CN108491709A - The method and apparatus of permission for identification - Google Patents

The method and apparatus of permission for identification Download PDF

Info

Publication number
CN108491709A
CN108491709A CN201810236679.2A CN201810236679A CN108491709A CN 108491709 A CN108491709 A CN 108491709A CN 201810236679 A CN201810236679 A CN 201810236679A CN 108491709 A CN108491709 A CN 108491709A
Authority
CN
China
Prior art keywords
user
identified
permission
application
mentioned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810236679.2A
Other languages
Chinese (zh)
Inventor
孙颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201810236679.2A priority Critical patent/CN108491709A/en
Publication of CN108491709A publication Critical patent/CN108491709A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The method and apparatus that the embodiment of the present application discloses permission for identification.One specific implementation mode of this method includes:Obtain facial image to be identified;Facial image to be identified is identified, determines the identity information of the target user corresponding to facial image to be identified;According to the identity information of target user, the authority information of target user is determined using preset authority recognition model, wherein authority recognition model is used to characterize the correspondence between the authority information of permission possessed by the identity information and pre-set user of pre-set user.The embodiment realizes the protection of user information.

Description

The method and apparatus of permission for identification
Technical field
The invention relates to field of computer technology, and in particular to the method and apparatus of permission for identification.
Background technology
With the development of Internet technology, face recognition technology has been applied to more and more fields.For example, can pass through Recognition of face unlocks terminal device etc..When the electronic equipment for borrowing household or friend carries out some shirtsleeve operations (for example, Weather lookup, music etc.), it usually needs it, could be to electronic equipment after the holder of electronic equipment unlocks electronic equipment It is used.
Invention content
The method and apparatus that the embodiment of the present application proposes permission for identification.
In a first aspect, the embodiment of the present application provides a kind of method of permission for identification, including:Obtain face to be identified Image;Facial image to be identified is identified, determines the identity information of the target user corresponding to facial image to be identified;Root According to the identity information of target user, the authority information of target user is determined using preset authority recognition model, wherein permission is known Other model is used to characterize the corresponding pass between the identity information of pre-set user and the authority information of permission possessed by pre-set user System.
In some embodiments, this method further includes:Obtain the note corresponding to registered face image and registered face image The identity information of volume user;Obtain the authority information of permission possessed by registration user;According to registration user identity information with The correspondence registered between the authority information of permission possessed by user builds authority recognition model.
In some embodiments, identity information includes the identity information using face characteristic set characterization.
In some embodiments, this method further includes:Registered face image is obtained, the face in registered face image is extracted Feature;Obtain the authority information of permission possessed by the registration user corresponding to registered face image;According to face characteristic and note Correspondence between the authority information of permission possessed by volume user builds authority recognition model.
In some embodiments, the identity information of the target user corresponding to facial image to be identified is determined, including:Judge Whether the target user corresponding to facial image to be identified is registered users;It is registered in response to judging target user not Facial image to be identified is sent on destination service end by user.
In some embodiments, authority information includes the application identities set of the operable application of user;And this method Further include:In response to detecting that target user executes operation for intended application, determine whether the application identities of intended application deposit It is in the application identities set of the operable application of target user;In response to determining that the application identities of intended application are present in In the application identities set of the operable application of target user, determine that target user has the acquisition to the data in intended application Permission.
Second aspect, the embodiment of the present application provide a kind of device of permission for identification, including:First acquisition unit, For obtaining facial image to be identified;Recognition unit determines face figure to be identified for facial image to be identified to be identified As the identity information of corresponding target user;Determination unit, for the identity information according to target user, using preset power Limit identification model determines the authority information of target user, wherein authority recognition model is used to characterize the identity information of pre-set user Correspondence between the authority information of permission possessed by pre-set user.
In some embodiments, which further includes:First construction unit, the first construction unit are used for:Obtain registrant The identity information of registration user corresponding to face image and registered face image;Obtain the permission of permission possessed by registration user Information;It is built according to the correspondence between the authority information of permission possessed by the identity information of registration user and registration user Authority recognition model.
In some embodiments, identity information includes the identity information using face characteristic set characterization.
In some embodiments, which further includes:Second construction unit, the second construction unit are used for:Obtain registrant Face image extracts the face characteristic in registered face image;It obtains possessed by the registration user corresponding to registered face image The authority information of permission;It is built according to the correspondence between the authority information of permission possessed by face characteristic and registration user Authority recognition model.
In some embodiments, recognition unit is further used for determining as follows corresponding to facial image to be identified Target user identity information:Judge whether the target user corresponding to facial image to be identified is registered users;Response It is registered users in judging target user not, facial image to be identified is sent on destination service end.
In some embodiments, authority information includes the application identities set of the operable application of user;And the device Further include processing unit, processing unit is used for:In response to detecting that target user executes operation for intended application, target is determined The application identities of application whether there is in the application identities set of the operable application of target user;In response to determining target The application identities of application are present in the application identities set of the operable application of target user, determine that target user has to mesh The acquisition permission of data in mark application.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, including:One or more processors;Storage dress It sets, for storing one or more programs, when one or more programs are executed by one or more processors so that one or more A processor realizes the method such as any embodiment in the method for permission for identification.
Fourth aspect, the embodiment of the present application provide a kind of computer-readable medium, are stored thereon with computer program, should The method such as any embodiment in the method for permission for identification is realized when program is executed by processor.
The method and apparatus of permission for identification provided by the embodiments of the present application pass through the face figure to be identified to getting As being identified, determines the identity information of the target user corresponding to facial image to be identified, then used according to above-mentioned target The identity information at family determines the authority information of above-mentioned target user using preset authority recognition model, wherein authority recognition mould Type is used to characterize the correspondence between the authority information of permission possessed by the identity information and pre-set user of pre-set user, from And realize the protection of user information.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is that this application can be applied to exemplary system architecture figures therein;
Fig. 2 is the flow chart according to one embodiment of the method for the permission for identification of the application;
Fig. 3 is the schematic diagram according to an application scenarios of the method for the permission for identification of the application;
Fig. 4 is the flow chart according to another embodiment of the method for the permission for identification of the application;
Fig. 5 is the structural schematic diagram according to one embodiment of the device of the permission for identification of the application;
Fig. 6 is adapted for the structural schematic diagram of the computer system of the electronic equipment for realizing the embodiment of the present application.
Specific implementation mode
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, is illustrated only in attached drawing and invent relevant part with related.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the method that can apply the permission for identification of the application or for identification device of permission Embodiment exemplary system architecture 100.
As shown in Figure 1, system architecture 100 may include user terminal 1011,1012, network 1021,1022,1023 is known Other server 103 and destination server 104.Wherein, network 1021 is in user terminal 1011,1012 and destination server The medium of communication link is provided between 104;Network 1022 is between user terminal 1011,1012 and identification server 103 The medium of communication link is provided;Network 1023 to identification server 103 and destination server 104 between communication link is provided Medium.Network 1021,1022,1023 may include various connection types, such as wired, wireless communication link or optical fiber electricity Cable etc..
User can use user terminal 1011,1012 by network 1022 with identification server 103 interact, with transmission or Receive message etc.;User can also be interacted by network 1021 with destination server 104 using user terminal 1011,1012, with Send or receive message etc..
User terminal 1011,1012 can be hardware, can also be software.When user terminal 1011,1012 is hardware, Can be the various electronic equipments that there is camera and support information exchange, including but not limited to smart mobile phone, tablet computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image Expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic shadow As expert's compression standard audio level 4) player, pocket computer on knee and desktop computer etc..Work as user terminal 1011,1012 when being software, may be mounted in above-mentioned cited electronic equipment.Multiple softwares or software may be implemented into it Module can also be implemented as single software or software module.It is not specifically limited herein.
Identification server 103 can be to provide the server of identification service, such as on user terminal 1011,1012 The facial image identification server that the facial image to be identified passed is identified.Facial image identifies that server can be to receiving Facial image to be identified carry out feature extraction, the processing such as characteristic matching, and by handling result (such as facial image to be identified institute The authority information of the user of instruction) feed back to user terminal.
Destination server 104 can be to provide the server of various services, for example, receive user terminal 1011,1012 or Identify the server for user's facial image that server 103 uploads.
It should be noted that the method for the permission for identification that the embodiment of the present application is provided can be by identification server 103 execute, and correspondingly, the device of permission can be set in identification server 103 for identification.
It should also be noted that, user terminal 1011,1012 can also be in local to indicated by facial image to be identified The authority information of user is identified, at this point, the method for permission can be executed by user terminal 1011,1012 for identification, phase Ying Di, for identification the device of permission can be set in user terminal 1011,1012.At this point, exemplary system architecture 100 can Identification server 103 and network 1022 is not present.
It should be pointed out that the local of identification server 103 can also directly store facial image to be identified, identification service Device 103 can directly acquire local facial image to be identified and carry out authority recognition, at this point, exemplary system architecture 100 can be with There is no user terminal 1011,1012 and networks 1022.
It should be noted that identification server, client can be hardware, can also be software.As identification server, visitor When family end is hardware, the distributed apparatus cluster of multiple equipment composition may be implemented into, individual equipment can also be implemented as.Work as knowledge When other server, client are software, multiple softwares or software module may be implemented into (such as providing Distributed Services Multiple software modules), single software or software module can also be implemented as.It is not specifically limited herein.
It should be understood that the number of the user terminal, network, identification server and destination server in Fig. 1 is only to illustrate Property.According to needs are realized, can have any number of user terminal, network, identification server and destination server.
With continued reference to Fig. 2, the flow of one embodiment of the method for the permission for identification according to the application is shown 200.The method of the permission for identification, includes the following steps:
Step 201, facial image to be identified is obtained.
In the present embodiment, executive agent (such as user terminal shown in FIG. 1 or clothes of the method for permission for identification Business device) facial image to be identified can be obtained.Above-mentioned facial image to be identified is typically the image for including face, for example, comprising The image of front face or side face.If above-mentioned executive agent is user terminal, user is unlocked using face needing user Terminal utilizes in the application scenarios such as face login user account, and above-mentioned executive agent can usually acquire at least one and wait knowing Others' face image;If above-mentioned executive agent is server, after user terminal collects an at least facial image to be identified, Above-mentioned executive agent can obtain facial image to be identified from user terminal.
Step 202, facial image to be identified is identified, determines the target user's corresponding to facial image to be identified Identity information.
In the present embodiment, above-mentioned executive agent can be to the facial image to be identified that is got in step 201 into pedestrian Face identifies, determines the identity information of the target user corresponding to above-mentioned facial image to be identified.Above-mentioned executive agent may be used Facial image to be identified is identified based on the human face detection tech of template matches, recognition methods may include steps of: Chartered facial image template or facial image feature templates are extracted from database first, later according to preset template Matching strategy matches facial image to be identified with chartered facial image template, or to facial image to be identified Feature matched with chartered facial image feature templates, determine the highest facial image template of matching degree or face The corresponding identity information of characteristics of image template is the identity information of target user.Optionally, face recognition result can also include Facial size and face location information etc..Above-mentioned executive agent can be in the identity of the face recognition result and user that pre-establish The identity information of the target user corresponding to the face recognition result identified is searched in the mapping table of information.Identity information The relation information between the holder of address name, user and user terminal be can include but is not limited to (for example, holder's sheet People, the parent of holder, stranger etc.) and Customs Assigned Number etc..
Step 203, according to the identity information of target user, the power of target user is determined using preset authority recognition model Limit information.
In the present embodiment, above-mentioned executive agent can be known according to the identity information of target user using preset permission Other model determines the authority information of target user.Authority information can include but is not limited to user for the operable of user terminal Period and operable time length.The identity information that above-mentioned authority recognition model can be used for characterizing pre-set user is used with default Correspondence between the authority information of permission possessed by family.As an example, above-mentioned authority recognition model can be used for table The mapping table between the authority information of permission possessed by the identity information and pre-set user of pre-set user is levied, for example, on It can be for characterizing the user identifier of pre-set user with pre-set user for the operable of user terminal to state authority recognition model Mapping table between period can also be relation information between pre-set user and the holder of user terminal with it is default User is for the mapping table between the operable time length of user terminal.Above-mentioned executive agent can pass through above-mentioned correspondence Relation table finds authority information corresponding with the identity information of target user.
As an example, if the identity information of target user is " daughter ", can be determined using above-mentioned authority recognition model The authority information of permission possessed by " daughter " is:To the operable time length of a hour of user terminal.
The method that above-described embodiment of the application provides is by identifying that facial image to be identified determines corresponding user The authority information of possessed permission realizes the protection of user information while promoting user and obtaining the convenience of information.
In some optional realization methods of the present embodiment, if above-mentioned executive agent is user terminal, user makes During carrying out face registration with above-mentioned executive agent, above-mentioned executive agent can obtain the active user's (registration taken User) registered face image and obtain the identity letter of the registration user corresponding to above-mentioned registered face image input by user Breath, for example, name is " Zhang San ", relationship is " younger brother ".Later, permission possessed by above-mentioned registration user input by user is obtained Authority information, for example, user can fill in or select in permission equipment interface above-mentioned registration user be directed to above-mentioned execution The operable time length of main body, operable time section etc..Finally, above-mentioned executive agent can be according to above-mentioned registration user's Correspondence between the authority information of permission possessed by identity information and above-mentioned registration user builds above-mentioned authority recognition mould Type.Above-mentioned executive agent can establish the permission of the identity information and permission possessed by above-mentioned registration user of above-mentioned registration user The mapping table of foundation is determined as authority recognition model by the mapping table between information.If above-mentioned executive agent is clothes When business device, user can utilize user terminal to above-mentioned executive agent during carrying out face registration using user terminal Send registration request.Later, user terminal can shoot the registered face image of active user (registration user), and it is defeated to receive user The authority information of permission possessed by the identity information of the above-mentioned registration user entered and above-mentioned registration user.Then, above-mentioned execution Main body can obtain the registered face image that above-mentioned user terminal takes, and obtain the registration corresponding to above-mentioned registered face image The authority information of permission possessed by the identity information of user and above-mentioned registration user.Finally, above-mentioned executive agent can root According to the correspondence structure between the authority information of permission possessed by the identity information of above-mentioned registration user and above-mentioned registration user Build above-mentioned authority recognition model.Above-mentioned executive agent can establish the identity information of above-mentioned registration user and above-mentioned registration user institute The mapping table of foundation is determined as authority recognition model by the mapping table between the authority information for the permission having.
In some optional realization methods of the present embodiment, above-mentioned identity information may include using face characteristic set The identity information of characterization.Face characteristic usually may include Euclidean distance, the curvature between the characteristic point (key point) on face With angle etc..Face is made of positions such as eyebrow, eyes, nose, mouth, chins, can by the size at these positions, shape and The geometric description of structural relation is determined as face characteristic between them.Face characteristic can also include face color characteristic, texture Feature, contour feature etc..
In some optional realization methods of the present embodiment, above-mentioned executive agent can obtain registered face figure first Picture can extract the face characteristic in above-mentioned registered face image later.Above-mentioned executive agent can utilize ASM (Active Shape Model) the above-mentioned registration of the extraction such as algorithm, convolutional neural networks (CNN, Convolutional Neural Network) Face characteristic in facial image.ASM algorithms are a kind of based on points distribution models (PDM, Point Distribution Model algorithm).In PDM, the geometry of shape similar object, such as face, human hand, heart, lung etc. can lead to The coordinate for crossing several key feature points (landmarks) is sequentially connected in series to form a shape vector to indicate.ASM algorithms need logical It crosses the method manually demarcated and first demarcates training set, obtain shape by training, then specific by the matching realization of key point The matching of object.The characteristics of image of facial image to be identified can be input to training in advance for identification by above-mentioned executive agent In the convolutional neural networks of face characteristic, face characteristic set is obtained.Later, it can obtain corresponding to above-mentioned registered face image Registration user possessed by permission authority information, for example, for the operable time length, operable of above-mentioned executive agent Period etc..Finally, above-mentioned executive agent can be according to permission possessed by above-mentioned face characteristic and above-mentioned registration user Correspondence between authority information builds above-mentioned authority recognition model.Above-mentioned executive agent can establish above-mentioned face characteristic with Mapping table between the authority information of permission possessed by above-mentioned registration user, the mapping table of foundation is determined as weighing Limit identification model.
In some optional realization methods of the present embodiment, above-mentioned executive agent is in the face figure to be identified to getting As after being identified, the identity information of the corresponding target user of facial image to be identified can be determined as follows:Sentence Whether the target user broken corresponding to above-mentioned facial image to be identified is registered users.Herein, above-mentioned executive agent can be with Determine to facial image to be identified be identified obtained face recognition result whether there is in the associated people of user terminal In face recognition result set.If above-mentioned face recognition result be present in in the associated face recognition result set of user terminal, Then illustrate that the target user corresponding to above-mentioned facial image to be identified is registered users.If above-mentioned face recognition result is not present In with the associated face recognition result set of user terminal, then illustrate the target user corresponding to above-mentioned facial image to be identified It is not registered users, for example, stranger, at this point, above-mentioned facial image to be identified can be sent to mesh by above-mentioned executive agent It marks in server-side.The current location information of user terminal can also be sent on above-mentioned destination service end by above-mentioned executive agent. Above-mentioned destination service end can be the clothes for the information (photo, music, document etc.) in user terminal to be backed up, managed Business end.After user logs in the account corresponding to above-mentioned destination service end on miscellaneous equipment, it can view and utilize user's end End carries out the photo of the stranger of face unlock.The photo upload of this stranger that face unlock will be carried out using user terminal Method to destination service end can contribute to be promoted information to user, property security protection performance.
It is a signal according to the application scenarios of the method for the permission for identification of the present embodiment with continued reference to Fig. 3, Fig. 3 Figure.In the application scenarios of Fig. 3, the executive agent (such as mobile phone) of permission can first turn on camera for identification, to working as The face of preceding user is taken pictures, to get facial image to be identified (as shown in label 301).Then, this can be waited knowing Others is identified face image, determines the identity information of the target user corresponding to facial image to be identified (such as 302 institute of label Show) it is " elder brother ".It should be noted that the image indicated by label 301 is only to illustrate.Finally, preset permission may be used Identification model determines that the authority information (as shown in label 303) corresponding to identity information " elder brother " is that operating time length three is small When.
With further reference to Fig. 4, it illustrates the flows 400 of another embodiment of the method for permission for identification.The use In the flow 400 of the method for identification permission, include the following steps:
Step 401, facial image to be identified is obtained.
Step 402, facial image to be identified is identified, determines the target user's corresponding to facial image to be identified Identity information.
Step 403, according to the identity information of target user, the power of target user is determined using preset authority recognition model Limit information.
In the present embodiment, step 401, step 402, step 403 operation respectively with step 201 in previous embodiment, Step 202, the operation of step 203 are essentially identical, and details are not described herein.
Step 404, in response to detecting that target user executes operation for intended application, the application mark of intended application is determined Know with the presence or absence of in the application identities set of the operable application of target user.
In the present embodiment, above-mentioned authority information may include the application identities set of the operable application of user.Using Mark may include Apply Names, application numbers etc..If above-mentioned executive agent detects that above-mentioned target user is directed to intended application Operation is executed, above-mentioned executive agent can determine that the application identities of above-mentioned intended application whether there is and can be grasped in above-mentioned target user In the application identities set of the application of work.Intended application can be the targeted application of the operation of current time user.User institute The operation of execution may include accessing the operation using data, deleting application operating and the moving operation etc. to application icon.
Step 405, in response to determining that the application identities of intended application are present in answering for the operable application of target user With in logo collection, determining that target user has to the acquisition permissions of the data in intended application.
In the present embodiment, if the application identities of above-mentioned intended application are present in the operable application of above-mentioned target user In application identities set, it may be said that bright above-mentioned target user has the permission for executing operation to above-mentioned intended application, then above-mentioned to hold Row main body can determine that target user has the acquisition permission to the data in above-mentioned intended application.If above-mentioned target user is directed to Above-mentioned intended application performs the operation accessed using data, then the page of above-mentioned intended application can be presented in above-mentioned executive agent Information;If above-mentioned target user performs moving operation for the icon of above-mentioned intended application, above-mentioned executive agent can incite somebody to action The icon of above-mentioned intended application is moved on the position indicated by user.
Optionally, if the application identities of above-mentioned intended application are not present in the application of the operable application of above-mentioned target user In logo collection, it can be said that bright above-mentioned target user does not have the permission for executing operation to above-mentioned intended application, above-mentioned execution Main body can determine that target user does not have the acquisition permission to the data in intended application, be used so as to generate to be used to characterize Family does not have the prompt message for the permission that operation is executed to intended application, for example, " you do not have to the access rights of photo " or Person's " accessing failure " etc..
Figure 4, it is seen that compared with the corresponding embodiments of Fig. 2, the method for the permission for identification in the present embodiment Flow 400 increase in response to detecting that target user executes operation for intended application, determine the application mark of intended application Know with the presence or absence of in the application identities set of the operable application of target user step 404 and in response to determining that target is answered Application identities are present in the application identities set of the operable application of target user, determine that target user has to target The step 405 of the acquisition permission of data in.The scheme of the present embodiment description can not need equipment holder as a result, In the case of being unlocked to equipment, target user corresponding to facial image to be identified is allowed operable to apply into enforcement its With to improve the flexibility that equipment uses.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, this application provides one kind to weigh for identification One embodiment of the device of limit, the device embodiment is corresponding with embodiment of the method shown in Fig. 2, which can specifically answer For in various electronic equipments.
As shown in figure 5, the device 500 of the permission for identification of the present embodiment includes:First acquisition unit 501, identification are single Member 502 and determination unit 503.Wherein, first acquisition unit 501 is for obtaining facial image to be identified;Recognition unit 502 is used for Facial image to be identified is identified, determines the identity information of the target user corresponding to facial image to be identified;It determines single Member 503 determines the authority information of target user using preset authority recognition model for the identity information according to target user, Wherein, authority recognition model be used for characterize permission possessed by the identity information and pre-set user of pre-set user authority information it Between correspondence.
In some optional realization methods of the present embodiment, the device 500 of above-mentioned permission for identification can also include First construction unit (not shown).If the device 500 of above-mentioned permission for identification is user terminal, user is into pedestrian During face is registered, above-mentioned first construction unit can obtain the registered face figure of the active user (registration user) taken Picture and the identity information for obtaining the registration user corresponding to above-mentioned registered face image input by user, for example, name is " to open Three ", relationship is " younger brother ".Later, above-mentioned first construction unit can obtain possessed by above-mentioned registration user input by user The authority information of permission, for example, user can fill in or select in permission equipment interface, above-mentioned registration user's is operable Time span, operable time section etc..Finally, above-mentioned first construction unit can be according to the identity information of above-mentioned registration user Correspondence between the authority information of permission possessed by above-mentioned registration user builds above-mentioned authority recognition model.Above-mentioned One construction unit can establish the authority information of the identity information and permission possessed by above-mentioned registration user of above-mentioned registration user Between mapping table, the mapping table of foundation is determined as authority recognition model.If the dress of above-mentioned permission for identification Set 500 for server when, user can utilize user terminal to above-mentioned during carrying out face registration using user terminal The device 500 of permission sends registration request for identification.Later, user terminal can shoot the note of active user (registration user) The power of permission possessed by volume facial image, the identity information of reception above-mentioned registration user input by user and above-mentioned registration user Limit information.Then, above-mentioned first construction unit can obtain the registered face image that above-mentioned user terminal takes, and obtain above-mentioned The identity information of registration user corresponding to registered face image, and the registration obtained corresponding to above-mentioned registered face image are used The authority information of permission possessed by family.Finally, above-mentioned first construction unit can be according to the identity information of above-mentioned registration user Correspondence between the authority information of permission possessed by above-mentioned registration user builds above-mentioned authority recognition model.Above-mentioned One construction unit can establish the authority information of the identity information and permission possessed by above-mentioned registration user of above-mentioned registration user Between mapping table, the mapping table of foundation is determined as authority recognition model.
In some optional realization methods of the present embodiment, above-mentioned identity information may include using face characteristic set The identity information of characterization.Face characteristic usually may include Euclidean distance, the curvature between the characteristic point (key point) on face With angle etc..Face is made of positions such as eyebrow, eyes, nose, mouth, chins, can by the size at these positions, shape and The geometric description of structural relation is determined as face characteristic between them.Face characteristic can also include face color characteristic, texture Feature, contour feature etc..
In some optional realization methods of the present embodiment, the device 500 of above-mentioned permission for identification can also include Second construction unit (not shown).Above-mentioned second construction unit can obtain registered face image first, can carry later Take the face characteristic in above-mentioned registered face image.Above-mentioned second construction unit can utilize ASM algorithms, convolutional neural networks etc. Extract the face characteristic in above-mentioned registered face image.ASM algorithms are a kind of algorithms based on points distribution models.In PDM, outside The geometry of shape similar object, such as face, human hand, heart, lung etc. can pass through the coordinate of several key feature points It is sequentially connected in series to form a shape vector to indicate.ASM algorithms need the method by manually demarcating first to demarcate training set, pass through Training obtains shape, then the matching of certain objects is realized by the matching of key point.Above-mentioned second construction unit can incite somebody to action The characteristics of image of facial image to be identified is input in the convolutional neural networks of the face characteristic for identification of training in advance, is obtained Face characteristic set.Later, above-mentioned second construction unit can obtain the registration user institute corresponding to above-mentioned registered face image The authority information for the permission having, for example, being directed to the operable time length of above-mentioned executive agent, operable time section etc.. Finally, above-mentioned second construction unit can be according to the authority information of permission possessed by above-mentioned face characteristic and above-mentioned registration user Between correspondence build above-mentioned authority recognition model.Above-mentioned second construction unit can establish above-mentioned face characteristic with it is above-mentioned The mapping table between the authority information of permission possessed by user is registered, the mapping table of foundation, which is determined as permission, to be known Other model.
In some optional realization methods of the present embodiment, above-mentioned recognition unit, which can be determined as follows, to be waited knowing The identity information of the corresponding target user of others' face image:Judge whether is target user corresponding to above-mentioned facial image to be identified For registered users.Herein, above-mentioned recognition unit can be determined is identified obtained face to facial image to be identified Recognition result whether there is in in the associated face recognition result set of user terminal.If above-mentioned face recognition result is present in With in the associated face recognition result set of user terminal, then illustrate that the target user corresponding to above-mentioned facial image to be identified is Registered users.If above-mentioned face recognition result is not present in, with the associated face recognition result set of user terminal, saying Target user corresponding to bright above-mentioned facial image to be identified is not registered users, for example, stranger, at this point, above-mentioned identification Above-mentioned facial image to be identified can be sent on destination service end by unit.Above-mentioned executive agent can also be by user terminal Current location information is sent on above-mentioned destination service end.Above-mentioned destination service end can be for the information in user terminal The server-side that (photo, music, document etc.) is backed up, managed.When user logs in above-mentioned destination service end on miscellaneous equipment After corresponding account, the photo for the stranger that face unlock is carried out using user terminal can be viewed.This will utilize is used The method that family terminal carries out photo upload to the destination service end of the stranger of face unlock can contribute to be promoted to user's The security protection performance of information, property.
In some optional realization methods of the present embodiment, above-mentioned authority information includes answering for the operable application of user Use logo collection.Application identities may include Apply Names, application numbers etc..The device 500 of above-mentioned permission for identification may be used also To include processing unit unit (not shown).If detecting, above-mentioned target user executes operation for intended application, above-mentioned Processing unit can determine that the application identities of above-mentioned intended application whether there is answering in the operable application of above-mentioned target user With in logo collection.Intended application can be the targeted application of the operation of current time user.Operation performed by user can With including accessing the operation using data, deleting application operating and to the moving operation etc. of application icon.If above-mentioned target is answered Application identities are present in the application identities set of the operable application of above-mentioned target user, it may be said that bright above-mentioned target is used Family has the permission that operation is executed to above-mentioned intended application, then above-mentioned processing unit can determine that target user has to above-mentioned mesh The acquisition permission of data in mark application.If above-mentioned target user performs the behaviour accessed using data for above-mentioned intended application Make, then the page info of above-mentioned intended application can be presented;If above-mentioned target user executes for the icon of above-mentioned intended application The icon of above-mentioned intended application, then can be moved on the position indicated by user by moving operation.
Optionally, if the application identities of above-mentioned intended application are not present in answering for the operable application of above-mentioned target user With in logo collection, it can be said that bright above-mentioned target user does not have the permission that operation is executed to above-mentioned intended application, it can be true The user that sets the goal does not have to the acquisition permissions of the data in intended application, does not have pair for characterizing user so as to generate Intended application executes the prompt message of the permission of operation, for example, " you do not have the access rights to photo " or " access mistake Lose " etc..
All units described in device 500 are corresponding with reference to each step in figure 2 and the method for Fig. 4 descriptions.As a result, Operation and feature above with respect to method description are equally applicable to device 500 and unit wherein included, and details are not described herein.
The device for the permission for identification that the above embodiments of the present application provide, passes through the facial image to be identified to getting It is identified, determines the identity information of the target user corresponding to facial image to be identified, then according to above-mentioned target user Identity information, the authority information of above-mentioned target user is determined using preset authority recognition model, wherein authority recognition model Correspondence between the authority information of permission possessed by identity information and pre-set user for characterizing pre-set user, to Realize the protection of user information.
Below with reference to Fig. 6, it illustrates the computer systems 600 suitable for the electronic equipment for realizing the embodiment of the present invention Structural schematic diagram.Electronic equipment shown in Fig. 6 is only an example, to the function of the embodiment of the present application and should not use model Shroud carrys out any restrictions.
As shown in fig. 6, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and Execute various actions appropriate and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data. CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always Line 604.
It is connected to I/O interfaces 605 with lower component:Importation 606 including keyboard, mouse etc.;Including such as liquid crystal Show the output par, c 607 of device (LCD) and loud speaker etc.;Storage section 608 including hard disk etc.;And including such as LAN card, The communications portion 609 of the network interface card of modem etc..Communications portion 609 executes communication via the network of such as internet Processing.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as disk, CD, magneto-optic disk, Semiconductor memory etc., as needed be mounted on driver 610 on, in order to from the computer program read thereon according to need It is mounted into storage section 608.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed by communications portion 609 from network, and/or from detachable media 611 are mounted.When the computer program is executed by central processing unit (CPU) 601, limited in execution the present processes Above-mentioned function.It should be noted that the above-mentioned computer-readable medium of the application can be computer-readable signal media or Computer readable storage medium either the two arbitrarily combines.Computer readable storage medium for example can be --- but Be not limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or arbitrary above combination. The more specific example of computer readable storage medium can include but is not limited to:Electrical connection with one or more conducting wires, Portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only deposit Reservoir (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory Part or above-mentioned any appropriate combination.In this application, computer readable storage medium can any be included or store The tangible medium of program, the program can be commanded the either device use or in connection of execution system, device.And In the application, computer-readable signal media may include the data letter propagated in a base band or as a carrier wave part Number, wherein carrying computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but not It is limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer Any computer-readable medium other than readable storage medium storing program for executing, the computer-readable medium can send, propagate or transmit use In by instruction execution system, device either device use or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to:Wirelessly, electric wire, optical cable, RF etc., Huo Zheshang Any appropriate combination stated.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, program segment, or code of table, the module, program segment, or code includes one or more uses The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it to note Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in the embodiment of the present invention can be realized by way of software, can also be by hard The mode of part is realized.Described unit can also be arranged in the processor, for example, can be described as:A kind of processor packet Include first acquisition unit, recognition unit and determination unit.Wherein, the title of these units is not constituted to this under certain conditions The restriction of unit itself.For example, first acquisition unit is also described as " obtaining the unit of facial image to be identified ".
As on the other hand, present invention also provides a kind of computer-readable medium, which can be Included in device described in above-described embodiment;Can also be individualism, and without be incorporated the device in.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the device so that should Device:Obtain facial image to be identified;Facial image to be identified is identified, determines the mesh corresponding to facial image to be identified Mark the identity information of user;According to the identity information of target user, determine target user's using preset authority recognition model Authority information, wherein authority recognition model is for characterizing permission possessed by the identity information and pre-set user of pre-set user Correspondence between authority information.
Above description is only presently preferred embodiments of the present invention and the explanation to institute's application technology principle.People in the art Member should be appreciated that invention scope involved in the present invention, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Other technical solutions of arbitrary combination and formation.Such as features described above has similar work(with (but not limited to) disclosed in the present invention Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (14)

