Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for protecting security image face privacy authority

A privacy permission and image technology, applied in the field of face recognition, can solve problems such as user privacy leakage, achieve the effect of protecting user privacy, reducing the time waiting for judging permission, and improving user experience

Active Publication Date: 2022-05-03
深圳市中讯网联科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, face recognition technology has been widely used in the field of security. The security technology based on face recognition is obviously more convenient and faster than traditional card or fingerprint recognition methods, but face recognition technology has also caused users to worry about privacy leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for protecting security image face privacy authority
  • A method and system for protecting security image face privacy authority
  • A method and system for protecting security image face privacy authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0058] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0059] figure 1 is a flowchart of a method according to an embodiment of the present invention. As shown in the figure, the method of the present invention includes the following steps:

[0060] S101: Collect facial image information by the first facial information collection terminal, and collect facial image information by the second facial information collection terminal, wherein the first facial information collection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting the privacy authority of a security image face. The method includes: collecting face image information by a first face information collection terminal, and collecting face image information by a second face information collection terminal; After receiving the face image information, the first face information collection terminal sends the first face image information sending request message to the building information collection node; after receiving the first face image information sending request message, the building information collection node tries to decode The first face image information sends the first field and the second field of the request message; If successfully decoded the first face image information sends the first field and the second field of the request message, then by the building information collection node to the first face The information collection terminal sends the first face image information sending permission message; after receiving the first face image information sending permission message, the first face information collection terminal sends the first face image information data packet to the building information collection node .

Description

technical field [0001] The invention relates to the technical field of face recognition, in particular to a method and system for protecting privacy rights of security images and faces. Background technique [0002] At present, face recognition technology has been widely used in the field of security. The security technology based on face recognition is obviously more convenient and faster than traditional card or fingerprint recognition methods, but face recognition technology has also caused users to worry about privacy leakage. . [0003] Prior art CN107273822B discloses a privacy protection method based on monitoring video multi-target tracking and face recognition, including: establishing and updating a background model according to real-time monitoring video, using the new background model to segment out the foreground target area; Pedestrian detection and face recognition, through the combination of Kalman filter technology and Hungarian algorithm, realize the contin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06V40/16G06F21/62
CPCG06F21/6245
Inventor 张学银郭群浩王尚文
Owner 深圳市中讯网联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products