CN113362514A - Interface login method, first device, second device and verification system - Google Patents

Interface login method, first device, second device and verification system Download PDF

Info

Publication number
CN113362514A
CN113362514A CN202110602820.8A CN202110602820A CN113362514A CN 113362514 A CN113362514 A CN 113362514A CN 202110602820 A CN202110602820 A CN 202110602820A CN 113362514 A CN113362514 A CN 113362514A
Authority
CN
China
Prior art keywords
target
image
comparison result
equipment
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110602820.8A
Other languages
Chinese (zh)
Inventor
倪冠军
潘军威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202110602820.8A priority Critical patent/CN113362514A/en
Publication of CN113362514A publication Critical patent/CN113362514A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides an interface login method, first equipment, second equipment, a verification system, a storage medium and an electronic device, wherein the method comprises the following steps: the first device sends an authentication request to the second device to request the second device to execute the following operations under the condition of receiving a target instruction for requesting to log in a target interface: acquiring a target video stored by first equipment, comparing a target image included in the target video with a preset image, and returning a comparison result to the first equipment; the first equipment receives a comparison result returned by the second equipment; and the first equipment logs in the target interface under the condition that the target interface is determined to be allowed to log in based on the comparison result. The invention solves the problems of single equipment login mode and inconvenient login in the related technology, and further achieves the effect of improving the login convenience.

Description

Interface login method, first device, second device and verification system
Technical Field
The embodiment of the invention relates to the field of intelligent building safety, in particular to an interface login method, first equipment, second equipment, a verification system, a storage medium and an electronic device.
Background
With the improvement of living standards of people, a building video intercom system is greatly developed, a building needs to meet requirements of office, life, entertainment and the like besides basic living requirements of people, the video intercom system mainly comprises a door phone, an indoor unit and the like, the door phone usually has a camera shooting function, the door phone generally supports face recognition, the door phone of the existing smart building is low in usage amount, the indoor unit is very large in usage amount, but the front-end building indoor unit cannot support face recognition due to limited performance (memory, Flash and chip main control), so that most of the existing technologies input passwords on an equipment interface and verify a login equipment background, but the problems that the passwords are inconvenient to input on the equipment, are easy to forget and the like exist in the prior art.
Aiming at the problems of single equipment login mode and inconvenient login in the related technology, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the invention provides an interface login method, first equipment, second equipment, a verification system, a storage medium and an electronic device, which at least solve the problems of single equipment login mode and inconvenient login in the related art.
According to an embodiment of the present invention, there is provided an interface login method, including: the method comprises the steps that under the condition that a target instruction for requesting to log in a target interface is received by first equipment, an authentication request is sent to second equipment to request the second equipment to execute the following operations: acquiring a target video stored by the first device, comparing a target image included in the target video with a preset image, and returning a comparison result to the first device, wherein the first device has the capability of acquiring a video; the first equipment receives the comparison result returned by the second equipment; and the first equipment logs in the target interface under the condition that the target interface is determined to be allowed to log in based on the comparison result.
In an exemplary embodiment, the first device, in a case where it is determined based on the comparison result that login to the target interface is permitted, the login to the target interface includes: the first device determines that the target interface is allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image reaches a preset threshold value; and logging in the target interface.
In an exemplary embodiment, after the first device receives the comparison result returned by the second device, the method further includes: the first device determines that the target interface is not allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image is smaller than a preset threshold value; and displaying prompt information for indicating that the target interface is not allowed to be logged in.
In an exemplary embodiment, after the first device sends the authentication request to the second device in case of receiving the target instruction for requesting to log in the target interface, the method further includes: the first equipment starts a video acquisition function; and collecting and storing the target video.
According to another embodiment of the present invention, there is also provided an interface login method, including: the method comprises the steps that a second device receives a verification request sent by a first device, wherein the verification request is sent by the first device when a target instruction for requesting to log in a target interface is received; acquiring a target video stored by the first equipment, wherein the first equipment has the capability of acquiring the video; comparing a target image included in the target video with a preset image to obtain a comparison result; and returning the comparison result to the first equipment to indicate the first equipment to determine whether to allow logging in the target interface based on the comparison result.
In an exemplary embodiment, before the second device receives the authentication request sent by the first device, the method further includes: acquiring identification information of a target object and the preset image of the target object, and correspondingly storing the identification information and the preset image; before comparing the target image included in the target video with a preset image to obtain a comparison result, the method further includes: and determining the preset image which is correspondingly stored with the identification information based on the identification information carried in the verification request.
In an exemplary embodiment, comparing the target image included in the target video with a preset image to obtain a comparison result includes: detecting a frame image included in the target video to determine the target image of an object with the same type as the target object included in the frame image; comparing the target image with the preset image; determining that the similarity between the target image and the preset image reaches a preset threshold value under the condition that the number of the target images is determined to be multiple and the multiple target images are compared to include the image with the similarity between the target image and the preset image reaching the preset threshold value; and under the condition that the target image with the similarity reaching the preset threshold value is not included in the target image, determining the comparison result as that the similarity of the target image and the preset image does not reach the preset threshold value.
There is also provided, in accordance with yet another embodiment of the present invention, a first apparatus including: the first sending module is used for sending an authentication request to the second device to request the second device to execute the following operations under the condition that a target instruction for requesting to log in a target interface is received: acquiring a target video stored by the first device, comparing a target image included in the target video with a preset image, and returning a comparison result to the first device, wherein the first device has the capability of acquiring a video; the first receiving module is used for receiving the comparison result returned by the second equipment; and the login module is used for logging in the target interface under the condition that the target interface is determined to be allowed to be logged in based on the comparison result.
According to still another embodiment of the present invention, there is also provided a second apparatus including: the second receiving module is used for receiving a verification request sent by first equipment, wherein the verification request is sent by the first equipment under the condition that a target instruction for requesting to log in a target interface is received; the acquisition module is used for acquiring a target video stored by the first equipment, wherein the first equipment has the capability of acquiring the video; the comparison module is used for comparing a target image included in the target video with a preset image to obtain a comparison result; and the second sending module is used for returning the comparison result to the first equipment so as to indicate the first equipment to determine whether to allow the target interface to be logged in or not based on the comparison result.
According to still another embodiment of the present invention, there is also provided a verification system including: the outdoor unit comprises the first equipment, and the outdoor unit comprises the second equipment.
According to a further embodiment of the present invention, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the method and the device, the first device sends the verification request to the second device under the condition that a request instruction for logging in the target interface is received, so that the second device is requested to execute the operations of obtaining the target video stored by the first device, comparing the target image in the target video with the preset image, returning the comparison result to the first device and the like, the first device receives the comparison result again, the first device logs in the target interface under the condition that the target interface is determined to be allowed to be logged in based on the comparison result, namely the first device sends the verification request to the second device under the condition that the login request is received, and the first device can log in the target interface after the target image in the target video is compared and verified and the target interface is determined to be allowed to be logged in through the second device. Therefore, the device background can be logged in without inputting a password, the login convenience is improved, the problem that the device cannot be logged in due to forgetting the password is avoided, the problems that the device is single in login mode and inconvenient to log in the related technology are solved, and the effect of improving the login convenience is achieved.
Drawings
Fig. 1 is a block diagram of a hardware structure of a mobile terminal of a login method of an interface according to an embodiment of the present invention;
FIG. 2 is a first flowchart of a login method of an interface according to an embodiment of the present invention;
FIG. 3 is a flowchart II of a login method of an interface according to an embodiment of the present invention;
FIG. 4 is a diagram of an example login for an interface in accordance with an illustrative embodiment of the present invention;
FIG. 5 is a flowchart of a first method for logging in an interface according to an embodiment of the present invention;
FIG. 6 is a flowchart of a login method of an interface according to an embodiment of the present invention;
fig. 7 is a block diagram of a first device according to an embodiment of the present invention;
fig. 8 is a block diagram of a second device according to an embodiment of the present invention;
fig. 9 is a schematic view of a scenario of an authentication system according to an embodiment of the present invention.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings in conjunction with the embodiments.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The method embodiments provided in the embodiments of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking the operation on the mobile terminal as an example, fig. 1 is a hardware structure block diagram of the mobile terminal of the interface login method according to the embodiment of the present invention. As shown in fig. 1, the mobile terminal may include one or more (only one shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA), and a memory 104 for storing data, wherein the mobile terminal may further include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration, and does not limit the structure of the mobile terminal. For example, the mobile terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the interface login method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the mobile terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In this embodiment, an interface login method is provided, and fig. 2 is a first flowchart of an interface login method according to an embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
in step S202, when receiving a target instruction for requesting to log in a target interface, a first device sends an authentication request to a second device to request the second device to perform the following operations: acquiring a target video stored by the first device, comparing a target image included in the target video with a preset image, and returning a comparison result to the first device, wherein the first device has the capability of acquiring a video;
step S204, the first device receives the comparison result returned by the second device;
step S206, the first device logs in the target interface if it is determined that the target interface is allowed to log in based on the comparison result.
Through the steps, the first device sends a verification request to the second device under the condition that a request instruction for logging in the target interface is received, so that the second device is requested to execute operations of obtaining the target video stored by the first device, comparing the target image included in the target video with the preset image, returning the comparison result to the first device and the like, the first device receives the comparison result again, the first device logs in the target interface under the condition that the target interface is determined to be allowed to log in based on the comparison result, namely the first device sends the verification request to the second device under the condition that the login request is received, and the first device can log in the target interface after the target image included in the target video is compared and verified through the second device and the target interface is determined to be allowed to log in. Therefore, the device background can be logged in without inputting a password, the login convenience is improved, the problem that the device cannot be logged in due to forgetting the password is avoided, the problems that the device is single in login mode and inconvenient to log in the related technology are solved, and the effect of improving the login convenience is achieved.
The main body of the above steps may be a building video intercom system, such as an indoor unit in the building video intercom system, or other devices with image capturing and processing capabilities, or a processor with human-computer interaction capability disposed on a storage device, or a processing device or a processing unit with similar processing capabilities, but is not limited thereto. The following description is given by taking the indoor unit as an example (which is only an exemplary description, and other devices or modules may perform the above operations in actual operation):
in the above embodiment, when the indoor unit receives a request instruction for logging in the target interface, for example, when the indoor unit receives a login request of a user a, the indoor unit sends an authentication request to a second device (for example, a door phone or a host) to request the second device to perform acquiring a target video stored by a first device (for example, the indoor unit), comparing a target image (for example, an image including the user a) included in the target video with a preset image, and returning a comparison result to the first device, in an actual application, the second device (for example, the door phone) would normally acquire and store the preset image (for example, an image of an owner) in advance, the first device receives the comparison result returned by the second device, determines whether to allow the user a to log in the target interface of the first device (for example, the indoor unit) based on the comparison result, and when it determines to allow to log in the target interface based on the comparison result, for example, the user a who requests login is the owner himself, and the target interface can be logged in after the authentication is passed, and of course, in practical application, the second device can also acquire images of a plurality of persons, articles, certificates and the like with different identities in advance as preset images according to needs to perform image comparison after the authentication request.
In an optional embodiment, in the case that it is determined, based on the comparison result, that the target interface is allowed to be logged, the logging in the target interface by the first device includes: the first device determines that the target interface is allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image reaches a preset threshold value; and logging in the target interface. In this embodiment, when the comparison result is used to indicate that the similarity between the target image and the preset image reaches a predetermined threshold, for example, when the similarity between the target image included in the target video acquired by the second device (e.g., a door phone) from the first device and the preset image pre-stored by the second device reaches a predetermined threshold (e.g., 85% or 90% or another value), it is determined that the target interface is allowed to be logged in, and the first device may log in the target interface. Through the embodiment, the purpose of logging in the background of the equipment without inputting a password is achieved.
In an optional embodiment, after the first device receives the comparison result returned by the second device, the method further includes: the first device determines that the target interface is not allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image is smaller than a preset threshold value; and displaying prompt information for indicating that the target interface is not allowed to be logged in. In this embodiment, after the first device (e.g. an indoor unit) receives the comparison result returned by the second device (e.g. an outdoor unit), when the comparison result indicates that the similarity between the target image and the preset image is smaller than a predetermined threshold (e.g. smaller than 85% or 80% or other values), that is, the similarity between the target image of the user requesting login included in the target video acquired by the second device (e.g. an outdoor unit) from the first device (e.g. an indoor unit) and the preset image (e.g. an owner image or other person image having permission to operate the first device) pre-stored by the second device is smaller than the predetermined threshold, it may be determined that the person requesting login and not having permission to operate is not permitted to log in the target interface, the first device displays a prompt message indicating that the login is not permitted to log in the target interface, through the embodiment, the purpose of ensuring the safety of equipment operation is achieved.
In an optional embodiment, after the first device sends the authentication request to the second device in a case where a target instruction for requesting to log in to the target interface is received, the method further includes: the first equipment starts a video acquisition function; and collecting and storing the target video. In this embodiment, after a first device (e.g., an indoor unit) sends an authentication request to a second device (e.g., an outdoor unit) when receiving a target instruction for requesting to log in a target interface, the first device (e.g., the indoor unit) will start a video capture function, and capture and store the target video.
Fig. 3 is a second flowchart of the interface login method according to the embodiment of the present invention, and as shown in fig. 3, the flowchart includes the following steps:
step S302, a second device receives an authentication request sent by a first device, wherein the authentication request is sent by the first device when a target instruction for requesting to log in a target interface is received;
step S304, obtaining a target video stored by the first device, wherein the first device has the capability of acquiring videos;
step S306, comparing a target image included in the target video with a preset image to obtain a comparison result;
step S308, returning the comparison result to the first device to instruct the first device to determine whether to allow logging in the target interface based on the comparison result.
Through the steps, after receiving a verification request sent by first equipment, second equipment obtains a target video stored by the first equipment, compares a target image included in the target video with a preset image to obtain a comparison result, and then returns the comparison result to the first equipment to indicate the first equipment to determine whether to allow logging in the target interface based on the comparison result. Therefore, the device background can be logged in without inputting a password, the login convenience is improved, the problem that the device cannot be logged in due to forgetting the password is avoided, the problems that the device is single in login mode and inconvenient to log in the related technology are solved, and the effect of improving the login convenience is achieved.
The main body of the above steps may be a building video intercom system, such as a door phone in the building video intercom system, or other devices with image capturing and processing capabilities, or a processor with man-machine interaction capability disposed on a storage device, or a processing device or a processing unit with similar processing capabilities, but is not limited thereto. The following description is given by taking the door phone as an example (which is only an exemplary illustration, and in actual operation, other devices or modules may also be used to perform the above operations):
in the above embodiment, the door phone receives an authentication request sent by a first device (e.g., an indoor unit), where the request is sent by the first device when receiving a request instruction for requesting to log in a target interface, and after receiving the authentication request, the door phone obtains a target video from the first device, where the target video is captured and stored by a camera device carried by the first device, and then compares a target image (e.g., of a user or other operator requesting to log in the target interface) included in the target video with a preset image to obtain a comparison result, where in actual application, the preset image may be an image obtained by the door phone in advance (e.g., an owner image or other person image having authority to operate the first device); after the comparison result is obtained, the door phone returns the comparison result to the first device (such as the indoor unit) to instruct the indoor unit to determine whether to allow logging in the target interface based on the comparison result.
In an optional embodiment, before the second device receives the authentication request sent by the first device, the method further includes: acquiring identification information of a target object and the preset image of the target object, and correspondingly storing the identification information and the preset image; before comparing the target image included in the target video with a preset image to obtain a comparison result, the method further includes: and determining the preset image which is correspondingly stored with the identification information based on the identification information carried in the verification request. In this embodiment, before receiving a verification request sent by a first device, a second device (e.g., a door phone) obtains identification information of a target object and the preset image of the target object, for example, obtains a service and owner image of a room where the first device is located, or obtains other information such as a room number corresponding to the room where the first device is located, and stores the identification information and the preset image locally in the second device; before comparing the target image included in the target video with a preset image to obtain a comparison result, the second device may determine, based on the identification information carried in the verification request, the preset image stored in correspondence with the identification information.
In an optional embodiment, the comparing the target image included in the target video with a preset image to obtain a comparison result includes: detecting a frame image included in the target video to determine the target image of an object with the same type as the target object included in the frame image; comparing the target image with the preset image; determining that the similarity between the target image and the preset image reaches a preset threshold value under the condition that the number of the target images is determined to be multiple and the multiple target images are compared to include the image with the similarity between the target image and the preset image reaching the preset threshold value; and under the condition that the target image with the similarity reaching the preset threshold value is not included in the target image, determining the comparison result as that the similarity of the target image and the preset image does not reach the preset threshold value. In this embodiment, comparing the target image included in the target video with a preset image to obtain a comparison result includes: detecting a frame image included in the target video to determine the target image of an object included in the frame image that is of the same type as the target object, for example, by detecting the target video, the target image of the human face included in the frame image is determined, in practical application, besides the verification through the human face, the verification can be performed through other articles or certificates according to requirements, after determining the target images, comparing the target images with the preset images, and under the condition that a plurality of target images exist and the similarity between the target images and the preset images reaches a preset threshold value, determining the comparison result as that the similarity between the target image and the preset image reaches a preset threshold value, in practical applications, when the similarity reaches a predetermined threshold, the request for login may be considered to be allowed; and when the target image with the similarity reaching the preset threshold value is determined not to be included in the target image, determining that the similarity between the target image and the preset image does not reach the preset threshold value according to the comparison result, and in practical application, when the similarity does not reach the preset threshold value, determining that the request login is not allowed. Through the embodiment, the purpose of carrying out face recognition verification and logging in the first equipment through the second equipment is achieved, and meanwhile, the security of equipment logging in is also guaranteed.
It is to be understood that the above-described embodiments are only a few, but not all, embodiments of the present invention.
The present invention will be described in detail with reference to the following examples:
fig. 4 is a diagram illustrating an example of login of an interface according to an embodiment of the present invention, as shown in fig. 4, a background setting interface is logged in for an indoor unit, when a proprietor wants to enter a setting page (corresponding to the first device) of the indoor unit (for security, the setting of entering the home machine needs password authentication) in a room, some settings are performed: for example, system parameters, network parameters, smart home configuration, and the like may be set with complicated passwords, and are not frequently used, and passwords are forgotten or an owner may abandon manual password input, and at this time, the face recognition represents convenience of the system, and the owner only needs to click a "face verification login" button (equivalent to a target instruction of the target interface), and initiate a face verification request to a door phone (equivalent to the second device) inside the community, and the door phone pulls video data (corresponding to the target video) collected by a camera of the indoor unit, extracts a corresponding face to perform feature comparison, and returns a result to the indoor unit.
Fig. 5 is a first flowchart of a login method of an interface according to an embodiment of the present invention, where the flowchart includes the following steps:
s502, registering the indoor unit VTH (corresponding to the first device) in the outdoor unit VTO (corresponding to the second device);
s504, recording the room number on the VTO;
and S506, inputting corresponding faces.
It should be noted that the flow of the interface login method is assumed as a premise, that is, the relevant steps need to be completed before the VTO receives the verification request of the VTH, so as to prepare for the subsequent face recognition verification.
Fig. 6 is a flowchart of a second method for logging in an interface according to an embodiment of the present invention, where the flowchart includes the following steps:
s602, the indoor unit VTH logs in the background, for example, a proprietor or other operator operates on the indoor unit VTH to attempt to log in the background;
s604, the indoor set VTH initiates a face recognition and verification request to the registered gate terminal VTO, for example, in practical applications, when the owner or other operator forgets the password, the owner or other operator may select to request login via a face verification manner (for example, select a "face verification login" button on the indoor set login interface);
s606, the door phone VTO actively pulls the indoor set VTH video stream (corresponding to the target video stored by the first device);
s608, the door phone VTO extracts the face features from the video frame, and optionally, in practical applications, the door phone VTO may store the face feature information of the operator who meets the requirements or has permission to operate the corresponding indoor unit in advance (corresponding to the above S506);
s610, the door phone VTO performs face comparison, that is, compares the face features extracted in step S608 with pre-stored preset face feature information (equivalent to the pre-stored image);
s612, after the VTO comparison of the door phone is successful, replying a successful VTH comparison message of the indoor phone (which is equivalent to returning the comparison result to the first equipment);
and S614, the VTH of the indoor unit passes the face verification and is successfully logged in.
Through the steps, the purpose of logging in the background of the indoor unit after face recognition verification is carried out by using the entrance machine under the condition that the password is forgotten can be achieved, the face recognition function is supported by the indoor unit on the premise that the cost is not increased, and the effect of improving the convenience of equipment logging is achieved. It should be noted that before implementing the above steps S602 to S614, the settings related to the steps S502 to S506 are generally performed.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
In this embodiment, a first device is further provided, and fig. 7 is a block diagram of a structure of the first device according to an embodiment of the present invention, as shown in fig. 7, the first device includes:
a first sending module 702, configured to, in a case that a target instruction for requesting to log in a target interface is received, send an authentication request to a second device to request the second device to perform the following operations: acquiring a target video stored by the first device, comparing a target image included in the target video with a preset image, and returning a comparison result to the first device, wherein the first device has the capability of acquiring a video;
a first receiving module 704, configured to receive the comparison result returned by the second device;
a login module 706, configured to log in the target interface if it is determined that the target interface is allowed to be logged in based on the comparison result.
In an alternative embodiment, the login module 706 includes: the determining unit is used for determining that the target interface is allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image reaches a preset threshold value; and the login unit is used for logging in the target interface.
In an optional embodiment, the first device further comprises: the determining module is used for determining that the target interface is not allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image is smaller than a preset threshold value after the comparison result returned by the second device is received; and the display module is used for displaying prompt information for indicating that the target interface is not allowed to be logged in.
In an optional embodiment, the first device further comprises: the starting module is used for starting a video acquisition function after sending a verification request to the second equipment under the condition of receiving a target instruction for requesting to log in a target interface; and the processing module is used for acquiring and storing the target video.
In this embodiment, a second device is further provided, and fig. 8 is a block diagram of a structure of the second device according to an embodiment of the present invention, as shown in fig. 8, the second device includes:
a second receiving module 802, configured to receive an authentication request sent by a first device, where the authentication request is sent by the first device when a target instruction for requesting to log in a target interface is received;
an obtaining module 804, configured to obtain a target video stored by the first device, where the first device has a capability of acquiring a video;
a comparison module 806, configured to compare a target image included in the target video with a preset image to obtain a comparison result;
a second sending module 808, configured to return the comparison result to the first device, so as to instruct the first device to determine whether to allow logging in the target interface based on the comparison result.
In an optional embodiment, the second device further comprises: the second acquisition module is used for acquiring the identification information of the target object and the preset image of the target object before receiving the verification request sent by the first device, and correspondingly storing the identification information and the preset image; and the second determining module is used for determining the preset image which is stored corresponding to the identification information based on the identification information carried in the verification request before comparing the target image included in the target video with the preset image to obtain a comparison result.
In an alternative embodiment, the alignment module 806 includes: the detection unit is used for detecting a frame image included in the target video so as to determine the target image of an object which is included in the frame image and has the same type as the target object; the comparison unit is used for comparing the target image with the preset image; a second determining unit, configured to determine, when it is determined that the number of the target images is multiple and when a plurality of target images are compared, an image whose similarity to the preset image reaches a predetermined threshold is included in the target images, that the similarity between the target image and the preset image reaches the predetermined threshold as a result of the comparison; a third determining unit, configured to determine, when it is determined that the target image does not include the target image whose similarity with the preset image reaches the predetermined threshold, that the similarity between the target image and the preset image does not reach the predetermined threshold, as the comparison result.
There is also provided in this embodiment a verification system, including: the outdoor unit comprises the first equipment, and the outdoor unit comprises the second equipment.
Fig. 9 is a schematic view of a scene of an authentication system according to an embodiment of the present invention, as shown in fig. 9, a face authentication request is sent from an indoor unit VTH in a building to a VTO, and then an authentication result is returned from the VTO to the indoor unit VTH.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Embodiments of the present invention also provide a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above-mentioned method embodiments when executed.
In an exemplary embodiment, the computer-readable storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
In an exemplary embodiment, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
For specific examples in this embodiment, reference may be made to the examples described in the above embodiments and exemplary embodiments, and details of this embodiment are not repeated herein.
It will be apparent to those skilled in the art that the various modules or steps of the invention described above may be implemented using a general purpose computing device, they may be centralized on a single computing device or distributed across a network of computing devices, and they may be implemented using program code executable by the computing devices, such that they may be stored in a memory device and executed by the computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into various integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (12)

1. A login method of an interface is characterized by comprising the following steps:
the method comprises the steps that under the condition that a target instruction for requesting to log in a target interface is received by first equipment, an authentication request is sent to second equipment to request the second equipment to execute the following operations: acquiring a target video stored by the first device, comparing a target image included in the target video with a preset image, and returning a comparison result to the first device, wherein the first device has the capability of acquiring a video;
the first equipment receives the comparison result returned by the second equipment;
and the first equipment logs in the target interface under the condition that the target interface is determined to be allowed to log in based on the comparison result.
2. The method according to claim 1, wherein the first device, in the case that it is determined based on the comparison result that the target interface is allowed to be logged, logging in the target interface comprises:
the first device determines that the target interface is allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image reaches a preset threshold value;
and logging in the target interface.
3. The method according to claim 1, wherein after the first device receives the comparison result returned by the second device, the method further comprises:
the first device determines that the target interface is not allowed to be logged in under the condition that the comparison result is used for indicating that the similarity between the target image and the preset image is smaller than a preset threshold value;
and displaying prompt information for indicating that the target interface is not allowed to be logged in.
4. The method of claim 1, wherein after the first device sends the authentication request to the second device upon receiving the target instruction for requesting to log in to the target interface, the method further comprises:
the first equipment starts a video acquisition function;
and collecting and storing the target video.
5. A login method of an interface is characterized by comprising the following steps:
the method comprises the steps that a second device receives a verification request sent by a first device, wherein the verification request is sent by the first device when a target instruction for requesting to log in a target interface is received;
acquiring a target video stored by the first equipment, wherein the first equipment has the capability of acquiring the video;
comparing a target image included in the target video with a preset image to obtain a comparison result;
and returning the comparison result to the first equipment to indicate the first equipment to determine whether to allow logging in the target interface based on the comparison result.
6. The method of claim 5,
before the second device receives the authentication request sent by the first device, the method further includes: acquiring identification information of a target object and the preset image of the target object, and correspondingly storing the identification information and the preset image;
before comparing the target image included in the target video with a preset image to obtain a comparison result, the method further includes: and determining the preset image which is correspondingly stored with the identification information based on the identification information carried in the verification request.
7. The method of claim 6, wherein comparing the target image included in the target video with a preset image to obtain a comparison result comprises:
detecting a frame image included in the target video to determine the target image of an object with the same type as the target object included in the frame image;
comparing the target image with the preset image;
determining that the similarity between the target image and the preset image reaches a preset threshold value under the condition that the number of the target images is determined to be multiple and the multiple target images are compared to include the image with the similarity between the target image and the preset image reaching the preset threshold value;
and under the condition that the target image with the similarity reaching the preset threshold value is not included in the target image, determining the comparison result as that the similarity of the target image and the preset image does not reach the preset threshold value.
8. A first device, comprising:
the first sending module is used for sending an authentication request to the second device to request the second device to execute the following operations under the condition that a target instruction for requesting to log in a target interface is received: acquiring a target video stored by the first device, comparing a target image included in the target video with a preset image, and returning a comparison result to the first device, wherein the first device has the capability of acquiring a video;
the first receiving module is used for receiving the comparison result returned by the second equipment;
and the login module is used for logging in the target interface under the condition that the target interface is determined to be allowed to be logged in based on the comparison result.
9. A second apparatus, comprising:
the second receiving module is used for receiving a verification request sent by first equipment, wherein the verification request is sent by the first equipment under the condition that a target instruction for requesting to log in a target interface is received;
the acquisition module is used for acquiring a target video stored by the first equipment, wherein the first equipment has the capability of acquiring the video;
the comparison module is used for comparing a target image included in the target video with a preset image to obtain a comparison result;
and the second sending module is used for returning the comparison result to the first equipment so as to indicate the first equipment to determine whether to allow the target interface to be logged in or not based on the comparison result.
10. An authentication system, comprising: a door phone and an indoor unit, wherein,
the indoor unit includes the first apparatus of claim 8, and the outdoor unit includes the second apparatus of claim 9.
11. A computer-readable storage medium, in which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4 or 5 to 7.
12. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method as claimed in any one of claims 1 to 4 or 5 to 7 are implemented when the computer program is executed by the processor.
CN202110602820.8A 2021-05-31 2021-05-31 Interface login method, first device, second device and verification system Pending CN113362514A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110602820.8A CN113362514A (en) 2021-05-31 2021-05-31 Interface login method, first device, second device and verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110602820.8A CN113362514A (en) 2021-05-31 2021-05-31 Interface login method, first device, second device and verification system

Publications (1)

Publication Number Publication Date
CN113362514A true CN113362514A (en) 2021-09-07

Family

ID=77530753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110602820.8A Pending CN113362514A (en) 2021-05-31 2021-05-31 Interface login method, first device, second device and verification system

Country Status (1)

Country Link
CN (1) CN113362514A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859374A (en) * 2010-05-20 2010-10-13 上海洪剑智能科技有限公司 Distributed face identification system and identification method thereof
CN102184391A (en) * 2011-05-19 2011-09-14 汉王科技股份有限公司 Distributed type face recognition method and system as well as face recognition terminal
CN102682290A (en) * 2012-05-07 2012-09-19 蔡翔 Respective type biological feature identifying method and system
CN108182419A (en) * 2018-01-04 2018-06-19 西安艾润物联网技术服务有限责任公司 Vehicle-mounted recognition of face terminal, system, method, apparatus and storage medium
CN110874131A (en) * 2018-08-29 2020-03-10 杭州海康威视数字技术股份有限公司 Building intercom indoor unit and control method and storage medium thereof
CN111738239A (en) * 2020-08-18 2020-10-02 江苏神彩科技股份有限公司 Dangerous waste transfer people and vehicle information verification system
CN111970471A (en) * 2020-06-30 2020-11-20 视联动力信息技术股份有限公司 Participant scoring method, device, equipment and medium based on video conference

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859374A (en) * 2010-05-20 2010-10-13 上海洪剑智能科技有限公司 Distributed face identification system and identification method thereof
CN102184391A (en) * 2011-05-19 2011-09-14 汉王科技股份有限公司 Distributed type face recognition method and system as well as face recognition terminal
CN102682290A (en) * 2012-05-07 2012-09-19 蔡翔 Respective type biological feature identifying method and system
CN108182419A (en) * 2018-01-04 2018-06-19 西安艾润物联网技术服务有限责任公司 Vehicle-mounted recognition of face terminal, system, method, apparatus and storage medium
CN110874131A (en) * 2018-08-29 2020-03-10 杭州海康威视数字技术股份有限公司 Building intercom indoor unit and control method and storage medium thereof
CN111970471A (en) * 2020-06-30 2020-11-20 视联动力信息技术股份有限公司 Participant scoring method, device, equipment and medium based on video conference
CN111738239A (en) * 2020-08-18 2020-10-02 江苏神彩科技股份有限公司 Dangerous waste transfer people and vehicle information verification system

Similar Documents

Publication Publication Date Title
US20220318835A1 (en) Using a wireless transmitter and receiver to prevent unauthorized access to restricted computer systems
US10915777B2 (en) Communication terminal, communication system, and image processing method
US11875622B2 (en) Authentication method and user equipment
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
JP2020520511A (en) Access control method and apparatus, system, electronic device, program and medium
CN107483416A (en) The method and device of authentication
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
US11245707B2 (en) Communication terminal, communication system, communication control method, and recording medium
CN111401159A (en) Hotel authentication management method and system, hotel management system and user terminal
CN112927408A (en) Visitor visiting processing method and device
CN106385397B (en) Method and device for access control and type configuration of network access equipment
CN111966991A (en) Equipment unlocking method, device, equipment and storage medium
CN112053486A (en) Access control method, device and system and electronic equipment
CN104937602B (en) Privacy protection method and electronic equipment
CN112989299A (en) Interactive identity recognition method, system, device and medium
CN107786349B (en) Security management method and device for user account
CN113362514A (en) Interface login method, first device, second device and verification system
CN115661994A (en) UWB technology-based access control method and device and terminal equipment
CN112669501B (en) Access control method, device and computer readable storage medium
CN111768544B (en) Intelligent access control method, device and system, electronic equipment and storage medium
CN108492415A (en) A kind of internet safety-protection system
CN212160789U (en) Face recognition access control system based on raspberry group
CN107222465B (en) Network access control system of intelligent gateway
CN111985401A (en) Area monitoring method, system, machine readable medium and equipment
CN107329686B (en) Touch-controlled shared equipment system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210907

RJ01 Rejection of invention patent application after publication