CN109273009A - Access control method, device, computer equipment and storage medium - Google Patents

Access control method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109273009A
CN109273009A CN201810872225.4A CN201810872225A CN109273009A CN 109273009 A CN109273009 A CN 109273009A CN 201810872225 A CN201810872225 A CN 201810872225A CN 109273009 A CN109273009 A CN 109273009A
Authority
CN
China
Prior art keywords
access control
user
user identifier
target
vocal print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810872225.4A
Other languages
Chinese (zh)
Inventor
潘燕飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810872225.4A priority Critical patent/CN109273009A/en
Publication of CN109273009A publication Critical patent/CN109273009A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/02Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Acoustics & Sound (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Game Theory and Decision Science (AREA)
  • Business, Economics & Management (AREA)
  • Computational Linguistics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

This application involves field of artificial intelligence, a kind of access control method, device, computer equipment and storage medium are provided.The described method includes: obtaining the voice messaging that speech detector detects;Target voice content is extracted from the voice messaging by speech recognition modeling, and target vocal print feature is extracted from the voice messaging by Application on Voiceprint Recognition model;The user identifier that inquiry matches with the target voice content;When inquiring the user identifier to match with the target voice content, default vocal print feature corresponding with the user identifier is inquired;The default vocal print feature and the target vocal print feature are matched;When successful match, access control instruction is sent to electromagnetic lock;The access control instruction is used to indicate the electromagnetic lock opening gate system.Access control efficiency can be improved using this method.

Description

Access control method, device, computer equipment and storage medium
Technical field
This application involves access control technical fields, more particularly to a kind of access control method, device, computer equipment And storage medium.
Background technique
Currently, the access control system of the higher fixed area of security level, usually passes through key or access card administrative staff Disengaging, or be uniformly managed by administrator.But by way of key or access card administrative staff disengaging, because of key Or access card is easily lost, and unauthorized personnel is caused to pass through access control system using the access card that authorized person loses, so as to cause Access control low efficiency.And the mode of access control system is managed collectively by administrator, when opening gate system, needs to notify administrator, The workload of administrator is increased, access control is reduced using the opening gate system of key or access card by administrator again Efficiency.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of access control method for capableing of access control efficiency, Device, computer equipment and storage medium.
A kind of access control method, which comprises
Obtain the voice messaging that speech detector detects;
Extract target voice content from the voice messaging by speech recognition modeling, and by Application on Voiceprint Recognition model from Target vocal print feature is extracted in the voice messaging;
The user identifier that inquiry matches with the target voice content;
When inquiring the user identifier to match with the target voice content, inquire corresponding with the user identifier Default vocal print feature;
The default vocal print feature and the target vocal print feature are matched;
When successful match, access control instruction is sent to electromagnetic lock;The access control instruction is used to indicate the electricity Magnetic padlock opening gate system.
It is described when successful match in one of the embodiments, access control instruction is sent to electromagnetic lock, comprising:
When successful match, the corresponding user right rank of the user identifier is inquired;
When the user right rank meets default access control condition, access control instruction is sent to electromagnetic lock.
It is described when successful match in one of the embodiments, access control instruction is sent to electromagnetic lock, comprising:
When successful match, the corresponding user right rank of the user identifier is inquired;
When the user right rank does not meet default access control condition, certification request is sent to designated terminal;Institute It is corresponding with the designated user of specified Permission Levels mark to state designated terminal;
The designated terminal is received for the authenticate-acknowledge instruction of certification request feedback;
It is instructed according to the authenticate-acknowledge to electromagnetic lock and sends access control instruction.
In one of the embodiments, the method also includes:
The target voice content is compared with preset content format condition;
When the target voice content meets the preset content format condition, the inquiry and the target language are executed The step of user identifier that sound content matches.
Before the voice messaging that the acquisition speech detector detects in one of the embodiments, the method is also Include:
Obtain the read user information of card reader;
The user identifier that inquiry matches with the user information;
When inquiring the user identifier to match with the user information, sending to speech detector indicates user information The prompt information being verified;
The prompt information is used to indicate the speech detector detection voice messaging.
It is described when inquiring the user identifier to match with the user information in one of the embodiments, to language Tone Detector sends the prompt information for indicating that user information is verified, comprising:
When inquiring the user identifier to match with the user information, interaction is selected from pre-stored interaction exam pool Topic;
The interaction topic is pushed into speech detector;
Receive the interactive voice information that the speech detector corresponds to the interaction topic feedback;
Corresponding interaction answer is extracted from the interactive voice information by speech recognition modeling;
When the interaction answer and pre-stored correct option match, sending to speech detector indicates user information Authenticate the prompt information passed through.
A kind of access control device, described device include:
Receiving module, the voice messaging for detecting and sending for receiving speech detector;
Extraction module for extracting target voice content from the voice messaging by speech recognition modeling, and passes through Application on Voiceprint Recognition model extracts target vocal print feature from the voice messaging;
Enquiry module, for inquiring the user identifier to match with the target voice content;
The enquiry module is also used to when inquiring the user identifier to match with the target voice content, inquiry Default vocal print feature corresponding with the user identifier;
Matching module, for matching the default vocal print feature and the target vocal print feature;
Sending module, for sending access control instruction to electromagnetic lock when successful match;The access control instruction is used In the instruction electromagnetic lock opening gate system.
Described device in one of the embodiments, further include: authentication module;
The authentication module, for obtaining the read user information of card reader;
The authentication module is also used to inquire the user identifier to match with the user information;
The authentication module is also used to when inquiring the user identifier to match with the user information, is examined to voice It surveys device and sends the prompt information for indicating that user information is verified;
The prompt information is used to indicate the speech detector detection voice messaging.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
Obtain the voice messaging that speech detector detects;
Extract target voice content from the voice messaging by speech recognition modeling, and by Application on Voiceprint Recognition model from Target vocal print feature is extracted in the voice messaging;
The user identifier that inquiry matches with the target voice content;
When inquiring the user identifier to match with the target voice content, inquire corresponding with the user identifier Default vocal print feature;
The default vocal print feature and the target vocal print feature are matched;
When successful match, access control instruction is sent to electromagnetic lock;The access control instruction is used to indicate the electricity Magnetic padlock opening gate system.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
Obtain the voice messaging that speech detector detects;
Extract target voice content from the voice messaging by speech recognition modeling, and by Application on Voiceprint Recognition model from Target vocal print feature is extracted in the voice messaging;
The user identifier that inquiry matches with the target voice content;
When inquiring the user identifier to match with the target voice content, inquire corresponding with the user identifier Default vocal print feature;
The default vocal print feature and the target vocal print feature are matched;
When successful match, access control instruction is sent to electromagnetic lock;The access control instruction is used to indicate the electricity Magnetic padlock opening gate system.
Above-mentioned access control method, device, computer equipment and storage medium, by speech recognition modeling from accessed Voice messaging in extract target voice content, and target vocal print feature is extracted from voice messaging by Application on Voiceprint Recognition model, And double authentication, and the trigger gate when double authentication passes through are carried out according to extracted target voice content and target vocal print feature Prohibit control instruction, to open electromagnetic lock.According to the user identifier that target voice content search matches, when inquiring matched use When family identifies, show that target voice content authentication passes through, and then associated default vocal print feature is inquired according to user identifier, when When default vocal print feature and the target vocal print feature of extraction match, shows that the certification of target vocal print feature passes through, then pass through control Electromagnetic lock opening gate system.By automatically extracting target voice content and target vocal print feature in voice messaging, and it is automatic Double authentication, and the opening gate system when certification passes through are carried out, the control efficiency of access control system is improved.
Detailed description of the invention
Fig. 1 is the application scenario diagram of access control method in one embodiment;
Fig. 2 is the flow diagram of access control method in one embodiment;
Fig. 3 is the flow diagram of access control method in another embodiment;
Fig. 4 is the structural block diagram of access control device in one embodiment;
Fig. 5 is the structural block diagram of access control device in another embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Access control method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, gate inhibition is controlled It is electrically connected between control equipment 120 and electromagnetic lock 140, access control equipment 120 is communicated by electric signal with electromagnetic lock 140. Access control equipment 120 obtains the voice messaging that detects of speech detector, by speech recognition modeling and vocal print identification model, Target voice content and target vocal print feature are extracted from acquired voice messaging respectively, and is inquired and target voice content phase Matched user identifier.When inquiring user identifier, access control equipment 120 inquires default sound corresponding with the user identifier Line feature.When default vocal print feature and extracted target vocal print feature match, access control equipment 120 is to electromagnetic lock 140 send the access control instruction for opening gate system.
In one embodiment, as shown in Fig. 2, providing a kind of access control method, it is applied in Fig. 1 in this way It is illustrated for access control equipment, comprising the following steps:
S202 obtains the voice messaging that speech detector detects.
Wherein, voice messaging is the information transmitted in the form of speech message.In other words, voice messaging refers to that user says The acoustic information transmitted when words.Speech detector is the device for detecting voice messaging.Speech detector is built-in in door Prohibit in control equipment, i.e., speech detector is integrated in access control equipment as hardware composition part.Speech detector can also To be the individual components with access control equipment point-to-point connection.Speech detector such as microphone, specifically can also be direction Property microphone, wherein directional microphone is used to detect voice messaging in assigned direction specified range.
Specifically, access control equipment detects voice messaging by built-in speech detector, to obtain speech detector Detected voice messaging.Access control equipment, which also can receive, to be detected and is sent to as the speech detector of individual components Voice messaging.Speech detector detects voice messaging, is sent to detected voice messaging when detecting voice messaging Access control equipment.
In one embodiment, it when access control equipment gets access control request, obtains speech detector and is detected The voice messaging arrived.Wherein, access control request be access control equipment detect when specified trigger action it is corresponding generate ask It asks.Specified trigger action can be the trigger action to specified control.
In one embodiment, access control equipment obtains target detected by infrared sensor or heat sensor and uses Family.When getting target user, access control opening of device speech detector, and target user is detected by speech detector Corresponding voice messaging.In one embodiment, when speech detector does not detect that the duration of voice messaging reaches default When long, access control equipment then determines that voice messaging obtains and completes, and closes speech detector.
S204 extracts target voice content by speech recognition modeling from voice messaging, and passes through Application on Voiceprint Recognition model Target vocal print feature is extracted from voice messaging.
Wherein, speech recognition modeling is to carry out model training model obtained according to the training sample set obtained in advance. The training sample set includes multiple target voice information and the corresponding target voice content of each target voice information.Speech recognition Model from acquired voice messaging for identifying corresponding target voice content.Application on Voiceprint Recognition model is that basis obtains in advance The training sample set taken carries out the model of model training acquisition.The training sample set includes multiple target voice information and each mesh Mark the corresponding target vocal print feature of voice messaging.Target language message for training the training sample of speech recognition modeling to concentrate Breath, can be the same or different with the target voice information for training the training sample of Application on Voiceprint Recognition model to concentrate.
Target voice content is the data with specified meaning that voice messaging is included, such as the user in voice messaging Mark.Target vocal print feature is the sound wave spectrum that target voice content is carried in voice messaging.Target vocal print feature is specifically to use In the tamber parameter for indicating user voice feature.
Specifically, access control equipment passes through preparatory trained speech recognition modeling from accessed voice messaging Corresponding target voice content is extracted, meanwhile, by preparatory trained Application on Voiceprint Recognition model from accessed voice messaging It is middle to extract corresponding target vocal print feature.
In one embodiment, access control equipment extracts target voice by speech recognition modeling from voice messaging When content, it is special that target vocal print corresponding with extracted target voice content is extracted from voice messaging by Application on Voiceprint Recognition model Sign.Specifically, access control equipment intercepts voice messaging segment corresponding with target voice content from voice messaging, passes through sound Line identification model extracts target vocal print feature from the voice messaging segment intercepted.
S206, the user identifier that inquiry matches with target voice content.
Wherein, user identifier is used for unique identification user.User identifier can be by number, letter and symbol etc. extremely A kind of character string of few composition.User identifier specifically can be the name of user, work number or other for the unique identification user Identification information.
In one embodiment, access control equipment is inquired the user to match with target voice content from memory and is marked Know.User identifier in memory is the user identifier for obtaining and storing in advance in registration process.Memory is to be used to store number According to memory device, such as storage chip or SD card.Wherein, the such as pre-stored user identifier of data and default vocal print feature.
Specifically, access control equipment is according to the target voice content extracted, inquiry and the target voice content phase Matched user identifier.Access control equipment by extracted target voice content and pre-stored each user identifier respectively into Row matching, when successful match, stop current matching operation, by the user identifier of successful match be determined as in target voice Hold the user identifier to match.
S208 is inquired corresponding with user identifier pre- when inquiring the user identifier to match with target voice content If vocal print feature.
Wherein, default vocal print feature is preset vocal print feature.Default vocal print feature, which specifically can be, to be registered The vocal print feature extracted and stored in Cheng Zhongcong registration voice messaging.
Specifically, when inquiring the user identifier to match with extracted target voice content, access control equipment According to the user identifier inquired, default vocal print feature corresponding with the user identifier is inquired.
In one embodiment, access control equipment is inquired the user to match with target voice content in memory and is marked Know, and inquires default vocal print feature accordingly in memory according to the user identifier inquired.It is stored in memory useful Corresponding relationship between family mark and corresponding default vocal print feature.
In one embodiment, it when the register instruction that access control equipment is got, obtains detected by speech detector Registration voice messaging corresponding with register instruction, by speech recognition modeling and vocal print identification model, respectively from accessed Registration voice messaging in extract corresponding user identifier and vocal print feature.The vocal print feature that access control equipment will be extracted It is determined as default vocal print feature corresponding with user identifier, establishes corresponding between the user identifier and corresponding default vocal print feature Relationship, and by the correspondence between the user identifier extracted, default vocal print feature and user identifier and default vocal print feature Relationship is stored to local.In one embodiment, access control terminal can be special by the user identifier extracted, default vocal print Sign and the corresponding relationship between user identifier and default vocal print feature are pre-stored in memory.
S210 matches default vocal print feature and target vocal print feature.
Specifically, after access control equipment query to default vocal print feature corresponding with user identifier, by what is inquired Default vocal print feature is matched with the target vocal print feature extracted from voice messaging, to verify user right, and root Determine whether user has access control system control authority according to matching result.
S212 sends access control instruction to electromagnetic lock when successful match;Access control instruction is used to indicate electromagnetic lock Opening gate system.
Wherein, access control instruction is the instruction of access control system.Access control instruction is used to indicate electromagnetic lock unlatching Access control system.In the present embodiment, access control instruction specifically can be low and high level.
Specifically, when default vocal print feature and target vocal print feature successful match, show detected voice messaging In target vocal print feature in storage card be pre-stored default vocal print feature it is consistent, that is, show current authentication user be authorization User, has an access control system control authority, and access control equipment is then corresponding to generate access control instruction, and by gate inhibition generated Control instruction is sent to electromagnetic lock.Access control instructs opening gate system, i.e. electromagnetic lock root to electromagnetic lock based on the received It instructs and unlocks according to access control, with opening gate system.
Above-mentioned access control method is extracted in target voice by speech recognition modeling from accessed voice messaging Hold, target vocal print feature extracted from voice messaging by Application on Voiceprint Recognition model, and according to extracted target voice content with Target vocal print feature carry out double authentication, and when double authentication by when trigger gate inhibition's control instruction, to open electromagnetic lock.According to The user identifier that target voice content search matches shows that target voice content is recognized when inquiring matched user identifier Card passes through, and then inquires associated default vocal print feature according to user identifier, when the target sound of default vocal print feature and extraction When line feature matches, shows that the certification of target vocal print feature passes through, then pass through control electromagnetic lock opening gate system.By automatic The target voice content and target vocal print feature in voice messaging are extracted, and carries out double authentication automatically, and when certification passes through Opening gate system improves the control efficiency of access control system.
In one embodiment, when successful match, access control instruction is sent to electromagnetic lock, comprising: work as successful match When, the corresponding user right rank of inquiry user identifier;When user right rank meets default access control condition, to electromagnetism Lock sends access control instruction.
Wherein, user right rank refers to the Permission Levels of access control system corresponding to user.User right rank The permission that whether there is independent control access control system for characterizing user.User right refers to the power of user's control access control system Limit.Permission Levels refer to the grade of permission, such as 5 grades.Default access control condition is preset for determining that user is The no condition with access control permission.Default access control condition such as user right rank reaches default access rank.
Specifically, when default vocal print feature and target vocal print feature successful match, access control equipment is according to default sound User identifier corresponding to line feature inquires user right rank corresponding with the user identifier.Access control equipment will be looked into The user right rank ask is compared with default access control condition.When user right rank meets default access control item When part, the corresponding access control instruction generated of access control equipment is sent to electromagnetic lock, to open electromagnetic lock, i.e. opening gate system System.
In one embodiment, presetting access control condition includes default access rank, such as 5 grades.Access control equipment The user right rank inquired is compared with default access rank, when user right rank reaches default access rank When, access control instruction is sent to electromagnetic lock by access control equipment.Wherein, Permission Levels can use any number between 1 to 10 Value indicates that numerical value is bigger, and expression Permission Levels are higher.
It illustrates, it is assumed that default access rank is 5 grades, and the corresponding user right rank a of user A is 6 grades, B pairs of user The user right rank b answered is 4 grades, and access control equipment then determines that user right rank a meets default access control condition, is used Family Permission Levels b does not meet default access control condition.
In one embodiment, preset access control condition include default access levels list, such as by Permission Levels be 5 The Permission Levels list that grade, 6 grades, 7 grades, 8 grades, 9 grades and 10 grades form.The user right grade that access control equipment will be inquired It is not matched with default access levels list, when successful match, then determines that user right rank meets default access control Condition, and access control instruction is sent to electromagnetic lock.
In one embodiment, access control equipment determines the corresponding user right grade of user identifier in registration process Not, and by identified user right rank and the corresponding storage of corresponding user identifier.In one embodiment, pre- in memory The corresponding relationship being stored between user identifier and user right rank.When successful match, access control terminal is from memory It is middle to inquire user right rank corresponding with the user identifier inquired.
In above-described embodiment, when target voice content and target vocal print feature double authentication pass through, to user identifier institute Corresponding user right rank is authenticated, and when user right rank, which also authenticates, to be passed through, i.e., when triple-authentication passes through, is then determined Relative users have access control system control authority, corresponding to open electromagnetic lock.
In one embodiment, when successful match, access control instruction is sent to electromagnetic lock, comprising: work as successful match When, the corresponding user right rank of inquiry user identifier;When user right rank does not meet default access control condition, to finger Determine terminal and sends certification request;Designated terminal is corresponding with the designated user of specified Permission Levels mark;Designated terminal is received to be directed to The authenticate-acknowledge instruction of certification request feedback;It is instructed according to authenticate-acknowledge to electromagnetic lock and sends access control instruction.
Wherein, certification request is the request of triggering authentication operation.Certification request is used to indicate designated terminal and recognizes current Card carries out reauthentication.In other words, access control equipment is based on accessed voice messaging to the access control of relative users Request is authenticated, and the target voice content and target vocal print feature in the voice messaging corresponding to the user, which authenticates, leads to It crosses and when the corresponding user identifier of the user does not meet default access control condition, access control equipment is sent to designated terminal Certification request passes through the designated terminal to carry out re-authentication to the access control request of user by means of the designated terminal It is confirmed whether opening gate system.Specified Permission Levels are preassigned Permission Levels.Authenticate-acknowledge instruction is intended to indicate that The instruction that confirmation certification passes through.
Specifically, when default vocal print feature and target vocal print feature successful match, access control equipment is according to default sound User identifier corresponding to line feature inquires user right rank corresponding with the user identifier, and the user inquired is weighed Limit rank is compared with default access control condition.When user right rank does not meet default access control condition, gate inhibition It controls equipment user identifier according to corresponding to default vocal print feature and generates corresponding certification request, and certification generated is asked The designated terminal for asking the designated user's mark for being sent to specified Permission Levels corresponding.Designated terminal authenticates based on the received Request is authenticated, i.e., designated terminal is recognized according to identity of the certification request to the user of current request access control system Card.When certification passes through, i.e., when designated terminal determines that the identity of user to be certified passes through for certification, designated terminal is to gate inhibition Control equipment feedback authenticate-acknowledge instruction.Access control equipment is instructed according to the authenticate-acknowledge that designated terminal is fed back to electromagnetic lock Access control instruction is sent, to open electromagnetic lock.
For example, access control equipment is based on when user A triggering access control request is to request opening gate system The voice messaging of user A carries out double authentication to target voice content and target vocal print feature, to authenticate the identity of user A, when Target voice content and target vocal print feature, which authenticate, to be passed through and the user right rank of user A does not meet default access control When condition, designated terminal corresponding to designated user B of the access control equipment to specified Permission Levels sends certification request, with logical It crosses designated user B and electromagnetic lock is then opened when re-authentication passes through to the identity progress re-authentication of user A.
In one embodiment, certification request obtains the specified use for specifying Permission Levels to designated terminal based on the received The corresponding certification voice messaging of family mark, and the certification voice messaging is fed back into access control equipment.Similar to above-mentioned needle To the processing step of voice messaging, access control equipment in the certification voice messaging target voice content and target vocal print it is special Sign carries out double authentication, and when double authentication passes through, access control instructs to electromagnetic lock and sends access control instruction, to open door Access control system.
In one embodiment, when default vocal print feature is corresponding with target vocal print feature successful match and user identifier When user right rank does not meet the instruction of default access control, access control equipment is by speech detector or display to specified The designated user of Permission Levels sends the prompt information confirmed again to current authentication, to prompt designated user to current authentication Confirmed again.Wherein, the mode that designated user confirms again specifically can be access card certification, finger print identifying or be similar to Above-mentioned steps and double authentication based on voice messaging.
In one embodiment, when successful match, access control equipment is inquired and the use that is inquired from memory Family identifies corresponding user right rank.
In above-described embodiment, when the corresponding target voice content of user identifier and target vocal print feature authenticate pass through and When the corresponding user right mark of user identifier does not meet default access control condition, show that the corresponding user of the user identifier does not have There is the permission of independent control access control system, then by specifying the designated user of Permission Levels to carry out reauthentication, certification to the user Then opening gate system when being identified through, improves access control system safety.
In one embodiment, above-mentioned access control method further include: by target voice content and preset content format item Part is compared;When target voice content meets preset content format condition, executes inquiry and match with target voice content User identifier the step of.
Wherein, preset content format condition refers to the condition of the preset format for constrained objective voice content. The such as extracted target voice content of preset content format condition is 6 bit digitals.
Specifically, access control equipment by the target voice content extracted from voice messaging and preset format condition into Row compares.When target voice content meets preset content format condition, access control equipment is according to target voice content search The user identifier to match, and subsequent step is executed according to the user identifier inquired.
It illustrates, it is assumed that the target voice content extracted is 321456, and preset content format condition is target language Sound content is 6 bit digitals, then determines that target voice content meets preset content format condition.
In above-described embodiment, the target voice content extracted from voice messaging is carried out based on preset content format condition Preliminary screening then executes subsequent corresponding target voice content and mesh when target voice content meets preset content format condition The correlation step that mark vocal print feature is authenticated, improves authentication efficiency, to improve access control efficiency.
In one embodiment, before step S202, above-mentioned access control method further include: it is read to obtain card reader User information;The user identifier that inquiry matches with user information;When inquiring the user identifier to match with user information, The prompt information for indicating that user information is verified is sent to speech detector;Prompt information is used to indicate speech detector detection Voice messaging.
Wherein, card reader is built-in in access control equipment, is also possible to only with access control equipment point-to-point connection Vertical component.Card reader can be RFID (Radio Frequency Identification, radio frequency identification) reader, i.e. card reading Device can read the user information in access card based on Radio Frequency Identification Technology.User information refers to the relevant information of user, is used for table Take over family for use.User information includes name, work number and position of user etc..
Specifically, access control equipment obtains the user information in access card by means of card reader, according to accessed User information inquires the user identifier to match with the user information in card reader.Match when inquiring with user information When user identifier, show that the corresponding user of user information is by authorization identifying, access control equipment is then to speech detector Send the prompt information for indicating that user information is verified.Prompt information executes detection language to speech detector based on the received The correlation step of message breath.
In one embodiment, when inquiring the user identifier to match with user information, access control equipment is by institute The user identifier inquired is shown by display, to avoid the user of access control request is triggered because forgetting user identifier And the problem of reducing access control efficiency.
For example, access control equipment is by means of reading when user A attempts to open the access control system in specified region Card device reads the user information of access card when user A swipes the card, and preliminary identification is carried out with the identity to user A, when being verified When, access control equipment is based on voice messaging and is authenticated again.
In one embodiment, when access control equipment gets user information, in memory according to the user information The user identifier that inquiry matches with the user information.
In above-described embodiment, preliminary identification is carried out based on user's information identity, is verified and then executes based on language The authenticating step of message breath, improves authentication efficiency, to improve access control efficiency.
In one embodiment, it when inquiring the user identifier to match with user information, is sent to speech detector Indicate the prompt information that is verified of user information, comprising: when inquiring the user identifier to match with user information, from pre- Selection interaction topic in the interaction exam pool of storage;Interaction topic is pushed into speech detector;Speech detector is received to correspond to Interact the interactive voice information of topic feedback;Corresponding interaction is extracted from interactive voice information by speech recognition modeling to answer Case;When interacting answer and pre-stored correct option matches, sending to speech detector indicates that user information authentication passes through Prompt information.
Specifically, when inquiring the user identifier to match with acquired user information, access control equipment according to User identifier randomly chooses interaction topic from pre-stored interaction exam pool, and selected interaction topic is sent to voice inspection Survey device.Speech detector shows user for topic is interacted in the form of voice messaging, and it is anti-for interaction topic to detect user The interactive voice information of feedback.Access control equipment obtains detected by speech detector, with interact the corresponding interaction language of topic Message breath extracts interaction answer by speech recognition modeling from the interactive voice information, and by extracted interaction answer and Pre-stored correct option corresponding with selected interaction topic is matched.When interaction answer and correct option successful match When, access control equipment sends the prompt information for indicating that user information authentication passes through to speech detector.
In one embodiment, pre-stored interaction topic is corresponding with user identifier.Access control equipment is according to user Mark inquires interaction topic corresponding with the user identifier.In one embodiment, access control equipment is by selected interaction Topic pushes to speech player, such as loudspeaker.
In one embodiment, selected interaction topic is converted into corresponding voice messaging by access control equipment, and The voice messaging that conversion obtains is sent to speech detector or speech player.
In one embodiment, selected interaction topic is sent to display by access control equipment, passes through display It is shown, user is detected for the interactive voice information of interaction topic feedback by speech detector.
In one embodiment, interaction exam pool is pre-stored in memory.When inquiring the use to match with user information When family identifies, access control equipment selection interaction topic from the interaction exam pool that memory is pre-stored.
In above-described embodiment, user information is verified by intelligent answer mode, is stolen to avoid because of access card And the problem of by preliminary identification to user information, improve the safety of access control system.When unauthorized user attempts to control When access control system, then reauthentication will not be carried out based on voice messaging because user information authentication does not pass through, improve access control effect Rate.
As shown in figure 3, in one embodiment, a kind of access control method is provided, method includes the following steps:
S302 obtains the read user information of card reader.
S304, the user identifier that inquiry matches with user information.
S306 is selected mutual when inquiring the user identifier to match with user information from pre-stored interaction exam pool Dynamic topic.
Interaction topic is pushed to speech detector by S308.
S310 receives the interactive voice information that speech detector corresponds to interaction topic feedback.
S312 extracts corresponding interaction answer by speech recognition modeling from interactive voice information.
S314, when interacting answer and pre-stored correct option matches, sending to speech detector indicates user's letter The prompt information that breath certification passes through;Prompt information is used to indicate speech detector detection voice messaging.
S316 obtains the voice messaging that speech detector detects.
S318 extracts target voice content by speech recognition modeling from voice messaging, and passes through Application on Voiceprint Recognition model Target vocal print feature is extracted from voice messaging.
S320, the user identifier that inquiry matches with target voice content.
S322 is inquired corresponding with user identifier pre- when inquiring the user identifier to match with target voice content If vocal print feature.
S324 matches default vocal print feature and target vocal print feature.
S326, when successful match, the corresponding user right rank of inquiry user identifier.
S328 sends access control instruction to electromagnetic lock when user right rank meets default access control condition;Door Prohibit control instruction and is used to indicate electromagnetic lock opening gate system.
S330 sends certification request to designated terminal when user right rank does not meet default access control condition;Refer to It is corresponding with the designated user of specified Permission Levels mark to determine terminal.
S332 receives designated terminal for the authenticate-acknowledge instruction of certification request feedback.
S334 is instructed to electromagnetic lock according to authenticate-acknowledge and is sent access control instruction;Access control instruction is used to indicate electricity Magnetic padlock opening gate system.
In above-described embodiment, identity based on the read user's information of card reader carries out preliminary identification, when testing Double authentication is carried out to user identity based on voice messaging when card passes through, when certification passes through according to the corresponding user right of user Whether rank, which meets default access control condition, executes different access control processes, improves access control system safety.And it mentions High access control efficiency.
In one embodiment, in above-mentioned each embodiment, access control equipment execute the step of specifically can be by processor It executes.Processor is built-in in access control equipment, is also possible to independent access control processor.
It should be understood that although each step in the flow chart of Fig. 2 and Fig. 3 is successively shown according to the instruction of arrow, But these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these There is no stringent sequences to limit for the execution of step, these steps can execute in other order.Moreover, in Fig. 2 and Fig. 3 At least part step may include that perhaps these sub-steps of multiple stages or stage are not necessarily same to multiple sub-steps One moment executed completion, but can execute at different times, and the execution in these sub-steps or stage sequence is also not necessarily Be successively carry out, but can at least part of the sub-step or stage of other steps or other steps in turn or Alternately execute.
In one embodiment, as shown in figure 4, providing a kind of access control device 400, comprising: receiving module 402, Extraction module 404, enquiry module 406, matching module 408 and sending module 410, in which:
Receiving module 402, the voice messaging for detecting and sending for receiving speech detector.
Extraction module 404 for extracting target voice content from voice messaging by speech recognition modeling, and passes through sound Line identification model extracts target vocal print feature from voice messaging.
Enquiry module 406, for inquiring the user identifier to match with target voice content.
Enquiry module 406 is also used to when inquiring the user identifier to match with target voice content, inquiry and user Identify corresponding default vocal print feature.
Matching module 408, for matching default vocal print feature and target vocal print feature.
Sending module 410, for sending access control instruction to electromagnetic lock when successful match;Access control instruction is used In instruction electromagnetic lock opening gate system.
In one embodiment, sending module 410 are also used to when successful match, the corresponding user of inquiry user identifier Permission Levels;When user right rank meets default access control condition, access control instruction is sent to electromagnetic lock.
In one embodiment, sending module 410 are also used to when successful match, the corresponding user of inquiry user identifier Permission Levels;When user right rank does not meet default access control condition, certification request is sent to designated terminal;It is specified whole It holds corresponding with the designated user of specified Permission Levels mark;The authenticate-acknowledge that designated terminal is received for certification request feedback refers to It enables;It is instructed according to authenticate-acknowledge to electromagnetic lock and sends access control instruction.
In one embodiment, enquiry module 406 are also used to carry out target voice content and preset content format condition Compare;When target voice content meets preset content format condition, the user that inquiry matches with target voice content is executed The step of mark.
As shown in figure 5, in one embodiment, access control device 400 further include: authentication module 412;
Authentication module 412, for obtaining the read user information of card reader;It is also used to inquire and match with user information User identifier;It is also used to when inquiring the user identifier to match with user information, sending to speech detector indicates to use The prompt information that family Information Authentication passes through;Prompt information is used to indicate speech detector detection voice messaging.
In one embodiment, authentication module 412 are also used to that the user identifier to match with user information ought be inquired When, the selection interaction topic from pre-stored interaction exam pool;Interaction topic is pushed into speech detector;Receive speech detector Interactive voice information corresponding to interaction topic feedback;It is extracted from interactive voice information by speech recognition modeling corresponding mutual Dynamic answer;When interacting answer and pre-stored correct option matches, sending to speech detector indicates user information authentication By prompt information.
Specific about access control device limits the restriction that may refer to above for access control method, herein not It repeats again.Modules in above-mentioned access control device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be access control equipment, Internal structure chart can be as shown in Figure 6.The computer equipment includes processor, the memory, communication connected by system bus Interface, speech detector and card reader.Wherein, the processor of the computer equipment is for providing calculating and control ability.The meter The memory for calculating machine equipment includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operation system System, computer program and database.The built-in storage is operating system and computer program in non-volatile memory medium Operation provides environment.The database of the computer equipment is for storing user identifier and default vocal print feature.The computer equipment Communication interface for being communicated accordingly with electromagnetic lock.To realize a kind of gate inhibition's control when the computer program is executed by processor Method processed.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, which performs the steps of when executing computer program obtains the voice letter that speech detector detects Breath;Target voice content is extracted from voice messaging by speech recognition modeling, and passes through Application on Voiceprint Recognition model from voice messaging Middle extraction target vocal print feature;The user identifier that inquiry matches with target voice content;When inquiring and target voice content When the user identifier to match, default vocal print feature corresponding with user identifier is inquired;By default vocal print feature and target vocal print Feature is matched;When successful match, access control instruction is sent to electromagnetic lock;Access control instruction is used to indicate electromagnetic lock Opening gate system.
In one embodiment, when successful match, access control instruction is sent to electromagnetic lock, comprising: work as successful match When, the corresponding user right rank of inquiry user identifier;When user right rank meets default access control condition, to electromagnetism Lock sends access control instruction.
In one embodiment, when successful match, access control instruction is sent to electromagnetic lock, comprising: work as successful match When, the corresponding user right rank of inquiry user identifier;When user right rank does not meet default access control condition, to finger Determine terminal and sends certification request;Designated terminal is corresponding with the designated user of specified Permission Levels mark;Designated terminal is received to be directed to The authenticate-acknowledge instruction of certification request feedback;It is instructed according to authenticate-acknowledge to electromagnetic lock and sends access control instruction.
In one embodiment, processor execute computer program when also perform the steps of by target voice content with Preset content format condition is compared;When target voice content meets preset content format condition, inquiry and target are executed The step of user identifier that voice content matches.
In one embodiment, it is realized when processor executes computer program and obtains the voice letter that speech detector detects Before the step of breath, also performs the steps of and obtain the read user information of card reader;What inquiry matched with user information User identifier;When inquiring the user identifier to match with user information, sending to speech detector indicates that user information is tested Demonstrate,prove the prompt information passed through;Prompt information is used to indicate speech detector detection voice messaging.
In one embodiment, it when inquiring the user identifier to match with user information, is sent to speech detector Indicate the prompt information that is verified of user information, comprising: when inquiring the user identifier to match with user information, from pre- Selection interaction topic in the interaction exam pool of storage;Interaction topic is pushed into speech detector;Speech detector is received to correspond to Interact the interactive voice information of topic feedback;Corresponding interaction is extracted from interactive voice information by speech recognition modeling to answer Case;When interacting answer and pre-stored correct option matches, sending to speech detector indicates that user information authentication passes through Prompt information.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor obtains the voice messaging that speech detector detects;Pass through speech recognition Model extracts target voice content from voice messaging, and target vocal print spy is extracted from voice messaging by Application on Voiceprint Recognition model Sign;The user identifier that inquiry matches with target voice content;When inquiring the user identifier to match with target voice content When, inquire default vocal print feature corresponding with user identifier;Default vocal print feature and target vocal print feature are matched;When When with success, access control instruction is sent to electromagnetic lock;Access control instruction is used to indicate electromagnetic lock opening gate system.
In one embodiment, when successful match, access control instruction is sent to electromagnetic lock, comprising: work as successful match When, the corresponding user right rank of inquiry user identifier;When user right rank meets default access control condition, to electromagnetism Lock sends access control instruction.
In one embodiment, when successful match, access control instruction is sent to electromagnetic lock, comprising: work as successful match When, the corresponding user right rank of inquiry user identifier;When user right rank does not meet default access control condition, to finger Determine terminal and sends certification request;Designated terminal is corresponding with the designated user of specified Permission Levels mark;Designated terminal is received to be directed to The authenticate-acknowledge instruction of certification request feedback;It is instructed according to authenticate-acknowledge to electromagnetic lock and sends access control instruction.
In one embodiment, it is also performed the steps of when computer program is executed by processor by target voice content It is compared with preset content format condition;When target voice content meets preset content format condition, inquiry and mesh are executed The step of user identifier that mark voice content matches.
In one embodiment, it is realized when computer program is executed by processor and obtains the voice that speech detector detects Before the step of information, also performs the steps of and obtain the read user information of card reader;Inquiry matches with user information User identifier;When inquiring the user identifier to match with user information, sending to speech detector indicates user information The prompt information being verified;Prompt information is used to indicate speech detector detection voice messaging.
In one embodiment, it when inquiring the user identifier to match with user information, is sent to speech detector Indicate the prompt information that is verified of user information, comprising: when inquiring the user identifier to match with user information, from pre- Selection interaction topic in the interaction exam pool of storage;Interaction topic is pushed into speech detector;Speech detector is received to correspond to Interact the interactive voice information of topic feedback;Corresponding interaction is extracted from interactive voice information by speech recognition modeling to answer Case;When interacting answer and pre-stored correct option matches, sending to speech detector indicates that user information authentication passes through Prompt information.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of access control method, which comprises
Obtain the voice messaging that speech detector detects;
Target voice content is extracted from the voice messaging by speech recognition modeling, and by Application on Voiceprint Recognition model from described Target vocal print feature is extracted in voice messaging;
The user identifier that inquiry matches with the target voice content;
When inquiring the user identifier to match with the target voice content, inquire corresponding with the user identifier default Vocal print feature;
The default vocal print feature and the target vocal print feature are matched;
When successful match, access control instruction is sent to electromagnetic lock;The access control instruction is used to indicate the electromagnetic lock Opening gate system.
2. to electromagnetic lock, transmission gate inhibition is controlled the method according to claim 1, wherein described when successful match System instruction, comprising:
When successful match, the corresponding user right rank of the user identifier is inquired;
When the user right rank meets default access control condition, access control instruction is sent to electromagnetic lock.
3. to electromagnetic lock, transmission gate inhibition is controlled the method according to claim 1, wherein described when successful match System instruction, comprising:
When successful match, the corresponding user right rank of the user identifier is inquired;
When the user right rank does not meet default access control condition, certification request is sent to designated terminal;The finger It is corresponding with the designated user of specified Permission Levels mark to determine terminal;
The designated terminal is received for the authenticate-acknowledge instruction of certification request feedback;
It is instructed according to the authenticate-acknowledge to electromagnetic lock and sends access control instruction.
4. the method according to claim 1, wherein the method also includes:
The target voice content is compared with preset content format condition;
When the target voice content meets the preset content format condition, inquiry and the target voice content phase are executed The step of matched user identifier.
5. according to claim 1 to method described in 4 any one claims, which is characterized in that the acquisition speech detection Before the voice messaging that device detects, the method also includes:
Obtain the read user information of card reader;
The user identifier that inquiry matches with the user information;
When inquiring the user identifier to match with the user information, sending to speech detector indicates user information verifying By prompt information;
The prompt information is used to indicate the speech detector detection voice messaging.
6. according to the method for claim 5.It is characterized in that, described ought inquire the use to match with the user information When family identifies, the prompt information for indicating that user information is verified is sent to speech detector, comprising:
When inquiring the user identifier to match with the user information, interaction topic is selected from pre-stored interaction exam pool Mesh;
The interaction topic is pushed into speech detector;
Receive the interactive voice information that the speech detector corresponds to the interaction topic feedback;
Corresponding interaction answer is extracted from the interactive voice information by speech recognition modeling;
When the interaction answer and pre-stored correct option match, sending to speech detector indicates user information authentication By prompt information.
7. a kind of access control device, which is characterized in that described device includes:
Receiving module, the voice messaging for detecting and sending for receiving speech detector;
Extraction module for extracting target voice content from the voice messaging by speech recognition modeling, and passes through vocal print Identification model extracts target vocal print feature from the voice messaging;
Enquiry module, for inquiring the user identifier to match with the target voice content;
The enquiry module is also used to when inquiring the user identifier to match with the target voice content, inquiry and institute State the corresponding default vocal print feature of user identifier;
Matching module, for matching the default vocal print feature and the target vocal print feature;
Sending module, for sending access control instruction to electromagnetic lock when successful match;The access control instruction is for referring to Show the electromagnetic lock opening gate system.
8. device according to claim 7, which is characterized in that described device further include: authentication module;
The authentication module, for obtaining the read user information of card reader;
The authentication module is also used to inquire the user identifier to match with the user information;
The authentication module is also used to when inquiring the user identifier to match with the user information, to speech detector Send the prompt information for indicating that user information is verified;
The prompt information is used to indicate the speech detector detection voice messaging.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 6 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
CN201810872225.4A 2018-08-02 2018-08-02 Access control method, device, computer equipment and storage medium Pending CN109273009A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810872225.4A CN109273009A (en) 2018-08-02 2018-08-02 Access control method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810872225.4A CN109273009A (en) 2018-08-02 2018-08-02 Access control method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109273009A true CN109273009A (en) 2019-01-25

Family

ID=65153272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810872225.4A Pending CN109273009A (en) 2018-08-02 2018-08-02 Access control method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109273009A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109830021A (en) * 2019-02-28 2019-05-31 重庆工商职业学院 Intelligent building access control system based on Internet of Things
CN110223429A (en) * 2019-06-19 2019-09-10 上海应用技术大学 Voice access control system
CN111599074A (en) * 2020-06-09 2020-08-28 苏州思必驰信息科技有限公司 Building entrance guard registration method, use method and device
CN111653277A (en) * 2020-06-10 2020-09-11 北京百度网讯科技有限公司 Vehicle voice control method, device, equipment, vehicle and storage medium
CN113611032A (en) * 2021-05-24 2021-11-05 沈阳格林豪森物业管理有限公司 Access control management method and system based on face recognition
CN114220209A (en) * 2022-02-22 2022-03-22 深圳灏鹏科技有限公司 Hotel access control method, device, equipment and storage medium
CN115100776A (en) * 2022-05-30 2022-09-23 厦门快商通科技股份有限公司 Access control authentication method, system and storage medium based on voice recognition
CN116092226A (en) * 2022-12-05 2023-05-09 北京声智科技有限公司 Voice unlocking method, device, equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040162726A1 (en) * 2003-02-13 2004-08-19 Chang Hisao M. Bio-phonetic multi-phrase speaker identity verification
US20080256613A1 (en) * 2007-03-13 2008-10-16 Grover Noel J Voice print identification portal
CN102306412A (en) * 2011-08-23 2012-01-04 厦门大学 Telephone voiceprint entrance guard
US20140343943A1 (en) * 2013-05-14 2014-11-20 Saudi Arabian Oil Company Systems, Computer Medium and Computer-Implemented Methods for Authenticating Users Using Voice Streams
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system
CN105654584A (en) * 2015-12-24 2016-06-08 歌尔声学股份有限公司 Access control monitoring method and system thereof
CN106373228A (en) * 2016-08-29 2017-02-01 杭州巴玺电子科技有限公司 Intelligent safe passive lockset system and unlocking method thereof
CN106875523A (en) * 2017-01-12 2017-06-20 深圳达实信息技术有限公司 A kind of Yunmen access control system and its management method
CN107346568A (en) * 2016-05-05 2017-11-14 阿里巴巴集团控股有限公司 The authentication method and device of a kind of gate control system
CN107464325A (en) * 2017-09-13 2017-12-12 南京信息职业技术学院 A kind of multi-layer gate control system and its implementation
CN108091016A (en) * 2017-12-21 2018-05-29 广东汇泰龙科技有限公司 The smart lock that a kind of vocal print method for unlocking and application this method are opened
CN108305633A (en) * 2018-01-16 2018-07-20 平安科技(深圳)有限公司 Speech verification method, apparatus, computer equipment and computer readable storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040162726A1 (en) * 2003-02-13 2004-08-19 Chang Hisao M. Bio-phonetic multi-phrase speaker identity verification
US20080256613A1 (en) * 2007-03-13 2008-10-16 Grover Noel J Voice print identification portal
CN102306412A (en) * 2011-08-23 2012-01-04 厦门大学 Telephone voiceprint entrance guard
US20140343943A1 (en) * 2013-05-14 2014-11-20 Saudi Arabian Oil Company Systems, Computer Medium and Computer-Implemented Methods for Authenticating Users Using Voice Streams
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system
CN105654584A (en) * 2015-12-24 2016-06-08 歌尔声学股份有限公司 Access control monitoring method and system thereof
CN107346568A (en) * 2016-05-05 2017-11-14 阿里巴巴集团控股有限公司 The authentication method and device of a kind of gate control system
CN106373228A (en) * 2016-08-29 2017-02-01 杭州巴玺电子科技有限公司 Intelligent safe passive lockset system and unlocking method thereof
CN106875523A (en) * 2017-01-12 2017-06-20 深圳达实信息技术有限公司 A kind of Yunmen access control system and its management method
CN107464325A (en) * 2017-09-13 2017-12-12 南京信息职业技术学院 A kind of multi-layer gate control system and its implementation
CN108091016A (en) * 2017-12-21 2018-05-29 广东汇泰龙科技有限公司 The smart lock that a kind of vocal print method for unlocking and application this method are opened
CN108305633A (en) * 2018-01-16 2018-07-20 平安科技(深圳)有限公司 Speech verification method, apparatus, computer equipment and computer readable storage medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109830021A (en) * 2019-02-28 2019-05-31 重庆工商职业学院 Intelligent building access control system based on Internet of Things
CN110223429A (en) * 2019-06-19 2019-09-10 上海应用技术大学 Voice access control system
CN111599074A (en) * 2020-06-09 2020-08-28 苏州思必驰信息科技有限公司 Building entrance guard registration method, use method and device
CN111653277A (en) * 2020-06-10 2020-09-11 北京百度网讯科技有限公司 Vehicle voice control method, device, equipment, vehicle and storage medium
CN113611032A (en) * 2021-05-24 2021-11-05 沈阳格林豪森物业管理有限公司 Access control management method and system based on face recognition
CN114220209A (en) * 2022-02-22 2022-03-22 深圳灏鹏科技有限公司 Hotel access control method, device, equipment and storage medium
CN114220209B (en) * 2022-02-22 2022-05-13 深圳灏鹏科技有限公司 Hotel access control method, hotel access control device, hotel access control equipment and storage medium
CN115100776A (en) * 2022-05-30 2022-09-23 厦门快商通科技股份有限公司 Access control authentication method, system and storage medium based on voice recognition
CN115100776B (en) * 2022-05-30 2023-12-26 厦门快商通科技股份有限公司 Entrance guard authentication method, system and storage medium based on voice recognition
CN116092226A (en) * 2022-12-05 2023-05-09 北京声智科技有限公司 Voice unlocking method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109273009A (en) Access control method, device, computer equipment and storage medium
CN104598796B (en) Personal identification method and system
CN109036438A (en) Storage cabinet control, device, computer equipment and storage medium
TWI770422B (en) Method and system for operating IoT devices
US20110285504A1 (en) Biometric identity verification
CN106204864A (en) Gate control system based on dynamic two-dimension code and door opening method
US20050226475A1 (en) Method of, and system for, accessing a home or dwelling
CN106790260A (en) A kind of multiple-factor identity identifying method
US9106422B2 (en) System and method for personalized security signature
CN110011811A (en) Vehicle unlock authentication method and device based on terminal device
US20140143860A1 (en) Two tier verification system and method
EP3248188B1 (en) Authentication method
CN110874541A (en) Electronic ticket entrance verification anti-counterfeiting system and method
CN106355709A (en) Access control system and door opening method based on dynamic quick response code
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN109949466A (en) A kind of intelligent entrance guard control system and method
CN111131202A (en) Identity authentication method and system based on multiple information authentication
CN110077361B (en) Vehicle control method and device
CN107104968A (en) Safety certifying method, system, terminal and the storage medium of portable finance device
JP2011527475A (en) Method and apparatus for improving biometric identification system
KR20030052194A (en) A system for user verification using biometric information, a method for registering certificates in the system and a user verification method
CN106156573A (en) A kind of method controlling intelligent terminal and the device of control intelligent terminal
KR20200004666A (en) Biometric information authentication system using machine learning and block chain and its method
US20140359703A1 (en) Method for securing an action that an actuating device must carry out at the request of a user
CN111862428B (en) Access control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190125