CN108875582A - Auth method, device, equipment, storage medium and program - Google Patents

Auth method, device, equipment, storage medium and program Download PDF

Info

Publication number
CN108875582A
CN108875582A CN201810496634.9A CN201810496634A CN108875582A CN 108875582 A CN108875582 A CN 108875582A CN 201810496634 A CN201810496634 A CN 201810496634A CN 108875582 A CN108875582 A CN 108875582A
Authority
CN
China
Prior art keywords
tested
witness
identity
image
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810496634.9A
Other languages
Chinese (zh)
Inventor
刘毅
蒋文忠
娄松亚
左冬冬
刘杰
马堃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN201810496634.9A priority Critical patent/CN108875582A/en
Publication of CN108875582A publication Critical patent/CN108875582A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

Presently filed embodiment, disclose a kind of auth method, device, electronic equipment, computer readable storage medium and computer program, method therein is realized based on the identity-validation device with the first photographic device, the present processes should control first photographic device and be continuously in working condition, the method includes:Obtain the retention facial image of witness to be tested;Current face's image of the witness to be tested is obtained using first photographic device;According to the retention facial image and current face's image, authentication is carried out to the witness to be tested, to generate the authentication result of the witness to be tested.Technical solution provided by the present application is conducive to improve convenience, diversity and the flexibility of authentication implementation.

Description

Auth method, device, equipment, storage medium and program
Technical field
This application involves computer vision techniques, more particularly, to a kind of auth method, device, electronic equipment, meter Calculation machine readable storage medium storing program for executing and computer program.
Background technique
In occasions such as telecom business office, Internet bar, bank bussiness hall, hotel, airport, station and hospitals, there are authentications Demand.The convenience, diversity and flexibility for how improving authentication are a worth passes in computer vision field The technical issues of note.
Summary of the invention
The application embodiment provides a kind of technical solution of authentication.
Wherein on the one hand according to the application embodiment, a kind of auth method is provided, method is based on having first to take the photograph As the identity-validation device of device realizes that the method controls first photographic device and is continuously in working condition, the side Method includes:Obtain the retention facial image of witness to be tested;The current of the witness to be tested is obtained using first photographic device Facial image;According to the retention facial image and current face's image, authentication is carried out to the witness to be tested, To generate the authentication result of the witness to be tested.
In one embodiment of the application, the identity-validation device further includes chip identifier, is obtaining witness to be tested Retention facial image before, further include:Judge whether there is card;When there are card, the attribute of the card is judged, In, the attribute includes chip-shaped and non-chip-shaped;When the card is chip-shaped card, read using the chip identifier Take the retention facial image of the witness to be tested stored in the chip-shaped card.
In the another embodiment of the application, the identity-validation device further includes the second photographic device, when the card When for non-chip-shaped card, then the retention facial image for being set to the non-chip-shaped card is obtained using the second photographic device.
In the application a further embodiment, the chip-shaped card includes:The chip-shaped identity of wireless radio frequency discrimination RFID Card.
In the application a further embodiment, when card is not present, the method also includes:Obtain user input to The identity of identifier;It is sent and is requested to identity information system according to the identity, to obtain institute based on the request State the corresponding retention facial image of identity;Wherein, the corresponding retention facial image of the identity is used for and works as forefathers Face image is compared, to the carry out authentication to be verified.
In the application a further embodiment, the identity-validation device has touch display screen, and the acquisition user is defeated The identification information of the witness to be tested entered, including:When the identity-validation device enters working condition, the touch display On-screen-display message input module;Receive the identification information for the witness to be tested that user is inputted by the MIM message input module.
It is described to be asked according to the identification information to the transmission of identity information system in the application a further embodiment It asks, obtains the corresponding retention facial image of the User Identity, including:According to the identification information of the witness to be tested It generates for inquiring the request for retaining facial image, and send the request to the identity information system;Receive the identity The response of information system shows the retention facial image when in the response comprising retaining facial image;Conversely, then mentioning Show that user re-enters.
In the application a further embodiment, the identity includes:Identification card number;Or identification card number And name.
In the application a further embodiment, the identity information system includes:Based on public security CCIC system.
It is described according to the retention facial image and current face's image in the application a further embodiment, Authentication is carried out to the witness to be tested, includes to generate the authentication result of the witness to be tested:Described in obtaining respectively Retain the first face characteristic of facial image and the second face characteristic of current face's image;Calculate first face The similarity of feature and second face characteristic;When the similarity, which meets predetermined similarity, to be required, generate described to be tested The successful authentication result of witness's authentication.
According to the wherein another aspect of the application embodiment, a kind of authentication means, the authentication dress are provided It installs and is placed in the identity-validation device with the first photographic device, control first photographic device and be continuously in work shape State, the authentication means include:It obtains and retains image module, for obtaining the retention facial image of witness to be tested;It obtains Present image module, for obtaining current face's image of the witness to be tested using first photographic device;Authentication Module, for carrying out authentication to the witness to be tested according to the retention facial image and current face's image, To generate the authentication result of the witness to be tested.
In one embodiment of the application, the identity-validation device further includes:Figure is retained in chip identifier, the acquisition As module is further used for:Card is judged whether there is, when judging to judge the attribute of the card there are when card, wherein The attribute includes chip-shaped and non-chip-shaped;When judging the card is chip-shaped card, identified using the chip Device reads the retention facial image of the witness to be tested stored in the chip-shaped card.
In the another embodiment of the application, the identity-validation device further includes the second photographic device, when the card When for non-chip-shaped card, then the acquisition retain image module be set to using the acquisition of the second photographic device it is described non-chip-shaped The retention facial image of card.
In the application a further embodiment, the chip-shaped card includes:The chip-shaped identity of wireless radio frequency discrimination RFID Card.
In the application a further embodiment, when card is not present, the acquisition is retained image module and is also used to:It obtains The identity of the witness to be tested of user's input;It is sent and is requested to identity information system according to the identity, to be based on institute It states request and obtains the corresponding retention facial image of the identity;Wherein, the corresponding retention facial image of the identity, For being compared with current face's image, to the carry out authentication to be verified.
In the application a further embodiment, the identity-validation device has touch display screen, and figure is retained in the acquisition As module is further used for:When the identity-validation device enters working condition, the touch display screen is made to show that information is defeated Enter module;Receive the identification information for the witness to be tested that user is inputted by the MIM message input module.
In the application a further embodiment, the acquisition is retained image module and is further used for:According to described to be verified The identification information of people is generated for inquiring the request for retaining facial image, and is asked to described in identity information system transmission It asks;The response for receiving the identity information system shows the retention face when in the response comprising retaining facial image Image;Conversely, then user is prompted to re-enter.
In the application a further embodiment, the identity includes:Identification card number;Or identification card number And name.
In the application a further embodiment, identity information system includes:Based on public security CCIC system.
In the application a further embodiment, authentication module is further used for:
The second face of first face characteristic for retaining facial image and current face's image is obtained respectively Feature;Calculate the similarity of first face characteristic and second face characteristic;When the similarity satisfaction make a reservation for it is similar When degree requires, the authentication result that described personal part to be verified is proved to be successful is generated.
According to the application embodiment another aspect, a kind of electronic equipment is provided, including:Memory, based on storing Calculation machine program;Processor, for executing the computer program stored in the memory, and the computer program is performed When, realize the application either method embodiment.
According to the application embodiment another aspect, a kind of computer readable storage medium is provided, is stored thereon with meter Calculation machine program when the computer program is executed by processor, realizes the application either method embodiment.
According to another aspect of the application embodiment, a kind of computer program, including computer instruction are provided, works as institute When stating computer instruction and running in the processor of equipment, the application either method embodiment is realized.
Based on auth method provided by the present application, device, electronic equipment, computer readable storage medium and calculating Machine program, the application are continuously in working condition by controlling the first photographic device, can quickly to different witnesses to be tested into Row shooting, so as to be quickly obtained current face's image of different witnesses to be tested;By the retention face for obtaining witness to be tested Image, and the current face's image shot according to the retention facial image and the first photographic device, carry out for witness to be tested Authentication allows the identity validation technology of the application to be preferably suitable for the authentication scene of big flow.It follows that Technical solution provided by the present application is conducive to improve convenience, diversity and the flexibility of authentication implementation.
Below by drawings and embodiments, the technical solution of the application is described in further detail.
Detailed description of the invention
The attached drawing for constituting part of specification describes presently filed embodiment, and together with description for solving Release the principle of the application.
The application can be more clearly understood according to following detailed description referring to attached drawing, wherein:
Fig. 1 is the flow chart of one embodiment of auth method of the application;
Fig. 2 is the interactive interface schematic diagram in the authentication process itself of the application;
Fig. 3 is another interactive interface schematic diagram in the authentication process itself of the application;
Fig. 4 is the flow chart of another embodiment of the auth method of the application;
Fig. 5 is the structural schematic diagram of one embodiment of authentication means of the application;
Fig. 6 is the block diagram for realizing an example devices of the application embodiment.
Specific embodiment
The various exemplary embodiments of the application are described in detail now with reference to attached drawing.It should be noted that:Unless in addition having Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The range of application.
Simultaneously, it should be appreciated that for ease of description, the size of various pieces shown in attached drawing is not according to reality Proportionate relationship draw.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the application And its application or any restrictions used.
Technology, method known to person of ordinary skill in the relevant and equipment may be not discussed in detail, but In appropriate situation, the technology, method and apparatus should be considered as part of specification.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain item exists It is defined in one attached drawing, then in subsequent attached drawing does not need that it is further discussed.
The embodiment of the present application can be applied to the electronic equipments such as terminal device, computer system and server, can be with crowd Mostly other general or dedicated computing system environment or configuration operate together.Suitable for terminal device, computer system with And the example of well-known terminal device, computing system, environment and/or configuration that the electronic equipments such as server are used together, Including but not limited to:It is personal computer system, server computer system, thin client, thick client computer, hand-held or above-knee set It is standby, microprocessor-based system, set-top box, programmable consumer electronics, NetPC Network PC, little type Ji calculate machine Xi Tong ﹑ Large computer system and the distributed cloud computing technology environment including above-mentioned any system, etc..
The electronic equipments such as terminal device, computer system and server can be in the computer executed by computer system It is described under the general context of system executable instruction (such as program module).In general, program module may include routine, program, Target program, component, logic and data structure etc., they execute specific task or realize specific abstract data class Type.Computer system/server can be implemented in distributed cloud computing environment, in distributed cloud computing environment, task be by What the remote processing devices being linked through a communication network executed.In distributed cloud computing environment, program module can be located at packet On the Local or Remote computing system storage medium for including storage equipment.
Exemplary embodiment
Fig. 1 is the flow chart of one embodiment of the auth method of the application.This method is by having the first camera shooting to fill The identity-validation device set realizes that, in the case where identity-validation device is in running order, the present processes can control First photographic device is continuously in working condition.The identity-validation device can also have the first display screen and second display screen, First display screen therein can be set in witness side to be tested, i.e., the first display screen is towards witness to be tested.Optionally, two displays At least one display screen in screen can be touch display screen.Optionally, this method is tested by the identity with double screen separate form Equipment (for example, authentication all-in-one machine of double screen separate form) is demonstrate,proved to realize.That is, each step in this method is by having The identity-validation device of double screen separate form executes.Two display screens in the identity-validation device of the double screen separate form can be with It is connected using wired connection mode.The application is also not excluded for a possibility that two display screens are using radio connection connection.
As shown in Figure 1, the auth method of the present embodiment includes:Step S100, step S110 and step S120.Figure Each step in 1 is respectively:
S100, the retention facial image for obtaining witness to be tested.
S110, current face's image that witness to be tested is obtained using the first photographic device.
S120, according to facial image and current face's image is retained, treat identifier and carry out authentication, with generate to The authentication result of identifier.
The application by obtaining the retention facial image of witness to be tested, allow the application according to the retention facial image and Current face's image of first photographic device shooting carries out authentication for witness to be tested, to realize that identity is veritified.This Shen It please is continuously in working condition by controlling the first photographic device, allows identity validation technology preferably suitable for big flow Authentication scene.It follows that technical solution provided by the present application be conducive to improve authentication implementation convenience, Diversity and flexibility.
In an optional example, the identity-validation device of the application can obtain staying for witness to be tested in several ways Deposit facial image;For example, by reading the information mode stored in chip-shaped card, staying of storing in chip-shaped card is read out Deposit facial image;For another example being obtained non-chip-shaped in such a way that the second photographic device shoots or scans non-chip-shaped card The photo for printing or pasting in card, to obtain the retention facial image of witness to be tested;For another example there is no cards In the case of, the application can first obtain the identification information of the witness to be tested of user's input, then, be believed according to the identity It ceases to send to identity information system and request, to obtain the corresponding retention facial image of the identification information.Said chip type Card can be the card based on RFID (Radio Frequency Identification, radio frequency identification) chip;This Application does not limit the specific implementation for obtaining and retaining facial image.
In an optional example, the identity-validation device of the application is provided with chip identifier, and the application can first sentence It is disconnected to whether there is card, judging the attribute of the card to be judged, in the attribute for judging the card there are in the case where card In the case where for chip-shaped card, the retention face figure of the witness to be tested stored in chip-shaped card is read using chip identifier Picture.In the case where judging the attribute of the card is non-chip-shaped card, it can use the acquisition of the second photographic device and be set to The retention facial image of non-chip-shaped card;For example, the non-chip-shaped card of shooting, and human face detection tech is utilized, from shooting It is obtained in image and retains facial image.
In an optional example, the identity-validation device in the application is when entering working condition, touch display screen It shows MIM message input module (such as input frame);User (witness or staff such as to be tested) can pass through the information input Module inputs the identification information of witness to be tested, so that the application can receive the identification information of witness to be tested, obtains Obtain the identification information of witness to be tested.
In an optional example, the application can show include at least one option the page, the choosing in the page Item generally includes:Characterization is manually entered the first option of the identification information of witness to be tested.Certainly, the page is in addition to including the Except one option, can also include:Characterization reads the second option of the identification information of witness to be tested by chip identifier. The option (such as the first option and/or the second option) of the application can show as button form, for example, wrapping in the page of display It is second button (as shown in Figure 2) of " automatic card reading " containing the first button and official documents and correspondence that official documents and correspondence is " being manually entered ".With Family has selected the first option for characterizing the identification information for being manually entered witness to be tested, and (such as user clicks the screen display page In the corresponding button) in the case where, the application can be shown identification information input frame (as shown in Figure 3), and user can be The identification information of witness to be tested is manually entered in the input frame, for example, by digital, letter-by-letter or input by Chinese character to The identification information of identifier;To which the application it is defeated manually can to receive user by the identification information input frame The identification information of the witness to be tested entered, to get people's identity to be verified of witness's input to be tested.
In an optional example, the identification information of the witness to be tested in the application is typically referred to:It can uniquely mark Know the information of a witness to be tested out.For example, identification information may include, but it is not limited to identification card number, passport No. At least one of code, licence number, medical insurance number, bank card number, admission card for entrance examination number.User Identity can be with It is the combination of at least one of above-mentioned number with name.In the following embodiments, it is sometimes shown as with identification information Identification card number and name are illustrated the technical solution of the application, can not be interpreted as the limitation to the application.
In an optional example, identification information in this application includes:The feelings of identification card number and name Under condition, if user has selected to characterize the option for being manually entered identification information, the application can show identity card piece number Code input frame and name input frame, user can input identification card number in identification card number input frame, and in surname Name (such as Chinese Name or foreign language name) is inputted in name input frame.To which the application can pass through the body in current page Part passport NO. input frame and name input frame, receive the identification card number and name that user is manually entered.
In an optional example, the application can obtain user by the way of sending request to identity information system Retention facial image corresponding to the identification information being manually entered.That is, the accessible identity information system of the application System (for example, identity information system is accessed by network remote), and the identity information system provides and retains facial image inquiry function Can, so that the application can be based on the retention facial image query function, obtain the identification information institute that user is manually entered Corresponding retention facial image.For example, being stored with identification information in identity information system and its retaining pair of facial image It should be related to, the application generates after the identification information for getting user's input for inquiring the request for retaining facial image, And the request is sent, identification information is carried in the request.Identity information system upon receiving the request, is asked using this The identification information for asking middle carrying is searched in the corresponding relationship of its storage, to search and the identification information phase Matched corresponding relationship, if the result searched is in the presence of the corresponding relationship to match, identity information system obtains the correspondence Corresponding retention facial image in relationship, and identity-validation device is fed back to, it is stayed corresponding to identification information to obtain Deposit facial image.If the result searched is that there is no the corresponding relationships to match, i.e. identification information and identity information system The identification information of system storage is not consistent, then the information of identity information system feedback inquiry failure, and is sent to authentication Equipment forms corresponding prompt information, and shows.For example, the prompt information that display characterization identification information is wrong, to inform There may be mistakes for the identification information of the witness to be tested of its input of user.
In an optional example, the identification information of above-described embodiment and its corresponding relationship for retaining facial image, It can be specially the record in database, for example, the record in the identity document database in identity information system.
In an optional example, the application is generated and is used in the case where getting the identification card number of user's input The request of facial image is retained in inquiry, and the request is sent by network (such as wireless network or cable network).This is asked Identification card number is carried in asking.Identity information system upon receiving the request, utilizes the identity card carried in the request Piece number code is searched in identity document database, to search the record to match with the identification card number, if searched Result be in the presence of the record that matches, then identity information system is by the retention facial image in the record to match, carrying In the corresponding response of the request, and the response is returned to, so that the application can be got in request from the response received Retention facial image corresponding to the identification card number of carrying.If the result searched is that there is no the records to match, i.e., Identification card number in request is all different with the identification card number in all records in identity document database, then body Part information system can be by the identification card number in characterization request and the identification card number in identity document database not phase The information of symbol is carried in the corresponding response of the request, and returns to the response, thus the application can according to response in carry The information that characterization identification card number is not consistent with pre-stored identification card number, forms corresponding prompt information, and show Show, for example, the prompt information that display characterization identification card number is wrong, to inform the identity card of the witness to be tested of its input of user There may be mistakes for piece number code.
In an optional example, the application get user input identification card number and name in the case where, It generates for inquiring the request for retaining facial image, and this is sent by network (such as wireless network or cable network) and is asked It asks.Identification card number and name are carried in the request.Identity information system upon receiving the request, using in the request The identification card number and name of carrying, are searched in identity document database, with search with the identification card number and The homogeneous matched record of name, if the result searched be the record that presence matches, identity information system matches this Record in retention facial image, be carried in the corresponding response of the request, and return to the response, so that the application can be from In the response received, retention facial image corresponding to the identification card number and name carried in request is got.If The result of lookup is that there is no the records to match, i.e., in the identification card number in request and name and identity document database All records in identification card number and name be all different (for example, request in identification card number with one record in Identification card number it is identical, however, request in name and the name in the record it is not identical;For another example the body in request The identification card number in all records in part passport NO. and identity document database is all different), then identity information system System can be by the identification card number and name in the identification card number and name and identity document database in characterization request The information not being consistent is carried in the corresponding response of the request, and returns to the response, thus the application can according to response in hold Identification card number and name in the characterization request of load and the identification card number and name not phase in identity document database The information of symbol forms corresponding prompt information, and shows, for example, display characterization identification card number and the wrong prompt of name Information, with inform user its input witness to be tested identification card number or name there may be mistakes.
In an optional example, the retention facial image in the application is usually the image for including clearly face, For example, including the image of clearly positive face.Optionally, which may include:Identity card picture, passport shine Piece, driving license photo, medical insurance card photo, admission card for entrance examination photo, gate inhibition's photo or employee's license piece etc..The application does not limit Retain the specific manifestation form of facial image.
In an optional example, identification information in this application includes:Identification card number or passport No. When code, the identity information system in the application may include:(such as public security is quick for ID card information system based on public security Inquire integrated information system, i.e. public security CCIC system), alternatively, corresponding operation system.Operation system in the application can be Access operation system or RT register traffic system or attendance operation system etc..Identification information in this application includes: When admission card for entrance examination number or medical insurance number, identity information system may be the examination based on related education department Information system or social security information system based on medical insurance department or corresponding operation system etc..The application does not limit body The specific manifestation form of part information system and operation system.
The identity mark that the application passes through the witness to be tested using user (for example, witness to be tested or staff etc.) input Know information, the corresponding retention facial image of identification information of witness to be tested can be obtained, thus the application can for The corresponding current face for retaining facial image and being currently based on the witness to be tested that shooting obtains of the identification information of identifier Image carries out authentication to the witness to be tested;And then the application is conducive to avoid corresponding certificate must being used (for example, body Part certificate, passport, driving license, medical insurance card, bank card or admission card for entrance examination etc.) identifier's progress authentication can be treated Phenomenon.Ultimately facilitate the diversity and flexibility for improving authentication implementation.
In an optional example, the application according to retain facial image and be currently based on the first photographic device shooting and Current face's image of the witness to be tested got, an implementation for carrying out authentication to the witness to be tested can be:
Firstly, the face characteristic (i.e. the first face characteristic) of facial image is retained in acquisition and current face's image (may Include one or more faces) at least one set of face characteristic (i.e. at least one set of second face characteristic).For example, the application can be with Facial image will be retained and current face's image is inputted respectively in a convolutional neural networks, by the convolutional neural networks for retention Facial image and current face's image carry out face characteristic extraction operation respectively, so that the application can be according to the convolutional Neural net The output of network, the second face of at least one set for obtaining the first face characteristic and current face's image of retaining facial image are special Sign.The network structure of the convolutional neural networks can be according to the actual demand flexible design of feature extraction, and the embodiment of the present application is simultaneously The specific network structure of the convolutional neural networks is not limited;For example, the convolutional neural networks of the application may include but unlimited In convolutional layer, elu layers of linear R, pond layer and full articulamentum etc., the number of plies which is included is more, then Network is deeper;For another example the network structure of the convolutional neural networks of the application can use but be not limited to ALexNet, depth Residual error network (Deep Residual Network, ResNet) or VGGnet (Visual Geometry Group Network, Visual geometric group network) etc. network structure used by neural networks.
Secondly, at least one set of the first face characteristic and current face's image for the retention facial image of above-mentioned acquisition Second face characteristic carries out similarity calculation.For example, calculating the first face characteristic respectively and often using corresponding similarity algorithm Similarity between one group of second face characteristic.The application does not limit the specific implementation of similarity calculation.
Finally, judging whether above-mentioned calculated similarity meets predetermined similarity requirement, for example, calculated each similar With the presence or absence of not less than corresponding similarity threshold in degree;Exist in determining each similarity and meets what predetermined similarity required In the case where similarity, determine this authentication result for authentication success;Determining that it is pre- that each similarity is not satisfied In the case where determining similarity requirement, determine this authentication result for authentication failure.
The application is by the similarity based on face characteristic, to realize authentication, can fast and accurately realize identity Verifying a, for example, authentication can be completed by being no more than 1 second.To be conducive to improve the accuracy and effect of authentication Rate.
In an optional example, the application is obtaining current face's image of witness to be tested by shooting, and is worked as After the second face characteristic in preceding facial image, it can judge that the face in current face's image is according to the second face characteristic It is no to meet predetermined face requirement.Predetermined face requires to be arranged according to actual needs, for example, predetermined face requires can wrap It includes:Face clarity requires, face deflection requires in (being referred to as positive face requirement) and human face expression requirement etc. at least One.Above-mentioned face clarity requires:The exposure intensity of face requires and the virtualization degree of face requires etc..On Stating positive face requirement may include:Rotation angle requirement etc. of the face on three directions of x, y, z.Above-mentioned human face expression requires can be with Including:Opening and closing degree requirement, the opening and closing degree requirement in upper eyelid and palpebra inferior and the exaggeration degree of expression of upper lower lip are wanted At least one of ask etc..In the case where judging that the face in current face's image does not meet predetermined face requirement, this Shen It can please inform that witness to be tested needs to re-shoot by prompting modes such as text or voices.For example, witness to be tested is prompted to stand In scheduled position, see to preset bearing.Later, it is in running order (for example, triggering is taken the photograph to trigger photographic device again by the application As device jumps to working condition by dormant state, for another example opening photographic device), and trigger photographic device and execute shooting behaviour Make, so that the application obtains current face's image of the witness to be tested again.After photographic device performs shooting operation, this Shen Photographic device can please be triggered in time to jump to dormant state by working condition or close photographic device.The application obtains again After current face's image of the witness to be tested, the above-mentioned retention facial image according to above-mentioned acquisition and current can be executed again Current face's image of the witness to be tested obtained based on shooting carries out the embodiment of authentication to the witness to be tested.? This is not repeated to illustrate.
The application can be kept away by judging for whether the face in current face's image meets predetermined face requirement Exempt to speak or yawn due to shooting light problem, witness's side face to be tested, witness to be tested etc. authentication caused by factors The phenomenon that failure, to be conducive to improve the robustness and accuracy of authentication.
Fig. 4 is the flow chart of another embodiment of the auth method of the application.As shown in figure 4, the application reality The method for applying example mainly includes the following steps:
S400, the authentication process itself for starting the application.For example, identity-validation device power-up starting, photographic device are lasting It is in running order.
S410, identity document is detected by chip identifier, and read out from identity document by chip identifier In the case where retaining facial image, triggering photographic device executes shooting operation, to obtain current face's figure of the witness to be tested Picture.After photographic device performs shooting operation, photographic device is continuously in working condition.
S420, judge whether successfully to get current face's image, if successfully getting current face's image, to step Rapid S430 prompts user if getting current face's image not successfully, for example, prompt subscriber station in predetermined position, see to Predetermined direction etc.;Return step S410.
It should be strongly noted that the success in S420, which gets current face's image, to be referred to, photographic device is executed Shooting operation, produces corresponding live image, and detecting in the live image includes face.It may also mean that, take the photograph As device performs shooting operation, corresponding live image is produced, and detecting in the live image includes face, into one Step, detect that the face meets predetermined face requirement.
In an optional example, the application can use neural network whether to detect in live image comprising someone Face detects for example, carrying out the external frame of face to live image using neural network, thus can according to the external frame testing result of face To determine whether in the live image include face.The application can use neural network to detect whether face meets face It is required that for example, face critical point detection is carried out to facial image using neural network, thus according to face critical point detection result It determines whether the face in live image is positive and face and whether belongs to exaggeration expression etc..The application is not constrained to function and gets work as The concrete meaning of preceding facial image is not constrained to function yet and gets specific judgment mode of current face's image etc..
S430, current face's image and the face in identity card picture are compared, with judge two faces whether be The face of the same person then arrives step S440 if it is judged that being the face that two faces are the same person;If it is determined that knot Fruit is the face that two faces are not the same person, then arrives step S450.
S440, it determines that this authentication passes through, and shows the prompt information that characterization authentication passes through.
S450, it determines that this authentication fails, and shows the prompt information of characterization authentication failure.
S460, this authentication process itself terminate.
Fig. 5 is the structural schematic diagram of authentication means one embodiment of the application.The authentication means of the application It is set in the identity-validation device with the first photographic device 510.In the case where identity-validation device is in running order, The device of the application can control the first photographic device 510 and be continuously in working condition.The identity-validation device can also have First display screen and second display screen, the first display screen therein can be set in witness side to be tested, i.e. the first display screen towards Witness to be tested.Optionally, at least one display screen in two display screens can be touch display screen.Optionally, the application Authentication means are set to the identity-validation device with double screen separate form (for example, the authentication of double screen separate form All-in-one machine) in.Two display screens in the identity-validation device of the double screen separate form can be connected using wired connection mode. The application is also not excluded for a possibility that two display screens are using radio connection connection.
In Fig. 5, the authentication means of the application mainly include:It obtains and retains image module 500, the first photographic device 510, present image module 520 and authentication module 530 are obtained.Optionally, which can also include:Core Piece identifier 540 and the second photographic device 550.
It obtains and retains the retention facial image that image module 500 is used to obtain witness to be tested.
Optionally, it obtains retention image module 500 and judges whether there is card, retain the judgement of image module 500 when obtaining When there is card out, the attribute of the card is judged, judge the attribute of the card for chip for example, obtaining and retaining image module 500 Type, or be non-chip-shaped;When image module 500 is retained in acquisition judges that the attribute of card is chip-shaped, obtains to retain and scheme As module 500 using chip identifier 540 read in chip-shaped card (for example, RFID chip type ID card etc.) store to The retention facial image of identifier.When image module 500 is retained in acquisition judges that the attribute of card is non-chip-shaped, acquisition is stayed It deposits image module 500 and obtains the retention facial image for being set to non-chip-shaped card using the second photographic device 550.Obtain user The identity of the witness to be tested of input;
Optionally, obtain when retaining image module 500 and judging there is no card, obtain retain image module 500 can be with The identity of the witness to be tested of user's input is obtained, and is sent and is requested to identity information system according to the identity, with base The corresponding retention facial image of the identity is obtained in the request;Wherein, the corresponding retention facial image of identity, is used for It is compared with current face's image, to carry out authentication to be verified.
Optionally, in the case where identity-validation device has touch display screen, obtain retain image module 500 can be When identity-validation device enters working condition, touch display screen is made to show MIM message input module (such as input frame), obtains and retain Image module 500 receives the witness to be tested that user (such as witness to be tested or staff) is inputted by MIM message input module Identification information, identification information can be the identification card number of people to be verified, or the identity of witness to be tested Passport NO. and name.Obtaining retention image module 500 can generate according to the identification information of its witness to be tested obtained For inquiring the request for retaining facial image, and this is sent to identity information system (for example, based on public security CCIC system etc.) and is asked It asks, obtains and retain the response that image module 500 receives identity information system, when in response comprising retention facial image, make to touch It touches display screen display and retains facial image;Conversely, then user is prompted to re-enter.
It obtains and retains the operation that image module 500 specifically executes, may refer to be directed to Fig. 1 extremely in above method embodiment Associated description in Fig. 4, this will not be repeated here.
Obtain current face's image that present image module 520 is used to obtain witness to be tested using the first photographic device 510. The operation that present image module 520 specifically executes is obtained, may refer in above method embodiment in Fig. 1 to Fig. 4 Associated description, this will not be repeated here.
Authentication module 530 is used to treat identifier according to facial image and current face's image is retained and carry out body Part verifying, to generate the authentication result of witness to be tested.Optionally, authentication module 530 obtains respectively retains face figure First face characteristic of picture and the second face characteristic of current face's image, and calculate the first face characteristic and the second face spy The similarity of sign, when calculated similarity, which meets predetermined similarity, to be required, authentication module 530 generates the person to be verified The authentication result that part is proved to be successful.The operation that authentication module 530 specifically executes may refer to above method embodiment party For the associated description in Fig. 1 to Fig. 4 in formula, this will not be repeated here.
Example devices
Fig. 6 shows the example devices 600 for being adapted for carrying out the application, and equipment 600 can be the control configured in automobile System/electronic system, mobile terminal (for example, intelligent mobile phone etc.), personal computer (i.e. PC, for example, desktop computer or Person's notebook computer etc.), tablet computer and server etc..In Fig. 6, equipment 600 includes one or more processor, leads to Letter portion etc., one or more of processors can be:One or more central processing unit (CPU) 601, and/or, one A or multiple image processors (GPU) 613 etc. that authentication is carried out using neural network, processor can be according to being stored in Executable instruction in read-only memory (ROM) 602 is loaded into random access storage device (RAM) 603 from storage section 608 In executable instruction and execute various movements appropriate and processing.Communication unit 612 can include but is not limited to network interface card, the net Card can include but is not limited to IB (Infiniband) network interface card.Processor can be stored with read-only memory 602 and/or random access Communication is connected by bus 604 with communication unit 612 and with executing executable instruction through communication unit 612 and other mesh in device 603 Marking device communication, to complete the corresponding steps in the application.
Operation performed by above-mentioned each instruction may refer to the associated description in above method embodiment, herein no longer in detail Explanation.
In addition, in RAM 603, various programs and data needed for device operation can also be stored with.CPU601, ROM602 and RAM603 is connected with each other by bus 604.In the case where there is RAM603, ROM602 is optional module. RAM603 stores executable instruction, or executable instruction is written into ROM602 at runtime, and executable instruction makes central processing Unit 601 executes step included by above-mentioned method for segmenting objects.Input/output (I/O) interface 605 is also connected to bus 604. Communication unit 612 can integrate setting, may be set to be with multiple submodule (for example, multiple IB network interface cards), and respectively and always Line connection.
I/O interface 605 is connected to lower component:Importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be installed in storage section 608 as needed.
It should be strongly noted that framework as shown in FIG. 6 is only a kind of optional implementation, in concrete practice process In, can the component count amount and type according to actual needs to above-mentioned Fig. 6 selected, deleted, increased or replaced;In different function It in component setting, can also be used separately positioned or integrally disposed and other implementations, set for example, GPU613 and CPU601 is separable Set, manage for another example, GPU613 can be integrated on CPU601, the separable setting of communication unit, can also be integrally disposed in CPU601 or GPU613 is upper etc..These interchangeable embodiments each fall within the protection scope of the application.
Particularly, it according to presently filed embodiment, may be implemented as calculating below with reference to the process of flow chart description Machine software program, for example, the application embodiment includes a kind of computer program product, it can it includes machine is tangibly embodied in The computer program on medium is read, computer program includes the program code for step shown in execution flow chart, program generation Code may include the corresponding corresponding instruction of step executed in method provided by the present application.
In such an embodiment, which can be downloaded and be pacified from network by communications portion 609 Dress, and/or be mounted from detachable media 611.When the computer program is executed by central processing unit (CPU) 601, execute The instruction as described in this application for realizing above-mentioned corresponding steps.
In one or more optional embodiments, the embodiment of the present disclosure additionally provides a kind of computer program program production Product, for storing computer-readable instruction, described instruction is performed so that computer executes described in above-mentioned any embodiment Auth method.
The computer program product can be realized especially by hardware, software or its mode combined.In an alternative embodiment In son, the computer program product is embodied as computer storage medium, in another optional example, the computer Program product is embodied as software product, such as software development kit (Software Development Kit, SDK) etc..
In one or more optional embodiments, the embodiment of the present disclosure additionally provide another auth method and its Corresponding device and electronic equipment, computer storage medium, computer program and computer program product, wherein this method Including:First device sends the instruction of authentication to second device, and the instruction is so that second device executes any of the above-described possibility Embodiment in auth method;First device receives the result for the authentication that second device is sent.
In some embodiments, the instruction of the authentication can be specially call instruction, and first device can pass through tune Mode indicates that second device executes the operation of authentication, and accordingly, in response to call instruction is received, second device can To execute the step and/or process in any embodiment in above-mentioned auth method.
It should be understood that the terms such as " first " in the embodiment of the present disclosure, " second " are used for the purpose of distinguishing, and be not construed as Restriction to the embodiment of the present disclosure.
It should also be understood that in the disclosure, " multiple " can refer to two or more, "at least one" can refer to one, Two or more.
It should also be understood that clearly being limited or no preceding for the either component, data or the structure that are referred in the disclosure In the case where opposite enlightenment given hereinlater, one or more may be generally understood to.
It should also be understood that the disclosure highlights the difference between each embodiment to the description of each embodiment, Same or similar place can be referred to mutually, for sake of simplicity, no longer repeating one by one.
The present processes and device, electronic equipment and computer-readable storage medium may be achieved in many ways Matter.For example, can be realized by any combination of software, hardware, firmware or software, hardware, firmware the present processes and Device, electronic equipment and computer readable storage medium.The said sequence of the step of for method merely to be illustrated, The step of the present processes, is not limited to sequence described in detail above, unless specifically stated otherwise.In addition, some In embodiment, the application can be also embodied as recording program in the recording medium, these programs include for realizing basis The machine readable instructions of the present processes.Thus, the application also covers storage for executing the journey according to the present processes The recording medium of sequence.
The description of the present application is given for the purpose of illustration and description, and is not exhaustively or by the application It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches Embodiment is stated and be the principle and practical application in order to more preferably illustrate the application, and enables those skilled in the art Enough understand that the embodiment of the present application can be so that design the various embodiments with various modifications for being suitable for special-purpose.

