CN109960920A - Information processing method and electronic equipment - Google Patents
Information processing method and electronic equipment Download PDFInfo
- Publication number
- CN109960920A CN109960920A CN201910251594.6A CN201910251594A CN109960920A CN 109960920 A CN109960920 A CN 109960920A CN 201910251594 A CN201910251594 A CN 201910251594A CN 109960920 A CN109960920 A CN 109960920A
- Authority
- CN
- China
- Prior art keywords
- recognition device
- iris
- user
- face
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 15
- 238000003672 processing method Methods 0.000 title claims abstract description 13
- 238000000034 method Methods 0.000 claims description 23
- 230000001815 facial effect Effects 0.000 abstract 2
- 230000006399 behavior Effects 0.000 description 36
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002860 competitive effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/19—Sensors therefor
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Ophthalmology & Optometry (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the present application discloses a kind of information processing method and electronic equipment, after obtaining certification request, calls face identification device and iris identification device simultaneously based on certification request, acquires the facial image of user by face identification device and identify facial image;The iris image of user is acquired by iris identification device and identifies iris image;Second recognition result of the first recognition result and iris identification device based on face identification device determines whether the identity of user authenticates success.That is, scheme disclosed in the present application, obtains a certification request, can two kinds of biological characteristics authenticated simultaneously, simplify user's operation, improve resource utilization.
Description
Technical Field
The present application relates to the field of information processing technologies, and in particular, to an information processing method and an electronic device.
Background
At present, more and more electronic devices support multiple biometric functions, such as face recognition, iris recognition, fingerprint recognition, and the like. However, biometric identification is a competitive relationship in present electronic devices, e.g., iris identification is not available after face recognition is enabled, and face recognition is not available after iris recognition is enabled. This requires the user to select one identification method each time authentication is required. On one hand, inconvenience is brought to users, and on the other hand, the utilization rate of hardware for biological feature recognition is low, so that resource waste is caused.
Disclosure of Invention
The present application is directed to an information processing method and an electronic device, which at least partially overcome the technical problems in the prior art.
In order to achieve the purpose, the application provides the following technical scheme:
an information processing method, the method comprising:
obtaining an authentication request;
calling a face recognition device and an iris recognition device simultaneously based on the authentication request;
acquiring a face image of a user through the face recognition device and recognizing the face image;
acquiring an iris image of the user through the iris recognition device and recognizing the iris image;
and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device.
In the above method, preferably, a first window corresponding to an acquisition element of the face recognition device and a second window corresponding to an acquisition element of the iris recognition device are located on the same plane, so that the user performs input once, the face recognition device acquires a face image of the user, and the iris recognition device acquires an iris image of the user;
or,
the collecting element of the face recognition device and the collecting element of the iris recognition device are the same collecting element.
The above method, preferably, further comprises:
determining an operation behavior corresponding to the authentication request;
and if the operation behavior belongs to a high security level, calling a face recognition device and an iris recognition device at the same time based on the authentication request.
The above method, preferably, further comprises:
and if the operation behavior belongs to a low security level, calling one of the face recognition device and the iris recognition device according to a selection rule based on the authentication request to perform the identity authentication of the user.
The above method, preferably, further comprises:
obtaining a security state parameter of the electronic device based on the authentication request;
and if the safety state parameters do not meet the safety conditions, calling a face recognition device and an iris recognition device at the same time based on the authentication request.
The above method, preferably, further comprises:
and if the safety state parameters meet safety conditions, calling one of the face recognition device and the iris recognition device according to a selection rule based on the authentication request to perform the identity authentication of the user.
In the above method, preferably, the selection rule is to determine to select one of the face recognition device and the iris recognition device according to ambient light.
In the above method, preferably, the determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device includes:
the first recognition result represents that the face image passes the authentication, and the second recognition result represents that the iris image passes the authentication, so that the identity authentication of the user is determined to be successful;
and determining that the identity authentication of the user is unsuccessful if the first identification result and the second identification result have a representation authentication failure.
An electronic device, the electronic device comprising:
a face recognition device;
an iris recognition device;
a processor to obtain an authentication request; calling the face recognition device and the iris recognition device simultaneously based on the authentication request, acquiring a face image of a user through the face recognition device and recognizing the face image; acquiring an iris image of the user through the iris recognition device and recognizing the iris image; and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device.
In the electronic device, preferably, a first window corresponding to the acquisition element of the face recognition device and a second window corresponding to the acquisition element of the iris recognition device are located on a first surface of the electronic device;
or,
the collecting element of the face recognition device and the collecting element of the iris recognition device are the same collecting element.
According to the scheme, after the authentication request is obtained, the face recognition device and the iris recognition device are called simultaneously based on the authentication request, and the face image of the user is collected and recognized through the face recognition device; acquiring an iris image of a user through an iris recognition device and recognizing the iris image; and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device. That is to say, according to the scheme disclosed by the application, the authentication request is obtained once, two biological characteristics can be simultaneously authenticated, the user operation is simplified, and the resource utilization rate is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of an implementation of an information processing method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be practiced otherwise than as specifically illustrated.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive effort based on the embodiments of the present invention, are within the scope of the present invention.
The information processing method provided by the application is applied to electronic equipment, and the electronic equipment comprises a face recognition device and an iris recognition device.
As shown in fig. 1, an implementation flowchart of the information processing method provided by the present application may include:
step S11: an authentication request is obtained.
The authentication request may be directly triggered by a user manually, or may be generated when the electronic device determines that the target information needs to be authenticated to be processed after obtaining the target information processing request.
Step S12: and calling the face recognition device and the iris recognition device simultaneously based on the authentication request.
In the embodiment of the application, an authentication request is obtained once, and two biological feature recognition devices are called simultaneously.
Step S13: the face recognition device is used for collecting the face image of the user and recognizing the face image.
Step S14: and acquiring an iris image of the user through the iris recognition device and recognizing the iris image.
In the embodiment of the present application, the execution sequence of step S13 and step S14 is not specifically limited, and may be step S13 executed first and step S14 executed second, or step S14 executed first and step S13 executed second, or step S13 and step S14 executed simultaneously.
Step S15: and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device.
According to the information processing method, after an authentication request is obtained, a face recognition device and an iris recognition device are called simultaneously based on the authentication request, and a face image of a user is collected and recognized through the face recognition device; acquiring an iris image of a user through an iris recognition device and recognizing the iris image; and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device. The effect that one authentication request is obtained and two biological characteristics can be simultaneously authenticated is achieved, user operation is simplified, and resource utilization rate is improved.
In addition, the face recognition device and the iris recognition device are called simultaneously to carry out identity authentication, and the safety can be improved.
In an optional embodiment, the first window corresponding to the acquisition element of the face recognition device and the second window corresponding to the acquisition element of the iris recognition device are located on the same plane, so that the user can perform one-time input, the face recognition device acquires a face image of the user, and the iris recognition device acquires an iris image of the user.
The acquisition element of the face recognition device is exposed through the first window to acquire a face image of the user, and the acquisition element of the iris recognition device is exposed through the second window to acquire an iris image of the user.
In this embodiment, the acquisition element of the face recognition device and the acquisition element of the iris recognition device are independent acquisition elements, and the acquisition element of the face recognition device and the acquisition element of the iris recognition device may be the same or different.
In order to further ensure that the user performs input once, the face recognition device acquires a face image of the user, the iris recognition device acquires an iris image of the user, and a first window corresponding to an acquisition element of the face recognition device and a second window corresponding to an acquisition element of the iris recognition device satisfy a first relative position relationship, for example, the distance between the first window and the second window is smaller than a distance threshold. Therefore, the user can input once only by adjusting the position of the electronic equipment relative to the user in a small range, the face recognition device acquires the face image of the user, and the iris recognition device acquires the iris image of the user.
In another alternative embodiment, the acquisition element of the face recognition device is the same acquisition element as the acquisition element of the iris recognition device.
In the embodiment of the present application, the acquisition element of the face recognition device may include a color image sensor (i.e., RGB sensor) and an infrared image sensor (i.e., IR sensor), and the acquisition unit of the iris recognition device may also include an RGB sensor and an IR sensor.
Wherein the image captured by the RGB sensor is output through at least a display screen of the electronic device to facilitate alignment of the capture element by a user. The image collected by the IR sensor can be used for face recognition by a face recognition device and also can be used for iris recognition by an iris recognition device.
In addition, the image collected by the RGB sensor can be used for face recognition by a face recognition device and can also be used for iris recognition by an iris recognition device.
The RGB sensor can be used for collecting the face image of the user and the iris image of the user, and the IR sensor can be used for collecting the face image of the user and the iris image of the user.
In an optional embodiment, before invoking the face recognition device and the iris recognition device simultaneously based on the authentication request, the information processing method provided by the application may further include:
and determining the operation behavior corresponding to the authentication request.
The operation behavior corresponding to the authentication request may be an operation behavior that triggers generation of the authentication request.
Optionally, the identifier of the application program generating the authentication request may be determined as the operation behavior corresponding to the authentication request.
Or,
the operation behavior corresponding to the authentication request can be determined through the operation behavior identification information carried in the authentication request. In this embodiment, when the operation behavior a triggers the authentication request, the authentication request carries the identification information of the operation behavior a. For example, if the authentication request is triggered by a payment behavior, the authentication request carries identification information of the payment behavior. For example, if the authentication request is triggered by an unlocking behavior, the authentication request carries identification information of the unlocking behavior. The identification information corresponding to different operation behaviors is different.
And if the operation behavior belongs to a high security level, calling the face recognition device and the iris recognition device simultaneously based on the authentication request.
The operation behavior belongs to a high security level, such as payment behavior, which indicates that the operation behavior has a high requirement on security, and at the moment, the face recognition device and the iris recognition device are called simultaneously.
And if the operation behavior belongs to a low security level, calling one of the face recognition device and the iris recognition device according to a selection rule based on the authentication request to perform the identity authentication of the user.
The operation behavior belongs to a low security level, such as a behavior of unlocking the screen, an application login behavior and the like, which indicates that the requirement of the operation behavior on the security is low, and at the moment, one of the face recognition device and the iris recognition device is selected for calling, namely, only one biometric authentication mode is selected.
The level of the safety level of the operation behavior can be determined according to the system configuration of the electronic equipment. That is, which operation behaviors belong to the behaviors with high security level and which operation behaviors belong to the behaviors with low security level are preset in the system configuration of the electronic device.
The embodiment determines whether to use only one identification mode or both identification modes according to the operation behaviors, thereby improving the intelligence of the electronic equipment.
In an optional embodiment, before invoking the face recognition device and the iris recognition device simultaneously based on the authentication request, the information processing method provided by the application may further include:
security state parameters of the electronic device are obtained based on the authentication request.
The security state parameter of the electronic device characterizes whether the network to which the electronic device is connected is a public network or a private network.
Alternatively, the security state parameter of the electronic device characterizes whether the application generating the authentication request is a payment application allowed by a security application (e.g., cell phone steward). The security application may be used to manage whether a particular behavior of applications in the electronic device may be executed. For example, the method can be used for managing whether each application in the electronic device allows boot-up or background self-boot, or whether the application is allowed to be started by other applications, or whether the application is allowed to run in the background, or whether the payment behavior is allowed, and the like.
Alternatively, the security state parameter of the electronic device characterizes whether the application generating the authentication request is an application that is allowed to access the geographic location.
And if the safety state parameters do not meet the safety conditions, calling the face recognition device and the iris recognition device at the same time based on the authentication request.
The security state parameter does not satisfy the security condition, which indicates that the current security of the electronic device is low, for example, the network to which the electronic device is connected is a public network, or the application generating the authentication request is not a payment application allowed by the security application, or the application generating the authentication request is not allowed to access the geographic location, and at this time, the face recognition device and the iris recognition device are invoked simultaneously.
And if the safety state parameters meet the safety conditions, calling one of the face recognition device and the iris recognition device according to the selection rule based on the authentication request to perform the identity authentication of the user.
The security state parameter satisfies a security condition, which indicates that the current security of the electronic device is high, for example, the network to which the electronic device is connected is a private network, or the application generating the authentication request is a payment application allowed by the security application, or the application generating the authentication request is allowed to access the geographic location, and at this time, one of the face recognition device and the iris recognition device is selected to be called, that is, only one biometric authentication mode is selected.
According to the embodiment, whether only one identification mode or both identification modes are used is determined according to the safety state parameters of the electronic equipment, so that the intelligence of the electronic equipment is improved.
In an alternative embodiment, the selection rule may be a random selection of one of the face recognition device and the iris recognition device.
In another alternative embodiment, the selection rule is to select one of the face recognition device and the iris recognition device based on ambient lighting determination.
Optionally, if the intensity of the ambient light is greater than the first threshold, it indicates that the ambient light is strong, at this time, the image acquired by the IR sensor is overexposed, and sufficient effective information cannot be obtained, and at this time, the face recognition device may be invoked. The face recognition device can recognize the face image collected by the RGB sensor to perform identity authentication, specifically, if the face image collected by the RGB sensor passes the authentication, the identity authentication of the user is determined to be successful, otherwise, the identity authentication of the user is determined to be unsuccessful. Or, the face recognition device may preferentially recognize the face image acquired by the RGB sensor to perform identity recognition, and when the face image acquired by the RGB sensor fails to pass authentication, recognize the face image acquired by the IR sensor to perform identity authentication. And if the face image acquired by the RGB sensor passes the authentication, determining that the identity authentication of the user is successful, and not identifying the face image acquired by the IR sensor.
If the intensity of the ambient light is smaller than the second threshold value, the ambient light is weak, at the moment, the image acquired by the RGB sensor is too dark, enough effective information cannot be obtained, and the iris recognition device can be called. The iris recognition device can recognize the iris image acquired by the IR sensor to perform identity authentication, specifically, if the iris image acquired by the IR sensor passes the authentication, it is determined that the identity authentication of the user is successful, otherwise, it is determined that the identity authentication of the user is unsuccessful. Or, the iris recognition device may preferentially recognize the iris image collected through the IR sensor to perform identity recognition, and when the iris image collected through the IR sensor fails to be authenticated, recognize the iris image collected through the RGB sensor to perform identity authentication. And if the iris image acquired by the IR sensor passes the authentication, determining that the identity authentication of the user is successful, and not identifying the iris image acquired by the RGB sensor.
If the ambient light intensity is less than or equal to the first threshold and greater than or equal to the second threshold, one of the face recognition device and the iris recognition device may be randomly selected. If the face recognition device is selected, the face recognition device can perform identity authentication through the face image collected by the RGB sensor, and also can perform identity authentication through the face image collected by the IR sensor. If the iris recognition device is selected, the iris recognition device can perform identity authentication through the iris image acquired by the RGB sensor, and can also perform identity authentication through the iris image acquired by the IR sensor.
The second threshold is less than the first threshold.
One of the face recognition device and the iris recognition device is selected according to the ambient light, so that the recognition efficiency can be ensured, and the time cannot be wasted on a recognition mode which is not suitable for the current environment.
For example, both the general face recognition apparatus and the iris recognition apparatus set a valid time, that is, if it is not determined whether the authentication is passed or not within a certain period of time, the authentication is not passed. On the basis of this, if the ambient light is strong but the iris image collected based on the IR sensor is selected for iris recognition, the recognition process is relatively long, whereas if the face image collected based on the RGB sensor is selected for face recognition, the recognition process is relatively fast.
In an optional embodiment, the determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device may include:
the first recognition result represents that the face image passes the authentication, and the second recognition result represents that the iris image passes the authentication, so that the identity authentication of the user is determined to be successful.
And the first identification result and the second identification result have a representation that the authentication fails, and the identity authentication of the user is determined to be unsuccessful.
That is to say, when the face recognition device and the iris recognition device are called simultaneously, the identity authentication of the user is determined to pass only if the two authentication modes pass, otherwise, the identity authentication of the user is determined not to pass.
In an alternative embodiment, in the case of calling the face recognition device and the iris recognition device at the same time, the order of the face recognition device for face recognition and the iris recognition device for iris recognition may also be determined according to the ambient light. Optionally:
the face image of the user is collected through the face recognition device and recognized; acquiring an iris image of a user through an iris recognition device and recognizing the iris image; an alternative implementation manner for determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device may be:
if the ambient light intensity is greater than a first threshold value, acquiring a face image of a user through a face recognition device and recognizing the face image; if the first recognition result of the face recognition device represents that the face image passes the authentication, the iris recognition device collects the iris image of the user and recognizes the iris image, and if the second recognition result of the iris recognition device represents that the iris image passes the authentication, the identity authentication of the user is determined to be successful. The first recognition result and the second recognition result have a characteristic that the authentication does not pass the identity authentication of the determined user. That is, when the ambient light is strong, face recognition is preferentially started, and if the face recognition result is unsuccessful, iris recognition is not required.
If the ambient light intensity is smaller than the second threshold value, the iris recognition device is used for collecting the iris image of the user and recognizing the iris image, if the second recognition result of the iris recognition device represents that the iris image passes the authentication, the face recognition device is used for collecting the face image of the user and recognizing the face image, and if the first recognition result of the face recognition device represents that the face image passes the authentication, the identity authentication of the user is determined to be successful. The first recognition result and the second recognition result have a characteristic that the authentication does not pass the identity authentication of the determined user. That is, when the ambient light intensity is poor, iris recognition is preferentially activated, and if iris recognition is unsuccessful, face recognition does not need to be activated.
If the ambient light intensity is greater than or equal to the second threshold value and the ambient light intensity is less than or equal to the first threshold value, acquiring the face image of the user and identifying the face image through the face recognition device and acquiring the iris image of the user and identifying the iris image through the iris recognition device are carried out simultaneously, and when the first recognition result of the face recognition device represents that the face image passes the authentication and the second recognition result of the iris recognition device represents that the iris image passes the authentication, the identity authentication of the user is determined to be successful. The first recognition result and the second recognition result have a characteristic that the authentication does not pass the identity authentication of the determined user.
In the embodiment, the execution sequence of the two recognition modes is determined according to the ambient light, so that the recognition efficiency is ensured, and the time is not wasted on the recognition mode which is not suitable for the current scene. In a high-safety scene, two authentication modes are started, so that the characteristics that the human face recognition can capture more feature points and is more stable in bright light are exerted, and the characteristics that the iris recognition live body detection is more stable in dark light are exerted. The utilization rate of hardware resources is improved.
Corresponding to the embodiment of the method, the present application further provides an electronic device, a schematic structural diagram of which is shown in fig. 2, and the electronic device may include:
face recognition means 21, iris recognition means 22 and a processor 23; wherein,
the processor 23 is configured to obtain an authentication request; calling a face recognition device 21 and an iris recognition device 22 simultaneously based on the authentication request, collecting a face image of the user through the face recognition device 21 and recognizing the face image; acquiring an iris image of the user through the iris recognition device 22 and recognizing the iris image; and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device.
After the electronic equipment obtains the authentication request, the face recognition device and the iris recognition device are called simultaneously based on the authentication request, and the face image of the user is collected and recognized through the face recognition device; acquiring an iris image of a user through an iris recognition device and recognizing the iris image; and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device. The effect that one authentication request is obtained and two biological characteristics can be simultaneously authenticated is achieved, user operation is simplified, and resource utilization rate is improved.
In addition, the face recognition device and the iris recognition device are called simultaneously to carry out identity authentication, and the safety of the electronic equipment can be improved.
In an optional embodiment, a first window corresponding to an acquisition element of a face recognition device and a second window corresponding to an acquisition element of an iris recognition device are located on the same plane, so that a user can perform input once, the face recognition device acquires a face image of the user, and the iris recognition device acquires an iris image of the user;
or,
the collecting element of the face recognition device and the collecting element of the iris recognition device are the same collecting element.
In an alternative embodiment, the processor 23 may be further configured to:
determining an operation behavior corresponding to the authentication request;
and if the operation behavior belongs to a high security level, calling the face recognition device and the iris recognition device simultaneously based on the authentication request.
The processor 23 may be further configured to: and if the operation behavior belongs to a low security level, calling one of the face recognition device and the iris recognition device according to a selection rule based on the authentication request to perform the identity authentication of the user.
In an alternative embodiment, the processor 23 may be further configured to:
obtaining a security state parameter of the electronic device based on the authentication request;
and if the safety state parameters do not meet the safety conditions, calling the face recognition device and the iris recognition device at the same time based on the authentication request.
The processor 23 may be further configured to: and if the safety state parameters meet the safety conditions, calling one of the face recognition device and the iris recognition device according to the selection rule based on the authentication request to perform the identity authentication of the user.
In an alternative embodiment, the selection rule is to select one of the face recognition device and the iris recognition device according to the ambient lighting determination.
In an optional embodiment, the processor 23, when determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device, is specifically configured to:
the first recognition result represents that the face image passes the authentication, and the second recognition result represents that the iris image passes the authentication, so that the identity authentication of the user is determined to be successful;
and the first identification result and the second identification result have a representation that the authentication fails, and the identity authentication of the user is determined to be unsuccessful.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
It should be understood that the technical problems can be solved by combining and combining the features of the embodiments from the claims.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. An information processing method, the method comprising:
obtaining an authentication request;
calling a face recognition device and an iris recognition device simultaneously based on the authentication request;
acquiring a face image of a user through the face recognition device and recognizing the face image;
acquiring an iris image of the user through the iris recognition device and recognizing the iris image;
and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device.
2. The method of claim 1, wherein a first window corresponding to an acquisition element of the face recognition device and a second window corresponding to an acquisition element of the iris recognition device are located on the same plane so that the user can perform one input, the face recognition device acquires a face image of the user, and the iris recognition device acquires an iris image of the user;
or,
the collecting element of the face recognition device and the collecting element of the iris recognition device are the same collecting element.
3. The method of claim 2, further comprising:
determining an operation behavior corresponding to the authentication request;
and if the operation behavior belongs to a high security level, calling a face recognition device and an iris recognition device at the same time based on the authentication request.
4. The method of claim 3, further comprising:
and if the operation behavior belongs to a low security level, calling one of the face recognition device and the iris recognition device according to a selection rule based on the authentication request to perform the identity authentication of the user.
5. The method of claim 2, further comprising:
obtaining a security state parameter of the electronic device based on the authentication request;
and if the safety state parameters do not meet the safety conditions, calling a face recognition device and an iris recognition device at the same time based on the authentication request.
6. The method of claim 5, further comprising:
and if the safety state parameters meet safety conditions, calling one of the face recognition device and the iris recognition device according to a selection rule based on the authentication request to perform the identity authentication of the user.
7. The method according to claim 4 or 6, the selection rule being to select one of the face recognition device and the iris recognition device according to an ambient lighting determination.
8. The method of claim 1, the determining whether the identity of the user is successfully authenticated based on a first recognition result of the face recognition device and a second recognition result of the iris recognition device comprising:
the first recognition result represents that the face image passes the authentication, and the second recognition result represents that the iris image passes the authentication, so that the identity authentication of the user is determined to be successful;
and determining that the identity authentication of the user is unsuccessful if the first identification result and the second identification result have a representation authentication failure.
9. An electronic device, the electronic device comprising:
a face recognition device;
an iris recognition device;
a processor to obtain an authentication request; calling the face recognition device and the iris recognition device simultaneously based on the authentication request, acquiring a face image of a user through the face recognition device and recognizing the face image; acquiring an iris image of the user through the iris recognition device and recognizing the iris image; and determining whether the identity of the user is successfully authenticated based on the first recognition result of the face recognition device and the second recognition result of the iris recognition device.
10. The electronic device of claim 9, wherein a first window corresponding to the acquisition element of the face recognition device and a second window corresponding to the acquisition element of the iris recognition device are located on a first surface of the electronic device;
or,
the collecting element of the face recognition device and the collecting element of the iris recognition device are the same collecting element.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910251594.6A CN109960920A (en) | 2019-03-29 | 2019-03-29 | Information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910251594.6A CN109960920A (en) | 2019-03-29 | 2019-03-29 | Information processing method and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109960920A true CN109960920A (en) | 2019-07-02 |
Family
ID=67025452
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910251594.6A Pending CN109960920A (en) | 2019-03-29 | 2019-03-29 | Information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109960920A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414445A (en) * | 2019-07-31 | 2019-11-05 | 联想(北京)有限公司 | Light source adjusting method, device and electronic equipment for recognition of face |
CN112131974A (en) * | 2020-09-07 | 2020-12-25 | 天地(常州)自动化股份有限公司 | Biological feature recognition method and device |
CN113657231A (en) * | 2021-08-09 | 2021-11-16 | 广州中科智云科技有限公司 | Image identification method and device based on multi-rotor unmanned aerial vehicle |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017016033A1 (en) * | 2015-07-30 | 2017-02-02 | 宇龙计算机通信科技(深圳)有限公司 | Password information authentication method, password information authentication system, and terminal |
CN106789922A (en) * | 2015-12-08 | 2017-05-31 | 腾讯科技(深圳)有限公司 | Give account number, the method and apparatus of authentication for change |
CN107437009A (en) * | 2017-07-14 | 2017-12-05 | 广东欧珀移动通信有限公司 | Authority control method and related product |
CN107580114A (en) * | 2017-08-24 | 2018-01-12 | 广东欧珀移动通信有限公司 | Biometric discrimination method, mobile terminal and computer-readable recording medium |
CN108734001A (en) * | 2018-04-26 | 2018-11-02 | 维沃移动通信有限公司 | A kind of authentication method of user identity, mobile terminal |
-
2019
- 2019-03-29 CN CN201910251594.6A patent/CN109960920A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017016033A1 (en) * | 2015-07-30 | 2017-02-02 | 宇龙计算机通信科技(深圳)有限公司 | Password information authentication method, password information authentication system, and terminal |
CN106789922A (en) * | 2015-12-08 | 2017-05-31 | 腾讯科技(深圳)有限公司 | Give account number, the method and apparatus of authentication for change |
CN107437009A (en) * | 2017-07-14 | 2017-12-05 | 广东欧珀移动通信有限公司 | Authority control method and related product |
CN107580114A (en) * | 2017-08-24 | 2018-01-12 | 广东欧珀移动通信有限公司 | Biometric discrimination method, mobile terminal and computer-readable recording medium |
CN108734001A (en) * | 2018-04-26 | 2018-11-02 | 维沃移动通信有限公司 | A kind of authentication method of user identity, mobile terminal |
Non-Patent Citations (1)
Title |
---|
黄轩: "《移动电子商务研究》", 31 May 2016 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414445A (en) * | 2019-07-31 | 2019-11-05 | 联想(北京)有限公司 | Light source adjusting method, device and electronic equipment for recognition of face |
CN110414445B (en) * | 2019-07-31 | 2022-03-25 | 联想(北京)有限公司 | Light source adjusting method and device for face recognition and electronic equipment |
CN112131974A (en) * | 2020-09-07 | 2020-12-25 | 天地(常州)自动化股份有限公司 | Biological feature recognition method and device |
CN113657231A (en) * | 2021-08-09 | 2021-11-16 | 广州中科智云科技有限公司 | Image identification method and device based on multi-rotor unmanned aerial vehicle |
CN113657231B (en) * | 2021-08-09 | 2024-05-07 | 广州中科智云科技有限公司 | Image recognition method and device based on multi-rotor unmanned aerial vehicle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200175256A1 (en) | Analysis of reflections of projected light in varying colors, brightness, patterns, and sequences for liveness detection in biometric systems | |
JP6417676B2 (en) | Information processing apparatus, information processing method, eyewear terminal, and authentication system | |
US20190236391A1 (en) | Passive availability testing | |
EP3163851A1 (en) | User mode control method and system based on iris recognition technology for mobile terminal | |
CN107230066B (en) | Payment method and device, computer device and readable storage medium | |
CN108986245A (en) | Work attendance method and terminal based on recognition of face | |
CN104537746A (en) | Intelligent electronic door control method, system and equipment | |
CN109960920A (en) | Information processing method and electronic equipment | |
US20110157347A1 (en) | Unintrusive biometric capture device, system and method for logical access control | |
CN105450407A (en) | Identity authentication method and device | |
CN108804006B (en) | Unlocking method, device, equipment and storage medium for wearable equipment | |
CN104199688A (en) | Mobile terminal and system reinstallation control method and device thereof | |
CN104899490A (en) | Terminal positioning method and user terminal | |
CN107145772B (en) | Terminal equipment security control method and device and terminal equipment | |
CN107786487B (en) | Information authentication processing method, system and related equipment | |
WO2017067507A1 (en) | Method and device for determining a use permission of an apparatus | |
WO2016197389A1 (en) | Method and device for detecting living object, and mobile terminal | |
CN111445640A (en) | Express delivery pickup method, device, equipment and storage medium based on iris recognition | |
CN108363939B (en) | Characteristic image acquisition method and device and user authentication method | |
CN106469269B (en) | A kind of method, apparatus and terminal of Password Management | |
CN106529243A (en) | Identity authentication method, device and terminal | |
CN105407069B (en) | Living body authentication method, apparatus, client device and server | |
CN107786349B (en) | Security management method and device for user account | |
CN108960459A (en) | It registers login method and device | |
WO2017041358A1 (en) | User identity recognition method and apparatus, and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |