Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 is a schematic flow chart of an implementation of a face recognition method according to an embodiment of the present invention, and for convenience of description, only a part related to the embodiment of the present invention is shown. The execution main body of the embodiment of the invention can be terminal equipment. As shown in fig. 1, the method may include the steps of:
step S101: the method comprises the steps of obtaining a first user information set of a plurality of first users to be recognized, wherein the first user information set comprises user identification marks of the first users to be recognized, first pictures and second pictures, the first pictures are face pictures of the first users to be recognized, which are shot on site, and the second pictures are identification card pictures of the first users to be recognized, which are shot on site.
In the embodiment of the invention, the user identity can be the identity card number of the first user to be identified, and can also be other identity which can uniquely distinguish the first user to be identified. The first picture and the second picture can be pictures taken by field workers, and can also be pictures taken by the first user to be identified through the self-service equipment. The first picture is a clear picture which is shot on site and can clearly see the face of the first user to be recognized; the second picture is a clear picture which is taken on site and can clearly see the picture on the identity card of the first user to be identified.
The first user information set can also comprise information such as name, mobile phone number, unit name, application service category and the like.
Step S102: and acquiring credit records of a plurality of first users to be identified according to the user identity, and determining credit values of the plurality of first users to be identified according to the credit records.
In the embodiment of the invention, the terminal device can query the peripheral channel system according to the user identity of each first user to be identified, and obtain the credit record of each first user to be identified. The peripheral channel system may be one or more of an insurance system, a crediting system, and a buying-and-drawing system. The credit record may include the category to which the transaction belongs, the amount of money of the transaction, the amount of outstanding payments of the transaction, and the like.
The credit value is used for measuring the credit degree of the first user to be identified, and the credit value of the first user to be identified can be determined according to the credit record.
Step S103: and screening out a plurality of second users to be identified, of which the corresponding credit values exceed a preset credit threshold value, from the plurality of first users to be identified.
In the embodiment of the invention, the first user to be identified, the reputation value of which exceeds the preset reputation threshold value, is called as the second user to be identified, and the second user to be identified is the user with better credit.
In the financial industry, the loan and loan services applied by some users with poor credit generally do not pass, so that the users with poor credit can be removed in advance without face recognition for identity verification, the workload of face recognition is reduced, and the efficiency is improved.
The preset credit threshold value can be set according to actual requirements. For example, the reputation value of a user without a bad credit record is 1, the lower the reputation value of the user with the worse credit is, the preset reputation threshold value may be set to 0.6, and a plurality of second users to be identified whose corresponding reputation values exceed 0.6 are screened out from the plurality of first users to be identified.
Step S104: and acquiring a third photo of each second user to be identified, wherein the third photo is a photo of each second user to be identified on an identity card stored in the public security system.
In the embodiment of the present invention, the terminal device obtains the third photos of each second user to be identified in batch through the identity information interface ID5, if the third photo of a certain second user to be identified fails to be obtained this time, the task that failed to be obtained is added to the failed task pool, and when the third photos are obtained in batch through the identity information interface ID5 next time, the tasks in the failed task pool are added to the batch obtaining task this time until the task that failed to be obtained obtains the third photos again.
Step S105: and comparing the first photo, the second photo and the third photo of each second user to be recognized to obtain a face recognition result of each second user to be recognized.
In the embodiment of the invention, the face recognition result of each user to be recognized is obtained by comparing the three photos of each second user to be recognized.
The embodiment of the invention obtains the user information of the user to be recognized in batch, screens the user to be recognized with good credit record in advance, removes the user to be recognized with poor credit record, reduces the workload of face recognition later, improves the face recognition efficiency, compares the face picture of the user to be recognized, the identity card picture shot on site and the picture stored in the public security system, can determine whether the identity card picture of the user to be recognized is consistent with the picture in the public security system, can also determine whether the face picture shot on site is consistent with the identity card picture or the picture in the public security system, and can improve the accuracy of face recognition.
Fig. 2 is a schematic flow chart illustrating an implementation of a face recognition method according to another embodiment of the present invention. As shown in fig. 2, on the basis of the above embodiment, step S105 may include the following steps:
step S201: and comparing the second photo and the third photo of each second user to be identified to obtain a first comparison score of each second user to be identified.
In the embodiment of the invention, the second picture and the third picture are compared, whether the picture of the identity card shot on site is consistent with the picture on the identity card stored in the public security system or not is judged, and the first comparative value is obtained.
Before comparing the second picture and the third picture of each second user to be identified, the method may further include: and preprocessing the second photo and the third photo of each second user to be recognized, wherein the preprocessing comprises extracting the photo of the face part, and performing illumination compensation, gray level equalization, noise reduction and definition improvement on the extracted photo of the face part.
Step S202: and comparing the first contrast score of each second user to be identified with a preset contrast threshold value.
In the embodiment of the invention, the preset comparison threshold value can be set according to actual requirements. For example, if the full score of the comparison score is 100, the preset comparison threshold may be set to 90.
If the first comparison score of the second user to be identified is greater than or equal to the preset comparison threshold, the second photo and the third photo of the second user to be identified are successfully compared; and if the first comparison score of the second user to be identified is smaller than the preset comparison threshold, the comparison between the second photo and the third photo of the second user to be identified fails. If the comparison between the second photo and the third photo of the second user to be recognized fails, it indicates that the identity card photo taken on site by the second user to be recognized is inconsistent with the photo on the identity card stored in the public security system, and the identity card provided by the second user to be recognized has a problem, so that the face recognition result of the second user to be recognized is determined to be the recognition failure, and the next comparison between the first photo and the second photo of the second user to be recognized is not needed, or the first photo and the third photo of the second user to be recognized are compared, so that the face recognition efficiency can be improved.
Step S203: if the target second user to be recognized with the first comparison score value larger than or equal to the preset comparison threshold value exists, comparing the first photo and the second photo of the target second user to be recognized, or comparing the first photo and the third photo of the target second user to be recognized to obtain a second comparison score of the target second user to be recognized.
In the embodiment of the invention, the second user to be identified, of which the first comparison score is greater than or equal to the preset comparison threshold value, is called a target second user to be identified. If the target second user to be recognized exists, which indicates that the comparison between the identity card picture shot on site of the target second user to be recognized and the picture stored in the identity card in the public security system is successful, comparing the face picture shot on site of the target second user to be recognized with the identity card picture shot on site, or comparing the face picture shot on site of the target second user to be recognized with the picture stored in the identity card in the public security system, so as to obtain a second comparison score of the target second user to be recognized.
Before comparing the first photo and the second photo of the target second user to be recognized, or comparing the first photo and the third photo of the target second user to be recognized, preprocessing is firstly carried out on the first photo, wherein the preprocessing comprises the steps of extracting the photo of the face part, and carrying out illumination compensation and gray level equalization, noise reduction and definition improvement on the extracted photo of the face part.
Step S204: and if the second comparison score of the target second user to be recognized is greater than or equal to the preset comparison threshold, the face recognition result of the target second user to be recognized is recognition success, otherwise, the face recognition result of the target second user to be recognized is recognition failure.
The embodiment of the invention firstly compares the second photo and the third photo of the second user to be identified, can judge whether the identity card provided by the second user to be identified is correct, and does not need to compare the next photos if the identity card provided by the second user to be identified is incorrect; if the second photo and the third photo of the second user to be recognized are successfully compared, the first photo and the second photo of the second user to be recognized are compared, or the first photo and the third photo of the second user to be recognized are compared, so that the accuracy of face recognition can be improved.
As another embodiment of the present invention, on the basis of the above embodiment, the step S105 may further include the steps of:
and if the face recognition result of the target second user to be recognized is recognition failure, sending the first picture, the second picture, the third picture, the first comparison score and the second comparison score to the display terminal, so that the display terminal reminds an auditor to compare the first picture, the second picture and the third picture, and obtaining a final comparison result.
And receiving a final comparison result sent by the display terminal, and taking the final comparison result as a final face recognition result of the target second user to be recognized.
In the embodiment of the invention, if the face recognition result of the target second user to be recognized is recognition failure, a manual review link is added, a reviewer compares the first picture, the second picture and the third picture, and refers to the first comparison score and the second comparison score to obtain a manual review result, the manual review result is called a final comparison result, and the final comparison result is used as a final face recognition result of the target second user to be recognized. The embodiment of the invention can further improve the accuracy of face recognition by adding a link of manual review.
Fig. 3 is a schematic flow chart illustrating an implementation of a face recognition method according to still another embodiment of the present invention. As shown in fig. 3, on the basis of the foregoing embodiment, in the foregoing step S102, the process of determining reputation values of a plurality of first users to be identified according to a credit record may include the following steps:
step S301: it is determined from the credit records whether each first to-be-identified user has a bad credit record.
In the embodiment of the invention, whether each first user to be identified has a bad credit record can be judged according to the overdue unpaid amount of the transaction in each credit record. And if the overdue non-repayment amount of the transaction in the credit record is not zero, the credit record is a bad credit record. And if the overdue unpaid money amount of the transaction is zero in each credit record of the first to-be-identified user, the first to-be-identified user has no bad credit record, and otherwise, the first to-be-identified user has a bad credit record.
Step S302: and if the target first to-be-identified user with the bad credit record exists, determining the category to which the bad credit record of the target first to-be-identified user belongs, and acquiring the weight coefficient corresponding to each category and the sum of the bad credit record of each category according to the category to which the bad credit record belongs.
In the embodiment of the invention, the first to-be-identified user with the bad credit record is called a target first to-be-identified user. The category to which the bad credit record belongs may be a house credit, a car credit, or the like, or may be divided into other categories as necessary. Each category has a preset corresponding weight coefficient, and the weight coefficient corresponding to each category can be obtained according to the category to which the bad credit record belongs. And adding the sum of the overdue non-repayment amount of the transaction in the bad credit record to the sum of the bad credit records in the bad credit record corresponding to each category to obtain the sum of the bad credit records in each category.
Step S303: and obtaining the total sum of the bad credit records of the target first user to be identified according to the weight coefficient corresponding to each category and the sum of the bad credit records of each category.
In the embodiment of the invention, the product of the weight coefficient corresponding to a certain category and the sum of the bad credit records of the category is the total sum of the bad credit records of the category, and the total sum of the bad credit records of each category of the target first user to be identified is added to obtain the total sum of the bad credit records of the target first user to be identified.
Step S304: and acquiring the total amount of the transaction in the credit record of the target first user to be identified.
In the embodiment of the invention, the sum of the transaction amount in each credit record of the target first user to be identified is added to obtain the total amount of the transaction in the credit record of the target first user to be identified.
Step S305: and determining the credit value of the target first user to be identified according to the total sum of the bad credit records and the total sum of the transactions in the credit records.
In an embodiment of the present invention, the total amount of the transactions in the credit record minus the total amount of the bad credit record is an intermediate value, and a ratio of the intermediate value to the total amount of the transactions in the credit record is a reputation value of the target first user to be identified.
As another embodiment of the present invention, acquiring a first user information set of a plurality of first users to be identified includes:
directly acquiring a first user information set of a plurality of first users to be identified; or acquiring a contract identifier of the contract signed by each first user to be identified, and searching user information corresponding to the contract identifier of the contract signed by each first user to be identified from the database to obtain a first user information set.
In the embodiment of the invention, the terminal device may directly obtain the first user information sets of the first users to be identified, or may also search the contract identifier of the contract signed by each first user to be identified, and then search the user information corresponding to the contract identifier of the contract signed by each first user to be identified from the database, so as to obtain the first user information sets. The contract identifier may be a contract number of a contract that is signed by the first user to be identified when transacting a financial service, such as a loan service.
The embodiment of the invention can also monitor each face recognition task in real time, such as recording the starting time and the ending time of each face recognition task, and recording the success rate, the failure rate and other information of the face recognition task.
The embodiment of the invention can simplify the butt joint mode of the face recognition task and other tasks to the maximum extent, and can ensure quick access when a new face recognition task exists.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Fig. 4 is a schematic block diagram of a face recognition system according to an embodiment of the present invention, and for convenience of description, only the portions related to the embodiment of the present invention are shown.
In the embodiment of the present invention, the face recognition system 4 includes:
the user information acquiring module 41 is configured to acquire a first user information set of a plurality of first users to be identified, where the first user information set includes user identifiers of the plurality of first users to be identified, first photos and second photos, where the first photos are face photos of the plurality of first users to be identified taken on site, and the second photos are identification card photos of the plurality of first users to be identified taken on site;
the credit record acquisition module 42 is configured to acquire credit records of the first users to be identified according to the user identity, and determine credit values of the first users to be identified according to the credit records;
the screening module 43 is configured to screen out, from the first users to be identified, a plurality of second users to be identified whose corresponding reputation values exceed a preset reputation threshold;
a third photo obtaining module 44, configured to obtain a third photo of each second user to be identified, where the third photo is a photo of each second user to be identified on an identity card stored in the public security system;
and the comparison module 45 is configured to compare the first photo, the second photo, and the third photo of each second user to be recognized to obtain a face recognition result of each second user to be recognized.
Optionally, the comparison module 45 comprises:
the first comparison unit is used for comparing the second photo and the third photo of each second user to be identified to obtain a first comparison score of each second user to be identified;
the comparison unit is used for comparing the first contrast score of each second user to be identified with a preset contrast threshold value;
the second comparison unit is used for comparing the first photo and the second photo of the target second user to be recognized if the target second user to be recognized exists, wherein the first comparison score is larger than or equal to the preset comparison threshold, or comparing the first photo and the third photo of the target second user to be recognized to obtain a second comparison score of the target second user to be recognized;
and the recognition result confirming unit is used for confirming that the face recognition result of the target second user to be recognized is successful if the second comparison score of the target second user to be recognized is greater than or equal to the preset comparison threshold, or confirming that the face recognition result of the target second user to be recognized is failed.
Optionally, the comparison module 45 further comprises:
the sending unit is used for sending the first picture, the second picture, the third picture, the first comparison score and the second comparison score to the display terminal if the face recognition result of the target second user to be recognized is recognition failure, so that the display terminal can remind an auditor to compare the first picture, the second picture and the third picture, and a final comparison result can be obtained;
and the receiving unit is used for receiving the final comparison result sent by the display terminal and taking the final comparison result as the final face recognition result of the target second user to be recognized.
Optionally, the credit record obtaining module 42 further includes:
a first determining unit, which is used for determining whether each first to-be-identified user has bad credit records according to the credit records;
the second determining unit is used for determining the category to which the bad credit record of the target first user to be identified belongs if the target first user to be identified with the bad credit record exists, and acquiring the weight coefficient corresponding to each category and the sum of the bad credit record of each category according to the category to which the bad credit record belongs;
the calculating unit is used for obtaining the total sum of the bad credit records of the target first user to be identified according to the weight coefficient corresponding to each category and the sum of the bad credit records of each category;
the first acquisition unit is used for acquiring the total amount of transaction in the credit record of the target first user to be identified;
and the third determining unit is used for determining the credit value of the target first user to be identified according to the total sum of the bad credit records and the total sum of the transactions in the credit records.
Optionally, the user information obtaining module 41 further includes:
the second acquisition unit is used for directly acquiring a first user information set of a plurality of first users to be identified; or the like, or, alternatively,
and the third acquisition unit is used for acquiring the contract identifier of the contract signed by each first user to be identified, and searching the user information corresponding to the contract identifier of the contract signed by each first user to be identified from the database to obtain a first user information set.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing functional units and modules are merely illustrated in terms of division, and in practical applications, the foregoing functional allocation may be performed by different functional units and modules as needed, that is, the internal structure of the face recognition system is divided into different functional units or modules to perform all or part of the above described functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the above-mentioned apparatus may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Fig. 5 is a schematic block diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 5, the terminal device 5 of this embodiment includes: one or more processors 50, a memory 51 and a computer program 52 stored in said memory 51 and executable on said processors 50. The processor 50, when executing the computer program 52, implements the steps in the above-described embodiments of the face recognition method, such as the steps S101 to S105 shown in fig. 1. Alternatively, the processor 50, when executing the computer program 52, implements the functions of the modules/units in the above-described embodiment of the face recognition system, such as the functions of the modules 41 to 45 shown in fig. 4.
Illustratively, the computer program 52 may be partitioned into one or more modules/units, which are stored in the memory 51 and executed by the processor 50 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 52 in the terminal device 5. For example, the computer program 52 may be divided into a user information acquisition module, a credit record acquisition module, a filtering module, a third photo acquisition module, and a comparison module.
The system comprises a user information acquisition module, a recognition module and a recognition module, wherein the user information acquisition module is used for acquiring a first user information set of a plurality of first users to be recognized, and the first user information set comprises user identification marks, first pictures and second pictures of the plurality of first users to be recognized, the first pictures are face pictures of the plurality of first users to be recognized which are shot on site, and the second pictures are identity card pictures of the plurality of first users to be recognized which are shot on site;
the credit record acquisition module is used for acquiring credit records of a plurality of first users to be identified according to the user identity marks and determining credit values of the plurality of first users to be identified according to the credit records;
the screening module is used for screening a plurality of second users to be identified, of which the corresponding credit values exceed a preset credit threshold value, from the plurality of first users to be identified;
the third photo obtaining module is used for obtaining a third photo of each second user to be identified, wherein the third photo is a photo of each second user to be identified on an identity card stored in the public security system;
and the comparison module is used for comparing the first photo, the second photo and the third photo of each second user to be recognized to obtain a face recognition result of each second user to be recognized.
Other modules or units can refer to the description of the embodiment shown in fig. 4, and are not described again here.
The terminal device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The terminal device 5 includes, but is not limited to, a processor 50 and a memory 51. It will be understood by those skilled in the art that fig. 5 is only one example of a terminal device, and does not constitute a limitation to terminal device 5, and may include more or less components than those shown, or combine some components, or different components, for example, terminal device 5 may also include an input device, an output device, a network access device, a bus, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may be an internal storage unit of the terminal device, such as a hard disk or a memory of the terminal device. The memory 51 may also be an external storage device of the terminal device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device. Further, the memory 51 may also include both an internal storage unit of the terminal device and an external storage device. The memory 51 is used for storing the computer program 52 and other programs and data required by the terminal device. The memory 51 may also be used to temporarily store data that has been output or is to be output.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed face recognition system and method can be implemented in other ways. For example, the above-described embodiments of the face recognition system are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.