CN109660509A - Login method, device, system and storage medium based on recognition of face - Google Patents

Login method, device, system and storage medium based on recognition of face Download PDF

Info

Publication number
CN109660509A
CN109660509A CN201811267668.7A CN201811267668A CN109660509A CN 109660509 A CN109660509 A CN 109660509A CN 201811267668 A CN201811267668 A CN 201811267668A CN 109660509 A CN109660509 A CN 109660509A
Authority
CN
China
Prior art keywords
face
facial image
user
identity information
subscriber identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811267668.7A
Other languages
Chinese (zh)
Inventor
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201811267668.7A priority Critical patent/CN109660509A/en
Publication of CN109660509A publication Critical patent/CN109660509A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention provides a kind of login method based on recognition of face, device, system and storage mediums, this method comprises: receiving the brush face logging request of user, and obtain the real-time face image of user;The corresponding with the subscriber identity information of typing in face database, which is extracted, using the subscriber identity information of the user refers to facial image;Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.Login method based on recognition of face, device, system and storage medium of the invention is extracted corresponding with reference to facial image in face database using subscriber identity information, and it is compared with real-time face image to judge whether to login successfully, it is compared without traversing entire face database, improves login efficiency.

Description

Login method, device, system and storage medium based on recognition of face
Technical field
The present invention relates to technical field of face recognition, relate more specifically to a kind of login method based on recognition of face, dress It sets, system and storage medium.
Background technique
Traditional network account protected mode is username and password login mode.User is when inputting registration on terminating machine Username and password for system host store, system host analyze and determine user input username and password, differentiate user Whether the information inputted from terminating machine is correct, and only when username and password is correct, user could grant into own information Resource space.The disadvantage is that: security of system is low, after password and user name are obtained by other people, letter that legitimate user is possessed Breath resource space will be stolen.
In order to facilitate user's operation, more and more mobile application softwares are logged in using face recognition technology, this Login mode is referred to as the login of brush face.Existing brush face logs in the comparison using 1:n formula, that is, will be in face database In go traversal one time, find the qualified face of comparison.As the volume of face database constantly increases, such 1:n formula Comparison has seriously affected the efficiency of brush face login.
Summary of the invention
The invention proposes a kind of login schemes based on recognition of face, are extracted using the subscriber identity information of the user It is corresponding in face database to refer to facial image, and the real-time face image of user and the reference facial image are carried out Comparison is to determine whether login successfully, to improve login efficiency.It is briefly described below proposed by the present invention about based on people The login scheme of face identification, more details will be described in a specific embodiment in subsequent combination attached drawing.
According to an aspect of the present invention, a kind of login method based on recognition of face is provided, which comprises receive and use The brush face logging request at family, and obtain the real-time face image of user;Face is extracted using the subscriber identity information of the user The corresponding with the subscriber identity information of typing refers to facial image in database;According to the real-time face image and institute It states and judges whether to login successfully with reference to the similarity between facial image.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
In one embodiment, before the brush face logging request for receiving user, further includes: judge the face database In facial image whether is referred to described in typing, if non-typing, facial image is referred to described in typing.
It in one embodiment, include: reception registration request with reference to facial image described in the typing;It is registered described in typing The entrained facial image of request, which is used as, refers to facial image, and establishes and described taken with reference to facial image and the registration request The mapping relations between the subscriber identity information of band.
It in one embodiment, include: the common logging request for receiving user with reference to facial image described in the typing;It tests Demonstrate,prove login password entrained by the common logging request;If described be verified, the facial image of user is obtained;Typing institute It states facial image to be used as with reference to facial image, and establishes user's body with reference to entrained by facial image and the logging request The mapping relations between part information.
In one embodiment, described according to the real-time face image and the similarity with reference between facial image If judging whether to login successfully includes: that the real-time face image and the similarity with reference between facial image are greater than or wait In similarity threshold, then judgement logs in success;If the real-time face image and the similarity with reference between facial image Less than similarity threshold, then judgement logs in failure.
According to a further aspect of the invention, a kind of entering device based on recognition of face is provided, described device includes: to obtain Module, the request brush face for receiving user logs in, and obtains the real-time face image of user;Extraction module, for using institute The subscriber identity information for stating user extracts the reference man corresponding with the subscriber identity information of institute's typing in face database Face image;And contrast module, for being sentenced according to the real-time face image and the similarity with reference between facial image It is disconnected whether to login successfully.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
Another aspect according to the present invention provides a kind of login system based on recognition of face, and the system comprises storages Device and processor are stored with the computer program run by the processor, the computer program on the storage device The login method described in any of the above embodiments based on recognition of face is executed when being run by the processor.
According to a further aspect of the present invention, a kind of storage medium is provided, is stored with computer program on the storage medium, The computer program executes the login method described in any of the above embodiments based on recognition of face at runtime.
Login method based on recognition of face, device, system and storage medium of the invention is mentioned using subscriber identity information Take it is corresponding with reference to facial image in face database, and compare with real-time face image with judge whether to log at Function compares without traversing entire face database, improves login efficiency.
Detailed description of the invention
The embodiment of the present invention is described in more detail in conjunction with the accompanying drawings, the above and other purposes of the present invention, Feature and advantage will be apparent.Attached drawing is used to provide to further understand the embodiment of the present invention, and constitutes explanation A part of book, is used to explain the present invention together with the embodiment of the present invention, is not construed as limiting the invention.In the accompanying drawings, Identical reference label typically represents same parts or step.
Fig. 1 shows for realizing the login method according to an embodiment of the present invention based on recognition of face, device, system and deposits The schematic block diagram of the example server of storage media;
Fig. 2 shows the schematic flow charts of the login method according to an embodiment of the present invention based on recognition of face;
Fig. 3 shows another schematic flow chart of the login method according to an embodiment of the present invention based on recognition of face;
Fig. 4 shows the schematic block diagram of the entering device according to an embodiment of the present invention based on recognition of face;And
Fig. 5 shows schematic block diagram according to the system in the embodiment of the present invention.
Specific embodiment
In order to enable the object, technical solutions and advantages of the present invention become apparent, root is described in detail below with reference to accompanying drawings According to example embodiments of the present invention.Obviously, described embodiment is only a part of the embodiments of the present invention, rather than this hair Bright whole embodiments, it should be appreciated that the present invention is not limited by example embodiment described herein.Based on described in the present invention The embodiment of the present invention, those skilled in the art's obtained all other embodiment in the case where not making the creative labor It should all fall under the scope of the present invention.
Firstly, referring to Fig.1 come describe the login method based on recognition of face for realizing the embodiment of the present invention, device, System and the example server of storage medium 100.
As shown in Figure 1, server 100 includes one or more processors 102, one or more storage devices 104, input Device 106, output device 108 and communication device 110, the company that these components pass through bus system 112 and/or other forms The interconnection of connection mechanism (not shown).It should be noted that the component and structure of server 100 shown in FIG. 1 are only exemplary, rather than limit Property processed, as needed, the server also can have other assemblies and structure.
The processor 102 can be central processing unit (CPU), graphics processing unit (GPU) or have at data The processing unit of reason ability and/or the other forms of instruction execution capability, and can control other in the server 100 Component is to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy The property lost memory for example may include random access memory (RAM) and/or cache memory (cache) etc..It is described non- Volatile memory for example may include read-only memory (ROM), hard disk, flash memory etc..In the computer readable storage medium On can store one or more computer program instructions, processor 102 can run described program instruction, to realize hereafter institute The server side functionality and/or other desired functions (realized by processor) in the embodiment of the present invention stated.Described Can also store various application programs and various data in computer readable storage medium, for example, the application program use and/ Or various data generated etc..
The operator that the input unit 106 can be server end is used to input the device of instruction, and may include One or more of keyboard, mouse, microphone and touch screen etc..Described instruction is, for example, to accept or reject the finger for uploading image It enables.
The output device 108 can export various information (such as image to external (such as operator of server end) Or sound), and may include one or more of display, loudspeaker etc..
The wired or wireless communication between terminal device may be implemented in the communication device 110.
It should be noted that the component and structure of server 100 shown in FIG. 1 are only exemplary, although shown in fig. 1 Server 100 include multiple and different devices, but as needed, some of which device can not be it is necessary, it is therein The quantity of some devices can be more etc., and the present invention does not limit this.
Exemplary terminal equipment for realizing client in the embodiment of the present invention include one or more processors, one or Multiple storage devices, input unit, output device, communication device and image collecting device, these components pass through bus system And/or bindiny mechanism's interconnection of other forms.It should be noted that the component and structure of the terminal device are only exemplary, and Unrestricted, as needed, the terminal device also can have other assemblies and structure.Illustratively, for realizing root It may be implemented as such as smart phone, tablet computer, notebook type according to the exemplary terminal equipment of client in the present invention to calculate Machine, desktop PC etc..
In the following, reference Fig. 2 is described the login method 200 according to an embodiment of the present invention based on recognition of face.Such as Fig. 2 institute Show, the login method 200 based on recognition of face may include steps of:
In step S210, the brush face logging request of user is received, and obtains the real-time face image of user.
Illustratively, it when the brush face login function of terminal device is opened, shows brush face login interface, receives the use of user Family identity information can for example echo user name used in user's last login into the input frame of user name;When user selects After brush face logs in, then brush face logging request, the received server-side brush face logging request are sent to server end, and obtain visitor The real-time face image of subscriber identity information and user that family end is sent.If the brush face login function of terminal device is not opened, Brush face login interface is hidden, shows common login interface.Wherein, it is the login side based on recognition of face that the brush face, which logs in, Formula, it is described commonly to log on as the login mode for being not based on recognition of face.
Wherein, the image collecting device facial image collected that the real-time face image can be terminal device, figure As acquired image is transmitted to the processor of terminal device by acquisition device, and server is sent to by communication device.It is real When facial image terminal device can also be transmitted to by external equipment.
Illustratively, after starting to carry out Face datection, it can show that countdown prompts and starts to sweep on the terminal device The facial image occurred in camera is retouched, if not scanning facial image, prompts user that face is moved in screen; If detecting multiple faces, prompts user to detect multiple faces, please retry;If it times out, stopping scanning, operation is prompted Time-out prompts user to retry;If In vivo detection success, returns to the data of facial image, and takes user name initiation login and ask It asks, wherein the facial image can be the data of base64 format.
The photo, picture etc. of invalid user stealing legitimate user comes through face verification in order to prevent, in Face datection mistake It further include that In vivo detection is carried out to the facial image in journey, judgement show whether the facial image is true face.Wherein, institute It states In vivo detection and can be and the In vivo detection modes of movements such as nodded, shake the head, open one's mouth by voice or text prompt user, It is also possible to any other suitable In vivo detection mode.The In vivo detection is the prior art, and details are not described herein again.
As shown in figure 3, according to embodiments of the present invention, before the brush face logging request for receiving user, first determining whether face Whether typing is corresponding with the subscriber identity information in database refers to facial image.If typing, terminal is set It is standby to open brush face login function, received server-side brush face logging request.If non-typing, terminal device is not turned on brush face and steps on Recording function refers to facial image described in server end typing first.After typing refers to facial image, then terminal device opens brush Face login function, user show brush face login interface on the terminal device when logging in next time.
It in one embodiment, is the typing after common login mode logs in successfully with reference to facial image.It is general in progress When logical login, client shows common login interface, and receives the subscriber identity information and login password of user's input, the user Information can be the user name that user inputs in input frame, or echoes and use used in user's last login in input frame Name in an account book.Then, client carries subscriber identity information and login password to server end transmission by wired or wireless network Common logging request.The common logging request of received server-side verifies login password entrained by the common logging request; If being verified, the facial image of user is obtained by client, then facial image described in typing, which is used as, refers to face figure Picture, and establish the mapping with reference to facial image between subscriber identity information entrained by the common logging request and close System.
In one embodiment, the common login mode is user name password login mode.In other embodiments, institute State common login mode be also possible to fingerprint log in, gesture log in etc. other be not based on the login mode of recognition of face, the present invention It is without limitation.
It in another embodiment, is typing when registering with reference to facial image.Illustratively, user can be on the terminal device Enrollment form is opened, and inputs information to be registered, the information to be registered includes at least subscriber identity information, log-in password And facial image;Client sends the registration request for carrying registration information by wired or wireless network to server end;Service After device end receives registration request, may first verify that whether subscriber identity information is registered, if unregistered, typing registration request Entrained facial image, which is used as, refers to facial image, and establishes described with reference to entrained by facial image and the registration request The mapping relations between subscriber identity information.
It is extracting institute's typing in face database with the use using the subscriber identity information of the user in step S220 Family identity information is corresponding to refer to facial image.
According to an embodiment of the invention, then extracting face using subscriber identity information after server-side receives logging request The corresponding with the subscriber identity information of prior typing refers to facial image in database.
As described above, being previously stored with the subscriber identity information with mapping relations and reference man in the face database Face image.After obtaining logging request, then using the subscriber identity information of the user according to the mapping relations from described It is extracted in face database corresponding with the subscriber identity information with reference to facial image.
In step S230, judged whether according to the real-time face image and the matching degree with reference between facial image It logins successfully.
Specifically, the first eigenvector of real-time face image can be extracted by feature extraction network, and extract reference The second feature vector of facial image calculates the similarity between first eigenvector and second feature vector, similar according to this Degree determines whether to belong to same people.Illustratively, this feature extraction network can be existing at present for carrying out feature extraction Convolutional neural networks, which is not described herein again.
Illustratively, the distance between first eigenvector and second feature vector can be calculated to calculate similarity.Example Such as, which can be any one of Euclidean distance, COS distance, mahalanobis distance etc., or can be other distances, this hair It is bright that this is not limited.After calculating distance, similarity can be calculated according to this distance.It as an example, can be by the calculating Obtained distance is directly as similarity.As another example, similarity can be calculated again on the basis of obtaining distance.Meter Calculating obtained similarity can be the value between 0~1.
If obtained similarity is greater than or equal to similarity threshold, can determine by real-time face image and reference man Face image belongs to same people, and server end, which issues, logs in successful message;If obtained similarity is less than similarity threshold, It can determine by real-time face image and be not belonging to same people with reference to facial image, server end, which issues, logs in failure news. Wherein, similarity threshold can be set according to the actual situation in practical applications, such as can be according to the security level of system Similarity threshold is set, and the high system of security level required needs to preset high matching degree threshold value, and the present invention does not limit this.
Login method according to an embodiment of the present invention based on recognition of face uses user's body when carrying out the login of brush face Part information extracts the reference facial image of prior typing in face database, and by real-time face image and refers to facial image It compares, searches for similar facial image without traversing face database, avoid the volume of face database to brush The operating characteristics that face logs in adversely affects, to ensure that the efficiency of login, and not will increase operating cost.
The login method according to an embodiment of the present invention based on recognition of face is described above exemplarily.Illustratively, Login method according to an embodiment of the present invention based on recognition of face can with memory and processor unit or It is realized in person's system.
It should be noted that the login method based on recognition of face provided by the embodiment of the present invention is generally held by server Row, correspondingly, following entering devices based on recognition of face are generally positioned in server.
The entering device based on recognition of face of another aspect of the present invention offer is described below with reference to Fig. 4.Fig. 4 shows root According to the schematic block diagram of the entering device 400 based on recognition of face of the embodiment of the present invention.
As shown in figure 4, device 400 according to an embodiment of the present invention includes obtaining module 410, extraction module 420 and comparison Module 430.Module 410, extraction module 420 and the contrast module 430 of obtaining can be executed respectively above in conjunction with Fig. 2 description Each step/function of login method based on recognition of face.Only the major function of each module of device 400 is retouched below It states, and omits the detail content having been described above.
The brush face logging request that module 410 is used to receive user is obtained, and obtains the real-time face image of user.
Illustratively, it when the brush face login function of terminal device is opened, shows brush face login interface, receives the use of user Family identity information can for example echo user name used in user's last login into the input frame of user name;When user selects After brush face logs in, then brush face logging request, the received server-side brush face logging request are sent to server end, and obtain visitor The real-time face image of subscriber identity information and user that family end is sent.If the brush face login function of terminal device is not opened, Brush face login interface is hidden, shows common login interface.Wherein, it is the login side based on recognition of face that the brush face, which logs in, Formula, it is described commonly to log on as the login mode for being not based on recognition of face.
Wherein, the image collecting device facial image collected that the real-time face image can be terminal device, figure As acquired image is transmitted to the processor of terminal device by acquisition device, and server is sent to by communication device.It is real When facial image terminal device can also be transmitted to by external equipment.
Illustratively, after starting to carry out Face datection, it can show that countdown prompts and starts to sweep on the terminal device The facial image occurred in camera is retouched, if not scanning facial image, prompts user that face is moved in screen; If detecting multiple faces, prompts user to detect multiple faces, please retry;If it times out, stopping scanning, operation is prompted Time-out prompts user to retry;If In vivo detection success, returns to the data of facial image, and takes user name initiation login and ask It asks, wherein the facial image can be the data of base64 format.
The photo, picture etc. of invalid user stealing legitimate user comes through face verification in order to prevent, in Face datection mistake It further include that In vivo detection is carried out to the facial image in journey, judgement show whether the facial image is true face.Wherein, institute It states In vivo detection and can be and the In vivo detection modes of movements such as nodded, shake the head, open one's mouth by voice or text prompt user, It is also possible to any other suitable In vivo detection mode.The In vivo detection is the prior art, and details are not described herein again.
According to embodiments of the present invention, device 400 further includes judgment module and recording module.Judgment module is configured to receiving Before the brush face logging request of user, first determine whether typing is corresponding with the subscriber identity information in face database Reference facial image.If typing, terminal device opens brush face login function, and the login of received server-side brush face is asked It asks.If non-typing, terminal device is not turned on brush face login function, refers to facial image described in server end typing first. After typing refers to facial image, then terminal device opens brush face login function, and user shows on the terminal device when next time logs in Show brush face login interface.
In one embodiment, recording module is configured to the typing after common login mode logs in successfully and refers to face figure Picture.When commonly being logged in, client shows common login interface, and receives subscriber identity information and the login of user's input Password, the user information can be the user name that user inputs in input frame, or the user echoed in input frame stepped on last time User name used in recording.Then, client carries user identity letter to server end transmission by wired or wireless network The common logging request of breath and login password.The common logging request of received server-side is verified the common logging request and is taken The login password of band;If being verified, the facial image of user is obtained by client, then facial image described in typing is made For with reference to facial image, and establish it is described with reference to facial image and subscriber identity information entrained by the common logging request it Between mapping relations.
In one embodiment, the common login mode is user name password login mode.In other embodiments, institute State common login mode be also possible to fingerprint log in, gesture log in etc. other be not based on the login mode of recognition of face, the present invention It is without limitation.
In another embodiment, recording module is configured to the typing in registration and refers to facial image.Illustratively, Yong Huke Enrollment form is opened on the terminal device, and inputs information to be registered, and the information to be registered includes at least user identity Information, log-in password and facial image;Client is sent to server end by wired or wireless network and carries registration information Registration request;After received server-side registration request, may first verify that whether subscriber identity information is registered, if unregistered, Then facial image entrained by typing registration request, which is used as, refers to facial image, and establishes described with reference to facial image and the note The mapping relations between the entrained subscriber identity information of volume request.Extraction module 420 is used for the use using the user Family identity information extracts the corresponding with the subscriber identity information of institute's typing in face database and refers to facial image.
According to an embodiment of the invention, then extracting face using subscriber identity information after server-side receives logging request The corresponding with the subscriber identity information of prior typing refers to facial image in database.
As described above, being previously stored with the subscriber identity information with mapping relations and reference man in the face database Face image.After obtaining logging request, then using the subscriber identity information of the user according to the mapping relations from described It is extracted in face database corresponding with the subscriber identity information with reference to facial image.
Contrast module 430 is used to be judged according to the real-time face image and the matching degree with reference between facial image Whether login successfully.
Specifically, the first eigenvector of real-time face image can be extracted by feature extraction network, and extract reference The second feature vector of facial image calculates the similarity between first eigenvector and second feature vector, similar according to this Degree determines whether to belong to same people.Illustratively, this feature extraction network can be existing at present for carrying out feature extraction Convolutional neural networks, which is not described herein again.
Illustratively, the distance between first eigenvector and second feature vector can be calculated to calculate similarity.Example Such as, which can be any one of Euclidean distance, COS distance, mahalanobis distance etc., or can be other distances, this hair It is bright that this is not limited.After calculating distance, similarity can be calculated according to this distance.It as an example, can be by the calculating Obtained distance is directly as similarity.As another example, similarity can be calculated again on the basis of obtaining distance.Meter Calculating obtained similarity can be the value between 0~1.
If obtained similarity is greater than or equal to similarity threshold, can determine by real-time face image and reference man Face image belongs to same people, and server end, which issues, logs in successful message;If obtained similarity is less than similarity threshold, It can determine by real-time face image and be not belonging to same people with reference to facial image, server end, which issues, logs in failure news. Wherein, similarity threshold can be set according to the actual situation in practical applications, such as can be according to the security level of system Similarity threshold is set, and the high system of security level required needs to preset high matching degree threshold value, and the present invention does not limit this.
It is according to an embodiment of the present invention that brush face login is being carried out based on the entering device of recognition of face based on above description When, extract the reference facial image of prior typing in face database using subscriber identity information, and by real-time face image It is compared with reference facial image, searches for similar facial image without traversing face database, avoid face number It adversely affects according to the operating characteristics that the volume in library logs in brush face, to ensure that the efficiency of login, and not will increase Operating cost.
Fig. 5 shows the schematic block diagram of the login system 500 according to an embodiment of the present invention based on recognition of face.It is based on The login system 500 of recognition of face includes storage device 510 and processor 520.
Wherein, the storage of storage device 510 is for realizing the login method according to an embodiment of the present invention based on recognition of face In corresponding steps program code.Program code of the processor 520 for being stored in Running storage device 510, to execute root According to the corresponding steps of the login method based on recognition of face of the embodiment of the present invention, and for realizing according to embodiments of the present invention The entering device based on recognition of face in corresponding module.
In one embodiment, make the login based on recognition of face when said program code is run by processor 520 System 500 executes following steps: receiving the brush face logging request of user, and obtains the real-time face image of user;Using described The subscriber identity information of user extracts the corresponding with the subscriber identity information of typing in face database and refers to face figure Picture;Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
In one embodiment, before the brush face logging request for receiving user, further includes: judge the face database In facial image whether is referred to described in typing, if non-typing, facial image is referred to described in typing.
It in one embodiment, include: reception registration request with reference to facial image described in the typing;It is registered described in typing The entrained facial image of request, which is used as, refers to facial image, and establishes and described taken with reference to facial image and the registration request The mapping relations between the subscriber identity information of band.
It in one embodiment, include: to receive common logging request with reference to facial image described in the typing;Described in verifying Login password entrained by common logging request;If described be verified, the facial image of user is obtained;Face described in typing Image, which is used as, refers to facial image, and establishes described with reference to facial image and user identity entrained by the common logging request The mapping relations between information.
In one embodiment, described according to the real-time face image and the similarity with reference between facial image If judging whether to login successfully includes: that the real-time face image and the similarity with reference between facial image are greater than or wait In similarity threshold, then judgement logs in success;If the real-time face image and the similarity with reference between facial image Less than similarity threshold, then judgement logs in failure.
In addition, according to embodiments of the present invention, additionally providing a kind of storage medium, storing program on said storage Instruction, when described program instruction is run by computer or processor for execute the embodiment of the present invention based on recognition of face The corresponding steps of login method, and for realizing the phase in the entering device according to an embodiment of the present invention based on recognition of face Answer module.The storage medium for example may include the storage card of smart phone, the storage unit of tablet computer, personal computer Hard disk, read-only memory (ROM), Erasable Programmable Read Only Memory EPROM (EPROM), portable compact disc read-only memory (CD-ROM), any combination of USB storage or above-mentioned storage medium.The computer readable storage medium can be one Any combination of a or multiple computer readable storage mediums.
In one embodiment, the computer program instructions may be implemented real according to the present invention when being run by computer Each functional module of the entering device based on recognition of face of example is applied, and/or can be executed according to embodiments of the present invention The login method based on recognition of face.
In one embodiment, the computer program instructions make computer or place when being run by computer or processor Reason device executes following steps: receiving the brush face logging request of user, and obtains the real-time face image of user;Use the user Subscriber identity information extract face database in typing it is corresponding with the subscriber identity information refer to facial image;Root Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
In one embodiment, before the brush face logging request for receiving user, further includes: judge the face database In facial image whether is referred to described in typing, if non-typing, facial image is referred to described in typing.
It in one embodiment, include: reception registration request with reference to facial image described in the typing;It is registered described in typing The entrained facial image of request, which is used as, refers to facial image, and establishes and described taken with reference to facial image and the registration request The mapping relations between the subscriber identity information of band.
It in one embodiment, include: to receive common logging request with reference to facial image described in the typing;Described in verifying Login password entrained by common logging request;If described be verified, the facial image of user is obtained;Face described in typing Image, which is used as, refers to facial image, and establishes described with reference to facial image and user identity entrained by the common logging request The mapping relations between information.
In one embodiment, described according to the real-time face image and the similarity with reference between facial image If judging whether to login successfully includes: that the real-time face image and the similarity with reference between facial image are greater than or wait In similarity threshold, then judgement logs in success;If the real-time face image and the similarity with reference between facial image Less than similarity threshold, then judgement logs in failure.
Each module in entering device according to an embodiment of the present invention based on recognition of face can be by according to the present invention The processor computer program instructions that store in memory of operation of the electronic equipment of embodiment realize, or can be in root The computer instruction stored in computer readable storage medium according to the computer program product of the embodiment of the present invention is by computer It is realized when operation.
Login method based on recognition of face, device, system and storage medium according to an embodiment of the present invention are being brushed When face logs in, the reference facial image of prior typing is extracted in face database using subscriber identity information, and by real-time people Face image and reference facial image compare, and search for similar facial image without traversing face database, avoid The operating characteristics that the volume of face database logs in brush face adversely affects, to ensure that the efficiency of login, and not It will increase operating cost.
According to embodiments of the present invention, additionally provide a kind of computer program, the computer program can store beyond the clouds or On local storage medium.When the computer program is run by computer or processor for executing the base of the embodiment of the present invention In the corresponding steps of the login method of recognition of face, and for realizing stepping on based on recognition of face according to an embodiment of the present invention Corresponding module in recording device.
Although describing example embodiment by reference to attached drawing here, it should be understood that above example embodiment are only exemplary , and be not intended to limit the scope of the invention to this.Those of ordinary skill in the art can carry out various changes wherein And modification, it is made without departing from the scope of the present invention and spiritual.All such changes and modifications are intended to be included in appended claims Within required the scope of the present invention.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, apparatus embodiments described above are merely indicative, for example, the division of the unit, only Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied Another equipment is closed or is desirably integrated into, or some features can be ignored or not executed.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the present invention and help to understand one or more of the various inventive aspects, To in the description of exemplary embodiment of the present invention, each feature of the invention be grouped together into sometimes single embodiment, figure, Or in descriptions thereof.However, the method for the invention should not be construed to reflect an intention that i.e. claimed The present invention claims features more more than feature expressly recited in each claim.More precisely, such as corresponding power As sharp claim reflects, inventive point is that the spy of all features less than some disclosed single embodiment can be used Sign is to solve corresponding technical problem.Therefore, it then follows thus claims of specific embodiment are expressly incorporated in this specific Embodiment, wherein each, the claims themselves are regarded as separate embodiments of the invention.
It will be understood to those skilled in the art that any combination pair can be used other than mutually exclusive between feature All features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed any method Or all process or units of equipment are combined.Unless expressly stated otherwise, this specification (is wanted including adjoint right Ask, make a summary and attached drawing) disclosed in each feature can be replaced with an alternative feature that provides the same, equivalent, or similar purpose.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize some or all of some modules according to an embodiment of the present invention Function.The present invention is also implemented as some or all program of device (examples for executing method as described herein Such as, computer program and computer program product).It is such to realize that program of the invention can store in computer-readable medium On, or may be in the form of one or more signals.Such signal can be downloaded from an internet website to obtain, or Person is provided on the carrier signal, or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.
The above description is merely a specific embodiment or to the explanation of specific embodiment, protection of the invention Range is not limited thereto, and anyone skilled in the art in the technical scope disclosed by the present invention, can be easily Expect change or replacement, should be covered by the protection scope of the present invention.Protection scope of the present invention should be with claim Subject to protection scope.

Claims (10)

1. a kind of login method based on recognition of face, which is characterized in that the described method includes:
The brush face logging request of user is received, and obtains the real-time face image of user;
Using the user subscriber identity information extract face database in typing it is corresponding with the subscriber identity information Reference facial image;
Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.
2. the method according to claim 1, wherein being previously stored in the face database, there is mapping to close System the subscriber identity information and it is described refer to facial image;
The subscriber identity information using the user is extracting typing in face database with the subscriber identity information phase It is corresponding to refer to facial image, comprising:
It is extracted from the face database and the use using the subscriber identity information of the user according to the mapping relations Family identity information is corresponding described with reference to facial image.
3. according to the method described in claim 2, it is characterized in that, before the brush face logging request for receiving user, further includes: Judge in the face database with reference to facial image described in whether typing, if non-typing, face is referred to described in typing Image.
4. according to the method described in claim 3, it is characterized in that, including: with reference to facial image described in the typing
Receive registration request;
Facial image entrained by registration request described in typing, which is used as, refers to facial image, and establish it is described with reference to facial image and The mapping relations between subscriber identity information entrained by the registration request.
5. according to the method described in claim 3, it is characterized in that, including: with reference to facial image described in the typing
Receive the common logging request of user;
Verify login password entrained by the common logging request;
If described be verified, the facial image of user is obtained;
Facial image described in typing, which is used as, refers to facial image, and establishes described with reference to facial image and the common logging request The mapping relations between entrained subscriber identity information.
6. the method according to claim 1, wherein described according to the real-time face image and the reference man Similarity between face image judges whether to login successfully
If the real-time face image and the similarity with reference between facial image are greater than or equal to similarity threshold, sentence It is disconnected to log in success;
If the real-time face image and the similarity with reference between facial image are less than similarity threshold, judgement is logged in Failure.
7. a kind of entering device based on recognition of face, which is characterized in that described device includes:
Module is obtained, the request brush face for receiving user logs in, and obtains the real-time face image of user;
Extraction module, for use the user subscriber identity information extract face database in institute's typing with the user Identity information is corresponding to refer to facial image;And
Contrast module, for judging whether to step on according to the real-time face image and the similarity with reference between facial image It records successfully.
8. entering device according to claim 1, which is characterized in that be previously stored with to have in the face database and reflect Penetrate the subscriber identity information of relationship and described with reference to facial image;
The subscriber identity information using the user is extracting typing in face database with the subscriber identity information phase It is corresponding to refer to facial image, comprising:
It is extracted from the face database and the use using the subscriber identity information of the user according to the mapping relations Family identity information is corresponding described with reference to facial image.
9. a kind of login system based on recognition of face, which is characterized in that the system comprises storage devices and processor, described The computer program run by the processor is stored on storage device, the computer program is run by the processor Login method based on recognition of face of the Shi Zhihang as described in any one of claim 1-6.
10. a kind of storage medium, which is characterized in that be stored with computer program, the computer program on the storage medium The login method based on recognition of face as described in any one of claim 1-6 is executed at runtime.
CN201811267668.7A 2018-10-29 2018-10-29 Login method, device, system and storage medium based on recognition of face Pending CN109660509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811267668.7A CN109660509A (en) 2018-10-29 2018-10-29 Login method, device, system and storage medium based on recognition of face

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811267668.7A CN109660509A (en) 2018-10-29 2018-10-29 Login method, device, system and storage medium based on recognition of face

Publications (1)

Publication Number Publication Date
CN109660509A true CN109660509A (en) 2019-04-19

Family

ID=66110369

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811267668.7A Pending CN109660509A (en) 2018-10-29 2018-10-29 Login method, device, system and storage medium based on recognition of face

Country Status (1)

Country Link
CN (1) CN109660509A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458091A (en) * 2019-08-08 2019-11-15 北京阿拉丁智慧科技有限公司 Recognition of face 1 based on position screening is than N algorithm optimization method
CN110598551A (en) * 2019-08-09 2019-12-20 深圳力维智联技术有限公司 Method, device, equipment and medium for improving pedestrian identity recognition efficiency
CN110647823A (en) * 2019-09-02 2020-01-03 中国建设银行股份有限公司 Method and device for optimizing human face base
CN110929244A (en) * 2019-12-06 2020-03-27 中国建设银行股份有限公司 Digital identity identification method, device, equipment and storage medium
CN111382410A (en) * 2020-03-23 2020-07-07 支付宝(杭州)信息技术有限公司 Face brushing verification method and system
CN111405365A (en) * 2020-03-12 2020-07-10 北京文香信息技术有限公司 Identity authentication method, device, system and storage medium
CN111414569A (en) * 2020-02-18 2020-07-14 北京网聘咨询有限公司 Efficient access control method for network recruitment search technology
CN111581620A (en) * 2020-04-30 2020-08-25 新浪网技术(中国)有限公司 User identification method and device
CN111899136A (en) * 2020-07-04 2020-11-06 深圳市联想空间艺术工程有限公司 Method for using mobile terminal of intelligent companion chemical system based on face recognition
CN111899135A (en) * 2020-07-04 2020-11-06 深圳市联想空间艺术工程有限公司 Intelligent companion chemical method and system based on face recognition
CN112085005A (en) * 2020-09-29 2020-12-15 北京兴科高智科技有限公司 Laser beauty equipment based on face identification
CN112907214A (en) * 2021-03-05 2021-06-04 一智科技(成都)有限公司 Construction task processing method, electronic device and storage medium
CN113536269A (en) * 2021-07-23 2021-10-22 中信银行股份有限公司 Face recognition-based automatic token authorization method, device, equipment and storage medium for bastion machine
CN113807303A (en) * 2021-09-26 2021-12-17 北京市商汤科技开发有限公司 Face recognition method and apparatus, medium, and electronic device
CN115471932A (en) * 2022-08-17 2022-12-13 宁波美喵科技有限公司 Method, device, equipment and storage medium for unlocking shared bicycle
CN117938488A (en) * 2024-01-22 2024-04-26 无锡车联天下信息技术有限公司 Processing system, method, electronic equipment and medium for vehicle-mounted user account information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411856A (en) * 2016-09-06 2017-02-15 北京交通大学 Authentication method and apparatus based on face recognition of mobile terminal
US20170149771A1 (en) * 2015-11-25 2017-05-25 Microsoft Technology Licensing, Llc. Automated device discovery of pairing-eligible devices for authentication
CN108319944A (en) * 2018-05-03 2018-07-24 山东汇贸电子口岸有限公司 A kind of remote human face identification system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170149771A1 (en) * 2015-11-25 2017-05-25 Microsoft Technology Licensing, Llc. Automated device discovery of pairing-eligible devices for authentication
CN106411856A (en) * 2016-09-06 2017-02-15 北京交通大学 Authentication method and apparatus based on face recognition of mobile terminal
CN108319944A (en) * 2018-05-03 2018-07-24 山东汇贸电子口岸有限公司 A kind of remote human face identification system and method

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458091A (en) * 2019-08-08 2019-11-15 北京阿拉丁智慧科技有限公司 Recognition of face 1 based on position screening is than N algorithm optimization method
CN110598551A (en) * 2019-08-09 2019-12-20 深圳力维智联技术有限公司 Method, device, equipment and medium for improving pedestrian identity recognition efficiency
CN110647823A (en) * 2019-09-02 2020-01-03 中国建设银行股份有限公司 Method and device for optimizing human face base
CN110929244A (en) * 2019-12-06 2020-03-27 中国建设银行股份有限公司 Digital identity identification method, device, equipment and storage medium
CN111414569A (en) * 2020-02-18 2020-07-14 北京网聘咨询有限公司 Efficient access control method for network recruitment search technology
CN111405365B (en) * 2020-03-12 2021-09-21 安徽文香科技有限公司 Identity authentication method, device, system and storage medium
CN111405365A (en) * 2020-03-12 2020-07-10 北京文香信息技术有限公司 Identity authentication method, device, system and storage medium
CN111382410A (en) * 2020-03-23 2020-07-07 支付宝(杭州)信息技术有限公司 Face brushing verification method and system
CN111382410B (en) * 2020-03-23 2022-04-29 支付宝(杭州)信息技术有限公司 Face brushing verification method and system
CN111581620A (en) * 2020-04-30 2020-08-25 新浪网技术(中国)有限公司 User identification method and device
CN111899136A (en) * 2020-07-04 2020-11-06 深圳市联想空间艺术工程有限公司 Method for using mobile terminal of intelligent companion chemical system based on face recognition
CN111899135A (en) * 2020-07-04 2020-11-06 深圳市联想空间艺术工程有限公司 Intelligent companion chemical method and system based on face recognition
CN112085005A (en) * 2020-09-29 2020-12-15 北京兴科高智科技有限公司 Laser beauty equipment based on face identification
CN112907214A (en) * 2021-03-05 2021-06-04 一智科技(成都)有限公司 Construction task processing method, electronic device and storage medium
CN113536269A (en) * 2021-07-23 2021-10-22 中信银行股份有限公司 Face recognition-based automatic token authorization method, device, equipment and storage medium for bastion machine
CN113536269B (en) * 2021-07-23 2024-05-03 中信银行股份有限公司 Automatic fort token authorization method, device, equipment and storage medium based on face recognition
CN113807303A (en) * 2021-09-26 2021-12-17 北京市商汤科技开发有限公司 Face recognition method and apparatus, medium, and electronic device
CN115471932A (en) * 2022-08-17 2022-12-13 宁波美喵科技有限公司 Method, device, equipment and storage medium for unlocking shared bicycle
CN117938488A (en) * 2024-01-22 2024-04-26 无锡车联天下信息技术有限公司 Processing system, method, electronic equipment and medium for vehicle-mounted user account information

Similar Documents

Publication Publication Date Title
CN109660509A (en) Login method, device, system and storage medium based on recognition of face
US11847199B2 (en) Remote usage of locally stored biometric authentication data
US10268910B1 (en) Authentication based on heartbeat detection and facial recognition in video data
US6810480B1 (en) Verification of identity and continued presence of computer users
KR101997371B1 (en) Identity authentication method and apparatus, terminal and server
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
US20160269411A1 (en) System and Method for Anonymous Biometric Access Control
US8925058B1 (en) Authentication involving authentication operations which cross reference authentication factors
WO2018166187A1 (en) Server, identity verification method and system, and a computer-readable storage medium
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
TW201907330A (en) Method, device, device and data processing method for identity authentication
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
Buriro et al. Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones
US9626495B2 (en) Authenticating a device based on availability of other authentication methods
US10878071B2 (en) Biometric authentication anomaly detection
US20190130411A1 (en) Method and system for data processing
US9202035B1 (en) User authentication based on biometric handwriting aspects of a handwritten code
US11636187B2 (en) Systems and methods for continuous user authentication
CN109887187A (en) A kind of pickup processing method, device, equipment and storage medium
US11487856B2 (en) Enhanced security access
CN111563746A (en) Method, device, electronic equipment and medium for user identity authentication
AU2018201573A1 (en) Methods and Systems for Determining User Liveness
CN106878344A (en) A kind of biological characteristic authentication, register method and device
CN110324314A (en) User registering method and device, storage medium, electronic equipment
CN108710788A (en) A kind of safety certifying method, device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190419

RJ01 Rejection of invention patent application after publication