CN110610549A - Object verification method, object verification device, verification equipment and electronic equipment - Google Patents

Object verification method, object verification device, verification equipment and electronic equipment Download PDF

Info

Publication number
CN110610549A
CN110610549A CN201810620660.8A CN201810620660A CN110610549A CN 110610549 A CN110610549 A CN 110610549A CN 201810620660 A CN201810620660 A CN 201810620660A CN 110610549 A CN110610549 A CN 110610549A
Authority
CN
China
Prior art keywords
verification
identification information
authentication
information
reference information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810620660.8A
Other languages
Chinese (zh)
Inventor
楚佩斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD
Original Assignee
BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD filed Critical BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD
Priority to CN201810620660.8A priority Critical patent/CN110610549A/en
Publication of CN110610549A publication Critical patent/CN110610549A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B11/00Apparatus for validating or cancelling issued tickets

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application relates to an object verification method, an object verification device, verification equipment and electronic equipment. The object authentication method includes: acquiring first identification information of an authentication object; determining an associated reference information base based on the first identification information, the associated reference information base including verification reference information authorized with respect to the first identification information; acquiring second identification information of the verification object; and matching the second identification information with verification reference information in the association reference information base to verify the verification object. In this way, the associated verification reference information can be authorized to match the second identification information of the verification object based on the first identification information of the verification object, so that a better user experience can be provided for a scene needing the associated verification.

Description

Object verification method, object verification device, verification equipment and electronic equipment
Technical Field
The present application relates generally to the field of image processing, and more particularly, to an object authentication method, an object authentication apparatus, an authentication device, and an electronic device.
Background
With the development of economy, in addition to the production field, there is a need to meet the more abundant cultural demands of people. Meanwhile, in order to promote cultural communication and development, more and more large-scale cultural activities such as various performance activities and the like are held.
The performance activity, because it is completed within a predetermined time and place, requires authentication of the participating users. That is, the user participates in the performance by purchasing tickets or inviting, and when the user goes in and out of the performance site, the user needs to be authenticated based on the ticket held by the user.
However, when verifying a ticket, a user must present the ticket and read information of the ticket with a special device, such as a reading device, to perform verification, which may cause inconvenience to the user.
Aiming at the problem, the object can be verified and corresponding operation can be carried out without human intervention by adopting an image verification mode. For example, taking face verification as an example, whether static verification or dynamic verification is performed, verification is performed according to respective algorithms after face features are collected, and verification of a user can be completed.
Therefore, there is a need to provide a novel object authentication scheme.
Disclosure of Invention
The present application is proposed to solve the above-mentioned technical problems. Embodiments of the present application provide an object verification method, an object verification apparatus, a verification device, and an electronic device, which may match second identification information of a verification object through verification reference information authorized to be associated based on first identification information of the verification object, thereby providing better user experience for a scene requiring association verification.
According to an aspect of the present application, there is provided an object authentication method including: acquiring first identification information of an authentication object; determining an associated reference information base based on the first identification information, the associated reference information base including verification reference information authorized with respect to the first identification information; acquiring second identification information of the verification object; and matching the second identification information with verification reference information in the association reference information base to verify the verification object.
In the object authentication method, the authentication reference information includes at least one of: a plurality of authentication reference information including initial second identification information initially corresponding to the first identification information; and authentication reference information other than the initial second identification information specified based on the first identification information.
In the object authentication method, before obtaining the first identification information of the authentication object, the method further includes: acquiring verification reference information and first identification information of the verification object in advance; and establishing an association between the verification reference information and the first identification information.
In the above object authentication method, the second identification information and the authentication reference information are faces of the user.
In the above object authentication method, the first identification information is at least one of direct identity information and indirect identity information of the user.
In the above object authentication method, the authentication object is an identification article worn by the user.
In the object authentication method, determining the associated reference information base based on the first identification information includes: determining whether the first identification information has authentication reference information authorizing association authentication; and determining an associated reference information base containing the verification reference information in response to the first identification information having the verification reference information authorized to perform the associated verification.
In the object authentication method, the method further includes: determining whether a verification result of verifying the verification object is greater than a predetermined threshold; and determining that the verification object passes verification in response to the verification result being greater than a predetermined threshold.
In the above object authentication method, determining that the authentication object passes in response to the authentication result being greater than a predetermined threshold value includes: in response to the verification result being greater than a predetermined threshold, further determining a verification status of the first identification information; in response to the verification state of the first identification information being unverified, determining that the verification object passes verification; and changing the verification state of the first identification information into verified state.
According to another aspect of the present application, there is provided an object authentication apparatus including: a first acquisition unit configured to acquire first identification information of an authentication object; an association determination unit configured to determine an association reference information base based on the first identification information, the association reference information base including verification reference information authorized with respect to the first identification information; a second acquisition unit configured to acquire second identification information of the authentication object; and a matching verification unit for matching the second identification information with verification reference information in the association reference information base to verify the verification object.
In the above object authentication apparatus, the authentication reference information includes at least one of: a plurality of authentication reference information including initial second identification information initially corresponding to the first identification information; alternatively, the authentication reference information other than the initial second identification information specified based on the first identification information.
In the object authentication apparatus, the object authentication apparatus further includes: the information acquisition unit is used for acquiring the verification reference information and the first identification information of the verification object in advance before acquiring the first identification information of the verification object; and an information associating unit configured to establish an association between the verification reference information and the first identification information.
In the above-described object authentication apparatus, the second identification information and the authentication reference information are faces of the user.
In the above object authentication apparatus, the first identification information is at least one of direct identification information and indirect identification information of the user.
In the above object authentication apparatus, the authentication object is an identification article worn by the user.
In the above object authentication apparatus, the association determining unit is configured to: determining whether the first identification information has authentication reference information authorizing association authentication; and determining an associated reference information base containing the verification reference information in response to the first identification information having the verification reference information authorized to perform the associated verification.
In the object authentication apparatus, the object authentication apparatus further includes: an object verification unit for determining whether a verification result of verifying the verification object is greater than a predetermined threshold; and determining that the verification object passes verification in response to the verification result being greater than a predetermined threshold.
In the above object authentication apparatus, the object authentication unit is configured to: in response to the verification result being greater than a predetermined threshold, further determining a verification status of the first identification information; in response to the verification state of the first identification information being unverified, determining that the verification object passes verification; and changing the verification state of the first identification information into verified state.
According to still another aspect of the present application, there is provided an authentication apparatus including the image authentication device as described above.
According to yet another aspect of the present application, there is provided an electronic device including: a processor; and a memory having stored therein computer program instructions which, when executed by the processor, cause the processor to perform the object authentication method as described above.
According to the object verification method, the object verification device, the verification equipment and the electronic equipment, the verification reference information authorized to be associated based on the first identification information of the verification object can be matched with the second identification information of the verification object, and therefore better user experience is provided for scenes needing to be associated and verified.
Drawings
Various other advantages and benefits of the present application will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. It is obvious that the drawings described below are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. Also, like parts are designated by like reference numerals throughout the drawings.
FIG. 1 illustrates a flow diagram of an object authentication method according to an embodiment of the application;
FIG. 2 illustrates a flow chart of an example of generating a library of relational reference information in an object verification method according to an embodiment of the present application;
FIG. 3 illustrates a schematic block diagram of a face verification system architecture to which an object verification method according to an embodiment of the present application is applied;
FIG. 4 illustrates a flow chart of an application example of an object verification method according to an embodiment of the application;
FIG. 5 illustrates a block diagram of an object authentication device according to an embodiment of the present application;
FIG. 6 illustrates a block diagram of an authentication device according to an embodiment of the present application;
FIG. 7 illustrates a block diagram of an electronic device in accordance with an embodiment of the present application.
Detailed Description
Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be understood that the described embodiments are only some embodiments of the present application and not all embodiments of the present application, and that the present application is not limited by the example embodiments described herein.
Summary of the application
As described above, in the scene of a large event such as a show or a large conference, such a situation often occurs: for example, multiple users attending a concert together or visiting an amusement park such as disney together typically purchase tickets by one user, i.e., multiple tickets are included in generating an order. Meanwhile, in order to provide better entrance experience for the user, the user is allowed to finish the binding of the face and the ticket at a mobile phone end, a PC end and the like, so that the verification can be finished by directly using face recognition when entering a garden. Specifically, the user can enjoy the convenient operation (such as an RFID ticket, a terminal device in ticket purchase, etc.) only by having the collected certificate capable of uniquely identifying the user identity. In this case, the user can complete the verification without drawing out the ticket through the face recognition.
However, the above method has a problem that after a plurality of tickets of a plurality of users have collected faces, there is still a certain probability that a holds the ticket bound with the face B and B holds the ticket bound with the face C, which is very common especially when a family enters the scene.
In addition, because the face is bound to the ticket of the user, the user cannot pass the verification if the ticket is given to another user.
In view of the technical problem, the present application provides an object verification method, an object verification apparatus, a verification device, and an electronic device, which can determine an associated reference information base corresponding to first identification information of a verification object, where the associated reference information base includes verification reference information authorized with respect to the first identification information, so that verification of the verification object can be achieved by matching second identification information of the verification object with the verification reference information authorized to be associated with the second identification information.
That is, by referring to the authorization manner of the first identification information, for example, based on the same order or otherwise specifying the authorization manner of the correlation, the correlation reference information base of the second identification information may be constructed, thereby solving the verification problem when the second identification information initially corresponding to the first identification information does not correspond to the second identification information correlated to the first identification information at the time of verification.
Therefore, in the above scenario requiring association verification, a better user experience can be provided. For example, when a group user enters the field, the rapid and convenient face recognition entrance experience can be obtained through the association authorization of the face information and the ticket.
It should be noted that the above basic concept of the present application can be applied to various occasions where user authentication is required, including but not limited to large-scale performances, large-scale conferences, and other activities. In addition, the basic concept of the present application can also be applied to other occasions requiring object authentication, such as authentication of articles in industries such as logistics. Therefore, in the object authentication scheme of the present application, the specific type of the authentication object is not limited.
Further, with respect to the type and specific authentication scheme of the authentication object, in the object authentication method of the present application, the first identification information and the second identification information are not limited to the ticket held by the user and the face information of the user, but may be various information for identifying the user, for example, an ID of the user, an identification of a mobile device, various biometric information, and the like.
Having described the general principles of the present application, various non-limiting embodiments of the present application will now be described with reference to the accompanying drawings.
Exemplary method
Fig. 1 illustrates a flow chart of an object verification method according to an embodiment of the application.
As shown in fig. 1, an object authentication method according to an embodiment of the present application includes: s110, acquiring first identification information of a verification object; s120, determining an associated reference information base based on the first identification information, wherein the associated reference information base comprises verification reference information authorized relative to the first identification information; s130, acquiring second identification information of the verification object; and S140, matching the second identification information with verification reference information in the association reference information base to verify the verification object.
In step S110, first identification information of the authentication object is acquired. Here, as described above, the authentication object may be various objects including a person or thing, and the first identification information may also be various information for identifying the authentication object, depending on an application scenario. Although the first identification information is taken as a ticket held by the user as an example, the first identification information may also be a biometric feature of the user, such as a human face, a fingerprint, an iris, and the like.
In step S120, an associated reference information base based on the first identification information is determined, the associated reference information base including verification reference information authorized with respect to the first identification information.
For example, if a user purchases a plurality of tickets, and the plurality of tickets belonging to the same order are respectively bound with the corresponding face information of the user needing to be verified. Then, the face information corresponding to the plurality of tickets may be set as the verification reference information authorized with respect to one of the tickets, and form an associated reference information library. Thus, after obtaining the information of one of the tickets, an associated reference information base containing a plurality of face information associated with authorization based on the ticket can be determined.
In another case, if the user has previously purchased a ticket and transferred to others, the ticket may be bound to the face information of the user after transfer. Similarly, the face information of the transferred user is set as the verification reference information authorized relative to the ticket, and is formed into an associated reference information base. Thus, after the information of the ticket is acquired, an associated reference information base containing face information of the assigned user authorized to be associated based on the ticket can be determined.
That is, in the object authentication method according to the embodiment of the present application, the authentication reference information includes at least one of: a plurality of authentication reference information including initial second identification information initially corresponding to the first identification information; and authentication reference information other than the initial second identification information specified based on the first identification information.
Fig. 2 is a flowchart illustrating an example of generating an association reference information base in an object verification method according to an embodiment of the present application. As shown in fig. 2, based on the above example, the process of generating the association reference information base includes: after the start, in step S210, the user places an order, and the order includes a plurality of user tickets; in step S220, a plurality of users respectively enter a plurality of face information and bind with the ticket; in step S230, generating associated face information; in step S240, the user presents the ticket and authorizes others to use the ticket; in step S250, the referral recipient enters the face information and binds with the ticket.
For example, in a scene of entering the scene by directly using face recognition, a user can enter face information of a viewing person after ordering, so that the user can directly brush the face for comparison when entering the scene, and the entering can be completed after the comparison is successful. And one order can contain a plurality of film viewers, after the order is placed, the plurality of film viewers can respectively collect the face information and store the face information into the related face information base. In addition, if the scene requires the real-name system, the user can gift the ticket to others and authorize others to use the ticket, namely, the user only needs to gift the receiver to input the face information and can also use the ticket to enter the field.
In the object verification method according to the embodiment of the present application, before obtaining the first identification information of the verification object, the method further includes: acquiring verification reference information and first identification information of the verification object in advance; and establishing an association between the verification reference information and the first identification information.
That is, as described above, in order to determine the association reference information base authorized to be associated based on the acquired first identification information of the authentication object, it is necessary to establish an association between the first identification information and the authentication reference information in advance by way of authorization, and store such an association in the association reference information base together with the authentication reference information itself.
Taking a verification scene for personnel entry as an example, when a user obtains an entry certificate, for example, when the user purchases a ticket or receives an invitation, face information of the user may be collected in advance, and the face information is bound with the user. And, collecting the identification information of the user at the same time, where the identification information of the user may be direct identity information or indirect identity information of the user. Specifically, the direct identity information of the user represents information that can directly embody the identity of the user, such as an identification number of the user or RFID ticket paper purchased by the user. The indirect identity information of the user represents other information associated with the user, which can embody the identity of the user, such as related information of a user's on-body device (for example, a MAC address of WIFI or bluetooth of the user's mobile phone), or information of a wearable device worn by the user, such as a smart band.
In addition, in the object verification method according to the embodiment of the present application, it is only necessary to perform the collection and binding of the first identification information and the verification reference information before the actual object verification process, and an appropriate timing may be selected, for example, any time during the entire time period from the ticket ordering process to the entrance of the user for verification.
It will be understood by those skilled in the art that the first identification information of the authentication object and the authentication reference information are not limited to one type of information, and some types of information may be used in combination. For example, the RFID ticket information of the user and the information of the wearable device worn by the user are acquired at the same time, thereby ensuring the accuracy of the authentication.
In step S130, second identification information of the authentication object is acquired. As described above, the second identification information is information that is actually subjected to matching verification when the user performs verification. Although the user actually performs entrance verification through face recognition as an example, the second identification information may be other information. For example, in one example, the first identification information is face information of the user and the second identification information is ticket information held by the user, which may be applied to scenarios where the user identity needs to be first determined and then other details of the user are verified.
However, as described above, one advantage of face recognition over other authentication methods is that it can achieve a user's non-sensory entrance, thereby improving the user's experience. Therefore, the object verification method applied to the embodiment of the application can realize user verification under the condition that the user does not perceive, and realize rapid and convenient excellent user experience.
Therefore, in the object verification method according to the embodiment of the present application, the second identification information and the verification reference information are faces of the user.
Also, in the object verification method according to an embodiment of the present application, the first identification information is at least one of direct identity information and indirect identity information of the user.
For example, for the direct identity information or the indirect identity information of the user, a specific information collecting device may be used to acquire the information. For example, the RFID information of the user may be read by a high-power RFID reading module at an active site, or the device information of the user may be collected by a WIFI probe device.
In addition, although the mobile device and the like carried by the user are used as indirect identity information, these devices can also be used as the authentication object itself, that is, the authentication object can be a mobile phone, an RFID bracelet and other special authenticatable graphics carried by the user. For example, the verification object may be a mask, chest card, badge, etc. worn by the user, or a wearable device such as a smart watch, smart glasses, etc.
Therefore, in the object authentication method according to the embodiment of the present application, the authentication object is an identification article worn by the user.
In step S140, the second identification information is matched with the verification reference information in the association reference information base to verify the verification object.
In addition, in the object verification method according to the embodiment of the application, since all users need to be verified in a large-scale event and other scenes, not all users have the need of authorization association verification. Therefore, it may be determined first whether the first identification information authorizes association verification, that is, has verification reference information authorized to perform association verification, and the association reference information base may be determined only in the case where the first identification information has verification reference information authorized to perform association verification. In this way, it is possible to avoid determining the associated reference information base for each acquired first identification information of the verification object by querying, thereby affecting the verification efficiency of the system.
That is, in the object verification method according to an embodiment of the present application, determining the associated reference information base based on the first identification information includes: determining whether the first identification information has authentication reference information authorizing association authentication; and determining an associated reference information base containing the verification reference information in response to the first identification information having the verification reference information authorized to perform the associated verification.
Here, in a specific matching process, a fuzzy matching may be allowed to some extent. That is, in the object authentication method according to the embodiment of the present application, the method further includes: determining whether a verification result of verifying the verification object is greater than a predetermined threshold; and determining that the verification object passes verification in response to the verification result being greater than a predetermined threshold.
In addition, in order to avoid that a plurality of users use the same ticket repeatedly for verification, the verification state of the ticket can be set, that is, after the first user passes the verification of the ticket, the ticket is set to be in a specific verification state, so that the second user can not use the ticket to pass the verification.
Therefore, in the object verification method according to an embodiment of the present application, determining that the verification object is verified in response to the verification result being greater than the predetermined threshold includes: in response to the verification result being greater than a predetermined threshold, further determining a verification status of the first identification information; in response to the verification state of the first identification information being unverified, determining that the verification object passes verification; and changing the verification state of the first identification information into verified state.
In addition, by applying the object verification method according to the embodiment of the application, if the user accidentally loses the ticket, the person who picks up the ticket cannot complete ticket verification because the person does not log and bind the face information in the associated face information base.
Fig. 3 illustrates a schematic block diagram of a face verification system architecture to which an object verification method according to an embodiment of the present application is applied. As shown in fig. 3, the entire system is divided into 6 modules.
Firstly, the face information collection and binding module 310 is mainly responsible for collecting face information and then binding the face information with a user. For example, the face information can be bound with RFID ticket paper, and the face information can also be bound with personal equipment (such as a mobile phone WIFI or a Bluetooth MAC address) of a user. (moreover, this part of the work may be done when the user places an order, and the user may be guided to collect the face information when placing an order, and the binding of the face information and the ticket information/device information may be done at this time.)
The field user verification information acquisition module 320 can read the RFID information of the user through a high-power RFID reading module, or can acquire the device information of the user through a WIFI probe device, and can identify one user through the information.
The face verification library management module 330 is mainly responsible for maintaining the corresponding relationship between the face information and the RFID ticket (or device information), and also maintains an associated face information library.
The associated face information base 340 includes face information of the user corresponding to the user's identification.
The face acquisition module 350 is responsible for acquiring face information.
The face comparison module 360 is responsible for comparing the information collected by the face collection module with the face information in the associated face information base and outputting the result.
The business decision module 370 makes a corresponding decision according to the result given by the face comparison module 260. For example, the similarity degree given by the face comparison module 360 is 95%, and the business decision module 370 decides to let the person pass through the gate.
Fig. 4 illustrates a flowchart of an application example of an object verification method according to an embodiment of the present application. As shown in fig. 4, the application examples include: s401, the device collects the ticket or inquires the associated ticket through other information; s402, inquiring whether the ticket authorizes the association verification; s403, in response to the judgment result in the S402 being yes, namely the ticket authorizes the association verification, inquiring whether the associated face information exists; s404, in response to the judgment result in the S403 is yes, namely associated face information exists, establishing an associated face information base based on the associated effective face information; s405, the equipment collects face information, retrieves and matches the face information with the face information in the face information base, and if the judgment results in the steps S402 and S403 are 'No', namely the ticket is not authorized to be associated and verified in the step S402, or no associated face information exists in the step S403, the steps are skipped to; s406, judging whether a matched face is retrieved or not; s407, in response to the judgment result in the S406 being yes, namely the matched face is retrieved, judging whether the ticket state corresponding to the matched face is not verified; s408, in response to the judgment result in the step S407 being "yes", that is, the ticket state corresponding to the matched face is not verified, changing the ticket state to be verified; s409, confirming that the user passes the verification, enabling the user to normally enter the field, and ending the process; in S410, in response to the determination result of step S406 and step S407 being "no", that is, in step S406, it is determined that the matching face is not retrieved, or in step S407, it is determined that the ticket state corresponding to the matching face is not unverified, for example, verified, or no state, it is determined that the user fails to enter the authentication system, and the process ends.
Exemplary devices
Fig. 5 illustrates a block diagram of an object authentication apparatus according to an embodiment of the present application.
As shown in fig. 5, an object authentication apparatus 500 according to an embodiment of the present application includes: a first obtaining unit 510 configured to obtain first identification information of an authentication object; an association determining unit 520 configured to determine an association reference information base based on the first identification information, the association reference information base including verification reference information authorized with respect to the first identification information; a second obtaining unit 530 configured to obtain second identification information of the authentication object; and a matching verification unit 540, configured to match the second identification information with verification reference information in the association reference information base to verify the verification object.
In one example, in the above object authentication apparatus 500, the authentication reference information includes at least one of: a plurality of authentication reference information including initial second identification information initially corresponding to the first identification information; alternatively, the authentication reference information other than the initial second identification information specified based on the first identification information.
In one example, in the object verification apparatus 500 described above, further comprising: the information acquisition unit is used for acquiring the verification reference information and the first identification information of the verification object in advance before acquiring the first identification information of the verification object; and an information associating unit configured to establish an association between the verification reference information and the first identification information.
In one example, in the above-described object authentication apparatus 500, the second identification information and the authentication reference information are faces of the user.
In one example, in the above-described object authentication apparatus 500, the first identification information is at least one of direct identity information and indirect identity information of the user.
In one example, in the above-described object authentication apparatus 500, the authentication object is an identification article worn by the user.
In an example, in the above object verification apparatus 500, the association determining unit 520 is configured to: determining whether the first identification information has authentication reference information authorizing association authentication; and determining an associated reference information base containing the verification reference information in response to the first identification information having the verification reference information authorized to perform the associated verification.
In one example, in the object verification apparatus 500 described above, further comprising: an object verification unit for determining whether a verification result of verifying the verification object is greater than a predetermined threshold; and determining that the verification object passes verification in response to the verification result being greater than a predetermined threshold.
In one example, in the above object authentication apparatus 500, the object authentication unit is configured to: in response to the verification result being greater than a predetermined threshold, further determining a verification status of the first identification information; in response to the verification state of the first identification information being unverified, determining that the verification object passes verification; and changing the verification state of the first identification information into verified state.
Here, it can be understood by those skilled in the art that the specific functions and operations of the respective units and modules in the above-described object authentication apparatus 500 have been described in detail in the object authentication method described above with reference to fig. 1 to 4, and thus, a repetitive description thereof will be omitted.
As described above, the object authentication apparatus 500 according to the embodiment of the present application may be implemented in various terminal devices, such as an activity site or a server for authentication located remotely. In one example, the object authentication apparatus 500 according to the embodiment of the present application may be integrated into a terminal device as one software module and/or hardware module. For example, the object verification apparatus 500 may be a software module in an operating system of the terminal device, or may be an application program developed for the terminal device; of course, the object authentication apparatus 500 may also be one of many hardware modules of the terminal device.
Alternatively, in another example, the object authentication apparatus 500 and the terminal device may be separate devices, and the object authentication apparatus 500 may be connected to the terminal device through a wired and/or wireless network and transmit the interactive information according to an agreed data format.
Exemplary authentication device
FIG. 6 illustrates a block diagram of an authentication device according to an embodiment of the present application.
As shown in fig. 6, the authentication apparatus 600 according to the embodiment of the present application includes an object authentication device 610 for authenticating the authentication object. The object authentication means 610 comprises: a first acquisition unit 611 configured to acquire first identification information of an authentication object; an association determining unit 612 configured to determine an association reference information base based on the first identification information, the association reference information base including verification reference information authorized with respect to the first identification information; a second obtaining unit 613 configured to obtain second identification information of the authentication object; and a matching verification unit 614 for matching the second identification information with verification reference information in the association reference information base to verify the verification object.
In one example, in the above-described authentication apparatus 600, the authentication reference information includes at least one of: a plurality of authentication reference information including initial second identification information initially corresponding to the first identification information; alternatively, the authentication reference information other than the initial second identification information specified based on the first identification information.
In one example, in the authentication apparatus 600 described above, the object authentication shape 610 further includes: the information acquisition unit is used for acquiring the verification reference information and the first identification information of the verification object in advance before acquiring the first identification information of the verification object; and an information associating unit configured to establish an association between the verification reference information and the first identification information.
In one example, in the above-described authentication apparatus 600, the second identification information and the authentication reference information are faces of the user.
In one example, in the above-described authentication apparatus 600, the first identification information is at least one of direct identity information and indirect identity information of the user.
In one example, in the authentication device 600 described above, the authentication object is an identification item worn by the user.
In one example, in the above-mentioned authentication apparatus 600, the association determining unit 612 is configured to: determining whether the first identification information has authentication reference information authorizing association authentication; and determining an associated reference information base containing the verification reference information in response to the first identification information having the verification reference information authorized to perform the associated verification.
In one example, in the verification apparatus 600 described above, the object verification device 610 further includes: an object verification unit for determining whether a verification result of verifying the verification object is greater than a predetermined threshold; and determining that the verification object passes verification in response to the verification result being greater than a predetermined threshold.
In one example, in the authentication apparatus 600 described above, the object authentication unit is configured to: in response to the verification result being greater than a predetermined threshold, further determining a verification status of the first identification information; in response to the verification state of the first identification information being unverified, determining that the verification object passes verification; and changing the verification state of the first identification information into verified state.
It can be understood by those skilled in the art that other details of the verification apparatus according to the embodiment of the present application are exactly the same as the corresponding details described previously with respect to the object verification method according to the embodiment of the present application, and are not described again here to avoid redundancy.
Exemplary electronic device
Next, an electronic apparatus according to an embodiment of the present application is described with reference to fig. 7.
FIG. 7 illustrates a block diagram of an electronic device in accordance with an embodiment of the present application.
As shown in fig. 7, the electronic device 10 includes one or more processors 11 and memory 12.
The processor 11 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 10 to perform desired functions.
Memory 12 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, Random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, Read Only Memory (ROM), hard disk, flash memory, etc. One or more computer program instructions may be stored on the computer-readable storage medium and executed by the processor 11 to implement the object authentication methods of the various embodiments of the present application described above and/or other desired functions. Various contents such as credential information, biometric information, authentication reference information associated with authorization, and the like can also be stored in the computer-readable storage medium.
In one example, the electronic device 10 may further include: an input device 13 and an output device 14, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
For example, the input device 13 may be a camera for taking an image of the user, or may be a two-dimensional code reader or the like for reading credential information of the user. The input device 13 may also include, for example, a keyboard, a mouse, and the like.
The output device 14 may output various information including information on whether the user's authentication is passed or not to the outside. The output devices 14 may include, for example, a display, speakers, a printer, and a communication network and its connected remote output devices, among others.
Of course, for simplicity, only some of the components of the electronic device 10 relevant to the present application are shown in fig. 7, and components such as buses, input/output interfaces, and the like are omitted. In addition, the electronic device 10 may include any other suitable components depending on the particular application.
Exemplary computer program product and computer-readable storage Medium
In addition to the above-described methods and apparatus, embodiments of the present application may also be a computer program product comprising computer program instructions that, when executed by a processor, cause the processor to perform the steps in the object authentication method according to various embodiments of the present application described in the "exemplary methods" section of this specification, supra.
The computer program product may be written with program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, cause the processor to perform the steps in the object verification method according to various embodiments of the present application described in the "exemplary methods" section above in this specification.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the application to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (20)

1. An object authentication method, comprising:
acquiring first identification information of an authentication object;
determining an associated reference information base based on the first identification information, the associated reference information base including verification reference information authorized with respect to the first identification information;
acquiring second identification information of the verification object; and
and matching the second identification information with verification reference information in the associated reference information base to verify the verification object.
2. The object authentication method according to claim 1, wherein the authentication reference information includes at least one of:
a plurality of authentication reference information including initial second identification information initially corresponding to the first identification information; or
Authentication reference information other than the initial second identification information specified based on the first identification information.
3. The object authentication method according to claim 1, further comprising, before acquiring the first identification information of the authentication object:
acquiring verification reference information and first identification information of the verification object in advance; and
establishing an association between the verification reference information and the first identification information.
4. The object authentication method according to any one of claims 1 to 3, wherein the second identification information and the authentication reference information are faces of the user.
5. The object authentication method according to claim 4, wherein the first identification information is at least one of direct identity information and indirect identity information of the user.
6. An object authentication method according to any one of claims 1 to 3, wherein the authentication object is an identification item worn by the user.
7. The object authentication method of claim 1, wherein determining the associated reference information base based on the first identification information comprises:
determining whether the first identification information has authentication reference information authorizing association authentication; and
and determining an associated reference information base containing the verification reference information in response to the first identification information having the verification reference information authorized for associated verification.
8. The object authentication method of claim 1, further comprising:
determining whether a verification result of verifying the verification object is greater than a predetermined threshold; and
and determining that the verification object passes the verification in response to the verification result being larger than a preset threshold value.
9. The object authentication method of claim 8, wherein determining that the authentication object is authenticated in response to the authentication result being greater than a predetermined threshold comprises:
in response to the verification result being greater than a predetermined threshold, further determining a verification status of the first identification information;
in response to the verification state of the first identification information being unverified, determining that the verification object passes verification; and
and changing the verification state of the first identification information into verified state.
10. An object authentication apparatus comprising:
a first acquisition unit configured to acquire first identification information of an authentication object;
an association determination unit configured to determine an association reference information base based on the first identification information, the association reference information base including verification reference information authorized with respect to the first identification information;
a second acquisition unit configured to acquire second identification information of the authentication object; and
and the matching verification unit is used for matching the second identification information with verification reference information in the associated reference information base so as to verify the verification object.
11. The object authentication apparatus according to claim 10, wherein the authentication reference information includes at least one of:
a plurality of authentication reference information including initial second identification information initially corresponding to the first identification information; or
Authentication reference information other than the initial second identification information specified based on the first identification information.
12. The object authentication device of claim 10, further comprising:
the information acquisition unit is used for acquiring the verification reference information and the first identification information of the verification object in advance before acquiring the first identification information of the verification object; and
an information associating unit configured to establish an association between the verification reference information and the first identification information.
13. The object authentication apparatus according to any one of claims 10 to 12, wherein the second identification information and the authentication reference information are a face of a user.
14. The object authentication device according to claim 13, wherein the first identification information is at least one of direct identity information and indirect identity information of the user.
15. An object authentication device according to any one of claims 10 to 12 wherein the authentication object is an identification item worn by the user.
16. The object authentication device according to claim 10, wherein the association determination unit is configured to:
determining whether the first identification information has authentication reference information authorizing association authentication; and
and determining an associated reference information base containing the verification reference information in response to the first identification information having the verification reference information authorized for associated verification.
17. The object authentication device of claim 10, further comprising:
an object verification unit for determining whether a verification result of verifying the verification object is greater than a predetermined threshold; and determining that the verification object passes verification in response to the verification result being greater than a predetermined threshold.
18. The object authentication device according to claim 17, wherein the object authentication unit is configured to:
in response to the verification result being greater than a predetermined threshold, further determining a verification status of the first identification information;
in response to the verification state of the first identification information being unverified, determining that the verification object passes verification; and
and changing the verification state of the first identification information into verified state.
19. An authentication apparatus comprising an image authentication device according to any one of claims 10 to 18.
20. An electronic device, comprising:
a processor; and
a memory having stored therein computer program instructions which, when executed by the processor, cause the processor to perform the object authentication method of any one of claims 1 to 9.
CN201810620660.8A 2018-06-15 2018-06-15 Object verification method, object verification device, verification equipment and electronic equipment Pending CN110610549A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810620660.8A CN110610549A (en) 2018-06-15 2018-06-15 Object verification method, object verification device, verification equipment and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810620660.8A CN110610549A (en) 2018-06-15 2018-06-15 Object verification method, object verification device, verification equipment and electronic equipment

Publications (1)

Publication Number Publication Date
CN110610549A true CN110610549A (en) 2019-12-24

Family

ID=68888297

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810620660.8A Pending CN110610549A (en) 2018-06-15 2018-06-15 Object verification method, object verification device, verification equipment and electronic equipment

Country Status (1)

Country Link
CN (1) CN110610549A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117331827A (en) * 2023-09-28 2024-01-02 北京云枢创新软件技术有限公司 Method for matching coverage objects in verification plan, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101467173A (en) * 2006-05-09 2009-06-24 票务专家公司 Apparatus for access control and processing
CN101589404A (en) * 2006-12-07 2009-11-25 票务专家公司 Methods and systems for access control using a networked turnstele
CN205091815U (en) * 2015-11-09 2016-03-16 中通服公众信息产业股份有限公司 Access control system based on iris and radio frequency card identification technique
CN206684814U (en) * 2017-04-14 2017-11-28 昆山优自在智能科技有限公司 A kind of RFID face recognition systems based on high in the clouds data exchange

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101467173A (en) * 2006-05-09 2009-06-24 票务专家公司 Apparatus for access control and processing
CN101589404A (en) * 2006-12-07 2009-11-25 票务专家公司 Methods and systems for access control using a networked turnstele
CN205091815U (en) * 2015-11-09 2016-03-16 中通服公众信息产业股份有限公司 Access control system based on iris and radio frequency card identification technique
CN206684814U (en) * 2017-04-14 2017-11-28 昆山优自在智能科技有限公司 A kind of RFID face recognition systems based on high in the clouds data exchange

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117331827A (en) * 2023-09-28 2024-01-02 北京云枢创新软件技术有限公司 Method for matching coverage objects in verification plan, storage medium and electronic device
CN117331827B (en) * 2023-09-28 2024-05-14 北京云枢创新软件技术有限公司 Method for matching coverage objects in verification plan, storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN107679861B (en) Resource transfer method, fund payment method, device and electronic equipment
CN109165940B (en) Anti-theft method and device and electronic equipment
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
US10135817B2 (en) Enhancing authentication and source of proof through a dynamically updatable biometrics database
US20180374101A1 (en) Facial biometrics card emulation for in-store payment authorization
CN104156651A (en) Access control method and device for terminal
US9576135B1 (en) Profiling user behavior through biometric identifiers
US11676118B2 (en) Methods and systems for conducting multi-user interactions on a device using biometric authentication
CN113139667B (en) Hotel room recommending method, device, equipment and storage medium based on artificial intelligence
US20230162194A1 (en) Systems and methods for automated identity verification
Du Mobile payment recognition technology based on face detection algorithm
CN111145762B (en) Electronic certificate verification method and system based on voiceprint recognition
US10114936B2 (en) Information processing device, authentication system, authentication method, and program
US20210312036A1 (en) Systems and methods for authentication code entry using mobile electronic devices
US20190019189A1 (en) Payment authentication
CN110610549A (en) Object verification method, object verification device, verification equipment and electronic equipment
JP7207521B2 (en) Authentication method, authentication device, program
KR20120013881A (en) Loaning method using kiosk system
JP7420206B2 (en) Accounting system, information display device, information processing device, accounting method, and program
JP2023126937A (en) Information processing device, information processing method, and program
WO2020140300A1 (en) Method and system for implementing transaction by means of electronic card graphic code
CN110334492B (en) User authentication method, user authentication device and electronic equipment
CN110874804B (en) Resource acquisition processing method, device and system
TW202209139A (en) Authentication method based on biological characteristic information, computer system and readable medium
JP2004005619A (en) Fingerprint authentication device, and fingerprint authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191224