Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention provides a control method, device, machine readable medium and device for traffic equipment, which are used to solve the problems of the prior art.
To achieve the above and other related objects, the present invention provides a control method of a traffic device, the method comprising:
controlling a first authentication system to perform first authentication on an object to be authenticated;
if the first authentication fails, controlling a second authentication system to perform second authentication on the object which fails in authentication;
wherein the first authentication system has an authentication mode different from that of the second authentication system; the first authentication system and the second authentication system are both arranged on the passing equipment.
Optionally, if the first authentication fails, automatically triggering a second authentication system on the passing device to perform a second authentication on the object that fails to be authenticated.
Optionally, after the second authentication is passed, the second authentication system is in a preset state.
Optionally, the preset state includes an off state or a sleep state.
Optionally, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object which fails to be authenticated is authenticated for the second time.
Optionally, the first authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Optionally, the second authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
To achieve the above and other related objects, the present invention provides a control device for a passage apparatus, the device comprising:
the control module is used for controlling the first authentication system to carry out first authentication on the object to be authenticated;
the second control module is used for controlling the second authentication system to carry out the second authentication on the object which fails in the authentication when the first authentication fails; wherein the first authentication system has an authentication mode different from that of the second authentication system; the first authentication system and the second authentication system are both arranged on the passing equipment.
Optionally, if the first authentication fails, automatically triggering a second authentication system on the passing device to perform a second authentication on the object that fails to be authenticated.
Optionally, the preset state includes an off state or a sleep state.
Optionally, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object which fails to be authenticated is authenticated for the second time.
Optionally, the first authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Optionally, the second authentication system includes a card swiping authentication system, a face swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
To achieve the above and other related objects, the present invention provides a traffic device, comprising:
the first authentication system is used for authenticating an object to be authenticated for the first time;
the second authentication system is used for carrying out second authentication on the object which fails in the first authentication;
the control device is described above.
To achieve the above and other related objects, the present invention provides an apparatus comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform one or more of the methods described previously.
To achieve the foregoing and other related objectives, the present invention provides one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform one or more of the methods described above.
As described above, the method, the device, the machine readable medium and the equipment for controlling the passing equipment provided by the invention have the following beneficial effects:
according to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
As shown in fig. 1, a control method of a traffic device, the method comprising:
s11 controls the first authentication system to authenticate the object to be authenticated for the first time; the first authentication system is arranged on the passing equipment.
In some embodiments, the access device may be a door entry/gate or other person accessible device that requires authorization to open or close.
In some embodiments, the first authentication system may comprise one of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
The card swiping authentication system generally comprises a host and a card reader, wherein a card holder can sense the card and lead the information in the card to the host only by quickly and statically swinging the card close to the card reader once, the host can examine the card illegally, and then the decision can be made to close the door.
The fingerprint authentication means that the skin on the front of the tail end of the finger is provided with uneven lines, and contains a large amount of information. The lines of the skin are different from each other in patterns, break points and intersection points, the lines are called 'features' in information processing, the features have uniqueness and permanence, a person can be corresponding to the fingerprint of the person, and the real identity of the person can be verified by comparing the fingerprint features with the fingerprint features stored in advance.
The iris authentication system determines the identity of a person by comparing the similarity between features of iris images.
The voiceprint authentication system performs identity authentication by utilizing voiceprint recognition. Voiceprint recognition is a process of recognizing the identity of a speaker contained in a voice segment according to the individual characteristics of the speaker contained in the voice.
The palm print authentication means that the palm print characteristics of the person to be tested are compared with the palm print template of the user in the database, and then the result is obtained through judgment, and finally the palm print authentication is completed.
The face authentication is to acquire a face image of a user through video acquisition equipment, calculate and analyze the position, the face shape and the angle of the facial features of the user, and compare the facial features with a template in a face base library so as to judge the real identity of the user. The face recognition technology has two main purposes in daily life, one is used for checking the face and verifying that a person is a person, namely, the face comparison is 1: 1; and the other method is used for face recognition to verify who you are, namely, the face recognition is 1: N.
S12 controls the second authentication system to perform the second authentication on the object whose authentication has failed, if the first authentication has failed. Wherein the second authentication system is disposed on a pass device.
It should be noted that the first authentication system is authenticated in a different manner than the second authentication system.
For example, the first authentication system adopts card swiping authentication, and the second authentication system adopts a fingerprint authentication system, an iris authentication system, a voiceprint authentication system, a face swiping authentication system or a palm print authentication system; the first authentication system adopts a fingerprint authentication system, and the second authentication system can adopt a card swiping authentication system, an iris authentication system, a voiceprint authentication system, a face swiping or palm print authentication system; the first authentication system adopts an iris authentication system, and the second authentication system can adopt a card swiping authentication system, a face swiping authentication system, a voiceprint authentication system or a palm print authentication system; if the first authentication system adopts a voiceprint authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a palm print authentication system; if the first authentication system adopts a palm print authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a voiceprint authentication system; if the first authentication system adopts a face-swiping authentication system, the second authentication system may adopt a card-swiping authentication system, a fingerprint authentication system, an iris authentication system, or a voiceprint authentication system.
It should be noted that the manner of controlling the second authentication system to perform the second authentication on the object that fails to be authenticated is an automatic triggering manner, that is, the first authentication fails, and then the second authentication system on the pass device is automatically triggered to perform the second authentication on the object that fails to be authenticated.
In some embodiments, after the second authentication is passed, the second authentication system is in a preset state. The preset state comprises a closing state or a dormant state.
In some embodiments, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object with the authentication failure is authenticated for the second time.
Specifically, when the first authentication fails, the second authentication system is automatically awakened to be switched from the dormant state to the working state, the second authentication system performs the second authentication on the object which has failed in the first authentication after awakening, and if the second authentication passes, the second authentication system is switched from the working state to the dormant state.
As shown in fig. 2, a control device of a passage apparatus, the device comprising: a control module 11 and a second control module 12
The control module 11 is configured to control the first authentication system to perform a first authentication on an object to be authenticated; the first authentication system is arranged on the passing equipment.
In some embodiments, the access device may be a door entry/gate or other person accessible device that requires authorization to open or close.
In some embodiments, the first authentication system may comprise one of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
The card swiping authentication system generally comprises a host and a card reader, wherein a card holder can sense the card and lead the information in the card to the host only by quickly and statically swinging the card close to the card reader once, the host is used for examining the card illegally, and then whether the door is opened or not is determined.
The fingerprint authentication means that the skin on the front of the tail end of the finger is provided with uneven lines, and contains a large amount of information. The lines of the skin are different from each other in patterns, break points and intersection points, the lines are called 'features' in information processing, the features have uniqueness and permanence, a person can be corresponding to the fingerprint of the person, and the real identity of the person can be verified by comparing the fingerprint features with the fingerprint features stored in advance.
The iris authentication system determines the identity of a person by comparing the similarity between features of iris images.
The voiceprint authentication system performs identity authentication by utilizing voiceprint recognition. Voiceprint recognition is a process of recognizing the identity of a speaker contained in a voice segment according to the individual characteristics of the speaker contained in the voice.
The palm print authentication means that the palm print characteristics of the person to be tested are compared with the palm print template of the user in the database, and then the result is obtained through judgment, and finally the palm print authentication is completed.
The face authentication is to acquire a face image of a user through video acquisition equipment, calculate and analyze the position, the face shape and the angle of the facial features of the user, and compare the facial features with a template in a face base library so as to judge the real identity of the user. The face recognition technology has two main purposes in daily life, one is used for checking the face and verifying that a person is a person, namely, the face comparison is 1: 1; and the other method is used for face recognition to verify who you are, namely, the face recognition is 1: N.
The second control module 12 is used for controlling the second authentication system to perform the second authentication on the object which fails in the authentication when the first authentication fails; wherein the first authentication system is authenticated in a manner different from that of the second authentication system.
It should be noted that the first authentication system is authenticated in a different manner than the second authentication system.
For example, the first authentication system adopts card swiping authentication, and the second authentication system adopts a fingerprint authentication system, an iris authentication system, a voiceprint authentication system, a face swiping authentication system or a palm print authentication system; the first authentication system adopts a fingerprint authentication system, and the second authentication system can adopt a card swiping authentication system, an iris authentication system, a voiceprint authentication system, a face swiping or palm print authentication system; the first authentication system adopts an iris authentication system, and the second authentication system can adopt a card swiping authentication system, a face swiping authentication system, a voiceprint authentication system or a palm print authentication system; if the first authentication system adopts a voiceprint authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a palm print authentication system; if the first authentication system adopts a palm print authentication system, the second authentication system can adopt a card swiping authentication system, a fingerprint authentication system, an iris authentication system, a face swiping authentication system or a voiceprint authentication system; if the first authentication system adopts a face-swiping authentication system, the second authentication system may adopt a card-swiping authentication system, a fingerprint authentication system, an iris authentication system, or a voiceprint authentication system.
It should be noted that the manner of controlling the second authentication system to perform the second authentication on the object that fails to be authenticated is an automatic triggering manner, that is, the second authentication system on the pass device is automatically triggered to perform the second authentication on the object that fails to be authenticated when the first authentication fails.
In some embodiments, after the second authentication is passed, the second authentication system is in a preset state. The preset state comprises a closing state or a dormant state.
In some embodiments, if the second authentication system is in the dormant state, when the authentication of the object to be authenticated by the first authentication system fails next time, the second authentication system is directly waken up and the object with the authentication failure is authenticated for the second time.
Specifically, when the first authentication fails, the second authentication system is automatically awakened to be switched from the dormant state to the working state, the second authentication system performs the second authentication on the object which has failed in the first authentication after awakening, and if the second authentication passes, the second authentication system is switched from the working state to the dormant state.
As shown in fig. 3, a traffic device, the device comprising:
the first authentication system 13 is configured to perform a first authentication on an object to be authenticated;
a second authentication system 14 for performing a second authentication on the object that failed the first authentication;
and a control device.
The control device shown in fig. 2 may be adopted as the control device, and details are not repeated here.
According to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured.
An embodiment of the present application further provides an apparatus, which may include: one or more processors; and one or more machine readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the method of fig. 1. In practical applications, the device may be used as a terminal device, and may also be used as a server, where examples of the terminal device may include: the mobile terminal includes a smart phone, a tablet computer, an electronic book reader, an MP3 (Moving Picture Experts Group Audio Layer III) player, an MP4 (Moving Picture Experts Group Audio Layer IV) player, a laptop, a vehicle-mounted computer, a desktop computer, a set-top box, an intelligent television, a wearable device, and the like.
The present embodiment also provides a non-volatile readable storage medium, where one or more modules (programs) are stored in the storage medium, and when the one or more modules are applied to a device, the device may be caused to execute instructions (instructions) of steps included in the face recognition method in fig. 1 according to the present embodiment.
Fig. 4 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present application. As shown, the terminal device may include: an input device 1100, a first processor 1101, an output device 1102, a first memory 1103, and at least one communication bus 1104. The communication bus 1104 is used to implement communication connections between the elements. The first memory 1103 may include a high-speed RAM memory, and may also include a non-volatile storage NVM, such as at least one disk memory, and the first memory 1103 may store various programs for performing various processing functions and implementing the method steps of the present embodiment.
Alternatively, the first processor 1101 may be, for example, a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and the first processor may be implemented by the CPU, the DSP, the Field Programmable Gate Array (FPGA), the controller, the microcontroller, the microprocessor, or other electronic components
The first processor 1101 is coupled to the input device 1100 and the output device 1102 described above by a wired or wireless connection.
Optionally, the input device 1100 may include a variety of input devices, such as at least one of a user-oriented user interface, a device-oriented device interface, a software programmable interface, a camera, and a sensor. Optionally, the device interface facing the device may be a wired interface for data transmission between devices, or may be a hardware plug-in interface (e.g., a USB interface, a serial port, etc.) for data transmission between devices; optionally, the user-facing user interface may be, for example, a user-facing control key, a voice input device for receiving voice input, and a touch sensing device (e.g., a touch screen with a touch sensing function, a touch pad, etc.) for receiving user touch input; optionally, the programmable interface of the software may be, for example, an entry for a user to edit or modify a program, such as an input pin interface or an input interface of a chip; the output devices 1102 may include output devices such as a display, audio, and the like.
In this embodiment, the processor of the terminal device includes a module for executing the functions of the modules of the face recognition apparatus in each device, and specific functions and technical effects may refer to the foregoing embodiments, which are not described herein again.
Fig. 5 is a schematic hardware structure diagram of a terminal device according to an embodiment of the present application. Fig. 5 is a specific embodiment of the implementation process of fig. 4. As shown, the terminal device of the present embodiment may include a second processor 1201 and a second memory 1202.
The second processor 1201 executes the computer program code stored in the second memory 1202 to implement the method described in fig. 4 in the above embodiment.
The second memory 1202 is configured to store various types of data to support operations at the terminal device. Examples of such data include instructions for any application or method operating on the terminal device, such as messages, pictures, videos, and so forth. The second memory 1202 may include a Random Access Memory (RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
Optionally, a second processor 1201 is provided in the processing assembly 1200. The terminal device may further include: communication component 1203, power component 1204, multimedia component 1205, speech component 1206, input/output interfaces 1207, and/or sensor component 1208. The specific components included in the terminal device are set according to actual requirements, which is not limited in this embodiment.
The processing component 1200 generally controls the overall operation of the terminal device. The processing assembly 1200 may include one or more second processors 1201 to execute instructions to perform all or part of the steps of the data processing method described above. Further, the processing component 1200 can include one or more modules that facilitate interaction between the processing component 1200 and other components. For example, the processing component 1200 can include a multimedia module to facilitate interaction between the multimedia component 1205 and the processing component 1200.
The power supply component 1204 provides power to the various components of the terminal device. The power components 1204 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal device.
The multimedia components 1205 include a display screen that provides an output interface between the terminal device and the user. In some embodiments, the display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the display screen includes a touch panel, the display screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
The voice component 1206 is configured to output and/or input voice signals. For example, the voice component 1206 includes a Microphone (MIC) configured to receive external voice signals when the terminal device is in an operational mode, such as a voice recognition mode. The received speech signal may further be stored in the second memory 1202 or transmitted via the communication component 1203. In some embodiments, the speech component 1206 further comprises a speaker for outputting speech signals.
The input/output interface 1207 provides an interface between the processing component 1200 and peripheral interface modules, which may be click wheels, buttons, etc. These buttons may include, but are not limited to: a volume button, a start button, and a lock button.
The sensor component 1208 includes one or more sensors for providing various aspects of status assessment for the terminal device. For example, the sensor component 1208 may detect an open/closed state of the terminal device, relative positioning of the components, presence or absence of user contact with the terminal device. The sensor assembly 1208 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact, including detecting the distance between the user and the terminal device. In some embodiments, the sensor assembly 1208 may also include a camera or the like.
The communication component 1203 is configured to facilitate communications between the terminal device and other devices in a wired or wireless manner. The terminal device may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In one embodiment, the terminal device may include a SIM card slot therein for inserting a SIM card therein, so that the terminal device may log onto a GPRS network to establish communication with the server via the internet.
As can be seen from the above, the communication component 1203, the voice component 1206, the input/output interface 1207 and the sensor component 1208 involved in the embodiment of fig. 5 can be implemented as the input device in the embodiment of fig. 4.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.