Claims (10)

1. a kind of auth method, the method is realized based on the identity-validation device with the first photographic device, feature It is, controls first photographic device and be continuously in working condition, the method includes:
Obtain the retention facial image of witness to be tested;
Current face's image of the witness to be tested is obtained using first photographic device;
According to the retention facial image and current face's image, authentication is carried out to the witness to be tested, with life At the authentication result of the witness to be tested.
2. the method according to claim 1, wherein the identity-validation device further includes chip identifier, Before the retention facial image for obtaining witness to be tested, further include:
Judge whether there is card;
When there are card, the attribute of the card is judged, wherein the attribute includes chip-shaped and non-chip-shaped;
When the card is chip-shaped card, read using the chip identifier described in being stored in the chip-shaped card The retention facial image of witness to be tested.
3. according to the method described in claim 2, it is characterized in that, the identity-validation device further includes the second photographic device,
When the card is non-chip-shaped card, then the non-chip-shaped card is set to using the acquisition of the second photographic device Retain facial image.
4. according to the method described in claim 2, it is characterized in that, the chip-shaped card includes:Wireless radio frequency discrimination RFID The chip-shaped ID card.
5. according to the method described in claim 2, it is characterized in that, when be not present card when, the method also includes:
Obtain the identity of the witness to be tested of user's input;
It is sent and is requested to identity information system according to the identity, it is corresponding to obtain the identity based on the request Retention facial image;
Wherein, the corresponding retention facial image of the identity, for being compared with current face's image, to described to be tested Card carries out authentication.
6. according to the method described in claim 5, it is characterized in that, the identity-validation device have touch display screen, it is described The identification information of the witness to be tested of user's input is obtained, including:
When the identity-validation device enters working condition, the touch display screen shows MIM message input module;
Receive the identification information for the witness to be tested that user is inputted by the MIM message input module.
7. a kind of authentication means, the authentication means are set to the identity-validation device with the first photographic device In, which is characterized in that control first photographic device is continuously in working condition, and the authentication means include:
It obtains and retains image module, for obtaining the retention facial image of witness to be tested;
Present image module is obtained, for obtaining current face's image of the witness to be tested using first photographic device;
Authentication module is used for according to the retention facial image and current face's image, to the witness to be tested Authentication is carried out, to generate the authentication result of the witness to be tested.
8. a kind of electronic equipment, including:
Memory, for storing computer program;
Processor, for executing the computer program stored in the memory, and the computer program is performed, and is realized Method described in any one of the claims 1-6.
9. a kind of computer readable storage medium, is stored thereon with computer program, when which is executed by processor, Realize method described in any one of the claims 1-6.
10. a kind of computer program, including computer instruction, when the computer instruction is run in the processor of equipment, Realize method described in any one of the claims 1-6.
CN201810496634.9A 2018-05-22 2018-05-22 Auth method, device, equipment, storage medium and program Pending CN108875582A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810496634.9A CN108875582A (en) 2018-05-22 2018-05-22 Auth method, device, equipment, storage medium and program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810496634.9A CN108875582A (en) 2018-05-22 2018-05-22 Auth method, device, equipment, storage medium and program

Publications (1)

Publication Number Publication Date
CN108875582A true CN108875582A (en) 2018-11-23

Family

ID=64332942

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810496634.9A Pending CN108875582A (en) 2018-05-22 2018-05-22 Auth method, device, equipment, storage medium and program

Country Status (1)

Country Link
CN (1) CN108875582A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741490A (en) * 2018-12-17 2019-05-10 景安大数据科技有限公司 A kind of identity checking method and its device
CN109993866A (en) * 2019-03-14 2019-07-09 西安艾润物联网技术服务有限责任公司 Flap turnstile control method and system based on mobile management terminal
CN110298243A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Testimony verification method, apparatus, computer equipment and computer readable storage medium
CN110570568A (en) * 2019-09-12 2019-12-13 山东浪潮商用系统有限公司 tax handling system and method based on non-sensory face recognition
CN110795714A (en) * 2019-09-10 2020-02-14 中国平安财产保险股份有限公司 Identity authentication method and device, computer equipment and storage medium
CN113011339A (en) * 2021-03-19 2021-06-22 支付宝(杭州)信息技术有限公司 User identity verification method and device and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003042854A1 (en) * 2001-11-05 2003-05-22 The Maitland Company Methods and systems for associating an identity of a sender with a parcel sent via a courier
WO2004008379A2 (en) * 2002-06-17 2004-01-22 Mason Ricardo Storm Identity verification
CN101290686A (en) * 2008-06-05 2008-10-22 杨子江 Self-help remote ticket-buying, fetching system possessing personal identification and its method
CN101551921A (en) * 2009-05-20 2009-10-07 朱少波 Quick passing method based on second-generation identification card
CN102497533A (en) * 2011-12-01 2012-06-13 中科芯集成电路股份有限公司 Video monitoring system capable of collecting information of second generation identity card
CN103714431A (en) * 2013-12-26 2014-04-09 苏州清研微视电子科技有限公司 Airport people identity authentication management system based on face recognition
CN204155327U (en) * 2014-09-01 2015-02-11 上海智达商投资管理合伙企业(有限合伙) A kind of visiting personnel based on recognition of face register checking device
CN108009413A (en) * 2017-12-27 2018-05-08 浪潮金融信息技术有限公司 The personal identification method and device of self-aided terminal, computer-readable storage medium, terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003042854A1 (en) * 2001-11-05 2003-05-22 The Maitland Company Methods and systems for associating an identity of a sender with a parcel sent via a courier
WO2004008379A2 (en) * 2002-06-17 2004-01-22 Mason Ricardo Storm Identity verification
CN101290686A (en) * 2008-06-05 2008-10-22 杨子江 Self-help remote ticket-buying, fetching system possessing personal identification and its method
CN101551921A (en) * 2009-05-20 2009-10-07 朱少波 Quick passing method based on second-generation identification card
CN102497533A (en) * 2011-12-01 2012-06-13 中科芯集成电路股份有限公司 Video monitoring system capable of collecting information of second generation identity card
CN103714431A (en) * 2013-12-26 2014-04-09 苏州清研微视电子科技有限公司 Airport people identity authentication management system based on face recognition
CN204155327U (en) * 2014-09-01 2015-02-11 上海智达商投资管理合伙企业(有限合伙) A kind of visiting personnel based on recognition of face register checking device
CN108009413A (en) * 2017-12-27 2018-05-08 浪潮金融信息技术有限公司 The personal identification method and device of self-aided terminal, computer-readable storage medium, terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741490A (en) * 2018-12-17 2019-05-10 景安大数据科技有限公司 A kind of identity checking method and its device
CN109993866A (en) * 2019-03-14 2019-07-09 西安艾润物联网技术服务有限责任公司 Flap turnstile control method and system based on mobile management terminal
CN110298243A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Testimony verification method, apparatus, computer equipment and computer readable storage medium
CN110795714A (en) * 2019-09-10 2020-02-14 中国平安财产保险股份有限公司 Identity authentication method and device, computer equipment and storage medium
CN110570568A (en) * 2019-09-12 2019-12-13 山东浪潮商用系统有限公司 tax handling system and method based on non-sensory face recognition
CN110570568B (en) * 2019-09-12 2021-10-15 山东浪潮商用系统有限公司 Tax handling system and method based on non-sensory face recognition
CN113011339A (en) * 2021-03-19 2021-06-22 支付宝(杭州)信息技术有限公司 User identity verification method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN108833359A (en) Auth method, device, equipment, storage medium and program
CN108875582A (en) Auth method, device, equipment, storage medium and program
CN108229120A (en) Face unlock and its information registering method and device, equipment, program, medium
EP3493088B1 (en) Security gesture authentication
US9146668B2 (en) Graphical element placement on a display surface
TWI684886B (en) Method and device for generating security problems and identity verification
CN108399665A (en) Method for safety monitoring, device based on recognition of face and storage medium
US9412017B1 (en) Methods systems and computer program products for motion initiated document capture
US10846514B2 (en) Processing images from an electronic mirror
US9633272B2 (en) Real time object scanning using a mobile phone and cloud-based visual search engine
CN108171137B (en) Face recognition method and system
CN110135262A (en) The anti-peeping processing method of sensitive data, device, equipment and storage medium
CN108734003A (en) Auth method, device, equipment, storage medium and program
CN108805005A (en) Auth method and device, electronic equipment, computer program and storage medium
CN109271915A (en) False-proof detection method and device, electronic equipment, storage medium
CN109635021A (en) A kind of data information input method, device and equipment based on human testing
CN107247936A (en) Image-recognizing method and device
CA3049042A1 (en) System and method for authenticating transactions from a mobile device
CN105894042A (en) Method and apparatus for detecting whether document image is covered
CN111241873A (en) Image reproduction detection method, training method of model thereof, payment method and payment device
US10958661B2 (en) Multi-layer authentication system with selective level access control
EP3786820A1 (en) Authentication system, authentication device, authentication method, and program
Singh et al. Face recognition using open source computer vision library (OpenCV) with python
US20240028698A1 (en) System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration
CN107656959A (en) A kind of message leaving method, device and message equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123

RJ01 Rejection of invention patent application after publication