WO2020051971A1 - Procédé d'identification, appareil, dispositif électronique et support d'informations lisible par ordinateur - Google Patents

Procédé d'identification, appareil, dispositif électronique et support d'informations lisible par ordinateur Download PDF

Info

Publication number
WO2020051971A1
WO2020051971A1 PCT/CN2018/110654 CN2018110654W WO2020051971A1 WO 2020051971 A1 WO2020051971 A1 WO 2020051971A1 CN 2018110654 W CN2018110654 W CN 2018110654W WO 2020051971 A1 WO2020051971 A1 WO 2020051971A1
Authority
WO
WIPO (PCT)
Prior art keywords
biometric information
identified
identification
identity
identity recognition
Prior art date
Application number
PCT/CN2018/110654
Other languages
English (en)
Chinese (zh)
Inventor
詹克团
罗士杰
许哲铭
蒲松柏
Original Assignee
福建库克智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福建库克智能科技有限公司 filed Critical 福建库克智能科技有限公司
Publication of WO2020051971A1 publication Critical patent/WO2020051971A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities

Definitions

  • Embodiments of the present application relate to the field of data processing technologies, and in particular, to an identification method, device, electronic device, and computer-readable storage medium.
  • the identity recognition in security systems usually uses 2D recognition technologies such as face recognition, fingerprint recognition, or pupil recognition, but due to the high misrecognition rate of the 2D recognition technology, it is far from meeting the increasing requirements of the public for security systems .
  • Embodiments of the present application provide an identity recognition method, device, electronic device, and computer-readable storage medium.
  • an embodiment of the present application provides an identity recognition method.
  • the identification method includes:
  • the first biometric information is a three-dimensional face image, a three-dimensional pupil image, or a three-dimensional fingerprint image; and / or, the second The biometric information is voiceprint data.
  • Biometric information in response to the successful identification of the first identity, obtaining a second of the object to be identified Biometric information, including:
  • the method further includes:
  • the first biometric information of the object to be identified is repeatedly acquired, and the first identity of the object to be identified is performed according to the first biometric information.
  • the present disclosure In response to the failure of the first identity recognition, repeatedly acquiring the first biometric information of the object to be identified, and performing the first identity recognition of the object to be identified according to the first biometric information, further includes:
  • the present disclosure is In a fifth implementation manner of the aspect, after performing the second identity recognition on the object to be identified according to the second biometric information, the method further includes:
  • a preset authorization operation is performed.
  • first aspect Combining the first aspect, the first implementation manner of the first aspect, the second implementation manner of the first aspect, the third implementation manner of the first aspect, the fourth implementation manner of the first aspect, and the first aspect of the first aspect Five implementation manners.
  • a sixth implementation manner of the first aspect of the present disclosure in response to the second identity recognition failure, repeatedly acquiring first biometric information of the object to be identified, and according to the first biometric
  • the feature information performs first identity recognition on the object to be identified, or repeatedly obtains second biometric information of the object to be identified, and performs second identity recognition on the object to be identified based on the second biometric information After that, it also includes:
  • an embodiment of the present application provides an identity recognition device.
  • the identity recognition device includes:
  • a first identification module configured to obtain first biometric information of an object to be identified, and perform first identity identification on the object to be identified according to the first biometric information
  • An acquisition module configured to acquire second biometric information of the object to be identified in response to the success of the first identification
  • a second identification module is configured to perform a second identity identification on the object to be identified according to the second biometric information.
  • the first biometric information is a three-dimensional face image, a three-dimensional pupil image, or a three-dimensional fingerprint image; and / or, the second The biometric information is voiceprint data.
  • the obtaining module includes:
  • An output sub-module configured to output second biometric prompt information in response to the success of the first identification
  • the obtaining submodule is configured to obtain second biometric information of the object to be identified, wherein the second biometric information corresponds to the second biometric prompt information.
  • the present disclosure further includes:
  • a third identification module configured to repeatedly obtain first biometric information of the object to be identified in response to the failure of the first identification, and perform first identity identification on the object to be identified according to the first biometric information .
  • the present disclosure further include:
  • the first triggering module is configured to trigger a first preset alarm operation when the number of first identification failures exceeds a first preset number of thresholds.
  • the present disclosure is in the second aspect
  • the method further includes:
  • a fourth identification module configured to repeatedly obtain first biometric information of the object to be identified in response to the second identity identification failure, and perform first identity identification on the object to be identified based on the first biometric information Or, repeatedly acquiring second biometric information of the object to be identified, and performing second identity recognition on the object to be identified according to the second biometric information;
  • the execution module is configured to execute a preset authorization operation in response to the success of the second identification.
  • the present disclosure further includes:
  • the second triggering module is configured to trigger a second preset alarm operation when the number of first identification failures exceeds a second preset number of thresholds.
  • an embodiment of the present application provides an electronic device including a memory and a processor, where the memory is configured to store one or more computer instructions that support an identity recognition device to execute the identity recognition method in the above first aspect, where The processor is configured to execute computer instructions stored in the memory.
  • the identity recognition device may further include a communication interface for the identity recognition device to communicate with other equipment or a communication network.
  • an embodiment of the present application provides a computer-readable storage medium for storing computer instructions used by an identity recognition device, which includes a computer for executing the identity recognition method in the first aspect as the identity recognition device instruction.
  • the above technical solution uses mixed biometric information for comprehensive identification, that is, a dual identity recognition mechanism. This technical solution can effectively improve the accuracy of identification without increasing the complexity of the operation, thereby enhancing the security of the security system. To improve the user experience.
  • FIG. 1 shows a flowchart of an identification method according to an embodiment of the present application
  • FIG. 2 shows a flowchart of step S102 of the identification method according to the embodiment shown in FIG. 1;
  • FIG. 3 shows a flowchart of an identification method according to another embodiment of the present application.
  • FIG. 5 shows a structural block diagram of an identity recognition device according to an embodiment of the present application
  • FIG. 6 shows a structural block diagram of the obtaining module 502 of the identity recognition device according to the embodiment shown in FIG. 5;
  • FIG. 7 shows a structural block diagram of an identity recognition device according to another embodiment of the present application.
  • FIG. 8 shows a structural block diagram of an identity recognition device according to still another embodiment of the present application.
  • FIG. 9 shows a structural block diagram of an electronic device according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a computer system suitable for implementing an identification method according to an embodiment of the present application.
  • the technical solution provided by the embodiment of the present application adopts mixed biometric information for comprehensive identification.
  • the technical solution can effectively improve the accuracy of identification without increasing the complexity of the operation, thereby enhancing the security of the security system and improving User experience.
  • FIG. 1 shows a flowchart of an identification method according to an embodiment of the present application.
  • the method may be applied to a server side or a terminal side.
  • the identification method includes the following steps S101-S103 :
  • step S101 first biometric information of an object to be identified is acquired, and first identity recognition is performed on the object to be identified according to the first biometric information;
  • step S102 in response to the success of the first identity recognition, acquiring second biometric information of the object to be identified;
  • step S103 a second identity is performed on the object to be identified according to the second biometric information.
  • the identity recognition in security systems usually uses 2D recognition technologies such as face recognition, fingerprint recognition, or pupil recognition, but due to the high misrecognition rate of the 2D recognition technology, it is far from meeting the increasing requirements of the public for security systems. .
  • an identification method uses mixed biometric information for comprehensive identification, that is, adopts a dual identification mechanism.
  • This technical solution does not increase the complexity of the operation. It can effectively improve the accuracy of identity recognition, thereby enhancing the security of the security system and improving the user experience.
  • the first biometric information includes one or more of the following feature information: a face image, a pupil image, and a fingerprint image, wherein the face image, the pupil, Both the image and the fingerprint image can be a three-dimensional image or a two-dimensional image.
  • the three-dimensional image has a high accuracy rate but a large amount of calculation, and a two-dimensional image has a small amount of calculation but a low accuracy rate.
  • Those skilled in the art can provide a first biological
  • the feature information is selected, which is not specifically limited in this application.
  • the second biometric information is voiceprint data
  • the voiceprint data refers to a sound wave spectrum carrying speech information displayed by an electroacoustic instrument. Because the vocal organs used by people in speech: tongue, teeth, throat, lungs, and nasal cavity are all different in size and shape, that is, the voiceprint patterns of any two people are also different, and the acoustic characteristics of each person's speech It has both relative stability and variability. Therefore, voiceprint data can be used to achieve identity recognition.
  • the acquisition of the first biometric information may be performed by using an image acquisition device such as a camera or a camera.
  • the image acquisition device may be an image acquisition device in a mobile electronic device, such as A smart phone, a camera provided with a smart tablet, and the like; at the same time, the image acquisition device may also be an image acquisition device in a fixed electronic device, such as a camera on a gate.
  • the first biometric information may be obtained by an image acquisition device of the terminal and sent to the server side; if the identity recognition method is applied to the terminal side, the terminal may The first biometric information is directly acquired by means of an image acquisition device. In an optional implementation manner of this embodiment, when acquiring the first biometric information, the terminal may start acquiring the first biometric information when detecting that the distance between the object to be identified and the terminal is less than a preset distance threshold.
  • a feature matching method when performing first identity recognition on the object to be identified according to the first biometric information, a feature matching method may be adopted. Specifically, the first biometric is first extracted. The feature data of the feature information is then matched with a pre-stored trained feature model, and the output of the successfully matched model corresponds to the recognition result of the first identity recognition.
  • the step S102 that is, the step of obtaining the second biometric information of the object to be identified in response to the success of the first identification, includes the following steps: S201-S202:
  • step S201 in response to the first identity recognition being successful, outputting second biometric prompt information
  • step S202 second biometric information of the object to be identified is obtained, wherein the second biometric information corresponds to the second biometric prompt information.
  • the object to be identified is guided to output the second biometric information which is beneficial to the identification.
  • the second biometric prompt information is output, wherein the second biometric prompt information is used to guide the object to be identified; and the second biometric information of the object to be identified is obtained.
  • the second biometric information corresponds to the second biometric prompt information.
  • the second biometric prompt information may be, for example, textual information or voice information, so that an object to be identified can read the textual information or repeat the voice information, and further Obtaining second biometric information.
  • the second biometric prompt information may be output by the output device of the terminal according to the server-side instruction, that is, the step S201 may include: in response to the success of the first identification, Send a second biometric prompt information output instruction to the terminal, where the second biometric prompt information output instruction is used to trigger the terminal to output the second biometric prompt information; if the identity recognition method is applied to the terminal side, then The terminal may directly output the second biometric prompt information by using an output device.
  • the obtaining of the second biometric information may be performed by using a sound collection device such as a microphone or a recorder.
  • the second biometric information can be obtained by the terminal's sound collection device and sent to the server side, that is, the step S202 can include: responding to the second biometric prompt information Output the second biometric information acquisition instruction to the terminal; receive the second biometric information sent by the terminal; if the identity recognition method is applied to the terminal, the terminal outputs the second biometric prompt
  • the second biometric information can be directly obtained by using a sound collection device.
  • the step S101 is to obtain first biometric information of an object to be identified, and perform first identity identification on the object to be identified based on the first biometric information.
  • the method further includes the step of repeating the first identity identification when the first identity identification fails, that is, as shown in FIG. 3, the method includes the following steps S301-S304:
  • step S301 first biometric information of an object to be identified is obtained, and first identity recognition is performed on the object to be identified according to the first biometric information;
  • step S302 in response to the failure of the first identity recognition, repeatedly acquiring the first biometric information of the object to be identified, and performing the first identity recognition on the object to be identified according to the first biometric information;
  • step S303 in response to the successful identification of the first identity, acquiring second biometric information of the object to be identified;
  • step S304 a second identity is performed on the object to be identified according to the second biometric information.
  • the first identity recognition fails, the first biometric information of the object to be identified is obtained again. To perform the first identification again. However, the first identification cannot be repeated indefinitely.
  • the number of first identification failures exceeds a preset first preset number of thresholds, the identification of the object to be identified is confirmed. If it fails, the object to be identified is considered to be an illegal object, and a first preset alarm operation is triggered.
  • the first preset alarm operation may include one or more of the following operations: sound and light alarm, audio alarm, video alarm, information alarm, mail alarm, and so on.
  • the audible and visual alarm operation can be started immediately, the alarm audio can be played on the spot to turn on the optical device for alarm, or the alarm information can be sent to the administrator immediately to prompt it to be illegal.
  • Object for processing when an object to be identified is found to be an illegal object, the audible and visual alarm operation can be started immediately, the alarm audio can be played on the spot to turn on the optical device for alarm, or the alarm information can be sent to the administrator immediately to prompt it to be illegal.
  • Object for processing can be started immediately, the alarm audio can be played on the spot to turn on the optical device for alarm, or the alarm information can be sent to the administrator immediately to prompt it to be illegal.
  • the first preset number of times threshold can be set according to actual application requirements, for example, it can be set to three times.
  • step S103 that is, the step of performing a second identity identification on the object to be identified according to the second biometric information
  • the method further includes executing according to a second identity identification result.
  • step S401 acquiring first biometric information of an object to be identified, and performing first identity recognition on the object to be identified according to the first biometric information;
  • step S402 in response to the successful identification of the first identity, acquiring second biometric information of the object to be identified;
  • step S403 performing a second identity recognition on the object to be identified according to the second biometric information
  • step S404 in response to the failure of the second identity recognition, repeatedly acquiring the first biometric information of the object to be identified, and performing the first identity recognition on the object to be identified according to the first biometric information, or Repeatedly acquiring second biometric information of the object to be identified, and performing second identity recognition on the object to be identified according to the second biometric information;
  • step S405 in response to the success of the second identification, a preset authorization operation is performed.
  • the first biometric information may be repeatedly obtained for the first identity recognition.
  • the second biometric information is repeatedly obtained for the second identity recognition, or in order to save the calculation amount and the calculation time, the second biometric information may also be obtained directly for the second identity recognition. If both the first identification and the second identification are successful, the object to be identified is considered to be a legal object, and the preset authorization operation is triggered to be executed.
  • the preset authorization operation may include one or more of the following operations: sending a channel opening instruction, sending a startup instruction, sending a trigger instruction, and the like. It should be noted that the authorization operation has different contents in different application scenarios. Therefore, those skilled in the art can set the preset authorization operation content according to the actual application requirements and the characteristics of the application scenario. This application It is not specifically limited.
  • the second preset alarm operation may also include one or more of the following operations: sound and light alarm, audio alarm, video alarm, information alarm, mail alarm, etc. Wait.
  • the second preset alarm operation may be the same as or different from the first preset alarm operation, which is not specifically limited in this application.
  • the second preset number of times threshold may be the same as the first preset number of times threshold, or may be different. Similar to the first preset number of times threshold, the second preset number of times threshold may be based on actual application. Need to be set, for example, it can be set to twice.
  • FIG. 5 shows a structural block diagram of an identification device according to an embodiment of the present application.
  • the device may be implemented as part or all of an electronic device through software, hardware, or a combination of the two, and may be implemented as a server or a terminal.
  • the identity recognition device includes:
  • a first identification module 501 configured to obtain first biometric information of an object to be identified, and perform first identity identification on the object to be identified according to the first biometric information;
  • the obtaining module 502 is configured to obtain second biometric information of the object to be identified in response to the success of the first identification
  • the second identification module 503 is configured to perform a second identity identification on the object to be identified according to the second biometric information.
  • the identity recognition in security systems usually uses 2D recognition technologies such as face recognition, fingerprint recognition, or pupil recognition, but due to the high misrecognition rate of the 2D recognition technology, it is far from meeting the increasing requirements of the public for security systems. .
  • an identity recognition device uses mixed biometric information for comprehensive identity recognition, that is, a dual identity recognition mechanism.
  • This technical solution does not increase the complexity of the operation. It can effectively improve the accuracy of identity recognition, thereby enhancing the security of the security system and improving the user experience.
  • the first biometric information includes one or more of the following feature information: a face image, a pupil image, and a fingerprint image, wherein the face image, the pupil, Both the image and the fingerprint image can be a three-dimensional image or a two-dimensional image.
  • the three-dimensional image has a high accuracy but a large amount of calculations, and a two-dimensional image has a small amount of calculations but a low accuracy.
  • Those skilled in the art can perform a The feature information is selected, which is not specifically limited in this application.
  • the second biometric information is voiceprint data
  • the voiceprint data refers to a sound wave spectrum carrying speech information displayed by an electroacoustic instrument. Because the vocal organs used by people in speech: tongue, teeth, throat, lungs, and nasal cavity are all different in size and shape, that is, the voiceprint patterns of any two people are also different, and the acoustic characteristics of each person's speech It has both relative stability and variability. Therefore, voiceprint data can be used to achieve identity recognition.
  • the acquisition of the first biometric information may be performed by using an image acquisition device such as a camera or a camera.
  • the image acquisition device may be an image acquisition device on a mobile electronic device, for example, Smart phones, smart cameras, and other cameras; meanwhile, the image acquisition device may also be an image acquisition device on a fixed electronic device, such as a camera on a gate.
  • the first biometric information may be acquired by an image acquisition device of the terminal and sent to the first recognition module 501; if the identity identification device is implemented as a terminal, the first An identification module 501 can directly obtain the first biometric information.
  • the terminal or the first identification module 501 may start acquiring the address when it is detected that the distance between the object to be identified and the terminal is less than a preset distance threshold. The first biometric information is described.
  • the first identification module 501 when the first identification module 501 performs first identity identification on the object to be identified according to the first biometric information, a feature matching method may be adopted.
  • the The first recognition module 501 may be configured to: first extract feature data of the first biometric information, and then match it with a pre-stored trained feature model, and the output of the successfully matched model corresponds to the first identity recognition Recognition results.
  • Feature matching methods or other identification methods may be used, and details are not described herein again.
  • the obtaining module 502 includes:
  • An output sub-module 601 configured to output second biometric prompt information in response to the success of the first identification
  • the obtaining sub-module 602 is configured to obtain second biometric information of the object to be identified, wherein the second biometric information corresponds to the second biometric prompt information.
  • the second biometric prompt information is output through the output sub-module 601 to guide the object to be identified so that it outputs a second biometric that is good for identification.
  • Feature information Specifically, when the first identification is successful, the output submodule 601 outputs second biometric prompt information, wherein the second biometric prompt information is used to guide the object to be identified; the acquisition submodule 602 acquires the pending The second biometric information of the identification object, wherein the second biometric information corresponds to the second biometric prompt information.
  • the second biometric prompt information may be, for example, textual information or voice information, so that an object to be identified can read the textual information or repeat the voice information, and further Obtaining second biometric information.
  • the second biometric prompt information may be output by the output device of the terminal according to the instruction of the output submodule 601, that is, the output submodule 601 may be configured to respond to the first Upon successful identification, a second biometric prompt information output instruction is sent to the terminal, wherein the second biometric prompt information output instruction is used to trigger the terminal to output the second biometric prompt information; if the identity recognition device applies At the terminal, the output sub-module 601 may directly output the second biometric prompt information.
  • the obtaining of the second biometric information may be performed by using a sound collection device such as a microphone or a recorder.
  • the second biometric information may be acquired by the terminal's sound collection device and sent to the acquisition submodule 602, that is, the acquisition submodule 602 may be configured to respond to the first Output the second biometric prompt information, and send a second biometric information acquisition instruction to the terminal; receive the second biometric information sent by the terminal; if the identity recognition device is applied to the terminal, output the second in the output submodule 601 After the biometric prompt information, the acquiring sub-module 602 may directly acquire the second biometric information.
  • the device further includes a part that repeatedly performs the first identity identification when the first identity identification fails, that is, as shown in FIG. 7, the device includes:
  • a first recognition module 701 configured to obtain first biometric information of an object to be identified, and perform first identity recognition on the object to be identified according to the first biometric information;
  • the third identification module 702 is configured to repeatedly obtain first biometric information of the object to be identified in response to the failure of the first identity identification, and perform a first identity on the object to be identified based on the first biometric information. Identify
  • the obtaining module 703 is configured to obtain second biometric information of the object to be identified in response to the success of the first identification
  • the second identification module 704 is configured to perform a second identity identification on the object to be identified according to the second biometric information.
  • the third recognition module 702 obtains the identity of the object to be recognized again.
  • the first biometric information is firstly identified again.
  • the first identity recognition cannot be repeated indefinitely.
  • a first trigger module may be set so that it is configured to trigger a first preset alarm when the number of failures of the first identity recognition exceeds a preset first preset number of thresholds operating.
  • the first preset alarm operation may include one or more of the following operations: sound and light alarm, audio alarm, video alarm, information alarm, mail alarm, and so on.
  • the first triggering module can immediately start the audible and visual alarm operation, play the alarm audio on-site to turn on the optical device for alarm, or immediately send an alarm message to the administrator to promote it in the first place. Handle illegal objects for a while.
  • the first preset number of times threshold can be set according to actual application requirements, for example, it can be set to three times.
  • the device further includes a part that performs a corresponding operation according to a second identity recognition result, that is, as shown in FIG. 8, the device includes:
  • a first identification module 801 configured to obtain first biometric information of an object to be identified, and perform first identity identification on the object to be identified according to the first biometric information;
  • the obtaining module 802 is configured to obtain second biometric information of the object to be identified in response to the success of the first identification
  • a second identification module 803 configured to perform second identity identification on the object to be identified according to the second biometric information
  • the fourth identification module 804 is configured to repeatedly obtain the first biometric information of the object to be identified in response to the failure of the second identification, and perform the first identity on the object to be identified according to the first biometric information. Identify, or repeatedly obtain second biometric information of the object to be identified, and perform second identity recognition on the object to be identified according to the second biometric information;
  • the execution module 805 is configured to execute a preset authorization operation in response to the success of the second identification.
  • the fourth identification module 804 may repeatedly acquire the first biometric information Perform the first identity recognition, and repeatedly obtain the second biometric information for the second identity after the first identity recognition is successful, or, in order to save the calculation amount and the calculation time, the second biometric information may be directly and repeatedly acquired for the second identity Identity identification; if both the first identity identification and the second identity identification are successful, the object to be identified is considered to be a legitimate object, and the execution module 805 triggers the execution of the preset authorization operation.
  • the preset authorization operation may include one or more of the following operations: sending a channel opening instruction, sending a startup instruction, sending a trigger instruction, and the like. It should be noted that the authorization operation has different contents in different application scenarios. Therefore, those skilled in the art can set the preset authorization operation content according to the actual application requirements and the characteristics of the application scenario. This application It is not specifically limited.
  • a second trigger module may be set so that it is configured to trigger a second preset alarm operation.
  • the second preset alarm operation may also include one or more of the following operations: sound and light alarm, audio alarm, video alarm, information alarm, mail alarm, etc. Wait.
  • the second preset alarm operation may be the same as or different from the first preset alarm operation, which is not specifically limited in this application.
  • the second preset number of times threshold may be the same as the first preset number of times threshold, or may be different. Similar to the first preset number of times threshold, the second preset number of times threshold may be based on actual application. Need to be set, for example, it can be set to twice.
  • FIG. 9 shows a structural block diagram of an electronic device according to an embodiment of the present application.
  • the electronic device 900 includes a memory 901 and a processor 902;
  • the memory 901 is configured to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor 902 to implement any one of the foregoing method steps.
  • FIG. 10 is a schematic structural diagram of a computer system suitable for implementing an identity recognition method according to an embodiment of the present application.
  • the computer system 1000 includes a central processing unit (CPU) 1001, which can be loaded into a random access memory (RAM) 1003 according to a program stored in a read-only memory (ROM) 1002 or from a storage portion 1008. Instead, various processes in the above-mentioned embodiments are executed. In the RAM 1003, various programs and data required for the operation of the system 1000 are also stored.
  • the CPU 1001, the ROM 1002, and the RAM 1003 are connected to each other through a bus 1004.
  • An input / output (I / O) interface 1005 is also connected to the bus 1004.
  • the following components are connected to the I / O interface 1005: an input portion 1006 including a keyboard, a mouse, etc .; an output portion 1007 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc .; and a speaker; a storage portion 1008 including a hard disk, etc. ; And a communication section 1009 including a network interface card such as a LAN card, a modem, and the like. The communication section 1009 performs communication processing via a network such as the Internet.
  • the driver 1010 is also connected to the I / O interface 1005 as needed.
  • a removable medium 1011 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1010 as needed, so that a computer program read therefrom is installed into the storage section 1008 as needed.
  • the method described above may be implemented as a computer software program.
  • embodiments of the present application include a computer program product including a computer program tangibly embodied on a readable medium thereon, the computer program containing program code for performing the identification method.
  • the computer program may be downloaded and installed from a network through the communication portion 1009, and / or installed from a removable medium 1011.
  • each block in the roadmap or block diagram may represent a module, program segment, or portion of code that contains one or more components that implement a specified logical function Executable instructions.
  • the functions noted in the blocks may also occur in a different order than those marked in the drawings. For example, two successively represented boxes may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagrams and / or flowcharts, and combinations of blocks in the block diagrams and / or flowcharts can be implemented by a dedicated hardware-based system that performs the specified function or operation , Or it can be implemented with a combination of dedicated hardware and computer instructions.
  • the units or modules described in the embodiments of the present application can be implemented by software, and can also be implemented by hardware.
  • the described units or modules may also be provided in the processor, and the names of these units or modules do not, in some cases, define the unit or module itself.
  • an embodiment of the present application further provides a computer-readable storage medium.
  • the computer-readable storage medium may be a computer-readable storage medium included in the device described in the foregoing implementation manner; or may exist separately.
  • the computer-readable storage medium stores one or more programs, and the programs are used by one or more processors to execute the methods described in the embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

L'invention concerne un procédé d'identification, un appareil, un dispositif électronique et un support de stockage lisible par ordinateur, ledit procédé consistant : à obtenir des premières informations biométriques d'un objet à identifier et, selon les premières informations biométriques, à effectuer une première identification sur l'objet à identifier (S101) ; en réponse à la réussite de la première identification, à obtenir des secondes informations biométriques de l'objet à identifier (S102) ; selon les secondes informations biométriques, à effectuer une seconde identification sur l'objet à identifier (S103). Sans augmenter la complexité opérationnelle, il est possible d'améliorer efficacement la précision de l'identification et d'améliorer ainsi la sécurité d'un système de sécurité et d'améliorer l'expérience utilisateur.
PCT/CN2018/110654 2018-09-14 2018-10-17 Procédé d'identification, appareil, dispositif électronique et support d'informations lisible par ordinateur WO2020051971A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811075545.3A CN108920928A (zh) 2018-09-14 2018-09-14 身份识别方法、装置、电子设备及计算机可读存储介质
CN201811075545.3 2018-09-14

Publications (1)

Publication Number Publication Date
WO2020051971A1 true WO2020051971A1 (fr) 2020-03-19

Family

ID=64408234

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/110654 WO2020051971A1 (fr) 2018-09-14 2018-10-17 Procédé d'identification, appareil, dispositif électronique et support d'informations lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN108920928A (fr)
WO (1) WO2020051971A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113037757A (zh) * 2021-03-11 2021-06-25 拉卡拉支付股份有限公司 异常数据判断方法、装置、电子设备、介质及程序产品

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711177A (zh) * 2018-12-14 2019-05-03 国家电网有限公司 基于生物信息识别的数据安全管理方法及终端设备
CN110399434A (zh) * 2019-07-25 2019-11-01 北京明略软件系统有限公司 字段分类方法及装置、存储介质、电子装置
CN110808966A (zh) * 2019-10-23 2020-02-18 天津华来科技有限公司 身份信息生成方法、装置及存储介质
CN115407116A (zh) * 2019-12-31 2022-11-29 Oppo广东移动通信有限公司 充电电流的确定方法及装置
CN111222485A (zh) * 2020-01-15 2020-06-02 北京明略软件系统有限公司 3d人脸识别方法、装置、电子设备和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150347841A1 (en) * 2014-05-30 2015-12-03 Lockheed Martin Corporation System and method for 3d iris recognition
CN106295297A (zh) * 2016-08-05 2017-01-04 联想(北京)有限公司 一种身份识别方法、电子设备以及穿戴设备
CN106599660A (zh) * 2016-12-02 2017-04-26 宇龙计算机通信科技(深圳)有限公司 终端安全验证方法及装置
CN108052813A (zh) * 2017-11-30 2018-05-18 广东欧珀移动通信有限公司 终端设备的解锁方法、装置及移动终端

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827817A (zh) * 2015-11-30 2016-08-03 维沃移动通信有限公司 报警方法及移动终端
CN207008704U (zh) * 2017-06-27 2018-02-13 黑龙江省和为贵科技有限公司 司法自助服务装置及系统
CN107633162B (zh) * 2017-10-19 2020-09-15 深圳怡化电脑股份有限公司 一种身份认证方法、装置、系统、设备及存储介质
CN108171032A (zh) * 2017-12-01 2018-06-15 平安科技(深圳)有限公司 一种身份鉴定方法、电子装置及计算机可读存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150347841A1 (en) * 2014-05-30 2015-12-03 Lockheed Martin Corporation System and method for 3d iris recognition
CN106295297A (zh) * 2016-08-05 2017-01-04 联想(北京)有限公司 一种身份识别方法、电子设备以及穿戴设备
CN106599660A (zh) * 2016-12-02 2017-04-26 宇龙计算机通信科技(深圳)有限公司 终端安全验证方法及装置
CN108052813A (zh) * 2017-11-30 2018-05-18 广东欧珀移动通信有限公司 终端设备的解锁方法、装置及移动终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113037757A (zh) * 2021-03-11 2021-06-25 拉卡拉支付股份有限公司 异常数据判断方法、装置、电子设备、介质及程序产品

Also Published As

Publication number Publication date
CN108920928A (zh) 2018-11-30

Similar Documents

Publication Publication Date Title
WO2020051971A1 (fr) Procédé d'identification, appareil, dispositif électronique et support d'informations lisible par ordinateur
US11663307B2 (en) RtCaptcha: a real-time captcha based liveness detection system
US11797659B2 (en) Authentication device, authentication system, and authentication method
CN109726624B (zh) 身份认证方法、终端设备和计算机可读存储介质
KR102210775B1 (ko) 인적 상호 증명으로서 말하는 능력을 이용하는 기법
US10586541B2 (en) Communicating metadata that identifies a current speaker
US20190237076A1 (en) Augmentation of key phrase user recognition
US9979721B2 (en) Method, server, client and system for verifying verification codes
US10270736B2 (en) Account adding method, terminal, server, and computer storage medium
JP2011203992A (ja) 情報処理装置、情報処理方法、およびプログラム
WO2019019256A1 (fr) Appareil électronique, procédé et système de vérification d'identité et support de stockage lisible par ordinateur
WO2017166651A1 (fr) Procédé d'apprentissage de modèle de reconnaissance vocale, procédé et dispositif de reconnaissance de type d'orateur
WO2017181609A1 (fr) Procédé et dispositif de gestion de saut d'interface
WO2023173686A1 (fr) Procédé et appareil de détection, dispositif électronique et support de stockage
CN110910887A (zh) 语音唤醒方法和装置
JP7412496B2 (ja) 生体(liveness)検出検証方法、生体検出検証システム、記録媒体、及び生体検出検証システムの訓練方法
CN109840406B (zh) 活体验证方法、装置和计算机设备
WO2019150708A1 (fr) Dispositif de traitement d'informations, système de traitement d'informations, procédé de traitement d'informations et programme
CN115171227A (zh) 活体检测方法、装置、电子设备及存储介质
JP6571587B2 (ja) 音声入力装置、その方法、及びプログラム
TW201944320A (zh) 支付認證方法、裝置、設備及存儲介質
US20230325481A1 (en) Method and System for Authentication of a Subject by a Trusted Contact
CN112836732B (zh) 数据标注的校验方法、装置、电子设备及存储介质
CN116524957A (zh) 基于视频交互的认证方法、系统以及相关装置
WO2017219925A1 (fr) Procédé et appareil d'émission d'informations, et support de stockage informatique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18933078

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18933078

Country of ref document: EP

Kind code of ref document: A1