1. a kind of method of permission for identification, including:
Obtain facial image to be identified;
The facial image to be identified is identified, determines the identity of the target user corresponding to the facial image to be identified Information;
According to the identity information of the target user, determine that the permission of the target user is believed using preset authority recognition model Breath, wherein the authority recognition model is used to characterize the power of permission possessed by the identity information and pre-set user of pre-set user Correspondence between limit information.
2. according to the method described in claim 1, wherein, the method further includes:
Obtain the identity information of the registration user corresponding to registered face image and the registered face image;
Obtain the authority information of permission possessed by the registration user;
According to corresponding between the identity information of the registration user and the authority information of permission possessed by the registration user Relationship builds the authority recognition model.
3. according to the method described in claim 1, wherein, the identity information includes the identity using face characteristic set characterization Information.
4. according to the method described in claim 3, wherein, the method further includes:
Registered face image is obtained, the face characteristic in the registered face image is extracted;
Obtain the authority information of permission possessed by the registration user corresponding to the registered face image;
Institute is built according to the correspondence between the authority information of permission possessed by the face characteristic and the registration user State authority recognition model.
5. according to the method described in one of claim 1-4, wherein the mesh corresponding to the determination facial image to be identified The identity information of user is marked, including:
Judge whether the target user corresponding to the facial image to be identified is registered users;
It is registered users in response to judging the target user not, the facial image to be identified is sent to destination service On end.
6. according to the method described in one of claim 1-4, wherein authority information includes the application mark of the operable application of user Know set;And
The method further includes:
In response to detecting that the target user executes operation for intended application, determine that the application identities of the intended application are It is no to be present in the application identities set of the operable application of the target user;
In response to determining that the application identities of the intended application are present in the application mark of the operable application of the target user Know in set, determines that the target user has the acquisition permission to the data in the intended application.
7. a kind of device of permission for identification, including:
First acquisition unit, for obtaining facial image to be identified;
Recognition unit is determined for the facial image to be identified to be identified corresponding to the facial image to be identified The identity information of target user;
Determination unit determines the mesh for the identity information according to the target user using preset authority recognition model Mark the authority information of user, wherein the authority recognition model is used to characterize identity information and the pre-set user institute of pre-set user Correspondence between the authority information for the permission having.
8. device according to claim 7, wherein described device further includes:First construction unit, first structure are single Member is used for:
Obtain the identity information of the registration user corresponding to registered face image and the registered face image;
Obtain the authority information of permission possessed by the registration user;
According to corresponding between the identity information of the registration user and the authority information of permission possessed by the registration user Relationship builds the authority recognition model.
9. device according to claim 7, wherein the identity information includes the identity using face characteristic set characterization Information.
10. device according to claim 9, wherein described device further includes:Second construction unit, second structure Unit is used for:
Registered face image is obtained, the face characteristic in the registered face image is extracted;
Obtain the authority information of permission possessed by the registration user corresponding to the registered face image;
Institute is built according to the correspondence between the authority information of permission possessed by the face characteristic and the registration user State authority recognition model.
11. according to the device described in one of claim 7-10, wherein the recognition unit is further used for as follows Determine the identity information of the target user corresponding to the facial image to be identified:
Judge whether the target user corresponding to the facial image to be identified is registered users;
It is registered users in response to judging the target user not, the facial image to be identified is sent to destination service On end.
12. according to the device described in one of claim 7-10, wherein authority information includes the application of the operable application of user Logo collection;And
Described device further includes processing unit, and the processing unit is used for:
In response to detecting that the target user executes operation for intended application, determine that the application identities of the intended application are It is no to be present in the application identities set of the operable application of the target user;
In response to determining that the application identities of the intended application are present in the application mark of the operable application of the target user Know in set, determines that the target user has the acquisition permission to the data in the intended application.
13. a kind of electronic equipment, including:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now method as described in any in claim 1-6.
14. a kind of computer-readable medium, is stored thereon with computer program, wherein the program is realized when being executed by processor Method as described in any in claim 1-6.
CN201810236679.2A 2018-03-21 2018-03-21 The method and apparatus of permission for identification Pending CN108491709A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810236679.2A CN108491709A (en) 2018-03-21 2018-03-21 The method and apparatus of permission for identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810236679.2A CN108491709A (en) 2018-03-21 2018-03-21 The method and apparatus of permission for identification

Publications (1)

Publication Number Publication Date
CN108491709A true CN108491709A (en) 2018-09-04

Family

ID=63319187

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810236679.2A Pending CN108491709A (en) 2018-03-21 2018-03-21 The method and apparatus of permission for identification

Country Status (1)

Country Link
CN (1) CN108491709A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109033797A (en) * 2018-09-13 2018-12-18 广东电网有限责任公司 A kind of authority setting method and device
CN109493112A (en) * 2018-09-28 2019-03-19 深圳壹账通智能科技有限公司 Member management control method, device, computer equipment and storage medium
CN109492611A (en) * 2018-11-27 2019-03-19 电卫士智能电器(北京)有限公司 Electrical Safety method for early warning and device
CN109871819A (en) * 2019-02-28 2019-06-11 百度在线网络技术(北京)有限公司 Method and apparatus for sending information
CN110084200A (en) * 2019-04-29 2019-08-02 重庆指讯科技股份有限公司 A kind of retail method based on recognition of face, system and terminal device
CN110992163A (en) * 2019-11-08 2020-04-10 苏宁金融科技(南京)有限公司 Electronic signature method, device, computer equipment and storage medium
CN111581623A (en) * 2020-05-09 2020-08-25 深圳物控智联科技有限公司 Intelligent data interaction method and device, electronic equipment and storage medium
CN112233674A (en) * 2020-10-15 2021-01-15 上海博泰悦臻网络技术服务有限公司 Multimode interaction method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105872685A (en) * 2016-03-24 2016-08-17 深圳市国华识别科技开发有限公司 Intelligent terminal control method and system, and intelligent terminal
CN106487516A (en) * 2016-09-29 2017-03-08 乐视控股(北京)有限公司 A kind of method of the multi-user management of mobile terminal and its device
KR20170082024A (en) * 2016-01-05 2017-07-13 한국전자통신연구원 Apparatus and Method for Recognizing Face
CN107392178A (en) * 2017-08-10 2017-11-24 广州杰之良软件有限公司 Monitoring method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170082024A (en) * 2016-01-05 2017-07-13 한국전자통신연구원 Apparatus and Method for Recognizing Face
CN105872685A (en) * 2016-03-24 2016-08-17 深圳市国华识别科技开发有限公司 Intelligent terminal control method and system, and intelligent terminal
CN106487516A (en) * 2016-09-29 2017-03-08 乐视控股(北京)有限公司 A kind of method of the multi-user management of mobile terminal and its device
CN107392178A (en) * 2017-08-10 2017-11-24 广州杰之良软件有限公司 Monitoring method and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109033797A (en) * 2018-09-13 2018-12-18 广东电网有限责任公司 A kind of authority setting method and device
CN109033797B (en) * 2018-09-13 2020-09-08 广东电网有限责任公司 Permission setting method and device
CN109493112A (en) * 2018-09-28 2019-03-19 深圳壹账通智能科技有限公司 Member management control method, device, computer equipment and storage medium
CN109492611A (en) * 2018-11-27 2019-03-19 电卫士智能电器(北京)有限公司 Electrical Safety method for early warning and device
CN109871819A (en) * 2019-02-28 2019-06-11 百度在线网络技术(北京)有限公司 Method and apparatus for sending information
CN110084200A (en) * 2019-04-29 2019-08-02 重庆指讯科技股份有限公司 A kind of retail method based on recognition of face, system and terminal device
CN110992163A (en) * 2019-11-08 2020-04-10 苏宁金融科技(南京)有限公司 Electronic signature method, device, computer equipment and storage medium
CN111581623A (en) * 2020-05-09 2020-08-25 深圳物控智联科技有限公司 Intelligent data interaction method and device, electronic equipment and storage medium
CN111581623B (en) * 2020-05-09 2023-12-19 深圳物控智联科技有限公司 Intelligent data interaction method and device, electronic equipment and storage medium
CN112233674A (en) * 2020-10-15 2021-01-15 上海博泰悦臻网络技术服务有限公司 Multimode interaction method and system

Similar Documents

Publication Publication Date Title
CN108491709A (en) The method and apparatus of permission for identification
CN108898186A (en) Method and apparatus for extracting image
CN108446387A (en) Method and apparatus for updating face registration library
CN107483416A (en) The method and device of authentication
CN109711133A (en) Authentication method, device and the server of identity information
CN107808118A (en) Personal identification method, electronic installation and computer-readable recording medium
CN108369652A (en) The method and apparatus that erroneous judgement in being applied for face recognition minimizes
CN108898185A (en) Method and apparatus for generating image recognition model
CN106303599B (en) Information processing method, system and server
CN108595628A (en) Method and apparatus for pushed information
CN106204948A (en) Locker management method and locker managing device
CN108416323A (en) The method and apparatus of face for identification
CN108171211A (en) Biopsy method and device
CN113591603B (en) Certificate verification method and device, electronic equipment and storage medium
CN109034069A (en) Method and apparatus for generating information
CN113515988A (en) Palm print recognition method, feature extraction model training method, device and medium
CN108257178A (en) For positioning the method and apparatus of the position of target body
CN108460365A (en) Identity identifying method and device
CN109977839A (en) Information processing method and device
CN110414208A (en) Login validation method, calculates equipment and medium at device
CN108363999A (en) Operation based on recognition of face executes method and apparatus
CN108549848A (en) Method and apparatus for output information
CN108960110A (en) Method and apparatus for generating information
CN108460366A (en) Identity identifying method and device
CN109509269A (en) A kind of electronic signing method, computer readable storage medium and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180904

RJ01 Rejection of invention patent application after publication