned target user
Identity information, the authority information of above-mentioned target user is determined using preset authority recognition model, wherein authority recognition model
Correspondence between the authority information of permission possessed by identity information and pre-set user for characterizing pre-set user, to
Realize the protection of user information.
Below with reference to Fig. 6, it illustrates the computer systems 600 suitable for the electronic equipment for realizing the embodiment of the present invention
Structural schematic diagram.Electronic equipment shown in Fig. 6 is only an example, to the function of the embodiment of the present application and should not use model
Shroud carrys out any restrictions.
As shown in fig. 6, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in
Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and
Execute various actions appropriate and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data.
CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always
Line 604.
It is connected to I/O interfaces 605 with lower component:Importation 606 including keyboard, mouse etc.;Including such as liquid crystal
Show the output par, c 607 of device (LCD) and loud speaker etc.;Storage section 608 including hard disk etc.;And including such as LAN card,
The communications portion 609 of the network interface card of modem etc..Communications portion 609 executes communication via the network of such as internet
Processing.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as disk, CD, magneto-optic disk,
Semiconductor memory etc., as needed be mounted on driver 610 on, in order to from the computer program read thereon according to need
It is mounted into storage section 608.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed by communications portion 609 from network, and/or from detachable media
611 are mounted.When the computer program is executed by central processing unit (CPU) 601, limited in execution the present processes
Above-mentioned function.It should be noted that the above-mentioned computer-readable medium of the application can be computer-readable signal media or
Computer readable storage medium either the two arbitrarily combines.Computer readable storage medium for example can be --- but
Be not limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or arbitrary above combination.
The more specific example of computer readable storage medium can include but is not limited to:Electrical connection with one or more conducting wires,
Portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only deposit
Reservoir (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory
Part or above-mentioned any appropriate combination.In this application, computer readable storage medium can any be included or store
The tangible medium of program, the program can be commanded the either device use or in connection of execution system, device.And
In the application, computer-readable signal media may include the data letter propagated in a base band or as a carrier wave part
Number, wherein carrying computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but not
It is limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer
Any computer-readable medium other than readable storage medium storing program for executing, the computer-readable medium can send, propagate or transmit use
In by instruction execution system, device either device use or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to:Wirelessly, electric wire, optical cable, RF etc., Huo Zheshang
Any appropriate combination stated.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part for a part for one module, program segment, or code of table, the module, program segment, or code includes one or more uses
The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it to note
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present invention can be realized by way of software, can also be by hard
The mode of part is realized.Described unit can also be arranged in the processor, for example, can be described as:A kind of processor packet
Include first acquisition unit, recognition unit and determination unit.Wherein, the title of these units is not constituted to this under certain conditions
The restriction of unit itself.For example, first acquisition unit is also described as " obtaining the unit of facial image to be identified ".
As on the other hand, present invention also provides a kind of computer-readable medium, which can be
Included in device described in above-described embodiment;Can also be individualism, and without be incorporated the device in.Above-mentioned calculating
Machine readable medium carries one or more program, when said one or multiple programs are executed by the device so that should
Device:Obtain facial image to be identified;Facial image to be identified is identified, determines the mesh corresponding to facial image to be identified
Mark the identity information of user;According to the identity information of target user, determine target user's using preset authority recognition model
Authority information, wherein authority recognition model is for characterizing permission possessed by the identity information and pre-set user of pre-set user
Correspondence between authority information.
Above description is only presently preferred embodiments of the present invention and the explanation to institute's application technology principle.People in the art
Member should be appreciated that invention scope involved in the present invention, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature
Other technical solutions of arbitrary combination and formation.Such as features described above has similar work(with (but not limited to) disclosed in the present invention
Can technical characteristic replaced mutually and the technical solution that is formed.
Claims (14)
1. a kind of method of permission for identification, including:
Obtain facial image to be identified;
The facial image to be identified is identified, determines the identity of the target user corresponding to the facial image to be identified
Information;
According to the identity information of the target user, determine that the permission of the target user is believed using preset authority recognition model
Breath, wherein the authority recognition model is used to characterize the power of permission possessed by the identity information and pre-set user of pre-set user
Correspondence between limit information.
2. according to the method described in claim 1, wherein, the method further includes:
Obtain the identity information of the registration user corresponding to registered face image and the registered face image;
Obtain the authority information of permission possessed by the registration user;
According to corresponding between the identity information of the registration user and the authority information of permission possessed by the registration user
Relationship builds the authority recognition model.
3. according to the method described in claim 1, wherein, the identity information includes the identity using face characteristic set characterization
Information.
4. according to the method described in claim 3, wherein, the method further includes:
Registered face image is obtained, the face characteristic in the registered face image is extracted;
Obtain the authority information of permission possessed by the registration user corresponding to the registered face image;
Institute is built according to the correspondence between the authority information of permission possessed by the face characteristic and the registration user
State authority recognition model.
5. according to the method described in one of claim 1-4, wherein the mesh corresponding to the determination facial image to be identified
The identity information of user is marked, including:
Judge whether the target user corresponding to the facial image to be identified is registered users;
It is registered users in response to judging the target user not, the facial image to be identified is sent to destination service
On end.
6. according to the method described in one of claim 1-4, wherein authority information includes the application mark of the operable application of user
Know set;And
The method further includes:
In response to detecting that the target user executes operation for intended application, determine that the application identities of the intended application are
It is no to be present in the application identities set of the operable application of the target user;
In response to determining that the application identities of the intended application are present in the application mark of the operable application of the target user
Know in set, determines that the target user has the acquisition permission to the data in the intended application.
7. a kind of device of permission for identification, including:
First acquisition unit, for obtaining facial image to be identified;
Recognition unit is determined for the facial image to be identified to be identified corresponding to the facial image to be identified
The identity information of target user;
Determination unit determines the mesh for the identity information according to the target user using preset authority recognition model
Mark the authority information of user, wherein the authority recognition model is used to characterize identity information and the pre-set user institute of pre-set user
Correspondence between the authority information for the permission having.
8. device according to claim 7, wherein described device further includes:First construction unit, first structure are single
Member is used for:
Obtain the identity information of the registration user corresponding to registered face image and the registered face image;
Obtain the authority information of permission possessed by the registration user;
According to corresponding between the identity information of the registration user and the authority information of permission possessed by the registration user
Relationship builds the authority recognition model.
9. device according to claim 7, wherein the identity information includes the identity using face characteristic set characterization
Information.
10. device according to claim 9, wherein described device further includes:Second construction unit, second structure
Unit is used for:
Registered face image is obtained, the face characteristic in the registered face image is extracted;
Obtain the authority information of permission possessed by the registration user corresponding to the registered face image;
Institute is built according to the correspondence between the authority information of permission possessed by the face characteristic and the registration user
State authority recognition model.
11. according to the device described in one of claim 7-10, wherein the recognition unit is further used for as follows
Determine the identity information of the target user corresponding to the facial image to be identified:
Judge whether the target user corresponding to the facial image to be identified is registered users;
It is registered users in response to judging the target user not, the facial image to be identified is sent to destination service
On end.
12. according to the device described in one of claim 7-10, wherein authority information includes the application of the operable application of user
Logo collection;And
Described device further includes processing unit, and the processing unit is used for:
In response to detecting that the target user executes operation for intended application, determine that the application identities of the intended application are
It is no to be present in the application identities set of the operable application of the target user;
In response to determining that the application identities of the intended application are present in the application mark of the operable application of the target user
Know in set, determines that the target user has the acquisition permission to the data in the intended application.
13. a kind of electronic equipment, including:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors are real
The now method as described in any in claim 1-6.
14. a kind of computer-readable medium, is stored thereon with computer program, wherein the program is realized when being executed by processor
Method as described in any in claim 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810236679.2A CN108491709A (en) | 2018-03-21 | 2018-03-21 | The method and apparatus of permission for identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810236679.2A CN108491709A (en) | 2018-03-21 | 2018-03-21 | The method and apparatus of permission for identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108491709A true CN108491709A (en) | 2018-09-04 |
Family
ID=63319187
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810236679.2A Pending CN108491709A (en) | 2018-03-21 | 2018-03-21 | The method and apparatus of permission for identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108491709A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033797A (en) * | 2018-09-13 | 2018-12-18 | 广东电网有限责任公司 | A kind of authority setting method and device |
CN109493112A (en) * | 2018-09-28 | 2019-03-19 | 深圳壹账通智能科技有限公司 | Member management control method, device, computer equipment and storage medium |
CN109492611A (en) * | 2018-11-27 | 2019-03-19 | 电卫士智能电器(北京)有限公司 | Electrical Safety method for early warning and device |
CN109871819A (en) * | 2019-02-28 | 2019-06-11 | 百度在线网络技术(北京)有限公司 | Method and apparatus for sending information |
CN110084200A (en) * | 2019-04-29 | 2019-08-02 | 重庆指讯科技股份有限公司 | A kind of retail method based on recognition of face, system and terminal device |
CN110992163A (en) * | 2019-11-08 | 2020-04-10 | 苏宁金融科技(南京)有限公司 | Electronic signature method, device, computer equipment and storage medium |
CN111581623A (en) * | 2020-05-09 | 2020-08-25 | 深圳物控智联科技有限公司 | Intelligent data interaction method and device, electronic equipment and storage medium |
CN112233674A (en) * | 2020-10-15 | 2021-01-15 | 上海博泰悦臻网络技术服务有限公司 | Multimode interaction method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105872685A (en) * | 2016-03-24 | 2016-08-17 | 深圳市国华识别科技开发有限公司 | Intelligent terminal control method and system, and intelligent terminal |
CN106487516A (en) * | 2016-09-29 | 2017-03-08 | 乐视控股(北京)有限公司 | A kind of method of the multi-user management of mobile terminal and its device |
KR20170082024A (en) * | 2016-01-05 | 2017-07-13 | 한국전자통신연구원 | Apparatus and Method for Recognizing Face |
CN107392178A (en) * | 2017-08-10 | 2017-11-24 | 广州杰之良软件有限公司 | Monitoring method and system |
-
2018
- 2018-03-21 CN CN201810236679.2A patent/CN108491709A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170082024A (en) * | 2016-01-05 | 2017-07-13 | 한국전자통신연구원 | Apparatus and Method for Recognizing Face |
CN105872685A (en) * | 2016-03-24 | 2016-08-17 | 深圳市国华识别科技开发有限公司 | Intelligent terminal control method and system, and intelligent terminal |
CN106487516A (en) * | 2016-09-29 | 2017-03-08 | 乐视控股(北京)有限公司 | A kind of method of the multi-user management of mobile terminal and its device |
CN107392178A (en) * | 2017-08-10 | 2017-11-24 | 广州杰之良软件有限公司 | Monitoring method and system |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033797A (en) * | 2018-09-13 | 2018-12-18 | 广东电网有限责任公司 | A kind of authority setting method and device |
CN109033797B (en) * | 2018-09-13 | 2020-09-08 | 广东电网有限责任公司 | Permission setting method and device |
CN109493112A (en) * | 2018-09-28 | 2019-03-19 | 深圳壹账通智能科技有限公司 | Member management control method, device, computer equipment and storage medium |
CN109492611A (en) * | 2018-11-27 | 2019-03-19 | 电卫士智能电器(北京)有限公司 | Electrical Safety method for early warning and device |
CN109871819A (en) * | 2019-02-28 | 2019-06-11 | 百度在线网络技术(北京)有限公司 | Method and apparatus for sending information |
CN110084200A (en) * | 2019-04-29 | 2019-08-02 | 重庆指讯科技股份有限公司 | A kind of retail method based on recognition of face, system and terminal device |
CN110992163A (en) * | 2019-11-08 | 2020-04-10 | 苏宁金融科技(南京)有限公司 | Electronic signature method, device, computer equipment and storage medium |
CN111581623A (en) * | 2020-05-09 | 2020-08-25 | 深圳物控智联科技有限公司 | Intelligent data interaction method and device, electronic equipment and storage medium |
CN111581623B (en) * | 2020-05-09 | 2023-12-19 | 深圳物控智联科技有限公司 | Intelligent data interaction method and device, electronic equipment and storage medium |
CN112233674A (en) * | 2020-10-15 | 2021-01-15 | 上海博泰悦臻网络技术服务有限公司 | Multimode interaction method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108491709A (en) | The method and apparatus of permission for identification | |
CN108898186A (en) | Method and apparatus for extracting image | |
CN108446387A (en) | Method and apparatus for updating face registration library | |
CN107483416A (en) | The method and device of authentication | |
CN109711133A (en) | Authentication method, device and the server of identity information | |
CN107808118A (en) | Personal identification method, electronic installation and computer-readable recording medium | |
CN108369652A (en) | The method and apparatus that erroneous judgement in being applied for face recognition minimizes | |
CN108898185A (en) | Method and apparatus for generating image recognition model | |
CN106303599B (en) | Information processing method, system and server | |
CN108595628A (en) | Method and apparatus for pushed information | |
CN106204948A (en) | Locker management method and locker managing device | |
CN108416323A (en) | The method and apparatus of face for identification | |
CN108171211A (en) | Biopsy method and device | |
CN113591603B (en) | Certificate verification method and device, electronic equipment and storage medium | |
CN109034069A (en) | Method and apparatus for generating information | |
CN113515988A (en) | Palm print recognition method, feature extraction model training method, device and medium | |
CN108257178A (en) | For positioning the method and apparatus of the position of target body | |
CN108460365A (en) | Identity identifying method and device | |
CN109977839A (en) | Information processing method and device | |
CN110414208A (en) | Login validation method, calculates equipment and medium at device | |
CN108363999A (en) | Operation based on recognition of face executes method and apparatus | |
CN108549848A (en) | Method and apparatus for output information | |
CN108960110A (en) | Method and apparatus for generating information | |
CN108460366A (en) | Identity identifying method and device | |
CN109509269A (en) | A kind of electronic signing method, computer readable storage medium and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180904 |
|
RJ01 | Rejection of invention patent application after publication |