Mobile terminal user identity authentication device and method based on multiple biological feature modals

The invention provides a mobile terminal user identity authentication method based on multiple biological feature modals. A mobile terminal user identity authentication device comprises an image acquisition module and a biological feature algorithm processing module. The mobile terminal user identit...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HE ZHAOFENG, MA LI, QIU XIANCHAO, LI XINGGUANG, LI ZHILIN
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention provides a mobile terminal user identity authentication method based on multiple biological feature modals. A mobile terminal user identity authentication device comprises an image acquisition module and a biological feature algorithm processing module. The mobile terminal user identity authentication method based on the multiple biological feature modals comprises the following steps that a, a near-infrared human face image containing the eyes of a user or a near-infrared eye periphery image is acquired through the image acquisition module; b, human eye area location is conducted based on a feature image, a user identification distance is calculated according to a location result and is judged, and the step a is executed again if the distance is too large or too small, and the step c is executed otherwise; c, human face key point detection is conducted based on the feature image, so that whether the posture of the user meets the acquisition requirements or not is judged; d, whether the distance between each human eye and the image acquisition module is smaller than a first distance threshold value or not is judged, the step e is executed if yes, and the step f is executed otherwise; e, an iris image is clipped from the near-infrared human face or eye periphery image, user identity authentication is conducted by means of the iris image, and an authentication result is output; f, human face or eye periphery identification is conducted by means of the acquired image, so that user identity authentication is conducted, and a result is output.