CN108446549A - A kind of acquisition methods of equipment control all permissions - Google Patents

A kind of acquisition methods of equipment control all permissions Download PDF

Info

Publication number
CN108446549A
CN108446549A CN201810220856.8A CN201810220856A CN108446549A CN 108446549 A CN108446549 A CN 108446549A CN 201810220856 A CN201810220856 A CN 201810220856A CN 108446549 A CN108446549 A CN 108446549A
Authority
CN
China
Prior art keywords
user
target user
information
attribute information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810220856.8A
Other languages
Chinese (zh)
Inventor
史晓娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Huarui Electronic Technology Co Ltd
Original Assignee
Dongguan Huarui Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Huarui Electronic Technology Co Ltd filed Critical Dongguan Huarui Electronic Technology Co Ltd
Priority to CN201810220856.8A priority Critical patent/CN108446549A/en
Publication of CN108446549A publication Critical patent/CN108446549A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A kind of acquisition methods of equipment control all permissions of the present invention, the method includes:The verification information of target user's input is received by the control platform in terminal;Judge whether the verification information is verified;If being verified, the terminal obtains the networked information of the target user;Determine that the actual attribute information of the target user, the actual attribute information are used to indicate the identity type of the target user according to the networked information;The terminal judges whether the actual attribute information is consistent with the target property information that the target user has prestored;If consistent, the terminal obtains the corresponding control all permissions of the target user.So the present invention has also used networked information other than using monomer information, improves equipment control all permissions and obtain reliability, it is ensured that equipment control security.

Description

A kind of acquisition methods of equipment control all permissions
Technical field
The invention belongs to the acquisition methods that control process field more particularly to a kind of equipment control all permissions.
Technical field
With the continuous development of data network in recent years, more and more it is related to network-control in the life of user, in order to The safety for ensureing control, will often carry out corresponding priority assignation, to ensure the safely controllable property of relevant device operating.
Generally for the network-control of equipment, it is all based on corresponding terminal and carries out operation and control, and setting for permission Set, generally setting when, be configured just for the permission of terminal, for different terminals different controls is set Limit, to ensure the reliability of operation and the order of control, to reach safe control effect.It results in so different If user goes operation equipment using same terminal, it is likely that the appearance of the situations such as corresponding risky operation occur, that is, there is phase The security risk answered.
Invention content
The present invention provides the acquisition methods that a kind of equipment controls all permissions.Control can accurately be adjusted at any time to equipment All permissions processed so that the operating of equipment can be with safe operation.
In order to achieve the above objectives, the present invention adopts the following technical scheme that:A kind of acquisition methods of equipment control all permissions, The method includes:
The verification information of target user's input is received by the control platform in terminal;
Judge whether the verification information is verified;
If being verified, the terminal obtains the networked information of the target user;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information Show the identity type of the target user;
The terminal judges the target property information one whether the actual attribute information has prestored with the target user It causes;
If consistent, the terminal obtains the corresponding control all permissions of the target user.
Preferably, before the networked information that terminal obtains the target user, judge whether the target user is live body User.
Preferably, the camera for starting the terminal built-in is identified the face area of target user, judges target Whether user blinks whithin a period of time, if so, determining that target user is live body user.
Preferably, the camera is the rotatable camera of two axis being set in the terminal.
Preferably, after scanning the face area for determining target user, terminal determines the location parameter of itself, and then basis should Location parameter adjusts shooting area, so that shooting area is capable of always the face area of coverage goal user.
Preferably, include come the process for adjusting scanning area according to the location parameter:
When terminal is overlooked or is looked up, terminal obtains pitch angle by the location parameter, and the pitch angle is used for The angle that instruction terminal deviates downward or upward;
The terminal calculates the adjustment angle of the camera according to the pitch angle using following formula;
The terminal is according to the shooting angle for adjusting the angle the adjustment camera, so that shooting area always can The face area of enough coverage goal users;
Or,
(the Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) for institute The coordinate of shooting area is stated, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area Angle, the m be the camera length, the dxFor the camera and the face area of the target user Vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
Preferably, the process for obtaining the networked information of the target user includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, which points out the connection that information is the target user Net information.
Preferably, information is pointed out according to attribute and determines that the process of the actual attribute information of the target user includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes The contact person of target user and the target user;
Relationship is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Iterate to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported Probability;
For the target user, using the highest candidate attribute information of third probability as the practical category of the target user Property information, the target user belong to each user.
Preferably, the calculating process of the first probability:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint The quantity of the contact person of what value.
Preferably, the calculating process of the second probability:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j When, the βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, institute State βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
In the present invention, when terminal determines that the verification information of target user's input is verified, terminal can also obtain target use The networked information at family, and determine according to networked information the actual attribute information of target user, the actual attribute information is for indicating The identity type of target user, only when terminal determines the target property information one that actual attribute information has prestored with target user When cause, the corresponding control ownership of the target user is obtained, so the present invention also uses other than using monomer information Networked information improves control security.
Description of the drawings
Invention is described further below in conjunction with the accompanying drawings:
Fig. 1 is a kind of flow chart for the acquisition methods embodiment that present device controls all permissions;
Fig. 2 is another flow chart for the acquisition methods embodiment that present device controls all permissions.
Specific implementation mode
Embodiment:
As shown in Figure 1, a kind of acquisition methods of equipment control all permissions, the method includes:Pass through the control in terminal Platform processed receives the verification information of target user's input;Judge whether the verification information is verified;If being verified, institute State the networked information that terminal obtains the target user;The actual attribute letter of the target user is determined according to the networked information Breath, the actual attribute information are used to indicate the identity type of the target user;The terminal judges the actual attribute letter Whether breath is consistent with the target property information that the target user has prestored;If consistent, the terminal obtains the target and uses The corresponding control ownership in family.
That is, in order to which the controllable of safety controls equipment implementation, need to carry out permission to corresponding target user Setting, i.e. the user of different rights is different for the controlling extent of equipment.Assuming that a scene, one can complicated operation set Standby, higher level operation user can operate equipment comprehensively, and technical capability and operational capacity meet to the comprehensive of equipment Operation, and low-level operation user, can only operate the partial function of equipment, different attribute informations has corresponded to user Operable permission.Low-level operation user is avoided in this way occurs equipment operation failure because of maloperation.It also avoids simultaneously Because the difference of the horizontal difference of operation or permission, is arranged more nominal operation terminal.In addition it also avoids because of terminal Loss so that other staff's malicious operation equipment is likely to occur.
In the prior art, the verification information of target user is inputted, there are various ways, such as pass through fingerprint, face Etc. modes carry out.But when if there is malicious operation, it is likely that by the photo of target user or pattern etc. its His mode controls all permissions to obtain equipment.
Therefore, in order to further ensure safety that equipment uses, as shown in Fig. 2, obtaining the target in terminal Before the networked information of user, judge whether the target user is live body user.Start the camera of the terminal built-in at this time, The face area of target user is identified, judges whether target user blinks whithin a period of time, if so, determining target User is live body user.In the present embodiment, the camera is the rotatable camera of two axis being set in the terminal.
Since the parameters such as target user's face orientation may change, in order to ensure that camera is capable of alignment target user's Face needs to start camera progress surrounding scanning, and after scanning the face area for determining target user, terminal determines the position of itself Parameter is set, shooting area is then adjusted according to the location parameter, so that shooting area is capable of always coverage goal user's Face area.
Include come the process for adjusting scanning area according to the location parameter:
When terminal is overlooked or is looked up, terminal obtains pitch angle by the location parameter, and the pitch angle is used for The angle that instruction terminal deviates downward or upward;
The terminal calculates the adjustment angle of the camera according to the pitch angle using following formula;
The terminal is according to the shooting angle for adjusting the angle the adjustment camera, so that shooting area always can The face area of enough coverage goal users;
Or,
(the Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) for institute The coordinate of shooting area is stated, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area Angle, the m are the length of the camera, the dxIt hangs down for the face area of the camera and the target user Straight distance, the dzFor the horizontal distance of the camera and the face area of the target user.
In the above-described embodiments, the process for obtaining the networked information of the target user includes:
Read the contact person in the high in the clouds address list of the target user;Contact person is obtained to point out the attribute of the target user Information, the attribute point out the networked information that information is the target user.Information, which is pointed out, according to attribute determines the target user The process of actual attribute information include:The of each candidate attribute information of each user of information initializing is pointed out according to the attribute One probability, each user include the contact person of target user and the target user;According to each candidate attribute of each user Attribute between the first probability and each user of information points out that relationship iterates to calculate each candidate attribute information of each user Two probability;When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported Probability;For the target user, using the highest candidate attribute information of third probability as the actual attribute of the target user Information, the target user belong to each user.
In the present embodiment, the calculating process of the first probability:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint The quantity of the contact person of what value.
In the present embodiment, the calculating process of the second probability:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;The α is iterative rate control parameter, The α is constant, and the α is used to adjust the speed of iterative calculation;The βkFor weight coefficient, when user k points out the category of user i Property information be j, and the attribute information of user k also be j when, the βkThe first numerical value is taken, when user k points out the attribute letter of user i Breath be j, and the attribute information of user k be j when, the βkSecond value, first numerical value is taken to be more than the second value; The m is the total quantity of all types attribute information;There is attribute to refer to the user i in the contact person that the n is the user i Recognize the quantity of the contact person of relationship.
In the present invention, when terminal determines that the verification information of target user's input is verified, terminal can also obtain target use The networked information at family, and determine according to networked information the actual attribute information of target user, the actual attribute information is for indicating The identity type of target user, only when terminal determines the target property information one that actual attribute information has prestored with target user When cause, the corresponding control ownership of the target user is obtained, so the present invention also uses other than using monomer information Networked information improves control security.
In addition to above preferred embodiment, the present invention also has other embodiments, those skilled in the art can be according to this Invention makes various changes and modifications, and without departing from the spirit of the present invention, should all belong to appended claims of the present invention and determine The range of justice.

Claims (10)

1. a kind of acquisition methods of equipment control all permissions, which is characterized in that the method includes:
The verification information of target user's input is received by the control platform in terminal;
Judge whether the verification information is verified;
If being verified, the terminal obtains the networked information of the target user;
The actual attribute information of the target user is determined according to the networked information, the actual attribute information is for indicating institute State the identity type of target user;
The terminal judges whether the actual attribute information is consistent with the target property information that the target user has prestored;
If consistent, the terminal obtains the corresponding control all permissions of the target user.
2. the acquisition methods of equipment control all permissions according to claim 1, which is characterized in that described in being obtained in terminal Before the networked information of target user, judge whether the target user is live body user.
3. the acquisition methods of equipment control all permissions according to claim 2, which is characterized in that start in the terminal The face area of target user is identified in the camera set, and judges whether target user blinks whithin a period of time, if It is, it is determined that target user is live body user.
4. the acquisition methods of equipment control all permissions according to claim 3, which is characterized in that the camera is to set The rotatable camera of two axis being placed in the terminal.
5. the acquisition methods of equipment control all permissions according to claim 3, which is characterized in that scanning determines that target is used After the face area at family, terminal determines the location parameter of itself, then adjusts shooting area according to the location parameter, so that Shooting area is capable of always the face area of coverage goal user.
6. the acquisition methods of equipment control all permissions according to claim 5, which is characterized in that according to the location parameter Process to adjust scanning area includes:
When terminal is overlooked or is looked up, terminal obtains pitch angle by the location parameter, and the pitch angle is used to indicate The angle that terminal deviates downward or upward;
The terminal calculates the adjustment angle of the camera according to the pitch angle using following formula;
The terminal is according to the shooting angle for adjusting the angle the adjustment camera, so that shooting area can cover always Cover the face area of target user;
Or,
(the Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) it is the shooting The coordinate in region, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the visual angle of the shooting area Degree, the m are the length of the camera, the dxFor the camera it is vertical with the face area of the target user away from From the dzFor the horizontal distance of the camera and the face area of the target user.
7. the acquisition methods of equipment control all permissions according to claim 1, which is characterized in that obtain the target and use The process of the networked information at family includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, which points out the networking letter that information is the target user Breath.
8. the acquisition methods of equipment control all permissions according to claim 7, which is characterized in that point out letter according to attribute Breath determines that the process of the actual attribute information of the target user includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes target The contact person of user and the target user;
Relationship iteration is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third for exporting each candidate attribute information of each user when iteration ends is general Rate;
For the target user, believe the highest candidate attribute information of third probability as the actual attribute of the target user Breath, the target user belong to each user.
9. the acquisition methods of equipment control all permissions according to claim 8, which is characterized in that the calculating of the first probability Process:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact person that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i Quantity;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is any value Contact person quantity.
10. the acquisition methods of equipment control all permissions according to claim 9, which is characterized in that the meter of the second probability Calculation process:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j, institute State βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, the βkIt takes Second value, first numerical value are more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
CN201810220856.8A 2018-03-16 2018-03-16 A kind of acquisition methods of equipment control all permissions Pending CN108446549A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810220856.8A CN108446549A (en) 2018-03-16 2018-03-16 A kind of acquisition methods of equipment control all permissions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810220856.8A CN108446549A (en) 2018-03-16 2018-03-16 A kind of acquisition methods of equipment control all permissions

Publications (1)

Publication Number Publication Date
CN108446549A true CN108446549A (en) 2018-08-24

Family

ID=63195686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810220856.8A Pending CN108446549A (en) 2018-03-16 2018-03-16 A kind of acquisition methods of equipment control all permissions

Country Status (1)

Country Link
CN (1) CN108446549A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216887A (en) * 2008-01-04 2008-07-09 浙江大学 An automatic computer authentication method for photographic faces and living faces
CN105847127A (en) * 2016-05-04 2016-08-10 腾讯科技(深圳)有限公司 User attribute information determination method and server
CN105933215A (en) * 2016-07-09 2016-09-07 东莞市华睿电子科技有限公司 Chat message withdraw control method based on instant messaging

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216887A (en) * 2008-01-04 2008-07-09 浙江大学 An automatic computer authentication method for photographic faces and living faces
CN105847127A (en) * 2016-05-04 2016-08-10 腾讯科技(深圳)有限公司 User attribute information determination method and server
CN105933215A (en) * 2016-07-09 2016-09-07 东莞市华睿电子科技有限公司 Chat message withdraw control method based on instant messaging

Similar Documents

Publication Publication Date Title
US9749788B2 (en) Positioning mobile terminal based on electromagnetic signals
CN107170068B (en) Movable attendance checking method based on scene and image recognition
JP5045128B2 (en) Face recognition device
CN106603422A (en) Network steal prevention method of wireless router, and wireless router
CN102509044B (en) Mouse behavior characteristic-based password authentication method
JP2014085708A (en) Image processing apparatus, image processing method, and image processing program
CN112232324B (en) Face fake-verifying method and device, computer equipment and storage medium
JP2019046507A (en) Information processing device, information processing system, control method, and program
CN109905393B (en) E-commerce login method based on cloud security
CN108335394A (en) A kind of long-range control method of intelligent door lock
JP3531663B2 (en) Personal authentication device
CN106685797A (en) Method for verifying identity based on instant communication
KR101250616B1 (en) An access right control method and device in social networks
CN109802915A (en) A kind of telecommunication fraud detection processing method and device
CN108446549A (en) A kind of acquisition methods of equipment control all permissions
CN114245071A (en) Intelligent monitoring early warning method and device and monitoring system
US11025602B1 (en) Method, apparatus and computer program product for performing authentication using multiple user devices
KR101815144B1 (en) Photo sharing method basedon face recognition AND Photo sharing system using the same
JP2017072979A (en) Authentication system, authentication server, provider server, and user terminal
KR102139703B1 (en) Mask distribution apparatus based on concentration of fine dust and system including the same
CN107464261A (en) A kind of view data demarcation training method and its equipment, storage medium, server
CN110764427A (en) Method, system and computer readable storage medium for sharing control authority
CN110021101A (en) A kind of intelligent entrance guard control method and intelligent access control system
CN108449337A (en) A kind of password method for retrieving
CN111278015B (en) Location service privacy protection method for resisting distribution correlation attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180824

WD01 Invention patent application deemed withdrawn after publication