CN116992423A - Intelligent gun management system and method - Google Patents

Intelligent gun management system and method Download PDF

Info

Publication number
CN116992423A
CN116992423A CN202311260839.4A CN202311260839A CN116992423A CN 116992423 A CN116992423 A CN 116992423A CN 202311260839 A CN202311260839 A CN 202311260839A CN 116992423 A CN116992423 A CN 116992423A
Authority
CN
China
Prior art keywords
information
verification
biological information
verification code
biological
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311260839.4A
Other languages
Chinese (zh)
Inventor
周龙彬
杨树
冀清烈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongan Chuangke Shenzhen Technology Co ltd
Original Assignee
Zhongan Chuangke Shenzhen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongan Chuangke Shenzhen Technology Co ltd filed Critical Zhongan Chuangke Shenzhen Technology Co ltd
Priority to CN202311260839.4A priority Critical patent/CN116992423A/en
Publication of CN116992423A publication Critical patent/CN116992423A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/197Matching; Classification

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to the technical field of equipment management, and particularly discloses an intelligent gun management system and method. Compared with the prior art, the invention requires that an operator not only correctly inputs the first biological information which is the same as the second biological information, but also correctly obtains the second verification code which is the same as the first verification code, and further, the second verification information is calculated in the same way as the first verification information, so that the first verification information and the second verification information can be ensured to be matched, the difficulty of bypassing a verification system is greatly improved, the gun management security is improved, and the potential security risk is reduced.

Description

Intelligent gun management system and method
Technical Field
The invention relates to the technical field of equipment management, in particular to an intelligent gun management system and method.
Background
Biological information-based gun management methods rely on individual biometric features for identification and verification, such as fingerprint, retinal scan, voiceprint recognition, etc. By establishing a biological information database and a corresponding identification system, the management department can carry out identity confirmation and authorization management on the legal holder, thereby ensuring the safe use of the gun.
However, the existing gun management method based on biological information has a technical problem that the biological information may be counterfeited and the security is insufficient. Face recognition technology, fingerprint recognition technology and the like already have mature attack means, and a hacker or malicious person can bypass the verification system by imitating, forging or stealing biological information of a legal holder to acquire unauthorized gun use rights. This situation presents a potential risk to gun management, making gun management methods that rely on bioinformatics unreliable and secure. Therefore, it is an urgent technical problem to solve the security problem of the firearm management method based on biological information.
Disclosure of Invention
The invention aims to provide an intelligent gun management system and method, which solve the problem that the gun management system based on biological information is insufficient in safety because biological information can be forged at present.
The aim of the invention can be achieved by the following technical scheme:
an intelligent firearm management system comprising:
the information acquisition module is used for acquiring the identity mark of the operator and the first biological information;
the information extraction module is used for extracting second biological information corresponding to the identity of the operator from a preset biological information base;
the first analysis module is used for generating a first verification code and sending the first verification code to an operator, and obtaining first verification information based on the first verification code and the second biological information;
the second analysis module is used for acquiring a second verification code input by an operator and obtaining second verification information based on the second verification code and the first biological information;
and the verification module is used for matching the first verification information with the second verification information and carrying out gun management operation according to the matching result.
An intelligent firearm management method comprising:
acquiring the identity of an operator and first biological information;
extracting second biological information corresponding to the identity of the operator from a preset biological information base;
generating a first verification code and sending the first verification code to an operator, and obtaining first verification information based on the first verification code and the second biological information;
acquiring a second verification code input by an operator, and acquiring second verification information based on the second verification code and the first biological information;
and matching the first verification information with the second verification information, and performing gun management operation according to the matching result.
As a further aspect of the present invention, the obtaining the first verification information based on the first verification code and the second biological information includes:
extracting the characteristics of the second biological information to obtain a characteristic vector corresponding to the second biological information;
and calculating the feature vector corresponding to the second biological information and the first verification code to obtain first verification information.
As a further aspect of the present invention, the calculating the feature vector and the first verification code corresponding to the second biological information to obtain the first verification information includes:
the first authentication information is obtained by:
wherein T is the first verification information, V [ i ] is the element value at the ith position in the feature vector V corresponding to the second biological information, the dimension of the feature vector V corresponding to the second biological information is n, code [ j ] is the value at the jth position in the first verification code, and the length of the first verification code is m.
As a further aspect of the present invention, the second biometric information includes at least one biometric information; the extracting the features of the second biological information to obtain the feature vector corresponding to the second biological information includes:
extracting the characteristics of each type of biological identification information to obtain sub-characteristic vectors corresponding to each type of biological identification information;
and obtaining a characteristic vector corresponding to the second biological information according to the sub-characteristic vector corresponding to each type of biological identification information.
As a further aspect of the present invention, the obtaining a feature vector corresponding to the second biometric information according to the sub feature vector corresponding to each biometric information includes:
obtaining alignment feature vectors corresponding to each biological information according to the dimensions of the sub feature vectors corresponding to each biological identification information;
obtaining a feature vector corresponding to the second biological information by the following formula:
wherein Vx is an alignment feature vector corresponding to the xth biometric information, and the total number of types of biometric information is k.
As a further aspect of the present invention, the obtaining the second verification information based on the second verification code and the first biological information includes:
extracting the characteristics of the first biological information to obtain a characteristic vector corresponding to the first biological information;
and calculating the feature vector corresponding to the first biological information and the second verification code to obtain second verification information.
As a further aspect of the present invention, the matching the first verification information and the second verification information, performing a firearm management operation according to a matching result, includes:
comparing whether the first verification code and the second verification code are the same;
if the first verification code is the same as the second verification code, comparing whether the first verification information is the same as the second verification information;
and if the first verification information and the second verification information are the same, performing gun management operation.
As a further aspect of the present invention, the comparing whether the first authentication information and the second authentication information are identical includes:
if the first verification code is the same as the second verification code, comparing whether the first biological information is the same as the second biological information;
if the first biometric information and the second biometric information are the same, comparing whether the first authentication information and the second authentication information are the same.
The invention provides an intelligent gun management system and method, which comprises the steps of firstly acquiring an identity mark and first biological information of an operator, then extracting second biological information corresponding to the identity mark of the operator from a preset biological information base, generating a first verification code and sending the first verification code to the operator, acquiring the first verification information based on the first verification code and the second biological information, simultaneously acquiring a second verification code input by the operator, acquiring the second verification information based on the second verification code and the first biological information, finally matching the first verification information and the second verification information, and carrying out gun management operation according to a matching result. Compared with the prior art, the invention performs verification through the first verification information and the second verification information, which requires that an operator not only correctly inputs the first biological information which is the same as the second biological information, but also correctly obtains the second verification code which is the same as the first verification code, and further calculates the second verification information in the same way as the first verification information, so that the first verification information and the second verification information can be matched. In practice, only operators who simultaneously and correctly master the information in the three dimensions can manage the firearm through the verification of the system, so that the difficulty of bypassing the verification system is greatly improved, the safety of firearm management is improved, and the potential safety risk is reduced.
It should be noted that, the information (including but not limited to user equipment information, user personal information, etc.), data (including but not limited to data for analysis, stored data, presented data, etc.), and signals related to the present disclosure are all authorized by the user or are fully authorized by the parties, and the collection, use, and processing of relevant data is required to comply with relevant laws and regulations and standards of relevant countries and regions.
Drawings
The invention is further described below with reference to the accompanying drawings.
FIG. 1 is a system architecture diagram of the intelligent firearm management system of the present invention;
FIG. 2 is a method flow diagram of the intelligent firearm management method of the present invention;
FIG. 3 is a flowchart illustrating a method of step S203 in FIG. 2;
fig. 4 is a flowchart of the method of step S301 in fig. 3.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the present invention is an intelligent firearm management system 100, comprising:
the information acquisition module 110 is configured to acquire an identity of an operator and first biological information;
the information extraction module 120 is configured to extract second biological information corresponding to an identity of an operator from a preset biological information base;
the first analysis module 130 is configured to generate a first verification code and send the first verification code to an operator, and obtain first verification information based on the first verification code and the second biological information;
the second analysis module 140 is configured to obtain a second verification code input by an operator, and obtain second verification information based on the second verification code and the first biological information;
and the verification module 150 is used for matching the first verification information and the second verification information and performing gun management operation according to the matching result.
In practice, the information acquisition module 110 and the second analysis module 140 may be implemented in a client, such as a mobile phone software, a control end of a gun management facility. The operator can input the identity, the first biological information, the second verification code and the like at the client. And the client is also used for calculating the first verification information according to the input second verification code.
The information extraction module 120, the first analysis module 130, and the verification module 150 may be implemented in an operation end, for example, a server, a hardware facility for performing a gun management operation (such as a door lock of a gun cabinet, a warehouse door lock of a warehouse for storing guns, etc.), where the first verification code generated by the operation end may be sent to an operator by means of a mobile phone short message, etc., and the operator inputs the received first verification code as a second verification code into the client, and calculates the second verification information by the client and sends the second verification information to the operation end. The operation end identifies the identity of the operator according to the matching of the first verification information and the second verification information which are calculated locally, and after verification, the operator can be allowed to carry out subsequent gun management operation, such as sending a signal to unlock the gun cabinet to allow the operator to carry out gun taking, gun returning and other operations.
Compared with the prior art, the invention performs verification through the first verification information and the second verification information, which requires that an operator not only correctly inputs the first biological information which is the same as the second biological information, but also correctly obtains the second verification code which is the same as the first verification code, and further calculates the second verification information in the same way as the first verification information, so that the first verification information and the second verification information can be matched. In practice, only operators who simultaneously and correctly master the information in the three dimensions can manage the firearm through the verification of the system, so that the difficulty of bypassing the verification system is greatly improved, the safety of firearm management is improved, and the potential safety risk is reduced.
The invention also provides an intelligent gun management method, which is shown in fig. 2, and comprises the following steps:
s201, acquiring an identity mark of an operator and first biological information;
s202, extracting second biological information corresponding to the identity of an operator from a preset biological information base;
s203, generating a first verification code and sending the first verification code to an operator, and obtaining first verification information based on the first verification code and the second biological information;
s204, acquiring a second verification code input by an operator, and acquiring second verification information based on the second verification code and the first biological information;
s205, matching the first verification information with the second verification information, and performing gun management operation according to a matching result.
Likewise, the steps S201, S204 described above may be run in the client, and the steps S202, S203, and S205 may be run in the operation terminal.
Specifically, in a preferred embodiment, in step S201, the identity information is information indicating the identity of the operator. The first biological information is information capable of biological recognition, such as fingerprint, voiceprint, iris, face, etc.
Specifically, in a preferred embodiment, in the step S202, the preset biometric information base is manually preset, and the identity of the personnel allowed to perform the gun management operation and the second biometric information corresponding to each personnel are recorded. The second biological information is the same kind as the first biological information.
Further, in a preferred embodiment, in the step S203, the first verification code may be generated randomly, and the first verification code may be sent to the operator through a mobile phone short message, a telephone notification, etc., and the operator inputs the first verification code as the second verification code into the system, and only the operator who knows the first verification code correctly can input the second verification code identical to the first verification code, thereby improving verification security.
Furthermore, in a preferred embodiment, in step S203, the obtaining the first verification information based on the first verification code and the second biometric information includes:
s301, extracting characteristics of the second biological information to obtain a characteristic vector corresponding to the second biological information;
s302, calculating the feature vector corresponding to the second biological information and the first verification code to obtain first verification information.
The process of calculating the first verification information is divided into two parts, wherein one part is required to extract the feature vector of the second biological information in a specific mode, and the other part is required to operate the feature vector and the verification code by adopting a specific rule. Therefore, an operator can obtain correct second verification information identical to the first verification information only by accurately mastering the two-part calculation method, the calculation difficulty of the second verification information is improved, the probability of cracking the second verification information is reduced, and the safety is further improved.
Specifically, in a preferred embodiment, in the step S302, the calculating the feature vector and the first verification code corresponding to the second biometric information to obtain the first verification information includes:
the first authentication information is obtained by:
wherein T is the first verification information, V [ i ] is the element value at the ith position in the feature vector V corresponding to the second biological information, the dimension of the feature vector V corresponding to the second biological information is n, code [ j ] is the value at the jth position in the first verification code, and the length of the first verification code is m.
The meaning of the above formula is that each element value in the feature vector of the second biological information is multiplied by each value in the verification code respectively, and summed to obtain a value as the first verification information. In the calculation process, the information in the feature vector V is reserved and corresponds to the second biological information of the operator, and the formula can be regarded as optimizing operation on the first verification code based on the characteristics of the second biological information to obtain a feature value capable of reflecting the characteristics of the second biological information and the numerical rule of the first verification code at the same time and is used as the first verification information, so that the method has certain scientific rationality.
It will be appreciated that the above procedure is merely an example of a preferred embodiment, and that in practice, other ways of obtaining the first verification information may be used, for example: the first verification code is also used as a vector, which is called as a verification code vector, the sum of the feature vector corresponding to the second biological information and the verification code vector is calculated, and the obtained vector is used as the first verification information.
In practice, even if the above process of calculating the first verification information is disclosed, the operator still needs to extract the correct feature vector from the second biological information in a correct manner, so as to ensure that the second verification information and the first verification information which are finally obtained are the same, which is sufficient to see the security of the present invention.
Further, in a preferred embodiment, the second biometric information comprises at least one biometric information; referring to fig. 4, in the step S301, the extracting the features of the second biological information to obtain feature vectors corresponding to the second biological information includes:
s401, extracting the characteristics of each type of biological identification information to obtain sub-characteristic vectors corresponding to each type of biological identification information;
s402, obtaining a feature vector corresponding to the second biological information according to the sub-feature vector corresponding to each type of biological identification information.
The second biological information may include multiple kinds of biological identification information, and in this embodiment, the feature vectors corresponding to the second biological information are obtained by using multiple kinds of biological identification information at the same time, so as to further improve the security of the system.
Specifically, the above step S401 shows that, for each type of biometric information, the operator needs to grasp the correct extraction method to extract the sub-feature vector correctly, to ensure that it obtains the same second authentication information,
the above S402 indicates that the operator can obtain the correct second verification information not only by correctly grasping the feature extraction process of each biometric information, but also by correctly grasping the method of fusing the plurality of sub-feature vectors into the feature vector of the second biometric information. The combination of the two points greatly improves the difficulty of bypassing verification and enhances the safety of the invention.
The present invention also provides a more detailed embodiment for clearly illustrating the above step S401:
in this embodiment, the plurality of types of biometric information are fingerprint identification information, iris identification information, face identification information, and voiceprint identification information, respectively, wherein:
fingerprint identification: fingerprint identification is based on the unique pattern of the fingerprint. The fingerprint pattern of each individual is unique and includes ridges, branches, endings, etc. of the minutiae. The fingerprint identification technology extracts the characteristics of fingerprints and performs matching by collecting and comparing fingerprint images, thereby determining the identity of a person.
Fingerprint recognition can obtain corresponding sub-feature vectors by:
1. and (3) detecting a detail point: by identifying ridge minutiae points (bifurcation points and end points) in the fingerprint image, its position and orientation are determined.
2. And (3) generating a directional diagram: and calculating the direction information of each point in the fingerprint image by using an algorithm to form a direction diagram.
3. Extracting a feature map: and constructing a feature vector representing fingerprint details and directivity according to the minutiae points and the direction diagram in the fingerprint image.
Iris recognition: iris recognition is based on the texture of the iris of the human eye. The iris is positioned between the pupil and cornea of human eyes, and has rich textures and lines. The iris recognition technology uses a special camera device to acquire iris images, extracts the characteristics of the iris through image processing and a pattern recognition algorithm, and then compares the iris characteristics with stored iris characteristics to verify the identity.
Iris recognition can obtain corresponding sub-feature vectors by:
1. texture analysis: texture features in the iris image are extracted by applying texture analysis algorithms (e.g., gabor filters, local binary patterns, etc.).
2. Feature coding: based on the texture characteristics, coding and modeling are carried out, and the iris image is converted into a characteristic vector.
Face recognition: face recognition is based on features of a face. The face recognition technology acquires a face image using an image pickup apparatus, and extracts features of the face, such as positions, shapes, and proportional relationships of eyes, nose, mouth, and the like, using image processing and a pattern recognition algorithm. The system then identifies and verifies the identity by comparing the stored facial features.
Facial recognition may result in corresponding sub-feature vectors by:
1. and (3) key point detection: the positions of key points, such as eyes, nose, mouth, etc., in the face image are determined using face detection and key point localization algorithms.
2. Extracting feature descriptors: and extracting feature descriptors or feature vectors according to the positions and morphological features of the key points, and representing a human face.
Voiceprint recognition: voiceprint recognition is based on the voice characteristics of a person. Voiceprint recognition techniques use a microphone or microphones to collect and record a voice sample of an individual, and then use voice signal processing and pattern recognition algorithms to extract characteristic parameters of the voice, such as pitch, audio spectrum, etc. The system then compares the extracted voiceprint features to stored voiceprint features to determine the identity of a person.
Voiceprint recognition can obtain corresponding sub-feature vectors by:
1. audio signal analysis: the recorded sound is preprocessed, e.g. noise removed, normalized, etc.
2. Feature extraction: features such as frequency spectrum, formant position, intensity, tone and the like of sound are extracted by utilizing a sound signal processing algorithm such as Fourier transform, cepstrum analysis, linear predictive coding and the like to form voiceprint feature vectors.
It will be appreciated that the above-described processes are all prior art and therefore their specific details are not described in great detail herein. In practice, specific feature extraction rules may be manually set to extract sub-feature vectors corresponding to the biometric information.
Further, in a preferred embodiment, the step S402 obtains a feature vector corresponding to the second biometric information according to the sub-feature vector corresponding to each biometric information, which specifically includes:
obtaining alignment feature vectors corresponding to each biological information according to the dimensions of the sub feature vectors corresponding to each biological identification information;
obtaining a feature vector corresponding to the second biological information by the following formula:
wherein Vx is an alignment feature vector corresponding to the xth biometric information, and the total number of types of biometric information is k.
The formula is that the feature vector corresponding to the final second biological information keeps the feature of each biological identification information by means of the sum of each alignment feature vector, so that the scientific rationality and the interpretability of verification are improved. It will be appreciated that in practice, other manners may be adopted to obtain the feature vector corresponding to the second biological information according to the multiple sub-feature vectors, for example, splicing, making a difference, and the like, with respect to the multiple sub-feature vectors.
In practice, different biometric techniques and feature extraction algorithms may generate sub-feature vectors of different dimensions. For example, a sub-feature vector in fingerprint recognition may contain hundreds or even thousands of elements, while a sub-feature vector in facial recognition may be relatively short. Therefore, when performing an operation, it is necessary to perform an alignment operation on a plurality of sub-feature vectors, and convert all the sub-feature vectors into vectors with the same dimension, for example:
and taking the longest sub-feature vector as a reference, and carrying out zero padding on the remaining sub-feature vectors lower than the dimension of the reference vector to enable the dimension of the sub-feature vector to reach the dimension of the reference vector, thereby obtaining the alignment feature vector corresponding to each biological information. The method is simple and easy to implement, but can generate a large number of meaningless zero values in the data, waste the storage space and influence the operation efficiency.
For another example, the sub-feature vector remaining higher than the reference vector dimension is truncated with the shortest sub-feature vector as a reference, so that the sub-feature vectors have the same dimension. Such a method can reduce the amount of data, but may lose characteristic information of the biometric information. In practice, the two modes can be combined, and a plurality of sub-feature vectors are aligned with moderate preset latitude values, so that the existing vectors are intercepted in the process, and zero-filling vectors are also available, thereby achieving the purposes of considering low data volume and retaining certain features.
The above-described vector dimension unification process may employ any prior art, and thus is not described herein.
Further, in a preferred embodiment, in step S204, the obtaining the second verification information based on the second verification code and the first biological information specifically includes:
extracting the characteristics of the first biological information to obtain a characteristic vector corresponding to the first biological information;
and calculating the feature vector corresponding to the first biological information and the second verification code to obtain second verification information.
It will be appreciated that the above step S203 is actually performed: based on the first verification code and the second biometric information, first verification information is obtained, and in step S204, the above steps are performed: based on the second verification code and the first biological information, the process of obtaining the second verification information needs to be the same, so that the operator can be guaranteed to pass the verification correctly, which is in the way of space limitation, only the step S203 is described in detail herein, and for the step S204, a person skilled in the art can perform comparative understanding according to the above embodiment (i.e. the first verification code corresponds to the second verification code, the second biological information corresponds to the first biological information, and the first verification information corresponds to the second verification information), so that no excessive description is made herein.
Further, in order to further improve the security, the present invention may directly compare whether the first verification information and the second verification information are the same to determine whether the operator passes the verification, and in a preferred embodiment, the step S205 includes:
comparing whether the first verification code and the second verification code are the same;
if the first verification code is the same as the second verification code, comparing whether the first verification information is the same as the second verification information;
and if the first verification information and the second verification information are the same, performing gun management operation.
The process further combines the comparison of the first verification code and the second verification code on the basis of comparing the first verification information and the second verification information, so that the accuracy of comparison is further improved, the verification requirement is improved, and the safety is enhanced.
Still further, in the step S205, comparing whether the first verification information and the second verification information are the same includes:
if the first verification code is the same as the second verification code, comparing whether the first biological information is the same as the second biological information;
if the first biometric information and the second biometric information are the same, comparing whether the first authentication information and the second authentication information are the same.
The above process further compares the first biological information with the second biological information on the basis of comparing the first verification code with the second verification code, further improves the accuracy of comparison, improves the verification requirement, and enhances the safety.
The invention provides an intelligent gun management system and method, which comprises the steps of firstly acquiring an identity mark and first biological information of an operator, then extracting second biological information corresponding to the identity mark of the operator from a preset biological information base, generating a first verification code and sending the first verification code to the operator, acquiring the first verification information based on the first verification code and the second biological information, simultaneously acquiring a second verification code input by the operator, acquiring the second verification information based on the second verification code and the first biological information, finally matching the first verification information and the second verification information, and carrying out gun management operation according to a matching result. Compared with the prior art, the invention performs verification through the first verification information and the second verification information, which requires that an operator not only correctly inputs the first biological information which is the same as the second biological information, but also correctly obtains the second verification code which is the same as the first verification code, and further calculates the second verification information in the same way as the first verification information, so that the first verification information and the second verification information can be matched. In practice, only operators who simultaneously and correctly master the information in the three dimensions can manage the firearm through the verification of the system, so that the difficulty of bypassing the verification system is greatly improved, the safety of firearm management is improved, and the potential safety risk is reduced.
The foregoing describes one embodiment of the present invention in detail, but the description is only a preferred embodiment of the present invention and should not be construed as limiting the scope of the invention. All equivalent changes and modifications within the scope of the present invention are intended to be covered by the present invention.

Claims (9)

1. An intelligent firearm management system, comprising:
the information acquisition module is used for acquiring the identity mark of the operator and the first biological information;
the information extraction module is used for extracting second biological information corresponding to the identity of the operator from a preset biological information base;
the first analysis module is used for generating a first verification code and sending the first verification code to an operator, and obtaining first verification information based on the first verification code and the second biological information;
the second analysis module is used for acquiring a second verification code input by an operator and obtaining second verification information based on the second verification code and the first biological information;
and the verification module is used for matching the first verification information with the second verification information and carrying out gun management operation according to the matching result.
2. An intelligent firearm management method, comprising:
acquiring the identity of an operator and first biological information;
extracting second biological information corresponding to the identity of the operator from a preset biological information base;
generating a first verification code and sending the first verification code to an operator, and obtaining first verification information based on the first verification code and the second biological information;
acquiring a second verification code input by an operator, and acquiring second verification information based on the second verification code and the first biological information;
and matching the first verification information with the second verification information, and performing gun management operation according to the matching result.
3. The intelligent firearm management method according to claim 2, wherein the obtaining the first verification information based on the first verification code and the second biological information comprises:
extracting the characteristics of the second biological information to obtain a characteristic vector corresponding to the second biological information;
and calculating the feature vector corresponding to the second biological information and the first verification code to obtain first verification information.
4. The intelligent gun management method according to claim 3, wherein the computing the feature vector corresponding to the second biological information and the first verification code to obtain the first verification information comprises:
the first authentication information is obtained by:
wherein T is the first verification information, V [ i ] is the element value at the ith position in the feature vector V corresponding to the second biological information, the dimension of the feature vector V corresponding to the second biological information is n, code [ j ] is the value at the jth position in the first verification code, and the length of the first verification code is m.
5. The intelligent firearm management method according to claim 4, wherein the second biometric information comprises at least one biometric information; the extracting the features of the second biological information to obtain the feature vector corresponding to the second biological information includes:
extracting the characteristics of each type of biological identification information to obtain sub-characteristic vectors corresponding to each type of biological identification information;
and obtaining a characteristic vector corresponding to the second biological information according to the sub-characteristic vector corresponding to each type of biological identification information.
6. The intelligent gun management method according to claim 5, wherein the obtaining the feature vector corresponding to the second biometric information according to the sub feature vector corresponding to each biometric information comprises:
obtaining alignment feature vectors corresponding to each biological information according to the dimensions of the sub feature vectors corresponding to each biological identification information;
obtaining a feature vector corresponding to the second biological information by the following formula:
wherein Vx is an alignment feature vector corresponding to the xth biometric information, and the total number of types of biometric information is k.
7. The intelligent firearm management method according to claim 2, wherein the obtaining the second verification information based on the second verification code and the first biological information comprises:
extracting the characteristics of the first biological information to obtain a characteristic vector corresponding to the first biological information;
and calculating the feature vector corresponding to the first biological information and the second verification code to obtain second verification information.
8. The intelligent firearm management method according to claim 2, wherein the matching the first verification information and the second verification information, performing a firearm management operation according to the matching result, comprises:
comparing whether the first verification code and the second verification code are the same;
if the first verification code is the same as the second verification code, comparing whether the first verification information is the same as the second verification information;
and if the first verification information and the second verification information are the same, performing gun management operation.
9. The intelligent firearm management method according to claim 8, wherein comparing whether the first verification information and the second verification information are identical comprises:
if the first verification code is the same as the second verification code, comparing whether the first biological information is the same as the second biological information;
if the first biometric information and the second biometric information are the same, comparing whether the first authentication information and the second authentication information are the same.
CN202311260839.4A 2023-09-27 2023-09-27 Intelligent gun management system and method Pending CN116992423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311260839.4A CN116992423A (en) 2023-09-27 2023-09-27 Intelligent gun management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311260839.4A CN116992423A (en) 2023-09-27 2023-09-27 Intelligent gun management system and method

Publications (1)

Publication Number Publication Date
CN116992423A true CN116992423A (en) 2023-11-03

Family

ID=88534231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311260839.4A Pending CN116992423A (en) 2023-09-27 2023-09-27 Intelligent gun management system and method

Country Status (1)

Country Link
CN (1) CN116992423A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124269A (en) * 2013-03-05 2013-05-29 桂林电子科技大学 Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN103345601A (en) * 2013-06-28 2013-10-09 无锡华御信息技术有限公司 Identity recording and verification system based on radio frequency
CN105553926A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Authentication method, server, and terminal
CN109067766A (en) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 A kind of identity identifying method, server end and client
CN111600869A (en) * 2020-05-13 2020-08-28 济南大学 Verification code authentication method and system based on biological characteristics

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124269A (en) * 2013-03-05 2013-05-29 桂林电子科技大学 Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN103345601A (en) * 2013-06-28 2013-10-09 无锡华御信息技术有限公司 Identity recording and verification system based on radio frequency
CN105553926A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Authentication method, server, and terminal
CN109067766A (en) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 A kind of identity identifying method, server end and client
CN111600869A (en) * 2020-05-13 2020-08-28 济南大学 Verification code authentication method and system based on biological characteristics

Similar Documents

Publication Publication Date Title
US20180204080A1 (en) System for multiple algorithm processing of biometric data
US7212655B2 (en) Fingerprint verification system
You et al. On hierarchical palmprint coding with multiple features for personal identification in large databases
US7039221B1 (en) Facial image verification utilizing smart-card with integrated video camera
KR100297833B1 (en) Speaker verification system using continuous digits with flexible figures and method thereof
US11496471B2 (en) Mobile enrollment using a known biometric
Maiorana et al. Cancelable biometrics for hmm-based signature recognition
US7085403B2 (en) Automatic fingerprint identification method
CN111611437A (en) Method and device for preventing face voiceprint verification and replacement attack
JP3590285B2 (en) Biological information recognition device and method
JPH11253426A (en) Method and device for verifying biological feature and storage medium
CN103888258A (en) Biological feature template anti-theft discriminating method
CN116992423A (en) Intelligent gun management system and method
Dimaunahan et al. Raspberry Pi and IOT Based-automated teller machine security for the DSWD 4P's biometric system using fingerprint recognition with fast-fourier transform image enhancement, multi-stage minutia extraction
CN105245497B (en) A kind of identity identifying method and device
Sharma et al. Human recognition methods based on biometric technologies
JPH0729001A (en) Individual identification device
Adisa et al. An improved vehicle registration and licensing system
US11997087B2 (en) Mobile enrollment using a known biometric
Melin et al. Human Recognition using Face, Fingerprint and Voice
Roja et al. Fingerprint verification system—a fusion approach
CN117853103A (en) Payment system activation method based on intelligent bracelet
Chaudhary et al. Approach for protection of iris template using cancelable biometrics
Choudhary et al. Secured Automated Certificate Creation Based on Multimodal Biometric Verification
CN115967541A (en) Zero-trust network security biometric identification device and use method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination