CN110766842B - Passing equipment control method and device, machine readable medium and equipment - Google Patents
Passing equipment control method and device, machine readable medium and equipment Download PDFInfo
- Publication number
- CN110766842B CN110766842B CN201911027597.8A CN201911027597A CN110766842B CN 110766842 B CN110766842 B CN 110766842B CN 201911027597 A CN201911027597 A CN 201911027597A CN 110766842 B CN110766842 B CN 110766842B
- Authority
- CN
- China
- Prior art keywords
- authentication system
- authentication
- fails
- target
- identity information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The invention provides a control method of a passing device, which comprises the following steps: controlling a front-end authentication system to perform first authentication on an object to be authenticated; if the first authentication fails, acquiring the identity information of the object which fails to be authenticated; determining a target authentication system corresponding to the identity information according to the identity information of the object with failed authentication; controlling the target authentication system to carry out second authentication on the object which fails in the first authentication; the authentication mode of the front-end authentication system is different from that of the target authentication system; the front-end authentication system and the target authentication system are both arranged on the passing equipment. According to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured. And a target authentication system is selected through the identity level, so that the security of the same party is further guaranteed.
Description
Technical Field
The invention relates to the field of entrance guard, in particular to a control method and device of passing equipment, a machine readable medium and equipment.
Background
When the user passes through the gate/entrance guard, the identity verification is required, if the authentication fails, the user cannot pass, and only the intervention of staff can be solved. Generally speaking, the larger the size of the information base, the higher the probability of authentication failure, and the higher the frequency of intervention of the staff, which greatly reduces the queue passing efficiency.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention provides a control method, device, machine readable medium and device for traffic equipment, which are used to solve the problems of the prior art.
To achieve the above and other related objects, the present invention provides a control method of a traffic device, the method comprising:
controlling a front-end authentication system to perform first authentication on an object to be authenticated;
if the first authentication fails, acquiring the identity information of the object which fails to be authenticated;
determining a target authentication system corresponding to the identity information according to the identity information of the object with failed authentication;
controlling the target authentication system to carry out second authentication on the object which fails in the first authentication;
the authentication mode of the front-end authentication system is different from that of the target authentication system; the front-end authentication system and the target authentication system are both arranged on the passing equipment.
Optionally, after determining a target authentication system corresponding to the identity information according to the identity information of the object that fails to be authenticated, automatically triggering the target authentication system located on the passing device to perform a second authentication on the object that fails to be authenticated for the first time.
Optionally, after the second authentication is passed, the target authentication system is in a preset state.
Optionally, the preset state includes an off state or a sleep state.
Optionally, the target authentication system matching the object with the authentication failure is determined according to the identity level of the object with the authentication failure for the first time.
Optionally, the identity information of the object that fails to be authenticated for the first time is matched with information in the identity information management system, and the identity level of the object that fails to be authenticated for the first time is determined.
Optionally, the front-end authentication system includes a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Optionally, the target authentication system includes at least two of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
To achieve the above and other related objects, the present invention provides a control device for a passage apparatus, the device comprising:
the first control module is used for controlling the front-end authentication system to carry out first authentication on an object to be authenticated;
the identity information acquisition module is used for acquiring the identity information of the object which fails in authentication when the authentication fails for the first time;
the target authentication system confirmation module is used for determining a target authentication system corresponding to the identity information according to the identity information of the object which fails to be authenticated;
the second control module is used for controlling the target authentication system to carry out second authentication on the object which fails in the first authentication;
the authentication mode of the front-end authentication system is different from that of the target authentication system; the front-end authentication system and the target authentication system are both arranged on the passing equipment.
Optionally, after determining a target authentication system corresponding to the identity information according to the identity information of the object that fails to be authenticated, automatically triggering the target authentication system located on the passing device to perform a second authentication on the object that fails to be authenticated for the first time.
Optionally, after the second authentication is passed, the target authentication system is in a preset state.
Optionally, the preset state includes an off state or a sleep state.
Optionally, the target authentication system corresponding to the identity information of the object that fails the first authentication is determined according to the identity level of the object that fails the first authentication.
Optionally, the identity information of the object that fails to be authenticated for the first time is matched with information in the identity information management system, and the identity level of the object that fails to be authenticated for the first time is determined.
Optionally, the front-end authentication system includes a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Optionally, the target authentication system includes at least two of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
To achieve the above and other related objects, the present invention provides a traffic device, comprising:
the front-end authentication system is used for authenticating an object to be authenticated for the first time;
the target authentication system is used for carrying out second authentication on the object which fails in the first authentication;
the control device.
To achieve the above and other related objects, the present invention provides an apparatus comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform one or more of the methods described previously.
To achieve the foregoing and other related objectives, the present invention provides one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform one or more of the methods described above.
As described above, the method, the device, the machine readable medium and the equipment for controlling the passing equipment provided by the invention have the following beneficial effects:
according to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured. And a target authentication system is selected through the identity level, so that the security of the same party is further guaranteed.
Drawings
FIG. 1 is a flow chart of a control method of a traffic device according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a control device of a traffic device according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a traffic device according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
As shown in fig. 1, a control method of a traffic device, the method comprising:
s11, the front-end authentication system is controlled to carry out the first authentication on the object to be authenticated; the front-end authentication system is arranged on the passing equipment.
In some embodiments, the access device may be a door entry/gate or other person accessible device that requires authorization to open or close.
In some embodiments, the front-end authentication system may include a card-swipe authentication system, a face-swipe authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system, or a palm print authentication system.
The card swiping authentication system generally comprises a host and a card reader, wherein a card holder can sense the card and lead the information in the card to the host only by quickly and statically swinging the card close to the card reader once, the host can examine the card illegally, and then the decision can be made to close the door.
The fingerprint authentication means that the skin on the front of the tail end of the finger is provided with uneven lines, and contains a large amount of information. The lines of the skin are different from each other in patterns, break points and intersection points, the lines are called 'features' in information processing, the features have uniqueness and permanence, a person can be corresponding to the fingerprint of the person, and the real identity of the person can be verified by comparing the fingerprint features with the fingerprint features stored in advance.
The iris authentication system determines the identity of a person by comparing the similarity between features of iris images.
The voiceprint authentication system performs identity authentication by utilizing voiceprint recognition. Voiceprint recognition is a process of recognizing the identity of a speaker contained in a voice segment according to the individual characteristics of the speaker contained in the voice.
The palm print authentication means that the palm print characteristics of the person to be tested are compared with the palm print template of the user in the database, and then the result is obtained through judgment, and finally the palm print authentication is completed.
The face brushing authentication is to acquire the facial image of a user through video acquisition equipment, and then to calculate and analyze the position, the face shape and the angle of the facial features of the user, so as to compare the facial features with a template in a human face base library, thereby judging the real identity of the user. The face recognition technology has two main purposes in daily life, one is used for checking the face and verifying that a person is a person, namely, the face comparison is 1: 1; and the other method is used for face recognition to verify who you are, namely, the face recognition is 1: N.
S12, if the first authentication fails, acquiring the identity information of the object which fails to be authenticated;
in some embodiments, a data receiving module is arranged on the passing device and used for receiving identity information input by an object which fails to authenticate; or, an identity card reader (for example, information of an identity card) is arranged on the passing device, so that identity information of the user can be read, and the identity information can include one or more combinations of identity card numbers, employee IDs, names and sexes.
S13, determining a target authentication system corresponding to the identity information according to the identity information of the object with failed authentication; the target authentication system is arranged on the passing equipment. The authentication mode of the front-end authentication system is different from that of the target authentication system.
In some embodiments, the target authentication system includes at least two of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Specifically, the target authentication system may determine a target authentication system matching the object that failed authentication according to the identity level of the object that failed authentication for the first time.
Determining the identity level of the object through the identity information of the object which fails to be authenticated, and if the level is lower, performing secondary authentication on the object through a card swiping authentication system; if the level is higher, the object is secondarily authenticated through a voiceprint authentication system or a palm print authentication system.
The identity level confirmation method comprises the following steps: and matching the identity information of the object which fails in the first authentication with information in a pre-stored identity information management system to determine the identity level of the object which fails in the first authentication. Wherein the identity level corresponds to the identity information.
S14 controls the target authentication system to perform a second authentication on the object that failed the first authentication.
And after the authentication is passed, opening the passing equipment.
In some embodiments, after determining the target authentication system corresponding to the identity information according to the identity information of the object that fails to be authenticated, the target authentication system located on the transit device is automatically triggered to perform the second authentication on the object that fails to be authenticated for the first time.
In some embodiments, after the second authentication is passed, the target authentication system is in a preset state. The preset state comprises a closing state or a dormant state.
In some embodiments, if the target authentication system is in the dormant state, when the front-end authentication system fails to authenticate the object to be authenticated next time, after the target authentication system is confirmed, the corresponding target authentication system is awakened and the object that fails to be authenticated is authenticated for the second time. And after the second authentication is finished, switching the target authentication system from the working state to the dormant state.
In some embodiments, the control method further comprises capturing the face image when the object to be authenticated is authenticated for the first time and the second time.
As shown in fig. 2, a control device of a passage apparatus, the device comprising: the system comprises a first control module 11, an identity information acquisition module 12, a target authentication system confirmation module 13 and a second control module 14; the authentication mode of the front-end authentication system is different from that of the target authentication system.
The first control module 11 is configured to control the front-end authentication system to perform a first authentication on an object to be authenticated; the front-end authentication system is arranged on the passing equipment.
In some embodiments, the access device may be a door entry/gate or other person accessible device that requires authorization to open or close.
In some embodiments, the front-end authentication system may include a card-swipe authentication system, a face-swipe authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system, or a palm print authentication system.
The card swiping authentication system generally comprises a host and a card reader, wherein a card holder can sense the card and lead the information in the card to the host only by quickly and statically swinging the card close to the card reader once, the host can examine the card illegally, and then the decision can be made to close the door.
The fingerprint authentication means that the skin on the front of the tail end of the finger is provided with uneven lines, and contains a large amount of information. The lines of the skin are different from each other in patterns, break points and intersection points, the lines are called 'features' in information processing, the features have uniqueness and permanence, a person can be corresponding to the fingerprint of the person, and the real identity of the person can be verified by comparing the fingerprint features with the fingerprint features stored in advance.
The iris authentication system determines the identity of a person by comparing the similarity between features of iris images.
The voiceprint authentication system performs identity authentication by utilizing voiceprint recognition. Voiceprint recognition is a process of recognizing the identity of a speaker contained in a voice segment according to the individual characteristics of the speaker contained in the voice.
The palm print authentication means that the palm print characteristics of the person to be tested are compared with the palm print template of the user in the database, and then the result is obtained through judgment, and finally the palm print authentication is completed.
The face brushing authentication is to acquire the facial image of a user through video acquisition equipment, and then to calculate and analyze the position, the face shape and the angle of the facial features of the user, so as to compare the facial features with a template in a human face base library, thereby judging the real identity of the user. The face recognition technology has two main purposes in daily life, one is used for checking the face and verifying that a person is a person, namely, the face comparison is 1: 1; and the other method is used for face recognition to verify who you are, namely, the face recognition is 1: N.
The identity information acquiring module 12 is configured to acquire identity information of an object that fails authentication when authentication fails for the first time;
in some embodiments, a data receiving module is disposed on the passing device for receiving identity information input by a subject who fails authentication, and the identity information may include a combination of one or more of an identification number, an employee ID, a name, and a gender.
In some embodiments, a data receiving module is arranged on the passing device and used for receiving identity information input by an object which fails to authenticate; or, an identity card reader (for example, information of an identity card) is arranged on the passing device, so that identity information of the user can be read, and the identity information can include one or more combinations of identity card numbers, employee IDs, names and sexes.
The target authentication system confirmation module 13 is configured to determine a target authentication system corresponding to the identity information according to the identity information of the object that fails to be authenticated;
determining a target authentication system corresponding to the identity information according to the identity information of the object with failed authentication; the target authentication system is arranged on the passing equipment. The authentication mode of the front-end authentication system is different from that of the target authentication system.
In some embodiments, the target authentication system includes at least two of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
Specifically, the target authentication system may determine a target authentication system matching the object that failed authentication according to the identity level of the object that failed authentication for the first time.
Determining the identity level of the object through the identity information of the object which fails to be authenticated, and if the level is lower, performing secondary authentication on the object through a card swiping authentication system; if the level is higher, the object is secondarily authenticated through a voiceprint authentication system or a palm print authentication system.
The identity level confirmation method comprises the following steps: and matching the identity information of the object which fails in the first authentication with information in a pre-stored identity information management system to determine the identity level of the object which fails in the first authentication. Wherein the identity level corresponds to the identity information.
The second control module 14 is used for controlling the target authentication system to perform the second authentication on the object which fails in the first authentication; and after the authentication is passed, opening the passing equipment.
In some embodiments, after determining the target authentication system corresponding to the identity information according to the identity information of the object that fails to be authenticated, the target authentication system located on the transit device is automatically triggered to perform the second authentication on the object that fails to be authenticated for the first time.
In some embodiments, after the second authentication is passed, the target authentication system is in a preset state. The preset state comprises a closing state or a dormant state.
In some embodiments, if the target authentication system is in the dormant state, when the front-end authentication system fails to authenticate the object to be authenticated next time, after the target authentication system is confirmed, the corresponding target authentication system is awakened and the object that fails to be authenticated is authenticated for the second time. And after the second authentication is finished, switching the target authentication system from the working state to the dormant state.
In some embodiments, the control device further comprises an image capturing module for capturing a face image when the object to be authenticated is authenticated for the first time and the second time.
As shown in fig. 3, a traffic device, the device comprising:
the front-end authentication system 15 is used for performing first authentication on an object to be authenticated;
a target authentication system 16 for performing a second authentication on the object that failed the first authentication;
and a control device.
The control device shown in fig. 2 may be adopted as the control device, and details are not repeated here.
According to the invention, after the first authentication of the user fails, normal passing can be realized through a secondary verification mode, so that the intervention frequency of workers is reduced, and the normal passing of the queue is ensured.
An embodiment of the present application further provides an apparatus, which may include: one or more processors; and one or more machine readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the method of fig. 1. In practical applications, the device may be used as a terminal device, and may also be used as a server, where examples of the terminal device may include: the mobile terminal includes a smart phone, a tablet computer, an electronic book reader, an MP3 (Moving Picture Experts Group Audio Layer III) player, an MP4 (Moving Picture Experts Group Audio Layer IV) player, a laptop, a vehicle-mounted computer, a desktop computer, a set-top box, an intelligent television, a wearable device, and the like.
The present embodiment also provides a non-volatile readable storage medium, where one or more modules (programs) are stored in the storage medium, and when the one or more modules are applied to a device, the device may be caused to execute instructions (instructions) of steps included in the face recognition method in fig. 1 according to the present embodiment.
Fig. 4 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present application. As shown, the terminal device may include: an input device 1100, a first processor 1101, an output device 1102, a first memory 1103, and at least one communication bus 1104. The communication bus 1104 is used to implement communication connections between the elements. The first memory 1103 may include a high-speed RAM memory, and may also include a non-volatile storage NVM, such as at least one disk memory, and the first memory 1103 may store various programs for performing various processing functions and implementing the method steps of the present embodiment.
Alternatively, the first processor 1101 may be, for example, a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and the first processor 1101 is coupled to the input device 1100 and the output device 1102 through a wired or wireless connection.
Optionally, the input device 1100 may include a variety of input devices, such as at least one of a user-oriented user interface, a device-oriented device interface, a software programmable interface, a camera, and a sensor. Optionally, the device interface facing the device may be a wired interface for data transmission between devices, or may be a hardware plug-in interface (e.g., a USB interface, a serial port, etc.) for data transmission between devices; optionally, the user-facing user interface may be, for example, a user-facing control key, a voice input device for receiving voice input, and a touch sensing device (e.g., a touch screen with a touch sensing function, a touch pad, etc.) for receiving user touch input; optionally, the programmable interface of the software may be, for example, an entry for a user to edit or modify a program, such as an input pin interface or an input interface of a chip; the output devices 1102 may include output devices such as a display, audio, and the like.
In this embodiment, the processor of the terminal device includes a module for executing the functions of the modules of the face recognition apparatus in each device, and specific functions and technical effects may refer to the foregoing embodiments, which are not described herein again.
Fig. 5 is a schematic hardware structure diagram of a terminal device according to an embodiment of the present application. Fig. 5 is a specific embodiment of the implementation process of fig. 4. As shown, the terminal device of the present embodiment may include a second processor 1201 and a second memory 1202.
The second processor 1201 executes the computer program code stored in the second memory 1202 to implement the method described in fig. 4 in the above embodiment.
The second memory 1202 is configured to store various types of data to support operations at the terminal device. Examples of such data include instructions for any application or method operating on the terminal device, such as messages, pictures, videos, and so forth. The second memory 1202 may include a Random Access Memory (RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
Optionally, a second processor 1201 is provided in the processing assembly 1200. The terminal device may further include: communication component 1203, power component 1204, multimedia component 1205, speech component 1206, input/output interfaces 1207, and/or sensor component 1208. The specific components included in the terminal device are set according to actual requirements, which is not limited in this embodiment.
The processing component 1200 generally controls the overall operation of the terminal device. The processing assembly 1200 may include one or more second processors 1201 to execute instructions to perform all or part of the steps of the data processing method described above. Further, the processing component 1200 can include one or more modules that facilitate interaction between the processing component 1200 and other components. For example, the processing component 1200 can include a multimedia module to facilitate interaction between the multimedia component 1205 and the processing component 1200.
The power supply component 1204 provides power to the various components of the terminal device. The power components 1204 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal device.
The multimedia components 1205 include a display screen that provides an output interface between the terminal device and the user. In some embodiments, the display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the display screen includes a touch panel, the display screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
The voice component 1206 is configured to output and/or input voice signals. For example, the voice component 1206 includes a Microphone (MIC) configured to receive external voice signals when the terminal device is in an operational mode, such as a voice recognition mode. The received speech signal may further be stored in the second memory 1202 or transmitted via the communication component 1203. In some embodiments, the speech component 1206 further comprises a speaker for outputting speech signals.
The input/output interface 1207 provides an interface between the processing component 1200 and peripheral interface modules, which may be click wheels, buttons, etc. These buttons may include, but are not limited to: a volume button, a start button, and a lock button.
The sensor component 1208 includes one or more sensors for providing various aspects of status assessment for the terminal device. For example, the sensor component 1208 may detect an open/closed state of the terminal device, relative positioning of the components, presence or absence of user contact with the terminal device. The sensor assembly 1208 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact, including detecting the distance between the user and the terminal device. In some embodiments, the sensor assembly 1208 may also include a camera or the like.
The communication component 1203 is configured to facilitate communications between the terminal device and other devices in a wired or wireless manner. The terminal device may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In one embodiment, the terminal device may include a SIM card slot therein for inserting a SIM card therein, so that the terminal device may log onto a GPRS network to establish communication with the server via the internet.
As can be seen from the above, the communication component 1203, the voice component 1206, the input/output interface 1207 and the sensor component 1208 involved in the embodiment of fig. 5 can be implemented as the input device in the embodiment of fig. 4.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.
Claims (17)
1. A method for controlling a transit device, the method comprising:
controlling a front-end authentication system to perform first authentication on an object to be authenticated;
if the first authentication fails, acquiring the identity information of the object which fails to be authenticated;
determining the identity level of the object which fails in authentication according to the identity information;
determining a target authentication system corresponding to the identity level according to the identity level of the object which fails to be authenticated;
controlling the target authentication system to carry out second authentication on the object which fails in the first authentication;
the authentication mode of the front-end authentication system is different from that of the target authentication system; the front-end authentication system and the target authentication system are both arranged on the passing equipment.
2. The method for controlling a passing device according to claim 1, wherein after determining a target authentication system corresponding to the identity information according to the identity information of the object that fails to be authenticated, the target authentication system located on the passing device is automatically triggered to perform a second authentication on the object that fails to be authenticated for the first time.
3. The control method of the passage device according to claim 2, wherein the target authentication system is brought into a preset state after the second authentication is passed.
4. The control method for a transit device as claimed in claim 3, wherein the preset state comprises an off state or a sleep state.
5. The control method of the passing device of claim 1, wherein the identity information of the object that fails the first authentication is matched with information in the identity information management system to determine the identity level of the object that fails the first authentication.
6. The control method of the transit device according to claim 1, wherein the front-end authentication system includes a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voice-print authentication system, or a palm-print authentication system.
7. The control method for a transit device according to claim 1, wherein the target authentication system includes at least two of: the system comprises a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system and a palm print authentication system.
8. A control device for a passage apparatus, characterized in that the device comprises:
the first control module is used for controlling the front-end authentication system to carry out first authentication on an object to be authenticated;
the identity information acquisition module is used for acquiring the identity information of the object which fails in authentication when the authentication fails for the first time; determining the identity level of the object which fails in authentication according to the identity information;
the target authentication system confirmation module is used for determining a target authentication system corresponding to the identity level according to the identity level of the object which fails to be authenticated;
the second control module is used for controlling the target authentication system to carry out second authentication on the object which fails in the first authentication;
the authentication mode of the front-end authentication system is different from that of the target authentication system; the front-end authentication system and the target authentication system are both arranged on the passing equipment.
9. The control device of the passing device of claim 8, wherein after determining the target authentication system corresponding to the identity information according to the identity information of the object that fails to be authenticated, the target authentication system located on the passing device is automatically triggered to perform the second authentication on the object that fails to be authenticated for the first time.
10. The control device of the transit device according to claim 9, wherein the target authentication system is placed in a preset state after the second authentication is passed.
11. The control device of the traffic device according to claim 10, wherein the preset state comprises an off state or a sleep state.
12. The control device of the passing device of claim 8, wherein the identity information of the object that fails the first authentication is matched with the information in the identity information management system to determine the identity level of the object that fails the first authentication.
13. The control device of the passing device according to claim 8, wherein the front-end authentication system comprises a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voice-print authentication system or a palm-print authentication system.
14. The control device of the transit device according to claim 8, wherein the target authentication system includes at least two of: a card-swiping authentication system, a face-swiping authentication system, a fingerprint authentication system, an iris authentication system, a voiceprint authentication system or a palm print authentication system.
15. An access device, characterized in that it comprises:
the front-end authentication system is used for authenticating an object to be authenticated for the first time;
the target authentication system is used for carrying out second authentication on the object which fails in the first authentication;
the control device according to any one of claims 8 to 14.
16. An apparatus, comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the methods of claims 1-7.
17. One or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform the methods of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911027597.8A CN110766842B (en) | 2019-10-28 | 2019-10-28 | Passing equipment control method and device, machine readable medium and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911027597.8A CN110766842B (en) | 2019-10-28 | 2019-10-28 | Passing equipment control method and device, machine readable medium and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110766842A CN110766842A (en) | 2020-02-07 |
CN110766842B true CN110766842B (en) | 2020-12-25 |
Family
ID=69333947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911027597.8A Active CN110766842B (en) | 2019-10-28 | 2019-10-28 | Passing equipment control method and device, machine readable medium and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110766842B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096546A (en) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | Unlocking method and device of operating system |
CN203490747U (en) * | 2013-08-24 | 2014-03-19 | 杨保亮 | Multidirectional intelligent access control system |
CN204883880U (en) * | 2015-06-26 | 2015-12-16 | 罗鸿渊 | Family's thing allies oneself with control and authenticate device based on NFC |
CN205644713U (en) * | 2016-05-20 | 2016-10-12 | 浙江中正智能科技有限公司 | Fingerprint lock based on bluetooth control |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006039003A2 (en) * | 2004-08-20 | 2006-04-13 | Viisage Technology, Inc. | Method and system to authenticate an object |
JP4640932B2 (en) * | 2004-12-10 | 2011-03-02 | 富士通株式会社 | Automatic transaction control method, automatic transaction apparatus and program thereof |
US20060265243A1 (en) * | 2005-05-20 | 2006-11-23 | Jeffrey Racho | System and method for establishing or verifying a person's identity using SMS and MMS over a wireless communications network |
CN102568064A (en) * | 2011-12-14 | 2012-07-11 | 深圳市中联创新自控系统有限公司 | Access control system control method and access control system |
CN106340098A (en) * | 2016-08-27 | 2017-01-18 | 桂林信通科技有限公司 | Access control system and control methods thereof |
CN107749844A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | Auth method and mobile terminal |
CN109471782A (en) * | 2018-11-20 | 2019-03-15 | 北京芯盾时代科技有限公司 | A kind of risk detecting system and risk checking method |
-
2019
- 2019-10-28 CN CN201911027597.8A patent/CN110766842B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096546A (en) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | Unlocking method and device of operating system |
CN203490747U (en) * | 2013-08-24 | 2014-03-19 | 杨保亮 | Multidirectional intelligent access control system |
CN204883880U (en) * | 2015-06-26 | 2015-12-16 | 罗鸿渊 | Family's thing allies oneself with control and authenticate device based on NFC |
CN205644713U (en) * | 2016-05-20 | 2016-10-12 | 浙江中正智能科技有限公司 | Fingerprint lock based on bluetooth control |
Also Published As
Publication number | Publication date |
---|---|
CN110766842A (en) | 2020-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11310223B2 (en) | Identity authentication method and apparatus | |
CN111369418B (en) | Health data management method, system, machine-readable medium and equipment | |
CN110766837A (en) | Control method and device for passing equipment, machine readable medium and equipment | |
CN109032675A (en) | The unlocking screen method, apparatus and terminal device of terminal device | |
US20150154392A1 (en) | Secure face authentication with liveness detection for mobile | |
US9122913B2 (en) | Method for logging a user in to a mobile device | |
US10579783B1 (en) | Identity authentication verification | |
CN103324909A (en) | Facial feature detection | |
CN105095847A (en) | Iris identification method and apparatus for mobile terminal | |
CN109814964B (en) | Interface display method, terminal equipment and computer readable storage medium | |
WO2018205468A1 (en) | Biometric transaction processing method, electronic device and storage medium | |
CN110673723A (en) | Speech interaction method, system, medium, and apparatus based on biometric features | |
CN112989299A (en) | Interactive identity recognition method, system, device and medium | |
CN109254661B (en) | Image display method, image display device, storage medium and electronic equipment | |
CN112906574A (en) | Dynamic threshold management method and system | |
CN106296171B (en) | Card swiping method and device of mobile terminal | |
US20210201614A1 (en) | Systems and methods for electronic voting | |
WO2024212861A1 (en) | Login verification method and apparatus for application program, and electronic device, computer-readable storage medium and computer program product | |
CN110647732B (en) | Voice interaction method, system, medium and device based on biological recognition characteristics | |
CN111695509A (en) | Identity authentication method, identity authentication device, machine readable medium and equipment | |
CN112735015B (en) | Community management method, device, machine-readable medium and equipment | |
CN113077262A (en) | Catering settlement method, device, system, machine readable medium and equipment | |
CN110766842B (en) | Passing equipment control method and device, machine readable medium and equipment | |
CN111985401A (en) | Area monitoring method, system, machine readable medium and equipment | |
CN113570763A (en) | Passage control method and device, machine readable medium and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 511458 room 1110, jinmaowan, Nansha, No.1, West 4th Street, Jinmao, Nansha District, Guangzhou City, Guangdong Province (self compiled T4 building) (for office use only) Applicant after: Guangzhou yuncongboyan Intelligent Technology Co., Ltd Address before: 511458 room 1110, jinmaowan, Nansha, No.1, West 4th Street, Jinmao, Nansha District, Guangzhou City, Guangdong Province (self compiled T4 building) (for office use only) Applicant before: Guangzhou Boyan Intelligent Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |