CN110768942B - Identity authentication system - Google Patents
Identity authentication system Download PDFInfo
- Publication number
- CN110768942B CN110768942B CN201810852534.5A CN201810852534A CN110768942B CN 110768942 B CN110768942 B CN 110768942B CN 201810852534 A CN201810852534 A CN 201810852534A CN 110768942 B CN110768942 B CN 110768942B
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- fingerprint
- cloud server
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 claims abstract description 41
- 238000013507 mapping Methods 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 5
- 238000000034 method Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 230000004913 activation Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Computational Linguistics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The application relates to the field of Internet and discloses an identity authentication system. The system comprises an identity recognition device, a fingerprint acquisition device and a cloud server; the system is applicable to apartment management; the identity recognition device is used for prompting the user to input a fingerprint when the user is detected to be located in a preset area; the fingerprint acquisition device is used for receiving the fingerprint input by the user and sending the fingerprint to a cloud server; the cloud server is used for matching the received fingerprint with a pre-stored fingerprint; if the matching is successful, determining a terminal matched with the received fingerprint; sending an identity verification code to the terminal and the identity recognition device; and the identity recognition device is used for controlling the gate to be opened if the received identity verification code input by the user is matched with the identity verification code sent by the cloud server. By the authentication scheme provided by the invention, the safety of the apartment can be greatly improved.
Description
Technical Field
The invention relates to the field of internet, in particular to an identity authentication system.
Background
In order to ensure the safety of a cell or an apartment, an identity authentication device is often installed on a gate of the cell or the apartment, and a resident of the cell or the apartment can pass through the gate by swiping a card when the resident goes in and out of the gate.
It should be noted that the pass card of the resident in the community or apartment is handled by the property when the resident is in the residence, the pass card is not in the real name system, and anyone can freely pass through the gate by holding the pass card, and the security of the authentication mechanism is very low to some extent.
Disclosure of Invention
The embodiment of the invention discloses an identity authentication system, which comprises an identity recognition device, a fingerprint acquisition device and a cloud server; the identity recognition device and the fingerprint acquisition device are installed on a gate of an apartment or a community or in a preset range of the gate; the identity recognition device is used for prompting the user to input a fingerprint when the user is detected to be located in a preset area; the fingerprint acquisition device is used for receiving the fingerprint input by the user and sending the fingerprint to a cloud server; the cloud server is used for receiving the fingerprint and matching the received fingerprint with a pre-stored fingerprint; if the matching is successful, determining a terminal matched with the received fingerprint; sending an identity verification code to the terminal and the identity recognition device; the identity recognition device is used for receiving an identity verification code input by the user; and if the received authentication code input by the user is matched with the authentication code sent by the cloud server, controlling the gate to be opened. By the authentication scheme provided by the invention, the safety of a cell or an apartment can be greatly improved.
The first aspect of the embodiments of the present invention discloses an identity authentication system, which includes:
the system for identity authentication is characterized by comprising an identity recognition device, a fingerprint acquisition device and a cloud server; the identity recognition device and the fingerprint acquisition device are installed on a gate of an apartment or a community or in a preset range of the gate;
the identity recognition device is used for prompting the user to input a fingerprint when the user is detected to be located in a preset area;
the fingerprint acquisition device is used for receiving the fingerprint input by the user and sending the fingerprint to a cloud server;
the cloud server is used for receiving the fingerprint and matching the received fingerprint with a pre-stored fingerprint; if the matching is successful, determining a terminal matched with the received fingerprint; sending a dynamic random identity verification code to the terminal and the identity recognition device;
the identity recognition device is used for receiving an identity verification code input by the user; and if the received identity verification code input by the user is matched with the identity verification code sent by the cloud server, controlling the gate to be opened.
Optionally, the identity recognition device is further configured to prompt the user to perform voice verification if the identity verification code input by the user is not received within a preset time period.
Optionally, the identity recognition device is further configured to collect voice of the user, and send the collected voice to the cloud server; the cloud server is further used for receiving the voice sent by the identity recognition device; traversing a voice database according to the timbre of the voice to determine whether a matched timbre exists; if the matched timbre exists, a door opening instruction is sent to the identity recognition device; the identity recognition device is further used for controlling the gate to be opened if the door opening instruction sent by the cloud server is received.
Optionally, the system further comprises an information acquisition device;
the information acquisition device is used for receiving user identification, fingerprint information and tone information input by a user and sending the user identification, the fingerprint information and the tone information to the cloud server; the cloud server is also used for receiving the user identification, the fingerprint information and the tone information sent by the information acquisition device; and storing the mapping relation between the user identification and the fingerprint information, and storing the user identification and the tone information.
Optionally, the cloud server is further configured to determine an identity of the user according to the user identifier, and determine a validity period of an authority of the user to get in and out of the gate according to the identity of the user.
Optionally, the cloud server is further configured to monitor a validity period of the stored authority of the user for entering and exiting the gate; when the right of expiration of the validity period exists, sending a re-registration prompt to the user of which the validity period expires; and if the re-registration information of the user with the expired validity period is not received within the preset time period, limiting the authority of the user with the expired validity period.
In addition, it should be noted that the information between the identification device and the cloud server is encrypted by a preset protocol.
Optionally, the identity recognition device includes a camera and a controller;
the camera is specifically used for monitoring a preset area and sending an acquired image to the controller; the controller is used for receiving the image sent by the camera and carrying out face recognition on the image to determine whether a user is located in a preset area.
Optionally, the controller is further configured to match the identified face image with a pre-stored image in an identity database, and if the matching fails, store the identified face image and send an alarm prompt indicating that a stranger appears to an administrator. In addition, it should be noted that the pre-stored images in the identity database are face images of the resident collected when the resident registers the identity.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, the cloud server can prestore the fingerprint of the user and the terminal corresponding to the prestore fingerprint, if the received fingerprint is successfully matched with the prestore fingerprint, the terminal corresponding to the prestore fingerprint and the identity recognition device are sent with the identity verification code, the user inputs the identity verification code on the identity recognition device, the identity recognition device judges whether the identity verification code is consistent with the verification method issued by the cloud server, and if so, the gate is controlled to be opened. By using the system provided by the invention, the identity of each visitor can be accurately verified, so that the safety of a cell or an apartment can be improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is an architecture diagram of an authentication system according to an embodiment of the present invention;
FIG. 2 is a logic structure diagram of an identification apparatus according to an embodiment of the present invention;
FIG. 3 is a logic structure diagram of another identification apparatus disclosed in the embodiment of the present invention;
fig. 4 is a logical structure diagram of a cloud server according to the embodiment of the present invention;
fig. 5 is a physical structure diagram of a cloud server disclosed in the embodiment of the present invention;
fig. 6 is a flowchart of an authentication method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses an identity authentication system. The system comprises an identity recognition device, a fingerprint acquisition device and a cloud server; the identity recognition device and the fingerprint acquisition device are installed on a gate of an apartment or a community or in a preset range of the gate; the identity recognition device is used for prompting the user to input a fingerprint when the user is detected to be located in a preset area; the fingerprint acquisition device is used for receiving the fingerprint input by the user and sending the fingerprint to a cloud server; the cloud server is used for receiving the fingerprint and matching the received fingerprint with a pre-stored fingerprint; if the matching is successful, determining a terminal matched with the received fingerprint; sending an identity verification code to the terminal and the identity recognition device; the identity recognition device is used for receiving an identity verification code input by the user; and if the received identity verification code input by the user is matched with the identity verification code sent by the cloud server, controlling the gate to be opened. By the authentication scheme provided by the invention, the safety of a cell or an apartment can be greatly improved.
The following is a detailed description with reference to specific examples.
Referring to fig. 1, fig. 1 is a system 100 for identity authentication according to an embodiment of the present disclosure, the system including an identity recognition device 110, a fingerprint collection device 120, and a cloud server 130; the identity recognition device 110 and the fingerprint acquisition device 120 are installed on a gate of an apartment or a community or within a preset range of the gate;
for example, the identification device 110 and the fingerprint acquisition device 120 may be installed at a gate of a cell or an apartment.
The identity recognition device 110 is used for prompting the user to input a fingerprint when the user is detected to be located in a preset area;
the structure of the identification apparatus 110 is shown in fig. 2, and the identification apparatus 110 includes a camera 111 and a controller 112; the camera 111 is specifically configured to monitor a preset area and send an acquired image to the controller 112; and the controller 112 is configured to receive the image sent by the camera 111, and perform face recognition on the image to determine whether a user is located in a preset area. It should be noted that the area covered by the preset area camera, or the area directly opposite to the gate of the cell or the apartment. In addition, it should be noted that the camera 111 may have a buffering function, for example, every time 100M or 200M of video is buffered, the video is sent to the controller once; alternatively, the camera 111 has a clock function and transmits the recorded video to the controller according to a preset time length. Such as every 1 minute or every 5 minutes. It should be noted that, as long as the controller 112 determines that the person avatar exists in the video recorded by the camera 111 through face recognition, it is determined that the user is located in the preset area. In addition, optionally, the controller 112 is further configured to match the identified face image with an image in a pre-stored identity database, and if the matching fails, store the identified face image, and send an alarm prompt indicating that a stranger appears to the administrator. It is further noted that the prompting method includes, but is not limited to, voice, letter, vibration, and the like.
The fingerprint acquisition device 120 is used for receiving the fingerprint input by the user and sending the fingerprint to the cloud server;
it should be noted that, after the identification device 110 sends a prompt for inputting a fingerprint to the user, the identification device may send an activation instruction to the fingerprint acquisition device 120, after receiving the activation instruction, the fingerprint acquisition device 120 may be in an activation state, and the fingerprint acquisition device 120 in the activation state may receive the fingerprint input by the user within a preset time period and send the received fingerprint to the cloud server. Wherein the preset time period may be 5 seconds, 10 seconds, 30 seconds, etc., without limitation. The number of user input fingerprints may be 1 or more within the preset time period. In summary, the fingerprint collection device 120 sends all fingerprints collected within a preset time period to the cloud server 130.
The cloud server 130 is used for receiving the fingerprints and matching the received fingerprints with the pre-stored fingerprints; if the matching is successful, determining a terminal matched with the received fingerprint; sending an identity verification code to the terminal and the identity recognition device;
if the number of the received fingerprints is 1, the fingerprints are matched with the prestored fingerprints one by one, if the fingerprints are successfully matched with one of the fingerprints, the identity verification code is randomly generated, and the identity verification code is sent to the terminal matched with the received fingerprints and the identity recognition device. It should be noted that the authentication code may be a character string, may be a number, and is not limited herein. In addition, if the number of received fingerprints is multiple, the received fingerprints must be matched with the pre-stored fingerprints until a successful match is achieved. For example, in order to ensure the safety of the passing right of the resident of the apartment or the residential district, when the resident registers the identity, a plurality of fingerprints are input, and each time the resident enters the door, a plurality of fingerprints need to be input.
An identification device 110 for receiving the identification code input by the user; and if the received identity verification code input by the user is matched with the identity verification code sent by the cloud server, controlling the gate to be opened.
It should be noted that when the user sees the authentication code in the terminal, the user needs to input the authentication code on the identification means 110. The identification device 110 matches the authentication code input by the user with the authentication code sent by the cloud server 130. And if the matching is successful, sending a door opening signal to the gate, and automatically opening the door after the gate receives the door opening signal.
It should be further noted that, if the user in the preset area forgets to take the terminal, he may not obtain the authentication code, and thus cannot input the authentication code.
For such a scenario, the identification apparatus 110 may switch the authentication mode, for example, switching the authentication code mode to the voice authentication mode. Specifically, as shown in fig. 3, the identification apparatus 110 further includes a reminding module 1103 and a sound collection module 1104 in addition to the camera 1101 and the controller 1102.
The process of switching the mode of the identity verification code into the mode of voice verification is as follows:
the identity recognition device 110 is further configured to prompt the user to perform voice verification if the authentication code input by the user is not received within a preset time period. It is understood that the specific execution module is the reminder module 1103.
The identity recognition device 110 is further configured to collect voice of the user and send the collected voice to the cloud server; it is understood that the specific implementation block is the sound collection block 1104.
The cloud server 130 is further configured to receive the voice sent by the identity recognition device 110; traversing a voice database according to the tone of the voice to determine whether a matched tone exists; if the matched timbre exists, a door opening instruction is sent to the identity recognition device;
the identity recognition device 110 is further configured to control the gate to be opened if the door opening instruction sent by the cloud server is received.
In addition, it is further noted that, in order to match fingerprints and match voices, various information of the user who enters the cell or apartment needs to be entered in the authentication information in advance. It is understood that the authentication system 100 further includes an information collecting device 140;
the information acquisition device 140 is configured to receive a user identifier, fingerprint information, and timbre information input by a user, and send the user identifier, the fingerprint information, and the timbre information to the cloud server;
the cloud server 130 is further configured to receive the user identifier, the fingerprint information, and the tone information sent by the information acquisition device; and storing the mapping relation between the user identification and the fingerprint information, and storing the user identification and the tone information.
It can be understood that the cloud server 130 may be deployed in a centralized manner in a machine room of a cell, or may be deployed in a distributed manner, for example, the cell has multiple buildings, and each building is provided with a server for storing information of a resident of the cell.
It should be further noted that even in the same cell, the identity of each user is different, some are owners, and some are tenants, so the validity period of the authority of each user is different. For example, the validity period of the owner entering the gate may be permanent, but the validity period of the tenant's right to enter the gate is less than or equal to the term of the house renting in the house renting contract.
Specifically, the cloud server 130 is further configured to determine an identity of the user according to the user identifier, and determine a validity period of an authority of the user to get in and out of the gate according to the identity of the user.
Further, in order to ensure the security of the cell in real time, the cloud server 130 may detect the time limit of the authority of each user in real time and update the authority in time. Specifically, the method comprises the following steps:
the cloud server 130 is further configured to monitor the validity period of the stored authority of the user for entering and exiting the gate; when the right of expiration of the validity period exists, sending a re-registration prompt to the user of which the validity period expires; and if the re-registration information of the user with the expired validity period is not received within the preset time period, limiting the authority of the user with the expired validity period.
In addition, in order to ensure that user information is not leaked, information communicated between devices in the authentication system needs to be encrypted. For example, the information between the identification device 10 and the cloud server 130 is encrypted by a preset protocol.
In addition, it should be noted that the pre-stored images in the identity database are face images of the resident collected when the resident registers the identity.
From the above, by implementing the technical scheme provided by the embodiment of the invention, the cloud server can effectively identify the fingerprint, the voice and the like of the user and control the opening of the gate according to the identification result; furthermore, the validity period of the authority of each user can be effectively monitored, so that the authority of the user can be updated in time according to the information of the validity period.
Referring to fig. 4, fig. 4 is a logic structure diagram of a cloud server 130 according to an embodiment of the disclosure. The cloud server 130 includes:
a receiving unit 1301, configured to receive the fingerprint sent by the identification apparatus 110;
a matching unit 1302, configured to match a received fingerprint with a pre-stored fingerprint;
a determining unit 1303, configured to determine, if the matching is successful, a terminal that matches the received fingerprint;
a sending unit 1304, configured to send an authentication code to the terminal and the identity recognition apparatus;
a receiving unit 1301, further configured to receive a voice sent by the identity recognition apparatus;
the matching unit 1302 is further configured to traverse a voice database according to the tone of the voice to determine whether there is a matched tone;
the sending unit 1304 is further configured to send a door opening instruction to the identity recognition apparatus if the matched timbre exists;
the receiving unit 1301 is further configured to receive the user identifier, the fingerprint information, and the tone information sent by the information acquisition apparatus;
a storage unit 1305, configured to store the mapping relationship between the user identifier and the fingerprint information, and store the user identifier and the tone color information.
The determining unit 1303 is further configured to determine an identity of the user according to the user identifier, and determine a validity period of an authority of the user to get in and out of the gate according to the identity of the user;
a monitoring unit 1306, configured to monitor a validity period of the saved authority of the user to get in and out of the gate;
a sending unit 1304, configured to send a re-registration reminder to a user whose validity period expires when there is a right that the validity period expires;
limiting unit 1307 is configured to limit the authority of the user with the expired validity period if the re-registration information of the user with the expired validity period is not received within the preset time period.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a cloud server 130 according to an embodiment of the disclosure, and as shown in fig. 5, the cloud server may include: at least one processor 510, such as a CPU, a memory 520, at least one communication bus 530, and a transceiver 540. Wherein a communication bus 550 is used to enable communication connections between these components. Memory 520 may be a high-speed RAM memory or a non-volatile memory, such as at least one disk memory. The memory 520 may optionally be at least one memory device located remotely from the processor 510. Wherein a set of program codes is stored in the memory 520 and the processor 510 calls the program codes stored in the memory 520, the logic units described in fig. 4 can be implemented based on the hardware result.
Referring to fig. 6, fig. 6 is a method for identity authentication according to an embodiment of the present invention, where the method includes:
601. when detecting that a user is located in a preset area, prompting the user to input a fingerprint;
the execution subject of the invention is an authentication device.
602. Receiving the fingerprint input by the user, and matching the received fingerprint with a pre-stored fingerprint;
603. if the matching is successful, determining a terminal matched with the received fingerprint; sending an identity verification code to the terminal;
604. and if the identity verification code input by the user is received and the identity verification code input by the user is matched with the prestored identity verification code, controlling the gate to be opened.
605. If the identity verification code input by the user is not received within the preset time length, prompting the user to perform voice verification;
606. collecting the voice of the user, and traversing a voice database according to the tone of the voice to determine whether a matched tone exists;
607. if the matched timbre exists, a door opening instruction is sent to the identity recognition device;
optionally, the identity authentication device receives a user identifier, fingerprint information, and tone information input by a user, and sends the user identifier, the fingerprint information, and the tone information to the cloud server; and storing the mapping relation between the user identification and the fingerprint information, and storing the user identification and the tone information.
Optionally, the identity authentication device may determine the identity of the user according to the user identifier, and determine the validity period of the right of the user to get in and out of the door according to the identity of the user. Further, the identity authentication device monitors the validity period of the stored authority of the user for getting in and out of the gate; when the right of expiration of the validity period exists, sending a re-registration prompt to the user of which the validity period expires; and if the re-registration information of the user with the expired validity period is not received within the preset time period, limiting the authority of the user with the expired validity period.
It should be noted that the authentication device includes a camera and a controller; the camera is specifically used for monitoring a preset area and sending an acquired image to the controller; the controller is used for receiving the image sent by the camera and carrying out face recognition on the image to determine whether a user is located in a preset area. In addition, the controller is also used for matching the recognized face image with the image in the pre-stored identity database, if the matching fails, the recognized face image is stored, and an alarm prompt for the appearance of a stranger is sent to an administrator.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by hardware instructions of a program, and the program may be stored in a computer-readable storage medium, where the storage medium includes Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read-Only Memory (CD-ROM), or other Memory, such as a magnetic disk, or a combination thereof, A tape memory, or any other medium readable by a computer that can be used to carry or store data.
The identity authentication system disclosed in the embodiment of the present invention is described in detail above, and the principle and the implementation of the present invention are explained in this document by applying specific embodiments, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (9)
1. The system for identity authentication is characterized by comprising an identity recognition device, a fingerprint acquisition device and a cloud server; the identity recognition device and the fingerprint acquisition device are installed on a gate of an apartment or a community or in a preset range of the gate;
the identity recognition device is used for prompting the user to input a fingerprint when the user is detected to be located in a preset area;
the fingerprint acquisition device is used for receiving the fingerprint input by the user and sending the fingerprint to a cloud server;
the cloud server is used for receiving the fingerprints and matching the received fingerprints with pre-stored fingerprints, the number of the fingerprints and the pre-stored fingerprints is at least two, and the fingerprints and the pre-stored fingerprints are in one-to-one correspondence; if all the fingerprints are successfully matched, determining a terminal matched with the received fingerprint; sending a dynamic random identity verification code to the terminal and the identity recognition device;
the identity recognition device is used for receiving the dynamic random identity verification code input and received by the user; if the received identity verification code input by the user is matched with the identity verification code sent by the cloud server, controlling the gate to be opened; and if the identity verification code input by the user is not received within the preset time length, switching the mode of the identity verification code into a voice verification mode, and prompting the user to perform voice verification.
2. The system of claim 1,
the identity recognition device is also used for collecting the voice of the user and sending the collected voice to the cloud server;
the cloud server is further used for receiving the voice sent by the identity recognition device; traversing a voice database according to the tone of the voice to determine whether a matched tone exists; if the matched timbre exists, a door opening instruction is sent to the identity recognition device;
the identity recognition device is further used for controlling the gate to be opened if the door opening instruction sent by the cloud server is received.
3. The system of claim 2, wherein the system further comprises an information gathering device;
the information acquisition device is used for receiving user identification, fingerprint information and tone information input by a user and sending the user identification, the fingerprint information and the tone information to the cloud server;
the cloud server is also used for receiving the user identification, the fingerprint information and the tone information sent by the information acquisition device; and storing the mapping relation between the user identification and the fingerprint information, and storing the user identification and the tone information.
4. The system of claim 3,
the cloud server is further used for determining the identity of the user according to the user identification, and determining the validity period of the authority of the user for getting in and out of the door according to the identity of the user.
5. The system of claim 4,
the cloud server is also used for monitoring the validity period of the stored authority of the user for getting in and out of the gate; when the right of expiration of the validity period exists, sending a re-registration prompt to the user of which the validity period expires; and if the re-registration information of the user with the expired validity period is not received within the preset time period, limiting the authority of the user with the expired validity period.
6. The system of claim 5, wherein the information between the identification device and the cloud server is encrypted by a predetermined protocol.
7. The system of claim 6, wherein the identification device comprises a camera and a controller;
the camera is specifically used for monitoring a preset area and sending an acquired image to the controller;
the controller is used for receiving the image sent by the camera and carrying out face recognition on the image to determine whether a user is located in a preset area.
8. The system of claim 7,
the controller is also used for matching the recognized face image with the image in the prestored identity database, if the matching fails, the recognized face image is stored, and an alarm prompt appearing in a stranger is sent to an administrator.
9. The system of claim 8, wherein the pre-stored images in the identity database are images of faces of the resident collected during identity registration of the resident.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852534.5A CN110768942B (en) | 2018-07-27 | 2018-07-27 | Identity authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852534.5A CN110768942B (en) | 2018-07-27 | 2018-07-27 | Identity authentication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110768942A CN110768942A (en) | 2020-02-07 |
CN110768942B true CN110768942B (en) | 2022-07-12 |
Family
ID=69328991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810852534.5A Active CN110768942B (en) | 2018-07-27 | 2018-07-27 | Identity authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110768942B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111882740A (en) * | 2020-07-21 | 2020-11-03 | 中国工商银行股份有限公司 | Entrance guard verification method, entrance guard device, server and system |
CN113037725B (en) * | 2021-02-26 | 2022-04-22 | 上海钧正网络科技有限公司 | Riding test method, server, test pile and readable storage medium |
CN117197865A (en) * | 2023-08-21 | 2023-12-08 | 上饶高投智城科技有限公司 | Elevator entrance guard security method and system based on image recognition model |
CN117670262B (en) * | 2024-01-31 | 2024-04-26 | 成都双流建工建设集团有限公司 | Project management system and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102034288A (en) * | 2010-12-09 | 2011-04-27 | 江南大学 | Multiple biological characteristic identification-based intelligent door control system |
CN103116924A (en) * | 2013-01-16 | 2013-05-22 | 北京理工大学 | Electronic lock system based on images and mobile communication network |
CN106408727A (en) * | 2016-11-22 | 2017-02-15 | 合肥星服信息科技有限责任公司 | Access control system based on voiceprints |
CN106710032A (en) * | 2015-11-13 | 2017-05-24 | 北京奇虎科技有限公司 | Entrance guard opening method and device |
CN206271082U (en) * | 2016-12-16 | 2017-06-20 | 成都大学 | A kind of gate control system based on Internet of Things |
CN106934898A (en) * | 2017-03-23 | 2017-07-07 | 合肥智慧殿投资管理有限公司 | A kind of prison intelligent entrance guard safety-protection system |
CN107274517A (en) * | 2017-04-25 | 2017-10-20 | 合肥中科奔巴科技有限公司 | Merge the intelligent access control system that three-dimensional face is recognized with vena metacarpea |
-
2018
- 2018-07-27 CN CN201810852534.5A patent/CN110768942B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102034288A (en) * | 2010-12-09 | 2011-04-27 | 江南大学 | Multiple biological characteristic identification-based intelligent door control system |
CN103116924A (en) * | 2013-01-16 | 2013-05-22 | 北京理工大学 | Electronic lock system based on images and mobile communication network |
CN106710032A (en) * | 2015-11-13 | 2017-05-24 | 北京奇虎科技有限公司 | Entrance guard opening method and device |
CN106408727A (en) * | 2016-11-22 | 2017-02-15 | 合肥星服信息科技有限责任公司 | Access control system based on voiceprints |
CN206271082U (en) * | 2016-12-16 | 2017-06-20 | 成都大学 | A kind of gate control system based on Internet of Things |
CN106934898A (en) * | 2017-03-23 | 2017-07-07 | 合肥智慧殿投资管理有限公司 | A kind of prison intelligent entrance guard safety-protection system |
CN107274517A (en) * | 2017-04-25 | 2017-10-20 | 合肥中科奔巴科技有限公司 | Merge the intelligent access control system that three-dimensional face is recognized with vena metacarpea |
Also Published As
Publication number | Publication date |
---|---|
CN110768942A (en) | 2020-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110768942B (en) | Identity authentication system | |
JP4822738B2 (en) | Service authentication system and service authentication method | |
CN110738769A (en) | forbidden user identification method, device, system and computer equipment | |
CN110599653B (en) | Access control unlocking method, device and storage medium | |
EP3886420B1 (en) | Intercom system for collective housing | |
CN111292454A (en) | Intelligent identity access control identification system and method | |
CN113611032A (en) | Access control management method and system based on face recognition | |
CN113160472A (en) | Intelligent management method, device, system, equipment and medium for community access control | |
CN109067881A (en) | Remote-authorization method and its device, equipment and storage medium | |
CN112927408A (en) | Visitor visiting processing method and device | |
CN113034768A (en) | Intelligent access control device and working method thereof | |
KR102495115B1 (en) | System and method of identity verification for visitor identification | |
CN106611500A (en) | Violation evidence taking and punishing device and method and violation management system | |
CN110796770A (en) | Access control method and device, storage medium and electronic device | |
CN110738759A (en) | fingerprint storage method, identity verification method, device and system | |
CN110084947B (en) | Access control information updating method and device | |
KR102089030B1 (en) | Access control system and method based on combination of authentications | |
JP3737594B2 (en) | Network management system, security management device, and security management method | |
KR101933769B1 (en) | Smart pass authenticating system | |
CN112669501B (en) | Access control method, device and computer readable storage medium | |
CN114596643A (en) | Parking management method, parking management device and storage medium | |
CN111862428B (en) | Access control method and device | |
CN107222465B (en) | Network access control system of intelligent gateway | |
KR20100012156A (en) | An identification of coming and going user, information transfer system based on biometrics | |
KR102721310B1 (en) | Digital entry logging system using beacon based dynamic authentication information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |