CN110381064B - Verification method, verification device and computer-readable storage medium - Google Patents

Verification method, verification device and computer-readable storage medium Download PDF

Info

Publication number
CN110381064B
CN110381064B CN201910663571.6A CN201910663571A CN110381064B CN 110381064 B CN110381064 B CN 110381064B CN 201910663571 A CN201910663571 A CN 201910663571A CN 110381064 B CN110381064 B CN 110381064B
Authority
CN
China
Prior art keywords
code
verified
comparison
occ
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910663571.6A
Other languages
Chinese (zh)
Other versions
CN110381064A (en
Inventor
赖书进
迟学芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin University
Original Assignee
Jilin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin University filed Critical Jilin University
Priority to CN201910663571.6A priority Critical patent/CN110381064B/en
Publication of CN110381064A publication Critical patent/CN110381064A/en
Application granted granted Critical
Publication of CN110381064B publication Critical patent/CN110381064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a verification method, a verification device and a computer-readable storage medium, wherein the verification method comprises the following steps: acquiring a first optical camera communication OCC code displayed by equipment to be verified; converting the first OCC code into a code to be verified; comparing the code to be verified with a first comparison code obtained in advance to obtain a comparison result; and determining whether the equipment to be verified passes the verification or not according to the comparison result. According to the verification method and device, verification can be achieved by obtaining the first OCC code displayed by the device to be verified, a user does not need to record a complex password, and therefore a convenient verification process can be achieved. In addition, due to the low-cost characteristic of the optical camera communication technology, the embodiment of the application realizes verification by utilizing the characteristic of the optical camera communication technology, and can also realize a low-cost verification mode.

Description

Verification method, verification device and computer-readable storage medium
Technical Field
The present application relates to the field of security technologies, and in particular, to a verification method, a verification device, and a computer-readable storage medium.
Background
With the development of internet technology, the demand of users for security is higher and higher. Currently, the most common authentication method is password authentication or scanning of two-dimensional codes. However, the existing verification methods have some defects. For example, for the password authentication mode, a user needs to remember and input a complex password, which is not convenient enough; the cost is usually high by scanning the two-dimensional code verification mode. For example, in a self-service express cabinet which delivers and retrieves express items by scanning a two-dimensional code, the manufacturing cost of the self-service express cabinet is relatively high.
Therefore, a convenient and low-cost verification method is urgently needed to meet the requirements of users.
Disclosure of Invention
An object of the embodiments of the present application is to provide a verification method, a verification apparatus, and a computer-readable storage medium, which can provide a convenient and low-cost verification method.
The first method, an embodiment of the present application, provides a verification method, where the verification method includes: acquiring a first optical camera communication OCC code displayed by equipment to be verified; converting the first OCC code into a code to be verified; comparing the code to be verified with a first comparison code obtained in advance to obtain a comparison result; and determining whether the equipment to be verified passes the verification or not according to the comparison result.
Therefore, the embodiment of the application provides a new verification method through an optical camera communication technology, that is, the first OCC code displayed by the device to be verified is obtained, the first OCC code is converted into the code to be verified, the code to be verified is compared with the first comparison code obtained in advance, and finally whether the device to be verified passes verification is determined according to the comparison result.
That is to say, this application embodiment just can realize verifying through obtaining the first OCC code of the show of waiting to verify equipment, need not the user to record complicated password to can realize convenient verification process. In addition, due to the low-cost characteristic of the optical camera communication technology, the embodiment of the application realizes verification by utilizing the characteristic of the optical camera communication technology, and can also realize a low-cost verification mode.
In one possible embodiment, acquiring the first optical camera communication OCC code exhibited by the device to be verified includes: and acquiring the first OCC code displayed by the equipment to be verified through the monitoring equipment.
Therefore, the monitoring device can obtain the first OCC code through the monitoring device to achieve verification. Furthermore, the monitoring device can also have a conventional monitoring function, namely the monitoring device can be compatible with the existing monitoring device and has a dual-purpose function.
In one possible embodiment, the comparison result is a similar proportion value of the to-be-verified code and the first comparison code, the similar proportion value represents a ratio of the same code bit to the total code bit in the first comparison code and the to-be-verified code, and the same code bit means that the positions in the first comparison code and the to-be-verified code are the same and the values in the first comparison code and the to-be-verified code are the same.
Therefore, the comparison result is accurately determined through the similar proportion value, and the safety of verification is guaranteed.
In a possible embodiment, the first OOC code is obtained by converting the obtained second comparison code by the device to be verified.
Therefore, in the embodiment of the application, when the first comparison code is the same as the second comparison code, and the first OCC code converted by the second comparison code passes verification, the user is a legal user; and in the case that the first OCC code converted by the second comparison code is not verified, indicating that the user is an illegal user.
In a second aspect, an embodiment of the present application provides a verification method, where the verification method includes: acquiring a second comparison code; converting the second comparison code into a first optical camera communication OCC code; and displaying the first OCC code to the monitoring equipment so that the monitoring equipment can conveniently determine whether the equipment to be verified passes the verification or not through the first OCC code.
Therefore, verification can be achieved by obtaining the first OCC code displayed by the equipment to be verified, a user does not need to record a complex password, and therefore a convenient verification process can be achieved. In addition, due to the low-cost characteristic of the optical camera communication technology, the embodiment of the application realizes verification by utilizing the characteristic of the optical camera communication technology, and can also realize a low-cost verification mode.
In a third aspect, an embodiment of the present application provides an authentication apparatus, including: the device comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a first optical camera communication OCC code displayed by equipment to be verified; the conversion module is used for converting the first OCC code into a code to be verified; the comparison module is used for comparing the code to be verified with a first comparison code which is acquired in advance to acquire a comparison result; and the determining module is used for determining whether the equipment to be verified passes the verification or not according to the comparison result.
In a possible embodiment, the obtaining module is further configured to obtain, by the monitoring device, the first OCC code displayed by the device to be verified.
In one possible embodiment, the comparison result is a similar proportion value of the to-be-verified code and the first comparison code, the similar proportion value represents a ratio of the same code bit to the total code bit in the first comparison code and the to-be-verified code, and the same code bit means that the positions in the first comparison code and the to-be-verified code are the same and the values in the first comparison code and the to-be-verified code are the same.
In a possible embodiment, the first OOC code is obtained by converting the obtained second comparison code by the device to be verified.
In a fourth aspect, an embodiment of the present application provides an authentication apparatus, including: the acquisition module is used for acquiring a second comparison code; the conversion module is used for converting the second comparison code into a first optical camera communication OCC code; and the display module is used for displaying the first OCC code to the monitoring equipment so that the monitoring equipment can conveniently determine whether the equipment to be verified passes the verification or not through the first OCC code.
In a fifth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the method according to the first aspect or any optional implementation manner of the first aspect.
In a sixth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the method according to the second aspect or any optional implementation manner of the second aspect.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
FIG. 1 is a schematic diagram illustrating an operating environment of a verification method provided by an embodiment of the present application;
FIG. 2 is a flow chart illustrating a verification method provided by an embodiment of the present application;
fig. 3 shows a specific flowchart of an authentication method provided by an embodiment of the present application;
fig. 4 is a schematic view illustrating a scenario of an access control system provided in an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating a scenario of a locker according to an embodiment of the present disclosure;
FIG. 6 is a schematic diagram illustrating a scenario of an automatic alarm system according to an embodiment of the present application;
fig. 7 is a scene schematic diagram illustrating an equipment failure alarm system based on a monitoring camera according to an embodiment of the present application;
fig. 8 is a block diagram illustrating an authentication apparatus provided in an embodiment of the present application;
fig. 9 is a block diagram illustrating an authentication apparatus provided in an embodiment of the present application;
fig. 10 shows a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
In order to provide a convenient and low-cost authentication method, embodiments of the present application provide an authentication method, apparatus, and computer-readable storage medium, which provide a new authentication manner through optical camera communication technology. The optical camera communication technology can utilize the monitoring equipment to acquire the first OCC code displayed by the equipment to be verified, so that communication can be completed. The transmission rate of the optical camera communication technology is limited by the shooting frame rate of the optical camera, and the transmission distance is short, so the optical camera communication technology can be used for short-distance small-capacity data transmission and has the advantage of low cost.
The optical communication technology (or optical camera communication technology) is to use an optical camera to shoot an optical signal that flashes at a specific frequency from a communication source (such as a mobile terminal like a mobile phone or a tablet computer), so as to complete communication, that is, to receive and process visible light data through an image sensor in the camera. In other words, the optical communication technology is an optical communication that uses an image sensor as a receiver, that is, it is characterized in that an image sensor used in a camera detects an optical signal.
The verification method provided by the embodiment of the application is that the equipment to be verified displays a first Optical Camera Communication (OCC) code by using an Optical device such as a flashing light and a screen, the monitoring equipment obtains the first OCC code displayed by the Optical device of the equipment to be verified, converts the first OCC code into the code to be verified, compares the code to be verified with a first comparison code obtained in advance, and finally determines whether the equipment to be verified passes verification according to a comparison result, so that verification can be achieved.
In addition, the use scenes of the verification mode are wide (for example, the scenes of an access control system, a locker and the like are all applicable), and the method also has the advantages of low cost and easiness in popularization.
In order to facilitate understanding of the technical solution of the present application, a device to be authenticated is taken as the mobile terminal 110 to be authenticated, and a monitoring device is taken as the optical camera 120 for description. Those skilled in the art will appreciate that the same considerations in fig. 1 apply to other devices to be authenticated and/or other monitoring devices.
Fig. 1 is a schematic diagram illustrating an operating environment 100 of an authentication method provided by an embodiment of the present application. As shown in fig. 1, both the optical camera 120 and the mobile terminal 110 to be verified can obtain the same comparison code sent by the backend server, that is, the first comparison code and the second comparison code are the same. The to-be-verified mobile terminal 110 converts the received comparison code into a first OCC code, and displays the first OCC code to the optical camera 120 through a screen of the to-be-verified mobile terminal 110. The optical camera 120 converts the acquired first OCC code into a corresponding to-be-verified code, and the optical camera 120 further compares the to-be-verified code with the received comparison code, and determines whether the band mobile terminal 110 passes verification according to the comparison result.
The first OCC code may be an optical signal flashing at a specific frequency, or may be regarded as modulated optical data sent by the mobile terminal 110 to be verified.
For example, the first OCC code may be black picture data displayed on the screen of the mobile terminal 110 to be verified (that is, at this time, the screen of the mobile terminal 110 to be verified is all displayed in black, and the remaining color picture data are similar and will not be described one by one in the following), or white picture data, where the black picture data or the white picture data is used to represent binary data, the black picture data may be used to represent 1, and the white picture data may be used to represent 0.
It should be understood that the specific frequency is not the same as the screen refresh frequency. The screen refresh rate refers to the speed at which an image is updated on the screen, i.e. the number of times an image appears on the screen per second, and the maximum value of the screen refresh rate is limited by the performance of the hardware. For example, the screen refresh rate is the rate at which the mobile terminal refreshes at which the screen refresh rate is that rate regardless of what the handset displays, whether it is a picture or a web page. However, the specific frequency refers to a baud rate (or symbol transmission efficiency) indicating the number of symbol symbols transmitted per second, in other words, the baud rate refers to the number of symbols transmitted through the channel per second, and the baud rate is also an index of the bandwidth of the transmission channel, i.e. the baud rate of the first OCC code is changed according to the surrounding environment.
To facilitate understanding of the relationship between the baud rate and the screen refresh frequency, the following description is made by way of specific examples.
For example, in the case where the screen refresh frequency is 120 hertz (Hz), 120Hz means that the refresh of the screen is 120 pictures in 1 second. And if the first OCC code is binary data and the Baud rate is 8 Baud, then 15 frames of picture output display a black frame data or a white frame data, i.e. 15 frames of picture output for outputting "1" or "0".
In addition, although the above illustrates the case where the first comparison code and the second comparison code are the same, it should be understood by those skilled in the art that the first comparison code and the second comparison code may also be different, and specifically refer to the following contents, and will not be described in detail here.
The first comparison code may be a random code sent by the backend server, or may also be data corresponding to the optical camera 120 sent by the backend server according to an identifier of the optical camera 120 (for example, a model of the optical camera 120), and the embodiment of the present application is not limited to this.
The second comparison code may be a random code sent by the background server, or may also be data corresponding to the mobile terminal 110 to be verified, which is sent by the background server according to the identifier of the mobile terminal 110 to be verified (such as the model of the mobile terminal 110 to be verified), and the embodiment of the present application is not limited to this.
It should be understood that the device to be authenticated and the monitoring device may be the same type of device or may be different types of devices. For example, the device to be authenticated may also be an LED light.
It should also be understood that the device type of the device to be verified and the device type of the monitoring device may be set according to actual requirements of the user, and the embodiment of the present application is not limited thereto.
For example, the device to be verified may also be a camera and a data processing device (e.g., an MCU (micro controller Unit) connected to a signal, where the camera and the data processing device may be an all-in-one device or may be two separate devices connected to a signal.
Fig. 2 shows a flowchart of a verification method provided in an embodiment of the present application. The verification method comprises the following specific steps:
step S210, the device to be verified acquires the second comparison code sent by the background server.
In step S210, the user may send a comparison code sending request (or a verification request) to the background server by operating the operation interface of the device to be verified, where the comparison code sending request is used to enable the background server to send the second comparison code to the device to be verified.
In order to facilitate understanding of the technical solution of the present application, the embodiments of the present application take a device to be verified as a mobile phone as an example for description.
For example, the user can obtain the geographic location (e.g., latitude and longitude coordinates) of the mobile phone through the positioning function of the mobile phone. Subsequently, under the condition that the current position of the user is acquired, the user can select the corresponding verification function through a verification service list displayed in an operation interface of the mobile phone. The verification service list may include a verification scenario (e.g., verification of an access control system and/or verification of a courier cabinet, etc.) near the current location. Subsequently, when the user selects the corresponding authentication function, the mobile phone sends an authentication request to the background server, where each authentication request may include an identification number of the mobile phone, an identification number of the selected monitoring device, and other identifications in order to distinguish the authentication requests of the mobile phones of different users in the current area. Finally, the server sends a second comparison code to the mobile phone of the user based on the received verification request.
In addition, although the manner of obtaining the second comparison code in step 210 is exemplified in a manner that the user operates the operation interface of the device to be verified, it should be understood by those skilled in the art that the second comparison code may also be sent to the device to be verified by the background server itself, and the obtaining process does not need to be manually operated, and the embodiment of the present application is not limited thereto.
For example, the background server obtains the running state information of the device to be verified, where the running state information can be used to obtain the running state of the device to be verified. When the background server determines that the running state of the device to be verified is over-saturated (for example, when the device to be verified is a computer, the running speed of the computer is slow due to more running tasks of the computer), the background server sends a second comparison code to the device to be verified, so that the device to be verified can inform a user of the running state of the device to be verified through the first OCC code displayed on a display of the device to be verified.
It should be understood that, although the manner of obtaining the second comparison code through the backend server is described in step S210, those skilled in the art should understand that the second comparison code may also be stored in the device to be verified itself, and the embodiment of the present application is not limited thereto.
Step S220, the monitoring device obtains the first comparison code sent by the background server.
In step S220, when the background server receives the verification request sent by the device to be verified, the background server may also send the first comparison code to the monitoring device in the process of sending the second comparison code to the device to be verified, where the sent first comparison code and the sent second comparison code are the same.
It should be understood that, in addition to the above-mentioned case that the first comparison code and the second comparison code are the same, the first comparison code and the second comparison code may be different, which will be described later and will not be described in detail herein.
In addition, although the manner in which the background server sends the first comparison code to the monitoring device in step 220 is exemplified, it should be understood by those skilled in the art that the first comparison code may also be pre-stored by the monitoring device, and the embodiment of the present application is not limited thereto.
In step S230, the device to be verified converts the second comparison code into the first OCC code.
In step S230, since the optical camera communication technology uses the optical device such as the display of the device to be verified as the transmission source, and the second comparison code sent by the backend server must be converted into a signal that can be received by the monitoring device, the second comparison code needs to be modulated, that is, the second comparison code is converted into the first OCC code.
In addition, since optical noise exists in the transmission process of the first OCC code, it is necessary to add check bits in the first OCC code.
For example, a start bit, a stop bit and a parity bit are set in the first OCC code, wherein the start bit indicates the start of the transmission data of the first OCC code, and the start bit is set to facilitate the monitoring device to determine the start position of the first OCC code during the cyclic exhibition of the first OCC code; the stop bit indicates the termination of the transmission data of the first OCC code, and is set to facilitate the monitoring equipment to determine the stop position of the first OCC code during the cyclic exhibition of the first OCC code; the parity bits are for the monitoring device to determine the validity of the first OCC code.
In step S240, the device to be verified displays the first OCC code to the monitoring device, so that the monitoring device can determine whether the device to be verified passes the verification through the first OCC code.
In step S240, in the case that the device to be verified is within the shooting range of the monitoring device, the first OCC code may be presented to the image sensor in the monitoring device through the screen of the device to be verified. In addition, in order to ensure that the image sensor in the monitoring device can shoot the screen of the device to be verified, the user can ensure that the image sensor in the monitoring device can shoot the screen of the device to be verified by adjusting the standing posture.
In addition, in the process of displaying the first OCC code by the device to be verified, a lot of optical noise exists in the surrounding environment, so that the problem that the detection difficulty of the first OCC code is relatively large is caused. And the detection difficulty of the first OCC code is increased due to environmental factors such as different use environments of the equipment to be verified, the number of surrounding pedestrians and the number of mobile phone screens.
Therefore, in order to reduce the difficulty of detecting the first OCC code, at least one specific area may be set in the shooting range of the image sensor of the monitoring device, so that the first OCC code is displayed in the specific area, and the difficulty of identifying the first OCC code can be reduced.
In addition, since the first comparison code and the second comparison code are valid for a preset time (for example, 10S), that is, the first comparison code and the second comparison code are time-efficient, the security is greatly improved. It should be understood that the specific time of the preset time may be set according to actual requirements, and the embodiment of the present application is not limited thereto.
In addition, the second comparison code corresponding to the first OCC code displayed by the device to be verified may be different from or the same as the first comparison code stored in the monitoring device.
For example, in the process of converting the first OCC code by the device to be verified, due to the influence of the performance of the device to be verified, when the second comparison code is converted, the second comparison code has exceeded its valid time, that is, the second comparison code is invalid at this time. Or the first comparison code acquired by the monitoring device is updated, so that the second comparison code corresponding to the first OCC code displayed by the device to be verified is different from the first comparison code stored in the monitoring device.
In addition, in a case where different colors can represent different bit values, in order to increase the verification speed, the information transmission speed may be adjusted by adjusting the color of the picture corresponding to the first OCC code, so as to adjust the verification speed, and the embodiment of the present application is not limited thereto.
For example, in the case where the black picture data can represent 1 bit and the red picture data can represent two bits, fast transmission can be achieved by adjusting the current black picture data to the red picture data.
Step S250, the monitoring device obtains the first OCC code displayed by the device to be verified.
It should be understood that the first OCC code acquired by the monitoring device and the first OCC code displayed by the device to be verified may be the same or different. For example, under the condition that the first OCC code acquired by the monitoring device has an error code, the first OCC code acquired by the monitoring device is different from the first OCC code displayed by the device to be verified.
In step 250, the image sensor of the monitoring device can acquire image data containing the device to be verified, and then the monitoring device can extract the first OCC code from the image data.
For example, when the monitoring device collects multiple frames of images including a device to be verified, the monitoring device may perform the following processing on each frame of image: since the image may contain different information of the user, the device to be verified, and the like, the monitoring device may determine a specific location in the image, where the specific location corresponds to the specific area. After the specific position in the image is determined, human body recognition, gesture recognition and object recognition (or recognition of the device to be verified) can be sequentially performed on the characteristic position to determine the data displayed by the device to be verified in each frame of image. And the monitoring equipment identifies a plurality of data from the multi-frame image and acquires a plurality of first OCC codes based on the start bit and the stop bit of the first OCC codes.
It should be understood that, for the first OCC code, in the process of cyclically displaying the first OCC code by the device to be verified, the first OCC data after the conversion of the second comparison code may be regarded as one first OCC code. Of course, the first OCC data after the second comparison code conversion may also be regarded as a plurality of first OCC codes, and the embodiment of the present application is not limited thereto.
Correspondingly, the time for circularly displaying the first OCC code by the device to be verified may also be set according to actual requirements, and the embodiment of the present application is not limited to this.
In addition, in order to ensure the transmission accuracy of the first OCC code, in the process of displaying the first OCC code by the device to be verified, the device to be verified should be prevented from moving in a large range.
Step S260, the monitoring device converts the first OCC code into a to-be-verified code.
In step S260, the monitoring device demodulates the obtained first OCC codes into a plurality of codes to be verified, respectively, where the first OCC codes are obtained by cyclically displaying the codes by the device to be verified.
It should be understood that the modulation method for converting the first comparison code into the first OCC code by the device to be verified corresponds to the demodulation algorithm for converting the first OCC code into the code to be verified by the monitoring device.
In step S270, the monitoring device compares the code to be verified with a first comparison code obtained in advance, and obtains a comparison result.
It should be understood that the pre-obtained first comparison code may also be a first comparison code that is sent by the backend server simultaneously during the process of sending the second comparison code to the device to be verified, or may also be a first comparison code that is sent by the backend server to the monitoring device earlier, and the embodiment of the present application is not limited to this.
In step S270, the monitoring device may compare the plurality of codes to be verified with the first comparison code, so as to determine a plurality of comparison results, where the comparison results are similar proportion values of the codes to be verified and the first comparison code, the similar proportion values represent ratios of the same code bits in the first comparison code and the codes to be verified to the total code bits, and the same code bits refer to the same positions and the same values in the first comparison code and the codes to be verified.
For example, in order to simply describe the comparison result, the following description is made with the to-be-verified code and the first comparison code respectively including 4 bits. In the case where the first comparison code is "0100" and the code to be verified is "0001", since the 1 st bit and the 3 rd bit of the first comparison code are the same as the 1 st bit and the 3 rd bit of the code to be verified, the similarity ratio value of the first comparison code to the code to be verified is 2/4.
In step S280, the monitoring device determines whether the device to be verified passes the verification according to the comparison result.
In step S280, because the device to be verified moves and the transmission of the first OCC code is unreliable, and the first OCC code received by the monitoring device is prone to have an error code caused by an nonresistance factor, it is necessary to obtain the accuracy (or similar ratio) of the first OCC data received multiple times and remove a plurality of data with too low accuracy, and average the accuracy of the remaining data, specifically:
here, when obtaining a plurality of similarity ratio values of a plurality of codes to be verified, the average value of the remaining similarity ratio values may be obtained by removing too low data in the plurality of similarity ratio values. And when the average value is greater than or equal to a preset accuracy threshold (or a preset similarity ratio threshold), determining that the device to be verified passes verification, whereas when the average value is less than the preset accuracy threshold, determining that the device to be verified does not pass verification.
It should be understood that the preset accuracy threshold may be set according to actual requirements, and the embodiment of the present application is not limited thereto.
In addition, when the device to be verified does not pass verification, re-verification is required, and the re-verification process may be set according to actual requirements, which is not limited in the embodiments of the present application.
For example, the re-authentication process is to re-execute step S210 to step S280. For another example, the re-verification process is to re-execute step S230 to step S280.
In addition, the monitoring device can also realize the monitoring function on the basis that the monitoring device has the verification function, so that the verification device of the embodiment of the application can be obtained by improving the existing device (for example, the camera device for monitoring).
In summary, the embodiment of the present application provides a new verification method through an optical camera communication technology, that is, a first OCC code displayed by a device to be verified is obtained, the first OCC code is converted into a code to be verified, the code to be verified is compared with a first comparison code obtained in advance, and finally, whether the device to be verified passes verification is determined according to a comparison result, so that the new verification method can conveniently achieve verification, and can reduce verification cost by using the advantage of low cost of the optical camera communication technology.
That is to say, this application embodiment just can realize verifying through obtaining the first OCC code of the show of waiting to verify equipment, need not the user to record complicated password to can realize convenient verification process. In addition, due to the low-cost characteristic of the optical camera communication technology, the embodiment of the application realizes verification by utilizing the characteristic of the optical camera communication technology, and can also realize a low-cost verification mode.
In order to facilitate understanding of the technical solutions of the present application, the following detailed descriptions are provided by specific examples.
Fig. 3 shows a specific flowchart of an authentication method provided in an embodiment of the present application, where the authentication method may use a screen of a mobile terminal as a signal source for transmitting a specific signal, and a high definition camera receives the signal, so as to achieve a user authentication purpose. The verification method comprises the following steps:
step S310, the mobile device and the micro control unit controlling the high-definition camera simultaneously receive the same comparison codes sent by the background server, wherein each comparison code has a corresponding OCC code, algorithms for converting the comparison codes into the OCC codes are stored in the micro control unit and the mobile device, and check bits are further arranged in the OCC codes.
In the embodiment of the application, data displayed on a screen of the mobile device can be set as an OCC code, and data stored in the background server can be set as a comparison code, wherein the OCC code and the comparison code can be converted with each other through an algorithm in the mobile device and a micro control unit connected with the high definition camera.
Step S320, the user stands in a specific area within the shooting range of the high-definition camera, and the user circularly plays the first OCC code converted by the mobile equipment through a screen of the mobile equipment so as to display the first OCC code to the high-definition camera.
And step S330, detecting that a user exists in the specific area through image processing by the high-definition camera, and sequentially carrying out human body recognition, gesture recognition and object recognition on the specific area so as to recognize the position of the mobile terminal and the screen thereof.
Step S340, the high definition camera and the micro control unit are combined to recognize the first OCC code displayed by the mobile device for many times, and the micro control unit converts the first OCC code into a corresponding to-be-verified code.
And step S350, combining the comparison code sent by the background server, calculating the accuracy of the code to be verified for multiple times by the micro control unit, removing a plurality of lowest values from the accuracy, calculating the average value of the remaining accuracy, and determining whether the verification passes or not by using the average value.
Wherein determining whether the verification passes using the average comprises: and when the average value is greater than or equal to the preset accuracy threshold value, determining that the mobile equipment passes the verification, and when the average value is less than the preset accuracy threshold value, determining that the mobile equipment does not pass the verification.
Fig. 4 shows a scene schematic diagram of an access control system provided in an embodiment of the present application. The use method of the access control system comprises the following steps:
when a user needs to enter the access control, the user operates the mobile phone to inform the background server to respectively send the same comparison codes to the micro control unit 420 and the mobile phone of the user;
the mobile phone of the user converts the comparison code sent by the background server into a corresponding first OCC code, stands in the specific area 430, and circularly displays the first OCC code to the high-definition camera 410 through a mobile phone screen;
the high-definition camera 410 sequentially performs human body recognition, posture recognition and object recognition on the specific area 430 to recognize the mobile phone and the screen thereof;
the micro control unit 420 converts the first OCC code received for multiple times into multiple codes to be verified, and determines an average accuracy of the multiple codes to be verified. When the average accuracy is greater than or equal to (or higher than) the preset accuracy threshold, the gate 430 is opened, and if the average accuracy is less than or equal to the preset accuracy threshold, the detection is performed again.
Fig. 5 shows a scene schematic diagram of a locker provided by an embodiment of the present application. The use method of the storage cabinet comprises the following steps:
when storing/fetching the objects, the background server respectively sends the same comparison codes to the mobile phone of the user and the micro control unit 520;
the mobile phone of the user converts the comparison code sent by the background server into a corresponding first OCC code, and displays the OCC code to the high-definition camera 510 in the specific area 540;
the high-definition camera 510 sequentially performs human body recognition, posture recognition and object recognition on the specific area 540 to recognize the mobile phone of the user and the screen thereof;
the micro control unit 520 converts the first OCC data received multiple times into multiple codes to be verified, and determines an average accuracy of the multiple codes to be verified. When the average accuracy is greater than or equal to the preset accuracy threshold, the cabinet door 530 is opened, and if the average accuracy is less than the preset accuracy threshold, the detection is performed again.
Fig. 6 is a schematic view illustrating a scenario of an automatic alarm system according to an embodiment of the present application, where the automatic alarm system can detect multiple users simultaneously. The use method of the automatic alarm system comprises the following steps:
when an alarm occurs (such as finding a tracked object), a user displays a specific first OCC code to the high definition camera 610 in the specific area 640, and circularly plays the first OCC code;
the high-definition camera 610 continuously performs human body recognition, posture recognition and object recognition on the specific area 640 to recognize the mobile phone 630;
when the micro control unit 620 detects the first OCC code, the demodulation is performed, the signal is received for multiple times, the multiple first OCC codes are converted into multiple codes to be verified, and the average accuracy of the multiple codes to be verified is determined. And when the average accuracy is greater than or equal to a preset accuracy threshold, alarming, and if the average accuracy is less than or equal to the preset accuracy threshold, re-detecting.
In addition, the automatic alarm system can be realized by software, can be realized by software when a common monitoring camera monitors video files after recording and displays the video files in a monitoring room, but has certain requirements on the frame rate of the monitoring camera, and the using method comprises the following steps:
step A: and judging that the frame rate of the video is used for synchronizing information.
And B: and continuously carrying out human body recognition, posture recognition and object recognition on the interior of the video respectively to recognize the mobile phone.
And C: and when the first OCC code is detected, demodulating, receiving the signal for multiple times, converting the plurality of first OCC codes into a plurality of codes to be verified, and determining the average accuracy of the plurality of codes to be verified. And when the average accuracy is greater than or equal to a preset accuracy threshold, alarming, and if the average accuracy is less than or equal to the preset accuracy threshold, re-detecting.
Fig. 7 shows a scene schematic diagram of an equipment failure alarm system based on a monitoring camera according to an embodiment of the present application, where the equipment failure alarm system includes: a screen 740 connected to the first device under test 730, a screen 760 connected to the second device under test 750 and a high definition surveillance camera 710 incorporating a micro control unit 720. The screen 740 or 760 may be self-contained or may be additional to the first device under test 730 or the second device under test 750. When the first device under test 730 or the second device under test 750 fails, the screen 740 or the screen 760 emits a specific first OCC code, and the monitoring camera 710 notifies a worker immediately after detecting the signal. Where screen 740 or screen 760 may employ hardware connections to specific failure prone locations. The use method of the equipment fault alarm system comprises the following steps:
when the first device under test 730 or the second device under test 750 may be malfunctioning, the screen 740 or the screen 760 may continuously display the first OCC code;
the monitoring camera 710 and the mcu 720 can perform object detection to detect the first device under test 730 or the second device under test 750 and the screen 740 or the screen 760, and monitor the first device under test 730 or the second device under test 750 in real time;
when the device screen displays the first OCC code (or sends the first OCC signal), the monitoring camera 710 acquires and demodulates the first OCC code, receives the signal for multiple times, converts the multiple first OCC codes into multiple codes to be verified, and determines the average accuracy of the multiple codes to be verified. And when the average accuracy is greater than or equal to a preset accuracy threshold, alarming, and if the average accuracy is less than or equal to the preset accuracy threshold, re-detecting.
It should be understood that the above verification method is only exemplary, and various modifications can be made by those skilled in the art according to the above method, and the corresponding modifications or variations are also within the scope of the present application.
Referring to fig. 8, fig. 8 shows a block diagram of an authentication apparatus 800 provided in an embodiment of the present application, it should be understood that the authentication apparatus 800 corresponds to the above-mentioned method embodiment on the monitoring device side in fig. 2, and can perform various steps related to the method embodiment on the monitoring device side in fig. 2, and specific functions of the authentication apparatus 800 may be referred to the above description, and detailed descriptions are appropriately omitted here to avoid repetition. The authentication apparatus 800 includes at least one software function module that can be stored in a memory in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the authentication apparatus 800. Specifically, the authentication apparatus 800 includes:
the obtaining module 810 is configured to obtain a first optical camera communication OCC code displayed by a device to be verified;
a converting module 820, configured to convert the first OCC code into a code to be verified;
the comparison module 830 is configured to compare the code to be verified with a first comparison code obtained in advance, and obtain a comparison result;
the determining module 840 is configured to determine whether the device to be verified passes the verification according to the comparison result.
In a possible embodiment, the obtaining module 810 is further configured to obtain, by the monitoring device, the first OCC code displayed by the device to be verified.
In one possible embodiment, the comparison result is a similar proportion value of the to-be-verified code and the first comparison code, the similar proportion value represents a ratio of the same code bit to the total code bit in the first comparison code and the to-be-verified code, and the same code bit means that the positions in the first comparison code and the to-be-verified code are the same and the values in the first comparison code and the to-be-verified code are the same.
In a possible embodiment, the first OOC code is obtained by converting the obtained second comparison code by the device to be verified.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method, and will not be described in too much detail herein.
Referring to fig. 9, fig. 9 shows a block diagram of an authentication apparatus 900 provided in an embodiment of the present application, it should be understood that the authentication apparatus 900 corresponds to the above method embodiment on the device to be authenticated in fig. 2, and can perform various steps related to the method embodiment on the device to be authenticated in fig. 2, and specific functions of the authentication apparatus 900 may be referred to the above description, and a detailed description is appropriately omitted here to avoid redundancy. The authentication apparatus 900 includes at least one software function module that can be stored in a memory in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the authentication apparatus 900. Specifically, the verification apparatus 900 includes:
an obtaining module 910, configured to obtain a second comparison code;
a conversion module 920, configured to convert the second comparison code into a first optical camera communication OCC code;
the presenting module 930 is configured to present the first OCC code to the monitoring device, so that the monitoring device determines whether the device to be verified passes the verification through the first OCC code.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method, and will not be described in too much detail herein.
The present application also provides an electronic device, which can be disposed on a device side to be verified or a monitoring device side, so that the electronic device can execute the method on the device side to be verified in fig. 2 or 3 in the case that the electronic device is disposed on the device side to be verified, or can execute the method on the monitoring device side in fig. 2 or 3 in the case that the electronic device is disposed on the monitoring device side.
Fig. 10 shows a block diagram of an electronic device 1000 according to an embodiment of the present application, as shown in fig. 10. The electronic device 1000 may include a processor 1010, a communication interface 1020, a memory 1030, and at least one communication bus 1040. Wherein the communication bus 1040 is used for realizing direct connection communication of these components. In this embodiment, the communication interface 1020 of the device in this application is used for performing signaling or data communication with other node devices. Processor 1010 may be an integrated circuit chip having signal processing capabilities. The Processor 1010 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor 1010 may be any conventional processor or the like.
The Memory 1030 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 1030 stores computer readable instructions, and when the computer readable instructions are executed by the processor 1010, the electronic device 1000 may perform the steps involved in the device side to be verified or the steps involved in the monitoring device side in the above-described method embodiments in fig. 2 or fig. 3.
The electronic device 1000 may further include a memory controller, an input-output unit, an audio unit, a display unit 8.
The memory 1030, the memory controller, the processor 1010, the peripheral interface, the input/output unit, the audio unit, and the display unit are electrically connected to each other directly or indirectly, so as to implement data transmission or interaction. For example, these elements may be electrically connected to each other via one or more communication buses 1040. The processor 1010 is configured to execute executable modules stored in the memory 1030.
The input and output unit is used for providing input data for a user to realize the interaction of the user and the server (or the local terminal). The input/output unit may be, but is not limited to, a mouse, a keyboard, and the like.
The audio unit provides an audio interface to the user, which may include one or more microphones, one or more speakers, and audio circuitry.
The display unit provides an interactive interface (e.g. a user interface) between the electronic device and a user or for displaying image data to a user reference. In this embodiment, the display unit may be a liquid crystal display or a touch display. In the case of a touch display, the display can be a capacitive touch screen or a resistive touch screen, which supports single-point and multi-point touch operations. The support of single-point and multi-point touch operations means that the touch display can sense touch operations simultaneously generated from one or more positions on the touch display, and the sensed touch operations are sent to the processor for calculation and processing. The display unit may display the verification result of the processor 1010 on the side of the device to be verified in fig. 2 or 3, or may display the verification result on the side of the monitoring device.
The input and output unit is used for providing input data for a user to realize the interaction between the user and the processing terminal. The input/output unit may be, but is not limited to, a mouse, a keyboard, and the like.
It is to be understood that the configuration shown in fig. 10 is merely exemplary, and that the electronic device 1000 may include more or fewer components than shown in fig. 10, or have a different configuration than shown in fig. 10. The components shown in fig. 10 may be implemented in hardware, software, or a combination thereof.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method of the monitoring device side in the method embodiments.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method on the device side to be verified in the method embodiments.
The present application also provides a computer program product which, when run on a computer, causes the computer to perform the method of the method embodiments.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method of authentication, comprising:
acquiring a first optical camera communication OCC code cyclically displayed by equipment to be verified, wherein the information transmission speed corresponding to the first OCC code is adjusted by adjusting the color of a picture corresponding to the first OCC code, and the first OCC code is provided with a start bit, a stop bit and a parity bit for determining the validity of the first OCC code;
converting the first OCC code into a code to be verified;
comparing the code to be verified with a first comparison code obtained in advance to obtain a comparison result;
determining whether the equipment to be verified passes verification or not according to the comparison result;
the comparison result is a similar proportion value of the code to be verified and the first comparison code, the similar proportion value represents a ratio of the same code bit in the first comparison code and the code to be verified to a total code bit, and the same code bit refers to the same position and the same value in the first comparison code and the code to be verified;
wherein, the determining whether the device to be verified passes the verification according to the comparison result comprises:
under the condition that a plurality of similar proportion values of a plurality of codes to be verified are obtained, removing too low data in the plurality of similar proportion values, solving an average value of the rest similar proportion values, and under the condition that the average value is larger than or equal to a preset similar proportion value, determining that the equipment to be verified passes verification, or under the condition that the average value is smaller than the preset similar proportion value, determining that the equipment to be verified does not pass verification.
2. The verification method according to claim 1, wherein the obtaining the first optical camera communication OCC code cyclically displayed by the device to be verified comprises:
and acquiring the first OCC code circularly displayed by the equipment to be verified through monitoring equipment.
3. The verification method according to any one of claims 1 to 2, wherein the first OOC code is obtained by converting the obtained second comparison code by the device to be verified.
4. A method of authentication, comprising:
acquiring a second comparison code;
converting the second comparison code into a first optical camera communication OCC code, wherein the first OCC code is provided with a start bit, a stop bit and a parity bit for determining validity of the first OCC code;
circularly displaying the first OCC code to monitoring equipment so that the monitoring equipment can convert the first OCC code into a code to be verified, comparing the code to be verified with a first comparison code obtained in advance to obtain a comparison result, determining whether the equipment to be verified passes verification or not according to the comparison result of the first OCC code, removing too low data in a plurality of similar proportion values under the condition that the monitoring equipment obtains the plurality of similar proportion values of the plurality of codes to be verified, obtaining an average value of the rest similar proportion values, determining that the equipment to be verified passes verification under the condition that the average value is greater than or equal to a preset similar proportion value, or determining that the equipment to be verified does not pass verification under the condition that the average value is smaller than the preset similar proportion value;
the authentication method further comprises:
adjusting the information transmission speed by adjusting the color of the picture corresponding to the first OCC code;
the comparison result is a similar proportion value of the code to be verified and the first comparison code, the similar proportion value represents a ratio of the same code bit in the first comparison code and the code to be verified to a total code bit, and the same code bit is the same in position and value in the first comparison code and the code to be verified.
5. An authentication apparatus, comprising:
the device comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a first optical camera communication OCC code circularly displayed by equipment to be verified, the color of a picture corresponding to the first OCC code is adjusted, and the first OCC code is provided with a start bit, a stop bit and a parity bit for determining the validity of the first OCC code;
the conversion module is used for converting the first OCC code into a code to be verified;
the comparison module is used for comparing the code to be verified with a first comparison code which is acquired in advance to acquire a comparison result;
the determining module is used for determining whether the equipment to be verified passes the verification or not according to the comparison result;
the comparison result is a similar proportion value of the code to be verified and the first comparison code, the similar proportion value represents a ratio of the same code bit in the first comparison code and the code to be verified to a total code bit, and the same code bit refers to the same position and the same value in the first comparison code and the code to be verified;
the determining module is specifically configured to: under the condition that a plurality of similar proportion values of a plurality of codes to be verified are obtained, removing too low data in the plurality of similar proportion values, solving an average value of the rest similar proportion values, and under the condition that the average value is larger than or equal to a preset similar proportion value, determining that the equipment to be verified passes verification, or under the condition that the average value is smaller than the preset similar proportion value, determining that the equipment to be verified does not pass verification.
6. The apparatus according to claim 5, wherein the obtaining module is further configured to obtain, by a monitoring device, the first OCC code cyclically displayed by the device to be verified.
7. The apparatus according to any one of claims 5 to 6, wherein the first OOC code is obtained by converting, by the device to be verified, the obtained second comparison code.
8. An authentication apparatus, comprising:
the acquisition module is used for acquiring a second comparison code;
the conversion module is used for converting the second comparison code into a first optical camera communication OCC code, wherein the first OCC code is provided with a start bit, a stop bit and a parity bit for determining the validity of the first OCC code;
the display module is used for displaying the first OCC code to monitoring equipment in a circulating manner so that the monitoring equipment can convert the first OCC code into a code to be verified, the code to be verified is compared with a first comparison code which is obtained in advance, a comparison result is obtained, whether the equipment to be verified passes verification is determined according to the comparison result of the first OCC code, and the monitoring equipment removes too low data in a plurality of similar proportion values under the condition that the monitoring equipment obtains the plurality of similar proportion values of the plurality of codes to be verified, obtains the average value of the rest similar proportion values, determines that the equipment to be verified passes verification under the condition that the average value is larger than or equal to a preset similar proportion value, or determines that the equipment to be verified fails verification under the condition that the average value is smaller than the preset similar proportion value;
the authentication apparatus further comprises:
the adjusting module is used for adjusting the information transmission speed by adjusting the color of the picture corresponding to the first OCC code;
the comparison result is a similar proportion value of the code to be verified and the first comparison code, the similar proportion value represents a ratio of the same code bit in the first comparison code and the code to be verified to a total code bit, and the same code bit is the same in position and value in the first comparison code and the code to be verified.
9. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, performs the steps of the authentication method according to one of claims 1 to 3.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the authentication method according to claim 4.
CN201910663571.6A 2019-07-19 2019-07-19 Verification method, verification device and computer-readable storage medium Active CN110381064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910663571.6A CN110381064B (en) 2019-07-19 2019-07-19 Verification method, verification device and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910663571.6A CN110381064B (en) 2019-07-19 2019-07-19 Verification method, verification device and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN110381064A CN110381064A (en) 2019-10-25
CN110381064B true CN110381064B (en) 2021-05-14

Family

ID=68254968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910663571.6A Active CN110381064B (en) 2019-07-19 2019-07-19 Verification method, verification device and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN110381064B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825871A (en) * 2013-07-31 2014-05-28 深圳光启创新技术有限公司 Authentication system and emission terminal, reception terminal and authority authentication method thereof
CN106296896A (en) * 2016-07-29 2017-01-04 暨南大学 A kind of gate control system based on LED visible light communication
CN109558762A (en) * 2018-11-15 2019-04-02 无锡火眼睛睛科技发展有限公司 A kind of anti-fake retrospective device of portable electronic based on bar code
WO2019120050A1 (en) * 2017-12-19 2019-06-27 北京外号信息技术有限公司 Optical communication apparatus and corresponding anti-counterfeiting method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
KR102056064B1 (en) * 2017-10-27 2019-12-16 (주)유양디앤유 Optical camera communication device and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825871A (en) * 2013-07-31 2014-05-28 深圳光启创新技术有限公司 Authentication system and emission terminal, reception terminal and authority authentication method thereof
CN106296896A (en) * 2016-07-29 2017-01-04 暨南大学 A kind of gate control system based on LED visible light communication
WO2019120050A1 (en) * 2017-12-19 2019-06-27 北京外号信息技术有限公司 Optical communication apparatus and corresponding anti-counterfeiting method and system
CN109558762A (en) * 2018-11-15 2019-04-02 无锡火眼睛睛科技发展有限公司 A kind of anti-fake retrospective device of portable electronic based on bar code

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Current Status and Performance Analysis of Optical Camera Communication Technologies for 5G Networks;TRANG NGUYEN等;《IEEE Access》;20170320;第5卷;第4574-4592页 *
基于RGB型LED的光学相机通信系统的实现方法;张龙 等;《光通信技术》;20190531;第43卷(第5期);第26-27页摘要、第0-1节 *

Also Published As

Publication number Publication date
CN110381064A (en) 2019-10-25

Similar Documents

Publication Publication Date Title
RU2643473C2 (en) Method and tools for fingerprinting identification
US20160028741A1 (en) Methods and devices for verification using verification code
US11445026B2 (en) Methods, systems, and media for indicating a security status of an internet of things device
US10043079B2 (en) Method and apparatus for providing multi-video summary
WO2017092360A1 (en) Interaction method and device used when multimedia is playing
US9817235B2 (en) Method and apparatus for prompting based on smart glasses
US9807300B2 (en) Display apparatus for generating a background image and control method thereof
RU2655971C2 (en) Method, device for implementation of terminal device access to wireless network
US11159260B2 (en) Method, device, system, and storage medium for live broadcast detection and data processing
US10157227B2 (en) Apparatus and method for generating a summary image by image processing
WO2018107997A1 (en) Method and device for converting video playing mode, and mobile terminal
US10755320B2 (en) Advertisement audience dynamical detection circuit, computer program product, and related method for estimating quantity of out-of-home (OOH) advertisement audiences passing through specific location in specific time period
US20150009333A1 (en) Security device and display method thereof
CN110334629B (en) Method and device capable of detecting distance in multiple directions and readable storage medium
CN109840406B (en) Living body verification method and device and computer equipment
US20160117553A1 (en) Method, device and system for realizing visual identification
US8272738B2 (en) Apparatus and method for recognizing a person's gaze
CN110381064B (en) Verification method, verification device and computer-readable storage medium
CN112351271A (en) Camera shielding detection method and device, storage medium and electronic equipment
US10880735B2 (en) Method for detecting the possible taking of screenshots
US10728498B2 (en) Communication device, server and communication method thereof
EP3261057A1 (en) Head mounted display and transmission control method
US20150106738A1 (en) System and method for processing image or audio data
Jo et al. Disco: Displays that communicate
KR102009924B1 (en) System for monitoring image and operating method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant