CN115394001A - Identity authentication system, method, electronic device, and computer-readable medium - Google Patents

Identity authentication system, method, electronic device, and computer-readable medium Download PDF

Info

Publication number
CN115394001A
CN115394001A CN202210905951.8A CN202210905951A CN115394001A CN 115394001 A CN115394001 A CN 115394001A CN 202210905951 A CN202210905951 A CN 202210905951A CN 115394001 A CN115394001 A CN 115394001A
Authority
CN
China
Prior art keywords
target
file
target file
storage medium
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210905951.8A
Other languages
Chinese (zh)
Other versions
CN115394001B (en
Inventor
周磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kuangshi Technology Co Ltd
Original Assignee
Beijing Kuangshi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kuangshi Technology Co Ltd filed Critical Beijing Kuangshi Technology Co Ltd
Priority to CN202210905951.8A priority Critical patent/CN115394001B/en
Publication of CN115394001A publication Critical patent/CN115394001A/en
Application granted granted Critical
Publication of CN115394001B publication Critical patent/CN115394001B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The embodiment of the application discloses an identity authentication system, an identity authentication method, electronic equipment and a computer readable medium. The system comprises a storage medium and a panel machine, wherein the panel machine is provided with an interface for accessing the storage medium, the panel machine is used for inquiring a target file with a file name meeting a target condition in the storage medium when the storage medium access interface is detected, and the target file comprises at least one of the following items: image files, video files; and if the target file is inquired, performing biological feature recognition on the object in the target file, and performing identity authentication on the object based on a biological feature recognition result. This embodiment has improved the security of the authentication to special crowd, has reduced the cost of panel machine simultaneously.

Description

Identity authentication system, method, electronic device, and computer-readable medium
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to an identity authentication system, an identity authentication method, electronic equipment and a computer readable medium.
Background
In order to improve security, a panel machine for biometric recognition (e.g., face recognition) is generally installed in a community, a company, or the like, and biometric recognition is performed on a visitor by the panel machine. However, the height of the panel machine is usually about 1.5 m, and the identification part (for example, the face) of a part of special people (for example, short people such as children) cannot enter the identification range of the panel machine, so that the panel machine is inconvenient to use.
Among the prior art, can add two-dimensional code identification module or the identification module of punching the card for the panel machine, above-mentioned special crowd's accessible scans the mode of two-dimensional code or punching the card and carries out authentication, nevertheless because the two-dimensional code is revealed easily and the card is lost easily, so great potential safety hazard exists in this kind of mode, and more modules make the cost-push of panel machine simultaneously.
Disclosure of Invention
The embodiment of the application provides an identity authentication system, an identity authentication method, electronic equipment and a computer readable medium, and aims to solve the technical problems that in the prior art, the identity authentication security for special people is low and the cost of a panel computer is high.
In a first aspect, an embodiment of the present application provides an identity authentication system, including a storage medium and a panel machine, where the panel machine is configured with an interface for accessing the storage medium; the panel machine is configured to, when it is detected that the storage medium is accessed to the interface, query, from the storage medium, a target file whose file name meets a target condition, where the target file includes at least one of: the target conditions comprise an image file and a video file, wherein the target conditions comprise: the file name comprises a target character string, and the target character string is located at the target position of the file name; and if the target file is inquired, extracting the biological characteristics of the object in the target file, and performing identity authentication on the object based on the biological characteristics.
In a second aspect, an embodiment of the present application provides an identity authentication method, which is applied to a panel machine, where the panel machine is configured with an interface for accessing a storage medium, and the method includes: when the storage medium is detected to be accessed into the interface, a target file with a file name meeting a target condition is inquired from the storage medium, wherein the target file comprises at least one of the following items: image files, video files; and if the target file is inquired, extracting the biological characteristics of the object in the target file, and performing identity authentication on the object based on the biological characteristics.
In a third aspect, an embodiment of the present application provides an electronic device, including: one or more processors; storage means having one or more programs stored thereon which, when executed by the one or more processors, cause the one or more processors to carry out the method as described in the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable medium, on which a computer program is stored, which when executed by a processor, implements the method as described in the first aspect.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method described in the first aspect.
According to the identity authentication system, the identity authentication method, the electronic equipment and the computer readable medium, when the panel machine detects that the storage medium is accessed to the interface which is configured on the panel machine and used for accessing the storage medium, the target file with the file name meeting the target condition in the storage medium is inquired, and when the target file is inquired, the biological feature of the object in the target file is extracted, so that the identity authentication of the object can be carried out on the basis of the extracted biological feature. Therefore, special crowds (such as short crowds like children) can directly name the recorded target file in a naming mode meeting the target condition and then store the named target file in the storage medium, the storage medium is connected to an interface of the panel computer, and identification can be successfully achieved without enabling the identification part (such as the face) to enter the identification range of the panel computer. Compared with the modes of scanning two-dimensional codes or swiping cards and the like, the biological characteristics are not easy to acquire and analyze by others, so that the identity authentication for special people is safer. Simultaneously, need not set up other modules for the panel machine, reduced panel machine cost.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a schematic diagram of an identity authentication system according to the present application;
FIG. 2 is a flow diagram of one embodiment of an identity authentication method according to the present application;
FIG. 3 is a schematic block diagram of one embodiment of an identity authentication device according to the present application;
fig. 4 is a schematic structural diagram of a computer system of an electronic device for implementing the embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
It should be noted that all the actions of acquiring signals, information or data in the present application are performed under the premise of complying with the corresponding data protection regulation policy of the country of the location and obtaining the authorization given by the owner of the corresponding device.
In recent years, technical research based on artificial intelligence, such as computer vision, deep learning, machine learning, image processing, and image recognition, has been advanced significantly. Artificial Intelligence (AI) is an emerging scientific technology for studying and developing theories, methods, techniques and application systems for simulating and extending human Intelligence. The artificial intelligence subject is a comprehensive subject and relates to various technical categories such as chips, big data, cloud computing, internet of things, distributed storage, deep learning, machine learning and neural networks. Computer vision is an important branch of artificial intelligence, particularly a machine is used for identifying the world, and computer vision technologies generally comprise technologies such as face identification, living body detection, fingerprint identification and anti-counterfeiting verification, biological feature identification, face detection, pedestrian detection, target detection, pedestrian identification, image processing, image identification, image semantic understanding, image retrieval, character identification, video processing, video content identification, three-dimensional reconstruction, virtual reality, augmented reality, synchronous positioning and map construction (SLAM), computational photography, robot navigation and positioning and the like. With the research and progress of artificial intelligence technology, the technology is applied to many fields, such as safety control, city management, traffic management, building management, park management, face passage, face attendance, logistics management, warehouse management, robots, intelligent marketing, computational photography, mobile phone images, cloud services, smart homes, wearable equipment, unmanned driving, automatic driving, intelligent medical treatment, face payment, face unlocking, fingerprint unlocking, person certificate verification, smart screens, smart televisions, cameras, mobile internet, live webcasts, beauty treatment, medical beauty treatment, intelligent temperature measurement and the like.
Among them, the biometric technology has been widely applied to various terminal devices or electronic apparatuses. Biometric identification techniques include, but are not limited to, fingerprint identification, palm print identification, vein identification, iris identification, face identification, biometric identification, anti-counterfeiting identification, and the like. Among them, fingerprint recognition generally includes optical fingerprint recognition, capacitive fingerprint recognition, and ultrasonic fingerprint recognition. With the rise of the full screen technology, the fingerprint identification module can be arranged in a local area or a whole area below the display screen, so that Under-screen (Under-display) optical fingerprint identification is formed; or, the optical fingerprint identification module can be partially or completely integrated into the display screen of the electronic device, so that In-screen (In-display) optical fingerprint identification is formed. The Display screen may be an Organic Light Emitting Diode (OLED) Display screen, a Liquid Crystal Display (LCD), or the like. Fingerprint identification methods generally include the steps of fingerprint image acquisition, preprocessing, feature extraction, feature matching, and the like. Part or all of the steps can be realized by a traditional Computer Vision (CV) algorithm, and also can be realized by an Artificial Intelligence (AI) -based deep learning algorithm. The fingerprint identification technology can be applied to portable or mobile terminals such as smart phones, tablet computers and game equipment, and other electronic equipment such as smart door locks, automobiles and bank automatic teller machines, and is used for fingerprint unlocking, fingerprint payment, fingerprint attendance, identity authentication and the like.
At present, in a place such as a community or a company where identity authentication of an visitor is required, a panel machine is generally installed at a doorway, biometric recognition (e.g., face recognition) is performed on the visitor by the panel machine, and the identity of the visitor is authenticated based on a biometric recognition result (e.g., face recognition result). However, the height of the panel machine is usually about 1.5 m, and the identification part (for example, the face) of a part of special people (for example, the short people such as children) can not enter the identification range of the panel machine, so that the panel machine is inconvenient for the special people to use. If a two-dimensional code identification module or a card swiping identification module is added to the panel machine, not only are greater potential safety hazards caused by the conditions of two-dimensional code leakage, card loss and the like, but also the cost of the panel machine is increased due to more modules. The application provides an identity authentication method which can improve the safety of identity authentication aiming at special crowds and reduce the cost of a panel machine.
Referring to fig. 1, a schematic diagram of an identity authentication system according to the present application is shown. The identity authentication system may include a panel machine (as shown at reference numeral 101) and a storage medium (as shown at reference numeral 102). The panel machine may be configured with an interface for accessing the storage medium. The panel machine may be a panel machine for performing biometric identification, and may further include a camera, a processor, a memory, and other components, which are not limited herein. The storage medium may be a carrier for storing data, and may include, but is not limited to, at least one of the following: a Universal Serial Bus Flash Disk (usb Flash Disk), a Compact Flash (CF) Card, a Secure Digital (SD) Card, an MMC (Multi-Media Card), a Smart Media (SM) Card, a Secure Digital High Capacity (SD) Card, and the like.
In this embodiment, the panel machine may be configured to, when it is detected that the storage medium accesses the interface, query, from the storage medium, a target file whose file name satisfies a target condition. Wherein the object file comprises at least one of: image files, video files. And if the target file is inquired, extracting the biological characteristics of the object in the target file, and authenticating the identity of the object based on the biological characteristics.
Here, the panel machine can detect whether the storage medium is accessed to the interface in real time. A system broadcast may be triggered when the storage medium accesses the interface. The panel computer can determine the storage medium access interface when receiving the system broadcast. Taking the storage medium as a USB disk as an example, when the USB disk is inserted into an interface (e.g., USB interface) of the panel computer, a system broadcast (e.g., USB _ DEVICE _ authenticated) is triggered, and when the processor of the panel computer receives the system broadcast, the USB disk access interface may be determined.
The target conditions may include, but are not limited to: the file name comprises a target character string, and the target character string is located at the target position of the file name. If the file name contains the object string "self", and the object string "self" is the head end of the file name, such as "self _20220530_20220630", the file is considered to be the object file. Note that when the file name is "self", it can also be a target file. Therefore, the user can directly name the recorded target file in a naming mode meeting the target condition and then store the named target file in the storage medium, and the named target file can be inquired and analyzed by the panel computer, so that the convenience of inquiring the target file is improved.
The above-mentioned biometric features may include, but are not limited to, at least one of: face features, iris features, fingerprint features, and palm print features. After the biometric features are extracted, the biometric features may be matched with the pre-stored biometric features (for example, similarity is calculated by using a similarity calculation method such as euclidean distance), and if there are pre-stored biometric features that match the extracted biometric features (for example, the similarity is greater than a threshold), the identity authentication of the object may be considered to be passed. Otherwise, the identity authentication of the object is considered to be failed.
The pre-stored biological characteristics can be stored in the panel machine locally or in the server. When the pre-stored biological characteristics are stored in the server, the extracted biological characteristics can be sent to the server in a wired connection or wireless connection mode, and an identity authentication result returned by the server is received. The wireless connection means may include, but is not limited to, a 3G (3 rd-Generation, third Generation mobile communication technology) connection, a 4G (4 rd-Generation, fourth Generation mobile communication technology) connection, a 5G (5 rd-Generation, fifth Generation mobile communication technology), a Wi-Fi (wireless network communication technology) connection, a bluetooth connection, a WiMAX (World Interoperability for Microwave Access) connection, a Zigbee (Zigbee protocol) connection, a UWB (ultra wideband) connection, and other wireless connection means now known or developed in the future.
In the system provided by the above embodiment of the present application, when the panel machine detects that the storage medium is accessed to the interface configured thereon and used for accessing the storage medium, the target file with the file name satisfying the target condition in the storage medium is queried, and when the target file is queried, the biometric feature of the object in the target file is extracted, so that the identity authentication of the object can be performed based on the extracted biometric feature. Therefore, special crowds (such as children and other shorter crowds) can directly name the recorded target file in a naming mode meeting the target condition and then store the named target file in the storage medium, the storage medium is connected to an interface of the panel computer, and identification can be successfully achieved without enabling the identification part (such as the face) to enter the identification range of the panel computer. Compared with the modes of scanning two-dimensional codes or swiping cards and the like, the biological characteristics are not easy to acquire and analyze by others, so that the identity authentication for special people is safer. Simultaneously, need not set up other modules for the panel machine, reduced panel machine cost.
In some alternative embodiments, the panel machine may be further configured to: if the target file is inquired, determining the effective time period of the target file based on the name of the target file; and if the current time is in the effective time period, extracting the biological characteristics of the object in the target file, and performing identity authentication on the object based on the biological characteristics.
As an example, the start time and the end time of the validity period may be included in the file name of the target file. For example, the naming format of the object file may be self _ start _ end, where "start" represents the start time of the valid period (i.e. the start time of the user's right to pass) and "end" represents the end time of the valid period (i.e. the end time of the user's right to pass). If the file name of the target file is "self _20220530_20220630", it indicates that the valid period of the target file is from 30/5/2022 to 30/6/2022. If the file name of the target file is "self", it can be indicated that the target file is permanently valid. If the target file is inquired, the panel machine can firstly determine the effective time period of the target file based on the name of the target file. If the current time is within the valid time period, the step of extracting the biometric characteristic of the object in the target file may be performed. If the current time interval is not in the valid time interval, prompt information for prompting that the user has no passing authority can be displayed, or any operation can not be executed.
By setting the start time and the end time of the valid period in the file name of the target file, the target file can be made to have the valid period. When the target file fails, it cannot be parsed. Therefore, the safety of the target file is improved.
In some alternative embodiments, the operation modes of the panel machine may include, but are not limited to, a liveness detection mode and a biometric recognition mode. The panel machine may default to a live body detection mode to perform live body detection on an object within the identification range. After the living body detection is passed, the system can be switched to a biological feature recognition mode to perform biological feature recognition (such as human face recognition). After the biometric identification is finished, the mode can be switched to the live body detection mode again so as to perform the live body detection on the next visitor. In this embodiment, the panel computer may perform query of the target file when detecting the storage medium access interface, and may switch the operation mode from the living body detection mode to the biometric identification mode when querying the target file, so that biometric extraction may be directly performed on the object in the target file without performing living body detection. Therefore, special crowds (such as shorter crowds like children) can directly name the recorded target file in a naming mode meeting target conditions and then store the named target file in the storage medium, the storage medium is connected to an interface of the panel computer, identification parts (such as faces) do not need to enter an identification range of the panel computer, identity authentication can be successfully achieved, and flexibility and convenience of identity authentication of the special crowds are improved.
In some alternative embodiments, the target file may be a video file. When the panel machine extracts the biological characteristics of the object in the target file, the panel machine can firstly unpack the target file to obtain the code stream in the target digital video compression format. The codestream may then be decoded into a sequence of video frames in the target color-coded format. Finally, the biometric features of the video frames in the sequence of video frames may be extracted. The target digital video compression format may include, but is not limited to, an h.264 digital video compression format. The target color coding format may include, but is not limited to, YUV (Y represents luminance, U and V may represent chrominance, where U represents chrominance for the blue component and V represents chrominance for the red component) color coding format. In practice, decoding of the code stream can be performed by a decoder such as MediaCodec. On the basis, the biological features extracted from each video frame can be respectively compared with the pre-stored biological features, and if the similarity between the biological features extracted from a certain video frame and a certain pre-stored biological feature is greater than a preset value, the identity authentication of the object can be determined to be passed. Otherwise, it is determined that the identity authentication of the object is not passed. Since the video comprises more frames compared with the image, the accuracy of the identity authentication result can be improved.
Further, since more additional information, such as audio data, location, video generation date, etc., can be stored in the video file, the panel machine can also perform identity authentication in combination with the additional information. As an example, voiceprint features can be extracted from audio data while identity authentication is performed based on biometric features and voiceprint features. Therefore, the accuracy of the identity authentication result can be further improved.
In some optional embodiments, the identity authentication system may further include a door access device (as indicated by reference numeral 104 in fig. 1). The panel machine may also be used to: and if the identity authentication of the object passes, the access control equipment can be controlled to be opened. If the identity authentication of the object is not passed, prompt information can be output. The prompt message can be used for prompting the user that the user has no right of passage. The output mode of the prompt message may include but is not limited to: displaying on a screen of the panel machine, broadcasting by voice of the panel machine, and the like.
In some alternative embodiments, the storage medium may comprise a USB flash drive (i.e., a USB flash drive). The interface may comprise a USB interface. The panel machine can be configured with a USB extension cord, and the storage medium can be accessed into the interface through the USB extension cord. Referring to fig. 1, a panel machine (as shown by reference numeral 101) may be provided at a gate of a doorway of a community. The panel machine may be configured with a USB interface. The USB interface is connected to a USB extension cord (indicated by reference numeral 103). The user can insert the USB extension line with the USB flash disk, realizes the USB flash disk and inserts. Therefore, special crowds (for example, shorter crowds such as children) can plug and pull the USB flash disk conveniently, and the convenience of operation of the crowds is improved.
In some alternative embodiments, the file name may not include an extension. When extracting the biological features of the object in the target file, the extension name may be added first, and then the biological features may be extracted. Therefore, any user cannot directly view the file content, and the safety of the target file and the safety of identity authentication are further improved.
With continued reference to FIG. 2, a flow 200 of one embodiment of an identity authentication method according to the present application is shown. The identity authentication method can be applied to a panel machine, and the panel machine is provided with an interface for accessing a storage medium. The identity authentication method comprises the following steps:
step 201, when a storage medium access interface is detected, a target file with a file name meeting a target condition is queried from an accessed storage medium.
In this embodiment, an executing entity (for example, a processor in the panel machine) of the identity authentication method may detect whether the storage medium is accessed to the interface. For example, a system broadcast may be triggered when the storage medium accesses the interface. The execution agent may determine the storage medium access interface upon receiving the system broadcast. Taking the storage medium as a USB disk as an example, when the USB disk is inserted into an interface (e.g., USB interface) of the panel computer, a system broadcast (e.g., USB _ DEVICE _ authenticated) is triggered, and when the processor of the panel computer receives the system broadcast, the USB disk access interface may be determined.
When the storage medium access interface is detected, the execution subject can inquire a target file with a file name meeting a target condition in the storage medium. Wherein the object file comprises at least one of: image files, video files. Target conditions may include, but are not limited to: the file name comprises a target character string, and the target character string is located at the target position of the file name. For example, if the file name includes a target character string "self", and the target character string "self" is the head end of the file name, such as "self _20220530_20220630", the file can be considered as a target file. Note that when the file name is "self", it can also be a target file. Therefore, the user can directly name the recorded target file in a naming mode meeting the target condition and then store the named target file in the storage medium, and the named target file can be inquired and analyzed by the panel computer, so that the convenience of inquiring the target file is improved.
Step 202, if the target file is queried, extracting the biological features of the object in the target file, and performing identity authentication on the object based on the biological features.
In this embodiment, if the target file is queried from the storage medium, the biometric features of the object in the target file can be extracted. The above-mentioned biometric features may include, but are not limited to, at least one of: face features, iris features, fingerprint features, and palm print features. After the biometric features are extracted, the biometric features may be matched with pre-stored biometric features (for example, similarity is calculated by using a similarity calculation method such as euclidean distance), and if there are pre-stored biometric features that match the extracted biometric features (for example, the similarity is greater than a threshold), the identity authentication of the object may be considered to be passed. Otherwise, the identity authentication of the object is considered to be not passed.
The pre-stored biological characteristics can be stored in the panel machine locally or in the server. When the pre-stored biological characteristics are stored in the server, the extracted biological characteristics can be sent to the server in a wired connection or wireless connection mode, and an identity authentication result returned by the server is received. The wireless connection may include, but is not limited to, a 3G (3 rd-Generation, third Generation mobile communication technology) connection, a 4G (4 rd-Generation, fourth Generation mobile communication technology) connection, a 5G (5 rd-Generation, fifth Generation mobile communication technology), a Wi-Fi (wireless network communication technology) connection, a bluetooth connection, a WiMAX (World Interoperability for Microwave Access) connection, a Zigbee (Zigbee protocol) connection, an UWB (ultra wide band) connection, and other wireless connection methods now known or developed in the future.
In the method provided by the above embodiment of the present application, when the panel machine detects that the storage medium is accessed to the interface configured thereon and used for accessing the storage medium, the target file with the file name satisfying the target condition in the storage medium is queried, and when the target file is queried, the biometric feature of the object in the target file is extracted, so that the identity authentication of the object can be performed based on the extracted biometric feature. Therefore, special crowds (such as short crowds like children) can directly name the recorded target file in a naming mode meeting the target condition and then store the named target file in the storage medium, the storage medium is connected to an interface of the panel computer, and identification can be successfully achieved without enabling the identification part (such as the face) to enter the identification range of the panel computer. Compared with the modes of scanning two-dimensional codes or swiping cards and the like, the biological characteristics are not easy to acquire and analyze by others, so that the identity authentication for special people is safer. Simultaneously, need not set up other modules for the panel machine, reduced panel machine cost.
In some alternative embodiments, the start time and the end time of the validity period may be included in the filename of the target file. For example, the naming format of the object file may be self _ start _ end, where "start" represents the start time of the valid period (i.e. the start time of the user's right to pass) and "end" represents the end time of the valid period (i.e. the end time of the user's right to pass). If the file name of the target file is "self _20220530_20220630", it indicates that the valid period of the target file is from 30/5/2022 to 30/6/2022. Note that, if the file name of the target file is "self", it can be indicated that the target file is permanently valid.
On the basis, in step 202, if the target file is queried, the execution body may first determine a valid period of the target file based on the name of the target file. If the current time is within the valid period, the step of extracting the biometric characteristic of the object in the target file may be performed. If the current time interval is not in the valid time interval, prompt information for prompting that the user has no passing authority can be displayed, or any operation can not be executed.
By setting the start time and the end time of the valid period in the file name of the target file, the target file can be made to have the valid period. When the target file fails, the target file cannot be parsed. Therefore, the safety of the target file is improved.
In some alternative embodiments, the operation modes of the panel machine may include, but are not limited to, a liveness detection mode and a biometric recognition mode. The panel machine may default to a live detection mode to perform live detection on objects within the identification range. After the living body detection is passed, the living body detection device can be switched to a biological feature recognition mode to perform biological feature recognition (such as human face recognition). After the biometric identification is finished, the mode can be switched to the live body detection mode again so as to perform the live body detection on the next visitor. In this embodiment, when the storage medium access interface is detected, the target file is queried, and when the target file is queried, the working mode can be switched from the living body detection mode to the biological feature recognition mode, so that the biological feature extraction of the object in the target file is directly performed without performing the living body detection. Therefore, special crowds (for example, children and other shorter crowds) can directly name the recorded target file in a naming mode meeting the target condition and then store the named target file in the storage medium, the storage medium is connected to an interface of the panel computer, identification can be successfully achieved without enabling an identification part (for example, the face) to enter an identification range of the panel computer, and flexibility and convenience of identification of the special crowds are improved.
In some alternative embodiments, the target file may be a video file. When extracting the biological characteristics of the object in the target file, the target file can be unpacked first to obtain the code stream in the target digital video compression format. The codestream may then be decoded into a sequence of video frames in the target color-coded format. Finally, the biometric features of the video frames in the sequence of video frames may be extracted. The target digital video compression format may include, but is not limited to, an h.264 digital video compression format. The target color coding format may include, but is not limited to, YUV (Y represents luminance, U and V may represent chrominance, where U represents chrominance for the blue component and V represents chrominance for the red component) color coding format. In practice, decoding of the code stream can be performed by a decoder such as MediaCodec. On the basis, the biological features extracted from each video frame can be respectively compared with the pre-stored biological features, and if the similarity between the biological features extracted from a certain video frame and a certain pre-stored biological feature is greater than a preset value, the identity authentication of the object can be determined to be passed. Otherwise, it is determined that the identity authentication of the object fails. Since the video comprises more frames relative to the image, the accuracy of the identity authentication result can be improved.
Further, since more additional information, such as audio data, location, video generation date, etc., can be stored in the video file, the identification can be performed in combination with the additional information. As an example, voiceprint features can be extracted from audio data while identity authentication is performed based on biometric features and voiceprint features. Therefore, the accuracy of the identity authentication result can be further improved.
In some optional embodiments, if the identity authentication of the object passes, the access control device may be controlled to open. Wherein the access control device may include, but is not limited to, at least one of: door and lock. If the identity authentication of the object is not passed, prompt information can be output. The prompt message can be used for prompting the user that the user has no right of passage.
In some alternative embodiments, the storage medium may comprise a USB flash drive (i.e., a USB flash drive). The interface may comprise a USB interface. The panel machine can be configured with a USB extension cord, and the storage medium can be accessed into the interface through the USB extension cord. The user can insert the USB extension line with the USB flash disk, realizes the USB flash disk and inserts. Therefore, special crowds (such as shorter crowds like children) can plug and pull the USB flash disk conveniently, and the convenience of the operation of the crowds is improved.
In some alternative embodiments, the file name may not include an extension. When extracting the biological features of the object in the target file, the extension name may be added first, and then the biological features may be extracted. Therefore, any user cannot directly view the file content, and the safety of the target file and the safety of identity authentication are further improved.
With further reference to fig. 3, as an implementation of the method shown in the above figures, the present application provides an embodiment of an identity authentication apparatus, which corresponds to the embodiment of the method shown in fig. 1, and which can be applied in a panel machine. The panel is provided with an interface for accessing a storage medium.
As shown in fig. 3, the identity authentication apparatus 300 of the present embodiment includes: an inquiring unit 301, configured to, when it is detected that the storage medium is accessed to the interface, inquire, from the storage medium, a target file whose file name meets a target condition, where the target file includes at least one of: the target conditions comprise an image file and a video file, wherein the target conditions comprise: the file name comprises a target character string, and the target character string is located at the target position of the file name; an authentication unit 302, configured to, if the target file is queried, extract a biometric feature of an object in the target file, and authenticate the identity of the object based on the biometric feature.
In some optional implementation manners, the authentication unit 302 is further configured to determine a valid period of the target file based on a name of the target file if the target file is queried; and if the current time is in the effective time period, extracting the biological characteristics of the object in the target file.
In some optional implementations, the operation mode of the panel machine includes a living body detection mode and a biological feature recognition mode; the authentication unit 302 is further configured to switch the operation mode from the biometric detection mode to the biometric identification mode to extract the biometric characteristic of the object in the target file when the target file is queried.
In some optional implementations, the target file is a video file; the authentication unit 302 is further configured to decapsulate the target file to obtain a code stream in a target digital video compression format; decoding the code stream into a video frame sequence in a target color coding format; and extracting the biological characteristics of the video frames in the video frame sequence.
In some optional implementations, the apparatus further includes: the control unit is used for controlling the entrance guard equipment to be opened if the identity authentication of the object passes; if the identity authentication of the object is not passed, prompt information is output, and the prompt information is used for prompting the user that the user has no passing authority.
In some optional implementations, the panel is configured with a USB extension line of a universal serial bus, the storage medium includes a USB flash disk, the interface includes a USB interface, and the storage medium is connected to the interface through the USB extension line.
In some alternative implementations, the file name does not include an extension.
According to the device provided by the embodiment of the application, when the panel machine detects that the storage medium is accessed to the interface which is configured on the panel machine and used for accessing the storage medium, the target file with the file name meeting the target condition in the storage medium is inquired, and when the target file is inquired, the biological feature of the object in the target file is extracted, so that the identity of the object can be authenticated based on the extracted biological feature. Therefore, special crowds (such as children and other shorter crowds) can directly name the recorded target file in a naming mode meeting the target condition and then store the named target file in the storage medium, the storage medium is connected to an interface of the panel computer, and identification can be successfully achieved without enabling the identification part (such as the face) to enter the identification range of the panel computer. Compared with the modes of scanning two-dimensional codes or swiping cards and the like, the biological characteristics are not easy to acquire and analyze by others, so that the identity authentication for special people is safer. Simultaneously, need not set up other modules for the panel machine, reduced panel machine cost.
Embodiments of the present application further provide an electronic device, which includes one or more processors, a storage device, and one or more programs stored thereon, and when the one or more programs are executed by the one or more processors, the one or more processors implement the above-mentioned identity authentication method.
Reference is now made to fig. 4, which illustrates a schematic block diagram of an electronic device for implementing some embodiments of the present application. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 4, electronic device 400 may include a processing device (e.g., central processing unit, graphics processor, etc.) 401 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 402 or a program loaded from a storage device 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the electronic apparatus 400 are also stored. The processing device 401, the ROM 402, and the RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
Generally, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 408 including, for example, magnetic disks, hard disks, and the like; and a communication device 409. The communication means 409 may allow the electronic device 400 to communicate wirelessly or by wire with other devices to exchange data. While fig. 4 illustrates an electronic device 400 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be alternatively implemented or provided. Each block shown in fig. 4 may represent one device or may represent multiple devices, as desired.
An embodiment of the present application further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the identity authentication method.
In particular, according to some embodiments of the present application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through the communication device 409, or from the storage device 408, or from the ROM 402. Which when executed by the processing means 401, performs the above-described functions as defined in the methods of some embodiments of the present application.
An embodiment of the present application further provides a computer readable medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the above identity authentication method.
It should be noted that the computer readable medium described in some embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present application, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (Hyper Text Transfer Protocol), and may be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: when the storage medium is detected to be accessed to the interface, inquiring a target file with a file name meeting a target condition from the storage medium, wherein the target file comprises at least one of the following items: the target conditions comprise an image file and a video file, wherein the target conditions comprise: the file name comprises a target character string, and the target character string is located at the target position of the file name; and if the target file is inquired, extracting the biological characteristics of the object in the target file, and performing identity authentication on the object based on the biological characteristics.
Computer program code for carrying out operations for embodiments of the present application may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + +; conventional procedural programming languages, such as the "C" language or similar programming languages, are also included. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present application may be implemented by software or by hardware. The described units may also be provided in a processor, and may be described as: a processor includes a first determining unit, a second determining unit, a selecting unit, and a third determining unit. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
The foregoing description is only exemplary of the preferred embodiments of the present application and is provided for the purpose of illustrating the general principles of the technology. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present application is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present application are mutually replaced to form the technical solution.

Claims (12)

1. An identity authentication system is characterized by comprising a storage medium and a panel machine, wherein the panel machine is provided with an interface for accessing the storage medium;
the panel machine is configured to, when it is detected that the storage medium is accessed to the interface, query, from the storage medium, a target file whose file name satisfies a target condition, where the target file includes at least one of: the target conditions comprise an image file and a video file, wherein the target conditions comprise: the file name comprises a target character string, and the target character string is located at the target position of the file name;
and if the target file is inquired, extracting the biological characteristics of the object in the target file, and performing identity authentication on the object based on the biological characteristics.
2. The system of claim 1, wherein the panel machine is further configured to:
if the target file is inquired, determining the valid time period of the target file based on the name of the target file;
and if the current time is in the effective time period, extracting the biological characteristics of the object in the target file, and performing identity authentication on the object based on the biological characteristics.
3. The system of claim 1 or 2, wherein the panel machine operating modes include a liveness detection mode and a biometric identification mode; the panel machine is still used for:
and if the target file is inquired, switching the working mode from the living body detection mode to the biological feature recognition mode so as to extract the biological features of the object in the target file.
4. The system according to any one of claims 1 to 3, wherein the object file is a video file; the panel machine is also used for:
decapsulating the target file to obtain a code stream in a target digital video compression format;
decoding the code stream into a video frame sequence in a target color coding format;
and extracting the biological characteristics of the video frames in the video frame sequence.
5. The system of any one of claims 1 to 4, further comprising an access device; the panel machine is also used for:
if the identity authentication of the object passes, controlling the entrance guard equipment to be opened;
and if the identity authentication of the object does not pass, outputting prompt information, wherein the prompt information is used for prompting the user that the user has no passing authority.
6. The system of any one of claims 1-5, wherein the panel is configured with a Universal Serial Bus (USB) extension cord, the storage medium comprises a USB flash drive, the interface comprises a USB interface, and the storage medium is coupled to the interface through the USB extension cord.
7. The system according to one of claims 1 to 6, wherein the file name does not include an extension.
8. An identity authentication method applied to a panel machine, wherein the panel machine is provided with an interface for accessing a storage medium, and the method comprises the following steps:
when the storage medium is detected to be accessed into the interface, a target file with a file name meeting a target condition is inquired from the storage medium, wherein the target file comprises at least one of the following items: the target conditions comprise an image file and a video file, wherein the target conditions comprise: the file name comprises a target character string, and the target character string is located at the target position of the file name;
and if the target file is inquired, extracting the biological characteristics of the object in the target file, and performing identity authentication on the object based on the biological characteristics.
9. The method of claim 8, wherein the extracting the biometric features of the object in the target file if the target file is queried comprises:
if the target file is inquired, determining the valid time period of the target file based on the name of the target file;
and if the current time is in the effective time period, extracting the biological characteristics of the object in the target file.
10. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement the method as claimed in claim 8 or 9.
11. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method as claimed in claim 8 or 9.
12. A computer program product comprising a computer program, characterized in that the computer program realizes the method as claimed in claim 8 or 9 when executed by a processor.
CN202210905951.8A 2022-07-29 2022-07-29 Identity authentication system, method, electronic device, and computer-readable medium Active CN115394001B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210905951.8A CN115394001B (en) 2022-07-29 2022-07-29 Identity authentication system, method, electronic device, and computer-readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210905951.8A CN115394001B (en) 2022-07-29 2022-07-29 Identity authentication system, method, electronic device, and computer-readable medium

Publications (2)

Publication Number Publication Date
CN115394001A true CN115394001A (en) 2022-11-25
CN115394001B CN115394001B (en) 2024-04-26

Family

ID=84115878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210905951.8A Active CN115394001B (en) 2022-07-29 2022-07-29 Identity authentication system, method, electronic device, and computer-readable medium

Country Status (1)

Country Link
CN (1) CN115394001B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1272188A (en) * 1998-05-21 2000-11-01 保仓丰 Authentication card system
CN1596423A (en) * 2002-01-22 2005-03-16 欧里科国际公司 Method and apparatus for facilitating low-cost and scalable digital identification authentication
CN101165671A (en) * 2006-10-18 2008-04-23 祥群科技股份有限公司 Multifunctional storage apparatus and its control method
CN101783163A (en) * 2009-01-21 2010-07-21 李苏 Intelligent flash U disk having function of mouse and implementation method thereof
CN101980305A (en) * 2010-10-21 2011-02-23 青岛科技大学 Face identification and 3G communication-based intelligent household access control system
CN106228345A (en) * 2016-07-29 2016-12-14 淮阴工学院 A kind of business administration display device
CN107945321A (en) * 2017-11-08 2018-04-20 平安科技(深圳)有限公司 Safety inspection method, application server and computer-readable recording medium based on recognition of face
CN207458153U (en) * 2017-10-23 2018-06-05 深圳峰伊生物科技有限公司 A kind of access permission manages system
CN108460875A (en) * 2018-03-20 2018-08-28 深圳市西克智能技术有限公司 A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN109977839A (en) * 2019-03-20 2019-07-05 北京字节跳动网络技术有限公司 Information processing method and device
CN209373681U (en) * 2019-02-01 2019-09-10 深圳市英泰斯达智能技术有限公司 A kind of infrared image face door access machine with fingerprint identification function
CN210483286U (en) * 2019-03-29 2020-05-08 杭州荣旗科技有限公司 Special face recognition system of intelligence lock
CN111462379A (en) * 2020-03-17 2020-07-28 广东网深锐识科技有限公司 Access control management method, system and medium containing palm vein and face recognition
CN113987506A (en) * 2021-10-19 2022-01-28 中国工商银行股份有限公司 Test method, device, test equipment and storage medium of authentication system
CN216133431U (en) * 2021-07-26 2022-03-25 合肥优恩物联网科技有限公司 Entrance guard's machine equipment that can punch card and open door based on RCC technique

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1272188A (en) * 1998-05-21 2000-11-01 保仓丰 Authentication card system
CN1596423A (en) * 2002-01-22 2005-03-16 欧里科国际公司 Method and apparatus for facilitating low-cost and scalable digital identification authentication
CN101165671A (en) * 2006-10-18 2008-04-23 祥群科技股份有限公司 Multifunctional storage apparatus and its control method
CN101783163A (en) * 2009-01-21 2010-07-21 李苏 Intelligent flash U disk having function of mouse and implementation method thereof
CN101980305A (en) * 2010-10-21 2011-02-23 青岛科技大学 Face identification and 3G communication-based intelligent household access control system
CN106228345A (en) * 2016-07-29 2016-12-14 淮阴工学院 A kind of business administration display device
CN207458153U (en) * 2017-10-23 2018-06-05 深圳峰伊生物科技有限公司 A kind of access permission manages system
CN107945321A (en) * 2017-11-08 2018-04-20 平安科技(深圳)有限公司 Safety inspection method, application server and computer-readable recording medium based on recognition of face
CN108460875A (en) * 2018-03-20 2018-08-28 深圳市西克智能技术有限公司 A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN209373681U (en) * 2019-02-01 2019-09-10 深圳市英泰斯达智能技术有限公司 A kind of infrared image face door access machine with fingerprint identification function
CN109977839A (en) * 2019-03-20 2019-07-05 北京字节跳动网络技术有限公司 Information processing method and device
CN210483286U (en) * 2019-03-29 2020-05-08 杭州荣旗科技有限公司 Special face recognition system of intelligence lock
CN111462379A (en) * 2020-03-17 2020-07-28 广东网深锐识科技有限公司 Access control management method, system and medium containing palm vein and face recognition
CN216133431U (en) * 2021-07-26 2022-03-25 合肥优恩物联网科技有限公司 Entrance guard's machine equipment that can punch card and open door based on RCC technique
CN113987506A (en) * 2021-10-19 2022-01-28 中国工商银行股份有限公司 Test method, device, test equipment and storage medium of authentication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵璐唯;米智恬;祁圣恩;于睿;宋晓林;任相花;: "基于复合式身份认证的门禁***设计", 科技创新与应用, no. 29, 28 September 2020 (2020-09-28) *

Also Published As

Publication number Publication date
CN115394001B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
US11908238B2 (en) Methods and systems for facial point-of-recognition (POR) provisioning
KR20190072563A (en) Method and apparatus for detecting facial live varnish, and electronic device
US10924476B2 (en) Security gesture authentication
TW202026948A (en) Methods and devices for biological testing and storage medium thereof
JP2020520511A (en) Access control method and apparatus, system, electronic device, program and medium
CN102646190A (en) Authentication method, device and system based on biological characteristics
KR20170056193A (en) Access authentication system and method
CN111095246B (en) Method and electronic device for authenticating user
CN107609515B (en) Double-verification face comparison system and method based on Feiteng platform
KR20220123118A (en) Systems and methods for distinguishing user, action and device-specific characteristics recorded in motion sensor data
CN114924950A (en) Test method, electronic device, and computer-readable medium
CN111385530B (en) Intelligent camera combined encryption method and system
CN115394001B (en) Identity authentication system, method, electronic device, and computer-readable medium
KR101082842B1 (en) Face recognition method by using face image and apparatus thereof
CN116468113A (en) Living body detection model training method, living body detection method and living body detection system
KR102632212B1 (en) Electronic device for managnign vehicle information using face recognition and method for operating the same
US10867022B2 (en) Method and apparatus for providing authentication using voice and facial data
CN109522737B (en) Method and device for determining resource access rights
KR100554171B1 (en) Biometric authentication method and its system
Al-Sudani et al. Hiding rfid in the image matching based access control to a smart building
CN104732137A (en) Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes
JP2020135666A (en) Authentication device, terminal for authentication, authentication method, program and recording medium
CN114826689B (en) Information input method, security authentication method and electronic equipment
CN116778620B (en) Intelligent access door control method based on neural network and rfid
CN108171026A (en) Method for authenticating and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant