CN114093046A - Two-dimensional code based sign-in method, device and equipment - Google Patents

Two-dimensional code based sign-in method, device and equipment Download PDF

Info

Publication number
CN114093046A
CN114093046A CN202111320123.XA CN202111320123A CN114093046A CN 114093046 A CN114093046 A CN 114093046A CN 202111320123 A CN202111320123 A CN 202111320123A CN 114093046 A CN114093046 A CN 114093046A
Authority
CN
China
Prior art keywords
check
video data
dimensional code
dimensional
target video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111320123.XA
Other languages
Chinese (zh)
Other versions
CN114093046B (en
Inventor
苏千秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202111320123.XA priority Critical patent/CN114093046B/en
Publication of CN114093046A publication Critical patent/CN114093046A/en
Application granted granted Critical
Publication of CN114093046B publication Critical patent/CN114093046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • G06K7/1443Methods for optical code recognition including a method step for retrieval of the optical code locating of the code in an image

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The embodiment of the specification discloses a sign-in method, a sign-in device and sign-in equipment based on two-dimensional codes. The scheme can comprise the following steps: after target video data acquired by the depth-of-field camera device is acquired, whether the target video data is video data acquired by acquiring a check-in two-dimensional code loaded in a three-dimensional display device is judged, and a judgment result is obtained. The three-dimensional display device can comprise a sign-in code display surface and a three-dimensional identification auxiliary surface, the sign-in code display surface and the three-dimensional identification auxiliary surface are located on different planes, the sign-in code display surface can be used for displaying a two-dimensional sign-in code, and the three-dimensional identification auxiliary surface can be used for assisting in generating the judgment result.

Description

Two-dimensional code based sign-in method, device and equipment
Technical Field
The application relates to the technical field of two-dimensional codes, in particular to a sign-in method, a sign-in device and sign-in equipment based on two-dimensional codes.
Background
The application of the mobile internet technology cannot be separated from the interaction and sharing of information, and the two-dimensional Code (Quick Response Code) has the characteristics of large data storage capacity, good confidentiality and the like, so that the application of the two-dimensional Code technology is more and more extensive under a mobile internet business mode. For example, tracking and tracing of material circulation is realized by using a two-dimensional code, electronic payment is performed by using a collection two-dimensional code or a payment two-dimensional code, check-in is performed based on the two-dimensional code, and the like. Since the user may be required to check in on site at the designated check-in place in the check-in scene, a lawbreaker can shoot and transmit the picture or video of the check-in two-dimensional code, so that the user who is not at the designated check-in place can also check in on site based on the picture or video of the check-in two-dimensional code.
Therefore, how to prevent cheating when a user signs in based on the two-dimensional code becomes a technical problem to be solved urgently.
Disclosure of Invention
The sign-in method, device and equipment based on the two-dimensional code can prevent a user from cheating when the user signs in based on the two-dimensional code, so that the authenticity of a sign-in result of the user is guaranteed.
In order to solve the above technical problem, the embodiments of the present specification are implemented as follows:
the sign-in method based on the two-dimensional code provided by the embodiment of the specification comprises the following steps:
acquiring target video data acquired by using a depth-of-field camera device for a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in for target items;
judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judgment result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result;
and if the judgment result shows that the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
The device of registering based on two-dimensional code that this specification embodiment provided includes:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring target video data acquired by a depth-of-field camera device aiming at a check-in two-dimensional code, and the check-in two-dimensional code is used for checking in aiming at target items;
the judging module is used for judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judging result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result;
and the sign-in processing module is used for carrying out sign-in processing aiming at the target items based on the sign-in two-dimensional code in the target video data if the judgment result shows that the target video data is the video data obtained by collecting the sign-in two-dimensional code borne in the three-dimensional display device.
The check-in equipment based on two-dimensional code that this specification embodiment provided includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring target video data acquired by using a depth-of-field camera device for a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in for target items;
judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judgment result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result;
and if the judgment result shows that the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
At least one embodiment provided in the present specification can achieve the following advantageous effects:
after target video data collected by a user to be checked in aiming at a check-in two-dimensional code of a target item by using a depth-of-field camera device is obtained, whether the target video data is the video data collected by the check-in two-dimensional code loaded in a three-dimensional display device or not is judged, if yes, the scene of the user to be checked in aiming at a designated check-in place of the target item can be represented, so that the user to be checked in can check in aiming at the target item based on the check-in two-dimensional code in the target video data collected by the user to be checked in, the user to be checked in can be prevented from checking in aiming at the target item without the check-in place, the possibility of cheating of the user to be checked in based on the two-dimensional code is reduced, and the reality of a check-in result of the user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a schematic overall scheme flow diagram of a two-dimensional code-based check-in method in an embodiment of the present specification;
fig. 2 is a schematic flowchart of a two-dimensional code-based check-in method provided in an embodiment of the present specification;
fig. 3 is a schematic diagram of graphics and text information to be displayed by a stereoscopic display device according to an embodiment of the present disclosure;
FIG. 4 is a swimlane flow chart corresponding to the two-dimensional code-based check-in method in FIG. 2 according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a two-dimensional code based check-in device corresponding to fig. 2 provided in an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a two-dimensional code based check-in device corresponding to fig. 2 provided in an embodiment of this specification.
Detailed Description
To make the objects, technical solutions and advantages of one or more embodiments of the present disclosure more apparent, the technical solutions of one or more embodiments of the present disclosure will be described in detail and completely with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present specification, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from the embodiments given herein without making any creative effort fall within the scope of protection of one or more embodiments of the present specification.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
In the prior art, the two-dimensional code has the characteristics of convenience in use, large information storage capacity, high fault tolerance and the like, and is widely applied to check-in activities. The check-in activity organizer can use the target application program to generate the check-in two-dimensional code aiming at the target matters in advance, and the check-in two-dimensional code photo printed at the appointed check-in place is posted or the check-in two-dimensional code is displayed on the appointed check-in place through an electronic screen, so that the user to be checked in checks in by scanning the check-in two-dimensional code through the terminal equipment, the processes of queuing and filling in the check-in information and the like by the user can be omitted, and the check-in efficiency and the user experience are improved.
However, in a partial check-in scene, a user to be checked in needs to perform field check-in at a designated check-in place, for example, a work attendance check-in scene, a field check-in gift scene, a conference check-in scene, etc., at present, when the user to be checked in uses a terminal device to scan the two-dimensional check-in code for checking in, the positioning information of the terminal device is obtained, and whether the positioning information of the terminal device is consistent with the positioning information of the designated check-in place is verified, if so, the user to which the terminal device belongs (i.e., the user to be checked in) performs field check-in at the designated check-in place, and further, the user to be checked in can be allowed to complete check-in based on the two-dimensional check-in code.
The user can modify the positioning information of the terminal equipment by utilizing the virtual positioning application carried at the terminal equipment, so that lawbreakers can modify the positioning information of the terminal equipment and check in the terminal equipment based on pictures or videos of check-in two-dimensional codes transmitted by other people, and the field check-in can be finished under the condition that the lawbreakers do not designate check-in places. Obviously, the user can not be prevented from cheating based on the two-dimensional code check-in based on the existing check-in scheme, and further the authenticity of the check-in result can not be guaranteed.
In order to solve the defects in the prior art, the scheme provides the following embodiments:
fig. 1 is a schematic flowchart of an overall scheme of a two-dimensional code-based check-in method in an embodiment of this specification.
As shown in fig. 1, when the check-in event organizer needs to make the user to check in for the target item, the check-in event organizer may use the target application to generate a check-in two-dimensional code and an encrypted image-text for the target item, and display the check-in two-dimensional code and the encrypted image-text through a check-in code display surface and a stereoscopic identification auxiliary surface located on different planes in the stereoscopic display device 102, respectively. The organization party of the check-in event can also place the stereoscopic display device 102 at a designated check-in place for the target event, for example, a commodity to be traced, a company office place, or a check-in event holding place, so that the user to be checked in at the designated check-in place can use the depth-of-field camera 104 to perform video acquisition on the stereoscopic display device 102 to obtain the target video data.
The user to check in can also utilize the client of the target application or the server of the target application carried at the terminal equipment to judge whether the target video data is the video data acquired by collecting the check-in two-dimensional code carried in the three-dimensional display device, and obtain the judgment result, if the judgment result is yes, the user to check in and the three-dimensional display device are located at the same place, namely the user to check in is signed in at the appointed check-in place aiming at the target event, so that the user to check in can be signed in aiming at the target event based on the check-in two-dimensional code in the target video data acquired by the user to check in, and if the judgment result is no, the user to check in can be shown that the user to check in is not signed in at the appointed check-in place aiming at the target event, so that the user to check in can be prohibited from checking in based on the check-in two-dimensional code in the target video data, the check-in method can prevent the user to check in from being completed aiming at the target item even if the user to check in is not at the designated check-in place, avoids the cheating action of the user to check in when the user to check in is checked in based on the two-dimensional code, and is beneficial to ensuring the authenticity of the check-in result.
Next, a two-dimensional code based check-in method provided in an embodiment of the specification will be specifically described with reference to the accompanying drawings:
fig. 2 is a schematic flowchart of a two-dimensional code-based check-in method provided in an embodiment of the present specification. From the program perspective, the execution subject of the flow may be a terminal device of the user to check in, or a target application for checking in, which is loaded at the terminal device of the user to check in, or a server of the target application. As shown in fig. 2, the process may include the following steps:
step 202: the method comprises the steps of acquiring target video data acquired by utilizing a depth-of-field camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target items.
In this specification, when the check-in event organizer needs to make the user check in for the target item, the check-in event organizer may generate a check-in two-dimensional code for the target item using the target application, and display the check-in two-dimensional code at a designated check-in place for the target item through a stereoscopic display device, so that the user to check in arriving at the designated check-in place may check in on the spot based on the stereoscopic display device displaying the check-in two-dimensional code.
Depth of field (DOF) may refer to the range of distances of a sharp image presented by an imaging device in a range before and after the focus of the imaging device after focusing is completed. The depth-of-field camera device may include a camera device with a zoom function, and/or a camera device capable of collecting depth-of-field information, such as a time-of-flight camera, a three-dimensional structured light camera, and the like.
Because mobile terminals such as mobile phones, portable computers, smartwatches and the like are usually provided with the depth-of-field camera device, when a user to check in needs to check in the field for a target item, the user to check in can use the depth-of-field camera device provided at the mobile terminal to perform video acquisition on a stereoscopic display device displaying a two-dimensional code to obtain target video data. The target video data not only needs to contain the image of the two-dimensional code to sign in, but also needs to contain the image of the two-dimensional code display device used for displaying the two-dimensional code to facilitate sign-in cheating identification based on the image of the two-dimensional code display device in the target video data, and sign-in processing is carried out based on the image of the two-dimensional code to sign in the target video data.
Step 204: judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judgment result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are located on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result.
In the embodiment of the present specification, the stereoscopic display apparatus for bearing the check-in two-dimensional code may be selected by the check-in activity organizer or may be specified by the target application that generates the check-in two-dimensional code. The three-dimensional display device can be in various forms, for example, a regular three-dimensional figure formed by planes such as a pyramid, a quadrangular frustum and the like, or an irregular three-dimensional figure formed by planes and curved surfaces, or a three-dimensional figure formed by splicing a plurality of regular three-dimensional figures and/or irregular three-dimensional figures and the like, and different constituent planes of the three-dimensional display device can be intersected or not intersected, which is not particularly limited.
In the embodiment of the present specification, it can be determined whether the user to be checked in is directly shooting the stereoscopic display device displaying the checked-in two-dimensional code or indirectly shooting the stereoscopic display device displaying the checked-in two-dimensional code by judging whether the target video data is the video data acquired by collecting the checked-in two-dimensional code carried in the stereoscopic display device.
Since the stereoscopic display device bearing the check-in two-dimensional code is usually placed at the designated check-in place for the target event, when the user to check in directly shoots the stereoscopic display device bearing the check-in two-dimensional code, the user to check in and the stereoscopic display device can be represented to be both located at the designated check-in place for the target event, so that the user to check in can be considered to be in the field. If it is determined that the user to check in is indirectly shooting the stereoscopic display device showing the checked-in two-dimensional code by shooting the photo or the video containing the stereoscopic display device, the user to check in is probably not at the designated checked-in place for the target item where the stereoscopic display device is placed, and therefore the user to check in can be considered to be cheated.
Step 206: and if the judgment result shows that the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
And if the judgment result shows that the target video data is not the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, the check-in processing is forbidden for the target item based on the check-in two-dimensional code in the target video data.
In the embodiment of the present specification, when it is determined that the target video data is video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device, it may be considered that the user to check in performs field check-in at the designated check-in place for the target event where the stereoscopic display device is placed, so that the user to check in may be enabled to check in for the target event based on the check-in two-dimensional code in the target video data.
Specifically, when the user to check in is made to check in for the target item based on the two-dimensional check-in code in the target video data, the method may include: analyzing the sign-in two-dimensional code to obtain a sign-in link; acquiring user information; generating and sending a check-in request aiming at a user corresponding to the user information based on the check-in link; and responding to the check-in request, and generating and displaying information for prompting the user to successfully check in aiming at the target item. The acquired user information may be user information of a logged-in account at a target application used by the check-in user, or may also be device information of a terminal device used by the check-in user, which is not specifically limited.
In this specification, when it is determined that the target video data is not video data obtained by collecting the check-in two-dimensional code loaded in the stereoscopic display device, it may be considered that the user to check in is not at a designated check-in place where the stereoscopic display device is placed for the target item, that is, the user to check in has a check-in cheating behavior, so that the user to check in may be prohibited from checking in for the target item based on the check-in two-dimensional code in the target video data, so as to avoid that the user to check in succeeds. In practical application, information prompting that the user fails to sign in can be displayed to the user to sign in, so that the user to sign in can conveniently conduct video collection again or stop executing cheating actions of sign in.
In the method in fig. 2, after target video data acquired by a user for a check-in two-dimensional code of a target event by using a depth-of-field camera device is acquired, whether the target video data is video data acquired by acquiring the check-in two-dimensional code carried in a stereoscopic display device is judged, and if yes, the user can be indicated to carry out field check-in at a designated check-in place for the target event, so that the user can check-in for the target event based on the check-in two-dimensional code in the target video data acquired by the user, the user can be prevented from checking in for the target event without the designated check-in place, the possibility of cheating when the user checks in based on the two-dimensional code is reduced, and the authenticity of a check-in result of the user is improved.
Based on the method in fig. 2, some specific embodiments of the method are also provided in the examples of this specification, which are described below.
In the embodiment of the description, whether target video data are acquired by directly aiming at a stereoscopic display device bearing a check-in two-dimensional code needs to be identified so as to identify check-in cheating. Therefore, the lens focal length parameters of the depth-of-field camera device can be changed in the process of collecting target video data by a user to check in, and when the depth-of-field camera device collects the target video data under different lens focal length parameters, the target video data can reflect the motion condition and depth-of-field change information of the two-dimensional code display device bearing the check-in two-dimensional code. Based on the motion condition and the depth of field change information of the two-dimensional code display device, whether a user to check in shoots a stereoscopic display device directly or shoots a photo or a video containing the stereoscopic display device can be determined, and therefore the check-in cheating recognition is achieved.
Based on this, step 202 may specifically include: and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
In this embodiment of the present specification, in order to make the check-in user know the operation requirement of acquiring the target video data, the check-in user may be prompted, that is, before step 202, the method may further include:
and acquiring the check-in triggering operation of the user.
And displaying video acquisition prompt information, wherein the video acquisition prompt information is used for prompting a user to change the focal length parameter of the lens of the depth-of-field camera device in the target video data acquisition process. The video acquisition prompt information can also be used for prompting the user not to move the field depth camera device, sign in the display position of the two-dimensional code and the like.
In this embodiment of the specification, the user to check in may need to use the target application loaded in the terminal device to check in, and therefore, the user to check in may trigger the check-in control of the target application to perform a check-in triggering operation. In response to the check-in trigger operation, the target application may invoke the depth-of-field camera to perform video capture. Before the depth-of-field camera device is used for video acquisition, or in the process of acquiring videos by the depth-of-field camera device, the target application can display video acquisition prompt information to a user, for example, "please stretch the camera", and the like, so that the user can acquire target video data according to the prompt information.
In practical applications, an operation of changing a lens focal length parameter of the depth-of-field image pickup device by a user may be recognized by the terminal device or a target application installed at the terminal device, and therefore, after recognizing that the user performs a focusing operation, the terminal device or the target application may combine video data acquired before the focusing operation is performed and video data acquired after the focusing operation is performed as target video data.
In this embodiment, the implementation manner of determining whether the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the stereoscopic display device in step 204 may be various.
Implementation mode one
Step 204 may specifically include:
determining motion trail data of a two-dimensional code display device in the target video data; the two-dimensional code display device displays the check-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the motion trail data.
In the embodiment of the description, since the focal length parameter of the depth of field camera device changes in the acquisition process of the target video data, although the position of the two-dimensional code display device displaying the check-in two-dimensional code does not change, the lens of the depth of field camera device still runs relative to the check-in two-dimensional code, so that the motion trajectory data of the two-dimensional code display device in the target video data can be determined.
Because the motion track data of the three-dimensional object and the plane object are not consistent, if the motion track data of the two-dimensional code display device is consistent with the motion track data of the three-dimensional display device caused by stretching the depth-of-field camera device, it can be determined that the target video data is obtained by shooting the check-in two-dimensional code loaded in the three-dimensional display device instead of shooting the photo or the video containing the three-dimensional display device loaded with the check-in two-dimensional code, and at the moment, the risk of cheating check-in is low. Similarly, if the motion trajectory data of the two-dimensional code display device is inconsistent with the motion trajectory data of the three-dimensional display device caused by stretching the depth-of-field camera device, it can be determined that the target video data is not acquired from the check-in two-dimensional code loaded in the three-dimensional display device, but the target video data is obtained by shooting a photo or a video containing the three-dimensional display device loaded with the check-in two-dimensional code, and at the moment, the check-in risk is higher.
In practical applications, there are various ways to determine the motion trajectory data of the two-dimensional code display device in the target video data. For example, an Optical flow method (Optical flow or Optical flow) may be used to describe the motion of an observation target, a surface, or an edge caused by the motion of an observer, and thus, the Optical flow method may be used to calculate a motion vector of the two-dimensional code presentation device in an adjacent image frame within the target video data, thereby determining the motion trajectory data of the two-dimensional code presentation device in the target video data. Or, the video data sample including the two-dimensional code display device and the motion trajectory data of the two-dimensional code display device corresponding to the video data sample may be used to train the neural network model, so as to determine the motion trajectory data of the two-dimensional code display device in the target video data by using the neural network model. This is not particularly limited.
In the embodiment of the present specification, the user to check in may not perform the focusing operation in the process of acquiring the target video data, but may simulate the focusing operation by moving the depth camera, but actually, there is a large difference between the motion trajectory data of the two-dimensional code display device in the video data acquired based on the focusing operation and the motion trajectory data of the two-dimensional code display device in the target video data acquired based on the moving the depth camera.
Implementation mode two
Step 204 may specifically include:
performing three-dimensional reconstruction processing on the two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model; the two-dimensional code display device displays the check-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the three-dimensional reconstruction model.
In this embodiment of the present description, the depth information may be included in the target video data acquired by the depth-of-field camera device, so that three-dimensional reconstruction may be performed on the two-dimensional code display device in the target video data based on the depth information, and if an obtained three-dimensional reconstruction model is consistent with a model corresponding to the three-dimensional display device, it may be determined that the target video data is video data acquired from a check-in two-dimensional code loaded on the three-dimensional display device, and at this time, the risk of cheating of check-in is low. If the obtained three-dimensional reconstruction model is not consistent with the model corresponding to the stereoscopic display device, for example, the three-dimensional reconstruction model belongs to a plane structure or a two-dimensional structure, it can be determined that the target video data is not obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device, but is obtained by shooting a photo or a video of the stereoscopic display device carrying the check-in two-dimensional code, and at this time, the check-in risk is high.
In practical applications, there are various implementations of performing three-dimensional reconstruction processing on a two-dimensional code display device in target video data, for example, a three-dimensional reconstruction method based on a dynamic fusion method, a three-dimensional reconstruction method based on a KinectFusion algorithm, a dense reconstruction (Multiple View Stereo) method, and the like, which are not particularly limited.
In the embodiment of the specification, in order to prevent lawless persons from printing the two-dimensional code for signing in by themselves and carry out video acquisition after the two-dimensional code for signing in is placed in the three-dimensional display device so as to carry out signing in cheating, encrypted pictures and texts can be displayed in the three-dimensional display device, and the authenticity of signing in results is improved based on the encrypted pictures and texts.
Specifically, before step 202 is executed, the check-in activity organizer may request the target application to generate a check-in two-dimensional code for the target item, and after the target application receives the two-dimensional code information generation request for the target item, the target application may respond to the two-dimensional code information generation request to generate a check-in two-dimensional code and an encrypted image-text, and establish a corresponding relationship between the encrypted image-text and the check-in two-dimensional code. The encrypted image-text can be obtained by encrypting the specified information, and the target application can also obtain the specified information by decrypting the encrypted image-text. In the present embodiment, the content of the specifying information is not limited.
In an embodiment of the present specification, the stereoscopic display device may include a sign-in code display surface and a stereoscopic identification auxiliary surface, which are located on different planes, where the sign-in code display surface may be used to display a two-dimensional sign-in code, and then the stereoscopic identification auxiliary surface may be used to display an encrypted image. Based on this, the target application needs to perform adaptation processing on the two-dimensional sign-in code, the encrypted image and the stereoscopic display device in addition to generating the two-dimensional sign-in code and the encrypted image and text so as to generate image and text information capable of being displayed in a sign-in code display surface and a stereoscopic identification auxiliary surface of the stereoscopic display device.
In practical application, a plurality of stereoscopic identification auxiliary surfaces of the stereoscopic display device can be provided, wherein part or all of the stereoscopic identification auxiliary surfaces can be used for displaying the encrypted pictures and texts. Correspondingly, the target application can independently generate an encrypted image-text for each stereoscopic identification auxiliary surface needing to display the encrypted image-text. Or, the target application may also generate only one encrypted image-text image, extract the encrypted image-text in each designated area in the encrypted image-text image to serve as the encrypted image-text required to be displayed by each stereoscopic identification auxiliary surface, and determine each stereoscopic identification auxiliary surface required to display each encrypted image-text according to the extracted display area of each encrypted image-text in the encrypted image-text image.
For easy understanding, fig. 3 is a schematic diagram of image-text information required to be displayed by a stereoscopic display device provided in an embodiment of the present disclosure, as shown in fig. 3, the stereoscopic display device is a quadrangular frustum pyramid, a top surface of the stereoscopic display device is a sign-in code display surface 302, the stereoscopic display device has four stereoscopic identification auxiliary surfaces, wherein three stereoscopic identification auxiliary surfaces 304 are required to display encrypted images and texts, and one stereoscopic identification auxiliary surface 306 is not required to display the encrypted images and texts. And, the stereoscopic display may not need to have a bottom surface that is parallel to the top surface 302.
In the embodiment of the present specification, since the stereoscopic display device carrying the check-in two-dimensional code may also display the encrypted image-text, the check-in process needs to be performed on the user to be checked in after the encrypted image-text displayed at the two-dimensional code display device in the target video data is verified.
Step 206: based on the two-dimensional check-in code in the target video data, before performing check-in processing for the target item, the method may further include:
and acquiring the encrypted image-text displayed at the stereoscopic identification auxiliary surface in the target video data.
And verifying the encrypted image-text to obtain a verification result.
Step 206 may specifically include: and if the verification result shows that the verification is passed, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
The scheme in fig. 2 may further include: and if the verification result shows that the verification is not passed, the check-in processing is forbidden according to the check-in two-dimensional code in the target video data.
The verifying the encrypted image-text specifically may include:
carrying out decryption processing on the encrypted image-text; and/or verifying whether the encrypted image-text and the check-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
In this embodiment of the present specification, if the encrypted graphics and text are decrypted successfully, it may be indicated that the possibility that the user to check in forges the stereoscopic display device is low, so that the user to check in is allowed to check in the target event based on the two-dimensional code in the target video data. And if the encrypted image-text is not decrypted, the possibility that the user to check in forges the stereoscopic display device can be shown, so that the user to check in is prohibited from checking in the target item based on the two-dimensional code in the target video data.
Subsequently, if it is determined that the information obtained by decrypting the encrypted image-text in the target video data has a corresponding relationship with the two-dimensional code for check-in, it may be indicated that the encrypted image-text and the two-dimensional code for check-in the target video data are information generated by the target application in response to the two-dimensional code information generation request for the target item, and at this time, it may be considered that the possibility of check-in by the user to be checked-in using the forged three-dimensional display device is low, that is, the risk of cheating for check-in is low, so that the user to be checked-in may be allowed to perform check-in processing for the target item based on the two-dimensional code for check-in the target video data.
And if the fact that the information obtained by decrypting the encrypted image-text in the target video data does not correspond to the check-in two-dimensional code is determined, the fact that the user to be checked in possibly checks in by using a forged three-dimensional display device can be represented, at the moment, the check-in cheating risk is high, so that the user to be checked in can be prohibited from checking in according to the target items based on the check-in two-dimensional code in the target video data, a lawbreaker is prevented from checking in cheating by forging the three-dimensional display device corresponding to the check-in two-dimensional code, and the authenticity of a check-in result based on the two-dimensional code is improved.
FIG. 4 is a schematic swimlane flow chart corresponding to the two-dimensional code-based check-in method in FIG. 2 according to an embodiment of the present disclosure. As shown in fig. 4, the two-dimensional code based check-in procedure may involve executing subjects such as a check-in activity organizer, a user to check-in, a depth camera, and a target application for providing a check-in service. It should be noted that although the check-in activity organizer and the check-in user use the same target application, the target applications used by the two are usually target applications installed on different devices.
In the generation stage of the stereoscopic display device, the check-in activity organizer can request the target application to generate the two-dimensional code information aiming at the target item. The target application can respond to the request to generate a check-in two-dimensional code and an encrypted image-text aiming at the target item, and carry out adaptation processing aiming at the check-in two-dimensional code and the encrypted image-text according to the three-dimensional display device to obtain image-text information required to be displayed on each surface of the three-dimensional display device, and display the image-text information required to be displayed on each surface of the three-dimensional display device to a check-in activity organizer. The sign-in event organizer can make the three-dimensional display device according to the image-text information which is provided at the target application and is required to be displayed on each surface of the three-dimensional display device, and place the made three-dimensional display device at the designated sign-in place aiming at the target event.
In the check-in stage, a user to check in can execute check-in trigger operation aiming at an application page of a target application carried by the mobile terminal, and the target application responds to the check-in trigger operation, and can display video acquisition prompt information to the user to check in before the user to check in acquires target video data or in the process of acquiring the target video data by the user to check in so as to prompt the user to change the lens focal length parameter of the depth-of-field camera device in the target video data acquisition process. The target application can also respond to the check-in triggering operation to call a depth-of-field camera device carried at the terminal equipment to carry out video acquisition so as to obtain target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code.
The target application can also judge whether the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, if not, the check-in user is forbidden to check in the target item based on the check-in two-dimensional code in the target video data, and if so, the encrypted image-text displayed at the three-dimensional identification auxiliary surface of the three-dimensional display device in the target video data is verified to obtain a verification result. And if the verification result shows that the verification is passed, enabling the user to be checked in to perform check-in processing on the target item based on the check-in two-dimensional code in the target video data, and if the verification result shows that the verification is not passed, prohibiting the user to be checked in to perform check-in processing on the target item based on the check-in two-dimensional code in the target video data.
Based on the same idea, the embodiment of the present specification further provides a device corresponding to the above method. Fig. 5 is a schematic structural diagram of a two-dimensional code based check-in device corresponding to fig. 2 provided in an embodiment of the present disclosure. As shown in fig. 5, the apparatus may include:
the first obtaining module 502 is configured to obtain target video data acquired by using a depth-of-field camera device for a check-in two-dimensional code, where the check-in two-dimensional code is used for checking in for a target item.
A judging module 504, configured to judge whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the stereoscopic display device, so as to obtain a judgment result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are located on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result.
A sign-in processing module 506, configured to, if the determination result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional code carried in the stereoscopic display device, perform sign-in processing for the target item based on the sign-in two-dimensional code in the target video data.
The examples of this specification also provide some specific embodiments of the apparatus based on the apparatus of fig. 5, which is described below.
Optionally, the first obtaining module 502 may be specifically configured to:
and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
Optionally, the apparatus in fig. 5 may further include:
and the second acquisition module is used for acquiring the check-in trigger operation of the user.
The display module is used for displaying video acquisition prompt information, and the video acquisition prompt information is used for prompting a user to change the focal length parameter of the lens of the depth-of-field camera device in the target video data acquisition process.
Optionally, the determining module 504 may be specifically configured to:
determining motion trail data of a two-dimensional code display device in the target video data; the two-dimensional code display device displays the check-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the motion trail data.
Optionally, the determining module 504 may be specifically configured to:
performing three-dimensional reconstruction processing on the two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model; the two-dimensional code display device displays the check-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the three-dimensional reconstruction model.
Optionally, the stereoscopic identification auxiliary surface is displayed with encrypted pictures and texts; the apparatus in fig. 5, may further include:
and the third acquisition module is used for acquiring the encrypted image-text displayed at the stereoscopic identification auxiliary surface in the target video data.
And the verification module is used for verifying the encrypted pictures and texts to obtain a verification result.
The check-in processing module 506 may be specifically configured to:
and if the verification result shows that the verification is passed, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
Optionally, the apparatus in fig. 5 may further include:
and the first check-in prohibition module is used for prohibiting check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data if the verification result shows that the verification is not passed.
Optionally, the verification module may be specifically configured to:
carrying out decryption processing on the encrypted image-text; and/or verifying whether the encrypted image-text and the check-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
Optionally, the apparatus in fig. 5 may further include:
and the second check-in prohibition module is used for prohibiting check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data if the judgment result shows that the target video data is not the video data acquired by collecting the check-in two-dimensional code loaded in the three-dimensional display device.
Based on the same idea, the embodiment of the present specification further provides a device corresponding to the above method.
Fig. 6 is a schematic structural diagram of a two-dimensional code based check-in device corresponding to fig. 2 provided in an embodiment of this specification. As shown in fig. 6, the apparatus 600 may include:
at least one processor 610; and the number of the first and second groups,
a memory 630 communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory 630 stores instructions 620 executable by the at least one processor 610 to enable the at least one processor 610 to:
the method comprises the steps of acquiring target video data acquired by utilizing a depth-of-field camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target items.
Judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judgment result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are located on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result.
And if the judgment result shows that the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the apparatus shown in fig. 6, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital character system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate a dedicated integrated circuit chip. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (19)

1. A check-in method based on two-dimensional codes comprises the following steps:
acquiring target video data acquired by using a depth-of-field camera device for a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in for target items;
judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judgment result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result;
and if the judgment result shows that the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
2. The method according to claim 1, wherein the acquiring target video data acquired by using the depth-of-field camera device for the check-in two-dimensional code specifically includes:
and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
3. The method according to claim 2, wherein before the acquiring the target video data acquired by the depth-of-field camera device for the check-in two-dimensional code, the method further comprises:
acquiring a check-in trigger operation of a user;
and displaying video acquisition prompt information, wherein the video acquisition prompt information is used for prompting a user to change the focal length parameter of the lens of the depth-of-field camera device in the target video data acquisition process.
4. The method according to claim 1, wherein the determining whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the stereoscopic display device specifically comprises:
determining motion trail data of a two-dimensional code display device in the target video data; the two-dimensional code display device displays the check-in two-dimensional code;
and judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the motion trail data.
5. The method according to claim 1, wherein the determining whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the stereoscopic display device specifically comprises:
performing three-dimensional reconstruction processing on the two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model; the two-dimensional code display device displays the check-in two-dimensional code;
and judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the three-dimensional reconstruction model.
6. The method of claim 1, wherein the stereoscopic identification auxiliary surface is displayed with encrypted pictures and texts;
before the check-in processing is performed on the target item based on the check-in two-dimensional code in the target video data, the method further includes:
acquiring encrypted pictures and texts displayed at the stereoscopic identification auxiliary surface in the target video data;
verifying the encrypted image-text to obtain a verification result;
the check-in processing is performed for the target item based on the check-in two-dimensional code in the target video data, and specifically includes:
and if the verification result shows that the verification is passed, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
7. The method of claim 6, wherein after the verifying the encrypted image-text and obtaining the verification result, the method further comprises:
and if the verification result shows that the verification is not passed, the check-in processing is forbidden according to the check-in two-dimensional code in the target video data.
8. The method according to any one of claims 6 or 7, wherein the verifying the encrypted teletext specifically comprises:
carrying out decryption processing on the encrypted image-text; and/or the presence of a gas in the gas,
verifying whether the encrypted image-text and the check-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
9. The method according to claim 1, wherein after determining whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the stereoscopic display device, the method further comprises:
and if the judgment result shows that the target video data is not the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, the check-in processing is forbidden for the target item based on the check-in two-dimensional code in the target video data.
10. A two-dimensional code based check-in device comprises:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring target video data acquired by a depth-of-field camera device aiming at a check-in two-dimensional code, and the check-in two-dimensional code is used for checking in aiming at target items;
the judging module is used for judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judging result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result;
and the sign-in processing module is used for carrying out sign-in processing aiming at the target items based on the sign-in two-dimensional code in the target video data if the judgment result shows that the target video data is the video data obtained by collecting the sign-in two-dimensional code borne in the three-dimensional display device.
11. The apparatus of claim 10, wherein the first obtaining module is specifically configured to:
and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
12. The apparatus of claim 11, further comprising:
the second acquisition module is used for acquiring the sign-in trigger operation of the user;
the display module is used for displaying video acquisition prompt information, and the video acquisition prompt information is used for prompting a user to change the focal length parameter of the lens of the depth-of-field camera device in the target video data acquisition process.
13. The apparatus according to claim 10, wherein the determining module is specifically configured to:
determining motion trail data of a two-dimensional code display device in the target video data; the two-dimensional code display device displays the check-in two-dimensional code;
and judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the motion trail data.
14. The apparatus according to claim 10, wherein the determining module is specifically configured to:
performing three-dimensional reconstruction processing on the two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model; the two-dimensional code display device displays the check-in two-dimensional code;
and judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not according to the three-dimensional reconstruction model.
15. The device of claim 10, wherein the stereoscopic identification auxiliary surface is displayed with encrypted pictures and texts; the device, still include:
the third acquisition module is used for acquiring the encrypted image-text displayed at the stereoscopic identification auxiliary surface in the target video data;
the verification module is used for verifying the encrypted image-text to obtain a verification result;
the check-in processing module is specifically configured to:
and if the verification result shows that the verification is passed, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
16. The apparatus of claim 15, further comprising:
and the first check-in prohibition module is used for prohibiting check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data if the verification result shows that the verification is not passed.
17. The apparatus of any one of claims 15 or 16, wherein the validation module is specifically configured to:
carrying out decryption processing on the encrypted image-text; and/or the presence of a gas in the gas,
verifying whether the encrypted image-text and the check-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
18. The apparatus of claim 10, further comprising:
and the second check-in prohibition module is used for prohibiting check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data if the judgment result shows that the target video data is not the video data acquired by collecting the check-in two-dimensional code loaded in the three-dimensional display device.
19. A check-in device based on two-dimensional codes comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring target video data acquired by using a depth-of-field camera device for a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in for target items;
judging whether the target video data is video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device or not to obtain a judgment result; the stereoscopic display device comprises a sign-in code display surface and a stereoscopic identification auxiliary surface, the sign-in code display surface and the stereoscopic identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the stereoscopic identification auxiliary surface is used for assisting in generating the judgment result;
and if the judgment result shows that the target video data is the video data obtained by collecting the check-in two-dimensional code loaded in the three-dimensional display device, performing check-in processing aiming at the target item based on the check-in two-dimensional code in the target video data.
CN202111320123.XA 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code Active CN114093046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111320123.XA CN114093046B (en) 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111320123.XA CN114093046B (en) 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code

Publications (2)

Publication Number Publication Date
CN114093046A true CN114093046A (en) 2022-02-25
CN114093046B CN114093046B (en) 2024-06-07

Family

ID=80299636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111320123.XA Active CN114093046B (en) 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code

Country Status (1)

Country Link
CN (1) CN114093046B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10143621A (en) * 1996-10-29 1998-05-29 American Bank Note Holographic Inc Card security system, method for improving security, card reading device and card issuing device and hologram reading device
JP2005010581A (en) * 2003-06-20 2005-01-13 Fuji Xerox Co Ltd Method and device for confirming article
WO2013033442A1 (en) * 2011-08-30 2013-03-07 Digimarc Corporation Methods and arrangements for identifying objects
JP2014049063A (en) * 2012-09-04 2014-03-17 Casio Comput Co Ltd Three-dimensional code reading method and three-dimensional code reading device
CN104504767A (en) * 2014-11-26 2015-04-08 广东安居宝数码科技股份有限公司 Check-in information verification method and system
CN104581630A (en) * 2014-12-31 2015-04-29 浙江融创信息产业有限公司 Self-service anti-cheating sign-in method based on position service and two-dimensional code technology
CN104715337A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Attendance method, and attendance management method and device
WO2015117441A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Mobile terminal, and automatic external lens recognition method, device, and storage medium
CN205540982U (en) * 2016-01-29 2016-08-31 上海好想法网络科技有限公司 Handheld wireless equipment of registering
CN206147769U (en) * 2016-09-28 2017-05-03 郑州北斗七星通讯科技有限公司 Classroom management equipment of registering based on two -dimensional code and face identification
CN108537315A (en) * 2018-04-13 2018-09-14 中国人民武装警察部队工程大学 A kind of generation of safe Quick Response Code and authentication method
WO2019119978A1 (en) * 2017-12-19 2019-06-27 阿里巴巴集团控股有限公司 Carrier article, and service information obtaining method, apparatus and device
CN111432126A (en) * 2020-03-31 2020-07-17 浙江大华技术股份有限公司 Intelligent identification method and device, camera and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10143621A (en) * 1996-10-29 1998-05-29 American Bank Note Holographic Inc Card security system, method for improving security, card reading device and card issuing device and hologram reading device
JP2005010581A (en) * 2003-06-20 2005-01-13 Fuji Xerox Co Ltd Method and device for confirming article
WO2013033442A1 (en) * 2011-08-30 2013-03-07 Digimarc Corporation Methods and arrangements for identifying objects
JP2014049063A (en) * 2012-09-04 2014-03-17 Casio Comput Co Ltd Three-dimensional code reading method and three-dimensional code reading device
WO2015117441A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Mobile terminal, and automatic external lens recognition method, device, and storage medium
CN104504767A (en) * 2014-11-26 2015-04-08 广东安居宝数码科技股份有限公司 Check-in information verification method and system
CN104581630A (en) * 2014-12-31 2015-04-29 浙江融创信息产业有限公司 Self-service anti-cheating sign-in method based on position service and two-dimensional code technology
CN104715337A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Attendance method, and attendance management method and device
CN205540982U (en) * 2016-01-29 2016-08-31 上海好想法网络科技有限公司 Handheld wireless equipment of registering
CN206147769U (en) * 2016-09-28 2017-05-03 郑州北斗七星通讯科技有限公司 Classroom management equipment of registering based on two -dimensional code and face identification
WO2019119978A1 (en) * 2017-12-19 2019-06-27 阿里巴巴集团控股有限公司 Carrier article, and service information obtaining method, apparatus and device
CN108537315A (en) * 2018-04-13 2018-09-14 中国人民武装警察部队工程大学 A kind of generation of safe Quick Response Code and authentication method
CN111432126A (en) * 2020-03-31 2020-07-17 浙江大华技术股份有限公司 Intelligent identification method and device, camera and storage medium

Also Published As

Publication number Publication date
CN114093046B (en) 2024-06-07

Similar Documents

Publication Publication Date Title
CN108427911B (en) Identity verification method, system, device and equipment
US10832086B2 (en) Target object presentation method and apparatus
CN110263775B (en) Image identification method, device and equipment and authentication method, device and equipment
CN110163053B (en) Method and device for generating negative sample for face recognition and computer equipment
WO2020051016A1 (en) Method, apparatus, and system for resource transfer
CN105278826A (en) Augmented reality system
TW201947455A (en) Processing method and processing equipment for vehicle damage identification, client and server
CN114238904A (en) Identity recognition method, and training method and device of two-channel hyper-resolution model
Cutter et al. Towards mobile OCR: How to take a good picture of a document without sight
CN111199231B (en) Image recognition method and device
US20160350622A1 (en) Augmented reality and object recognition device
CN114328998A (en) Display method and device, computer equipment and storage medium
CN111651049B (en) Interaction method, device, computer equipment and storage medium
CN111274602B (en) Image characteristic information replacement method, device, equipment and medium
CN114093046A (en) Two-dimensional code based sign-in method, device and equipment
WO2020113020A1 (en) Providing content related to objects detected in images
CN114549823A (en) Image acquisition reminding processing method and device
CN111931152B (en) Block chain-based electronic signature verification method and device and block chain-based electronic signature verification device and device
CN117015815A (en) Selective editing and correction of images
KR20140134844A (en) Method and device for photographing based on objects
CN113411477A (en) Image acquisition method, device and equipment
KR102047936B1 (en) Apparatus and method for classifying images stored in a digital device
CN117574414B (en) Electronic contract signing processing method and device
US11783724B1 (en) Interactive training apparatus using augmented reality
CN112927219B (en) Image detection method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant