CN111949966A - Encryption and unlocking method, server, terminal and lock - Google Patents

Encryption and unlocking method, server, terminal and lock Download PDF

Info

Publication number
CN111949966A
CN111949966A CN202010883932.0A CN202010883932A CN111949966A CN 111949966 A CN111949966 A CN 111949966A CN 202010883932 A CN202010883932 A CN 202010883932A CN 111949966 A CN111949966 A CN 111949966A
Authority
CN
China
Prior art keywords
server
unlocking
lock
terminal
face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010883932.0A
Other languages
Chinese (zh)
Inventor
王红宾
吕昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yitu Network Science and Technology Co Ltd
Original Assignee
Shanghai Yitu Network Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yitu Network Science and Technology Co Ltd filed Critical Shanghai Yitu Network Science and Technology Co Ltd
Priority to CN202010883932.0A priority Critical patent/CN111949966A/en
Publication of CN111949966A publication Critical patent/CN111949966A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Software Systems (AREA)
  • Biomedical Technology (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Collating Specific Patterns (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an encryption and unlocking method, a server, a terminal and a lock, wherein the encryption method comprises the following steps: acquiring an unlocking request sent by at least one terminal; acquiring at least two face images sent by a terminal; performing living body detection on at least two face images; extracting the features of the face image detected by the living body, and comparing the extracted features with a plurality of face features stored in advance; and when the comparison result shows that the face images acquired by the plurality of authorized users from the terminal by the server all have consistent faces, sending an unlocking instruction. The method of the invention carries out unlocking when all the authorized users have consistent faces in the face images acquired from the terminal by the server through the comparison of the face characteristics, thereby realizing multi-user cooperative real-time remote unlocking, ensuring the unlocking safety and meeting the requirements of on-line and real-time remote unlocking.

Description

Encryption and unlocking method, server, terminal and lock
Technical Field
The invention relates to the field of face recognition, in particular to an encryption and unlocking method, a server, a terminal and a lock.
Background
The common encryption method has a lot of inconveniences, which may cause the risk of unlocking the lock, such as losing the key of the key lock and the coded lock, and forgetting the code. With the development of computer vision, face encryption and unlocking are applied to various aspects of life and production, namely, mobile phone screen locking and access control systems, and the wide application of the face in the field of biological feature locks is fully explained.
However, the application of the prior art face unlocking is limited to a single person scenario. In some specific situations, however, one-man operation may present risks such as no consensus or unauthorized. In the prior art, multi-user cooperative unlocking is also developed, and generally, multi-user cooperative unlocking cannot be carried out remotely in a mode of managing passwords by multiple users.
Disclosure of Invention
To solve the problems of the prior art, at least one embodiment of the present invention provides an encryption and unlocking method, a server, a terminal and a lock, which solve the various problems mentioned in the background section above.
In a first aspect, an embodiment of the present invention provides an unlocking method, including: the method comprises the steps that a server obtains an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock; the server acquires at least two face images sent by the terminal; the server performs living body detection on the at least two face images; extracting the features of the face image detected by the living body, and comparing the extracted features with a plurality of face features stored in advance, wherein the plurality of face features stored in advance are the face features of a plurality of authority users associated with the identification information of the lock; and when the comparison result shows that the face images acquired by the plurality of authority users from the terminal by the server all have consistent faces, the server sends an unlocking instruction.
In some embodiments, the unlocking is terminated when one of the facial images acquired by the server fails to be detected live.
In some embodiments, when the comparison result indicates that the extracted features are not consistent with the facial features of the plurality of pre-stored authorized users, the unlocking is terminated.
In some embodiments, further comprising: after the unlocking request is obtained, the server obtains the information of the associated authority user according to the identification information of the lock; the server sends reminding information to the associated user according to the information of the associated authority user, wherein the reminding information comprises one or more of the following information: unlocking progress and abnormal information.
In some embodiments, the exception information includes one or more of: and living body detection failure information and face feature comparison failure information.
In some embodiments, the sending, by the server, the reminder message to the associated right user according to the information of the associated right user is: and the server instructs the terminal to create a session, and the reminding information is displayed through the session.
In some embodiments, after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, the unlocking is terminated.
In a second aspect, an embodiment of the present invention further provides an encryption method, including: a server acquires a registration request, wherein the registration request carries identification information of a lock to be encrypted; the server acquires at least two face images sent by at least one terminal, wherein the at least two face images are associated with the identifier of the to-be-encrypted lock; the server performs living body detection on the at least two face images; extracting features of the at least two face images after passing live body detection; establishing an incidence relation between the identifier of the lock to be encrypted and the characteristics of the at least two face images, so that the users corresponding to the characteristics of the at least two face images are authorized users, and the authorized users can unlock the lock through the server; and encrypting the lock according to the association relation.
In some embodiments, the at least one terminal includes a first terminal and a second terminal, and the server obtains at least two facial images sent by the at least one terminal, including: the server acquires a first face image sent by a first terminal, wherein the first face image comprises at least one face image; the server acquires a second face image sent by a second terminal, wherein the second face image comprises at least one face image; the method further comprises the following steps: and the server sends the first face image to the second terminal and sends the second face image to the first terminal.
In some embodiments, further comprising: the server acquires the confirmation information of the second face image sent by the first terminal; and the server acquires the confirmation information of the first face image sent by the second terminal.
In some embodiments, further comprising: the server stores the facial image characteristics of the authorized user; and the server stores the association relationship between the identifier of the lock to be encrypted and the characteristics of the face image of the authorized user.
In a third aspect, an embodiment of the present invention further provides a server, including an unlocking device, where the unlocking device includes: the first acquisition module is used for acquiring an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock; the first acquisition module is further used for acquiring at least two face images sent by the terminal; the first living body detection module is used for carrying out living body detection on the at least two face images; the comparison module is used for extracting the features of the face image detected by the living body and comparing the extracted features with a plurality of face features stored in advance, wherein the plurality of face features stored in advance are the face features of a plurality of authority users associated with the identification information of the lock; and the unlocking module is used for sending an unlocking instruction by the server when the comparison result of the comparison module shows that the face images acquired by the plurality of authority users from the terminal by the server all have consistent faces.
In some embodiments, the system further comprises a termination unlocking module for terminating unlocking when one face image acquired by the server fails to pass living body detection; or, when the comparison result is that the extracted features are not consistent with the face features of the plurality of pre-stored authorized users, the unlocking is terminated; or after the unlocking request is obtained, if the server does not send an unlocking instruction within the preset time, the unlocking is terminated.
In some embodiments, the first obtaining module is further configured to obtain information of the associated authorized user according to the identification information of the lock; the server further comprises a first sending module, configured to send a reminder to the associated user, where the reminder includes one or more of: unlocking progress and abnormal information.
In some embodiments, further comprising an encryption device, the encryption device comprising: the second acquisition module is further used for acquiring a registration request, wherein the registration request carries identification information of the lock to be encrypted; the second obtaining module is further configured to obtain at least two face images sent by at least one terminal, where the at least two face images are associated with the identifier of the to-be-encrypted lock; the second living body detection module is used for carrying out living body detection on the at least two face images; the second characteristic extraction module is used for extracting the characteristics of the at least two face images after the living body detection is passed; the incidence relation establishing module is used for establishing incidence relation between the identifier of the lock to be encrypted and the characteristics of the at least two face images, so that the users corresponding to the characteristics of the at least two face images are authority users, and the authority users can unlock the lock through the server; and the encryption module is used for encrypting the lock according to the association relation.
In some embodiments, the second obtaining module is further configured to: acquiring a first face image sent by a first terminal, wherein the first face image comprises at least one face image; acquiring a second face image sent by a second terminal, wherein the second face image comprises at least one face image; the encryption apparatus further includes: and the second sending module is used for sending the first face image to the second terminal and sending the second face image to the first terminal.
In some embodiments, the second obtaining module is further configured to: acquiring confirmation information of the second face image sent by the first terminal; and acquiring the confirmation information of the first face image sent by the second terminal.
In some embodiments, the server further comprises: and the storage module is used for storing the facial image characteristics of the authorized user and storing the association relationship between the identification of the lock to be encrypted and the characteristics of the facial image of the authorized user.
In a fourth aspect, an embodiment of the present invention further provides an unlocking method, including: a terminal acquires a request of a user for unlocking, wherein the unlocking instruction carries identification information of a lock; the terminal sends an unlocking request to the server, wherein the unlocking request carries identification information of the lock; the terminal acquires an image acquired by image acquisition equipment connected with the terminal and acquires a face image from the image; the terminal sends the face image to the server so that the server compares the face image with at least two authority user face characteristics associated with the identification information of the lock; the terminal acquires an unlocking instruction sent by the server; and the terminal communicates with the lock according to an unlocking instruction sent by the server to unlock the lock.
In some embodiments, when the image acquired by the image acquisition device simultaneously includes at least two face images, acquiring the face images therefrom specifically includes: collecting the at least two face images; the terminal sends the face image to the server, and the method specifically includes: and sending the at least two facial images to the server.
In some embodiments, further comprising: and sending invitation information to other authority users so that the other authority users can carry out collaborative unlocking according to the invitation information.
In some embodiments, further comprising: acquiring reminding information sent by the server, wherein the reminding information comprises one or more of the following: unlocking progress and abnormal information.
In some embodiments, further comprising: and acquiring an unlocking termination instruction sent by the server, wherein the unlocking termination instruction is sent to the terminal by the server under a preset condition.
In a fifth aspect, an embodiment of the present invention further provides an encryption method, including: a terminal sends a registration request to a server, wherein the registration request carries identification information of a lock to be encrypted; the terminal acquires an image acquired by an image acquisition device connected with the terminal and acquires a face image from the image; sending the face image to the server, wherein the face image is associated with the identification information of the lock to be encrypted; acquiring an encryption instruction sent by the server, wherein the encryption instruction is sent by the server after the server establishes an association relation between the identifier of the to-be-encrypted lock and at least two facial image characteristics, and at least one of the at least two facial image characteristics is the facial image characteristic sent by the terminal; and communicating according to the encryption instruction and the lock to be encrypted, and encrypting the lock.
In some embodiments, when the image acquired by the image acquisition device simultaneously includes at least two face images, acquiring the face images therefrom specifically includes: collecting the at least two face images; the sending the face image to the server specifically includes: and sending the at least two facial images to the server.
In some embodiments, further comprising: and sending invitation information to other users so that the other users can send the face images of the other users to a server for collaborative encryption according to the invitation information.
In some embodiments, further comprising: acquiring the face images of the other users sent to the server by the other users sent by the server; and sending confirmation or non-confirmation information of the face images of the other users according to the instructions of the users.
In a sixth aspect, an embodiment of the present invention further provides a terminal, including an unlocking device, where the unlocking device includes: the third acquisition module is used for acquiring a request of a user for unlocking, and the unlocking instruction carries identification information of the lock; the third sending module is used for sending an unlocking request to the server, wherein the unlocking request carries identification information of the lock; the third acquisition module is further used for acquiring images acquired by image acquisition equipment connected with the terminal and acquiring face images from the images; the third sending module is further configured to send the face image to the server, so that the server compares the face image with at least two authority user face features associated with the identification information of the lock; the third obtaining module is further configured to obtain an unlocking instruction sent by the server; and the third sending module is also used for communicating with the lock according to an unlocking instruction sent by the server and unlocking the lock.
In some embodiments, the third sending module is further configured to send invitation information to other authorized users, so that the other authorized users can perform collaborative unlocking according to the invitation information.
In some embodiments, the third obtaining module is further configured to obtain a reminding message sent by the server, where the reminding message includes one or more of the following: unlocking progress and abnormal information.
In some embodiments, the third obtaining module is further configured to obtain an unlocking termination instruction sent by the server, where the unlocking termination instruction is sent by the server to the terminal under a preset condition.
In some embodiments, further comprising an encryption device, the encryption device comprising: the fourth sending module is used for sending a registration request to the server, wherein the registration request carries the identification information of the to-be-encrypted lock; the fourth acquisition module is used for acquiring the images acquired by the image acquisition device connected with the fourth acquisition module and acquiring the face images from the images; the fourth sending module is further configured to send the face image to the server, where the face image is associated with the identification information of the lock to be encrypted; the fourth obtaining module is further configured to obtain an encryption instruction sent by the server, where the encryption instruction is sent by the server after an association relationship between the identifier of the to-be-encrypted lock and at least two facial image features is established, and at least one of the at least two facial image features is a facial image feature sent by the terminal; the fourth sending module is further configured to perform encryption operation on the lock according to the communication between the encryption instruction and the lock to be encrypted.
In some embodiments, the fourth sending module is further configured to send invitation information to other users, so that the other users can send facial images of the other users to a server according to the invitation information to perform collaborative encryption.
In some embodiments, the fourth obtaining module is further configured to obtain the facial images of the other users sent by the server and sent to the server by the other users; the fourth sending module is further configured to send confirmation or non-confirmation information of the face images of the other users according to an instruction of the user.
In a seventh aspect, an embodiment of the present invention further provides a lock, including a lock body, a communication unit and a processor, where the communication unit communicates with the terminal of any one of the above sixth aspects, and the processing unit performs an encryption or unlocking operation on the lock body according to information acquired by the communication unit.
In an eighth aspect, an embodiment of the present invention further provides a computer device, including: the system comprises at least one processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface are communicated with each other through the communication bus; a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of the first, second, fourth or fifth aspect described above to be implemented.
In a ninth aspect, an embodiment of the present invention further provides a chip, configured to perform the method in the first aspect. Specifically, the chip includes: a processor configured to call and run the computer program from the memory, so that the device on which the chip is installed is configured to execute the method of the first aspect, the second aspect, the fourth aspect, or the fifth aspect.
In a tenth aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method in the first, second, fourth or fifth aspect.
In an eleventh aspect, embodiments of the present invention also provide a computer program product, which includes computer program instructions, and the computer program instructions make a computer execute the method in the first aspect, the second aspect, the fourth aspect or the fifth aspect.
Therefore, the unlocking method provided by the embodiment of the invention realizes multi-person cooperative real-time remote unlocking by extracting the face image characteristics sent by the terminal and comparing the face image characteristics with the stored face characteristics of a plurality of authority users and unlocking when all the authority users have consistent faces in the face images acquired from the terminal by the server, so that the unlocking safety is ensured, and the requirements of on-line and real-time remote unlocking of various scenes are met. Correspondingly, the encryption method of the embodiment of the invention associates a plurality of facial image characteristics sent by the terminal with the lock to be encrypted, so that the unlocking operation can be carried out only after all authorized users associated with the lock cooperate online.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a flow chart of an embodiment of an unlocking method of the present invention;
FIG. 2 is a flow chart of one embodiment of an encryption method of the present invention;
FIG. 3 is a block diagram of an unlocking device of a server according to an embodiment of the present invention;
FIG. 4 is a block diagram of an embodiment of an encryption apparatus of a server according to the present invention;
FIG. 5 is a flowchart of an embodiment of an unlocking method of the present invention;
FIG. 6 is a flow chart of one embodiment of an encryption method of the present invention;
fig. 7 is a block diagram of an unlocking device of a terminal according to an embodiment of the present invention;
FIG. 8 is a block diagram of an embodiment of an encryption apparatus for a terminal according to the present invention;
fig. 9 is a block diagram of a basic structure of the computer device according to the present embodiment.
Detailed description of the preferred embodiments
The present application is described in detail below with reference to the attached drawings and specific embodiments so that the objects, features and advantages of the present application can be more clearly understood. It should be understood that the aspects described below in connection with the figures and the specific embodiments are exemplary only, and should not be construed as limiting the scope of the application in any way. The singular forms "a", "an" and "the" include plural referents unless the context clearly dictates otherwise. As used herein, the terms "first" and "second" are used interchangeably to distinguish one element or class of elements from another element or class of elements, respectively, and are not intended to denote the position or importance of the individual elements.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
Under some specific situations, the multi-face collaborative encryption unlocking is a very practical technical scheme. For example, when important public equipment of an enterprise, common property of a couple, important confidentiality of a group, large-amount payment management and the like are protected, certain decisions can be made on the basis of consensus of multiple persons, and at the moment, the multiple-face collaborative encryption unlocking scheme can effectively and conveniently maintain the consensus protocol, so that the collective benefits are guaranteed. However, the prior art cannot meet the requirement of real-time remote multi-person cooperative unlocking, and the invention of the application provides the following specific modes for solving the problems in the prior art.
In a first aspect, an embodiment of the present invention provides an unlocking method, and fig. 1 is a flowchart of a specific embodiment of the unlocking method of the present invention, where according to fig. 1, the method of this embodiment includes:
step 110, the server obtains an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of the lock. In this step, the server obtains the unlocking request sent by the terminal, and it can be understood that the multi-user cooperative unlocking includes at least two authority users, and it may be set that the unlocking can be completed only when all the authority users perform cooperation, or it may be set that all the authority users are not necessarily completed, for example, a certain proportion of people are preset to complete the cooperative unlocking, or the authority users are set with levels, and different unlocking weights are given to the authority users with different levels. This embodiment is not limited to this, and for convenience of description, in the embodiment of the present application, for example, the unlocking can be completed only by performing cooperation between all authorized users. The authorized user is a user with unlocking authorization, and in the embodiment of the application, the server confirms the authorized user through face image feature comparison. The specific methods for extracting the facial image features and comparing the facial image features can be performed by adopting the existing and future technologies, and the embodiment of the application is not limited to the methods.
In the embodiment of the present application, it is understood that one server may manage several locks, and for each individual lock, the individual locks may be distinguished by, for example, a serial number, identification information, or the like. Taking one of the locks as an example, the server may store, in advance, the facial image feature of the authorized user corresponding to the lock and the association relationship between the lock and the authorized user, that is, the facial feature, for the lock, and the pre-storage process may be implemented by an encryption process, which may specifically refer to the specific embodiment corresponding to fig. 2. It is understood that in the description of the embodiment of the present application, the authorized user stored in the server, that is, the facial features or facial image features of the authorized user, sometimes several expressions are not distinguished.
However, in any way, the unlocking request sent by the terminal can carry the identification information of the lock, so that the server can implement the subsequent unlocking step according to the pre-stored association relationship between the lock and the authorized user.
And step 120, the server acquires at least two face images sent by the terminal. It can be understood that at least two users participating in the cooperative unlocking have at least two bits, that is, at least two rights users associated with one lock have at least two bits, but for the server side, it is not limited that the at least two users perform the cooperative unlocking through the same terminal or through different terminals. For example, each user may perform the cooperative unlocking through a respective terminal, or at least two users may perform the cooperative unlocking through the same terminal, which is not limited in this application.
Therefore, the server may receive at least two face images sent by at least one terminal, and the server may also obtain one face image from each of the two terminals in the cooperative unlocking process, or obtain one face image from each of two or more terminals in the cooperative unlocking process, obtain one face image sent by one terminal from some terminals, and obtain a plurality of face images sent by the terminals from some terminals. The server acquires several face images from several terminals respectively, which are determined by the operation of the terminal users participating in the cooperative unlocking, and the server does not limit the operation. However, in the cooperative unlocking process, the server receives at least two face images sent by the terminal, and in order to facilitate the server to identify which lock of the locks managed by the server is subjected to the cooperative unlocking operation by the acquired face images, the face images sent by the terminal received by the server can carry the identification number of the lock to be unlocked.
Step 130, the server performs living body detection on the at least two face images; in the step, the server performs living body detection on the received at least two face images. The living body detection can specifically adopt various existing technologies, including various anti-attack technologies and the like. The server can perform living body detection when receiving a face image, and can also perform living body detection after receiving the face image with the number equal to that of authorized users.
After the live body detection passes, the subsequent steps may be performed. And when the acquired face image fails to successfully pass the living body detection, the server may make a decision to terminate the unlocking. Meanwhile, the server can send the information of terminating the unlocking to the users participating in the collaborative unlocking. Specifically, the server may select to send the information to the user through a plurality of methods, for example, the server may send the information to a reserved contact information of an authorized user of the lock, such as a mobile phone number and a mailbox number, or the server may send the information to a terminal participating in the cooperative unlocking. Further, the server may instruct the terminal to create a session through which information to be transmitted is displayed. This way, the user can be informed or scheduled about the unlocking at any time, and can know possible abnormalities or risks.
It can be understood that the server may send the information to the terminals participating in the cooperative unlocking through various prior arts, which is not described in detail herein. The sending mode for sending various other information by the subsequent server may refer to various modes or combinations of the steps, and for brevity, the description is not repeated.
Step 140, extracting the features of the face image detected by the living body, and comparing the extracted features with a plurality of face features stored in advance, wherein the plurality of face features stored in advance are the face features of a plurality of authorized users associated with the identification information of the lock.
In this step, the server extracts the face image features of the face detected by the living body, and the adopted feature extraction method can also adopt any existing or future technology. And comparing the extracted face features with face features stored in advance. Because the authority users have at least two bits in the multi-person collaborative unlocking, at least two stored face features are realized. The server inquires the authority user associated with the lock of the identification number stored in the server in advance according to the identification number to be unlocked carried by the acquired face image, namely, the face characteristics of the authority user corresponding to the identification number are inquired. And comparing the acquired human face features with the human face features for realizing storage.
Specifically, each time a face image sent by one terminal is obtained, the image is compared with face features of N (N is at least 2) authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful.
At this time, the server may further send the information that the comparison of the authorized user is successful or the verification passes to the authorized user or to the terminal participating in the collaborative unlocking. This may allow the user to learn about possible anomalies or risks by various means, such as by obtaining information about or the progress of the unlocking. For example, other non-authorized users perform unlocking operation, and the authorized user can know the information through the reserved information, so that the safety can be further improved.
Further, the server can display the reminding information through the session by using the information as the reminding information in a mode of instructing the terminal to create the session. The session mode can transmit and update the unlocking state in real time, and the user experience is improved.
Specifically, the server can set a progress bar according to the number of authorized users and the number of authenticated users, so that the unlocking progress can be visually displayed in the session. For example, when there are four authorized users, one of the facial image features is successfully compared, that is, when the verification passes, the current progress bar is displayed as a quarter progress bar.
Further, if the facial image features are compared with the preset stored N authorized users, the server considers that the face is not any authorized user according to the preset conditions, the authentication is considered to be failed, and the server can terminate unlocking at this moment. Accordingly, information can also be sent to authorized users or terminals participating in unlocking.
As for the preset condition that the server successfully or unsuccessfully compares the face features, the preset condition can be realized by a technology which is continuously updated in the field, and the application is not limited.
When the server confirms that the received first face image is one of N authority users through face feature comparison, when the server acquires one face image sent by the terminal again, the face image can be compared with the face features of the rest (N-1) authority users, if the comparison is successful, the unlocking progress is updated to be one half, if the verification fails, the unlocking is stopped, and a message is sent. Of course, the server may compare the face image received each time with all the N authorized users. The invention is also not limited.
Step 150, when the comparison result indicates that all the face images acquired by the plurality of authorized users from the terminal by the server have consistent faces, the server sends an unlocking instruction.
And repeating the face feature comparison in the step 140, and when the face image features acquired from the terminal are successfully compared and all authorized users are verified, considering that the unlocking is successful. The server can send an unlocking instruction to the terminal, so that the terminal can communicate with a lock to be unlocked after receiving the unlocking instruction, and unlocking operation is realized.
According to the unlocking method, the facial image features sent by the terminal are extracted and compared with the stored facial features of the multiple authority users, and when all authority users have consistent faces in the facial images acquired from the terminal by the server, unlocking is performed, so that multi-user cooperative real-time remote unlocking is realized, the unlocking safety is guaranteed, and the requirements of on-line and real-time remote unlocking of various scenes are met.
In another specific embodiment, after acquiring the unlocking request, the server acquires the information of the associated right user according to the identification information of the lock; the server sends reminding information to the associated user according to the information of the associated authority user, wherein the reminding information comprises one or more of the following information: unlocking progress, exception information, which may include one or more of: and living body detection failure information and face feature comparison failure information.
Further, in another specific embodiment, after the unlocking request is obtained, if the server does not send the unlocking instruction within the preset time, the unlocking is terminated, and the time limitation on the unlocking can reduce the risk and further improve the safety index.
In a second aspect, an embodiment of the present invention provides an encryption method, and fig. 2 is a flowchart of an embodiment of the encryption method of the present invention, where according to fig. 2, the method of the present embodiment includes:
step 210, a server acquires a registration request, wherein the registration request carries identification information of a lock to be encrypted; generally, when a user obtains a device lock, the user can download and install an application through a corresponding two-dimensional code, and when the user opens the application, the user can enter an initialization process of device configuration. After purchasing the lock, the settings the user has to make before decryption are the encryption settings. The lock device may be configured with a module or a port that accesses a network, for example, using WIFI as an example, the lock device may access a WIFI network or other networks in the present or future, and may specifically perform network configuration for the lock device through a terminal, for example, a mobile phone terminal or the like. The network configuration method and the hardware used in the method may adopt various prior arts, and the present application is not limited thereto.
After the network configuration of the lock device is successful, the terminal may send the acquired identification information of the lock device to the server to request registration. Correspondingly, the server acquires a registration request sent by the terminal, wherein the registration request carries identification information of the lock to be encrypted. The server may also establish a library of the lock devices managed by the server through the identified information, or the server itself may store the lock devices managed by the server, and may determine whether the lock belongs to the lock devices managed by the server according to the identified information.
Step 220, the server obtains at least two face images sent by at least one terminal, and the at least two face images are associated with the identifier of the to-be-encrypted lock; it can be understood that in a scenario where collaborative unlocking is required, at least two authority users can perform collaborative unlocking, that is, at least two authority users associated with one lock, so that in this step, the server obtains at least two face images sent by at least one terminal, and in order for the server to know which authority user is the received face image, the at least two face images may further carry an identifier of a lock to be encrypted, so that the at least two face images are associated with the identifier of the lock to be encrypted.
Step 230, the server performs living body detection on the at least two face images; in the step, the server performs living body detection on the received at least two face images. The living body detection can specifically adopt various existing technologies, including various anti-attack technologies and the like.
After the live body detection passes, the subsequent steps may be performed. When the acquired face image fails to pass the living body detection, the server may send a reminding message to the user or the terminal, and a specific reminding manner may refer to the embodiment corresponding to fig. 1. When the live detection fails, the server may terminate the encryption process and may further prompt the user to restart the encryption process.
Step 240, after the living body detection is passed, extracting the characteristics of the at least two face images; in this step, the server extracts the face image features of the face detected by the living body, and the adopted feature extraction method can also adopt any existing or future technology.
Step 250, establishing an association relationship between the identifier of the lock to be encrypted and the features of the at least two facial images, so that the users corresponding to the features of the at least two facial images are authorized users, and the authorized users can unlock the lock through the server;
as shown in step 220, the at least two facial images obtained by the server may also carry an identifier of the to-be-encrypted lock, so that the at least two facial images are associated with the identifier of the to-be-encrypted lock. Correspondingly, in this step, after extracting the feature data of the face image detected by the living body, an association relationship between the features of the face image and the lock to be encrypted is established, specifically, the association relationship between the features of the face image and the lock identifier to be encrypted may be established, and the users corresponding to the features of the at least two face images are set as authorized users, that is, in the future collaborative unlocking process, all authorized users can collaboratively unlock the lock device.
And step 260, encrypting the lock according to the association relation. After the authority user is set and the incidence relation between the face image feature of the authority user and the lock is completed, the server can send an instruction to the terminal to complete the encryption setting of the lock device. The terminal can communicate with the lock device according to the received instruction to complete the encryption setting of the lock.
The encryption method of the embodiment of the invention associates a plurality of facial image characteristics sent by the terminal with the lock to be encrypted, so that the unlocking operation can be carried out subsequently after all authorized users associated with the lock are in online cooperation.
It can be understood that there are at least two users participating in the collaborative encryption, that is, there are at least two rights users associated with a lock, but for the server side, it is not limited that the at least two users perform the collaborative encryption through the same terminal or through different terminals. If the processing is performed through different terminals, further, in an embodiment, the at least one terminal includes a first terminal and a second terminal, and the obtaining, by the server, at least two face images sent by the at least one terminal specifically includes: the server acquires a first face image sent by a first terminal, wherein the first face image comprises at least one face image; the server acquires a second face image sent by a second terminal, wherein the second face image comprises at least one face image.
Because two terminals send the face images to the server for encryption, at this time, the method may further include: and the server sends the first face image to the second terminal and sends the second face image to the first terminal, so that users operated at different terminals can confirm users operated at other terminals, and the security of an encryption result is further improved.
Therefore, further, the server also acquires the confirmation information of the second face image sent by the first terminal; and the server acquires the confirmation information of the first face image sent by the second terminal. When the server confirms that each authorized user is confirmed by other users, the encryption process is further carried out. The method ensures that each authority user obtains the approval of other users on line, and simultaneously each user approves all other users, and then the mutually approved users are set as the authority users by the server, thereby further strengthening the process of confirmation and improving the safety degree.
In one embodiment, the encryption method further comprises: the server stores the facial image characteristics of the authorized user; and the server stores the association relationship between the identifier of the lock to be encrypted and the characteristics of the face image of the authorized user. Through the step, in the subsequent decryption process, the server can directly obtain the facial image characteristics of the authorized user from the local and obtain the incidence relation between the lock identification and the facial image characteristics of the authorized user from the local. The timeliness and the safety of storage of data are guaranteed.
In a third aspect, an embodiment of the present invention provides a server, and fig. 3 is a block diagram of a specific embodiment of an unlocking device of the server according to the present invention, and as shown in fig. 3, the unlocking device of the server according to the present embodiment includes a first obtaining module 301, a first living body detecting module 302, a comparing module 303, and an unlocking module 304, where the first obtaining module 301 is configured to obtain an unlocking request sent by at least one terminal, and the unlocking request carries identification information of a lock;
the first obtaining module 301 is further configured to obtain at least two face images sent by the terminal;
a first living body detection module 302, configured to perform living body detection on the at least two face images;
a comparison module 303, configured to extract features of a face image detected by a living body, and compare the extracted features with a plurality of face features stored in advance, where the plurality of face features stored in advance are face features of a plurality of authorized users associated with the identification information of the lock;
an unlocking module 304, configured to, when the comparison result of the comparison module indicates that all of the face images obtained by the server from the terminal by the multiple authorized users have consistent faces, send an unlocking instruction by the server.
In this embodiment, the operations executed by each module of the server unlocking device may specifically refer to the method corresponding to fig. 1, so as to achieve the same technical effect.
In one embodiment, the further unlocking device of the server further comprises an unlocking termination module, wherein the unlocking termination module is used for terminating unlocking when one face image acquired by the server fails to pass living body detection; or, when the comparison result is that the extracted features are not consistent with the face features of the plurality of pre-stored authorized users, the unlocking is terminated; or after the unlocking request is obtained, if the server does not send an unlocking instruction within the preset time, the unlocking is terminated.
Further, in an embodiment, the first obtaining module of the unlocking device of the server is further configured to obtain information of the associated authorized user according to the identification information of the lock; the server further comprises a first sending module, configured to send a reminder to the associated user, where the reminder includes one or more of: unlocking progress and abnormal information.
Fig. 4 is a block diagram of an embodiment of an encryption apparatus of a server according to the present invention, and according to fig. 4, the encryption apparatus of the server of the present embodiment includes: a second obtaining module 401, a second living body detecting module 402, a second feature extracting module 403, an association relation establishing module 404 and an encrypting module 405. The second obtaining module 401 is further configured to obtain a registration request, where the registration request carries identification information of a lock to be encrypted;
the second obtaining module 401 is further configured to obtain at least two face images sent by at least one terminal, where the at least two face images are associated with the identifier of the to-be-encrypted lock;
a second living body detection module 402, configured to perform living body detection on the at least two face images;
a second feature extraction module 403, configured to extract features of the at least two face images after passing live body detection;
an association relationship establishing module 404, configured to establish an association relationship between the identifier of the lock to be encrypted and the features of the at least two facial images, so that a user corresponding to the features of the at least two facial images is an authorized user, and the authorized user can unlock the lock through the server;
and an encryption module 405, configured to encrypt the lock according to the association relationship.
In this embodiment, the operations executed by each module of the server encryption device may specifically refer to the method corresponding to fig. 2, so as to achieve the same technical effect.
Further, in an embodiment, in the encryption apparatus of the server, the second obtaining module is further configured to: acquiring a first face image sent by a first terminal, wherein the first face image comprises at least one face image; acquiring a second face image sent by a second terminal, wherein the second face image comprises at least one face image; the encryption apparatus further includes: and the second sending module is used for sending the first face image to the second terminal and sending the second face image to the first terminal.
Further, in an embodiment, in the encryption apparatus of the server, the second obtaining module is further configured to: acquiring confirmation information of the second face image sent by the first terminal; and acquiring the confirmation information of the first face image sent by the second terminal.
Further, in an embodiment, the encryption apparatus of the server further includes: and the storage module is used for storing the facial image characteristics of the authorized user and storing the association relationship between the identification of the lock to be encrypted and the characteristics of the facial image of the authorized user.
In a fourth aspect, an embodiment of the present invention provides an unlocking method, and fig. 5 is a flowchart of an embodiment of the unlocking method of the present invention, where according to fig. 5, the method of the present embodiment includes:
step 510, a terminal acquires a request of a user for unlocking, wherein the unlocking instruction carries identification information of a lock; it can be understood that, in this step, the terminal may obtain, according to the operation of the user, a request that the user requires unlocking, where the information requesting unlocking may carry identification information of the lock, so that when the terminal sends the unlocking request to the server, the terminal may carry identification information to be unlocked.
Step 520, the terminal sends an unlocking request to the server, and the unlocking request carries identification information of the lock. In this step, the terminal server sends an unlocking request, which carries identification information of the lock. In addition, the information sent by the terminal can also include the information of the terminal itself, so that the terminal can receive the information conveniently when the server sends the information to the terminal later, and a user can know the unlocking progress and other information in time.
Step 530, the terminal acquires an image acquired by the image acquisition equipment connected with the terminal and acquires a face image from the image; in the present application, the terminal is not particularly limited, and may be, for example, a tablet computer, a mobile phone or other devices, the image capturing device connected to the terminal is not limited, and may be an image capturing device carried by the terminal, such as a camera, or an image capturing device accessed to the terminal through a port.
It can be understood that, since the cooperative unlocking includes at least two authorized users, the total number of face images transmitted to the server by all terminals participating in the cooperative unlocking should be at least two. However, the present application does not limit whether the at least two users perform the cooperative unlocking through the same terminal or different terminals. For example, each user may perform the cooperative unlocking through a respective terminal, or at least two users may perform the cooperative unlocking through the same terminal, which is not limited in this application. That is, the face image of one user or the face images of at least two users may be transmitted to the server through one terminal. For example, when two users cooperatively unlock through a terminal, if the two users are simultaneously in the camera image acquisition range of the terminal, the image acquired by the image acquisition device simultaneously contains at least two face images.
At this time, further, when the image acquired by the image acquisition device simultaneously includes at least two face images, the acquiring of the face image therefrom specifically includes: collecting the at least two face images; the terminal sends the face image to the server, and the method specifically includes: and sending the at least two facial images to the server. At this time, a plurality of faces can be detected on the same screen. And sending the data of the collected multiple faces to a server. Namely, the same screen of multiple faces is supported in the process of acquiring the faces by the terminal camera.
Step 540, the terminal sends the face image to the server, so that the server compares the face image with at least two authority user face features associated with the identification information of the lock; in this step, the terminal sends a face image to the server, carrying an identification number of the device to be unlocked.
Step 550, the terminal acquires an unlocking instruction sent by the server; the server may determine whether an unlocking instruction may be sent to the terminal by using the method corresponding to fig. 1, or whether a prompt message needs to be sent to the terminal when an abnormality occurs during the unlocking process. Correspondingly, the terminal acquires the unlocking instruction sent by the server. Or if the abnormality occurs in the unlocking process, the terminal acquires an unlocking termination instruction sent by the server, wherein the unlocking termination instruction is sent to the terminal by the server under a preset condition. Both the preset condition and the sending method can refer to the corresponding method in fig. 1.
And 560, the terminal communicates with the lock according to an unlocking instruction sent by the server to unlock the lock. The terminal receives the instruction sent by the server, communicates with the locking device and performs several operations on the lock.
According to the embodiment of the invention, after the request of the user for unlocking is acquired, the acquired face image and the serial number of the equipment to be unlocked are sent to the server together, and the unlocking is carried out when all the authorized users have consistent faces in the face image acquired from the terminal by the server, so that the real-time remote unlocking in cooperation of multiple persons is realized, the unlocking safety is ensured on one hand, and the requirements of online and real-time remote unlocking of various scenes are met on the other hand.
In another specific embodiment, further, when there is more than one terminal performing the cooperative unlocking, the unlocking method further includes: and sending invitation information to other authority users so that the other authority users can carry out collaborative unlocking according to the invitation information.
In another specific embodiment, further, the unlocking method further includes: acquiring reminding information sent by the server, wherein the reminding information comprises one or more of the following: unlocking progress and abnormal information.
Further, when the unlocking is abnormal, the terminal can also acquire an unlocking termination instruction sent by the server, wherein the unlocking termination instruction is sent to the terminal by the server under a preset condition. The preset condition and the specific sending method can refer to the method corresponding to fig. 1.
In a fifth aspect, an embodiment of the present invention provides an encryption method, and fig. 6 is a flowchart of an embodiment of a decryption method according to the present invention, where according to fig. 6, the method of the embodiment includes:
step 610, the terminal sends a registration request to a server, wherein the registration request carries identification information of a lock to be encrypted; generally, when a user obtains a device lock, the user can download and install an application through a corresponding two-dimensional code, and when the user opens the application, the user can enter an initialization process of device configuration. After purchasing the lock, the settings the user has to make before decryption are the encryption settings. The lock device may be configured with a module or a port that accesses a network, for example, using WIFI as an example, the lock device may access a WIFI network or other networks in the present or future, and may specifically perform network configuration for the lock device through a terminal, for example, a mobile phone terminal or the like. The network configuration method and the hardware used in the method may adopt various prior arts, and the present application is not limited thereto. After the setting is completed, the terminal may send the acquired identification information of the lock device to the server, requesting registration.
Step 620, the terminal acquires an image acquired by an image acquisition device connected with the terminal and acquires a face image from the image; in the present application, the terminal is not particularly limited, and may be, for example, a tablet computer, a mobile phone or other devices, the image capturing device connected to the terminal is not limited, and may be an image capturing device carried by the terminal, such as a camera, or an image capturing device accessed to the terminal through a port.
Since the cooperative unlocking comprises at least two authorized users, the total number of the facial images sent to the server by all the terminals participating in the cooperative unlocking should be at least two. However, the present application does not limit whether the at least two users perform the cooperative unlocking through the same terminal or different terminals. For example, each user may perform the cooperative unlocking through a respective terminal, or at least two users may perform the cooperative unlocking through the same terminal, which is not limited in this application. That is, the face image of one user or the face images of at least two users may be transmitted to the server through one terminal. For example, when two users cooperatively unlock through a terminal, if the two users are simultaneously in the camera image acquisition range of the terminal, the image acquired by the image acquisition device simultaneously contains at least two face images.
Therefore, in this step, the terminal acquires the image acquired by the image acquisition device connected with the terminal, and may acquire one or more face images from the image acquisition device. And the terminal supports multiple faces on the same screen in the face collecting process.
Step 630, sending the face image to the server, where the face image is associated with the identification information of the lock to be encrypted; in the step, the face image collected in the previous step is sent to a server and carries identification information of the lock to be encrypted.
Step 640, acquiring an encryption instruction sent by the server, wherein the encryption instruction is sent by the server after the server establishes an association relationship between the identifier to be encrypted and at least two facial image features, wherein at least one of the at least two facial image features is a facial image feature sent by the terminal;
as can be understood from the embodiment corresponding to fig. 2, after receiving the face image carrying the lock identifier, the server performs a series of steps, such as liveness detection, feature extraction, and the like. For example, after extracting the feature data of a face image detected by a living body, the server establishes the association relationship between the features of the face image and a lock to be encrypted, and after completing the actions, the server sends an encryption instruction to the terminal, and correspondingly, the terminal acquires the encryption instruction sent by the server.
And 650, communicating according to the encryption instruction and the lock to be encrypted, and encrypting the lock. And the terminal communicates with the lock to be encrypted according to the received encryption command and performs encryption operation on the lock to be encrypted.
The terminal sends the collected face images and the identification number of the lock to be encrypted to the server, so that the server associates the face characteristic features with the lock to be encrypted, and the unlocking operation can be carried out after all right users associated with the lock cooperate online.
Further, in an embodiment, when the image acquired by the image acquisition device simultaneously includes at least two face images, the acquiring of the face images therefrom specifically includes: collecting the at least two face images; the sending the face image to the server specifically includes: and sending the at least two facial images to the server.
Further, in one embodiment, the encryption method further includes: and sending invitation information to other users so that the other users can send the face images of the other users to a server for collaborative encryption according to the invitation information.
Further, in one embodiment, the encryption method further includes: acquiring the face images of the other users sent to the server by the other users sent by the server; and sending confirmation or non-confirmation information of the face images of the other users according to the instructions of the users. Each cooperative encryption user is approved by other users on line, and simultaneously each user also approves all other users, and then all mutually approved users are set as authority users by the server, so that the confirmation process is further strengthened, and the safety degree is improved.
In a sixth aspect, an embodiment of the present invention provides a terminal, fig. 7 is a block diagram of a specific embodiment of an unlocking apparatus of the terminal of the present invention, and as shown in fig. 7, the unlocking apparatus of the terminal of the present embodiment includes a third obtaining module 701 and a third sending module 702, wherein,
a third obtaining module 701, configured to obtain a request that a user requires unlocking, where the unlocking instruction carries identification information of a lock;
a third sending module 702, configured to send an unlocking request to the server, where the unlocking request carries identification information of the lock;
the third acquisition module is further used for acquiring images acquired by image acquisition equipment connected with the terminal and acquiring face images from the images;
the third sending module is further configured to send the face image to the server, so that the server compares the face image with at least two authority user face features associated with the identification information of the lock;
the third obtaining module is further configured to obtain an unlocking instruction sent by the server;
and the third sending module is also used for communicating with the lock according to an unlocking instruction sent by the server and unlocking the lock.
The operations executed by each module of the terminal unlocking device in the embodiment can be specifically referred to the method corresponding to fig. 5, so as to achieve the same technical effect.
Further, in an embodiment, the third sending module is further configured to send invitation information to other authorized users, so that the other authorized users can perform collaborative unlocking according to the invitation information.
Further, in an embodiment, the third obtaining module is further configured to obtain a reminding message sent by the server, where the reminding message includes one or more of the following: unlocking progress and abnormal information.
Further, in an embodiment, the third obtaining module is further configured to obtain an unlocking termination instruction sent by the server, where the unlocking termination instruction is sent by the server to the terminal under a preset condition.
Fig. 8 is a block diagram of an embodiment of an encryption apparatus of a terminal according to the present invention, and according to fig. 8, the encryption apparatus of the terminal of the present embodiment includes: a fourth sending module 801 and a fourth obtaining module 802, wherein,
a fourth sending module 801, configured to send a registration request to a server, where the registration request carries identification information of a to-be-encrypted lock;
a fourth obtaining module 802, configured to obtain an image collected by an image collecting device connected to the fourth obtaining module, and collect a face image from the image;
the fourth sending module is further configured to send the face image to the server, where the face image is associated with the identification information of the lock to be encrypted;
the fourth obtaining module is further configured to obtain an encryption instruction sent by the server, where the encryption instruction is sent by the server after an association relationship between the identifier of the to-be-encrypted lock and at least two facial image features is established, and at least one of the at least two facial image features is a facial image feature sent by the terminal;
the fourth sending module is further configured to perform encryption operation on the lock according to the communication between the encryption instruction and the lock to be encrypted.
The operations executed by each module of the terminal encryption device in this embodiment may specifically refer to the method corresponding to fig. 6, so as to achieve the same technical effect.
Further, in an embodiment, the fourth sending module is further configured to send invitation information to other users, so that the other users can send facial images of the other users to a server for collaborative encryption according to the invitation information.
Further, in an embodiment, the fourth obtaining module is further configured to obtain the facial images of the other users sent to the server by the other users sent by the server; the fourth sending module is further configured to send confirmation or non-confirmation information of the face images of the other users according to an instruction of the user.
In a seventh aspect, an embodiment of the present invention further provides a lock, which is characterized by including a lock body, a communication unit and a processor, where the communication unit communicates with the terminal of the sixth aspect, and the processing unit performs an encryption or unlocking operation on the lock body according to information acquired by the communication unit.
In an eighth aspect, an embodiment of the present application further provides a computer device, where the computer device may be a neural network server, and specifically refer to fig. 9, and fig. 9 is a basic structural block diagram of the computer device in this embodiment.
The computer device 9 comprises a memory 91, a processor 92, a network interface 93 communicatively connected to each other via a system bus. It is noted that only a computer device 9 having components 91-93 is shown, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device 9 is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device 9 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The computer device 9 may interact with a user through a keyboard, a mouse, a remote control, a touch pad, or a voice control device.
The memory 91 includes at least one type of readable storage medium that may store an executable instruction controller, microcontroller, microprocessor, or other data processing chip. The readable storage medium includes a non-volatile memory (non-volatile memory) or a volatile memory, such as a flash memory (flash memory), a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like, and the RAM may include a static RAM or a dynamic RAM. In some embodiments, the storage 91 may be an internal storage unit of the computer device 9, for example, a hard disk or a memory of the computer device 9. In other embodiments, the memory 91 may also be an external storage device of the computer device 9, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the computer device 9. Of course, the memory 91 may also comprise both an internal memory unit and an external memory device of the computer device 9. In this embodiment, the memory 91 is generally used for storing an operating system installed in the computer device 9 and various types of application software, such as program codes for performing encryption and decryption. Further, the memory 91 may also be used to temporarily store various types of data that have been output or are to be output.
In the embodiment of the present application, the processor 92 may be a Central Processing Unit (CPU) or a Graphic Processing Unit (GPU). The processor 92 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor such as a single chip or the like.
The processor 92 is typically used to control the overall operation of the computer device 9. In this embodiment, the memory 91 is used for storing program codes or instructions, the program codes including computer operation instructions, and the processor 92 is used for executing the program codes or instructions stored in the memory 91 or processing data, such as program codes for performing encryption and decryption.
The bus described herein may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus system may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
In a ninth aspect, an embodiment of the present invention further provides a chip, configured to perform the method in the first aspect. Specifically, the chip includes: a processor configured to call and run the computer program from the memory, so that the device on which the chip is installed is configured to execute the method of the first aspect, the second aspect, the fourth aspect, or the fifth aspect.
In addition, in a tenth aspect, the embodiment of the present invention also provides a computer-readable storage medium, and the computer-readable medium may be a computer-readable signal medium or a computer-readable medium. A processor in the computer reads the computer-readable program code stored in the computer-readable medium, so that the processor can perform the functional actions specified in causing the apparatus in which the chip is installed to perform each step, or a combination of steps, in the method of the above first, second, fourth or fifth aspect; and means for generating a block diagram that implements the functional operation specified in each block or a combination of blocks.
A computer readable medium includes, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing, the memory storing program code or instructions, the program code including computer-executable instructions, and the processor executing the program code or instructions stored by the memory.
The definitions of the memory and the processor may refer to the description of the foregoing embodiments of the computer device, and are not repeated here. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the method of any of the first, second, fourth or fifth aspects above.
In an eleventh aspect, embodiments of the present invention also provide a computer program product, which includes computer program instructions, and the computer program instructions make a computer execute the method in the first aspect, the second aspect, the fourth aspect or the fifth aspect.
Those of skill in the art would understand that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments of the present application, the disclosed system, apparatus and method may be implemented in other ways. For example, the division of the unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system. In addition, the coupling between the respective units may be direct coupling or indirect coupling. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or may exist separately and physically.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a machine-readable storage medium. Therefore, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a machine-readable storage medium and may include several instructions to cause an electronic device to perform all or part of the processes of the technical solution described in the embodiments of the present application. The storage medium may include various media that can store program codes, such as ROM, RAM, a removable disk, a hard disk, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, and the scope of the present application is not limited thereto. Those skilled in the art can make changes or substitutions within the technical scope disclosed in the present application, and such changes or substitutions should be within the protective scope of the present application.

Claims (10)

1. An unlocking method, comprising:
the method comprises the steps that a server obtains an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock;
the server acquires at least two face images sent by the terminal;
the server performs living body detection on the at least two face images;
extracting the features of the face image detected by the living body, and comparing the extracted features with a plurality of face features stored in advance, wherein the plurality of face features stored in advance are the face features of a plurality of authority users associated with the identification information of the lock;
and when the comparison result shows that the face images acquired by the plurality of authority users from the terminal by the server all have consistent faces, the server sends an unlocking instruction.
2. An encryption method, comprising:
a server acquires a registration request, wherein the registration request carries identification information of a lock to be encrypted;
the server acquires at least two face images sent by at least one terminal, wherein the at least two face images are associated with the identifier of the to-be-encrypted lock;
the server performs living body detection on the at least two face images;
extracting features of the at least two face images after passing live body detection;
establishing an incidence relation between the identifier of the lock to be encrypted and the characteristics of the at least two face images, so that the users corresponding to the characteristics of the at least two face images are authorized users, and the authorized users can unlock the lock through the server;
and encrypting the lock according to the association relation.
3. A server, comprising an unlocking device, the unlocking device comprising:
the first acquisition module is used for acquiring an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock;
the first acquisition module is further used for acquiring at least two face images sent by the terminal;
the first living body detection module is used for carrying out living body detection on the at least two face images;
the comparison module is used for extracting the features of the face image detected by the living body and comparing the extracted features with a plurality of face features stored in advance, wherein the plurality of face features stored in advance are the face features of a plurality of authority users associated with the identification information of the lock;
and the unlocking module is used for sending an unlocking instruction by the server when the comparison result of the comparison module shows that the face images acquired by the plurality of authority users from the terminal by the server all have consistent faces.
4. An unlocking method, comprising:
a terminal acquires a request of a user for unlocking, wherein the unlocking instruction carries identification information of a lock;
the terminal sends an unlocking request to the server, wherein the unlocking request carries identification information of the lock;
the terminal acquires an image acquired by image acquisition equipment connected with the terminal and acquires a face image from the image;
the terminal sends the face image to the server so that the server compares the face image with at least two authority user face characteristics associated with the identification information of the lock;
the terminal acquires an unlocking instruction sent by the server;
and the terminal communicates with the lock according to an unlocking instruction sent by the server to unlock the lock.
5. An encryption method, comprising:
a terminal sends a registration request to a server, wherein the registration request carries identification information of a lock to be encrypted;
the terminal acquires an image acquired by an image acquisition device connected with the terminal and acquires a face image from the image;
sending the face image to the server, wherein the face image is associated with the identification information of the lock to be encrypted;
acquiring an encryption instruction sent by the server, wherein the encryption instruction is sent by the server after the server establishes an association relation between the identifier of the to-be-encrypted lock and at least two facial image characteristics, and at least one of the at least two facial image characteristics is the facial image characteristic sent by the terminal;
and communicating according to the encryption instruction and the lock to be encrypted, and encrypting the lock.
6. A terminal, comprising an unlocking device, wherein the unlocking device comprises:
the third acquisition module is used for acquiring a request of a user for unlocking, and the unlocking instruction carries identification information of the lock;
the third sending module is used for sending an unlocking request to the server, wherein the unlocking request carries identification information of the lock;
the third acquisition module is further used for acquiring images acquired by image acquisition equipment connected with the terminal and acquiring face images from the images;
the third sending module is further configured to send the face image to the server, so that the server compares the face image with at least two authority user face features associated with the identification information of the lock;
the third obtaining module is further configured to obtain an unlocking instruction sent by the server;
and the third sending module is also used for communicating with the lock according to an unlocking instruction sent by the server and unlocking the lock.
7. A lock comprising a lock body, a communication unit for communicating with the terminal of claim 6, and a processor for encrypting or unlocking the lock body based on information obtained by the communication unit.
8. A computer device, comprising: the system comprises at least one processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface are communicated with each other through the communication bus; a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any of claims 1 or 2 or claims 4 or 5 to be implemented.
9. A chip, comprising: a processor for calling and running the computer program from the memory so that the device in which the chip is installed performs: the method of any one of claims 1 or 2 or claims 4 or 5.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method as set forth in any one of the preceding claims 1 or 2 or claims 4 or 5.
CN202010883932.0A 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock Pending CN111949966A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010883932.0A CN111949966A (en) 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010883932.0A CN111949966A (en) 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock

Publications (1)

Publication Number Publication Date
CN111949966A true CN111949966A (en) 2020-11-17

Family

ID=73366777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010883932.0A Pending CN111949966A (en) 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock

Country Status (1)

Country Link
CN (1) CN111949966A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800454A (en) * 2021-03-22 2021-05-14 北京焦点新干线信息技术有限公司 Case data processing method, related device and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100266132A1 (en) * 2009-04-15 2010-10-21 Microsoft Corporation Service-based key escrow and security for device data
CN106837058A (en) * 2017-01-13 2017-06-13 珠海易时代科技有限公司 A kind of high security refers to vein safe cabinet system and unlocking method
CN107733868A (en) * 2017-09-13 2018-02-23 深圳市三阶微控实业有限公司 Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN107808433A (en) * 2017-10-11 2018-03-16 燕南指通(北京)科技有限公司 Control method, system and the lockset of lockset

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100266132A1 (en) * 2009-04-15 2010-10-21 Microsoft Corporation Service-based key escrow and security for device data
CN106837058A (en) * 2017-01-13 2017-06-13 珠海易时代科技有限公司 A kind of high security refers to vein safe cabinet system and unlocking method
CN107733868A (en) * 2017-09-13 2018-02-23 深圳市三阶微控实业有限公司 Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN107808433A (en) * 2017-10-11 2018-03-16 燕南指通(北京)科技有限公司 Control method, system and the lockset of lockset

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800454A (en) * 2021-03-22 2021-05-14 北京焦点新干线信息技术有限公司 Case data processing method, related device and computer readable medium

Similar Documents

Publication Publication Date Title
US10755507B2 (en) Systems and methods for multifactor physical authentication
RU2718226C2 (en) Biometric data safe handling systems and methods
CN107113315B (en) Identity authentication method, terminal and server
CN105389500B (en) The method for unlocking another equipment using an equipment
US20210271745A1 (en) Authentication Methods and Systems
US20070223685A1 (en) Secure system and method of providing same
CN107274532A (en) The temporary password gate control system that encryption parameter dynamically updates
US11496471B2 (en) Mobile enrollment using a known biometric
US20140143860A1 (en) Two tier verification system and method
CN109858220A (en) Electronic contract signs method, apparatus, terminal device and storage medium
JP2009181561A (en) Security management system using biometric authentication
CN106687982A (en) Private data management system and method therefor
CN104469736A (en) Data processing method, server and terminal
CN115758398A (en) Access control data processing method and device, access control system and storage medium
CN112887922B (en) Message sending method and electronic equipment
CN111949966A (en) Encryption and unlocking method, server, terminal and lock
CN112329004A (en) Method and device for face recognition and face password
US20190028470A1 (en) Method For Verifying The Identity Of A Person
WO2018006349A1 (en) Method and system for verifying user entry based on picture password
US20210365531A1 (en) Method and electronic device for authenticating a user
CN115051812A (en) User identity dual-recognition method based on two-dimensional code and biological characteristics
CN110612712B (en) Online verification method and system for verifying identity of object
CN109344593B (en) Biological information verification method, verification server and entry and verification client
WO2022237550A1 (en) Access control authentication method, apparatus and system for preventing privacy leak
US20210397687A1 (en) Method for authenticating a user on client equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination