CN109660509A - Login method, device, system and storage medium based on recognition of face - Google Patents
Login method, device, system and storage medium based on recognition of face Download PDFInfo
- Publication number
- CN109660509A CN109660509A CN201811267668.7A CN201811267668A CN109660509A CN 109660509 A CN109660509 A CN 109660509A CN 201811267668 A CN201811267668 A CN 201811267668A CN 109660509 A CN109660509 A CN 109660509A
- Authority
- CN
- China
- Prior art keywords
- face
- facial image
- user
- identity information
- subscriber identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention provides a kind of login method based on recognition of face, device, system and storage mediums, this method comprises: receiving the brush face logging request of user, and obtain the real-time face image of user;The corresponding with the subscriber identity information of typing in face database, which is extracted, using the subscriber identity information of the user refers to facial image;Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.Login method based on recognition of face, device, system and storage medium of the invention is extracted corresponding with reference to facial image in face database using subscriber identity information, and it is compared with real-time face image to judge whether to login successfully, it is compared without traversing entire face database, improves login efficiency.
Description
Technical field
The present invention relates to technical field of face recognition, relate more specifically to a kind of login method based on recognition of face, dress
It sets, system and storage medium.
Background technique
Traditional network account protected mode is username and password login mode.User is when inputting registration on terminating machine
Username and password for system host store, system host analyze and determine user input username and password, differentiate user
Whether the information inputted from terminating machine is correct, and only when username and password is correct, user could grant into own information
Resource space.The disadvantage is that: security of system is low, after password and user name are obtained by other people, letter that legitimate user is possessed
Breath resource space will be stolen.
In order to facilitate user's operation, more and more mobile application softwares are logged in using face recognition technology, this
Login mode is referred to as the login of brush face.Existing brush face logs in the comparison using 1:n formula, that is, will be in face database
In go traversal one time, find the qualified face of comparison.As the volume of face database constantly increases, such 1:n formula
Comparison has seriously affected the efficiency of brush face login.
Summary of the invention
The invention proposes a kind of login schemes based on recognition of face, are extracted using the subscriber identity information of the user
It is corresponding in face database to refer to facial image, and the real-time face image of user and the reference facial image are carried out
Comparison is to determine whether login successfully, to improve login efficiency.It is briefly described below proposed by the present invention about based on people
The login scheme of face identification, more details will be described in a specific embodiment in subsequent combination attached drawing.
According to an aspect of the present invention, a kind of login method based on recognition of face is provided, which comprises receive and use
The brush face logging request at family, and obtain the real-time face image of user;Face is extracted using the subscriber identity information of the user
The corresponding with the subscriber identity information of typing refers to facial image in database;According to the real-time face image and institute
It states and judges whether to login successfully with reference to the similarity between facial image.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database
Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute
It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user
Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
In one embodiment, before the brush face logging request for receiving user, further includes: judge the face database
In facial image whether is referred to described in typing, if non-typing, facial image is referred to described in typing.
It in one embodiment, include: reception registration request with reference to facial image described in the typing;It is registered described in typing
The entrained facial image of request, which is used as, refers to facial image, and establishes and described taken with reference to facial image and the registration request
The mapping relations between the subscriber identity information of band.
It in one embodiment, include: the common logging request for receiving user with reference to facial image described in the typing;It tests
Demonstrate,prove login password entrained by the common logging request;If described be verified, the facial image of user is obtained;Typing institute
It states facial image to be used as with reference to facial image, and establishes user's body with reference to entrained by facial image and the logging request
The mapping relations between part information.
In one embodiment, described according to the real-time face image and the similarity with reference between facial image
If judging whether to login successfully includes: that the real-time face image and the similarity with reference between facial image are greater than or wait
In similarity threshold, then judgement logs in success;If the real-time face image and the similarity with reference between facial image
Less than similarity threshold, then judgement logs in failure.
According to a further aspect of the invention, a kind of entering device based on recognition of face is provided, described device includes: to obtain
Module, the request brush face for receiving user logs in, and obtains the real-time face image of user;Extraction module, for using institute
The subscriber identity information for stating user extracts the reference man corresponding with the subscriber identity information of institute's typing in face database
Face image;And contrast module, for being sentenced according to the real-time face image and the similarity with reference between facial image
It is disconnected whether to login successfully.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database
Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute
It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user
Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
Another aspect according to the present invention provides a kind of login system based on recognition of face, and the system comprises storages
Device and processor are stored with the computer program run by the processor, the computer program on the storage device
The login method described in any of the above embodiments based on recognition of face is executed when being run by the processor.
According to a further aspect of the present invention, a kind of storage medium is provided, is stored with computer program on the storage medium,
The computer program executes the login method described in any of the above embodiments based on recognition of face at runtime.
Login method based on recognition of face, device, system and storage medium of the invention is mentioned using subscriber identity information
Take it is corresponding with reference to facial image in face database, and compare with real-time face image with judge whether to log at
Function compares without traversing entire face database, improves login efficiency.
Detailed description of the invention
The embodiment of the present invention is described in more detail in conjunction with the accompanying drawings, the above and other purposes of the present invention,
Feature and advantage will be apparent.Attached drawing is used to provide to further understand the embodiment of the present invention, and constitutes explanation
A part of book, is used to explain the present invention together with the embodiment of the present invention, is not construed as limiting the invention.In the accompanying drawings,
Identical reference label typically represents same parts or step.
Fig. 1 shows for realizing the login method according to an embodiment of the present invention based on recognition of face, device, system and deposits
The schematic block diagram of the example server of storage media;
Fig. 2 shows the schematic flow charts of the login method according to an embodiment of the present invention based on recognition of face;
Fig. 3 shows another schematic flow chart of the login method according to an embodiment of the present invention based on recognition of face;
Fig. 4 shows the schematic block diagram of the entering device according to an embodiment of the present invention based on recognition of face;And
Fig. 5 shows schematic block diagram according to the system in the embodiment of the present invention.
Specific embodiment
In order to enable the object, technical solutions and advantages of the present invention become apparent, root is described in detail below with reference to accompanying drawings
According to example embodiments of the present invention.Obviously, described embodiment is only a part of the embodiments of the present invention, rather than this hair
Bright whole embodiments, it should be appreciated that the present invention is not limited by example embodiment described herein.Based on described in the present invention
The embodiment of the present invention, those skilled in the art's obtained all other embodiment in the case where not making the creative labor
It should all fall under the scope of the present invention.
Firstly, referring to Fig.1 come describe the login method based on recognition of face for realizing the embodiment of the present invention, device,
System and the example server of storage medium 100.
As shown in Figure 1, server 100 includes one or more processors 102, one or more storage devices 104, input
Device 106, output device 108 and communication device 110, the company that these components pass through bus system 112 and/or other forms
The interconnection of connection mechanism (not shown).It should be noted that the component and structure of server 100 shown in FIG. 1 are only exemplary, rather than limit
Property processed, as needed, the server also can have other assemblies and structure.
The processor 102 can be central processing unit (CPU), graphics processing unit (GPU) or have at data
The processing unit of reason ability and/or the other forms of instruction execution capability, and can control other in the server 100
Component is to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can
To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy
The property lost memory for example may include random access memory (RAM) and/or cache memory (cache) etc..It is described non-
Volatile memory for example may include read-only memory (ROM), hard disk, flash memory etc..In the computer readable storage medium
On can store one or more computer program instructions, processor 102 can run described program instruction, to realize hereafter institute
The server side functionality and/or other desired functions (realized by processor) in the embodiment of the present invention stated.Described
Can also store various application programs and various data in computer readable storage medium, for example, the application program use and/
Or various data generated etc..
The operator that the input unit 106 can be server end is used to input the device of instruction, and may include
One or more of keyboard, mouse, microphone and touch screen etc..Described instruction is, for example, to accept or reject the finger for uploading image
It enables.
The output device 108 can export various information (such as image to external (such as operator of server end)
Or sound), and may include one or more of display, loudspeaker etc..
The wired or wireless communication between terminal device may be implemented in the communication device 110.
It should be noted that the component and structure of server 100 shown in FIG. 1 are only exemplary, although shown in fig. 1
Server 100 include multiple and different devices, but as needed, some of which device can not be it is necessary, it is therein
The quantity of some devices can be more etc., and the present invention does not limit this.
Exemplary terminal equipment for realizing client in the embodiment of the present invention include one or more processors, one or
Multiple storage devices, input unit, output device, communication device and image collecting device, these components pass through bus system
And/or bindiny mechanism's interconnection of other forms.It should be noted that the component and structure of the terminal device are only exemplary, and
Unrestricted, as needed, the terminal device also can have other assemblies and structure.Illustratively, for realizing root
It may be implemented as such as smart phone, tablet computer, notebook type according to the exemplary terminal equipment of client in the present invention to calculate
Machine, desktop PC etc..
In the following, reference Fig. 2 is described the login method 200 according to an embodiment of the present invention based on recognition of face.Such as Fig. 2 institute
Show, the login method 200 based on recognition of face may include steps of:
In step S210, the brush face logging request of user is received, and obtains the real-time face image of user.
Illustratively, it when the brush face login function of terminal device is opened, shows brush face login interface, receives the use of user
Family identity information can for example echo user name used in user's last login into the input frame of user name;When user selects
After brush face logs in, then brush face logging request, the received server-side brush face logging request are sent to server end, and obtain visitor
The real-time face image of subscriber identity information and user that family end is sent.If the brush face login function of terminal device is not opened,
Brush face login interface is hidden, shows common login interface.Wherein, it is the login side based on recognition of face that the brush face, which logs in,
Formula, it is described commonly to log on as the login mode for being not based on recognition of face.
Wherein, the image collecting device facial image collected that the real-time face image can be terminal device, figure
As acquired image is transmitted to the processor of terminal device by acquisition device, and server is sent to by communication device.It is real
When facial image terminal device can also be transmitted to by external equipment.
Illustratively, after starting to carry out Face datection, it can show that countdown prompts and starts to sweep on the terminal device
The facial image occurred in camera is retouched, if not scanning facial image, prompts user that face is moved in screen;
If detecting multiple faces, prompts user to detect multiple faces, please retry;If it times out, stopping scanning, operation is prompted
Time-out prompts user to retry;If In vivo detection success, returns to the data of facial image, and takes user name initiation login and ask
It asks, wherein the facial image can be the data of base64 format.
The photo, picture etc. of invalid user stealing legitimate user comes through face verification in order to prevent, in Face datection mistake
It further include that In vivo detection is carried out to the facial image in journey, judgement show whether the facial image is true face.Wherein, institute
It states In vivo detection and can be and the In vivo detection modes of movements such as nodded, shake the head, open one's mouth by voice or text prompt user,
It is also possible to any other suitable In vivo detection mode.The In vivo detection is the prior art, and details are not described herein again.
As shown in figure 3, according to embodiments of the present invention, before the brush face logging request for receiving user, first determining whether face
Whether typing is corresponding with the subscriber identity information in database refers to facial image.If typing, terminal is set
It is standby to open brush face login function, received server-side brush face logging request.If non-typing, terminal device is not turned on brush face and steps on
Recording function refers to facial image described in server end typing first.After typing refers to facial image, then terminal device opens brush
Face login function, user show brush face login interface on the terminal device when logging in next time.
It in one embodiment, is the typing after common login mode logs in successfully with reference to facial image.It is general in progress
When logical login, client shows common login interface, and receives the subscriber identity information and login password of user's input, the user
Information can be the user name that user inputs in input frame, or echoes and use used in user's last login in input frame
Name in an account book.Then, client carries subscriber identity information and login password to server end transmission by wired or wireless network
Common logging request.The common logging request of received server-side verifies login password entrained by the common logging request;
If being verified, the facial image of user is obtained by client, then facial image described in typing, which is used as, refers to face figure
Picture, and establish the mapping with reference to facial image between subscriber identity information entrained by the common logging request and close
System.
In one embodiment, the common login mode is user name password login mode.In other embodiments, institute
State common login mode be also possible to fingerprint log in, gesture log in etc. other be not based on the login mode of recognition of face, the present invention
It is without limitation.
It in another embodiment, is typing when registering with reference to facial image.Illustratively, user can be on the terminal device
Enrollment form is opened, and inputs information to be registered, the information to be registered includes at least subscriber identity information, log-in password
And facial image;Client sends the registration request for carrying registration information by wired or wireless network to server end;Service
After device end receives registration request, may first verify that whether subscriber identity information is registered, if unregistered, typing registration request
Entrained facial image, which is used as, refers to facial image, and establishes described with reference to entrained by facial image and the registration request
The mapping relations between subscriber identity information.
It is extracting institute's typing in face database with the use using the subscriber identity information of the user in step S220
Family identity information is corresponding to refer to facial image.
According to an embodiment of the invention, then extracting face using subscriber identity information after server-side receives logging request
The corresponding with the subscriber identity information of prior typing refers to facial image in database.
As described above, being previously stored with the subscriber identity information with mapping relations and reference man in the face database
Face image.After obtaining logging request, then using the subscriber identity information of the user according to the mapping relations from described
It is extracted in face database corresponding with the subscriber identity information with reference to facial image.
In step S230, judged whether according to the real-time face image and the matching degree with reference between facial image
It logins successfully.
Specifically, the first eigenvector of real-time face image can be extracted by feature extraction network, and extract reference
The second feature vector of facial image calculates the similarity between first eigenvector and second feature vector, similar according to this
Degree determines whether to belong to same people.Illustratively, this feature extraction network can be existing at present for carrying out feature extraction
Convolutional neural networks, which is not described herein again.
Illustratively, the distance between first eigenvector and second feature vector can be calculated to calculate similarity.Example
Such as, which can be any one of Euclidean distance, COS distance, mahalanobis distance etc., or can be other distances, this hair
It is bright that this is not limited.After calculating distance, similarity can be calculated according to this distance.It as an example, can be by the calculating
Obtained distance is directly as similarity.As another example, similarity can be calculated again on the basis of obtaining distance.Meter
Calculating obtained similarity can be the value between 0~1.
If obtained similarity is greater than or equal to similarity threshold, can determine by real-time face image and reference man
Face image belongs to same people, and server end, which issues, logs in successful message;If obtained similarity is less than similarity threshold,
It can determine by real-time face image and be not belonging to same people with reference to facial image, server end, which issues, logs in failure news.
Wherein, similarity threshold can be set according to the actual situation in practical applications, such as can be according to the security level of system
Similarity threshold is set, and the high system of security level required needs to preset high matching degree threshold value, and the present invention does not limit this.
Login method according to an embodiment of the present invention based on recognition of face uses user's body when carrying out the login of brush face
Part information extracts the reference facial image of prior typing in face database, and by real-time face image and refers to facial image
It compares, searches for similar facial image without traversing face database, avoid the volume of face database to brush
The operating characteristics that face logs in adversely affects, to ensure that the efficiency of login, and not will increase operating cost.
The login method according to an embodiment of the present invention based on recognition of face is described above exemplarily.Illustratively,
Login method according to an embodiment of the present invention based on recognition of face can with memory and processor unit or
It is realized in person's system.
It should be noted that the login method based on recognition of face provided by the embodiment of the present invention is generally held by server
Row, correspondingly, following entering devices based on recognition of face are generally positioned in server.
The entering device based on recognition of face of another aspect of the present invention offer is described below with reference to Fig. 4.Fig. 4 shows root
According to the schematic block diagram of the entering device 400 based on recognition of face of the embodiment of the present invention.
As shown in figure 4, device 400 according to an embodiment of the present invention includes obtaining module 410, extraction module 420 and comparison
Module 430.Module 410, extraction module 420 and the contrast module 430 of obtaining can be executed respectively above in conjunction with Fig. 2 description
Each step/function of login method based on recognition of face.Only the major function of each module of device 400 is retouched below
It states, and omits the detail content having been described above.
The brush face logging request that module 410 is used to receive user is obtained, and obtains the real-time face image of user.
Illustratively, it when the brush face login function of terminal device is opened, shows brush face login interface, receives the use of user
Family identity information can for example echo user name used in user's last login into the input frame of user name;When user selects
After brush face logs in, then brush face logging request, the received server-side brush face logging request are sent to server end, and obtain visitor
The real-time face image of subscriber identity information and user that family end is sent.If the brush face login function of terminal device is not opened,
Brush face login interface is hidden, shows common login interface.Wherein, it is the login side based on recognition of face that the brush face, which logs in,
Formula, it is described commonly to log on as the login mode for being not based on recognition of face.
Wherein, the image collecting device facial image collected that the real-time face image can be terminal device, figure
As acquired image is transmitted to the processor of terminal device by acquisition device, and server is sent to by communication device.It is real
When facial image terminal device can also be transmitted to by external equipment.
Illustratively, after starting to carry out Face datection, it can show that countdown prompts and starts to sweep on the terminal device
The facial image occurred in camera is retouched, if not scanning facial image, prompts user that face is moved in screen;
If detecting multiple faces, prompts user to detect multiple faces, please retry;If it times out, stopping scanning, operation is prompted
Time-out prompts user to retry;If In vivo detection success, returns to the data of facial image, and takes user name initiation login and ask
It asks, wherein the facial image can be the data of base64 format.
The photo, picture etc. of invalid user stealing legitimate user comes through face verification in order to prevent, in Face datection mistake
It further include that In vivo detection is carried out to the facial image in journey, judgement show whether the facial image is true face.Wherein, institute
It states In vivo detection and can be and the In vivo detection modes of movements such as nodded, shake the head, open one's mouth by voice or text prompt user,
It is also possible to any other suitable In vivo detection mode.The In vivo detection is the prior art, and details are not described herein again.
According to embodiments of the present invention, device 400 further includes judgment module and recording module.Judgment module is configured to receiving
Before the brush face logging request of user, first determine whether typing is corresponding with the subscriber identity information in face database
Reference facial image.If typing, terminal device opens brush face login function, and the login of received server-side brush face is asked
It asks.If non-typing, terminal device is not turned on brush face login function, refers to facial image described in server end typing first.
After typing refers to facial image, then terminal device opens brush face login function, and user shows on the terminal device when next time logs in
Show brush face login interface.
In one embodiment, recording module is configured to the typing after common login mode logs in successfully and refers to face figure
Picture.When commonly being logged in, client shows common login interface, and receives subscriber identity information and the login of user's input
Password, the user information can be the user name that user inputs in input frame, or the user echoed in input frame stepped on last time
User name used in recording.Then, client carries user identity letter to server end transmission by wired or wireless network
The common logging request of breath and login password.The common logging request of received server-side is verified the common logging request and is taken
The login password of band;If being verified, the facial image of user is obtained by client, then facial image described in typing is made
For with reference to facial image, and establish it is described with reference to facial image and subscriber identity information entrained by the common logging request it
Between mapping relations.
In one embodiment, the common login mode is user name password login mode.In other embodiments, institute
State common login mode be also possible to fingerprint log in, gesture log in etc. other be not based on the login mode of recognition of face, the present invention
It is without limitation.
In another embodiment, recording module is configured to the typing in registration and refers to facial image.Illustratively, Yong Huke
Enrollment form is opened on the terminal device, and inputs information to be registered, and the information to be registered includes at least user identity
Information, log-in password and facial image;Client is sent to server end by wired or wireless network and carries registration information
Registration request;After received server-side registration request, may first verify that whether subscriber identity information is registered, if unregistered,
Then facial image entrained by typing registration request, which is used as, refers to facial image, and establishes described with reference to facial image and the note
The mapping relations between the entrained subscriber identity information of volume request.Extraction module 420 is used for the use using the user
Family identity information extracts the corresponding with the subscriber identity information of institute's typing in face database and refers to facial image.
According to an embodiment of the invention, then extracting face using subscriber identity information after server-side receives logging request
The corresponding with the subscriber identity information of prior typing refers to facial image in database.
As described above, being previously stored with the subscriber identity information with mapping relations and reference man in the face database
Face image.After obtaining logging request, then using the subscriber identity information of the user according to the mapping relations from described
It is extracted in face database corresponding with the subscriber identity information with reference to facial image.
Contrast module 430 is used to be judged according to the real-time face image and the matching degree with reference between facial image
Whether login successfully.
Specifically, the first eigenvector of real-time face image can be extracted by feature extraction network, and extract reference
The second feature vector of facial image calculates the similarity between first eigenvector and second feature vector, similar according to this
Degree determines whether to belong to same people.Illustratively, this feature extraction network can be existing at present for carrying out feature extraction
Convolutional neural networks, which is not described herein again.
Illustratively, the distance between first eigenvector and second feature vector can be calculated to calculate similarity.Example
Such as, which can be any one of Euclidean distance, COS distance, mahalanobis distance etc., or can be other distances, this hair
It is bright that this is not limited.After calculating distance, similarity can be calculated according to this distance.It as an example, can be by the calculating
Obtained distance is directly as similarity.As another example, similarity can be calculated again on the basis of obtaining distance.Meter
Calculating obtained similarity can be the value between 0~1.
If obtained similarity is greater than or equal to similarity threshold, can determine by real-time face image and reference man
Face image belongs to same people, and server end, which issues, logs in successful message;If obtained similarity is less than similarity threshold,
It can determine by real-time face image and be not belonging to same people with reference to facial image, server end, which issues, logs in failure news.
Wherein, similarity threshold can be set according to the actual situation in practical applications, such as can be according to the security level of system
Similarity threshold is set, and the high system of security level required needs to preset high matching degree threshold value, and the present invention does not limit this.
It is according to an embodiment of the present invention that brush face login is being carried out based on the entering device of recognition of face based on above description
When, extract the reference facial image of prior typing in face database using subscriber identity information, and by real-time face image
It is compared with reference facial image, searches for similar facial image without traversing face database, avoid face number
It adversely affects according to the operating characteristics that the volume in library logs in brush face, to ensure that the efficiency of login, and not will increase
Operating cost.
Fig. 5 shows the schematic block diagram of the login system 500 according to an embodiment of the present invention based on recognition of face.It is based on
The login system 500 of recognition of face includes storage device 510 and processor 520.
Wherein, the storage of storage device 510 is for realizing the login method according to an embodiment of the present invention based on recognition of face
In corresponding steps program code.Program code of the processor 520 for being stored in Running storage device 510, to execute root
According to the corresponding steps of the login method based on recognition of face of the embodiment of the present invention, and for realizing according to embodiments of the present invention
The entering device based on recognition of face in corresponding module.
In one embodiment, make the login based on recognition of face when said program code is run by processor 520
System 500 executes following steps: receiving the brush face logging request of user, and obtains the real-time face image of user;Using described
The subscriber identity information of user extracts the corresponding with the subscriber identity information of typing in face database and refers to face figure
Picture;Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database
Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute
It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user
Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
In one embodiment, before the brush face logging request for receiving user, further includes: judge the face database
In facial image whether is referred to described in typing, if non-typing, facial image is referred to described in typing.
It in one embodiment, include: reception registration request with reference to facial image described in the typing;It is registered described in typing
The entrained facial image of request, which is used as, refers to facial image, and establishes and described taken with reference to facial image and the registration request
The mapping relations between the subscriber identity information of band.
It in one embodiment, include: to receive common logging request with reference to facial image described in the typing;Described in verifying
Login password entrained by common logging request;If described be verified, the facial image of user is obtained;Face described in typing
Image, which is used as, refers to facial image, and establishes described with reference to facial image and user identity entrained by the common logging request
The mapping relations between information.
In one embodiment, described according to the real-time face image and the similarity with reference between facial image
If judging whether to login successfully includes: that the real-time face image and the similarity with reference between facial image are greater than or wait
In similarity threshold, then judgement logs in success;If the real-time face image and the similarity with reference between facial image
Less than similarity threshold, then judgement logs in failure.
In addition, according to embodiments of the present invention, additionally providing a kind of storage medium, storing program on said storage
Instruction, when described program instruction is run by computer or processor for execute the embodiment of the present invention based on recognition of face
The corresponding steps of login method, and for realizing the phase in the entering device according to an embodiment of the present invention based on recognition of face
Answer module.The storage medium for example may include the storage card of smart phone, the storage unit of tablet computer, personal computer
Hard disk, read-only memory (ROM), Erasable Programmable Read Only Memory EPROM (EPROM), portable compact disc read-only memory
(CD-ROM), any combination of USB storage or above-mentioned storage medium.The computer readable storage medium can be one
Any combination of a or multiple computer readable storage mediums.
In one embodiment, the computer program instructions may be implemented real according to the present invention when being run by computer
Each functional module of the entering device based on recognition of face of example is applied, and/or can be executed according to embodiments of the present invention
The login method based on recognition of face.
In one embodiment, the computer program instructions make computer or place when being run by computer or processor
Reason device executes following steps: receiving the brush face logging request of user, and obtains the real-time face image of user;Use the user
Subscriber identity information extract face database in typing it is corresponding with the subscriber identity information refer to facial image;Root
Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.
In one embodiment, the user identity letter with mapping relations is previously stored in the face database
Breath refers to facial image with described;The subscriber identity information using the user extract typing in face database with institute
It is corresponding with reference to facial image to state subscriber identity information, comprising: reflect according to using the subscriber identity information of the user
Penetrate relationship extracted from the face database it is corresponding with the subscriber identity information described with reference to facial image.
In one embodiment, before the brush face logging request for receiving user, further includes: judge the face database
In facial image whether is referred to described in typing, if non-typing, facial image is referred to described in typing.
It in one embodiment, include: reception registration request with reference to facial image described in the typing;It is registered described in typing
The entrained facial image of request, which is used as, refers to facial image, and establishes and described taken with reference to facial image and the registration request
The mapping relations between the subscriber identity information of band.
It in one embodiment, include: to receive common logging request with reference to facial image described in the typing;Described in verifying
Login password entrained by common logging request;If described be verified, the facial image of user is obtained;Face described in typing
Image, which is used as, refers to facial image, and establishes described with reference to facial image and user identity entrained by the common logging request
The mapping relations between information.
In one embodiment, described according to the real-time face image and the similarity with reference between facial image
If judging whether to login successfully includes: that the real-time face image and the similarity with reference between facial image are greater than or wait
In similarity threshold, then judgement logs in success;If the real-time face image and the similarity with reference between facial image
Less than similarity threshold, then judgement logs in failure.
Each module in entering device according to an embodiment of the present invention based on recognition of face can be by according to the present invention
The processor computer program instructions that store in memory of operation of the electronic equipment of embodiment realize, or can be in root
The computer instruction stored in computer readable storage medium according to the computer program product of the embodiment of the present invention is by computer
It is realized when operation.
Login method based on recognition of face, device, system and storage medium according to an embodiment of the present invention are being brushed
When face logs in, the reference facial image of prior typing is extracted in face database using subscriber identity information, and by real-time people
Face image and reference facial image compare, and search for similar facial image without traversing face database, avoid
The operating characteristics that the volume of face database logs in brush face adversely affects, to ensure that the efficiency of login, and not
It will increase operating cost.
According to embodiments of the present invention, additionally provide a kind of computer program, the computer program can store beyond the clouds or
On local storage medium.When the computer program is run by computer or processor for executing the base of the embodiment of the present invention
In the corresponding steps of the login method of recognition of face, and for realizing stepping on based on recognition of face according to an embodiment of the present invention
Corresponding module in recording device.
Although describing example embodiment by reference to attached drawing here, it should be understood that above example embodiment are only exemplary
, and be not intended to limit the scope of the invention to this.Those of ordinary skill in the art can carry out various changes wherein
And modification, it is made without departing from the scope of the present invention and spiritual.All such changes and modifications are intended to be included in appended claims
Within required the scope of the present invention.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, apparatus embodiments described above are merely indicative, for example, the division of the unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied
Another equipment is closed or is desirably integrated into, or some features can be ignored or not executed.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the present invention and help to understand one or more of the various inventive aspects,
To in the description of exemplary embodiment of the present invention, each feature of the invention be grouped together into sometimes single embodiment, figure,
Or in descriptions thereof.However, the method for the invention should not be construed to reflect an intention that i.e. claimed
The present invention claims features more more than feature expressly recited in each claim.More precisely, such as corresponding power
As sharp claim reflects, inventive point is that the spy of all features less than some disclosed single embodiment can be used
Sign is to solve corresponding technical problem.Therefore, it then follows thus claims of specific embodiment are expressly incorporated in this specific
Embodiment, wherein each, the claims themselves are regarded as separate embodiments of the invention.
It will be understood to those skilled in the art that any combination pair can be used other than mutually exclusive between feature
All features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed any method
Or all process or units of equipment are combined.Unless expressly stated otherwise, this specification (is wanted including adjoint right
Ask, make a summary and attached drawing) disclosed in each feature can be replaced with an alternative feature that provides the same, equivalent, or similar purpose.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any
Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize some or all of some modules according to an embodiment of the present invention
Function.The present invention is also implemented as some or all program of device (examples for executing method as described herein
Such as, computer program and computer program product).It is such to realize that program of the invention can store in computer-readable medium
On, or may be in the form of one or more signals.Such signal can be downloaded from an internet website to obtain, or
Person is provided on the carrier signal, or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
The above description is merely a specific embodiment or to the explanation of specific embodiment, protection of the invention
Range is not limited thereto, and anyone skilled in the art in the technical scope disclosed by the present invention, can be easily
Expect change or replacement, should be covered by the protection scope of the present invention.Protection scope of the present invention should be with claim
Subject to protection scope.
Claims (10)
1. a kind of login method based on recognition of face, which is characterized in that the described method includes:
The brush face logging request of user is received, and obtains the real-time face image of user;
Using the user subscriber identity information extract face database in typing it is corresponding with the subscriber identity information
Reference facial image;
Judge whether to login successfully according to the real-time face image and the similarity with reference between facial image.
2. the method according to claim 1, wherein being previously stored in the face database, there is mapping to close
System the subscriber identity information and it is described refer to facial image;
The subscriber identity information using the user is extracting typing in face database with the subscriber identity information phase
It is corresponding to refer to facial image, comprising:
It is extracted from the face database and the use using the subscriber identity information of the user according to the mapping relations
Family identity information is corresponding described with reference to facial image.
3. according to the method described in claim 2, it is characterized in that, before the brush face logging request for receiving user, further includes:
Judge in the face database with reference to facial image described in whether typing, if non-typing, face is referred to described in typing
Image.
4. according to the method described in claim 3, it is characterized in that, including: with reference to facial image described in the typing
Receive registration request;
Facial image entrained by registration request described in typing, which is used as, refers to facial image, and establish it is described with reference to facial image and
The mapping relations between subscriber identity information entrained by the registration request.
5. according to the method described in claim 3, it is characterized in that, including: with reference to facial image described in the typing
Receive the common logging request of user;
Verify login password entrained by the common logging request;
If described be verified, the facial image of user is obtained;
Facial image described in typing, which is used as, refers to facial image, and establishes described with reference to facial image and the common logging request
The mapping relations between entrained subscriber identity information.
6. the method according to claim 1, wherein described according to the real-time face image and the reference man
Similarity between face image judges whether to login successfully
If the real-time face image and the similarity with reference between facial image are greater than or equal to similarity threshold, sentence
It is disconnected to log in success;
If the real-time face image and the similarity with reference between facial image are less than similarity threshold, judgement is logged in
Failure.
7. a kind of entering device based on recognition of face, which is characterized in that described device includes:
Module is obtained, the request brush face for receiving user logs in, and obtains the real-time face image of user;
Extraction module, for use the user subscriber identity information extract face database in institute's typing with the user
Identity information is corresponding to refer to facial image;And
Contrast module, for judging whether to step on according to the real-time face image and the similarity with reference between facial image
It records successfully.
8. entering device according to claim 1, which is characterized in that be previously stored with to have in the face database and reflect
Penetrate the subscriber identity information of relationship and described with reference to facial image;
The subscriber identity information using the user is extracting typing in face database with the subscriber identity information phase
It is corresponding to refer to facial image, comprising:
It is extracted from the face database and the use using the subscriber identity information of the user according to the mapping relations
Family identity information is corresponding described with reference to facial image.
9. a kind of login system based on recognition of face, which is characterized in that the system comprises storage devices and processor, described
The computer program run by the processor is stored on storage device, the computer program is run by the processor
Login method based on recognition of face of the Shi Zhihang as described in any one of claim 1-6.
10. a kind of storage medium, which is characterized in that be stored with computer program, the computer program on the storage medium
The login method based on recognition of face as described in any one of claim 1-6 is executed at runtime.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811267668.7A CN109660509A (en) | 2018-10-29 | 2018-10-29 | Login method, device, system and storage medium based on recognition of face |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811267668.7A CN109660509A (en) | 2018-10-29 | 2018-10-29 | Login method, device, system and storage medium based on recognition of face |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109660509A true CN109660509A (en) | 2019-04-19 |
Family
ID=66110369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811267668.7A Pending CN109660509A (en) | 2018-10-29 | 2018-10-29 | Login method, device, system and storage medium based on recognition of face |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109660509A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110458091A (en) * | 2019-08-08 | 2019-11-15 | 北京阿拉丁智慧科技有限公司 | Recognition of face 1 based on position screening is than N algorithm optimization method |
CN110598551A (en) * | 2019-08-09 | 2019-12-20 | 深圳力维智联技术有限公司 | Method, device, equipment and medium for improving pedestrian identity recognition efficiency |
CN110647823A (en) * | 2019-09-02 | 2020-01-03 | 中国建设银行股份有限公司 | Method and device for optimizing human face base |
CN110929244A (en) * | 2019-12-06 | 2020-03-27 | 中国建设银行股份有限公司 | Digital identity identification method, device, equipment and storage medium |
CN111382410A (en) * | 2020-03-23 | 2020-07-07 | 支付宝(杭州)信息技术有限公司 | Face brushing verification method and system |
CN111405365A (en) * | 2020-03-12 | 2020-07-10 | 北京文香信息技术有限公司 | Identity authentication method, device, system and storage medium |
CN111414569A (en) * | 2020-02-18 | 2020-07-14 | 北京网聘咨询有限公司 | Efficient access control method for network recruitment search technology |
CN111581620A (en) * | 2020-04-30 | 2020-08-25 | 新浪网技术(中国)有限公司 | User identification method and device |
CN111899136A (en) * | 2020-07-04 | 2020-11-06 | 深圳市联想空间艺术工程有限公司 | Method for using mobile terminal of intelligent companion chemical system based on face recognition |
CN111899135A (en) * | 2020-07-04 | 2020-11-06 | 深圳市联想空间艺术工程有限公司 | Intelligent companion chemical method and system based on face recognition |
CN112085005A (en) * | 2020-09-29 | 2020-12-15 | 北京兴科高智科技有限公司 | Laser beauty equipment based on face identification |
CN112907214A (en) * | 2021-03-05 | 2021-06-04 | 一智科技(成都)有限公司 | Construction task processing method, electronic device and storage medium |
CN113536269A (en) * | 2021-07-23 | 2021-10-22 | 中信银行股份有限公司 | Face recognition-based automatic token authorization method, device, equipment and storage medium for bastion machine |
CN113807303A (en) * | 2021-09-26 | 2021-12-17 | 北京市商汤科技开发有限公司 | Face recognition method and apparatus, medium, and electronic device |
CN115471932A (en) * | 2022-08-17 | 2022-12-13 | 宁波美喵科技有限公司 | Method, device, equipment and storage medium for unlocking shared bicycle |
CN117938488A (en) * | 2024-01-22 | 2024-04-26 | 无锡车联天下信息技术有限公司 | Processing system, method, electronic equipment and medium for vehicle-mounted user account information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411856A (en) * | 2016-09-06 | 2017-02-15 | 北京交通大学 | Authentication method and apparatus based on face recognition of mobile terminal |
US20170149771A1 (en) * | 2015-11-25 | 2017-05-25 | Microsoft Technology Licensing, Llc. | Automated device discovery of pairing-eligible devices for authentication |
CN108319944A (en) * | 2018-05-03 | 2018-07-24 | 山东汇贸电子口岸有限公司 | A kind of remote human face identification system and method |
-
2018
- 2018-10-29 CN CN201811267668.7A patent/CN109660509A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170149771A1 (en) * | 2015-11-25 | 2017-05-25 | Microsoft Technology Licensing, Llc. | Automated device discovery of pairing-eligible devices for authentication |
CN106411856A (en) * | 2016-09-06 | 2017-02-15 | 北京交通大学 | Authentication method and apparatus based on face recognition of mobile terminal |
CN108319944A (en) * | 2018-05-03 | 2018-07-24 | 山东汇贸电子口岸有限公司 | A kind of remote human face identification system and method |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110458091A (en) * | 2019-08-08 | 2019-11-15 | 北京阿拉丁智慧科技有限公司 | Recognition of face 1 based on position screening is than N algorithm optimization method |
CN110598551A (en) * | 2019-08-09 | 2019-12-20 | 深圳力维智联技术有限公司 | Method, device, equipment and medium for improving pedestrian identity recognition efficiency |
CN110647823A (en) * | 2019-09-02 | 2020-01-03 | 中国建设银行股份有限公司 | Method and device for optimizing human face base |
CN110929244A (en) * | 2019-12-06 | 2020-03-27 | 中国建设银行股份有限公司 | Digital identity identification method, device, equipment and storage medium |
CN111414569A (en) * | 2020-02-18 | 2020-07-14 | 北京网聘咨询有限公司 | Efficient access control method for network recruitment search technology |
CN111405365B (en) * | 2020-03-12 | 2021-09-21 | 安徽文香科技有限公司 | Identity authentication method, device, system and storage medium |
CN111405365A (en) * | 2020-03-12 | 2020-07-10 | 北京文香信息技术有限公司 | Identity authentication method, device, system and storage medium |
CN111382410A (en) * | 2020-03-23 | 2020-07-07 | 支付宝(杭州)信息技术有限公司 | Face brushing verification method and system |
CN111382410B (en) * | 2020-03-23 | 2022-04-29 | 支付宝(杭州)信息技术有限公司 | Face brushing verification method and system |
CN111581620A (en) * | 2020-04-30 | 2020-08-25 | 新浪网技术(中国)有限公司 | User identification method and device |
CN111899136A (en) * | 2020-07-04 | 2020-11-06 | 深圳市联想空间艺术工程有限公司 | Method for using mobile terminal of intelligent companion chemical system based on face recognition |
CN111899135A (en) * | 2020-07-04 | 2020-11-06 | 深圳市联想空间艺术工程有限公司 | Intelligent companion chemical method and system based on face recognition |
CN112085005A (en) * | 2020-09-29 | 2020-12-15 | 北京兴科高智科技有限公司 | Laser beauty equipment based on face identification |
CN112907214A (en) * | 2021-03-05 | 2021-06-04 | 一智科技(成都)有限公司 | Construction task processing method, electronic device and storage medium |
CN113536269A (en) * | 2021-07-23 | 2021-10-22 | 中信银行股份有限公司 | Face recognition-based automatic token authorization method, device, equipment and storage medium for bastion machine |
CN113536269B (en) * | 2021-07-23 | 2024-05-03 | 中信银行股份有限公司 | Automatic fort token authorization method, device, equipment and storage medium based on face recognition |
CN113807303A (en) * | 2021-09-26 | 2021-12-17 | 北京市商汤科技开发有限公司 | Face recognition method and apparatus, medium, and electronic device |
CN115471932A (en) * | 2022-08-17 | 2022-12-13 | 宁波美喵科技有限公司 | Method, device, equipment and storage medium for unlocking shared bicycle |
CN117938488A (en) * | 2024-01-22 | 2024-04-26 | 无锡车联天下信息技术有限公司 | Processing system, method, electronic equipment and medium for vehicle-mounted user account information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109660509A (en) | Login method, device, system and storage medium based on recognition of face | |
US11847199B2 (en) | Remote usage of locally stored biometric authentication data | |
US10268910B1 (en) | Authentication based on heartbeat detection and facial recognition in video data | |
US6810480B1 (en) | Verification of identity and continued presence of computer users | |
KR101997371B1 (en) | Identity authentication method and apparatus, terminal and server | |
CN108804884B (en) | Identity authentication method, identity authentication device and computer storage medium | |
US20160269411A1 (en) | System and Method for Anonymous Biometric Access Control | |
US8925058B1 (en) | Authentication involving authentication operations which cross reference authentication factors | |
WO2018166187A1 (en) | Server, identity verification method and system, and a computer-readable storage medium | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
TW201907330A (en) | Method, device, device and data processing method for identity authentication | |
CN105100108B (en) | A kind of login authentication method based on recognition of face, apparatus and system | |
Buriro et al. | Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones | |
US9626495B2 (en) | Authenticating a device based on availability of other authentication methods | |
US10878071B2 (en) | Biometric authentication anomaly detection | |
US20190130411A1 (en) | Method and system for data processing | |
US9202035B1 (en) | User authentication based on biometric handwriting aspects of a handwritten code | |
US11636187B2 (en) | Systems and methods for continuous user authentication | |
CN109887187A (en) | A kind of pickup processing method, device, equipment and storage medium | |
US11487856B2 (en) | Enhanced security access | |
CN111563746A (en) | Method, device, electronic equipment and medium for user identity authentication | |
AU2018201573A1 (en) | Methods and Systems for Determining User Liveness | |
CN106878344A (en) | A kind of biological characteristic authentication, register method and device | |
CN110324314A (en) | User registering method and device, storage medium, electronic equipment | |
CN108710788A (en) | A kind of safety certifying method, device, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190419 |
|
RJ01 | Rejection of invention patent application after publication |