CN110853198A - Object recognition apparatus, data processing method, electronic device, and storage medium - Google Patents

Object recognition apparatus, data processing method, electronic device, and storage medium Download PDF

Info

Publication number
CN110853198A
CN110853198A CN201911191648.0A CN201911191648A CN110853198A CN 110853198 A CN110853198 A CN 110853198A CN 201911191648 A CN201911191648 A CN 201911191648A CN 110853198 A CN110853198 A CN 110853198A
Authority
CN
China
Prior art keywords
identification
main control
control unit
communication
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911191648.0A
Other languages
Chinese (zh)
Other versions
CN110853198B (en
Inventor
谢洪彪
舒荣涛
闫勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sensetime Technology Development Co Ltd
Original Assignee
Beijing Sensetime Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sensetime Technology Development Co Ltd filed Critical Beijing Sensetime Technology Development Co Ltd
Priority to CN201911191648.0A priority Critical patent/CN110853198B/en
Publication of CN110853198A publication Critical patent/CN110853198A/en
Application granted granted Critical
Publication of CN110853198B publication Critical patent/CN110853198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/005Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a random code

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The present disclosure relates to a target recognition apparatus, a data processing method, an electronic device, and a storage medium, wherein the target recognition apparatus includes a recognition unit and a main control unit, the recognition unit is configured to recognize a collected image to obtain a recognition result of the image; the main control unit is connected to the identification unit and used for controlling the unlocking of the locking unit under the condition that the identification result meets the unlocking condition, wherein the identification unit is configured to: under the condition of power-on starting, sending a first instruction to the main control unit, wherein the first instruction is used for triggering the main control unit to send a random number sequence to the identification unit; under the condition of receiving a random number sequence sent by a main control unit, generating a first communication password according to the random number sequence; and carrying out encrypted communication with the main control unit through the first communication password. The embodiment of the disclosure can improve the communication security between the identification component and the main control component and reduce the risk of communication theft and forgery attack.

Description

Object recognition apparatus, data processing method, electronic device, and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a target recognition apparatus, a data processing method, an electronic device, and a storage medium.
Background
Along with the development of science and technology, intelligent lock has brought very big facility for people's life, for example: the intelligent door lock can authenticate the identity of a user through face recognition, and is unlocked after the identity authentication of the user is passed, so that the user does not need to carry a key.
In the related technology, the intelligent door lock comprises an identification component and a main control component, wherein the identification component is responsible for collecting images, user identity authentication is carried out through the collected images, and the intelligent door lock is communicated with the main control component through communication links such as a Uart serial port and an SPI after the authentication is passed, so that the main control component can respond to an identity authentication result to control the lock cylinder to unlock and open the door.
But because the communication link is simple, there is a risk that the communication between the identification component and the master control component is stolen and falsified.
Disclosure of Invention
The technical scheme is used for improving the communication safety between the identification component and the main control component and reducing the risks of communication stealing and forging attacks.
According to one aspect of the present disclosure, a target recognition apparatus is provided, the apparatus includes a recognition component and a main control component, the recognition component is configured to recognize a collected image, and obtain a recognition result of the image; the main control unit is connected to the identification unit and used for controlling the unlocking of the locking unit under the condition that the identification result meets the unlocking condition,
wherein the identification component is configured to:
under the condition of power-on starting, sending a first instruction to the main control unit, wherein the first instruction is used for triggering the main control unit to send a random number sequence to the identification unit;
under the condition of receiving a random number sequence sent by the main control unit, generating a first communication password according to the random number sequence;
and carrying out encryption communication with the main control unit through the first communication password.
In a possible implementation manner, the performing, by the identification unit, encrypted communication with the main control unit through the first communication password includes:
encrypting the instruction data sent to the main control unit by adopting the first communication password; and/or the presence of a gas in the gas,
and decrypting the received instruction data from the main control unit by using the first communication password.
In one possible implementation, the master control unit is configured to:
when a first instruction sent by an identification component is received, sending a random number sequence to the identification component, and generating a second communication password according to the random number sequence;
and carrying out encrypted communication with the identification component through the second communication password.
In a possible implementation manner, the performing, by the master control unit, encrypted communication with the identification unit through the second communication password includes:
encrypting the instruction data sent to the identification component by using the second communication password; and/or the presence of a gas in the gas,
and decrypting the received instruction data from the identification part by using the second communication password.
In a possible implementation manner, the performing, by the identification unit, encrypted communication with the main control unit through the first communication password includes:
encrypting the identification information of the identification component by using the first communication password to obtain first identification information;
and sending the first identification information to the main control unit.
In a possible implementation manner, the performing, by the master control unit, encrypted communication with the identification unit through the second communication password includes:
receiving the first identification information;
decrypting the first identification information by using the second communication password;
when the decryption is successful, authenticating the identification component according to the identification information of the identification component obtained by the decryption processing;
and when the authentication is successful, the second communication password is adopted to encrypt the identity authentication command to obtain a second command, and the second command is sent to the identification component.
In a possible implementation manner, the authenticating, by the main control unit, the identification unit according to the identification information of the identification unit obtained through decryption processing includes:
and when the identification information of the identification component is consistent with the preset identification information locally stored in the main control component, determining that the authentication of the identification component is successful, otherwise, determining that the authentication of the identification component is failed.
In a possible implementation manner, the performing, by the master control unit, encrypted communication with the identification unit through the second communication password further includes:
upon a decryption failure, communication with the identification component is disconnected.
In a possible implementation manner, the performing, by the identification unit, encrypted communication with the main control unit through the first communication password further includes:
receiving a second instruction from the master control unit;
and decrypting the second instruction by using the first communication password to obtain the identity authentication instruction, and performing identity authentication on the target object in response to the identity authentication instruction.
In one possible implementation manner, the identifying component, in response to the identity authentication instruction, performs identity authentication on the target object, including:
acquiring image information of the target object;
performing identity authentication on the target object according to the image information to obtain an identity authentication result;
the identification unit performs encrypted communication with the main control unit through the first communication password, and further includes:
encrypting the identity authentication result by using the first communication password to obtain a first authentication result;
and sending the first authentication result to the main control unit.
In a possible implementation manner, the performing, by the master control unit, encrypted communication with the identification unit through the second communication password further includes:
receiving a first authentication result sent by the identification component;
decrypting the first authentication result by adopting the second communication password to obtain the identity authentication result;
the master control unit further configured to:
and controlling the locking component to unlock according to the identity authentication result.
In one possible implementation, the master control unit is further configured to:
upon detection of the target object, power is supplied to the identification component.
In a possible implementation manner, the recognizing component recognizes the acquired image to obtain a recognition result of the image, and includes:
performing living body detection on the acquired image to obtain a living body detection result;
under the condition that the living body detection result is a living body, carrying out feature extraction processing on a target object in the image to obtain the face feature of the target object;
and identifying the target object according to the face characteristics of the target object to obtain the identification result.
In a possible implementation manner, the recognizing the target object according to the facial feature of the target object to obtain the recognition result includes:
determining the similarity between the face features of the target object and the face features of the prestored images;
and determining an identification result according to the similarity.
In a possible implementation manner, the controlling, by the master control unit, the unlocking of the locking unit when the recognition result satisfies an unlocking condition includes:
and sending an unlocking instruction to the locking component under the condition that the identification result meets an unlocking condition, wherein the unlocking instruction is used for controlling the locking component to execute unlocking operation.
According to an aspect of the present disclosure, there is provided a data processing method applied to an identification component of an object identification device, where the object identification device further includes a main control component connected to the identification component, the method including:
under the condition of power-on starting, sending a first instruction to the main control unit, wherein the first instruction is used for triggering the main control unit to send a random number sequence to the identification unit;
receiving the random number sequence sent by the main control unit;
generating a first communication password according to the random number sequence;
carrying out encrypted communication with the main control unit through the first communication password;
the identification component is used for identifying the acquired image to obtain an identification result of the image;
the main control unit is connected to the identification unit and used for controlling the locking unit to unlock under the condition that the identification result meets the unlocking condition.
According to an aspect of the present disclosure, there is provided a data processing method applied to a main control unit of a target recognition apparatus, the target recognition apparatus further including a recognition unit connected to the main control unit, the method including:
receiving a first instruction sent by an identification component;
in response to the first instruction, sending a sequence of random numbers to the identification component;
generating a second communication password according to the random number sequence;
carrying out encrypted communication with the identification component through the second communication password;
the identification component is used for identifying the acquired image to obtain an identification result of the image;
the main control unit is connected to the identification unit and used for controlling the locking unit to unlock under the condition that the identification result meets the unlocking condition.
According to an aspect of the present disclosure, there is provided an electronic device including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
According to an aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described method.
According to the object recognition device, the data processing method, the electronic device and the storage medium provided by the present disclosure, the recognition unit in the object recognition device may send a first instruction to the main control unit after powering on, so that the main control unit sends the random number sequence to the recognition unit according to the first instruction. The identification component can generate a first communication password according to the random number sequence, and encrypted communication is carried out between the first communication password and the main control component, so that the communication safety between the identification component and the main control component can be improved, and the risks of communication theft and forgery attack are reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure. Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
FIG. 1 illustrates a block diagram of a target recognition device in accordance with an embodiment of the present disclosure;
FIG. 2 shows an interaction diagram according to an embodiment of the present disclosure;
FIG. 3 shows a flow diagram of a data processing method according to an embodiment of the present disclosure;
fig. 4 shows a flow chart of a data processing method according to an embodiment of the present disclosure.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
Fig. 1 shows a block diagram of an object recognition apparatus according to an embodiment of the present disclosure, as shown in fig. 1, the object recognition apparatus including: the system comprises an identification component 101 and a main control component 102, wherein the identification component 101 is used for identifying an acquired image to obtain an identification result of the image;
the main control unit 102 is connected to the identification unit 101, and is configured to control the locking unit to unlock if the identification result satisfies an unlocking condition,
wherein the identifying component 101 is configured to:
under the condition of power-on starting, sending a first instruction to the main control unit 102, where the first instruction is used to trigger the main control unit 102 to send a random number sequence to the identification unit 101;
and under the condition of receiving the random number sequence sent by the main control unit 102, generating a first communication password according to the random number sequence.
And performing encrypted communication with the main control unit 102 through the first communication password.
For example, the identification component may be a component that performs identity authentication through a face image or a fingerprint data image, and the main control component 102 and the identification component 101 may be connected through a Uart serial port, an SPI, and other communication links.
In a possible implementation manner, the recognizing unit 101 recognizes the acquired image to obtain a recognition result of the image, and may include:
performing living body detection on the acquired image to obtain a living body detection result;
under the condition that the living body detection result is a living body, carrying out feature extraction processing on a target object in the image to obtain the face feature of the target object;
and identifying the target object according to the face characteristics of the target object to obtain the identification result.
For example, the living body detection may be performed on the region where the face of the person in the acquired image is located, for example, the face of the person in the image may be verified as a real face, rather than being acquired through a photo, a mask, a screen shot, or the like. In an example, the living body detection can be performed on a target image through a neural network and the like, multi-scene multi-form counterfeit fraud such as high-definition photos, processed images, three-dimensional models, stereo dummy, face changing and the like can be distinguished, and the living body detection is performed in a state that a target object is not sensed. If the living body detection result is a non-living body, further identification processing may be stopped.
In the case that the living body detection result is a living body, feature extraction may be performed through a neural network, or feature extraction may be performed according to a pixel value or the like to obtain a face feature, and the target object is identified according to the face feature of the target object to obtain the identification result.
In a possible implementation manner, the performing recognition processing on the target object according to the facial feature of the target object to obtain the recognition result may include:
determining the similarity between the face features of the target object and the face features of the prestored images;
and determining an identification result according to the similarity.
The identification part 101 locally stores a pre-stored image corresponding to a user with an unlocking authority, can determine the similarity between the human face feature of the target object and the human face feature in the predicted image, and confirms that the identification result is that the target object passes the authentication if the similarity is greater than a similarity threshold, and confirms that the identification result is that the target object fails the authentication if the similarity is less than the similarity threshold.
In a possible implementation manner, the controlling, by the main control unit, the unlocking of the locking unit when the identification result satisfies the unlocking condition may include:
and sending an unlocking instruction to the locking component under the condition that the identification result meets an unlocking condition, wherein the unlocking instruction is used for controlling the locking component to execute unlocking operation.
When the identification result is that the target object passes the authentication, and the identification result meets the unlocking condition, the main control unit can send an unlocking instruction to the locking unit, so that the locking unit executes the unlocking operation after receiving the unlocking instruction.
The master control unit 102 may detect the target object through sensors, such as: it is possible to detect whether or not a target object exists by the infrared sensor and start power supply to the recognition part 101 when the target object is detected, and power supply to the recognition part 101 is not performed when the target object is not detected, which can save power. The identification component 101 may send a first instruction to the master control component 102 upon power up, which may be used to trigger the master control component 102 to generate a sequence of random numbers.
After receiving the random number sequence sent by the main control unit 102, the identification unit 101 may generate a first communication password according to a preset password generation algorithm from the random number sequence, where the preset password generation algorithm may be written in advance and stored in the identification unit 101.
For example, the corresponding first characters at a plurality of designated positions in the random number sequence can be determined to form a communication password; or the like, or, alternatively,
performing negation operation on the first character to obtain a second character, and determining that the second character forms a communication password; or the like, or, alternatively,
carrying out preset operation on the random number sequence to obtain an operation result, and determining third characters corresponding to a plurality of designated positions in the operation result to form a communication password; or the like, or, alternatively,
and performing negation operation on the third character to obtain a fourth character, and determining that the fourth character forms a communication password.
The preset operation may be an algorithm for generating another random number sequence according to the random number sequence, for example: may be a checksum operation. Therefore, the first communication password can be generated through the random number sequence, the generation process of the first communication password is simple, and the influence on the unlocking speed can be reduced.
It should be noted that the preset password generation algorithm is only an example of the present disclosure, and in fact, as long as the identification unit 101 and the main control unit 102 generate the password by using the same preset password generation algorithm, any algorithm that generates the password according to the random number sequence is acceptable, and the present disclosure does not limit this.
After the first communication password is generated, the instruction data of the interaction between the identification unit 101 and the main control unit 102 may be encrypted or decrypted by using the first communication password.
In a possible implementation manner, the performing, by the identification component 101, encrypted communication with the main control component 102 through the first communication password may include:
encrypting the instruction data sent to the main control unit 102 by using the first communication password; and/or decrypting the received instruction data from the main control unit 102 by using the first communication password.
The identification unit 101 may encrypt the instruction data by using the first communication password, and then send the encrypted instruction data to the main control unit 102; after receiving the instruction data sent by the main control unit 102, the identification unit 101 may decrypt the received instruction data with the first communication password.
In a possible implementation manner, the main control unit 102 may be configured to:
when a first instruction sent by an identification part 101 is received, sending a random number sequence to the identification part 101, and generating a second communication password according to the random number sequence;
encrypted communication with the identification means 101 is performed by the second communication password.
After receiving the first instruction sent by the identification component 101, the main control component 102 may generate a random number sequence according to a random number in response to the first instruction, and send the random number sequence to the identification component 101. The method for generating the random number sequence by the main control unit 102 is not limited in this disclosure, and any method that can generate the random number sequence may be used, for example: calling a random number generation function by using time as a seed to generate a random number sequence, generating the random number sequence through random full arrangement, and re-generating the random number sequence through a set.
The main control unit 102 may generate a second communication password according to the random number sequence according to a preset password generation algorithm, where the preset password generation algorithm is the same as the preset password generation algorithm written in the identification unit 102, that is, the second communication password is identical to the first communication password, and then the main control unit 102 may perform encrypted communication with the identification unit 101 through the second communication password.
In a possible implementation manner, the performing, by the master control unit 102, encrypted communication with the identification unit 101 through the second communication password may include:
encrypting the instruction data sent to the identification component 101 by using the second communication password; and/or, the received instruction data from the identification component 101 is decrypted by using the second communication password.
The main control unit 102 may encrypt the instruction data by using the second communication password, and then send the encrypted instruction data to the identification unit 101; after the main control unit 102 receives the instruction data sent by the identification unit 101, the received instruction data may be decrypted by using the second communication password.
According to an embodiment of the present disclosure, an identification component in an object identification device may send a first instruction to a main control component after powering on, so that the main control component sends a random number sequence to the identification component according to the first instruction. The identification component can generate a first communication password according to the random number sequence, and encrypted communication is carried out between the first communication password and the main control component, so that the communication safety between the identification component and the main control component can be improved, and the risks of communication theft and forgery attack are reduced.
In a possible implementation process, the performing, by the identification component 101, encrypted communication with the main control component 102 through the first communication password may include:
encrypting the identification information of the identification component 101 by using the first communication password to obtain first identification information;
and sending the first identification information to the main control unit 102.
For example, after the identification component 101 generates the first communication password, the identification information of the identification component 101 may be subjected to symmetric encryption processing by using the first communication password, so as to obtain the first identification information. And sending the first identification information to the main control unit 102, so that the main control unit 102 can decrypt the first identification information through the second communication password and then authenticate the identification unit 101 according to the obtained identification information of the identification unit 101.
In a possible implementation manner, the performing, by the master control unit 102, encrypted communication with the identification unit 101 through the second communication password may include:
receiving the first identification information;
decrypting the first identification information by using the second communication password;
when the decryption is successful, authenticating the identification component 101 according to the identification information of the identification component 101 obtained by the decryption processing;
and when the authentication is successful, encrypting the identity authentication instruction by using the second communication password to obtain a second instruction, and sending the second instruction to the identification component 101.
For example, after the main control unit 102 receives the first identification information sent by the identification unit 101, the first identification information may be decrypted by using a second communication password. When the decryption is successful, the identification information of the identification part 101 may be obtained, and the identification part 101 is authenticated according to the identification information of the identification part 101.
In a possible implementation manner, the authenticating, by the main control unit 102, the identification unit 101 according to the identification information of the identification unit 101 obtained through the decryption process may include:
when the identification information of the identification component 101 is consistent with the preset identification information locally stored in the main control component 102, it is determined that the authentication of the identification component 101 is successful, otherwise, it is determined that the authentication of the identification component 101 is failed.
For example, the main control unit 102 locally stores preset identification information, where the preset identification information is identification information of an identification unit of a target identification device written into the main control unit 102 when the target identification device is shipped from a factory. When the identification information of the identification component 101 is consistent with the preset identification information locally stored in the main control component 102, it may be determined that the identification component 101 is an identification component of a target identification device, that is, the identification component is not illegally replaced, and thus it is determined that the authentication of the identification component 101 is successful. Otherwise, when the identification information of the identification component 101 is inconsistent with the preset identification information locally stored in the main control component 102, it may be determined that the identification component 101 is illegally replaced, and it may be determined that the authentication of the identification component 101 fails.
When the authentication is successful, the main control unit 102 may perform symmetric encryption on the identity authentication instruction by using the second communication password to obtain a second instruction, where the identity authentication instruction may be used to instruct the identification unit 101 to perform the identity authentication operation on the target object.
In a possible implementation manner, the performing, by the master control unit 102, encrypted communication with the identification unit 101 through the second communication password may further include:
upon decryption failure, communication with the identification section 101 is disconnected.
When the main control unit 102 fails to decrypt the first identification information using the second communication password, it may be determined that the first communication password is different from the second communication password, and the target identification device may be considered to be subjected to an illegal attack, and may disconnect the communication with the identification unit 101 without responding to the first identification information.
In this way, the main control unit 102 authenticates the identification unit through the identification information of the identification unit 101, so that the risk that the identification unit is illegally replaced and further the target identification device is illegally attacked can be reduced.
In a possible implementation manner, the performing, by the identification component 101, encrypted communication with the main control component 102 through the first communication password may further include:
receiving a second instruction from the master control unit 102;
and decrypting the second instruction by using the first communication password to obtain the identity authentication instruction, and performing identity authentication on the target object in response to the identity authentication instruction.
For example, after the authentication of the identification unit 101 by the main control unit 102 is passed, the identity authentication instruction may be encrypted into a second instruction and sent to the identification unit 101. After receiving the second instruction, the identification component 101 may decrypt the second instruction with the first communication password to obtain an identity authentication instruction, and perform identity authentication on the target object in response to the identity authentication instruction.
In a possible implementation manner, the identifying component 101, performing identity authentication on the target object in response to the identity authentication instruction, may include:
acquiring image information of the target object;
and performing identity authentication on the target object according to the image information to obtain an identity authentication result.
For example, the identification component 101 may respond to the identity authentication instruction, acquire image information of the target object through an image acquisition device integrated on the identification component 101, and perform identity authentication on the target object according to the acquired image information to obtain an identity authentication result: authentication passed or authentication failed.
For example: the identification part 101 pre-stores image information (face image information or fingerprint image information) locally, can compare the similarity between the locally stored image information and the acquired image information of the target object, and can determine that the target object passes the authentication when the similarity meets the authentication requirement, or else, determine that the target object fails the authentication.
It should be noted that the above-mentioned manner of identity authentication is only an example of identity authentication in the present disclosure, and is not to be understood as a limitation to the manner of identity authentication, and in fact, any manner of identity authentication through image information may be used, and the present disclosure is not limited herein.
The identification unit 101 performs encrypted communication with the main control unit 102 through the first communication password, and may further include:
encrypting the identity authentication result by using the first communication password to obtain a first authentication result;
and sending the first authentication result to the main control unit.
For example, after the identification unit 101 completes the identity authentication of the target object, the identification unit may encrypt the identity authentication result by using a first communication password to obtain a first authentication result, and send the first authentication result to the main control unit 102, so that the main control unit 102 may control the locking unit to unlock according to the first authentication result.
In a possible implementation manner, the performing, by the master control unit 102, encrypted communication with the identification unit 101 through the second communication password may further include:
receiving a first authentication result transmitted by the identification part 101;
and decrypting the first authentication result by adopting the second communication password to obtain the identity authentication result.
For example, after receiving the first authentication result sent by the identification component 101, the main control component 102 may perform decryption processing on the first authentication result by using the second communication password. After the decryption is successful, the identity authentication result of the identification part 101 is obtained.
The master control unit 102 may be further configured to:
and controlling the locking component to unlock according to the identity authentication result.
After obtaining the identity authentication result of the identification component 101, the main control component 102 may issue an unlocking instruction to the locking component when the identity authentication result is that the authentication passes, so that the locking component is unlocked in response to the unlocking instruction; when the identity authentication result is that the authentication fails, the main control unit 102 does not issue any instruction to the locking unit, so that the locking unit does not perform the unlocking operation.
The following disclosure is presented by way of specific examples in order to provide a better understanding of the embodiments of the disclosure to those skilled in the art.
Illustratively, referring to fig. 2, the target recognition device is an intelligent door lock, the intelligent door lock includes a recognition component, a main control component and a lock cylinder, and the main control component supplies power to the recognition component when detecting a target object. And after the identification component is powered on, sending a first instruction to the main control component. After receiving the first instruction, the main control unit responds to the first instruction, generates a random number sequence by adopting a random number, generates a second communication password according to a preset password generation algorithm negotiated with the identification unit in advance, and sends the random number sequence to the identification unit. After receiving the random number sequence, the identification component may generate the first communication password using a preset password generation algorithm negotiated in advance with the main control component.
The identification unit may encrypt identification Information (ID) of the identification unit using the first communication password to obtain first identification information, and send the first identification information to the main control unit. After receiving the first identification information, the main control unit may decrypt the first identification information by using the second communication password to obtain the identification information of the identification unit, and authenticate the identification unit according to the identification information of the identification unit. After the authentication is passed, the main control unit may encrypt the identity authentication command by using the second communication password to obtain a second command, and send the second command to the identification unit.
After receiving the second instruction, the identification component can decrypt the second instruction by adopting the first communication password to obtain an identity authentication instruction, acquire an image of the target object corresponding to the identity authentication instruction, and perform identity authentication on the target object according to the image of the target object to obtain an identity authentication result. And encrypting the identity authentication result by adopting the first communication password to obtain a first authentication result, and sending the first authentication result to the control component.
And after receiving the first authentication result, the control part can decrypt the first authentication result by adopting a second communication password to obtain an identity authentication result, and sends an unlocking instruction to the lock cylinder when the identity authentication result is authentication pass. After the lock cylinder receives the unlocking instruction, the lock cylinder can be unlocked.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and specific implementation thereof may refer to the description of the above method embodiments, and for brevity, will not be described again here.
Fig. 3 is a flowchart of a data processing method according to an embodiment of the present disclosure, where the method is applied to an identification unit of a target identification device, the target identification device further includes a main control unit connected to the identification unit, the identification unit is configured to identify a captured image to obtain an identification result of the image, and the main control unit is connected to the identification unit and configured to control a locking unit to unlock if the identification result meets an unlocking condition.
As shown in fig. 1, the method may include:
in step S31, when the power is turned on, sending a first instruction to the main control unit, where the first instruction is used to trigger the main control unit to send a random number sequence to the identification unit;
in step S32, receiving the random number sequence sent by the master control unit;
in step S33, generating a first communication password from the random number sequence;
in step S34, encrypted communication is performed with the master control unit through the first communication password.
For example, the main control unit may supply power to the identification unit when the target object is detected, and the identification unit may send the first instruction to the main control unit after being powered on. After receiving the first instruction, the main control unit may generate a random number sequence according to the random number in response to the first instruction (the generation process of the random number sequence may refer to the foregoing embodiment, and details of the disclosure are not described here), and send the random number sequence to the identification unit. The identification component may process the random number sequence by using a preset password generation algorithm to obtain the first communication password (the generation process of the first communication password may refer to the foregoing embodiment, and details of the present disclosure are not repeated here). After the identification unit generates the first communication password, the first communication password is used for encrypting the instruction data sent to the main control unit, and the first communication password is used for decrypting the received instruction data from the main control unit (the process of encrypting the communication between the identification unit and the main control unit may refer to the foregoing embodiments, and is not described herein again).
According to an embodiment of the present disclosure, the identification component may send a first instruction to the main control component after powering on, so that the main control component sends a random number sequence to the identification component according to the first instruction. The identification component can generate a first communication password according to the random number sequence, and encrypted communication is carried out between the first communication password and the main control component, so that the communication safety between the identification component and the main control component can be improved, and the risks of communication theft and forgery attack are reduced.
Fig. 4 is a flowchart illustrating a data processing method according to an embodiment of the present disclosure, where the method is applied to a main control unit of a target recognition device, the target recognition device further includes a recognition unit connected to the main control unit, the recognition unit is configured to recognize a collected image and obtain a recognition result of the image, and the main control unit is connected to the recognition unit and configured to control a locking unit to unlock if the recognition result meets an unlocking condition.
As shown in fig. 4, the method may include:
in step S41, a first instruction sent by the identification component is received;
in step S42, in response to the first instruction, sending a random number sequence to the identification component;
in step S43, generating a second communication password from the random number sequence;
in step S44, encrypted communication is performed with the identification means by the second communication password;
for example, the master control unit may supply power to the identification unit when the target object is detected, so that the identification unit may send the first instruction to the master control unit after being powered on. After receiving the first instruction, the main control component may generate a random number sequence according to the random number in response to the first instruction (the generation process of the random number sequence may refer to the foregoing embodiment, which is not described herein again), and send the random number sequence to the identification component, so that the identification component may process the random number sequence by using a preset password generation algorithm to obtain the first communication password (the generation process of the first communication password may refer to the foregoing embodiment, which is not described herein again). The main control unit may process the random number sequence by using a preset password generation algorithm to obtain a second communication password (the generation process of the second communication password may refer to the foregoing embodiment, and details of the present disclosure are not repeated here).
After the main control unit generates the second communication password, the second communication password is used for decryption processing on the instruction data from the identification unit, and the second communication password is used for encryption processing on the instruction data sent to the identification unit (the process of performing encryption communication between the identification unit and the main control unit may refer to the foregoing embodiments, and is not described herein again).
According to the embodiment of the disclosure, the main control unit can generate and send the random number sequence to the identification unit according to the first instruction sent by the identification unit, can generate the second communication password according to the random number sequence, and performs encrypted communication with the identification unit through the second communication password, so that the communication safety between the identification unit and the main control unit can be improved, and the risk of communication stealing and forgery attack is reduced.
Embodiments of the present disclosure also provide a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the above-mentioned method. The computer readable storage medium may be a non-volatile computer readable storage medium.
An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The computer program product may be embodied in hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied in a computer storage medium, and in another alternative embodiment, the computer program product is embodied in a Software product, such as a Software Development Kit (SDK), or the like.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. An object recognition device, which is characterized by comprising a recognition part and a main control part,
the identification component is used for identifying the acquired image to obtain an identification result of the image;
the main control unit is connected to the identification unit and used for controlling the unlocking of the locking unit under the condition that the identification result meets the unlocking condition,
wherein the identification component is configured to:
under the condition of power-on starting, sending a first instruction to the main control unit, wherein the first instruction is used for triggering the main control unit to send a random number sequence to the identification unit;
under the condition of receiving a random number sequence sent by the main control unit, generating a first communication password according to the random number sequence;
and carrying out encryption communication with the main control unit through the first communication password.
2. The apparatus of claim 1, wherein the master control component is configured to:
when a first instruction sent by an identification component is received, sending a random number sequence to the identification component, and generating a second communication password according to the random number sequence;
and carrying out encrypted communication with the identification component through the second communication password.
3. The apparatus according to claim 2, wherein the identification unit performs encrypted communication with the master control unit through the first communication password, and includes:
encrypting the identification information of the identification component by using the first communication password to obtain first identification information;
and sending the first identification information to the main control unit.
4. The apparatus of claim 3, wherein the main control unit performs encrypted communication with the identification unit through the second communication password, and comprises:
receiving the first identification information;
decrypting the first identification information by using the second communication password;
when the decryption is successful, authenticating the identification component according to the identification information of the identification component obtained by the decryption processing;
and when the authentication is successful, the second communication password is adopted to encrypt the identity authentication command to obtain a second command, and the second command is sent to the identification component.
5. The apparatus according to claim 4, wherein the identification unit performs encrypted communication with the main control unit through the first communication password, and further comprising:
receiving a second instruction from the master control unit;
and decrypting the second instruction by using the first communication password to obtain the identity authentication instruction, and performing identity authentication on the target object in response to the identity authentication instruction.
6. The apparatus of claim 5, wherein the identification component authenticates the target object in response to the authentication instruction, comprising:
acquiring image information of the target object;
performing identity authentication on the target object according to the image information to obtain an identity authentication result;
the identification unit performs encrypted communication with the main control unit through the first communication password, and further includes:
encrypting the identity authentication result by using the first communication password to obtain a first authentication result;
and sending the first authentication result to the main control unit.
7. A data processing method is applied to an identification component of a target identification device, the target identification device further comprises a main control component connected with the identification component, and the method comprises the following steps:
under the condition of power-on starting, sending a first instruction to the main control unit, wherein the first instruction is used for triggering the main control unit to send a random number sequence to the identification unit;
receiving the random number sequence sent by the main control unit;
generating a first communication password according to the random number sequence;
carrying out encrypted communication with the main control unit through the first communication password;
the identification component is used for identifying the acquired image to obtain an identification result of the image;
the main control unit is connected to the identification unit and used for controlling the locking unit to unlock under the condition that the identification result meets the unlocking condition.
8. A data processing method is applied to a main control unit of a target recognition device, the target recognition device further comprises a recognition unit connected with the main control unit, and the method comprises the following steps:
receiving a first instruction sent by an identification component;
in response to the first instruction, sending a sequence of random numbers to the identification component;
generating a second communication password according to the random number sequence;
carrying out encrypted communication with the identification component through the second communication password;
the identification component is used for identifying the acquired image to obtain an identification result of the image;
the main control unit is connected to the identification unit and used for controlling the locking unit to unlock under the condition that the identification result meets the unlocking condition.
9. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to invoke the memory-stored instructions to perform the method of claim 7 or 8.
10. A computer readable storage medium having computer program instructions stored thereon, wherein the computer program instructions, when executed by a processor, implement the method of claim 7 or 8.
CN201911191648.0A 2019-11-28 2019-11-28 Object recognition apparatus, data processing method, electronic device, and storage medium Active CN110853198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911191648.0A CN110853198B (en) 2019-11-28 2019-11-28 Object recognition apparatus, data processing method, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911191648.0A CN110853198B (en) 2019-11-28 2019-11-28 Object recognition apparatus, data processing method, electronic device, and storage medium

Publications (2)

Publication Number Publication Date
CN110853198A true CN110853198A (en) 2020-02-28
CN110853198B CN110853198B (en) 2022-06-14

Family

ID=69606303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911191648.0A Active CN110853198B (en) 2019-11-28 2019-11-28 Object recognition apparatus, data processing method, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN110853198B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2787785Y (en) * 2005-04-30 2006-06-14 罗蕾蕾 Encryption fingerprint lock for automobile
CN101615309A (en) * 2008-12-05 2009-12-30 张小鹏 Identification presentation device and based on the personal identification method and the system thereof of this device
WO2012078061A1 (en) * 2010-12-06 2012-06-14 Yonos, Lda. Wireless biometric access control system and operation method thereof
CN104408356A (en) * 2014-11-28 2015-03-11 北京大唐智能卡技术有限公司 Fingerprint authentication method and system and fingerprint template encrypting device
CN105405198A (en) * 2015-12-22 2016-03-16 武汉瑞纳捷电子技术有限公司 Wireless access control management system and method
EP3327679A1 (en) * 2016-11-29 2018-05-30 Bundesdruckerei GmbH Method for access control of a group of persons using multiple readers and multiple tokens
CN108266061A (en) * 2017-12-29 2018-07-10 武汉九万里科技有限公司 Fingerprint lock
CN109035519A (en) * 2018-07-26 2018-12-18 杭州晟元数据安全技术股份有限公司 A kind of biometric devices and method
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
CN110047185A (en) * 2019-04-25 2019-07-23 广州河东科技有限公司 A kind of method for unlocking and system of intelligent door lock
CN110322604A (en) * 2019-06-20 2019-10-11 上海思立微电子科技有限公司 A kind of unlocked by fingerprint system and method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2787785Y (en) * 2005-04-30 2006-06-14 罗蕾蕾 Encryption fingerprint lock for automobile
CN101615309A (en) * 2008-12-05 2009-12-30 张小鹏 Identification presentation device and based on the personal identification method and the system thereof of this device
WO2012078061A1 (en) * 2010-12-06 2012-06-14 Yonos, Lda. Wireless biometric access control system and operation method thereof
CN104408356A (en) * 2014-11-28 2015-03-11 北京大唐智能卡技术有限公司 Fingerprint authentication method and system and fingerprint template encrypting device
CN105405198A (en) * 2015-12-22 2016-03-16 武汉瑞纳捷电子技术有限公司 Wireless access control management system and method
EP3327679A1 (en) * 2016-11-29 2018-05-30 Bundesdruckerei GmbH Method for access control of a group of persons using multiple readers and multiple tokens
CN108266061A (en) * 2017-12-29 2018-07-10 武汉九万里科技有限公司 Fingerprint lock
CN109035519A (en) * 2018-07-26 2018-12-18 杭州晟元数据安全技术股份有限公司 A kind of biometric devices and method
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
CN110047185A (en) * 2019-04-25 2019-07-23 广州河东科技有限公司 A kind of method for unlocking and system of intelligent door lock
CN110322604A (en) * 2019-06-20 2019-10-11 上海思立微电子科技有限公司 A kind of unlocked by fingerprint system and method

Also Published As

Publication number Publication date
CN110853198B (en) 2022-06-14

Similar Documents

Publication Publication Date Title
KR102328725B1 (en) Method of using one device to unlock another device
US9218473B2 (en) Creation and authentication of biometric information
Hämmerle-Uhl et al. Watermarking as a means to enhance biometric systems: A critical survey
JP2021185710A (en) Authentication method and authentication system
JP6803804B2 (en) Image information verification device
US10742410B2 (en) Updating biometric template protection keys
US20120087550A1 (en) Robust biometric feature extraction with and without reference point
JP2005157930A (en) Confidential information processing system and lsi
CN110298947B (en) Unlocking method and electronic lock
US11586717B2 (en) Method and electronic device for authenticating a user
CN112530053B (en) Control method and system of intelligent lock, lock equipment, server and storage medium
CN110853198B (en) Object recognition apparatus, data processing method, electronic device, and storage medium
Ameen Secure electronic voting application based on face recognition and ciphering
EP3903211A1 (en) Biometric acquisition system and method
CN100442305C (en) Biometric template similarity based on feature locations
CN111510445B (en) Method, device, equipment and medium for preventing network camera from being stolen
KR101885733B1 (en) Biometric authentication apparatus and user authentication method using biometric authentication apparatus
KR20150010542A (en) Creation and authentication of biometric information
KR101635278B1 (en) Multi-factor authentication with dynamic handshake quick-response code
KR102539533B1 (en) Method and apparatus for preventing other people from photographing identification
WO2018091289A1 (en) Method of issuing an identity document
CN112559979B (en) Method for protecting software library authorized use on POS machine through hardware security chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant