CN108537030A - Management method, device and the electronic equipment of identity-based identification - Google Patents

Management method, device and the electronic equipment of identity-based identification Download PDF

Info

Publication number
CN108537030A
CN108537030A CN201810352341.3A CN201810352341A CN108537030A CN 108537030 A CN108537030 A CN 108537030A CN 201810352341 A CN201810352341 A CN 201810352341A CN 108537030 A CN108537030 A CN 108537030A
Authority
CN
China
Prior art keywords
information
identity
user
manager
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810352341.3A
Other languages
Chinese (zh)
Inventor
何国勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201810352341.3A priority Critical patent/CN108537030A/en
Publication of CN108537030A publication Critical patent/CN108537030A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides management method, device and the electronic equipments of a kind of identification of identity-based, are related to data storage and secrecy technology field, and this method is applied to off-line type testimony of a witness verification terminal, including:When receiving the first access request of the first user, the identity identification information of the first user is obtained;Identity identification information includes at least one of:Image information, bone information, gait information and voice messaging;Whether identity identification information and the pre-stored manager's identity information for verifying the first user are consistent;If consistent, the corresponding management function of the first access request is opened.Management method, device and the electronic equipment of identity-based identification provided in an embodiment of the present invention, only corresponding management function is opened in the case where verifying unanimous circumstances, the sensitive data in testimony of a witness verification terminal can be accessed to avoid unauthorized user, improve privacy degrees and the safety of data storage and management.

Description

Management method, device and the electronic equipment of identity-based identification
Technical field
The present invention relates to data storage and secrecy technology fields, more particularly, to a kind of manager of identity-based identification Method, device and electronic equipment.
Background technology
Off-line type testimony of a witness verifying system collection face real time image collection, ID card information acquisition, the testimony of a witness 1:1 identification, black and white List 1:The functions such as N identifications are widely used in the industries such as business, security protection in one, can be applied to attendance, gate inhibition, real name are recognized The multiple fields such as card, safety check.Such as it is exactly that one of which is typically applied that the testimony of a witness, which veritifies all-in-one machine,.
Compared with online testimony of a witness verifying system, off-line type testimony of a witness verifying system is due to preposition matching identification algorithm, i.e., Make that in the case where being detached from network matching identification task can also be completed.In the case where being detached from network, for the original of comparison Data and comparison result data need to be temporarily stored on the headend equipment of testimony of a witness verifying system, can be by number after restoring network connection According to being synchronized to background management system or manual synchronization to background management system.The data storage method of this forward type is just The sensibility and confidentiality demand of initial data and comparing result data bring risk.
In view of the above-mentioned problems, not proposing effective solution also.
Invention content
In view of this, the purpose of the present invention is to provide management method, device and the electronics of a kind of identification of identity-based to set It is standby, privacy degrees and the safety of data storage and management can be improved.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, an embodiment of the present invention provides a kind of management method of identity-based identification, it is applied to off-line type people Verification terminal is demonstrate,proved, including:When receiving the first access request of the first user, the identity identification information of the user is obtained; The identity identification information includes at least one of:Image information, bone information, gait information and voice messaging;Verification institute Whether identity identification information and the pre-stored manager's identity information for stating the first user are consistent;If consistent, described in unlatching The corresponding management function of first access request.
Further, an embodiment of the present invention provides the first possible embodiments of first aspect, wherein the testimony of a witness The input interface of verification terminal includes at least one of:Touch screen, keyboard, handwriting pad, mouse or microphone;The method is also Including:There is provided the input interface corresponding access control to the first user, to receive the access request of first user.
Further, an embodiment of the present invention provides second of possible embodiments of first aspect, wherein the testimony of a witness Verification terminal includes photographic device and/or voice input device;The identity identification information for obtaining first user includes:Pass through The photographic device acquires image information, bone information or the gait information of first user;Described image information include with It is at least one lower:Facial image, fingerprint image and iris image;And/or acquire described first by the voice input device The voice messaging of user.
Further, an embodiment of the present invention provides the third possible embodiments of first aspect, wherein described in verification The identity identification information of first user and pre-stored first manager identity information whether include unanimously:Pass through target nerve Network carries out feature extraction to the identity identification information, obtains identification characteristic information;Compare the identification feature Whether information and pre-stored manager's identity information are consistent.
Further, an embodiment of the present invention provides the 4th kind of possible embodiments of first aspect, wherein described in verification Identity identification information and pre-stored manager's identity information whether include unanimously:Verify the identity identification information in advance Whether the super keepe identity information of storage is consistent;If so, opening the corresponding management function of the access request and including:It is aobvious Show the corresponding managing authority information interface of the super keepe and/or be managed function voice prompt, so that described first User is managed permission modification.
Further, an embodiment of the present invention provides the 5th kind of possible embodiments of first aspect, wherein when receiving When the bottom library management request of the first user, show that the corresponding managing authority information interface of the super keepe includes:Display institute State super keepe corresponding bottom library management interface;Bottom library management interface includes newly-increased, change and deletion common management administrator The management options of authority information.
Further, an embodiment of the present invention provides the 7th kind of possible embodiments of first aspect, wherein described in verification Identity identification information and pre-stored manager's identity information whether include unanimously:Verify the identity identification information in advance Whether common management administrator's identity information of storage is consistent;If so, opening the corresponding management function of the access request and including:It is aobvious Show that the corresponding testimony of a witness of the access request veritifies data management interface;The testimony of a witness veritifies data management interface and includes newly-increased, becomes The management options of data are more veritified with the deletion testimony of a witness.
Further, an embodiment of the present invention provides the 8th kind of possible embodiments of first aspect, wherein when receiving When the second access request of second user, the identity identification information of the second user is obtained;Verify whether exist and described the Second consistent manager's identity information of the identity identification information of two users;If it does, determining the second manager identity The administration authority of information;Open the corresponding management function of the administration authority.
Further, an embodiment of the present invention provides the 9th kind of possible embodiment of first aspect, further include:If institute The identity identification information for stating the first user is consistent with the first manager identity information, searches the identity identification information and corresponds to Administration authority;Opening the corresponding management function of the access request includes:Open the corresponding management function of the administration authority.
Further, an embodiment of the present invention provides the tenth kind of possible embodiments of first aspect, wherein described in determining The administration authority of second manager's identity information includes:Determine the matched management of the identity identification information of the second user Manager's grade belonging to person's identity information;Search the corresponding administration authority of manager's grade, and by the administrative power Limit is as the corresponding administration authority of the identity identification information.
Further, an embodiment of the present invention provides a kind of the tenth possible embodiments of first aspect, wherein opens institute Stating the corresponding management function of administration authority includes:Show the corresponding managing authority information interface of the administration authority and/or progress Management function voice prompt, so that the user is managed permission modification.
Further, an embodiment of the present invention provides the 12nd kind of possible embodiments of first aspect, wherein is opening After the corresponding management function of the administration authority, the method further includes:Receive third permission modification information input by user And it stores;The permission modification information includes:Identification modification information and the corresponding management of the identification modification information Permission.
Further, an embodiment of the present invention provides the 13rd kind of possible embodiments of first aspect, wherein receives the Three permission modification informations input by user and store include:When the identification modification information is image information, pass through mesh Mark the feature of neural network extraction described image information;The feature of described image information is stored, and deletes described image information.
Second aspect, the embodiment of the present invention also provide a kind of managing device of identity-based identification, are applied to off-line type people Verification terminal is demonstrate,proved, including:Identity identification information acquisition module, for when receiving the access request of user, obtaining the use The identity identification information at family;The identity identification information includes at least one of:Image information, bone information, gait information And voice messaging;Authentication module, for verify the identity identification information and pre-stored manager's identity information whether one It causes;If opening module opens the corresponding management of the access request under for verifying unanimous circumstances in the authentication module Function.
The third aspect an embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in described On memory and the computer program that can run on the processor, the processor are realized when executing the computer program The step of first aspect any one of them method.
Fourth aspect, an embodiment of the present invention provides a kind of the computer-readable of program code that can perform with processor The step of medium, said program code makes the processor execute first aspect any one of them method.
An embodiment of the present invention provides management method, device and the electronic equipments of a kind of identification of identity-based, when receiving When the access request of user, whether identity identification information and the pre-stored manager's identity information for verifying the user are consistent, And the corresponding management function of the access request is only opened in the case where verifying unanimous circumstances, so that user carries out information management, from And the sensitive data in testimony of a witness verification terminal can be accessed to avoid unauthorized user, the secrecy of data storage and management can be improved Degree and safety.
Other feature and advantage of the disclosure will illustrate in the following description, alternatively, Partial Feature and advantage can be with Deduce from specification or unambiguously determine, or by implement the disclosure above-mentioned technology it can be learnt that.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, other drawings may also be obtained based on these drawings.
Fig. 1 shows a kind of structural schematic diagram for electronic system that the embodiment of the present invention is provided;
Fig. 2 shows a kind of management method flow charts for identity-based identification that the embodiment of the present invention is provided;
Fig. 3 shows a kind of flow chart of the management method for common management administrator that the embodiment of the present invention is provided;
Fig. 4 shows a kind of structure diagram of the managing device for identity-based identification that the embodiment of the present invention is provided;
Fig. 5 shows the structure diagram of the managing device for another identity-based identification that the embodiment of the present invention is provided;
Fig. 6 shows the structure diagram of the managing device for another identity-based identification that the embodiment of the present invention is provided;
Fig. 7 shows the structure diagram of the managing device for another identity-based identification that the embodiment of the present invention is provided.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, shall fall within the protection scope of the present invention.
Online testimony of a witness verifying system, needs to rely on and is stored in the comparison recognizer in high in the clouds or server end and original Database, when being authenticated veritification, headend equipment needs the data to be verified currently acquired being uploaded to the high in the clouds or the clothes It is engaged in device end, the headend equipment, headend equipment root being back to after the high in the clouds or the server end are compared, then by comparing result Respective operations are carried out according to the comparing result, such as is turned on and off corresponding permission, permission or refusal and passes through.Therefore it needs to protect The real-time communication for holding the headend equipment and the high in the clouds or the server end can not be used if communication cannot keep and is somebody's turn to do Wire type testimony of a witness verifying system.
Off-line type testimony of a witness verifying system, can be preposition by above-mentioned comparison recognizer and database, i.e., above-mentioned comparison identification Algorithm and raw data base are stored in headend equipment, need not upload data to be verified in real time to high in the clouds or server end, There is no need to receive the comparing result of return, it can be operated in and be detached from the state of network.The off-line type testimony of a witness veritifies the decorum de- Matching identification task can also be completed in the case of off-network network, obtained comparing result is also stored in the headend equipment.Extensive Comparing result can be synchronized to background management system or manual synchronization to background management system after multiple network connection.
However the data storage method of this forward type is just the sensibility and secrecy of initial data and comparing result data Property demand brings risk, and disabled user is likely to be obtained or distorts the initial data or comparing result data.It is asked to improve this Phase can be used in topic, a kind of management method, device and the electronic equipment of identity-based identification provided in an embodiment of the present invention, the technology The software and hardware answered is realized, off-line type testimony of a witness verification terminal is can be applied to.The off-line type testimony of a witness verification terminal can be attendance Verification terminal, gate inhibition's verification terminal, real-name authentication verification terminal, the testimony of a witness veritify all-in-one machine or safety check verification terminal etc..It is right below The embodiment of the present invention describes in detail.
Embodiment one:
First, describe referring to Fig.1 for realizing the embodiment of the present invention identity-based identify management method, device and The example electronic system 100 of electronic equipment.
A kind of structural schematic diagram of electronic system as shown in Figure 1, electronic system 100 include one or more processing equipments 102, one or more storage devices 104.Optionally, electronic system 100 shown in Fig. 1 can also include input unit 106, output Device 108 and identity identification information harvester 110, the connection that these components pass through bus system 112 and/or other forms Mechanism (not shown) interconnection.It should be noted that the component and structure of electronic system 100 shown in FIG. 1 are only exemplary, rather than limit Property processed, as needed, the electronic system can also have other assemblies and structure.
The processing equipment 102 can be gateway, or intelligent terminal, or include central processing unit (CPU), the processing of image processing unit (GPU) or the other forms with data-handling capacity and/or instruction execution capability The equipment of unit can handle the data of other components in the electronic system 100, can also control the electronics Other components in system 100 are to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy The property lost memory is such as may include random access memory (RAM) and/or cache memory (cache).It is described non- Volatile memory is such as may include read-only memory (ROM), hard disk, flash memory.In the computer readable storage medium On can store one or more computer program instructions, processing equipment 102 can run described program instruction, to realize hereafter The client functionality (realized by processing equipment) in the embodiment of the present invention and/or other desired functions.Institute Various application programs and various data can also be stored by stating in computer readable storage medium, such as the application program uses And/or the various data etc. generated.
The input unit 106 can be the device that user is used for inputting instruction, and may include keyboard, mouse, wheat One or more of gram wind and touch screen etc..
The output device 108 can export various information (for example, image or sound) to external (for example, user), and And may include one or more of display, loud speaker etc..
The identity identification information harvester 110 can shoot the desired image of user (such as photo, video etc.), and And captured image is stored in the storage device 104 so that other components use.Illustratively, which believes It can be image collecting device or fingerprint sensor to cease harvester 110.
Illustratively, the management method for realizing identity-based according to the ... of the embodiment of the present invention identification, apparatus and system Example electronic system in each device can be integrally disposed, can also scattering device, such as by processing equipment 102, storage fill It sets 104, input unit 106 and output device 108 is integrally disposed in one, and identity identification information harvester 110 is detached Setting.
For ease of understanding, the application example of the electronic system of the present embodiment is described further below.The electronic system It can be with installation settings in the various places for needing veritification identity.
Illustratively, the management method for realizing identity-based according to the ... of the embodiment of the present invention identification, the example of device Electronic equipment may be implemented as such as off-line type testimony of a witness verification terminal can be attendance verification terminal, gate inhibition's verification terminal, Real-name authentication verification terminal, the testimony of a witness veritify all-in-one machine or safety check verification terminal etc..
Embodiment two:
A kind of management method of identity-based identification is present embodiments provided, this method is held by off-line type testimony of a witness verification terminal Row.
According to embodiments of the present invention, the embodiment for providing a kind of management method of identity-based identification needs to illustrate It is that step shown in the flowchart of the accompanying drawings can execute in the computer system of such as a group of computer-executable instructions, Also, although logical order is shown in flow charts, and it in some cases, can be to be executed different from sequence herein Shown or described step.
Fig. 2 is a kind of flow chart of the management method of identity-based identification according to the ... of the embodiment of the present invention, as shown in Fig. 2, This method comprises the following steps:
Step S202 obtains the identity identification information of the first user when receiving the first access request of the first user.
When off-line type testimony of a witness verification terminal receives the request of user's access sensitive data, need to obtain the above-mentioned of user Identity identification information.The sensitive data includes initial data and comparing result data, can also include administration authority data.
In embodiments of the present invention, testimony of a witness verification terminal can receive above-mentioned access request in several ways, accordingly, The input interface of testimony of a witness verification terminal includes at least one of:Touch screen, keyboard, handwriting pad, mouse or microphone.Testimony of a witness core Test terminal provides above-mentioned input interface corresponding access control to the first user, to receive the access request of first user.Example As user can ask to access by clicking corresponding button on the touchscreen, or point beating keyboard (including entity button etc.) It asks to access, handwriting input instruction on the jotting surface asks to access, or passes through mouse and click corresponding button on interface To ask to access, or phonetic order sent out to ask to access by Mike's wind direction terminal.
Above-mentioned identity identification information may include at least one of:Image information, bone information, gait information and voice Information.In one embodiment, the image information of user can be acquired by shooting style by camera, camera etc..
Step S204, whether the identity identification information and pre-stored first manager identity information of the first user of verification Unanimously.If so, executing step S206;If not, executing step S210.
Wherein, it is previously stored with manager's identity information in testimony of a witness verification terminal, which corresponds to not Same administration authority.If the identity identification information of the first user obtained and above-mentioned pre-stored manager's identity information one It causes, then shows that first user has corresponding administration authority, above-mentioned sensitive data can be operated.If inconsistent, Then show first user without legal administration authority, refusal is needed to open the corresponding management function of above-mentioned administration authority at this time.
The initial data stored in testimony of a witness verification terminal, or be bottom library, it can be extracted with target nerve network The form storage of feature, therefore before whether verification identity identification information and pre-stored manager's identity information consistent, Feature extraction is carried out to identity identification information firstly the need of by target nerve network, obtains identification characteristic information;Then Compare the identification characteristic information and whether pre-stored manager's identity information is consistent.
Step S206 opens the corresponding management function of above-mentioned first access request.
After verification is consistent, testimony of a witness verification terminal can open the corresponding management function of above-mentioned first access request, such as By way of showing the corresponding administration interface of access request or it can be managed the mode of function voice prompt, it can also The two carries out jointly, can be changed into row information thereby using family.For example, can be shown in the display device of testimony of a witness verification terminal The administration interface for showing common management administrator increases for user, deletes or changes common management administrator's account and corresponding permission newly.Again For example, " common tube can please be input by the sound-producing device outgoing management function voice prompt of testimony of a witness verification terminal, such as prompt Reason person's information ", " image information that common management administrator please be input ", " authority information that common management administrator please be select " etc., Yong Huke To be managed permission modification according to voice prompt.
Step S208, refusal open the corresponding management function of above-mentioned first access request.
If verification identity identification information and pre-stored manager's identity information it is inconsistent, show the user without Permission needed for the access request, the corresponding management function of the above-mentioned access request of refusal unlatching at this time.
The management method of above-mentioned identity-based identification provided in an embodiment of the present invention, is applied to the off-line type testimony of a witness and veritifies eventually End, when receiving the access request of user, the identity identification information and pre-stored manager's identity of verifying the user are believed Whether breath is consistent, and the corresponding management function of the access request is only opened in the case where verifying unanimous circumstances, so that user carries out Information management can improve data storage so as to avoid unauthorized user from accessing the sensitive data in testimony of a witness verification terminal Privacy degrees with management and safety.
In embodiments of the present invention, the mode for obtaining the identity identification information of the first user can be according to identity identification information Type is different, is executed according to different acquisition modes, as follows:
(1) image information, bone information or the gait information of the first user are acquired by photographic device.
The image information refers to the face of user or the image of other body parts, which can be video flowing to be identified In each picture frame, can also be the images to be recognized of picture format, such as may include at least one of:Face figure Picture, fingerprint image and iris image.Wherein fingerprint image can also be obtained by fingerprint sensor, which refers to can be with Realize the device of fingerprint automatic collection.Wherein, the video extraction that bone information or gait information can be acquired by photographic device It obtains.
(2) voice messaging of the first user is acquired by voice input device.Wherein, voice input device can be Mike The input devices such as wind.
In some embodiments, the facial image that user is obtained in S202, since face image can be noninductive in user The facial image known or acquired in the case of being cooperated on one's own initiative without user, therefore obtain user can be conducive to promote making for user With experience.
In the specific implementation, the present embodiment gives verification identity identification information in a kind of step S204 and prestores The whether consistent specific implementation mode of manager's identity information, may include steps of:
(1) identity identification information to be identified is compared with manager's identity information of bottom library storage, obtains waiting knowing The similarity of other identity identification information and manager's identity information in bottom library.For example, the identity identification information to be identified is Image, the essence that image compares are the comparisons of image feature value, also the characteristics extraction of image are out compared, total library The image of middle storage can be image feature value, and similarity is determined by characteristic value comparison result.
(2) judge whether the peak of similarity is higher than predetermined threshold value.If so, determining that the peak of similarity is corresponding Object is consistent.
Predetermined threshold value can such as set predetermined threshold value as 85%, if the peak of similarity reaches with sets itself 85%, it is determined that preferred object corresponding with the peak of the similarity is consistent.
It is illustrated so that access request is bottom library management request as an example below.Above-mentioned verification identity identification information with deposit in advance The step whether manager's identity information of storage is consistent can execute according to the following steps:
(1) it verifies identity identification information and whether pre-stored super keepe identity information is consistent;
(2) if consistent, the corresponding management function of above-mentioned unlatching access request includes:Show the corresponding power of super keepe Limit information administration interface and/or it is managed function voice prompt, so that the first user is managed permission modification.Wherein, when When receiving the bottom library management request of user, the corresponding managing authority information interface of display super keepe includes following two shapes Formula:Show super keepe corresponding bottom library management interface;The bottom library management interface includes newly-increased, change and deletion common management The management options of member's authority information.
When access request is that bottom library management is asked, method provided in this embodiment can also include:Receive user's input Common management administrator's permission modification information and store;Common management administrator's permission modification information includes:Common management administrator's identity is known Other modification information administration authority corresponding with common management administrator's identification modification information.
It is below to be illustrated for the testimony of a witness veritifies data management request by access request.Above-mentioned verification identity identification information Whether consistent step, can execute according to the following steps with pre-stored manager's identity information:
(1) it verifies identity identification information and whether pre-stored common management administrator's identity information is consistent;
(2) if consistent, opening the corresponding management function of the access request includes:Show the corresponding testimony of a witness of the access request Veritify data management interface;It includes the management for increasing, changing and deleting the testimony of a witness newly and veritify data that the testimony of a witness, which veritifies data management interface, Option.
In some embodiments, in the second access request for receiving second user, the above method can also walk below It is rapid to execute:
(1) identity identification information of second user is obtained.The second user and above-mentioned first user can be same user It may be different user.
(2) verify whether there is the second manager identity information consistent with the identity identification information of second user.
(3) if it does, determining the administration authority of second manager's identity information.After verification is consistent, testimony of a witness verification terminal Before the response operation for executing the user access request, the corresponding management of the identity identification information of second user can also be first determined Permission may comprise steps of:
Search the corresponding administration authority of identity identification information of second user.It can be executed by following steps:Determine body Manager's grade belonging to part matched manager's identity information of identification information.Such as manager's grade includes:Super management Member and common management administrator.One or more administrator's identity information is may each comprise in each manager's grade, above-mentioned After step verification is consistent, then manager's grade belonging to consistent manager's identity information can be first searched.
Wherein it is determined that manager's grade belonging to the matched manager's identity information of identity identification information specifically includes: The determining and matched manager's identity information of identity identification information, and search manager's class information of manager's identity information; Manager's grade is determined by manager's class information.In the present embodiment, management can be set in manager's identity information Person's class letter indicates manager's grade belonging to manager's identity information by manager's class letter, such as can be with Set manager's class letter to A, B, C, D or 1,2,3,4 etc., respectively the different manager's grade of corresponding height.
The corresponding administration authority of manager's grade is searched, and using administration authority as the corresponding administrative power of identity identification information Limit.The corresponding administration authority of manager's grade, the i.e. management of active user can be found after determining manager's grade Permission.The administration authority may include reading, change and reading, the change to manager's identity information to sensitive data Deng.
(4) the corresponding management function of above-mentioned administration authority is opened.
In further embodiments, after being verified unanimously in S204, testimony of a witness verification terminal executes the user access request Before response operation, the corresponding administration authority of identity identification information of the first user can also be first searched, i.e. the above method may be used also To include the following steps:If the identity identification information of the first user is consistent with manager's identity information, identification letter is searched Cease corresponding administration authority.Correspondingly, the corresponding management function of the first access request is opened in S206 includes:Open above-mentioned pipe Manage the corresponding management function of permission.
In an optional embodiment, after opening the corresponding management function of administration authority, the above method further includes The step of receiving the administration authority modification instruction of user and executing, can execute in the following manner:Receive third user input Permission modification information and store.The permission modification information may include:Identification modification information and identification modification letter Cease corresponding administration authority.Third user and the first user/second user can be same user, or different use Family.
Above-mentioned administration authority can be reading, change and reading, the change to manager's identity information to sensitive data More etc..For example, the administration authority of super keepe may include increasing, change and deleting common management administrator's account and its permission newly Deng.
In view of storing privacy leakage caused by original image information (such as facial image) possibility in testimony of a witness verification terminal, When above-mentioned identification modification information is image information, the feature of image information is extracted by target nerve network, is only stored The features described above of image information, and delete the image information.By abandoning original image information, its corresponding spy is only stored Sign, can further protect the privacy of user.
Embodiment three:
For the management method of the identity-based identification provided in embodiment one, present embodiments provide using this method Specific example, by testimony of a witness verification terminal manage common management administrator permission for illustrate.Common tube shown in Figure 3 The flow chart of the right management method of reason person, as shown in figure 3, this method comprises the following steps:
The headend equipment of step S302, testimony of a witness verifying system receive the administrator bottom library management request that administrator submits.
In the present embodiment, it is carried out as facial image data instance using the original identity identification information stored in headend equipment Explanation.Testimony of a witness verifying system can provide the super keepe account of acquiescence when delivering to customer, and super keepe has permission Common management administrator bottom library is configured, can carry out including the operations such as newly-increased, change and deletion.It should be noted that super pipe Reason person, which may be set to be, has permission configuration super keepe bottom library, i.e., super keepe, which has permission, carries out including newly-increased, change With delete the operations such as super keepe.Super keepe and common management administrator have permission to access original in testimony of a witness verifying system Face image data and comparison result.
The headend equipment that the testimony of a witness veritifies all-in-one machine obtains the face data of the administrator, and by its be stored in advance in bottom library In the face data of super keepe be compared, to determine whether for super keepe.Here face data can be Face image can also be the face feature extracted from face image.
Step S304, headend equipment verify whether the administrator is super keepe.If so, executing step S306;Such as Fruit is no, terminates.
Headend equipment receives the bottom library management request that administrator submits, and verifies whether the administrator is super keepe, Specific verification process may refer to content in above-described embodiment, and details are not described herein.If verification result is yes, bottom is shown Library management interface;If it is not, then terminating flow.
Step S306, demonstration manager bottom library management interface.
Super keepe can configure common management administrator's permission in the administration interface, for example, increasing newly, changing and deleting and is general The functions such as logical administrator's account.Super keepe can upload satisfactory human face photo in the library of bottom by single or batch And each corresponding permission of human face photo realizes that headend equipment can be handled human face photo, extract human face photo Feature, and be stored in headend equipment in the form of feature.For example, being handled to obtain to human face photo using neural network Face characteristic.
The face characteristic of at least one common management administrator and corresponding operation are had recorded in administration authority modification at this time Permission.Then, the human face photo that administration authority modification can also upload administrator abandons, can preferably conservative management person Privacy.
The original face image data stored in headend equipment, can be the real-time face taken by camera, The initial data such as certificate photograph, and the human face photo that is read out out of identity card by card reader.For example, peace can be passed through Front camera or rear camera acquisition face real-time video on headend equipment or photo, can also be by before this Set camera or rear camera acquisition certificate photograph.The card reader can be the device for having reading identity card information, example Such as id card scanner.Above-mentioned original face image data and comparison record all default settings are private permission file, only It can just be accessed after obtaining identification authentication in testimony of a witness verifying system.
If necessary to access above-mentioned original human face data or compare the information such as record, need to reflect by following flow It weighs, can access, may comprise steps of after authentication:
First, the request input by user for accessing original human face data or comparison record is received;Then, acquisition should in real time The human face photo of user;Then, to the human face photo person of being managed library 1:N comparison authentications, after being executed if the authentication is passed Continuous step, if the authentication not denied access if;Finally, user is allowed to access.
The right management method of above-mentioned identity-based identification provided in an embodiment of the present invention, is applied to the off-line type testimony of a witness and veritifies Terminal, the configuration to administrator right and the access to the information such as original human face data or comparison record, are required to carry out Authentication just allows user to carry out aforesaid operations only after the authentication is passed, can access testimony of a witness verification terminal to avoid unauthorized user In sensitive data, can improve data storage and management privacy degrees and safety.
Example IV:
For the management method of the identity-based identification provided in embodiment two, an embodiment of the present invention provides a kind of bases In the managing device of identification, it is applied to off-line type testimony of a witness verification terminal, a kind of identity-based shown in Figure 4 identification The structure diagram of managing device, including:
First acquisition module 402, the identity for when receiving the access request of the first user, obtaining the first user are known Other information;Identity identification information includes at least one of:Image information, bone information, gait information and voice messaging;
First authentication module 404, for verify identity identification information and pre-stored manager's identity information whether one It causes;
First opening module 406 opens access request pair under verifying unanimous circumstances in the second authentication module 404 The management function answered.
The managing device of above-mentioned identity-based identification provided in an embodiment of the present invention, is applied to the off-line type testimony of a witness and veritifies eventually End, when receiving the access request of user, the identity identification information and pre-stored manager's identity of verifying the user are believed Whether breath is consistent, and the corresponding management function of the access request is only opened in the case where verifying unanimous circumstances, so that user carries out Information management can improve data storage so as to avoid unauthorized user from accessing the sensitive data in testimony of a witness verification terminal Privacy degrees with management and safety.
The input interface of testimony of a witness verification terminal includes at least one of:Touch screen, keyboard, handwriting pad, mouse or Mike Wind;The structure diagram of the managing device of another identity-based identification shown in Figure 5, on the basis of Fig. 4, above-mentioned apparatus Further include:
Request receiving module 502 is used for providing input interface corresponding access control to the first user with receiving first The access request at family.
Testimony of a witness verification terminal includes photographic device and/or voice input device;Above-mentioned first acquisition module 402, is additionally operable to Image information, bone information or the gait information of the first user are acquired by photographic device;Image information include it is following at least it One:Facial image, fingerprint image and iris image;And/or the voice messaging of the first user is acquired by voice input device.
Above-mentioned first authentication module 404, including feature extraction unit and comparing unit;Feature extraction unit, for passing through Target nerve network carries out feature extraction to identity identification information, obtains identification characteristic information;Comparing unit, for comparing Whether identification characteristic information and pre-stored manager's identity information are consistent.
Above-mentioned first authentication module 404 includes the first authentication unit, which is used for:Verify identification letter Whether breath is consistent with pre-stored super keepe identity information;Opening module 406 is additionally operable to:Show that super keepe corresponds to Managing authority information interface and/or be managed function voice prompt so that the first user be managed permission modification.
First authentication unit is used for when receiving the bottom library management request of the first user, and opening module 406 is additionally operable to:It is aobvious Show super keepe corresponding bottom library management interface;Bottom library management interface includes newly-increased, change and deletion common management administrator's permission The management options of information.
Above-mentioned first authentication module 404 includes the second authentication unit, which is used for:Verify identification letter Whether breath is consistent with pre-stored common management administrator's identity information;Opening module 406 is additionally operable to:It is corresponding to open access request Management function includes:Show that the corresponding testimony of a witness of access request veritifies data management interface;The testimony of a witness veritifies data management interface Newly-increased, change and the management options for deleting testimony of a witness veritification data.
The structure diagram of the managing device of another identity-based identification shown in Figure 6, above-mentioned apparatus include:Second Receiving module 602, for when receiving the second access request of second user, obtaining the identity identification information of second user; Second authentication module 604, for verifying whether there is the second manager identity consistent with the identity identification information of second user Information;Determining module 606 determines second manager's identity information under verifying unanimous circumstances in the second authentication module 604 Administration authority;Second opening module 608, for opening the corresponding management function of administration authority.
Above-mentioned determining module 606 is additionally operable to:Determine the matched manager's identity information of the identity identification information of second user Belonging manager's grade;The corresponding administration authority of manager's grade is searched, and using administration authority as identity identification information Corresponding administration authority.
Above-mentioned second opening module 608, is additionally operable to:The corresponding managing authority information interface of display management permission and/or into Row management function voice prompt, so that user is managed permission modification.
The structure diagram of the managing device of another identity-based identification shown in Figure 7, on the basis of Fig. 4, on It further includes permission modification information receiving module 702 to state device, is used for:
It receives third permission modification information input by user and stores;Permission modification information includes:Identification modification letter Breath administration authority corresponding with identification modification information.
Permission modification information receiving module 702, is additionally operable to:When identification modification information is image information, pass through mesh Mark the feature of neural network extraction image information;The feature of image information is stored, and deletes image information.
The technique effect of the device that the present embodiment is provided, realization principle and generation is identical with previous embodiment, for letter It describes, device embodiment part does not refer to place, can refer to corresponding contents in preceding method embodiment.
The embodiment of the present invention additionally provides a kind of electronic equipment, including memory and processor, and being stored in memory can The computer program run on a processor, processor realize the step for the method that above-described embodiment provides when executing computer program Suddenly.Optionally, which can also include image collecting device or fingerprint sensor.
It is apparent to those skilled in the art that for convenience and simplicity of description, the electronics of foregoing description The specific work process of equipment, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Further, the present embodiment additionally provides a kind of computer readable storage medium, is deposited on computer readable storage medium Computer program is contained, the step for the method that above-mentioned preceding method embodiment is provided is executed when computer program is run by processor Suddenly.
The management method for the identity-based identification that the embodiment of the present invention is provided, the computer program of device and electronic equipment Product, including the computer readable storage medium of program code is stored, the instruction that program code includes can be used for executing front The method provided in embodiment of the method, specific implementation can be found in embodiment of the method, and details are not described herein.
Further, the present embodiment additionally provides a kind of computer program, the computer program can store beyond the clouds or this On the storage medium on ground.It is carried when the computer program is run by computer or processor for executing in previous methods embodiment The method of confession, and for realizing the corresponding module in the managing device of identity-based according to the ... of the embodiment of the present invention identification.Tool Body, which is realized, can be found in embodiment of the method, and details are not described herein.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can be tied Another equipment is closed or is desirably integrated into, or some features can be ignored or not executed.
Each device embodiment of the application can be with hardware realization, or to run on one or more processors Software module realize, or realized with combination thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) come realize some modules in device according to the ... of the embodiment of the present invention some Or repertoire.The application is also implemented as some or all devices for executing method as described herein Program (for example, computer program and computer program product).For example, the program of the application can be stored in computer-readable Jie In matter, or can be with the form of one or more signal.Such signal can be downloaded from internet website and be obtained, It either provides on carrier signal or provides in any other forms.
If the above-mentioned function of the application is realized in the form of SFU software functional unit and sells or make as independent product Used time can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention essence On in other words the part of the part that contributes to existing technology or the technical solution can embody in the form of software products Out, which is stored in a storage medium, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes all or part of each embodiment method of the present invention Step.And storage medium above-mentioned includes:It is USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random Access various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD Matter.
In the application, term " first ", " second ", " third " are used for description purposes only, and should not be understood as instruction or dark Show relative importance.
Finally it should be noted that:Above example, only specific implementation mode of the invention, to illustrate the skill of the present invention Art scheme, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to the present invention into Go detailed description, it will be understood by those of ordinary skill in the art that:Any one skilled in the art is at this It invents in the technical scope disclosed, still can modify or can be thought easily to the technical solution recorded in previous embodiment To variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make corresponding The essence of technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection scope of the present invention Within.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (16)

1. a kind of management method of identity-based identification, which is characterized in that it is applied to off-line type testimony of a witness verification terminal, including:
When receiving the first access request of the first user, the identity identification information of first user is obtained;The identity Identification information includes at least one of:Image information, bone information, gait information and voice messaging;
Whether identity identification information and the pre-stored first manager identity information for verifying first user are consistent;
If consistent, the corresponding management function of first access request is opened.
2. according to the method described in claim 1, it is characterized in that, the input interface of the testimony of a witness verification terminal include with down toward It is one of few:Touch screen, keyboard, handwriting pad, mouse or microphone;
The method further includes:There is provided the input interface corresponding access control to first user, to receive described the The access request of one user.
3. method according to claim 1 or 2, which is characterized in that the testimony of a witness verification terminal include photographic device and/or Voice input device;
The identity identification information for obtaining first user includes:
Image information, bone information or the gait information of first user are acquired by the photographic device;Described image is believed Breath includes at least one of:Facial image, fingerprint image and iris image;And/or
The voice messaging of first user is acquired by the voice input device.
4. according to claim 1-3 any one of them methods, which is characterized in that the identification letter of verification first user Breath with pre-stored first manager identity information whether include unanimously:
Feature extraction is carried out to the identity identification information of first user by target nerve network, obtains identification feature Information;
Compare the identification characteristic information and whether the pre-stored first manager identity information is consistent.
5. according to claim 1-4 any one of them methods, which is characterized in that the identification letter of verification first user Breath with pre-stored first manager identity information whether include unanimously:
Whether identity identification information and the pre-stored super keepe identity information for verifying first user are consistent;
If so, opening the corresponding management function of the access request and including:
It shows the corresponding managing authority information interface of the super keepe and/or is managed function voice prompt, so that institute It states the first user and is managed permission modification.
6. according to the method described in claim 5, it is characterized in that, when receiving the bottom library management request of the first user, show Show that the corresponding managing authority information interface of the super keepe includes:
Show the super keepe corresponding bottom library management interface;Bottom library management interface includes newly-increased, change and deletes The management options of common management administrator's authority information.
7. according to claim 1-4 any one of them methods, which is characterized in that the identification letter of verification first user Breath with pre-stored first manager identity information whether include unanimously:
Whether identity identification information and the pre-stored common management administrator's identity information for verifying first user are consistent;
If so, opening the corresponding management function of the access request and including:
Show that the corresponding testimony of a witness of the access request veritifies data management interface;It includes new that the testimony of a witness, which veritifies data management interface, Increase, the management options of change and deletion testimony of a witness veritification data.
8. according to claim 1-4 any one of them methods, which is characterized in that the method further includes:
When receiving the second access request of second user, the identity identification information of the second user is obtained;
Verify whether there is the second manager identity information consistent with the identity identification information of the second user;
If it does, determining the administration authority of the second manager identity information;
Open the corresponding management function of the administration authority.
9. according to claim 1-4 any one of them methods, which is characterized in that the method further includes:
If the identity identification information of first user is consistent with the first manager identity information, searches the identity and know The corresponding administration authority of other information;
Opening the corresponding management function of the access request includes:
Open the corresponding management function of the administration authority.
10. according to the method described in claim 9, it is characterized in that, determining the administrative power of the second manager identity information Limit includes:
Determine manager's grade belonging to the matched manager's identity information of the identity identification information of the second user;
The corresponding administration authority of manager's grade is searched, and is corresponded to the administration authority as the identity identification information Administration authority.
11. according to the method described in claim 9, it is characterized in that, opening the corresponding management function of the administration authority and including:
It shows the corresponding managing authority information interface of the administration authority and/or is managed function voice prompt, so that described User is managed permission modification.
12. according to claim 1-11 any one of them methods, which is characterized in that the method further includes:
It receives third permission modification information input by user and stores;The permission modification information includes:Identification modification letter Breath administration authority corresponding with the identification modification information.
13. according to the method for claim 12, which is characterized in that receive third permission modification information input by user and deposit Storage includes:
When the identification modification information is image information, the spy of described image information is extracted by target nerve network Sign;
The feature of described image information is stored, and deletes described image information.
14. a kind of managing device of identity-based identification, which is characterized in that it is applied to off-line type testimony of a witness verification terminal, including:
Identity identification information acquisition module, for when receiving the access request of the first user, obtaining first user's Identity identification information;The identity identification information includes at least one of:Image information, bone information, gait information and language Message ceases;
Authentication module, it is whether consistent for verifying the identity identification information and pre-stored manager's identity information;
Opening module opens the corresponding management work(of the access request under verifying unanimous circumstances in the authentication module Energy.
15. a kind of electronic equipment, including memory, processor and it is stored on the memory and can transports on the processor Capable computer program, which is characterized in that the processor realizes the claims 1 to 13 when executing the computer program Any one of described in method the step of.
16. a kind of computer-readable medium for the program code that can perform with processor, which is characterized in that said program code The processor is set to execute any the method in the claims 1 to 13.
CN201810352341.3A 2018-04-18 2018-04-18 Management method, device and the electronic equipment of identity-based identification Pending CN108537030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810352341.3A CN108537030A (en) 2018-04-18 2018-04-18 Management method, device and the electronic equipment of identity-based identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810352341.3A CN108537030A (en) 2018-04-18 2018-04-18 Management method, device and the electronic equipment of identity-based identification

Publications (1)

Publication Number Publication Date
CN108537030A true CN108537030A (en) 2018-09-14

Family

ID=63477714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810352341.3A Pending CN108537030A (en) 2018-04-18 2018-04-18 Management method, device and the electronic equipment of identity-based identification

Country Status (1)

Country Link
CN (1) CN108537030A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286499A (en) * 2018-09-21 2019-01-29 武汉大学 A kind of authentication method on the scene of Behavior-based control feature
CN109598208A (en) * 2018-11-14 2019-04-09 阿里巴巴集团控股有限公司 Portrait verification method and device
CN110049490A (en) * 2019-04-23 2019-07-23 广东小天才科技有限公司 Safety protection method and device for wearable equipment, wearable equipment and medium
CN110084143A (en) * 2019-04-04 2019-08-02 广州大学 A kind of emotional information guard method and system for recognition of face
CN110084147A (en) * 2019-04-04 2019-08-02 广州大学 A kind of gender method for secret protection and system for recognition of face
CN110378087A (en) * 2019-07-24 2019-10-25 四川爱创科技有限公司 Self-service terminal management method and system
CN110851185A (en) * 2019-11-08 2020-02-28 杭州宇泛智能科技有限公司 Automatic configuration method and device for equipment, electronic equipment and storage medium
CN110859613A (en) * 2019-11-20 2020-03-06 深圳市健云互联科技有限公司 Electrocardio data processing method and device, computer equipment and storage medium
CN111523141A (en) * 2020-04-23 2020-08-11 陆宝华 Personal privacy protection-based identity identification and verification system
CN112348974A (en) * 2020-10-28 2021-02-09 四川瑞云信通科技有限公司 PRT novel automatic ticket selling and checking method and system
WO2021051941A1 (en) * 2019-09-18 2021-03-25 平安科技(深圳)有限公司 Information processing method and apparatus
CN112773262A (en) * 2019-11-08 2021-05-11 珠海市一微半导体有限公司 Security control method based on sweeping robot, sweeping robot and chip
CN114360114A (en) * 2022-03-14 2022-04-15 云丁网络技术(北京)有限公司 User authority management method and system
CN114422236A (en) * 2021-10-27 2022-04-29 珠海奔图电子有限公司 Intelligent device access method and device and electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150200948A1 (en) * 2012-04-23 2015-07-16 Google Inc. Controlling Access by Web Applications to Resources on Servers
CN105184133A (en) * 2015-07-30 2015-12-23 广东欧珀移动通信有限公司 Authentication method and apparatus, and corresponding mobile terminal
CN105488377A (en) * 2015-12-15 2016-04-13 深圳先进技术研究院 Production method and equipment of fake iris template and identity authentication method and equipment
CN105913019A (en) * 2016-04-11 2016-08-31 北京奇虎科技有限公司 Iris identification method and terminal
CN106446638A (en) * 2016-10-14 2017-02-22 郑州云海信息技术有限公司 Cloud computing operation system security access method and device
CN106506442A (en) * 2016-09-14 2017-03-15 上海百芝龙网络科技有限公司 A kind of smart home multi-user identification and its Rights Management System

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150200948A1 (en) * 2012-04-23 2015-07-16 Google Inc. Controlling Access by Web Applications to Resources on Servers
CN105184133A (en) * 2015-07-30 2015-12-23 广东欧珀移动通信有限公司 Authentication method and apparatus, and corresponding mobile terminal
CN105488377A (en) * 2015-12-15 2016-04-13 深圳先进技术研究院 Production method and equipment of fake iris template and identity authentication method and equipment
CN105913019A (en) * 2016-04-11 2016-08-31 北京奇虎科技有限公司 Iris identification method and terminal
CN106506442A (en) * 2016-09-14 2017-03-15 上海百芝龙网络科技有限公司 A kind of smart home multi-user identification and its Rights Management System
CN106446638A (en) * 2016-10-14 2017-02-22 郑州云海信息技术有限公司 Cloud computing operation system security access method and device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286499A (en) * 2018-09-21 2019-01-29 武汉大学 A kind of authentication method on the scene of Behavior-based control feature
CN109286499B (en) * 2018-09-21 2020-08-07 武汉大学 Behavior feature-based presence authentication method
CN109598208A (en) * 2018-11-14 2019-04-09 阿里巴巴集团控股有限公司 Portrait verification method and device
CN110084147A (en) * 2019-04-04 2019-08-02 广州大学 A kind of gender method for secret protection and system for recognition of face
CN110084143A (en) * 2019-04-04 2019-08-02 广州大学 A kind of emotional information guard method and system for recognition of face
CN110049490A (en) * 2019-04-23 2019-07-23 广东小天才科技有限公司 Safety protection method and device for wearable equipment, wearable equipment and medium
CN110378087A (en) * 2019-07-24 2019-10-25 四川爱创科技有限公司 Self-service terminal management method and system
WO2021051941A1 (en) * 2019-09-18 2021-03-25 平安科技(深圳)有限公司 Information processing method and apparatus
CN110851185A (en) * 2019-11-08 2020-02-28 杭州宇泛智能科技有限公司 Automatic configuration method and device for equipment, electronic equipment and storage medium
CN112773262A (en) * 2019-11-08 2021-05-11 珠海市一微半导体有限公司 Security control method based on sweeping robot, sweeping robot and chip
CN110859613B (en) * 2019-11-20 2022-07-22 深圳市健云互联科技有限公司 Electrocardiogram data processing device, computer device, and storage medium
CN110859613A (en) * 2019-11-20 2020-03-06 深圳市健云互联科技有限公司 Electrocardio data processing method and device, computer equipment and storage medium
CN111523141A (en) * 2020-04-23 2020-08-11 陆宝华 Personal privacy protection-based identity identification and verification system
CN111523141B (en) * 2020-04-23 2024-04-09 陆宝华 Personal privacy protection-based identity identification and verification system
CN112348974A (en) * 2020-10-28 2021-02-09 四川瑞云信通科技有限公司 PRT novel automatic ticket selling and checking method and system
CN114422236A (en) * 2021-10-27 2022-04-29 珠海奔图电子有限公司 Intelligent device access method and device and electronic device
CN114422236B (en) * 2021-10-27 2023-12-01 珠海奔图电子有限公司 Intelligent device access method and device and electronic device
CN114360114A (en) * 2022-03-14 2022-04-15 云丁网络技术(北京)有限公司 User authority management method and system

Similar Documents

Publication Publication Date Title
CN108537030A (en) Management method, device and the electronic equipment of identity-based identification
US11151819B2 (en) Access control method, access control apparatus, system, and storage medium
CN111886842B (en) Remote user authentication using threshold-based matching
US9773151B2 (en) System and methods for contactless biometrics-based identification
CN105139470B (en) Work attendance method, apparatus and system based on recognition of face
US9189612B2 (en) Biometric verification with improved privacy and network performance in client-server networks
US8970348B1 (en) Using sequences of facial gestures to authenticate users
JP7090008B2 (en) Identity verification support device and identity verification support method
US10846514B2 (en) Processing images from an electronic mirror
US12019728B2 (en) AdHoc enrollment process
CN109885994A (en) A kind of offline identity authorization system, equipment and computer readable storage medium
CN108270789A (en) Internetbank activating method, equipment, system and computer readable storage medium
CN107656959A (en) A kind of message leaving method, device and message equipment
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
US20240028698A1 (en) System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration
CN109446778A (en) Immovable Property Registration information acquisition method, computer installation and computer readable storage medium based on recognition of face
JP2022117025A (en) Method for personal identification, program, and information system
US20200028847A1 (en) Authentication method and authentication device
CN114005208B (en) Access control method, device, equipment and storage medium
Krishna Prasad Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition
Aithal A Study on Multifactor Authentication Model Using Fingerprint Hash Code, Password and OTP
US20230186307A1 (en) Method for enhancing transaction security
US20230206240A1 (en) Account security system
KR101008654B1 (en) Fingerprint Authentication Device for Access Check
Krishna Prasad et al. A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE AND IRIS RECOGNITION

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180914

RJ01 Rejection of invention patent application after publication