CN108446549A - A kind of acquisition methods of equipment control all permissions - Google Patents
A kind of acquisition methods of equipment control all permissions Download PDFInfo
- Publication number
- CN108446549A CN108446549A CN201810220856.8A CN201810220856A CN108446549A CN 108446549 A CN108446549 A CN 108446549A CN 201810220856 A CN201810220856 A CN 201810220856A CN 108446549 A CN108446549 A CN 108446549A
- Authority
- CN
- China
- Prior art keywords
- user
- target user
- information
- attribute information
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Collating Specific Patterns (AREA)
Abstract
A kind of acquisition methods of equipment control all permissions of the present invention, the method includes:The verification information of target user's input is received by the control platform in terminal;Judge whether the verification information is verified;If being verified, the terminal obtains the networked information of the target user;Determine that the actual attribute information of the target user, the actual attribute information are used to indicate the identity type of the target user according to the networked information;The terminal judges whether the actual attribute information is consistent with the target property information that the target user has prestored;If consistent, the terminal obtains the corresponding control all permissions of the target user.So the present invention has also used networked information other than using monomer information, improves equipment control all permissions and obtain reliability, it is ensured that equipment control security.
Description
Technical field
The invention belongs to the acquisition methods that control process field more particularly to a kind of equipment control all permissions.
Technical field
With the continuous development of data network in recent years, more and more it is related to network-control in the life of user, in order to
The safety for ensureing control, will often carry out corresponding priority assignation, to ensure the safely controllable property of relevant device operating.
Generally for the network-control of equipment, it is all based on corresponding terminal and carries out operation and control, and setting for permission
Set, generally setting when, be configured just for the permission of terminal, for different terminals different controls is set
Limit, to ensure the reliability of operation and the order of control, to reach safe control effect.It results in so different
If user goes operation equipment using same terminal, it is likely that the appearance of the situations such as corresponding risky operation occur, that is, there is phase
The security risk answered.
Invention content
The present invention provides the acquisition methods that a kind of equipment controls all permissions.Control can accurately be adjusted at any time to equipment
All permissions processed so that the operating of equipment can be with safe operation.
In order to achieve the above objectives, the present invention adopts the following technical scheme that:A kind of acquisition methods of equipment control all permissions,
The method includes:
The verification information of target user's input is received by the control platform in terminal;
Judge whether the verification information is verified;
If being verified, the terminal obtains the networked information of the target user;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information
Show the identity type of the target user;
The terminal judges the target property information one whether the actual attribute information has prestored with the target user
It causes;
If consistent, the terminal obtains the corresponding control all permissions of the target user.
Preferably, before the networked information that terminal obtains the target user, judge whether the target user is live body
User.
Preferably, the camera for starting the terminal built-in is identified the face area of target user, judges target
Whether user blinks whithin a period of time, if so, determining that target user is live body user.
Preferably, the camera is the rotatable camera of two axis being set in the terminal.
Preferably, after scanning the face area for determining target user, terminal determines the location parameter of itself, and then basis should
Location parameter adjusts shooting area, so that shooting area is capable of always the face area of coverage goal user.
Preferably, include come the process for adjusting scanning area according to the location parameter:
When terminal is overlooked or is looked up, terminal obtains pitch angle by the location parameter, and the pitch angle is used for
The angle that instruction terminal deviates downward or upward;
The terminal calculates the adjustment angle of the camera according to the pitch angle using following formula;
The terminal is according to the shooting angle for adjusting the angle the adjustment camera, so that shooting area always can
The face area of enough coverage goal users;
Or,
(the Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) for institute
The coordinate of shooting area is stated, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area
Angle, the m be the camera length, the dxFor the camera and the face area of the target user
Vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
Preferably, the process for obtaining the networked information of the target user includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, which points out the connection that information is the target user
Net information.
Preferably, information is pointed out according to attribute and determines that the process of the actual attribute information of the target user includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes
The contact person of target user and the target user;
Relationship is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user
Iterate to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported
Probability;
For the target user, using the highest candidate attribute information of third probability as the practical category of the target user
Property information, the target user belong to each user.
Preferably, the calculating process of the first probability:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i
The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint
The quantity of the contact person of what value.
Preferably, the calculating process of the second probability:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j;
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j
When, the βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, institute
State βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
In the present invention, when terminal determines that the verification information of target user's input is verified, terminal can also obtain target use
The networked information at family, and determine according to networked information the actual attribute information of target user, the actual attribute information is for indicating
The identity type of target user, only when terminal determines the target property information one that actual attribute information has prestored with target user
When cause, the corresponding control ownership of the target user is obtained, so the present invention also uses other than using monomer information
Networked information improves control security.
Description of the drawings
Invention is described further below in conjunction with the accompanying drawings:
Fig. 1 is a kind of flow chart for the acquisition methods embodiment that present device controls all permissions;
Fig. 2 is another flow chart for the acquisition methods embodiment that present device controls all permissions.
Specific implementation mode
Embodiment:
As shown in Figure 1, a kind of acquisition methods of equipment control all permissions, the method includes:Pass through the control in terminal
Platform processed receives the verification information of target user's input;Judge whether the verification information is verified;If being verified, institute
State the networked information that terminal obtains the target user;The actual attribute letter of the target user is determined according to the networked information
Breath, the actual attribute information are used to indicate the identity type of the target user;The terminal judges the actual attribute letter
Whether breath is consistent with the target property information that the target user has prestored;If consistent, the terminal obtains the target and uses
The corresponding control ownership in family.
That is, in order to which the controllable of safety controls equipment implementation, need to carry out permission to corresponding target user
Setting, i.e. the user of different rights is different for the controlling extent of equipment.Assuming that a scene, one can complicated operation set
Standby, higher level operation user can operate equipment comprehensively, and technical capability and operational capacity meet to the comprehensive of equipment
Operation, and low-level operation user, can only operate the partial function of equipment, different attribute informations has corresponded to user
Operable permission.Low-level operation user is avoided in this way occurs equipment operation failure because of maloperation.It also avoids simultaneously
Because the difference of the horizontal difference of operation or permission, is arranged more nominal operation terminal.In addition it also avoids because of terminal
Loss so that other staff's malicious operation equipment is likely to occur.
In the prior art, the verification information of target user is inputted, there are various ways, such as pass through fingerprint, face
Etc. modes carry out.But when if there is malicious operation, it is likely that by the photo of target user or pattern etc. its
His mode controls all permissions to obtain equipment.
Therefore, in order to further ensure safety that equipment uses, as shown in Fig. 2, obtaining the target in terminal
Before the networked information of user, judge whether the target user is live body user.Start the camera of the terminal built-in at this time,
The face area of target user is identified, judges whether target user blinks whithin a period of time, if so, determining target
User is live body user.In the present embodiment, the camera is the rotatable camera of two axis being set in the terminal.
Since the parameters such as target user's face orientation may change, in order to ensure that camera is capable of alignment target user's
Face needs to start camera progress surrounding scanning, and after scanning the face area for determining target user, terminal determines the position of itself
Parameter is set, shooting area is then adjusted according to the location parameter, so that shooting area is capable of always coverage goal user's
Face area.
Include come the process for adjusting scanning area according to the location parameter:
When terminal is overlooked or is looked up, terminal obtains pitch angle by the location parameter, and the pitch angle is used for
The angle that instruction terminal deviates downward or upward;
The terminal calculates the adjustment angle of the camera according to the pitch angle using following formula;
The terminal is according to the shooting angle for adjusting the angle the adjustment camera, so that shooting area always can
The face area of enough coverage goal users;
Or,
(the Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) for institute
The coordinate of shooting area is stated, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area
Angle, the m are the length of the camera, the dxIt hangs down for the face area of the camera and the target user
Straight distance, the dzFor the horizontal distance of the camera and the face area of the target user.
In the above-described embodiments, the process for obtaining the networked information of the target user includes:
Read the contact person in the high in the clouds address list of the target user;Contact person is obtained to point out the attribute of the target user
Information, the attribute point out the networked information that information is the target user.Information, which is pointed out, according to attribute determines the target user
The process of actual attribute information include:The of each candidate attribute information of each user of information initializing is pointed out according to the attribute
One probability, each user include the contact person of target user and the target user;According to each candidate attribute of each user
Attribute between the first probability and each user of information points out that relationship iterates to calculate each candidate attribute information of each user
Two probability;When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported
Probability;For the target user, using the highest candidate attribute information of third probability as the actual attribute of the target user
Information, the target user belong to each user.
In the present embodiment, the calculating process of the first probability:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i
The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint
The quantity of the contact person of what value.
In the present embodiment, the calculating process of the second probability:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j;
The Vi,jFor the second probability of the candidate attribute information j of the user i;The α is iterative rate control parameter,
The α is constant, and the α is used to adjust the speed of iterative calculation;The βkFor weight coefficient, when user k points out the category of user i
Property information be j, and the attribute information of user k also be j when, the βkThe first numerical value is taken, when user k points out the attribute letter of user i
Breath be j, and the attribute information of user k be j when, the βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;There is attribute to refer to the user i in the contact person that the n is the user i
Recognize the quantity of the contact person of relationship.
In the present invention, when terminal determines that the verification information of target user's input is verified, terminal can also obtain target use
The networked information at family, and determine according to networked information the actual attribute information of target user, the actual attribute information is for indicating
The identity type of target user, only when terminal determines the target property information one that actual attribute information has prestored with target user
When cause, the corresponding control ownership of the target user is obtained, so the present invention also uses other than using monomer information
Networked information improves control security.
In addition to above preferred embodiment, the present invention also has other embodiments, those skilled in the art can be according to this
Invention makes various changes and modifications, and without departing from the spirit of the present invention, should all belong to appended claims of the present invention and determine
The range of justice.
Claims (10)
1. a kind of acquisition methods of equipment control all permissions, which is characterized in that the method includes:
The verification information of target user's input is received by the control platform in terminal;
Judge whether the verification information is verified;
If being verified, the terminal obtains the networked information of the target user;
The actual attribute information of the target user is determined according to the networked information, the actual attribute information is for indicating institute
State the identity type of target user;
The terminal judges whether the actual attribute information is consistent with the target property information that the target user has prestored;
If consistent, the terminal obtains the corresponding control all permissions of the target user.
2. the acquisition methods of equipment control all permissions according to claim 1, which is characterized in that described in being obtained in terminal
Before the networked information of target user, judge whether the target user is live body user.
3. the acquisition methods of equipment control all permissions according to claim 2, which is characterized in that start in the terminal
The face area of target user is identified in the camera set, and judges whether target user blinks whithin a period of time, if
It is, it is determined that target user is live body user.
4. the acquisition methods of equipment control all permissions according to claim 3, which is characterized in that the camera is to set
The rotatable camera of two axis being placed in the terminal.
5. the acquisition methods of equipment control all permissions according to claim 3, which is characterized in that scanning determines that target is used
After the face area at family, terminal determines the location parameter of itself, then adjusts shooting area according to the location parameter, so that
Shooting area is capable of always the face area of coverage goal user.
6. the acquisition methods of equipment control all permissions according to claim 5, which is characterized in that according to the location parameter
Process to adjust scanning area includes:
When terminal is overlooked or is looked up, terminal obtains pitch angle by the location parameter, and the pitch angle is used to indicate
The angle that terminal deviates downward or upward;
The terminal calculates the adjustment angle of the camera according to the pitch angle using following formula;
The terminal is according to the shooting angle for adjusting the angle the adjustment camera, so that shooting area can cover always
Cover the face area of target user;
Or,
(the Xworld, Zworld) be the target user face area coordinate, (the Xcamera, Zcamera) it is the shooting
The coordinate in region, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the visual angle of the shooting area
Degree, the m are the length of the camera, the dxFor the camera it is vertical with the face area of the target user away from
From the dzFor the horizontal distance of the camera and the face area of the target user.
7. the acquisition methods of equipment control all permissions according to claim 1, which is characterized in that obtain the target and use
The process of the networked information at family includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, which points out the networking letter that information is the target user
Breath.
8. the acquisition methods of equipment control all permissions according to claim 7, which is characterized in that point out letter according to attribute
Breath determines that the process of the actual attribute information of the target user includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes target
The contact person of user and the target user;
Relationship iteration is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user
Calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third for exporting each candidate attribute information of each user when iteration ends is general
Rate;
For the target user, believe the highest candidate attribute information of third probability as the actual attribute of the target user
Breath, the target user belong to each user.
9. the acquisition methods of equipment control all permissions according to claim 8, which is characterized in that the calculating of the first probability
Process:
First probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact person that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i
Quantity;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is any value
Contact person quantity.
10. the acquisition methods of equipment control all permissions according to claim 9, which is characterized in that the meter of the second probability
Calculation process:
Following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j;
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j, institute
State βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, the βkIt takes
Second value, first numerical value are more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220856.8A CN108446549A (en) | 2018-03-16 | 2018-03-16 | A kind of acquisition methods of equipment control all permissions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220856.8A CN108446549A (en) | 2018-03-16 | 2018-03-16 | A kind of acquisition methods of equipment control all permissions |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108446549A true CN108446549A (en) | 2018-08-24 |
Family
ID=63195686
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810220856.8A Pending CN108446549A (en) | 2018-03-16 | 2018-03-16 | A kind of acquisition methods of equipment control all permissions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108446549A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216887A (en) * | 2008-01-04 | 2008-07-09 | 浙江大学 | An automatic computer authentication method for photographic faces and living faces |
CN105847127A (en) * | 2016-05-04 | 2016-08-10 | 腾讯科技(深圳)有限公司 | User attribute information determination method and server |
CN105933215A (en) * | 2016-07-09 | 2016-09-07 | 东莞市华睿电子科技有限公司 | Chat message withdraw control method based on instant messaging |
-
2018
- 2018-03-16 CN CN201810220856.8A patent/CN108446549A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216887A (en) * | 2008-01-04 | 2008-07-09 | 浙江大学 | An automatic computer authentication method for photographic faces and living faces |
CN105847127A (en) * | 2016-05-04 | 2016-08-10 | 腾讯科技(深圳)有限公司 | User attribute information determination method and server |
CN105933215A (en) * | 2016-07-09 | 2016-09-07 | 东莞市华睿电子科技有限公司 | Chat message withdraw control method based on instant messaging |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9749788B2 (en) | Positioning mobile terminal based on electromagnetic signals | |
CN107170068B (en) | Movable attendance checking method based on scene and image recognition | |
JP5045128B2 (en) | Face recognition device | |
CN106603422A (en) | Network steal prevention method of wireless router, and wireless router | |
CN102509044B (en) | Mouse behavior characteristic-based password authentication method | |
JP2014085708A (en) | Image processing apparatus, image processing method, and image processing program | |
CN112232324B (en) | Face fake-verifying method and device, computer equipment and storage medium | |
JP2019046507A (en) | Information processing device, information processing system, control method, and program | |
CN109905393B (en) | E-commerce login method based on cloud security | |
CN108335394A (en) | A kind of long-range control method of intelligent door lock | |
JP3531663B2 (en) | Personal authentication device | |
CN106685797A (en) | Method for verifying identity based on instant communication | |
KR101250616B1 (en) | An access right control method and device in social networks | |
CN109802915A (en) | A kind of telecommunication fraud detection processing method and device | |
CN108446549A (en) | A kind of acquisition methods of equipment control all permissions | |
CN114245071A (en) | Intelligent monitoring early warning method and device and monitoring system | |
US11025602B1 (en) | Method, apparatus and computer program product for performing authentication using multiple user devices | |
KR101815144B1 (en) | Photo sharing method basedon face recognition AND Photo sharing system using the same | |
JP2017072979A (en) | Authentication system, authentication server, provider server, and user terminal | |
KR102139703B1 (en) | Mask distribution apparatus based on concentration of fine dust and system including the same | |
CN107464261A (en) | A kind of view data demarcation training method and its equipment, storage medium, server | |
CN110764427A (en) | Method, system and computer readable storage medium for sharing control authority | |
CN110021101A (en) | A kind of intelligent entrance guard control method and intelligent access control system | |
CN108449337A (en) | A kind of password method for retrieving | |
CN111278015B (en) | Location service privacy protection method for resisting distribution correlation attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180824 |
|
WD01 | Invention patent application deemed withdrawn after publication |