CN110991239A - Identity verification method, device, equipment and computer readable storage medium - Google Patents
Identity verification method, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110991239A CN110991239A CN201911048185.2A CN201911048185A CN110991239A CN 110991239 A CN110991239 A CN 110991239A CN 201911048185 A CN201911048185 A CN 201911048185A CN 110991239 A CN110991239 A CN 110991239A
- Authority
- CN
- China
- Prior art keywords
- user
- target
- environment
- image
- biological characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012795 verification Methods 0.000 title claims abstract description 13
- 230000009471 action Effects 0.000 claims description 29
- 230000015654 memory Effects 0.000 claims description 15
- 238000001514 detection method Methods 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 6
- 230000007613 environmental effect Effects 0.000 abstract description 4
- 230000008569 process Effects 0.000 abstract description 4
- 230000002411 adverse Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/70—Multimodal biometrics, e.g. combining information from different biometric modalities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Psychiatry (AREA)
- Social Psychology (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses an identity authentication method, an identity authentication device, identity authentication equipment and a computer readable storage medium. The method comprises the following steps: in a multi-user environment, acquiring a multi-user image; extracting user characteristics of each user in the multi-user image; identifying user characteristics matched with preset target characteristics in the user characteristics of all users, and determining the user corresponding to the user characteristics matched with the target characteristics as a target user; collecting biological characteristic information of a target user; and if the biological characteristic information of the target user is matched with the preset standard biological characteristic information, executing unlocking operation. The method and the system identify the target user in the multi-person environment, only collect the biological characteristic information of the target user in the multi-person environment, and judge whether the identity verification operation can be executed or not according to the biological characteristic information. By the method and the device, adverse effects of environmental factors on the authentication process can be reduced, the authentication time is shortened, the success rate of authentication is improved, and the user experience effect is improved.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an identity authentication method, apparatus, device, and computer-readable storage medium.
Background
With the continuous development of terminal technology, intelligent terminals have become popular and become an indispensable tool in people's daily life. Before using the intelligent terminal, the user needs to perform authentication so as to determine that the user is a legal user of the intelligent terminal. In the existing authentication mode, a user can use a face to perform authentication, but in a multi-user environment, the mode of using the face to perform authentication is greatly affected.
For example, when a user uses a face to perform authentication in a multi-user environment, a plurality of faces may appear in front of a terminal screen, and at this time, the face detection tool needs to scan and detect the plurality of faces, so as to detect whether the faces of legitimate users exist in the plurality of faces. Because a plurality of faces need to be detected respectively, the time for identity authentication can be prolonged, the success rate of identity authentication is reduced, and the experience of user use is influenced.
Disclosure of Invention
The invention mainly aims to provide an identity authentication method, an identity authentication device, identity authentication equipment and a computer readable storage medium, and aims to solve the problem that the success rate of a mode of using a human face for authentication is low in a multi-person environment.
Aiming at the technical problems, the invention solves the technical problems by the following technical scheme:
the invention provides an identity authentication method, which comprises the following steps: in a multi-user environment, acquiring a multi-user image; extracting user features of each user in the multi-user image; identifying user characteristics matched with preset target characteristics in the user characteristics of all the users, and determining the user corresponding to the user characteristics identified by matching with the target characteristics as a target user; collecting the biological characteristic information of the target user; and if the biological characteristic information of the target user is matched with the preset standard biological characteristic information, executing unlocking operation.
Wherein the user characteristics include: a user action characteristic; the target feature comprises: a target action characteristic.
Wherein, prior to the acquiring the multi-user image, further comprising: collecting an environment image; detecting whether the environment image comprises a plurality of face images or not; and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
Wherein the biometric information includes at least one of: face feature information, iris feature information, and voice feature information.
The invention also provides an authentication device, comprising: the acquisition module is used for acquiring a multi-user image in a multi-user environment; the extraction module is used for extracting the user characteristics of each user in the multi-user image; the identification module is used for identifying user characteristics matched with preset target characteristics in the user characteristics of all the users and determining the user corresponding to the user characteristics matched with the target characteristics as a target user; the acquisition module is also used for acquiring the biological characteristic information of the target user; and the verification module is used for executing unlocking operation under the condition that the biological characteristic information of the target user is matched with preset standard biological characteristic information.
Wherein the user characteristics include: a user action characteristic; the target feature comprises: a target action characteristic.
Wherein the device further comprises a detection module; a detected module to: collecting an environment image; detecting whether the environment image comprises a plurality of face images or not; and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
Wherein the biometric information includes at least one of: face feature information, iris feature information, and voice feature information.
The invention also provides identity authentication equipment, which comprises a processor and a memory; the processor is used for executing the authentication program stored in the memory to realize the authentication method.
The present invention also provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the above-described authentication method.
The invention has the following beneficial effects:
the invention identifies the target user with the target characteristic in the multi-person environment, and only collects the biological characteristic information of the target user in the multi-person environment, and carries out user identity verification according to the biological characteristic information. By the method and the device, adverse effects of environmental factors on the authentication process can be reduced, the authentication time is shortened, the success rate of authentication is improved, and the user experience effect is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow diagram of a method of identity verification according to an embodiment of the present invention;
fig. 2 is a detailed flowchart of an authentication method according to an embodiment of the present invention;
FIG. 3 is a block diagram of an authentication device according to an embodiment of the present invention;
fig. 4 is a block diagram of an authentication apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.
According to an embodiment of the present invention, there is provided an authentication method. Fig. 1 is a flowchart of an authentication method according to an embodiment of the present invention.
And step S110, acquiring a multi-user image in a multi-user environment.
The multi-user image refers to a picture or a video image of a multi-user environment.
After the picture of the multi-person environment is collected, the method can be used for analyzing the appearance characteristics of the user.
After capturing multiple frames of video images of a multi-person environment, a multi-user video may be formed. The multi-user video may be used to analyze the actions of individual users in a multi-user environment.
In this embodiment, an environmental image is acquired before a multi-user image is acquired; detecting whether the environment image comprises a plurality of face images or not; and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
And step S120, extracting the user characteristics of each user in the multi-user image.
And the user characteristics are used for reflecting the characteristics of the target user.
User characteristics, including but not limited to: a user action feature.
For example: the user action characteristics are mouth opening, head nodding, head shaking, smiling and other action characteristics.
Of course, the user features may also be user appearance features. For example: long hair, short hair, etc.
If the multi-user image is a picture of a multi-user environment, the user appearance features of each user appearing in the picture can be extracted. If the multi-user image is a video image of a multi-user environment, user action features of each user appearing in the video image can be extracted.
Step S130, identifying a user characteristic matched with a preset target characteristic from the user characteristics of the users, and determining a user corresponding to the user characteristic matched with the target characteristic as a target user.
By detecting a user characteristic of each user in a multi-user environment, a target user having a preset target characteristic is identified in the multi-user environment.
The target user refers to a suspected legal user of the terminal device. The valid user is a valid user or owner of the terminal device.
And the target characteristics are used for reflecting the characteristics of the target user so as to quickly locate the target user in a multi-user environment. The target features are pre-entered and stored by a legitimate user.
Target features, including but not limited to: a target action characteristic. For example: the target action characteristics are action characteristics such as mouth opening, head nodding, head shaking, smiling and the like. That is, in a multi-user environment, a target user having a preset target action characteristic is identified. Further, the user action characteristics matched with the preset target action characteristics can be identified in each user action characteristic through a preset action identification technology.
Of course, the target feature may also be a target topographical feature. For example: long hair, short hair, etc.
In this embodiment, if the similarity between the user feature and the preset target feature is greater than the preset similarity threshold, it is determined that the user feature matches the preset target feature. Further, the user appearance features matched with the preset target appearance features can be identified in the user appearance features through a preset image identification technology.
Step S140, collecting the biometric information of the target user.
Biometric information including at least one of: face feature information, iris feature information, and voice feature information.
And step S150, if the biological characteristic information of the target user is matched with preset standard biological characteristic information, executing unlocking operation.
The standard biometric information is biometric information of a legitimate user stored in advance.
And if the biological characteristic information is matched with preset standard biological characteristic information, determining that the target user is a legal user and executing unlocking operation, otherwise, determining that the target user is an illegal user and forbidding executing the unlocking operation. Of course, after the target user is determined to be an illegal user, the process of this embodiment may be directly ended, or the multi-user image may be re-acquired, so as to re-determine the target user.
Specifically, after an unlocking verification event is triggered, if the current environment is determined to be a multi-user environment, user characteristics of each user are detected; after the biological characteristic information of the target user is collected, if the target user is determined to be a legal user, executing unlocking operation; and if the target user is determined to be an illegal user, forbidding to execute unlocking operation. Further, after the preset button is clicked, an unlock verification event is triggered. The preset button may be a physical button or a virtual button. For example: the preset button is a power key of the terminal, after the power key is clicked, whether the current environment is a multi-user environment or not is detected, if yes, multi-user images are collected, and user features of each user are extracted; and if not, directly acquiring the biological characteristic information of the user in the current environment.
In the present embodiment, in the multi-person environment, a target user having a target feature is identified, and in the multi-person environment, only biometric information of the target user is collected, and user authentication is performed based on the biometric information. Adverse effects of environmental factors on the authentication process can be reduced, the authentication time is shortened, the success rate of authentication is improved, and the user experience effect is improved.
The embodiment can be applied to intelligent terminals and equipment needing identity authentication. For example: the identity authentication method is applied to intelligent household equipment such as door locks and safes.
A more specific embodiment is provided below to illustrate the authentication method of the present invention.
Fig. 2 is a detailed flowchart of an authentication method according to an embodiment of the present invention.
Step S210, after the unlocking verification event is triggered, a camera is called to collect an environment image.
Step S220, detecting whether the environment image comprises a plurality of face images; if yes, go to step S230; if not, step S240 is performed.
And identifying the number of human faces in the environment image by using a human face identification technology, and determining whether the environment image comprises a plurality of human face images.
Step S230, if the environment image includes a plurality of face images, determining that the current environment is a multi-person environment, and executing step S250.
Step S240, if the environment image does not include multiple face images, determining that the current environment is not a multi-person environment, and executing step S260.
Step S250, capturing an image of the multi-user environment (multi-user image), and identifying a target user having a preset target feature in the captured image.
The legal user can preset target action characteristics in the identity authentication function set by the system in advance.
For example: mouth opening, head shaking, head nodding, smiling, etc. Therefore, when the identification is executed, whether a user is doing actions such as mouth opening, head shaking, head nodding, smiling and the like in the visual field of the camera is identified, and the target user can be locked.
And step S260, collecting the biological characteristic information of the target user.
And if the current environment is a multi-person environment, the target user is a user with user characteristics.
And if the current environment is not the multi-person environment, determining the user in the camera view as the target user.
Step S270, judging whether the biological characteristic information of the target user is matched with standard biological characteristic information; if yes, go to step S280; if not, step S290 is performed.
And step S280, if the biological characteristic information is matched with preset standard biological characteristic information, unlocking operation is executed.
In step S290, if the biometric information does not match the preset standard biometric information, the unlocking operation is prohibited.
In this embodiment, in order to avoid the problem that multiple faces appearing in the camera view need to be detected respectively in a multi-person environment, the target user appearing in the camera view is identified in this embodiment, in this way, after the target user with the target feature is identified, it is no longer necessary to spend time to identify other persons in the field, the identification speed is increased, it is no longer necessary to spend time to collect the biometric information of other persons in the field, only the biometric information of the target user is collected, the collection quantity of the biometric information is reduced, the computation amount of the biometric information matching is also reduced, the embodiment only matches the biometric information of the target user, the unlocking success rate can be effectively increased, and the unlocking time is shortened.
An authentication apparatus is provided below. Fig. 3 is a block diagram of an authentication apparatus according to an embodiment of the present invention.
The identity authentication device comprises: an acquisition module 310, an extraction module 320, an identification module 330, and a verification module 340.
The acquisition module 310 is configured to acquire a multi-user image in a multi-user environment.
An extracting module 320, configured to extract user features of each user in the multi-user image.
The identifying module 330 is configured to identify, among the user characteristics of the users, a user characteristic that matches a preset target characteristic, and determine, as a target user, a user corresponding to the identified user characteristic that matches the target characteristic.
The collecting module 310 is further configured to collect biometric information of the target user.
The verification module 340 is configured to execute an unlocking operation when the biometric information of the target user matches with preset standard biometric information, and otherwise, prohibit the unlocking operation.
Wherein the user characteristics include: a user action characteristic; the target feature comprises: a target action characteristic.
Wherein the device further comprises a detection module (not shown in the figure); the detection module is used for acquiring an environment image before the user characteristics of each user are detected; detecting whether the environment image comprises a plurality of face images or not; and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
Wherein the biometric information includes at least one of: face feature information, iris feature information, and voice feature information.
The functions of the apparatus in this embodiment have been described in the above method embodiments, so that reference may be made to the related descriptions in the foregoing embodiments for details that are not described in this embodiment, and further details are not described here.
An authentication apparatus is provided below. Fig. 4 is a block diagram of an authentication device according to an embodiment of the present invention.
In this embodiment, the authentication device includes, but is not limited to: a processor 410, a memory 420.
The processor 410 is configured to execute an authentication program stored in the memory 420 to implement the authentication method described above. Specifically, the processor 410 is configured to execute an authentication program stored in the memory 420 to implement the following steps: in a multi-user environment, acquiring a multi-user image; extracting user features of each user in the multi-user image; identifying user characteristics matched with preset target characteristics in the user characteristics of all the users, and determining the user corresponding to the user characteristics matched with the target characteristics as a target user; collecting the biological characteristic information of the target user; and if the biological characteristic information of the target user is matched with the preset standard biological characteristic information, executing unlocking operation.
Wherein the user characteristics include: a user action characteristic; the target feature comprises: a target action characteristic.
Wherein, prior to the acquiring the multi-user image, further comprising: collecting an environment image; detecting whether the environment image comprises a plurality of face images or not; and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
Wherein the biometric information includes at least one of: face feature information, iris feature information, and voice feature information.
The embodiment of the invention also provides a computer readable storage medium. The computer-readable storage medium herein stores one or more programs. Among other things, computer-readable storage media may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
When one or more programs in the computer-readable storage medium are executable by one or more processors to implement the authentication method described above.
In particular, the processor is configured to execute an authentication program stored in the memory to implement the steps of: in a multi-user environment, acquiring a multi-user image; extracting user features of each user in the multi-user image; identifying user characteristics matched with preset target characteristics in the user characteristics of all the users, and determining the user corresponding to the user characteristics matched with the target characteristics as a target user; collecting the biological characteristic information of the target user; and if the biological characteristic information of the target user is matched with the preset standard biological characteristic information, executing unlocking operation.
Wherein the user characteristics include: a user action characteristic; the target feature comprises: a target action characteristic.
Wherein, before the detecting the user characteristic of each user, the method further comprises: collecting an environment image; detecting whether the environment image comprises a plurality of face images or not; and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
Wherein the biometric information includes at least one of: face feature information, iris feature information, and voice feature information.
The above description is only an example of the present invention, and is not intended to limit the present invention, and it is obvious to those skilled in the art that various modifications and variations can be made in the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.
Claims (10)
1. An identity verification method, comprising:
in a multi-user environment, acquiring a multi-user image;
extracting user features of each user in the multi-user image;
identifying user characteristics matched with preset target characteristics in the user characteristics of all the users, and determining the user corresponding to the user characteristics matched with the target characteristics as a target user;
collecting the biological characteristic information of the target user;
and if the biological characteristic information of the target user is matched with the preset standard biological characteristic information, executing unlocking operation.
2. The method of claim 1,
the user features include: a user action characteristic;
the target feature comprises: a target action characteristic.
3. The method of claim 1, further comprising, prior to said acquiring the multi-user image:
collecting an environment image;
detecting whether the environment image comprises a plurality of face images or not;
and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
4. The method according to any one of claims 1 to 3, wherein the biometric information includes at least one of: face feature information, iris feature information, and voice feature information.
5. An authentication apparatus, comprising:
the acquisition module is used for acquiring a multi-user image in a multi-user environment;
the extraction module is used for extracting the user characteristics of each user in the multi-user image;
the identification module is used for identifying user characteristics matched with preset target characteristics in the user characteristics of all the users and determining the user corresponding to the user characteristics matched with the target characteristics as a target user;
the acquisition module is also used for acquiring the biological characteristic information of the target user;
and the verification module is used for executing unlocking operation under the condition that the biological characteristic information of the target user is matched with preset standard biological characteristic information.
6. The apparatus of claim 5,
the user features include: a user action characteristic;
the target feature comprises: a target action characteristic.
7. The apparatus of claim 5, further comprising a detection module; the detection module is configured to:
collecting an environment image;
detecting whether the environment image comprises a plurality of face images or not;
and if the environment image comprises a plurality of face images, determining that the current environment is a multi-person environment.
8. The apparatus according to any one of claims 5 to 7, wherein the biometric information comprises at least one of: face feature information, iris feature information, and voice feature information.
9. An authentication device, comprising a processor, a memory; the processor is used for executing the identity authentication program stored in the memory to realize the identity authentication method of any one of claims 1-4.
10. A computer readable storage medium storing one or more programs which are executable by one or more processors to implement the authentication method of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911048185.2A CN110991239A (en) | 2019-10-30 | 2019-10-30 | Identity verification method, device, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911048185.2A CN110991239A (en) | 2019-10-30 | 2019-10-30 | Identity verification method, device, equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110991239A true CN110991239A (en) | 2020-04-10 |
Family
ID=70082732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911048185.2A Pending CN110991239A (en) | 2019-10-30 | 2019-10-30 | Identity verification method, device, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110991239A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103383595A (en) * | 2012-05-02 | 2013-11-06 | 三星电子株式会社 | Apparatus and method of controlling mobile terminal based on analysis of user's face |
CN107566654A (en) * | 2017-09-27 | 2018-01-09 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
US20180068173A1 (en) * | 2016-09-02 | 2018-03-08 | VeriHelp, Inc. | Identity verification via validated facial recognition and graph database |
CN108052878A (en) * | 2017-11-29 | 2018-05-18 | 上海图漾信息科技有限公司 | Face recognition device and method |
CN109190539A (en) * | 2018-08-24 | 2019-01-11 | 阿里巴巴集团控股有限公司 | Face identification method and device |
CN109522877A (en) * | 2018-12-14 | 2019-03-26 | 睿云联(厦门)网络通讯技术有限公司 | A kind of offline plurality of human faces recognition methods and computer equipment based on Android device |
-
2019
- 2019-10-30 CN CN201911048185.2A patent/CN110991239A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103383595A (en) * | 2012-05-02 | 2013-11-06 | 三星电子株式会社 | Apparatus and method of controlling mobile terminal based on analysis of user's face |
US20180068173A1 (en) * | 2016-09-02 | 2018-03-08 | VeriHelp, Inc. | Identity verification via validated facial recognition and graph database |
CN107566654A (en) * | 2017-09-27 | 2018-01-09 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
CN108052878A (en) * | 2017-11-29 | 2018-05-18 | 上海图漾信息科技有限公司 | Face recognition device and method |
CN109190539A (en) * | 2018-08-24 | 2019-01-11 | 阿里巴巴集团控股有限公司 | Face identification method and device |
CN109522877A (en) * | 2018-12-14 | 2019-03-26 | 睿云联(厦门)网络通讯技术有限公司 | A kind of offline plurality of human faces recognition methods and computer equipment based on Android device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109976506B (en) | Awakening method of electronic equipment, storage medium and robot | |
CN105844128B (en) | Identity recognition method and device | |
CN106204815B (en) | A kind of access control system based on human face detection and recognition | |
WO2019127365A1 (en) | Face living body detection method, electronic device and computer program product | |
CN110705451A (en) | Face recognition method, face recognition device, terminal and server | |
US10127439B2 (en) | Object recognition method and apparatus | |
KR101291899B1 (en) | Procedure for identifying a person by eyelash analysis and acquisition device using thereof | |
US9122913B2 (en) | Method for logging a user in to a mobile device | |
CN108804006B (en) | Unlocking method, device, equipment and storage medium for wearable equipment | |
CN103856614A (en) | Method and device for avoiding error hibernation of mobile terminal | |
CN104361326A (en) | Method for distinguishing living human face | |
CN101499018A (en) | Data processing unit and method | |
WO2017113579A1 (en) | Intelligent access control method, system, server and device | |
KR100824757B1 (en) | Gait recognition method | |
JP2000102524A (en) | Individual identifying device | |
JP7147860B2 (en) | Biometric authentication device, biometric authentication method, and biometric authentication program | |
CN110348193A (en) | Verification method, device, equipment and storage medium | |
TW201445351A (en) | Login system and login method for mobile terminal | |
CN110781778B (en) | Access control method and device, storage medium and home system | |
CN109543635A (en) | Biopsy method, device, system, unlocking method, terminal and storage medium | |
JP6311237B2 (en) | Collation device and collation method, collation system, and computer program | |
CN106529243A (en) | Identity authentication method, device and terminal | |
US20120219192A1 (en) | Method of controlling a session at a self-service terminal, and a self-service terminal | |
CN110991239A (en) | Identity verification method, device, equipment and computer readable storage medium | |
WO2017041358A1 (en) | User identity recognition method and apparatus, and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |