CN108875582A - Auth method, device, equipment, storage medium and program - Google Patents
Auth method, device, equipment, storage medium and program Download PDFInfo
- Publication number
- CN108875582A CN108875582A CN201810496634.9A CN201810496634A CN108875582A CN 108875582 A CN108875582 A CN 108875582A CN 201810496634 A CN201810496634 A CN 201810496634A CN 108875582 A CN108875582 A CN 108875582A
- Authority
- CN
- China
- Prior art keywords
- tested
- witness
- identity
- image
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/166—Detection; Localisation; Normalisation using acquisition arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Abstract
Presently filed embodiment, disclose a kind of auth method, device, electronic equipment, computer readable storage medium and computer program, method therein is realized based on the identity-validation device with the first photographic device, the present processes should control first photographic device and be continuously in working condition, the method includes:Obtain the retention facial image of witness to be tested;Current face's image of the witness to be tested is obtained using first photographic device;According to the retention facial image and current face's image, authentication is carried out to the witness to be tested, to generate the authentication result of the witness to be tested.Technical solution provided by the present application is conducive to improve convenience, diversity and the flexibility of authentication implementation.
Description
Technical field
This application involves computer vision techniques, more particularly, to a kind of auth method, device, electronic equipment, meter
Calculation machine readable storage medium storing program for executing and computer program.
Background technique
In occasions such as telecom business office, Internet bar, bank bussiness hall, hotel, airport, station and hospitals, there are authentications
Demand.The convenience, diversity and flexibility for how improving authentication are a worth passes in computer vision field
The technical issues of note.
Summary of the invention
The application embodiment provides a kind of technical solution of authentication.
Wherein on the one hand according to the application embodiment, a kind of auth method is provided, method is based on having first to take the photograph
As the identity-validation device of device realizes that the method controls first photographic device and is continuously in working condition, the side
Method includes:Obtain the retention facial image of witness to be tested;The current of the witness to be tested is obtained using first photographic device
Facial image;According to the retention facial image and current face's image, authentication is carried out to the witness to be tested,
To generate the authentication result of the witness to be tested.
In one embodiment of the application, the identity-validation device further includes chip identifier, is obtaining witness to be tested
Retention facial image before, further include:Judge whether there is card;When there are card, the attribute of the card is judged,
In, the attribute includes chip-shaped and non-chip-shaped;When the card is chip-shaped card, read using the chip identifier
Take the retention facial image of the witness to be tested stored in the chip-shaped card.
In the another embodiment of the application, the identity-validation device further includes the second photographic device, when the card
When for non-chip-shaped card, then the retention facial image for being set to the non-chip-shaped card is obtained using the second photographic device.
In the application a further embodiment, the chip-shaped card includes:The chip-shaped identity of wireless radio frequency discrimination RFID
Card.
In the application a further embodiment, when card is not present, the method also includes:Obtain user input to
The identity of identifier;It is sent and is requested to identity information system according to the identity, to obtain institute based on the request
State the corresponding retention facial image of identity;Wherein, the corresponding retention facial image of the identity is used for and works as forefathers
Face image is compared, to the carry out authentication to be verified.
In the application a further embodiment, the identity-validation device has touch display screen, and the acquisition user is defeated
The identification information of the witness to be tested entered, including:When the identity-validation device enters working condition, the touch display
On-screen-display message input module;Receive the identification information for the witness to be tested that user is inputted by the MIM message input module.
It is described to be asked according to the identification information to the transmission of identity information system in the application a further embodiment
It asks, obtains the corresponding retention facial image of the User Identity, including:According to the identification information of the witness to be tested
It generates for inquiring the request for retaining facial image, and send the request to the identity information system;Receive the identity
The response of information system shows the retention facial image when in the response comprising retaining facial image;Conversely, then mentioning
Show that user re-enters.
In the application a further embodiment, the identity includes:Identification card number;Or identification card number
And name.
In the application a further embodiment, the identity information system includes:Based on public security CCIC system.
It is described according to the retention facial image and current face's image in the application a further embodiment,
Authentication is carried out to the witness to be tested, includes to generate the authentication result of the witness to be tested:Described in obtaining respectively
Retain the first face characteristic of facial image and the second face characteristic of current face's image;Calculate first face
The similarity of feature and second face characteristic;When the similarity, which meets predetermined similarity, to be required, generate described to be tested
The successful authentication result of witness's authentication.
According to the wherein another aspect of the application embodiment, a kind of authentication means, the authentication dress are provided
It installs and is placed in the identity-validation device with the first photographic device, control first photographic device and be continuously in work shape
State, the authentication means include:It obtains and retains image module, for obtaining the retention facial image of witness to be tested;It obtains
Present image module, for obtaining current face's image of the witness to be tested using first photographic device;Authentication
Module, for carrying out authentication to the witness to be tested according to the retention facial image and current face's image,
To generate the authentication result of the witness to be tested.
In one embodiment of the application, the identity-validation device further includes:Figure is retained in chip identifier, the acquisition
As module is further used for:Card is judged whether there is, when judging to judge the attribute of the card there are when card, wherein
The attribute includes chip-shaped and non-chip-shaped;When judging the card is chip-shaped card, identified using the chip
Device reads the retention facial image of the witness to be tested stored in the chip-shaped card.
In the another embodiment of the application, the identity-validation device further includes the second photographic device, when the card
When for non-chip-shaped card, then the acquisition retain image module be set to using the acquisition of the second photographic device it is described non-chip-shaped
The retention facial image of card.
In the application a further embodiment, the chip-shaped card includes:The chip-shaped identity of wireless radio frequency discrimination RFID
Card.
In the application a further embodiment, when card is not present, the acquisition is retained image module and is also used to:It obtains
The identity of the witness to be tested of user's input;It is sent and is requested to identity information system according to the identity, to be based on institute
It states request and obtains the corresponding retention facial image of the identity;Wherein, the corresponding retention facial image of the identity,
For being compared with current face's image, to the carry out authentication to be verified.
In the application a further embodiment, the identity-validation device has touch display screen, and figure is retained in the acquisition
As module is further used for:When the identity-validation device enters working condition, the touch display screen is made to show that information is defeated
Enter module;Receive the identification information for the witness to be tested that user is inputted by the MIM message input module.
In the application a further embodiment, the acquisition is retained image module and is further used for:According to described to be verified
The identification information of people is generated for inquiring the request for retaining facial image, and is asked to described in identity information system transmission
It asks;The response for receiving the identity information system shows the retention face when in the response comprising retaining facial image
Image;Conversely, then user is prompted to re-enter.
In the application a further embodiment, the identity includes:Identification card number;Or identification card number
And name.
In the application a further embodiment, identity information system includes:Based on public security CCIC system.
In the application a further embodiment, authentication module is further used for:
The second face of first face characteristic for retaining facial image and current face's image is obtained respectively
Feature;Calculate the similarity of first face characteristic and second face characteristic;When the similarity satisfaction make a reservation for it is similar
When degree requires, the authentication result that described personal part to be verified is proved to be successful is generated.
According to the application embodiment another aspect, a kind of electronic equipment is provided, including:Memory, based on storing
Calculation machine program;Processor, for executing the computer program stored in the memory, and the computer program is performed
When, realize the application either method embodiment.
According to the application embodiment another aspect, a kind of computer readable storage medium is provided, is stored thereon with meter
Calculation machine program when the computer program is executed by processor, realizes the application either method embodiment.
According to another aspect of the application embodiment, a kind of computer program, including computer instruction are provided, works as institute
When stating computer instruction and running in the processor of equipment, the application either method embodiment is realized.
Based on auth method provided by the present application, device, electronic equipment, computer readable storage medium and calculating
Machine program, the application are continuously in working condition by controlling the first photographic device, can quickly to different witnesses to be tested into
Row shooting, so as to be quickly obtained current face's image of different witnesses to be tested;By the retention face for obtaining witness to be tested
Image, and the current face's image shot according to the retention facial image and the first photographic device, carry out for witness to be tested
Authentication allows the identity validation technology of the application to be preferably suitable for the authentication scene of big flow.It follows that
Technical solution provided by the present application is conducive to improve convenience, diversity and the flexibility of authentication implementation.
Below by drawings and embodiments, the technical solution of the application is described in further detail.
Detailed description of the invention
The attached drawing for constituting part of specification describes presently filed embodiment, and together with description for solving
Release the principle of the application.
The application can be more clearly understood according to following detailed description referring to attached drawing, wherein:
Fig. 1 is the flow chart of one embodiment of auth method of the application;
Fig. 2 is the interactive interface schematic diagram in the authentication process itself of the application;
Fig. 3 is another interactive interface schematic diagram in the authentication process itself of the application;
Fig. 4 is the flow chart of another embodiment of the auth method of the application;
Fig. 5 is the structural schematic diagram of one embodiment of authentication means of the application;
Fig. 6 is the block diagram for realizing an example devices of the application embodiment.
Specific embodiment
The various exemplary embodiments of the application are described in detail now with reference to attached drawing.It should be noted that:Unless in addition having
Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
The range of application.
Simultaneously, it should be appreciated that for ease of description, the size of various pieces shown in attached drawing is not according to reality
Proportionate relationship draw.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the application
And its application or any restrictions used.
Technology, method known to person of ordinary skill in the relevant and equipment may be not discussed in detail, but
In appropriate situation, the technology, method and apparatus should be considered as part of specification.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain item exists
It is defined in one attached drawing, then in subsequent attached drawing does not need that it is further discussed.
The embodiment of the present application can be applied to the electronic equipments such as terminal device, computer system and server, can be with crowd
Mostly other general or dedicated computing system environment or configuration operate together.Suitable for terminal device, computer system with
And the example of well-known terminal device, computing system, environment and/or configuration that the electronic equipments such as server are used together,
Including but not limited to:It is personal computer system, server computer system, thin client, thick client computer, hand-held or above-knee set
It is standby, microprocessor-based system, set-top box, programmable consumer electronics, NetPC Network PC, little type Ji calculate machine Xi Tong ﹑
Large computer system and the distributed cloud computing technology environment including above-mentioned any system, etc..
The electronic equipments such as terminal device, computer system and server can be in the computer executed by computer system
It is described under the general context of system executable instruction (such as program module).In general, program module may include routine, program,
Target program, component, logic and data structure etc., they execute specific task or realize specific abstract data class
Type.Computer system/server can be implemented in distributed cloud computing environment, in distributed cloud computing environment, task be by
What the remote processing devices being linked through a communication network executed.In distributed cloud computing environment, program module can be located at packet
On the Local or Remote computing system storage medium for including storage equipment.
Exemplary embodiment
Fig. 1 is the flow chart of one embodiment of the auth method of the application.This method is by having the first camera shooting to fill
The identity-validation device set realizes that, in the case where identity-validation device is in running order, the present processes can control
First photographic device is continuously in working condition.The identity-validation device can also have the first display screen and second display screen,
First display screen therein can be set in witness side to be tested, i.e., the first display screen is towards witness to be tested.Optionally, two displays
At least one display screen in screen can be touch display screen.Optionally, this method is tested by the identity with double screen separate form
Equipment (for example, authentication all-in-one machine of double screen separate form) is demonstrate,proved to realize.That is, each step in this method is by having
The identity-validation device of double screen separate form executes.Two display screens in the identity-validation device of the double screen separate form can be with
It is connected using wired connection mode.The application is also not excluded for a possibility that two display screens are using radio connection connection.
As shown in Figure 1, the auth method of the present embodiment includes:Step S100, step S110 and step S120.Figure
Each step in 1 is respectively:
S100, the retention facial image for obtaining witness to be tested.
S110, current face's image that witness to be tested is obtained using the first photographic device.
S120, according to facial image and current face's image is retained, treat identifier and carry out authentication, with generate to
The authentication result of identifier.
The application by obtaining the retention facial image of witness to be tested, allow the application according to the retention facial image and
Current face's image of first photographic device shooting carries out authentication for witness to be tested, to realize that identity is veritified.This Shen
It please is continuously in working condition by controlling the first photographic device, allows identity validation technology preferably suitable for big flow
Authentication scene.It follows that technical solution provided by the present application be conducive to improve authentication implementation convenience,
Diversity and flexibility.
In an optional example, the identity-validation device of the application can obtain staying for witness to be tested in several ways
Deposit facial image;For example, by reading the information mode stored in chip-shaped card, staying of storing in chip-shaped card is read out
Deposit facial image;For another example being obtained non-chip-shaped in such a way that the second photographic device shoots or scans non-chip-shaped card
The photo for printing or pasting in card, to obtain the retention facial image of witness to be tested;For another example there is no cards
In the case of, the application can first obtain the identification information of the witness to be tested of user's input, then, be believed according to the identity
It ceases to send to identity information system and request, to obtain the corresponding retention facial image of the identification information.Said chip type
Card can be the card based on RFID (Radio Frequency Identification, radio frequency identification) chip;This
Application does not limit the specific implementation for obtaining and retaining facial image.
In an optional example, the identity-validation device of the application is provided with chip identifier, and the application can first sentence
It is disconnected to whether there is card, judging the attribute of the card to be judged, in the attribute for judging the card there are in the case where card
In the case where for chip-shaped card, the retention face figure of the witness to be tested stored in chip-shaped card is read using chip identifier
Picture.In the case where judging the attribute of the card is non-chip-shaped card, it can use the acquisition of the second photographic device and be set to
The retention facial image of non-chip-shaped card;For example, the non-chip-shaped card of shooting, and human face detection tech is utilized, from shooting
It is obtained in image and retains facial image.
In an optional example, the identity-validation device in the application is when entering working condition, touch display screen
It shows MIM message input module (such as input frame);User (witness or staff such as to be tested) can pass through the information input
Module inputs the identification information of witness to be tested, so that the application can receive the identification information of witness to be tested, obtains
Obtain the identification information of witness to be tested.
In an optional example, the application can show include at least one option the page, the choosing in the page
Item generally includes:Characterization is manually entered the first option of the identification information of witness to be tested.Certainly, the page is in addition to including the
Except one option, can also include:Characterization reads the second option of the identification information of witness to be tested by chip identifier.
The option (such as the first option and/or the second option) of the application can show as button form, for example, wrapping in the page of display
It is second button (as shown in Figure 2) of " automatic card reading " containing the first button and official documents and correspondence that official documents and correspondence is " being manually entered ".With
Family has selected the first option for characterizing the identification information for being manually entered witness to be tested, and (such as user clicks the screen display page
In the corresponding button) in the case where, the application can be shown identification information input frame (as shown in Figure 3), and user can be
The identification information of witness to be tested is manually entered in the input frame, for example, by digital, letter-by-letter or input by Chinese character to
The identification information of identifier;To which the application it is defeated manually can to receive user by the identification information input frame
The identification information of the witness to be tested entered, to get people's identity to be verified of witness's input to be tested.
In an optional example, the identification information of the witness to be tested in the application is typically referred to:It can uniquely mark
Know the information of a witness to be tested out.For example, identification information may include, but it is not limited to identification card number, passport No.
At least one of code, licence number, medical insurance number, bank card number, admission card for entrance examination number.User Identity can be with
It is the combination of at least one of above-mentioned number with name.In the following embodiments, it is sometimes shown as with identification information
Identification card number and name are illustrated the technical solution of the application, can not be interpreted as the limitation to the application.
In an optional example, identification information in this application includes:The feelings of identification card number and name
Under condition, if user has selected to characterize the option for being manually entered identification information, the application can show identity card piece number
Code input frame and name input frame, user can input identification card number in identification card number input frame, and in surname
Name (such as Chinese Name or foreign language name) is inputted in name input frame.To which the application can pass through the body in current page
Part passport NO. input frame and name input frame, receive the identification card number and name that user is manually entered.
In an optional example, the application can obtain user by the way of sending request to identity information system
Retention facial image corresponding to the identification information being manually entered.That is, the accessible identity information system of the application
System (for example, identity information system is accessed by network remote), and the identity information system provides and retains facial image inquiry function
Can, so that the application can be based on the retention facial image query function, obtain the identification information institute that user is manually entered
Corresponding retention facial image.For example, being stored with identification information in identity information system and its retaining pair of facial image
It should be related to, the application generates after the identification information for getting user's input for inquiring the request for retaining facial image,
And the request is sent, identification information is carried in the request.Identity information system upon receiving the request, is asked using this
The identification information for asking middle carrying is searched in the corresponding relationship of its storage, to search and the identification information phase
Matched corresponding relationship, if the result searched is in the presence of the corresponding relationship to match, identity information system obtains the correspondence
Corresponding retention facial image in relationship, and identity-validation device is fed back to, it is stayed corresponding to identification information to obtain
Deposit facial image.If the result searched is that there is no the corresponding relationships to match, i.e. identification information and identity information system
The identification information of system storage is not consistent, then the information of identity information system feedback inquiry failure, and is sent to authentication
Equipment forms corresponding prompt information, and shows.For example, the prompt information that display characterization identification information is wrong, to inform
There may be mistakes for the identification information of the witness to be tested of its input of user.
In an optional example, the identification information of above-described embodiment and its corresponding relationship for retaining facial image,
It can be specially the record in database, for example, the record in the identity document database in identity information system.
In an optional example, the application is generated and is used in the case where getting the identification card number of user's input
The request of facial image is retained in inquiry, and the request is sent by network (such as wireless network or cable network).This is asked
Identification card number is carried in asking.Identity information system upon receiving the request, utilizes the identity card carried in the request
Piece number code is searched in identity document database, to search the record to match with the identification card number, if searched
Result be in the presence of the record that matches, then identity information system is by the retention facial image in the record to match, carrying
In the corresponding response of the request, and the response is returned to, so that the application can be got in request from the response received
Retention facial image corresponding to the identification card number of carrying.If the result searched is that there is no the records to match, i.e.,
Identification card number in request is all different with the identification card number in all records in identity document database, then body
Part information system can be by the identification card number in characterization request and the identification card number in identity document database not phase
The information of symbol is carried in the corresponding response of the request, and returns to the response, thus the application can according to response in carry
The information that characterization identification card number is not consistent with pre-stored identification card number, forms corresponding prompt information, and show
Show, for example, the prompt information that display characterization identification card number is wrong, to inform the identity card of the witness to be tested of its input of user
There may be mistakes for piece number code.
In an optional example, the application get user input identification card number and name in the case where,
It generates for inquiring the request for retaining facial image, and this is sent by network (such as wireless network or cable network) and is asked
It asks.Identification card number and name are carried in the request.Identity information system upon receiving the request, using in the request
The identification card number and name of carrying, are searched in identity document database, with search with the identification card number and
The homogeneous matched record of name, if the result searched be the record that presence matches, identity information system matches this
Record in retention facial image, be carried in the corresponding response of the request, and return to the response, so that the application can be from
In the response received, retention facial image corresponding to the identification card number and name carried in request is got.If
The result of lookup is that there is no the records to match, i.e., in the identification card number in request and name and identity document database
All records in identification card number and name be all different (for example, request in identification card number with one record in
Identification card number it is identical, however, request in name and the name in the record it is not identical;For another example the body in request
The identification card number in all records in part passport NO. and identity document database is all different), then identity information system
System can be by the identification card number and name in the identification card number and name and identity document database in characterization request
The information not being consistent is carried in the corresponding response of the request, and returns to the response, thus the application can according to response in hold
Identification card number and name in the characterization request of load and the identification card number and name not phase in identity document database
The information of symbol forms corresponding prompt information, and shows, for example, display characterization identification card number and the wrong prompt of name
Information, with inform user its input witness to be tested identification card number or name there may be mistakes.
In an optional example, the retention facial image in the application is usually the image for including clearly face,
For example, including the image of clearly positive face.Optionally, which may include:Identity card picture, passport shine
Piece, driving license photo, medical insurance card photo, admission card for entrance examination photo, gate inhibition's photo or employee's license piece etc..The application does not limit
Retain the specific manifestation form of facial image.
In an optional example, identification information in this application includes:Identification card number or passport No.
When code, the identity information system in the application may include:(such as public security is quick for ID card information system based on public security
Inquire integrated information system, i.e. public security CCIC system), alternatively, corresponding operation system.Operation system in the application can be
Access operation system or RT register traffic system or attendance operation system etc..Identification information in this application includes:
When admission card for entrance examination number or medical insurance number, identity information system may be the examination based on related education department
Information system or social security information system based on medical insurance department or corresponding operation system etc..The application does not limit body
The specific manifestation form of part information system and operation system.
The identity mark that the application passes through the witness to be tested using user (for example, witness to be tested or staff etc.) input
Know information, the corresponding retention facial image of identification information of witness to be tested can be obtained, thus the application can for
The corresponding current face for retaining facial image and being currently based on the witness to be tested that shooting obtains of the identification information of identifier
Image carries out authentication to the witness to be tested;And then the application is conducive to avoid corresponding certificate must being used (for example, body
Part certificate, passport, driving license, medical insurance card, bank card or admission card for entrance examination etc.) identifier's progress authentication can be treated
Phenomenon.Ultimately facilitate the diversity and flexibility for improving authentication implementation.
In an optional example, the application according to retain facial image and be currently based on the first photographic device shooting and
Current face's image of the witness to be tested got, an implementation for carrying out authentication to the witness to be tested can be:
Firstly, the face characteristic (i.e. the first face characteristic) of facial image is retained in acquisition and current face's image (may
Include one or more faces) at least one set of face characteristic (i.e. at least one set of second face characteristic).For example, the application can be with
Facial image will be retained and current face's image is inputted respectively in a convolutional neural networks, by the convolutional neural networks for retention
Facial image and current face's image carry out face characteristic extraction operation respectively, so that the application can be according to the convolutional Neural net
The output of network, the second face of at least one set for obtaining the first face characteristic and current face's image of retaining facial image are special
Sign.The network structure of the convolutional neural networks can be according to the actual demand flexible design of feature extraction, and the embodiment of the present application is simultaneously
The specific network structure of the convolutional neural networks is not limited;For example, the convolutional neural networks of the application may include but unlimited
In convolutional layer, elu layers of linear R, pond layer and full articulamentum etc., the number of plies which is included is more, then
Network is deeper;For another example the network structure of the convolutional neural networks of the application can use but be not limited to ALexNet, depth
Residual error network (Deep Residual Network, ResNet) or VGGnet (Visual Geometry Group Network,
Visual geometric group network) etc. network structure used by neural networks.
Secondly, at least one set of the first face characteristic and current face's image for the retention facial image of above-mentioned acquisition
Second face characteristic carries out similarity calculation.For example, calculating the first face characteristic respectively and often using corresponding similarity algorithm
Similarity between one group of second face characteristic.The application does not limit the specific implementation of similarity calculation.
Finally, judging whether above-mentioned calculated similarity meets predetermined similarity requirement, for example, calculated each similar
With the presence or absence of not less than corresponding similarity threshold in degree;Exist in determining each similarity and meets what predetermined similarity required
In the case where similarity, determine this authentication result for authentication success;Determining that it is pre- that each similarity is not satisfied
In the case where determining similarity requirement, determine this authentication result for authentication failure.
The application is by the similarity based on face characteristic, to realize authentication, can fast and accurately realize identity
Verifying a, for example, authentication can be completed by being no more than 1 second.To be conducive to improve the accuracy and effect of authentication
Rate.
In an optional example, the application is obtaining current face's image of witness to be tested by shooting, and is worked as
After the second face characteristic in preceding facial image, it can judge that the face in current face's image is according to the second face characteristic
It is no to meet predetermined face requirement.Predetermined face requires to be arranged according to actual needs, for example, predetermined face requires can wrap
It includes:Face clarity requires, face deflection requires in (being referred to as positive face requirement) and human face expression requirement etc. at least
One.Above-mentioned face clarity requires:The exposure intensity of face requires and the virtualization degree of face requires etc..On
Stating positive face requirement may include:Rotation angle requirement etc. of the face on three directions of x, y, z.Above-mentioned human face expression requires can be with
Including:Opening and closing degree requirement, the opening and closing degree requirement in upper eyelid and palpebra inferior and the exaggeration degree of expression of upper lower lip are wanted
At least one of ask etc..In the case where judging that the face in current face's image does not meet predetermined face requirement, this Shen
It can please inform that witness to be tested needs to re-shoot by prompting modes such as text or voices.For example, witness to be tested is prompted to stand
In scheduled position, see to preset bearing.Later, it is in running order (for example, triggering is taken the photograph to trigger photographic device again by the application
As device jumps to working condition by dormant state, for another example opening photographic device), and trigger photographic device and execute shooting behaviour
Make, so that the application obtains current face's image of the witness to be tested again.After photographic device performs shooting operation, this Shen
Photographic device can please be triggered in time to jump to dormant state by working condition or close photographic device.The application obtains again
After current face's image of the witness to be tested, the above-mentioned retention facial image according to above-mentioned acquisition and current can be executed again
Current face's image of the witness to be tested obtained based on shooting carries out the embodiment of authentication to the witness to be tested.?
This is not repeated to illustrate.
The application can be kept away by judging for whether the face in current face's image meets predetermined face requirement
Exempt to speak or yawn due to shooting light problem, witness's side face to be tested, witness to be tested etc. authentication caused by factors
The phenomenon that failure, to be conducive to improve the robustness and accuracy of authentication.
Fig. 4 is the flow chart of another embodiment of the auth method of the application.As shown in figure 4, the application reality
The method for applying example mainly includes the following steps:
S400, the authentication process itself for starting the application.For example, identity-validation device power-up starting, photographic device are lasting
It is in running order.
S410, identity document is detected by chip identifier, and read out from identity document by chip identifier
In the case where retaining facial image, triggering photographic device executes shooting operation, to obtain current face's figure of the witness to be tested
Picture.After photographic device performs shooting operation, photographic device is continuously in working condition.
S420, judge whether successfully to get current face's image, if successfully getting current face's image, to step
Rapid S430 prompts user if getting current face's image not successfully, for example, prompt subscriber station in predetermined position, see to
Predetermined direction etc.;Return step S410.
It should be strongly noted that the success in S420, which gets current face's image, to be referred to, photographic device is executed
Shooting operation, produces corresponding live image, and detecting in the live image includes face.It may also mean that, take the photograph
As device performs shooting operation, corresponding live image is produced, and detecting in the live image includes face, into one
Step, detect that the face meets predetermined face requirement.
In an optional example, the application can use neural network whether to detect in live image comprising someone
Face detects for example, carrying out the external frame of face to live image using neural network, thus can according to the external frame testing result of face
To determine whether in the live image include face.The application can use neural network to detect whether face meets face
It is required that for example, face critical point detection is carried out to facial image using neural network, thus according to face critical point detection result
It determines whether the face in live image is positive and face and whether belongs to exaggeration expression etc..The application is not constrained to function and gets work as
The concrete meaning of preceding facial image is not constrained to function yet and gets specific judgment mode of current face's image etc..
S430, current face's image and the face in identity card picture are compared, with judge two faces whether be
The face of the same person then arrives step S440 if it is judged that being the face that two faces are the same person;If it is determined that knot
Fruit is the face that two faces are not the same person, then arrives step S450.
S440, it determines that this authentication passes through, and shows the prompt information that characterization authentication passes through.
S450, it determines that this authentication fails, and shows the prompt information of characterization authentication failure.
S460, this authentication process itself terminate.
Fig. 5 is the structural schematic diagram of authentication means one embodiment of the application.The authentication means of the application
It is set in the identity-validation device with the first photographic device 510.In the case where identity-validation device is in running order,
The device of the application can control the first photographic device 510 and be continuously in working condition.The identity-validation device can also have
First display screen and second display screen, the first display screen therein can be set in witness side to be tested, i.e. the first display screen towards
Witness to be tested.Optionally, at least one display screen in two display screens can be touch display screen.Optionally, the application
Authentication means are set to the identity-validation device with double screen separate form (for example, the authentication of double screen separate form
All-in-one machine) in.Two display screens in the identity-validation device of the double screen separate form can be connected using wired connection mode.
The application is also not excluded for a possibility that two display screens are using radio connection connection.
In Fig. 5, the authentication means of the application mainly include:It obtains and retains image module 500, the first photographic device
510, present image module 520 and authentication module 530 are obtained.Optionally, which can also include:Core
Piece identifier 540 and the second photographic device 550.
It obtains and retains the retention facial image that image module 500 is used to obtain witness to be tested.
Optionally, it obtains retention image module 500 and judges whether there is card, retain the judgement of image module 500 when obtaining
When there is card out, the attribute of the card is judged, judge the attribute of the card for chip for example, obtaining and retaining image module 500
Type, or be non-chip-shaped;When image module 500 is retained in acquisition judges that the attribute of card is chip-shaped, obtains to retain and scheme
As module 500 using chip identifier 540 read in chip-shaped card (for example, RFID chip type ID card etc.) store to
The retention facial image of identifier.When image module 500 is retained in acquisition judges that the attribute of card is non-chip-shaped, acquisition is stayed
It deposits image module 500 and obtains the retention facial image for being set to non-chip-shaped card using the second photographic device 550.Obtain user
The identity of the witness to be tested of input;
Optionally, obtain when retaining image module 500 and judging there is no card, obtain retain image module 500 can be with
The identity of the witness to be tested of user's input is obtained, and is sent and is requested to identity information system according to the identity, with base
The corresponding retention facial image of the identity is obtained in the request;Wherein, the corresponding retention facial image of identity, is used for
It is compared with current face's image, to carry out authentication to be verified.
Optionally, in the case where identity-validation device has touch display screen, obtain retain image module 500 can be
When identity-validation device enters working condition, touch display screen is made to show MIM message input module (such as input frame), obtains and retain
Image module 500 receives the witness to be tested that user (such as witness to be tested or staff) is inputted by MIM message input module
Identification information, identification information can be the identification card number of people to be verified, or the identity of witness to be tested
Passport NO. and name.Obtaining retention image module 500 can generate according to the identification information of its witness to be tested obtained
For inquiring the request for retaining facial image, and this is sent to identity information system (for example, based on public security CCIC system etc.) and is asked
It asks, obtains and retain the response that image module 500 receives identity information system, when in response comprising retention facial image, make to touch
It touches display screen display and retains facial image;Conversely, then user is prompted to re-enter.
It obtains and retains the operation that image module 500 specifically executes, may refer to be directed to Fig. 1 extremely in above method embodiment
Associated description in Fig. 4, this will not be repeated here.
Obtain current face's image that present image module 520 is used to obtain witness to be tested using the first photographic device 510.
The operation that present image module 520 specifically executes is obtained, may refer in above method embodiment in Fig. 1 to Fig. 4
Associated description, this will not be repeated here.
Authentication module 530 is used to treat identifier according to facial image and current face's image is retained and carry out body
Part verifying, to generate the authentication result of witness to be tested.Optionally, authentication module 530 obtains respectively retains face figure
First face characteristic of picture and the second face characteristic of current face's image, and calculate the first face characteristic and the second face spy
The similarity of sign, when calculated similarity, which meets predetermined similarity, to be required, authentication module 530 generates the person to be verified
The authentication result that part is proved to be successful.The operation that authentication module 530 specifically executes may refer to above method embodiment party
For the associated description in Fig. 1 to Fig. 4 in formula, this will not be repeated here.
Example devices
Fig. 6 shows the example devices 600 for being adapted for carrying out the application, and equipment 600 can be the control configured in automobile
System/electronic system, mobile terminal (for example, intelligent mobile phone etc.), personal computer (i.e. PC, for example, desktop computer or
Person's notebook computer etc.), tablet computer and server etc..In Fig. 6, equipment 600 includes one or more processor, leads to
Letter portion etc., one or more of processors can be:One or more central processing unit (CPU) 601, and/or, one
A or multiple image processors (GPU) 613 etc. that authentication is carried out using neural network, processor can be according to being stored in
Executable instruction in read-only memory (ROM) 602 is loaded into random access storage device (RAM) 603 from storage section 608
In executable instruction and execute various movements appropriate and processing.Communication unit 612 can include but is not limited to network interface card, the net
Card can include but is not limited to IB (Infiniband) network interface card.Processor can be stored with read-only memory 602 and/or random access
Communication is connected by bus 604 with communication unit 612 and with executing executable instruction through communication unit 612 and other mesh in device 603
Marking device communication, to complete the corresponding steps in the application.
Operation performed by above-mentioned each instruction may refer to the associated description in above method embodiment, herein no longer in detail
Explanation.
In addition, in RAM 603, various programs and data needed for device operation can also be stored with.CPU601,
ROM602 and RAM603 is connected with each other by bus 604.In the case where there is RAM603, ROM602 is optional module.
RAM603 stores executable instruction, or executable instruction is written into ROM602 at runtime, and executable instruction makes central processing
Unit 601 executes step included by above-mentioned method for segmenting objects.Input/output (I/O) interface 605 is also connected to bus 604.
Communication unit 612 can integrate setting, may be set to be with multiple submodule (for example, multiple IB network interface cards), and respectively and always
Line connection.
I/O interface 605 is connected to lower component:Importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;
And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because
The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon
Computer program be installed in storage section 608 as needed.
It should be strongly noted that framework as shown in FIG. 6 is only a kind of optional implementation, in concrete practice process
In, can the component count amount and type according to actual needs to above-mentioned Fig. 6 selected, deleted, increased or replaced;In different function
It in component setting, can also be used separately positioned or integrally disposed and other implementations, set for example, GPU613 and CPU601 is separable
Set, manage for another example, GPU613 can be integrated on CPU601, the separable setting of communication unit, can also be integrally disposed in CPU601 or
GPU613 is upper etc..These interchangeable embodiments each fall within the protection scope of the application.
Particularly, it according to presently filed embodiment, may be implemented as calculating below with reference to the process of flow chart description
Machine software program, for example, the application embodiment includes a kind of computer program product, it can it includes machine is tangibly embodied in
The computer program on medium is read, computer program includes the program code for step shown in execution flow chart, program generation
Code may include the corresponding corresponding instruction of step executed in method provided by the present application.
In such an embodiment, which can be downloaded and be pacified from network by communications portion 609
Dress, and/or be mounted from detachable media 611.When the computer program is executed by central processing unit (CPU) 601, execute
The instruction as described in this application for realizing above-mentioned corresponding steps.
In one or more optional embodiments, the embodiment of the present disclosure additionally provides a kind of computer program program production
Product, for storing computer-readable instruction, described instruction is performed so that computer executes described in above-mentioned any embodiment
Auth method.
The computer program product can be realized especially by hardware, software or its mode combined.In an alternative embodiment
In son, the computer program product is embodied as computer storage medium, in another optional example, the computer
Program product is embodied as software product, such as software development kit (Software Development Kit, SDK) etc..
In one or more optional embodiments, the embodiment of the present disclosure additionally provide another auth method and its
Corresponding device and electronic equipment, computer storage medium, computer program and computer program product, wherein this method
Including:First device sends the instruction of authentication to second device, and the instruction is so that second device executes any of the above-described possibility
Embodiment in auth method;First device receives the result for the authentication that second device is sent.
In some embodiments, the instruction of the authentication can be specially call instruction, and first device can pass through tune
Mode indicates that second device executes the operation of authentication, and accordingly, in response to call instruction is received, second device can
To execute the step and/or process in any embodiment in above-mentioned auth method.
It should be understood that the terms such as " first " in the embodiment of the present disclosure, " second " are used for the purpose of distinguishing, and be not construed as
Restriction to the embodiment of the present disclosure.
It should also be understood that in the disclosure, " multiple " can refer to two or more, "at least one" can refer to one,
Two or more.
It should also be understood that clearly being limited or no preceding for the either component, data or the structure that are referred in the disclosure
In the case where opposite enlightenment given hereinlater, one or more may be generally understood to.
It should also be understood that the disclosure highlights the difference between each embodiment to the description of each embodiment,
Same or similar place can be referred to mutually, for sake of simplicity, no longer repeating one by one.
The present processes and device, electronic equipment and computer-readable storage medium may be achieved in many ways
Matter.For example, can be realized by any combination of software, hardware, firmware or software, hardware, firmware the present processes and
Device, electronic equipment and computer readable storage medium.The said sequence of the step of for method merely to be illustrated,
The step of the present processes, is not limited to sequence described in detail above, unless specifically stated otherwise.In addition, some
In embodiment, the application can be also embodied as recording program in the recording medium, these programs include for realizing basis
The machine readable instructions of the present processes.Thus, the application also covers storage for executing the journey according to the present processes
The recording medium of sequence.
The description of the present application is given for the purpose of illustration and description, and is not exhaustively or by the application
It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches
Embodiment is stated and be the principle and practical application in order to more preferably illustrate the application, and enables those skilled in the art
Enough understand that the embodiment of the present application can be so that design the various embodiments with various modifications for being suitable for special-purpose.
Claims (10)
1. a kind of auth method, the method is realized based on the identity-validation device with the first photographic device, feature
It is, controls first photographic device and be continuously in working condition, the method includes:
Obtain the retention facial image of witness to be tested;
Current face's image of the witness to be tested is obtained using first photographic device;
According to the retention facial image and current face's image, authentication is carried out to the witness to be tested, with life
At the authentication result of the witness to be tested.
2. the method according to claim 1, wherein the identity-validation device further includes chip identifier,
Before the retention facial image for obtaining witness to be tested, further include:
Judge whether there is card;
When there are card, the attribute of the card is judged, wherein the attribute includes chip-shaped and non-chip-shaped;
When the card is chip-shaped card, read using the chip identifier described in being stored in the chip-shaped card
The retention facial image of witness to be tested.
3. according to the method described in claim 2, it is characterized in that, the identity-validation device further includes the second photographic device,
When the card is non-chip-shaped card, then the non-chip-shaped card is set to using the acquisition of the second photographic device
Retain facial image.
4. according to the method described in claim 2, it is characterized in that, the chip-shaped card includes:Wireless radio frequency discrimination RFID
The chip-shaped ID card.
5. according to the method described in claim 2, it is characterized in that, when be not present card when, the method also includes:
Obtain the identity of the witness to be tested of user's input;
It is sent and is requested to identity information system according to the identity, it is corresponding to obtain the identity based on the request
Retention facial image;
Wherein, the corresponding retention facial image of the identity, for being compared with current face's image, to described to be tested
Card carries out authentication.
6. according to the method described in claim 5, it is characterized in that, the identity-validation device have touch display screen, it is described
The identification information of the witness to be tested of user's input is obtained, including:
When the identity-validation device enters working condition, the touch display screen shows MIM message input module;
Receive the identification information for the witness to be tested that user is inputted by the MIM message input module.
7. a kind of authentication means, the authentication means are set to the identity-validation device with the first photographic device
In, which is characterized in that control first photographic device is continuously in working condition, and the authentication means include:
It obtains and retains image module, for obtaining the retention facial image of witness to be tested;
Present image module is obtained, for obtaining current face's image of the witness to be tested using first photographic device;
Authentication module is used for according to the retention facial image and current face's image, to the witness to be tested
Authentication is carried out, to generate the authentication result of the witness to be tested.
8. a kind of electronic equipment, including:
Memory, for storing computer program;
Processor, for executing the computer program stored in the memory, and the computer program is performed, and is realized
Method described in any one of the claims 1-6.
9. a kind of computer readable storage medium, is stored thereon with computer program, when which is executed by processor,
Realize method described in any one of the claims 1-6.
10. a kind of computer program, including computer instruction, when the computer instruction is run in the processor of equipment,
Realize method described in any one of the claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810496634.9A CN108875582A (en) | 2018-05-22 | 2018-05-22 | Auth method, device, equipment, storage medium and program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810496634.9A CN108875582A (en) | 2018-05-22 | 2018-05-22 | Auth method, device, equipment, storage medium and program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108875582A true CN108875582A (en) | 2018-11-23 |
Family
ID=64332942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810496634.9A Pending CN108875582A (en) | 2018-05-22 | 2018-05-22 | Auth method, device, equipment, storage medium and program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108875582A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741490A (en) * | 2018-12-17 | 2019-05-10 | 景安大数据科技有限公司 | A kind of identity checking method and its device |
CN109993866A (en) * | 2019-03-14 | 2019-07-09 | 西安艾润物联网技术服务有限责任公司 | Flap turnstile control method and system based on mobile management terminal |
CN110298243A (en) * | 2019-05-22 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Testimony verification method, apparatus, computer equipment and computer readable storage medium |
CN110570568A (en) * | 2019-09-12 | 2019-12-13 | 山东浪潮商用系统有限公司 | tax handling system and method based on non-sensory face recognition |
CN110795714A (en) * | 2019-09-10 | 2020-02-14 | 中国平安财产保险股份有限公司 | Identity authentication method and device, computer equipment and storage medium |
CN113011339A (en) * | 2021-03-19 | 2021-06-22 | 支付宝(杭州)信息技术有限公司 | User identity verification method and device and electronic equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003042854A1 (en) * | 2001-11-05 | 2003-05-22 | The Maitland Company | Methods and systems for associating an identity of a sender with a parcel sent via a courier |
WO2004008379A2 (en) * | 2002-06-17 | 2004-01-22 | Mason Ricardo Storm | Identity verification |
CN101290686A (en) * | 2008-06-05 | 2008-10-22 | 杨子江 | Self-help remote ticket-buying, fetching system possessing personal identification and its method |
CN101551921A (en) * | 2009-05-20 | 2009-10-07 | 朱少波 | Quick passing method based on second-generation identification card |
CN102497533A (en) * | 2011-12-01 | 2012-06-13 | 中科芯集成电路股份有限公司 | Video monitoring system capable of collecting information of second generation identity card |
CN103714431A (en) * | 2013-12-26 | 2014-04-09 | 苏州清研微视电子科技有限公司 | Airport people identity authentication management system based on face recognition |
CN204155327U (en) * | 2014-09-01 | 2015-02-11 | 上海智达商投资管理合伙企业(有限合伙) | A kind of visiting personnel based on recognition of face register checking device |
CN108009413A (en) * | 2017-12-27 | 2018-05-08 | 浪潮金融信息技术有限公司 | The personal identification method and device of self-aided terminal, computer-readable storage medium, terminal |
-
2018
- 2018-05-22 CN CN201810496634.9A patent/CN108875582A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003042854A1 (en) * | 2001-11-05 | 2003-05-22 | The Maitland Company | Methods and systems for associating an identity of a sender with a parcel sent via a courier |
WO2004008379A2 (en) * | 2002-06-17 | 2004-01-22 | Mason Ricardo Storm | Identity verification |
CN101290686A (en) * | 2008-06-05 | 2008-10-22 | 杨子江 | Self-help remote ticket-buying, fetching system possessing personal identification and its method |
CN101551921A (en) * | 2009-05-20 | 2009-10-07 | 朱少波 | Quick passing method based on second-generation identification card |
CN102497533A (en) * | 2011-12-01 | 2012-06-13 | 中科芯集成电路股份有限公司 | Video monitoring system capable of collecting information of second generation identity card |
CN103714431A (en) * | 2013-12-26 | 2014-04-09 | 苏州清研微视电子科技有限公司 | Airport people identity authentication management system based on face recognition |
CN204155327U (en) * | 2014-09-01 | 2015-02-11 | 上海智达商投资管理合伙企业(有限合伙) | A kind of visiting personnel based on recognition of face register checking device |
CN108009413A (en) * | 2017-12-27 | 2018-05-08 | 浪潮金融信息技术有限公司 | The personal identification method and device of self-aided terminal, computer-readable storage medium, terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741490A (en) * | 2018-12-17 | 2019-05-10 | 景安大数据科技有限公司 | A kind of identity checking method and its device |
CN109993866A (en) * | 2019-03-14 | 2019-07-09 | 西安艾润物联网技术服务有限责任公司 | Flap turnstile control method and system based on mobile management terminal |
CN110298243A (en) * | 2019-05-22 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Testimony verification method, apparatus, computer equipment and computer readable storage medium |
CN110795714A (en) * | 2019-09-10 | 2020-02-14 | 中国平安财产保险股份有限公司 | Identity authentication method and device, computer equipment and storage medium |
CN110570568A (en) * | 2019-09-12 | 2019-12-13 | 山东浪潮商用系统有限公司 | tax handling system and method based on non-sensory face recognition |
CN110570568B (en) * | 2019-09-12 | 2021-10-15 | 山东浪潮商用系统有限公司 | Tax handling system and method based on non-sensory face recognition |
CN113011339A (en) * | 2021-03-19 | 2021-06-22 | 支付宝(杭州)信息技术有限公司 | User identity verification method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108833359A (en) | Auth method, device, equipment, storage medium and program | |
CN108875582A (en) | Auth method, device, equipment, storage medium and program | |
CN108229120A (en) | Face unlock and its information registering method and device, equipment, program, medium | |
EP3493088B1 (en) | Security gesture authentication | |
US9146668B2 (en) | Graphical element placement on a display surface | |
TWI684886B (en) | Method and device for generating security problems and identity verification | |
CN108399665A (en) | Method for safety monitoring, device based on recognition of face and storage medium | |
US9412017B1 (en) | Methods systems and computer program products for motion initiated document capture | |
US10846514B2 (en) | Processing images from an electronic mirror | |
US9633272B2 (en) | Real time object scanning using a mobile phone and cloud-based visual search engine | |
CN108171137B (en) | Face recognition method and system | |
CN110135262A (en) | The anti-peeping processing method of sensitive data, device, equipment and storage medium | |
CN108734003A (en) | Auth method, device, equipment, storage medium and program | |
CN108805005A (en) | Auth method and device, electronic equipment, computer program and storage medium | |
CN109271915A (en) | False-proof detection method and device, electronic equipment, storage medium | |
CN109635021A (en) | A kind of data information input method, device and equipment based on human testing | |
CN107247936A (en) | Image-recognizing method and device | |
CA3049042A1 (en) | System and method for authenticating transactions from a mobile device | |
CN105894042A (en) | Method and apparatus for detecting whether document image is covered | |
CN111241873A (en) | Image reproduction detection method, training method of model thereof, payment method and payment device | |
US10958661B2 (en) | Multi-layer authentication system with selective level access control | |
EP3786820A1 (en) | Authentication system, authentication device, authentication method, and program | |
Singh et al. | Face recognition using open source computer vision library (OpenCV) with python | |
US20240028698A1 (en) | System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration | |
CN107656959A (en) | A kind of message leaving method, device and message equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |
|
RJ01 | Rejection of invention patent application after publication |