M337796 八、新型說明: 【新型所屬之技術領域】 本創作係關於臉部辨識系統、保全系統及操作此等系統 之方法。詳言之,本創作亦係關於包含一或多個此等系統 或使用此等操作方法之門禁系統。 【先前技術】 臉部辨識系統已存在-些時間。此等系統主要試圖驗證 丨使用者是否為合法或被授權人,且此等系統可用於各種應 1用之保全系統中。已在開發此技術之一公司為〇:叫.“ System GmbH (www.COgnitec_SyStemsde)。然而本創作 之創作者已發現,因許多原因,習知之此類型系統對使用 者並不友好,且對維護此等系統之管理者亦不友好,並常 常在其操作中導致高故障率。 本創作試圖解決此等使用者或系統管理員不友好問題, 或至少向公眾提供一替代方法。 > 【新型内容】 根據本創作之第一態樣,提供一臉部辨識保全系統,其 包含使用者與其相互作用之終端,該終端包含至少兩個相 機、用於判定使用該等相機中之哪一者來捕獲使用者之臉 部影像的構件,及用於顯示使用者之臉部影像的構件,其 中u亥荨相機中之一者配置於另一(其他)相機之上。 車又佳地,該系統可在終端處包含兩個相機,且顯示構件 "T配置於兩個相機之間。顯示於顯示構件上之影像係一鏡 像。 123696.doc M337796 在a知例中,該系統可包含一載有使用者或被授權使 用者之臉部影像之資訊的資料庫。 適當地,該系統可經由網際網路而連接至該資料庫。此 置之優點為可自遠離該系統之位置維護及更新該資料 庫。 有利地,該系統可包含用於識別使用者之構件。該系統 可包含用於偵測識別構件之構件。識別構件大體可呈卡之 I /專卡载有该糸統之各別被授權使用者之識別資訊 且提供至該系統之各別被授權使用者。或者,偵測構件可 經調適以彳貞測各別使用者獨有的其他特徵。 根據本創作之第二癌樣,提供一用於允許或不允許使用 者進入之門禁系統,其包含如上文所描述之系統。門禁系 、充可I έ閘道或一門。在確認使用者之真實性後,該閘 道或門可根據臉部辨識系統之指令而打開。 根據本創作之第三態樣,提供藉由使用上文所描述之系 I 統來鑑別使用者身份的方法。 根據本創作之第四態樣,提供藉由使用臉部辨識系統來 鑑別使用者身份的方法,其包含如下步驟:⑷自試圖通過 該系統之使用者獲取第一組資料;(b)基於該第一組資料判 定使用相機中之哪一者來捕獲使用者之臉部影像;捕獲 使用者之影像;(d)基於所捕獲之影像產生第二組資料; (e)將該第二組資料與載有系統之被授權使用者之識別的資 料庫中之資訊進行比較;(〇基於該比較而同步產生第三組 資料;及(g)基於該第三組資料,允許或拒絕使用者通過該 123696.doc M337796 糸。名^一^ 始^ y 丨, 一 中’该方法可進一步包含在顯示構件中 顯示使用者之臉部影像的步驟。 【實施方式】 、〜文所⑽述,臉部辨識系統已存在一些時間。用於將 ‘ θ捕k之使用I之臉部影像與儲存在資料4中之影像進行 • 、' '接著判疋邊使用者是否為被授權使用者之電腦軟體 it :陌生。習知之臉部辨識系統通常設計有一終端,使用 φ I精由該終端與該系統相互作用。在使用時,使用者站在 終端前,以便駐留在終端處之相機可捕獲使用者的臉部影 像。然而’因為該終端通常固定地安裝在牆壁上或柱體 上,且在該終端處將相機固定至距地面之某一高度,所以 在影像捕獲處理期間常常出現問題。因使用者有不同身高 ^機被固定地安裝,所以適當地捕獲使用者之臉部影像 二吊不7人滿意。本創作或如下文所描述之根據本創作之 實轭例試圖解決與此問題相關聯之問題。 • 如圖1所示,根據本創作之第一實施例之臉部辨識系統 ,包含使用者與其相互作用之終端2。終端以合適高度固定 -地安裝在—牆壁上。圖1及圖2分別展示展轉端2之正面 圖及透視圖之示意圖。終端2形狀大體為長方形,且垂直 地安置在牆壁上。自終端2之上端至下端,提供一第一影 像捕獲構件(諸如相機4)、用於顯示使用者之臉部影像之構 件(諸如監視器6)、一第二影像捕獲構件(諸如相機8)、複 數個指不器10及用於偵測使用者之識別的構件(諸如偵測 器12)。監視器6具有多種功能,該等功能中之一功能為向 123696.doc M337796 使用者提供生物反饋,且隨後在描述中將更詳細地解釋該 等功能。 雖未在圖1及圖2中展示,但該終端亦包含用於判定使用 相機4、8中之哪一相機來捕獲使用者之臉部影像的構件。 在此實施例中’此判定構件包含用於進行判定功能之電腦 演异法,但在其他實施例中,判定構件可包含經調適以進 订判疋程序之電路。系統亦包含先前頒予被授權使用該系 統之使用者的識別卡(例如,感應卡、,,智慧,,卡等)。識別 卡載有各別被授權使用者之資訊概況,諸如使用者的名 子、進入權級別及身高(或身高類型)。來自該終端之偵測 :經調適以㈣識別卡並自使用者之卡_取資訊。應注 心可使用各種識別卡。此等卡包括接觸型識別卡、非接 觸型識別卡、長距離灯出卡、短距離叩①卡、脇卡、 而阶卡及基於㈣㈣之卡。視使用哪一卡類型而定, 判定構件將包括適於债測特定卡類型之各別讀取器。 在此實施例中,終端2處之第一相機4經配置使得其位於 距地面約5 9”處並接近監視器6,且終端二處之第二相機8經 配置使得其位於距地面約5’3”處並接近監視以且亦在第一 :=之下。監視器6位於終端2處,在第-相機與第二相 枝之間。侦伽位於終端2之下端,在第二相機8之下。 又’在此貫施例中,有兩種身高類型,即指定至較高之 之類型Η及指定至較矮之人之類型h 英尺6英吋.f古 士 在此實知例中,5 ^更巧之人被分類為類型H,且低於5英尺 “類為類型卜此身高類型係館存於其識別卡中之 123696.doc M337796 資訊概況之部分。為解釋該系統之特性及操作,在如下情 境中假定使用者係類型Η之人。 參看圖3 ’處於其待用模式之系統14準備好(類型η使用 者之)臉部進行辨識或驗證。當使用者走近終端2時,將在 監視器6處提示其在偵測器12處登錄其識別卡。作為回 應,使用者將其識別卡置放在偵測器12處(見16)。铺測器 12接著首先試圖驗證該卡是否為有效卡(見18)。若該卡非 有效卡’則其將輸出信號至監視器6用於將錯誤訊息顯示 在監視二6上(見20),且系統接著返回至其待用模式(見 22) °若該卡為有效卡’則其將試圖自儲存在卡中之概況 擷取其他資訊並續定被驗證之人的身高類型(亦即,類型Η 或類型'之使用者)(見24)。接著當該人被識別為類型Η時 (如上文在此實施例中所指示,使用者係類型Η之人且識別 卡在資訊概況中向其指派此類型Η資訊),债測器將輸出一 信號以便啟動位於較高位置之第-相機4(見20)。一旦相機 4啟動’其將經調適以在相機距離(自約my)捕獲使用 ^之臉部影像。在捕獲影像之後,所捕獲之影像將轉換為 二§fl以供與資料庫中之資訊進行比較,從而試圖確定具有 Λ特疋所捕獲臉部影像之人是否為被授權通過該系統之人 € & Ο若土現所捕獲之臉部影像並不對應於記錄上之任 :貝^則系統將中止辨識處理(見3〇)並輸出信號以將錯 兴訊〜提不至監視器(見32) ’且接著立即返回至其待用模 式(見:4)。β亥系統亦將與此"不成功"辨識有關之資訊登錄 在日諸表上為供將來參考(見36)。若發現所捕獲之臉部影 123696.doc M337796 像不對應於被授權使用者之眘 用者之貝汛,則系統將輸出一信號將 個人化問候訊息提^至監視^U38)n㈣接至入口 閘道之情境中’該系統亦可經調適以輸出一用於自動開啟 .亥閘道或打開该閘道之信號。該系統同樣亦將與此"成功" 辨識有關之資訊登錄在曰誌表上為供將來參考(見40)。系 統接著返回至其㈣模式料下—辨識實施(見42)。μ 當然’當系統用以辨識類型h之被授權使用者的臉部貪 像時,將替代地啟動下部相機8,但其餘演算法大體類 似。 上文所描述之系統在多種方式上係技術性重大的。首 先,在習知臉部辨識系統中僅提供一相機。若相機相對於 使用者過高地安裝在-岐物上,則相機傾向於捕獲使用 者臉部之頂部透視圖,或者若使㈣很矮,則目機傾向於 捕獲使用者前額之影像。應理解,連接至系統之資料庫載 有使用者(或被授權之使用者)臉部影像之資訊,且若所捕 獲之影像並非真正為使用者之臉部影像而是其前額影像, 則儘管使用者很可能為被授權使用者,但辨識系統Z不能 適當地區別使用者並允許該使用者通過該系統。若相機相 對於使用者過低地安裝在一固定物上,則相機傾向於捕獲 使用者臉部之下部透視圖’或者若使用者报高,則相機傾 向於捕獲使用者頦之影像。再者,此將類似地導致不成功 之辨識實施。相反,根據上文所描述之實施例,藉由使用 雙相機配置,該系統能夠在兩個相機之間選擇適當之相機 以更精確地捕獲使用者之臉部影像。 123696.doc -10- M337796M337796 VIII. New description: [New technical field] This creation is about the face recognition system, the security system and the method of operating such systems. In particular, this creation is also about access control systems that contain one or more of these systems or use such methods of operation. [Prior Art] The face recognition system has existed for some time. These systems primarily attempt to verify that the user is a legitimate or authorized person and that such systems are available for use in a variety of security systems. One of the companies that have developed this technology is: "System GmbH (www.COgnitec_SyStemsde). However, the creators of this creation have found that this type of system is not user friendly and maintenance for many reasons. The managers of such systems are also unfriendly and often cause high failure rates in their operations. This creation attempts to address the unfriendly issues of such users or system administrators, or at least provide an alternative to the public. > According to the first aspect of the present invention, a face recognition security system is provided, which comprises a terminal with which a user interacts, the terminal comprising at least two cameras for determining which one of the cameras to use. a member for capturing a facial image of the user, and a member for displaying a facial image of the user, wherein one of the u cameras is disposed on the other (other) camera. Two cameras can be included at the terminal, and the display member "T is disposed between the two cameras. The image displayed on the display member is a mirror image. 123696.doc M337796 The system may include a database containing information about the facial images of the user or authorized user. Suitably, the system can be connected to the database via the Internet. The database is maintained and updated remotely from the location of the system. Advantageously, the system can include means for identifying the user. The system can include means for detecting the identification member. The identification member can generally be carded. The card carries identification information of the respective authorized users of the system and is provided to respective authorized users of the system. Alternatively, the detection component can be adapted to detect other features unique to the respective user. According to the second cancer of the present invention, an access control system for allowing or disallowing user access is provided, which comprises the system as described above. The access control system, the charging device or the door. After the authenticity, the gateway or gate can be opened according to the instructions of the face recognition system. According to the third aspect of the present invention, a method for authenticating the user's identity by using the system described above is provided. According to a fourth aspect of the present invention, there is provided a method for authenticating a user's identity by using a face recognition system, comprising the steps of: (4) obtaining a first set of data from a user attempting to pass the system; (b) based on The first set of data determines which of the cameras is used to capture the user's facial image; captures the user's image; (d) generates a second set of data based on the captured image; (e) the second set The information is compared with information in a database containing the identification of authorized users of the system; (〇 generating a third set of data simultaneously based on the comparison; and (g) allowing or denying the user based on the third set of data By the method of 123696.doc M337796 名.名^一^开始^ y 丨, one of the 'this method may further comprise the step of displaying the facial image of the user in the display member. [Embodiment] As described in the article (10), the face recognition system has existed for some time. It is used to perform the image of the face image of the use of θ θ k and the image stored in the data 4 • ' ' and then determine whether the user of the user is the computer software of the authorized user. Conventional facial recognition systems are typically designed with a terminal that interacts with the system using φI fine. In use, the user stands in front of the terminal so that the camera residing at the terminal can capture the user's facial image. However, since the terminal is usually fixedly mounted on a wall or a cylinder, and the camera is fixed at a certain height from the ground at the terminal, problems often occur during the image capturing process. Because the user has different heights, the machine is fixedly installed, so the user's face image is properly captured. This creation or the actual yoke example according to this creation as described below attempts to solve the problems associated with this problem. • As shown in Fig. 1, the face recognition system according to the first embodiment of the present invention includes a terminal 2 with which the user interacts. The terminal is fixed at a suitable height - mounted on the wall. 1 and 2 respectively show a front view and a perspective view of the swivel end 2. The terminal 2 is generally rectangular in shape and is vertically placed on the wall. From the upper end to the lower end of the terminal 2, a first image capturing member (such as the camera 4), a member for displaying a facial image of the user (such as the monitor 6), and a second image capturing member (such as the camera 8) are provided. And a plurality of fingers 10 and a component for detecting the user's identification (such as the detector 12). The monitor 6 has a plurality of functions, one of which functions to provide biofeedback to the 123696.doc M337796 user, and these functions will be explained in more detail later in the description. Although not shown in Figures 1 and 2, the terminal also includes means for determining which of the cameras 4, 8 is used to capture the facial image of the user. In this embodiment, the decision component includes a computer algorithm for performing the decision function, but in other embodiments, the decision component can include circuitry adapted to advance the decision process. The system also includes identification cards (e.g., proximity cards, cards, smart cards, cards, etc.) previously issued to users authorized to use the system. The identification card contains an overview of the information of the individual authorized users, such as the user's name, access level and height (or height type). Detection from the terminal: adapted to (4) the identification card and take the information from the user's card. Care should be taken to use a variety of identification cards. These cards include contact type identification cards, non-contact type identification cards, long distance light card issuing, short distance 叩1 cards, threat cards, and order cards and cards based on (4) (4). Depending on which card type is used, the decision component will include a respective reader suitable for the particular card type of the debt test. In this embodiment, the first camera 4 at the terminal 2 is configured such that it is located approximately 59" from the ground and is adjacent to the monitor 6, and the second camera 8 at the terminal two is configured such that it is located approximately 5 from the ground. '3' is close to monitoring and is also below the first:=. The monitor 6 is located at the terminal 2 between the first camera and the second phase. The gamma is located at the lower end of the terminal 2, below the second camera 8. Also, in this example, there are two types of height, namely the type assigned to the higher type and the type assigned to the shorter person h feet 6 inches. f Gus in this example, 5 ^The more clever person is classified as type H, and is less than 5 feet. "The type is the type of 123696.doc M337796 information profile stored in its identification card. To explain the characteristics and operation of the system. In the following scenario, assume that the user is of the type Η. See Figure 3 'The system in its standby mode 14 is ready (type η user's) face for identification or verification. When the user approaches terminal 2 The monitor 6 will be prompted to log in to its identification card at the detector 12. In response, the user places his identification card at the detector 12 (see 16). The tiler 12 then first attempts to verify Whether the card is a valid card (see 18). If the card is not a valid card' then it will output a signal to the monitor 6 for displaying the error message on the monitor 2 (see 20), and the system then returns to its standby Mode (see 22) ° If the card is a valid card, then it will attempt to be stored in the card Other information is obtained and the type of height of the person being verified (ie, the type Η or type 'user) is renewed (see 24). Then when the person is identified as type ( (as in the above example) As indicated in the description, the user is of the type and the identification card assigns this type of information to the information profile, and the debt detector will output a signal to activate the first camera 4 (see 20) at a higher position. Once the camera 4 is activated 'it will be adapted to capture the facial image used at camera distance (from about my). After capturing the image, the captured image will be converted to two §fl for information in the database. Comparison, in an attempt to determine whether a person with a facial image captured by Λ is a person authorized to pass the system, and the facial image captured by the Ο 土 土 并不 并不 并不 并不 并不 并不 并不 并不 并不 并不 并不 : : : The system will abort the identification process (see 3〇) and output a signal to bring the error message to the monitor (see 32)' and then immediately return to its standby mode (see 4). The beta system will also be This "unsuccessful" identification information is logged on the list of For future reference (see 36). If the captured facial shadow 123696.doc M337796 does not correspond to the discretion of the authorized user, the system will output a signal to update the personalized greeting message to the surveillance. ^U38)n (4) In the context of the entrance gateway', the system can also be adapted to output a signal for automatically opening the sluice gate or opening the sluice. The system will also be associated with this "success" The identification information is registered on the 曰 表 table for future reference (see 40). The system then returns to its (4) mode material – identification implementation (see 42). μ Of course 'when the system is used to identify the type h authorized to use When the face of the person is greedy, the lower camera 8 will be activated instead, but the remaining algorithms are generally similar. The system described above is technically significant in a number of ways. First, only one camera is provided in the conventional facial recognition system. If the camera is mounted too high on the object relative to the user, the camera tends to capture the top perspective of the user's face, or if (4) is short, the camera tends to capture the image of the user's forehead. It should be understood that the database connected to the system carries information about the face image of the user (or authorized user), and if the captured image is not actually the user's facial image but its forehead image, then Although the user is likely to be an authorized user, the identification system Z cannot properly distinguish the user and allow the user to pass the system. If the camera is mounted too low on the fixture relative to the user, the camera tends to capture the perspective of the lower part of the user's face or if the user reports an elevation, the camera tends to capture the image of the user. Again, this will similarly result in an unsuccessful identification implementation. In contrast, according to the embodiment described above, by using a dual camera configuration, the system is able to select an appropriate camera between the two cameras to more accurately capture the user's facial image. 123696.doc -10- M337796
第一,在習知臉部辨識系統中無用於向使用者提供反饋 之構件可用。通常情況為’使用者並未站在相機正前方, 且未^哉到其站在對於辨識處理不適當之位置,從而該系 統將不能適當地執行辨識實施。相反,根據上文所說明之 實施例由使用—監視器,使用者可看到在其走近終端 時其影像是否出現在螢幕巾。歸因於使用者在監視器中尋 找其衫像之自然傾向,使用者會在終端前移動自身直至其 正面影像充分在監視器中顯示。監視器之引入本質上產生 生物反饋,藉此使用者可因辨識系統之作用而被引至 位置。 。。根據本創作之第二實施例與第一實施例類似,除了監顏 益經調適以顯示使用者之鏡像,使得隨著使用者向右彩 動’該影像將跟隨並向右移動,且反之㈣。因為使用名 可跟隨影像之移動並相應地調整其位置,所以此設計係有 利的。 根據本創作之第三實施例與第一實施例類似,除了未提 ^用於以7F制者之影像之構件。雖然此實施例欠佳,位 仍係有利的,因為使用兩個相機至少可處理較寬範圍之 不同身高之使用者。 根: 康本創作之第四實施例與第一實施例類似,除了僅提 用於生目:。雖然此實施例欠佳,但其仍係有利的,因為在 =目的之監視器之存在下,使用者至少可在監 下對自身進仃定位以由系統進行辨識。 根據本創作之第五實施例與第—實施例類似,除了㈣ 123696.doc 11 .M337796 器經調適以辨識被授權使用者之指紋。指紋辨識可用於⑴ 識別特定被授權使用者係哪一身高類型;及/4(ii)識別使 用者究竟是否為被授權使用者。 可設想,在另一實施例中,具有臉部影像或被授權臉部 〜像之 > 料庫可位於运端位置且終端經由網際網路連接至 該資料庫。因許多原因,此係有利的。首先,可在遠端位 置進行負料庫之維濩。第二,因資料庫在遠端位置,可避 免金竊終端處之個人資訊。第三,資料庫可能包括罪犯之 尺P〜像,且若辨硪系統偵測到此等罪犯,該系統可經調 適而自動地通知執法機關。 亦可設想,臉部辨識系統可包含在門禁系統中,用於允 許或拒絕經由该系統之入口進入建築物。臉部辨識系統可 包含在其他系統(諸如自動櫃員機)中,藉此允許使用者僅 在其已通過臉部辨識系統之後執行任何交易。 應注意,上文各種演算法之執行可經由電路、軟體程式 化、韌體程式化或其他硬體程式化而進行,且使用任一執 行拉式皆並不偏離本創作之創作特徵。 【圖式簡單說明】 林圖1係說明根據本創作之一實施例之臉部辨識系統或門 禁系統之終端之透視圖; 圖2係圖1所示之終端之正面圖;及 圖3係w兒明根據本創作之一實施例之系統操作邏輯的流 程圖。 【主要元件符號說明】 123696.doc -12- M337796 2 終端 4 相機 6 監視器 8 相機 10 指示器 12 偵測器 123696.doc -13-First, no components are available in the conventional facial recognition system for providing feedback to the user. Typically, the user is not standing in front of the camera and does not know that his or her station is not suitable for the identification process, so that the system will not be able to properly perform the identification implementation. In contrast, according to the embodiment described above, by using the monitor, the user can see whether or not the image appears on the screen towel as it approaches the terminal. Due to the natural tendency of the user to find his shirt image on the monitor, the user will move itself in front of the terminal until its front image is fully displayed on the monitor. The introduction of the monitor essentially produces biofeedback whereby the user can be brought to a location by the action of the identification system. . . According to a second embodiment of the present invention, similar to the first embodiment, in addition to the adjustment of the face to display the image of the user, the image will follow and move to the right as the user moves to the right, and vice versa (4) . This design is advantageous because the name can follow the movement of the image and adjust its position accordingly. The third embodiment according to the present creation is similar to the first embodiment except that the member for the image of the 7F system is not mentioned. Although this embodiment is less preferred, the position is still advantageous because at least two different cameras can be used to handle a wide range of users of different heights. Root: The fourth embodiment of Kangben's creation is similar to the first embodiment except that it is only used for the production of: Although this embodiment is less preferred, it is still advantageous because, in the presence of a monitor of purpose, the user can at least monitor his or her own position for identification by the system. According to a fifth embodiment of the present invention, similar to the first embodiment, except that (d) 123696.doc 11 .M337796 is adapted to identify the fingerprint of the authorized user. Fingerprint identification can be used to (1) identify which height type a particular authorized user is; and /4(ii) identify whether the user is an authorized user. It is contemplated that in another embodiment, the <>> library with facial images or authorized faces may be located at the terminal location and the terminal is connected to the database via the internet. This is advantageous for a number of reasons. First, the negative database can be maintained at the remote location. Second, because the database is located at a remote location, personal information at the gold thief terminal can be avoided. Third, the database may include the size of the offender, and if the identification system detects such offenders, the system can be notified and automatically notified to the law enforcement agencies. It is also contemplated that the face recognition system can be included in the access control system to allow or deny access to the building via the entrance to the system. The face recognition system can be included in other systems, such as automated teller machines, thereby allowing the user to perform any transaction only after they have passed the face recognition system. It should be noted that the execution of the various algorithms above may be performed via circuitry, software stylization, firmware stylization, or other hardware stylization, and the use of any execution pull does not detract from the creative features of the present creation. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a perspective view showing a terminal of a face recognition system or an access control system according to an embodiment of the present invention; FIG. 2 is a front view of the terminal shown in FIG. 1; A flow chart of the system operation logic in accordance with one embodiment of the present author. [Key component symbol description] 123696.doc -12- M337796 2 Terminal 4 Camera 6 Monitor 8 Camera 10 Indicator 12 Detector 123696.doc -13-