Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent security face recognition system

A security face and recognition system technology, applied in the field of intelligent security face recognition system, can solve problems such as inability to accurately identify identities, and achieve the effect of ensuring security

Active Publication Date: 2022-07-26
CHONGQING COLLEGE OF ELECTRONICS ENG
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention intends to provide an intelligent security face recognition system to solve the technical problem that the identity cannot be accurately identified when wearing a mask for face recognition in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security face recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0034] Intelligent security face recognition system, as attached figure 1 As shown in the figure, it includes an identity verification terminal, a server and a user terminal. In this embodiment, the identity verification terminal includes a camera set at the access control of the confidential department of the enterprise, and the face verification images of personnel entering and leaving the confidential department of the enterprise are collected through the camera. The user terminal is Smart devices that everyone carries with them, such as cell phones.

[0035] The server includes a database, a feature extraction module, a feature comparison module, a permission acquisition module, an album analysis module and an APP analysis module.

[0036] Before performing face recognition, it is necessary to collect the information of employees who have access to the confidential department of the enterprise. The identity verification terminal is used to collect the standard face image ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security systems, in particular to an intelligent security face recognition system, comprising a server, wherein the server is used to obtain a face verification image, perform face recognition according to the face verification image, and generate a matching degree; when the matching degree is less than When it is equal to or equal to the first matching threshold and greater than the second matching threshold, a second verification is required. In the case of obtaining authorization, the album face information and avatar face information containing human faces are obtained. When the avatar face information contains human faces When there is a match, the top N faces with the most occurrences are screened according to the album face information; the avatar face information and the first face information are compared, and when there is a match, a secondary verification image is generated according to the matching item; according to the secondary verification image and perform face recognition to generate a matching degree. When the matching degree is greater than the first matching threshold, the second verification is successful. The use of this solution can solve the technical problem of the inability to accurately identify the identity of the face when wearing a mask for face recognition in the prior art.

Description

technical field [0001] The invention relates to the technical field of security systems, in particular to an intelligent security face recognition system. Background technique [0002] The full name of security system is security system, and its subsystems include video security monitoring system, intrusion alarm system, entrance and exit control system, etc., through the combination or collection of multiple subsystems, to achieve the purpose of maintaining social public security. The access control system includes an identity verification system that verifies the identity of people entering and leaving, and an access control system that controls the opening and closing of entrances. people pass. [0003] Since every company has its confidential content, especially for technology-based and R&D-based companies, the research and development and preservation of its core technologies are very important. For the confidential areas of the company, its security must be guaranteed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06V40/16G07C9/37
CPCG07C9/37G06V40/168G06V40/172
Inventor 危光辉罗小辉路亚彭济东张玉婷应远飞
Owner CHONGQING COLLEGE OF ELECTRONICS ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products