CN110766837A - Control method and device for passing equipment, machine readable medium and equipment - Google Patents

Control method and device for passing equipment, machine readable medium and equipment Download PDF

Info

Publication number
CN110766837A
CN110766837A CN201911027614.8A CN201911027614A CN110766837A CN 110766837 A CN110766837 A CN 110766837A CN 201911027614 A CN201911027614 A CN 201911027614A CN 110766837 A CN110766837 A CN 110766837A
Authority
CN
China
Prior art keywords
authentication system
authentication
fails
authenticated
passing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911027614.8A
Other languages
Chinese (zh)
Inventor
周曦
姚志强
易渝富
万珺
游宇
陈江豪
黄华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Boyan Intelligent Technology Co Ltd
Original Assignee
Guangzhou Boyan Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Boyan Intelligent Technology Co Ltd filed Critical Guangzhou Boyan Intelligent Technology Co Ltd
Priority to CN201911027614.8A priority Critical patent/CN110766837A/en
Publication of CN110766837A publication Critical patent/CN110766837A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a control method of a passing device, which comprises the following steps: controlling a first authentication system to perform first authentication on an object to be authenticated; if the first authentication fails, controlling a second authentication system to perform second authentication on the object which fails in authentication; wherein the first authentication system has an authentication mode different from that of the second authentication system; the first authentication system and the second authentication system are both arranged on the passing equipment. According to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured.

Description

Control method and device for passing equipment, machine readable medium and equipment
Technical Field
The invention relates to the field of entrance guard, in particular to a control method and device of passing equipment, a machine readable medium and equipment.
Background
When the user passes through the gate/entrance guard, the identity verification is required, if the authentication fails, the user cannot pass, and only the intervention of staff can be solved. Generally speaking, the larger the size of the information base, the higher the probability of authentication failure, and the higher the frequency of intervention of the staff, which greatly reduces the queue passing efficiency.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention provides a control method, device, machine readable medium and device for traffic equipment, which are used to solve the problems of the prior art.
To achieve the above and other related objects, the present invention provides a control method of a traffic device, the method comprising:
controlling a first authentication system to perform first authentication on an object to be authenticated;
if the first authentication fails, controlling a second authentication system to perform second authentication on the object which fails in authentication;
wherein the first authentication system has an authentication mode different from that of the second authentication system; the first authentication system and the second authentication system are both arranged on the passing equipment.
Optionally, if the first authentication fails, automatically triggering a second authentication system on the passing device to perform a second authentication on the object that fails to be authenticated.
Optionally, after the second authentication is passed, the second authentication system is in a preset state.
Optionally, the preset state includes an off state or a sleep state.
Optionally, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object which fails to be authenticated is authenticated for the second time.
Optionally, the first authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Optionally, the second authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
To achieve the above and other related objects, the present invention provides a control device for a passage apparatus, the device comprising:
the control module is used for controlling the first authentication system to carry out first authentication on the object to be authenticated;
the second control module is used for controlling the second authentication system to carry out the second authentication on the object which fails in the authentication when the first authentication fails; wherein the first authentication system has an authentication mode different from that of the second authentication system; the first authentication system and the second authentication system are both arranged on the passing equipment.
Optionally, if the first authentication fails, automatically triggering a second authentication system on the passing device to perform a second authentication on the object that fails to be authenticated.
Optionally, the preset state includes an off state or a sleep state.
Optionally, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object which fails to be authenticated is authenticated for the second time.
Optionally, the first authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Optionally, the second authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
To achieve the above and other related objects, the present invention provides a traffic device, comprising:
the first authentication system is used for authenticating an object to be authenticated for the first time;
the second authentication system is used for carrying out second authentication on the object which fails in the first authentication;
the control device is described above.
To achieve the above and other related objects, the present invention provides an apparatus comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform one or more of the methods described previously.
To achieve the foregoing and other related objectives, the present invention provides one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform one or more of the methods described above.
As described above, the method, the device, the machine readable medium and the equipment for controlling the passing equipment provided by the invention have the following beneficial effects:
according to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured.
Drawings
FIG. 1 is a flow chart of a control method of a traffic device according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a control device of a traffic device according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a traffic device according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
As shown in fig. 1, a control method of a traffic device, the method comprising:
s11 controls the first authentication system to authenticate the object to be authenticated for the first time; the first authentication system is arranged on the passing equipment.
In some embodiments, the access device may be a door entry/gate or other person accessible device that requires authorization to open or close.
In some embodiments, the first authentication system may comprise one of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
The card swiping authentication system generally comprises a host and a card reader, wherein a card holder can sense the card and lead the information in the card to the host only by quickly and statically swinging the card close to the card reader once, the host can examine the card illegally, and then the decision can be made to close the door.
The fingerprint authentication means that the skin on the front of the tail end of the finger is provided with uneven lines, and contains a large amount of information. The lines of the skin are different from each other in patterns, break points and intersection points, the lines are called 'features' in information processing, the features have uniqueness and permanence, a person can be corresponding to the fingerprint of the person, and the real identity of the person can be verified by comparing the fingerprint features with the fingerprint features stored in advance.
The iris authentication system determines the identity of a person by comparing the similarity between features of iris images.
The voiceprint authentication system performs identity authentication by utilizing voiceprint recognition. Voiceprint recognition is a process of recognizing the identity of a speaker contained in a voice segment according to the individual characteristics of the speaker contained in the voice.
The palm print authentication means that the palm print characteristics of the person to be tested are compared with the palm print template of the user in the database, and then the result is obtained through judgment, and finally the palm print authentication is completed.
The face authentication is to acquire a face image of a user through video acquisition equipment, calculate and analyze the position, the face shape and the angle of the facial features of the user, and compare the facial features with a template in a face base library so as to judge the real identity of the user. The face recognition technology has two main purposes in daily life, one is used for checking the face and verifying that a person is a person, namely, the face comparison is 1: 1; and the other method is used for face recognition to verify who you are, namely, the face recognition is 1: N.
S12 controls the second authentication system to perform the second authentication on the object whose authentication has failed, if the first authentication has failed. Wherein the second authentication system is disposed on a pass device.
It should be noted that the first authentication system is authenticated in a different manner than the second authentication system.
For example, the first authentication system adopts card swiping authentication, and the second authentication system adopts a fingerprint authentication system, an iris authentication system, a voiceprint authentication system, a face swiping authentication system or a palm print authentication system; the first authentication system adopts a fingerprint authentication system, and the second authentication system can adopt a card swiping authentication system, an iris authentication system, a voiceprint authentication system, a face swiping or palm print authentication system; the first authentication system adopts an iris authentication system, and the second authentication system can adopt a card swiping authentication system, a face swiping authentication system, a voiceprint authentication system or a palm print authentication system; if the first authentication system adopts a voiceprint authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a palm print authentication system; if the first authentication system adopts a palm print authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a voiceprint authentication system; if the first authentication system adopts a face-swiping authentication system, the second authentication system may adopt a card-swiping authentication system, a fingerprint authentication system, an iris authentication system, or a voiceprint authentication system.
It should be noted that the manner of controlling the second authentication system to perform the second authentication on the object that fails to be authenticated is an automatic triggering manner, that is, the first authentication fails, and then the second authentication system on the pass device is automatically triggered to perform the second authentication on the object that fails to be authenticated.
In some embodiments, after the second authentication is passed, the second authentication system is in a preset state. The preset state comprises a closing state or a dormant state.
In some embodiments, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object with the authentication failure is authenticated for the second time.
Specifically, when the first authentication fails, the second authentication system is automatically awakened to be switched from the dormant state to the working state, the second authentication system performs the second authentication on the object which has failed in the first authentication after awakening, and if the second authentication passes, the second authentication system is switched from the working state to the dormant state.
As shown in fig. 2, a control device of a passage apparatus, the device comprising: a control module 11 and a second control module 12
The control module 11 is configured to control the first authentication system to perform a first authentication on an object to be authenticated; the first authentication system is arranged on the passing equipment.
In some embodiments, the access device may be a door entry/gate or other person accessible device that requires authorization to open or close.
In some embodiments, the first authentication system may comprise one of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
The card swiping authentication system generally comprises a host and a card reader, wherein a card holder can sense the card and lead the information in the card to the host only by quickly and statically swinging the card close to the card reader once, the host is used for examining the card illegally, and then whether the door is opened or not is determined.
The fingerprint authentication means that the skin on the front of the tail end of the finger is provided with uneven lines, and contains a large amount of information. The lines of the skin are different from each other in patterns, break points and intersection points, the lines are called 'features' in information processing, the features have uniqueness and permanence, a person can be corresponding to the fingerprint of the person, and the real identity of the person can be verified by comparing the fingerprint features with the fingerprint features stored in advance.
The iris authentication system determines the identity of a person by comparing the similarity between features of iris images.
The voiceprint authentication system performs identity authentication by utilizing voiceprint recognition. Voiceprint recognition is a process of recognizing the identity of a speaker contained in a voice segment according to the individual characteristics of the speaker contained in the voice.
The palm print authentication means that the palm print characteristics of the person to be tested are compared with the palm print template of the user in the database, and then the result is obtained through judgment, and finally the palm print authentication is completed.
The face authentication is to acquire a face image of a user through video acquisition equipment, calculate and analyze the position, the face shape and the angle of the facial features of the user, and compare the facial features with a template in a face base library so as to judge the real identity of the user. The face recognition technology has two main purposes in daily life, one is used for checking the face and verifying that a person is a person, namely, the face comparison is 1: 1; and the other method is used for face recognition to verify who you are, namely, the face recognition is 1: N.
The second control module 12 is used for controlling the second authentication system to perform the second authentication on the object which fails in the authentication when the first authentication fails; wherein the first authentication system is authenticated in a manner different from that of the second authentication system.
It should be noted that the first authentication system is authenticated in a different manner than the second authentication system.
For example, the first authentication system adopts card swiping authentication, and the second authentication system adopts a fingerprint authentication system, an iris authentication system, a voiceprint authentication system, a face swiping authentication system or a palm print authentication system; the first authentication system adopts a fingerprint authentication system, and the second authentication system can adopt a card swiping authentication system, an iris authentication system, a voiceprint authentication system, a face swiping or palm print authentication system; the first authentication system adopts an iris authentication system, and the second authentication system can adopt a card swiping authentication system, a face swiping authentication system, a voiceprint authentication system or a palm print authentication system; if the first authentication system adopts a voiceprint authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a palm print authentication system; if the first authentication system adopts a palm print authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a voiceprint authentication system; if the first authentication system adopts a face-swiping authentication system, the second authentication system may adopt a card-swiping authentication system, a fingerprint authentication system, an iris authentication system, or a voiceprint authentication system.
It should be noted that the manner of controlling the second authentication system to perform the second authentication on the object that fails to be authenticated is an automatic triggering manner, that is, the second authentication system on the pass device is automatically triggered to perform the second authentication on the object that fails to be authenticated when the first authentication fails.
In some embodiments, after the second authentication is passed, the second authentication system is in a preset state. The preset state comprises a closing state or a dormant state.
In some embodiments, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object with the authentication failure is authenticated for the second time.
Specifically, when the first authentication fails, the second authentication system is automatically awakened to be switched from the dormant state to the working state, the second authentication system performs the second authentication on the object which has failed in the first authentication after awakening, and if the second authentication passes, the second authentication system is switched from the working state to the dormant state.
As shown in fig. 3, a traffic device, the device comprising:
the first authentication system 13 is configured to perform a first authentication on an object to be authenticated;
a second authentication system 14 for performing a second authentication on the object that failed the first authentication;
and a control device.
The control device shown in fig. 2 may be adopted as the control device, and details are not repeated here.
According to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured.
An embodiment of the present application further provides an apparatus, which may include: one or more processors; and one or more machine readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the method of fig. 1. In practical applications, the device may be used as a terminal device, and may also be used as a server, where examples of the terminal device may include: the mobile terminal includes a smart phone, a tablet computer, an electronic book reader, an MP3 (Moving Picture Experts Group Audio Layer III) player, an MP4 (Moving Picture Experts Group Audio Layer IV) player, a laptop, a vehicle-mounted computer, a desktop computer, a set-top box, an intelligent television, a wearable device, and the like.
The present embodiment also provides a non-volatile readable storage medium, where one or more modules (programs) are stored in the storage medium, and when the one or more modules are applied to a device, the device may be caused to execute instructions (instructions) of steps included in the face recognition method in fig. 1 according to the present embodiment.
Fig. 4 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present application. As shown, the terminal device may include: an input device 1100, a first processor 1101, an output device 1102, a first memory 1103, and at least one communication bus 1104. The communication bus 1104 is used to implement communication connections between the elements. The first memory 1103 may include a high-speed RAM memory, and may also include a non-volatile storage NVM, such as at least one disk memory, and the first memory 1103 may store various programs for performing various processing functions and implementing the method steps of the present embodiment.
Alternatively, the first processor 1101 may be, for example, a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and the first processor may be implemented by the CPU, the DSP, the Field Programmable Gate Array (FPGA), the controller, the microcontroller, the microprocessor, or other electronic components
The first processor 1101 is coupled to the input device 1100 and the output device 1102 described above by a wired or wireless connection.
Optionally, the input device 1100 may include a variety of input devices, such as at least one of a user-oriented user interface, a device-oriented device interface, a software programmable interface, a camera, and a sensor. Optionally, the device interface facing the device may be a wired interface for data transmission between devices, or may be a hardware plug-in interface (e.g., a USB interface, a serial port, etc.) for data transmission between devices; optionally, the user-facing user interface may be, for example, a user-facing control key, a voice input device for receiving voice input, and a touch sensing device (e.g., a touch screen with a touch sensing function, a touch pad, etc.) for receiving user touch input; optionally, the programmable interface of the software may be, for example, an entry for a user to edit or modify a program, such as an input pin interface or an input interface of a chip; the output devices 1102 may include output devices such as a display, audio, and the like.
In this embodiment, the processor of the terminal device includes a module for executing the functions of the modules of the face recognition apparatus in each device, and specific functions and technical effects may refer to the foregoing embodiments, which are not described herein again.
Fig. 5 is a schematic hardware structure diagram of a terminal device according to an embodiment of the present application. Fig. 5 is a specific embodiment of the implementation process of fig. 4. As shown, the terminal device of the present embodiment may include a second processor 1201 and a second memory 1202.
The second processor 1201 executes the computer program code stored in the second memory 1202 to implement the method described in fig. 4 in the above embodiment.
The second memory 1202 is configured to store various types of data to support operations at the terminal device. Examples of such data include instructions for any application or method operating on the terminal device, such as messages, pictures, videos, and so forth. The second memory 1202 may include a Random Access Memory (RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
Optionally, a second processor 1201 is provided in the processing assembly 1200. The terminal device may further include: communication component 1203, power component 1204, multimedia component 1205, speech component 1206, input/output interfaces 1207, and/or sensor component 1208. The specific components included in the terminal device are set according to actual requirements, which is not limited in this embodiment.
The processing component 1200 generally controls the overall operation of the terminal device. The processing assembly 1200 may include one or more second processors 1201 to execute instructions to perform all or part of the steps of the data processing method described above. Further, the processing component 1200 can include one or more modules that facilitate interaction between the processing component 1200 and other components. For example, the processing component 1200 can include a multimedia module to facilitate interaction between the multimedia component 1205 and the processing component 1200.
The power supply component 1204 provides power to the various components of the terminal device. The power components 1204 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal device.
The multimedia components 1205 include a display screen that provides an output interface between the terminal device and the user. In some embodiments, the display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the display screen includes a touch panel, the display screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
The voice component 1206 is configured to output and/or input voice signals. For example, the voice component 1206 includes a Microphone (MIC) configured to receive external voice signals when the terminal device is in an operational mode, such as a voice recognition mode. The received speech signal may further be stored in the second memory 1202 or transmitted via the communication component 1203. In some embodiments, the speech component 1206 further comprises a speaker for outputting speech signals.
The input/output interface 1207 provides an interface between the processing component 1200 and peripheral interface modules, which may be click wheels, buttons, etc. These buttons may include, but are not limited to: a volume button, a start button, and a lock button.
The sensor component 1208 includes one or more sensors for providing various aspects of status assessment for the terminal device. For example, the sensor component 1208 may detect an open/closed state of the terminal device, relative positioning of the components, presence or absence of user contact with the terminal device. The sensor assembly 1208 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact, including detecting the distance between the user and the terminal device. In some embodiments, the sensor assembly 1208 may also include a camera or the like.
The communication component 1203 is configured to facilitate communications between the terminal device and other devices in a wired or wireless manner. The terminal device may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In one embodiment, the terminal device may include a SIM card slot therein for inserting a SIM card therein, so that the terminal device may log onto a GPRS network to establish communication with the server via the internet.
As can be seen from the above, the communication component 1203, the voice component 1206, the input/output interface 1207 and the sensor component 1208 involved in the embodiment of fig. 5 can be implemented as the input device in the embodiment of fig. 4.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (17)

1. A method for controlling a transit device, the method comprising:
controlling a first authentication system to perform first authentication on an object to be authenticated;
if the first authentication fails, controlling a second authentication system to perform second authentication on the object which fails in authentication;
wherein the first authentication system has an authentication mode different from that of the second authentication system; the first authentication system and the second authentication system are both arranged on the passing equipment.
2. The method for controlling a transit device according to claim 1, wherein if the first authentication fails, a second authentication system on the transit device is automatically triggered to perform a second authentication on the object whose authentication failed.
3. The control method of the passing device according to claim 2, wherein the second authentication system is in a preset state after the second authentication is passed.
4. The control method for a transit device as claimed in claim 3, wherein the preset state comprises an off state or a sleep state.
5. The control method of the passing device of claim 4, wherein if the second authentication system is in the dormant state, when the first authentication system fails to authenticate the object to be authenticated next time, the second authentication system is directly waken up and the object that fails to authenticate is authenticated for the second time.
6. The control method for a transit device according to claim 1, wherein the first authentication system includes a card-swipe authentication system, a face-swipe authentication system, a fingerprint authentication system, an iris authentication system, a voice-print authentication system, or a palm-print authentication system.
7. The control method for a transit device according to claim 1, wherein the second authentication system includes a card-swipe authentication system, a face-swipe authentication system, a fingerprint authentication system, an iris authentication system, a voice-print authentication system, or a palm-print authentication system.
8. A control device for a passage apparatus, characterized in that the device comprises:
the first control module is used for controlling the first authentication system to carry out first authentication on an object to be authenticated;
the second control module is used for controlling the second authentication system to carry out the second authentication on the object which fails in the authentication when the first authentication fails; wherein the first authentication system has an authentication mode different from that of the second authentication system; the first authentication system and the second authentication system are both arranged on the passing equipment.
9. The control device of the passing device of claim 8, wherein if the first authentication fails, a second authentication system on the passing device is automatically triggered to perform a second authentication on the object with failed authentication.
10. The control device of the passing device according to claim 9, wherein the second authentication system is set in a preset state after the second authentication is passed.
11. The control device of the traffic device according to claim 10, wherein the preset state comprises an off state or a sleep state.
12. The control device of the pass device according to claim 11, wherein if the second authentication system is in the dormant state, when the first authentication system fails to authenticate the object to be authenticated next time, the second authentication system is directly woken up and the object that fails to authenticate is authenticated for the second time.
13. The control device of the passing device according to claim 8, wherein the first authentication system comprises a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
14. The control device of the transit device according to claim 8, wherein the second authentication system includes a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voice-print authentication system, or a palm-print authentication system.
15. An access device, characterized in that it comprises:
the first authentication system is used for authenticating an object to be authenticated for the first time;
the second authentication system is used for carrying out second authentication on the object which fails in the first authentication;
the control device according to any one of claims 8 to 14.
16. An apparatus, comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the methods of claims 1-7.
17. One or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform the methods of claims 1-7.
CN201911027614.8A 2019-10-28 2019-10-28 Control method and device for passing equipment, machine readable medium and equipment Pending CN110766837A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911027614.8A CN110766837A (en) 2019-10-28 2019-10-28 Control method and device for passing equipment, machine readable medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911027614.8A CN110766837A (en) 2019-10-28 2019-10-28 Control method and device for passing equipment, machine readable medium and equipment

Publications (1)

Publication Number Publication Date
CN110766837A true CN110766837A (en) 2020-02-07

Family

ID=69333945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911027614.8A Pending CN110766837A (en) 2019-10-28 2019-10-28 Control method and device for passing equipment, machine readable medium and equipment

Country Status (1)

Country Link
CN (1) CN110766837A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112562150A (en) * 2020-11-23 2021-03-26 深圳华颐智能系统有限公司 Student apartment management method, device, system and medium based on face recognition

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8141141B2 (en) * 2002-08-15 2012-03-20 Actividentity, Inc. System and method for sequentially processing a biometric sample
CN204590839U (en) * 2015-01-13 2015-08-26 何鑫 Non-interlock tandem type two-stage protection safety lock
CN105317285A (en) * 2014-06-04 2016-02-10 马俊东 Coded-lock unlocking system and unlocking method thereof
CN105333768A (en) * 2015-10-21 2016-02-17 奉化市金丰机械有限公司 Gun trigger lock
CN106408712A (en) * 2016-09-27 2017-02-15 北海益生源农贸有限责任公司 Intelligent door access control system
CN206058331U (en) * 2016-08-31 2017-03-29 成都市和平科技有限责任公司 A kind of intelligent door lock system
CN206162731U (en) * 2016-08-12 2017-05-10 燕南国创科技(北京)有限公司 Gate lock
CN106934901A (en) * 2017-04-14 2017-07-07 美的智慧家居科技有限公司 Smart lock method for unlocking and device
CN107093243A (en) * 2017-05-11 2017-08-25 广东汇泰龙科技有限公司 A kind of door lock alarm verification method and system, terminal
CN107293012A (en) * 2017-06-15 2017-10-24 合肥讯邦网络科技有限公司 A kind of access control system based on internet
CN107331016A (en) * 2017-07-25 2017-11-07 安徽大德中电科技发展股份有限公司 A kind of ultra-low power consumption intelligent fingerprint gate lock
CN108729762A (en) * 2018-04-19 2018-11-02 美的智慧家居科技有限公司 Control system, control method and the intelligent door lock of electronic lock
CN208207951U (en) * 2018-06-07 2018-12-07 合肥马道信息科技有限公司 A kind of dynamic puzzle-lock system automatically switching unlocking mode
CN109983513A (en) * 2019-02-20 2019-07-05 深圳市汇顶科技股份有限公司 Smart lock method for controlling power supply, intelligent lock system and storage medium
CN110276858A (en) * 2018-03-13 2019-09-24 新谊整合科技股份有限公司 Save setting device, safety system and method from damage

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8141141B2 (en) * 2002-08-15 2012-03-20 Actividentity, Inc. System and method for sequentially processing a biometric sample
CN105317285A (en) * 2014-06-04 2016-02-10 马俊东 Coded-lock unlocking system and unlocking method thereof
CN204590839U (en) * 2015-01-13 2015-08-26 何鑫 Non-interlock tandem type two-stage protection safety lock
CN105333768A (en) * 2015-10-21 2016-02-17 奉化市金丰机械有限公司 Gun trigger lock
CN206162731U (en) * 2016-08-12 2017-05-10 燕南国创科技(北京)有限公司 Gate lock
CN206058331U (en) * 2016-08-31 2017-03-29 成都市和平科技有限责任公司 A kind of intelligent door lock system
CN106408712A (en) * 2016-09-27 2017-02-15 北海益生源农贸有限责任公司 Intelligent door access control system
CN106934901A (en) * 2017-04-14 2017-07-07 美的智慧家居科技有限公司 Smart lock method for unlocking and device
CN107093243A (en) * 2017-05-11 2017-08-25 广东汇泰龙科技有限公司 A kind of door lock alarm verification method and system, terminal
CN107293012A (en) * 2017-06-15 2017-10-24 合肥讯邦网络科技有限公司 A kind of access control system based on internet
CN107331016A (en) * 2017-07-25 2017-11-07 安徽大德中电科技发展股份有限公司 A kind of ultra-low power consumption intelligent fingerprint gate lock
CN110276858A (en) * 2018-03-13 2019-09-24 新谊整合科技股份有限公司 Save setting device, safety system and method from damage
CN108729762A (en) * 2018-04-19 2018-11-02 美的智慧家居科技有限公司 Control system, control method and the intelligent door lock of electronic lock
CN208207951U (en) * 2018-06-07 2018-12-07 合肥马道信息科技有限公司 A kind of dynamic puzzle-lock system automatically switching unlocking mode
CN109983513A (en) * 2019-02-20 2019-07-05 深圳市汇顶科技股份有限公司 Smart lock method for controlling power supply, intelligent lock system and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112562150A (en) * 2020-11-23 2021-03-26 深圳华颐智能系统有限公司 Student apartment management method, device, system and medium based on face recognition

Similar Documents

Publication Publication Date Title
US11310223B2 (en) Identity authentication method and apparatus
US20150154392A1 (en) Secure face authentication with liveness detection for mobile
US20140189604A1 (en) Method and system for unlocking a touchscreen of an electronic device
CN109032675A (en) The unlocking screen method, apparatus and terminal device of terminal device
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN105095847A (en) Iris identification method and apparatus for mobile terminal
CN111898495B (en) Dynamic threshold management method, system, device and medium
CN110673723A (en) Speech interaction method, system, medium, and apparatus based on biometric features
WO2018205468A1 (en) Biometric transaction processing method, electronic device and storage medium
CN106296171B (en) Card swiping method and device of mobile terminal
CN110647732B (en) Voice interaction method, system, medium and device based on biological recognition characteristics
CN111310725A (en) Object identification method, system, machine readable medium and device
CN107704745B (en) A kind of biological feather recognition method and mobile terminal
CN111695509A (en) Identity authentication method, identity authentication device, machine readable medium and equipment
CN103035051A (en) Embedded face recognition access control system
CN107563163A (en) A kind of screen unlocked by fingerprint method and terminal
CN112989299A (en) Interactive identity recognition method, system, device and medium
CN110766837A (en) Control method and device for passing equipment, machine readable medium and equipment
CN113077262A (en) Catering settlement method, device, system, machine readable medium and equipment
TWI584146B (en) Login system and method based on face recognition
CN109254661A (en) Image display method, device, storage medium and electronic equipment
CN111104873A (en) Face recognition method, system, equipment and medium with cooperation of multiple image processing devices
CN110766842B (en) Passing equipment control method and device, machine readable medium and equipment
CN112446704A (en) Safe transaction management method and safe transaction management device
US9824219B2 (en) Electronic device having wake up verification and electronic system having the electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 511458 room 1110, jinmaowan, Nansha, No.1, West 4th Street, Jinmao, Nansha District, Guangzhou City, Guangdong Province (self compiled T4 building) (for office use only)

Applicant after: Guangzhou yuncongboyan Intelligent Technology Co., Ltd

Address before: 511458 room 1110, jinmaowan, Nansha, No.1, West 4th Street, Jinmao, Nansha District, Guangzhou City, Guangdong Province (self compiled T4 building) (for office use only)

Applicant before: Guangzhou Boyan Intelligent Technology Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20200207

RJ01 Rejection of invention patent application after publication