CN110858419A - Identity recognition method, device and equipment - Google Patents

Identity recognition method, device and equipment Download PDF

Info

Publication number
CN110858419A
CN110858419A CN201810953392.1A CN201810953392A CN110858419A CN 110858419 A CN110858419 A CN 110858419A CN 201810953392 A CN201810953392 A CN 201810953392A CN 110858419 A CN110858419 A CN 110858419A
Authority
CN
China
Prior art keywords
user
legal user
face image
room
current position
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810953392.1A
Other languages
Chinese (zh)
Other versions
CN110858419B (en
Inventor
蒋静远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810953392.1A priority Critical patent/CN110858419B/en
Publication of CN110858419A publication Critical patent/CN110858419A/en
Application granted granted Critical
Publication of CN110858419B publication Critical patent/CN110858419B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Marketing (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the invention provides an identity recognition method, an identity recognition device and identity recognition equipment, wherein the identity recognition method comprises the following steps: acquiring a face image of a user at the current position; if the obtained face image is determined to be matched with the reference face image of the legal user corresponding to the current position, the position information of the terminal equipment of the legal user is obtained; and if the position information of the terminal equipment of the legal user is matched with the current position, determining that the user is the legal user, and further combining the position information of the terminal equipment of the legal user to finish accurate identification of the user identity on the basis of face identification.

Description

Identity recognition method, device and equipment
Technical Field
The invention relates to the technical field of internet, in particular to an identity recognition method, device and equipment.
Background
With the increasing growth of computer vision technology, the wide application of deep neural networks and the gradual improvement of computer operational performance, the identification of user identities through face recognition technology has become increasingly common.
In some scenarios, such as unlocking of hotel rooms, storing of hotel cabinets, and offline payment, the requirement on the accuracy of the user identification result is higher due to safety considerations. However, in real life, there are often cases where: for a certain user, there may be similar faces, such as twins, or even strangers. This situation presents a greater challenge to the accuracy of user identification based on face recognition technology.
Disclosure of Invention
In view of this, embodiments of the present invention provide an identity recognition method, apparatus and device, so as to improve accuracy of a user identity recognition result.
In a first aspect, an embodiment of the present invention provides an identity identification method, including:
acquiring a face image of a user at the current position;
if the face image is determined to be matched with the reference face image of the legal user corresponding to the current position, acquiring the position information of the terminal equipment of the legal user;
and if the position information is matched with the current position, determining that the user is the legal user.
In a second aspect, an embodiment of the present invention provides an identity recognition apparatus, including:
the image acquisition module is used for acquiring a face image of a user at the current position;
the image identification module is used for determining whether the face image is matched with a reference face image of a legal user corresponding to the current position;
the position acquisition module is used for acquiring the position information of the terminal equipment of the legal user if the image recognition module determines that the face image is matched with the reference face image of the legal user corresponding to the current position;
and the identity determining module is used for determining that the user is the legal user if the position information is matched with the current position.
In a third aspect, an embodiment of the present invention provides an electronic device, including a first processor and a first memory, where the first memory is used to store one or more computer instructions, and when executed by the first processor, the one or more computer instructions implement:
acquiring a face image of a user at the current position;
if the face image is determined to be matched with the reference face image of the legal user corresponding to the current position, acquiring the position information of the terminal equipment of the legal user;
and if the position information is matched with the current position, determining that the user is the legal user.
An embodiment of the present invention provides a computer storage medium, configured to store a computer program, where the computer program enables a computer to implement the identity recognition method in the first aspect when executed.
In a fourth aspect, an embodiment of the present invention provides an identity identification method, including:
receiving a positioning request sent by a server, wherein the positioning request is sent to terminal equipment of a legal user by the server when the server determines that a face image of the user at the current position is matched with a reference face image of the legal user corresponding to the current position after acquiring the face image of the user at the current position;
and sending the position information of the terminal equipment of the legal user to the server so as to determine that the user is the legal user when the server determines that the position information is matched with the current position.
In a fifth aspect, an embodiment of the present invention provides an identity recognition apparatus, including:
the system comprises a receiving module, a positioning module and a processing module, wherein the receiving module is used for receiving a positioning request sent by a server, and the positioning request is sent to terminal equipment of a legal user by the server when the server determines that a face image of a user at a current position is matched with a reference face image of the legal user corresponding to the current position after acquiring the face image of the user at the current position;
and the sending module is used for sending the position information of the terminal equipment of the legal user to the server so as to determine that the user is the legal user when the server determines that the position information is matched with the current position.
In a sixth aspect, an embodiment of the present invention provides an electronic device, including a second processor, a second memory, and a communication interface, where the second memory is used to store one or more computer instructions, and when executed by the second processor, the one or more computer instructions implement:
receiving a positioning request sent by a server through the communication interface, wherein the positioning request is sent to terminal equipment of a legal user by the server when the server determines that a face image of the user at the current position is matched with a reference face image of the legal user corresponding to the current position after acquiring the face image of the user at the current position;
and sending the position information of the terminal equipment of the legal user to the server through the communication interface so as to ensure that the user is the legal user when the server determines that the position information is matched with the current position.
The identity recognition method provided by the embodiment of the invention comprises the steps of acquiring a face image of a user at the current position when the identity of the user needs to be recognized, further recognizing the face image according to a face recognition technology to determine whether the face image is matched with a reference face image of a legal user corresponding to the current position, if so, indicating that the user is possibly the legal user, further determining whether the user is the legal user, further acquiring the current position information of terminal equipment of the legal user, and if the position information is matched with the current position of the user at present, indicating that the user is really the legal user, thereby further combining the position information of the terminal equipment of the legal user to finish accurate recognition of the identity of the user on the basis of face recognition.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart of an identity recognition method according to an embodiment of the present invention;
fig. 2 is a flowchart of another identity recognition method according to an embodiment of the present invention;
fig. 3 is a flowchart of another identity recognition method according to an embodiment of the present invention;
fig. 4 is a flowchart of another identity recognition method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an identification apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device corresponding to the identification apparatus provided in the embodiment shown in fig. 5;
fig. 7 is a schematic structural diagram of another identification apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device corresponding to the identification apparatus provided in the embodiment shown in fig. 7.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, and "a" and "an" generally include at least two, but do not exclude at least one, unless the context clearly dictates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
In addition, the sequence of steps in each method embodiment described below is only an example and is not strictly limited.
Fig. 1 is a flowchart of an identity recognition method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
101. and acquiring a face image of the user at the current position.
102. And if the obtained face image is determined to be matched with the reference face image of the legal user corresponding to the current position, acquiring the position information of the terminal equipment of the legal user.
103. And if the position information of the terminal equipment of the legal user is matched with the current position of the user, determining that the user is the legal user.
The identity recognition method provided by the embodiment of the invention can be suitable for various scenes in which the identity of the user needs to be recognized, such as scenes in which the user needs to unlock the lock to enter a room in a hotel, and such as scenes in which the user needs to open a locker to take out stored articles.
For example, in a scenario where a user needs to unlock the door to enter a room in a hotel, the identification method may be performed by a server, or may be performed by a control device installed on a door of the room, where the control device may have resources such as an operating system, a processor, and a memory. Likewise, in other application scenarios, the identification method may also be executed by a server in the corresponding scenario or by a control device deployed where identification is required.
For convenience of understanding, in the following embodiments of the present invention, a scene in which a user needs to unlock the lock to enter a room in a hotel is taken as an example, in the scene, the current position where the user is currently located is a position of a room door of a certain room, that is, the user stands outside a door of the certain room. It will be appreciated that the current location may be the front of the locker if it is in a scenario where the user needs to open the locker to retrieve the stored items.
When the user is located at the current position where identity recognition is needed, the face image of the user is obtained. In the scene that the user need unblank and get into the room in the hotel, optionally, can be provided with human body detector on the room door, for example ultrasonic sensor, infrared sensor etc. to, when human body detector on certain room door detected that there is the user in the front of the door, trigger the camera that sets up on the room door and open, gather this user's face image through the camera. Thus, the face image of the user at the current position obtained in step 101 may be the face image of the user collected by the camera set at the current position.
After the face image of the user is acquired, the face image can be identified through a face identification technology. In the process of performing face recognition, in order to determine the identity of the user, a face image of a legal user (hereinafter referred to as a reference face image for convenience of description) corresponding to the current position where the user is located may be obtained first, and then the obtained face image is matched with the reference face image.
If the current position is a door position of a certain room, the legal user corresponding to the current position is the user who enters the room, when the legal user handles the registration procedure of entering the room, the reference face image of the legal user can be obtained, and besides the reference face image, the information of the terminal device of the legal user can be obtained, the information of the terminal device can be the mobile phone number of the legal user, a Media Access Control (MAC) address, or an identifier of an intelligent card allocated to the legal user, and the intelligent card is, for example, a house card with a beacon chip.
Therefore, after a reference face image of a legal user corresponding to a certain room is obtained, whether the face image acquired by the current camera is matched with the reference face image is determined. In the matching process, in order to prevent the acquired face image from being a non-real person image, the acquired face image may be subjected to living body detection to determine whether the face image is a real person image, that is, whether the face image is a real person image. Optionally, a depth camera, a thermal imaging camera, or a camera that drives a user to complete a specific action may be used to implement the in-vivo detection, where the in-vivo detection implemented by the depth camera and the thermal imaging camera mainly determines whether the acquired image corresponds to a real human body according to depth information and thermal characteristic information in the acquired image.
In this embodiment, when it is determined that the obtained face image matches the reference face image of the legitimate user, the user is not directly determined to be the legitimate user, because the face recognition algorithm cannot be distinguished at this time possibly because the user and the legitimate user have similar faces, in order to ensure the accuracy of the identity recognition result of the user, information of another dimension is introduced to assist in completing accurate identification of the user identity, and the information of the other dimension is position information of the terminal device of the legitimate user.
Therefore, when the obtained face image is determined to be matched with the reference face image of the legal user, the position information where the terminal equipment of the legal user is located currently is further obtained, and if the position information is matched with the current position of the user, the user is determined to be the legal user.
Since the terminal device information of the legitimate user has already been obtained when the legitimate user transacts the check-in registration procedure, the terminal device information reflects which terminal device is that of the legitimate user. In a hotel scene, one or more positioning devices, such as wifi hotspots, beacon base stations, etc., can be deployed in the hotel, and therefore, the real-time position of any terminal device in the hotel can be located based on these positioning devices. For example, assuming that a beacon base station is already allocated to a room card with a beacon chip for a legal user, the location of the room card can be realized through a plurality of beacon base stations deployed in a hotel. In practical application, each positioning device can send the position information of the terminal device positioned in real time to the server for storage, so that the current position information of the terminal device of the legal user can be obtained by inquiring the position information stored in the server. If the position information of the terminal equipment of the legal user is found to be matched with the current position where the user is located currently, namely, the terminal equipment of the legal user is located nearby the room, the user is indicated to have the face image matched with the legal user, and the position of the user is also matched with the current position where the terminal equipment of the legal user is located currently, and the user is indicated to be the legal user. Therefore, in a scene that a user needs to unlock the lock to enter a room, the door lock of the room where the user is located can be controlled to be unlocked, so that the user can enter the room. Wherein the position matching may be that the distance is less than a preset value.
An implementation process of the identity recognition method provided by the embodiment of the invention is described above by taking a scene in which a user in a hotel needs to unlock and enter a room as an example. The following briefly explains the execution process of the identity recognition method in a scenario where a user needs to open a locker to take out stored articles as an example:
in this scenario, assuming that a storage cabinet includes a plurality of storage boxes, when a user wants to take out the articles stored in a storage box, the user stands at a position corresponding to the corresponding storage box. Can be provided with a plurality of human body detection wares and a plurality of camera rationally on the locker, wherein, the scope that each human body detection ware can detect is different, and the scope that every camera can shoot is also different to when certain human body detection ware detects the subscriber station before the locker, can trigger the camera collection user face image that corresponds. In addition, before a user stores an article in a certain storage box, the user can provide information of the terminal device of the user, for example, when the user obtains the right to use the certain storage box in a code scanning mode or a card swiping mode through a mobile phone, when the user executes the code scanning operation or the card swiping operation, the control device (which can be an execution main body of an identity recognition method) arranged on the storage box extracts the information of the terminal device of the user, at the moment, the user obtaining the right to use the certain storage box is a legal user, at the moment, a reference face image of the legal user can be collected, and therefore the reference face image of the legal user and the information of the terminal device are correspondingly stored. Based on the above, after the face image of a certain user is collected, the face image can be matched with the reference face image of the legal user corresponding to each used storage box, if the face image is found to be matched with the reference face image of the legal user, the position information of the terminal equipment of the legal user is further obtained, and when the position information of the terminal equipment is determined to be matched with the position of the storage cabinet, namely, the terminal equipment is located near the position of the storage cabinet, the user is determined to be the legal user indeed, and the corresponding storage box door lock is controlled to be opened.
In summary, when the user needs to be identified, a face image of the user at the current position is obtained, and then the face image is identified according to a face identification technology, so as to determine whether the face image matches with a reference face image of a legal user corresponding to the current position, if so, the user is possibly the legal user, and in order to further determine whether the user is the legal user, and then obtain current position information of a terminal device of the legal user, if the position information matches with the current position of the user at present, the user is indeed the legal user, so that on the basis of face identification, accurate identification of the user identity is completed by further combining with the position information of the terminal device of the legal user.
In the following, a scene in which a user needs to unlock the lock to enter a room is taken as an example, and some optional embodiments of the identity recognition method in the actual implementation process in the scene are described.
Fig. 2 is a flowchart of another identity recognition method according to an embodiment of the present invention, as shown in fig. 2, the method may include the following steps:
201. and acquiring a face image of the user at the position of the door of the room.
202. If the face image is determined to be matched with the reference face image of the legal user corresponding to the room, determining whether the room door lock is opened within a preset time, if so, executing step 203, otherwise, executing step 204.
203. And determining that the user is a legal user corresponding to the room, and controlling the door lock of the room to be opened.
204. And acquiring the position information of the terminal equipment of the legal user.
205. And if the position information of the terminal equipment of the legal user is matched with the current position of the user, determining that the user is the legal user corresponding to the room, and controlling the door lock of the room to be opened.
In this embodiment, in a scene where a user needs to unlock the lock and enter a room, user identification may be further performed in combination with an opening record of a room door lock, where the opening record mainly has an effect of determining whether location information of a terminal device of a legal user needs to be acquired in accordance with the opening record so as to perform identification on whether the user is a legal user of the room in combination with the location information.
Specifically, when it is determined that a face image acquired outside a certain room door matches a reference face image of a legitimate user of the room, an opening record of the room door lock is acquired. In practical application, the control device arranged at the room door can interact with the intelligent door lock to store the record of each opening and closing behavior of the room door lock, and in addition, the opening record can also be uploaded to the server, so that when the server executes the identity recognition method, the opening record of the room door lock can also be obtained.
The time of opening and closing the door lock of the room each time is recorded in the opening record, so that whether the door lock is opened within the preset time before the current moment, namely the moment when the face image of the user is acquired, can be determined. The predetermined time is a short time, such as 30 seconds.
If the door lock of the room is opened within the preset time, it is very likely that the legal user corresponding to the room is still located near the door of the room, and the legal user has greater insights on potential intrusion, that is, the legal user can find out the situation that other people enter the room in time. Therefore, at the moment, the user identification can be carried out only on the basis of the face matching result, so that the on-off control of the room door lock is carried out, and the processing efficiency of the user identification is improved.
On the contrary, if the door lock of the room is not opened within the preset time, the location information of the terminal device of the legal user needs to be further acquired so as to complete accurate identification of the user identity by combining the location information.
For an introduction that is not fully expanded in this embodiment, reference is made to the related descriptions in the foregoing embodiments, which are not repeated herein.
Fig. 3 is a flowchart of another identity recognition method according to an embodiment of the present invention, as shown in fig. 3, the method may include the following steps:
301. and acquiring a face image of the user at the position of the door of the room.
302. And if the face image is determined to be matched with the reference face image of the legal user corresponding to the room, determining whether the door lock of the room is opened within preset time, if so, executing the step 303, otherwise, executing the step 304.
303. And determining that the user is a legal user corresponding to the room, and controlling the door lock of the room to be opened.
304. It is determined whether there is a person in the room, if so, step 305 is performed, and if not, step 307 is performed.
305. And acquiring the leaving state of the terminal equipment of the legal user corresponding to the room, wherein the leaving state indicates whether the terminal equipment of the legal user is in the room or not.
306. And determining whether a legal user corresponding to the room is in the room according to the leaving state, if not, executing step 307, and if so, executing step 309.
307. And acquiring the position information of the terminal equipment of the legal user corresponding to the room.
308. And if the position information of the terminal equipment of the legal user corresponding to the room is matched with the current position of the user, determining that the user is the legal user corresponding to the room, and controlling the door lock of the room to be opened.
309. It is determined that the user is not a legitimate user.
In this embodiment, on the basis of the foregoing embodiment, in order to further improve the accuracy of the user identification result, the user identification may be further performed in accordance with whether a person is in a room that the user wants to enter. In practical applications, a human body detector may be disposed in the room for detecting whether a person is in the room.
The reason why the distinction of whether or not someone is in the room is: in practical applications, limited by the positioning accuracy, it is sometimes difficult to distinguish whether the terminal device of a legitimate user is located in a room or outside the room, and whether the terminal device is located in the room or outside the room and whether the identification result of the user identity is affected by someone in the room.
This effect is reflected in: if no person exists in the room, it is indicated that the legal user of the room is definitely not in the room, at this time, if the position of the terminal device of the legal user is located near the room, the position of the terminal device can be considered to be located outside the door, and if the obtained face image is matched with the reference face image of the legal user, the user can be accurately determined to be the legal user of the room. On the contrary, if there is a person in the room and it is assumed that the person in the room is a valid user, the position of the terminal device of the valid user is necessarily near the room, and at this time, if only the obtained face image is matched with the reference face image of the valid user and the position of the terminal device of the valid user is near the room, it cannot be accurately identified whether the user is the valid user.
Therefore, when the person in the room is determined, whether the person in the room is a legal user needs to be further determined, if the person in the room is not the legal user, the fact that the legal user is possibly out is indicated, and the result of user identity identification by combining the position of the terminal equipment of the legal user is reliable. If the person in the room is a legal user, it is indicated that whether the user outside the door is a legal user can not be accurately identified according to the position of the terminal equipment of the legal user, and in order to ensure the safety, the user outside the door can be considered as an illegal user, and the door is not opened.
In order to determine whether the person in the room is a legal user, the exit state of the terminal device of the legal user may be determined, where the exit state indicates whether the terminal device of the legal user is in the room.
In practical applications, the leaving state is continuously updated, specifically, if the positions of the terminal devices of the legal users within the continuous preset time period are all located near the room, the leaving state is marked as the state of the terminal device of the legal user in the room, such as marked as 1, where 1 represents that the terminal device of the legal user is in the room, that is, the legal user is in the room. In contrast, if the location of the terminal device of the valid user is not located near the room, the room status update is marked as a status that the terminal device of the valid user is not in the room, such as 0.
Therefore, when it is determined that a person is in the room, the leaving state of the terminal device of the legal user can be obtained, if the leaving state is the state marked as 1, the legal user is in the room, and at this time, it is determined that the user outside the room is not the legal user, and if the leaving state is the state marked as 0, the legal user is not in the room, and at this time, the user outside the room is determined to be the legal user.
Fig. 4 is a flowchart of another identity recognition method according to an embodiment of the present invention, where the identity recognition method according to this embodiment may be executed by a terminal device of a user, and the terminal device may be, for example, a mobile phone, a smart card, or the like. As shown in fig. 4, the method may include the steps of:
401. and receiving a positioning request sent by the server, wherein the positioning request is sent to the terminal equipment of a legal user by the server when the server determines that the face image is matched with the reference face image of the legal user corresponding to the current position after acquiring the face image of the user at the current position.
402. And sending the position information of the terminal equipment of the legal user to the server, so that the server determines that the user is the legal user when the position information of the terminal equipment of the legal user is matched with the current position.
As in the foregoing embodiments, the server may maintain information of the terminal device of the legitimate user, and based on the information, the server may communicate with the terminal device of the legitimate user, thereby implementing the sending of the location request.
For the processing procedure of the inexhaustible server and the procedure of obtaining the relevant information of the legitimate user by the server in this embodiment, reference may be made to the description of the foregoing embodiment, which is not described herein again.
Optionally, in this embodiment, when the server determines that the user who has acquired the face image is not a valid user, the server may further send warning information to the terminal device of the valid user.
The identification device of one or more embodiments of the present invention will be described in detail below. Those skilled in the art will appreciate that the identification devices may be constructed using commercially available hardware components and configured through the steps taught in the present solution.
Fig. 5 is a schematic structural diagram of an identification apparatus according to an embodiment of the present invention, and as shown in fig. 5, the apparatus includes: the system comprises an image acquisition module 11, an image recognition module 12, a position acquisition module 13 and an identity determination module 14.
And the image acquisition module 11 is used for acquiring a face image of the user at the current position.
And the image identification module 12 is configured to determine whether the face image matches a reference face image of a valid user corresponding to the current position.
A position obtaining module 13, configured to obtain position information of the terminal device of the valid user if the image recognition module 12 determines that the face image matches the reference face image of the valid user corresponding to the current position.
An identity determining module 14, configured to determine that the user is the valid user if the location information matches the current location.
Optionally, the apparatus may further include: and the control module is used for controlling the door lock of the room to be opened when the identity determination module 14 determines that the user is the legal user.
Optionally, the position obtaining module 13 may be specifically configured to: and if the room door lock is not opened within the preset time, acquiring the position information of the terminal equipment of the legal user.
Optionally, the identity determination module 14 may be further configured to: if the image recognition module 12 determines that the face image matches the reference face image of the legal user corresponding to the current position and the room door lock is opened within a preset time, it is determined that the user is the legal user.
Optionally, the position obtaining module 13 may be specifically configured to: and if the room is determined to be unmanned, acquiring the position information of the terminal equipment of the legal user.
Optionally, the position obtaining module 13 may be specifically configured to: if the room is determined to be occupied, acquiring the leaving state of the terminal equipment of the legal user, wherein the leaving state indicates whether the terminal equipment of the legal user is in the room; and if the legal user is determined not to be in the room according to the room leaving state, acquiring the position information of the terminal equipment of the legal user.
Optionally, the identity determination module 14 may be further configured to: and if the legal user is determined to be in the room according to the room leaving state, determining that the user is not the legal user.
Optionally, the apparatus may further include: the state determining module is used for marking the leaving state as the state of the terminal equipment of the legal user in the room if the positions of the terminal equipment of the legal user in the continuous preset time length are all positioned near the room; and if the position of the terminal equipment of the legal user is not positioned near the room, marking the room leaving state as a state that the terminal equipment of the legal user is not positioned in the room.
The apparatus shown in fig. 5 can perform the method of the embodiment shown in fig. 1-3, and the detailed description of this embodiment can refer to the related description of the embodiment shown in fig. 1-3. The implementation process and technical effect of the technical solution refer to the descriptions in the embodiments shown in fig. 1 to fig. 3, and are not described herein again.
In one possible design, the structure of the identification apparatus shown in fig. 5 may be implemented as an electronic device, as shown in fig. 6, which may include: a first processor 21 and a first memory 22. Wherein the first memory 22 is used for storing programs that support an electronic device to execute the identification method provided in the embodiments shown in fig. 1-3, and the first processor 21 is configured to execute the programs stored in the first memory 22.
The program comprises one or more computer instructions which, when executed by the first processor 21, are capable of performing the steps of:
acquiring a face image of a user at the current position;
if the face image is determined to be matched with the reference face image of the legal user corresponding to the current position, acquiring the position information of the terminal equipment of the legal user;
and if the position information is matched with the current position, determining that the user is the legal user.
Optionally, the first processor 21 is further configured to perform all or part of the steps in the embodiments shown in fig. 1 to 3.
The electronic device may further include a first communication interface 23, which is used for the electronic device to communicate with other devices or a communication network.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the identification method in the method embodiments shown in fig. 1 to 3.
Fig. 7 is a schematic structural diagram of another identification apparatus provided in an embodiment of the present invention, as shown in fig. 7, the apparatus includes: a receiving module 31 and a transmitting module 32.
The receiving module 31 is configured to receive a positioning request sent by a server, where the positioning request is sent to a terminal device of a valid user by the server when the server determines, after acquiring a face image of the user at a current location, that the face image matches a reference face image of the valid user corresponding to the current location.
A sending module 32, configured to send the location information of the terminal device of the valid user to the server, so that when the server determines that the location information matches the current location, it determines that the user is the valid user.
The apparatus shown in fig. 7 can perform the method of the embodiment shown in fig. 4, and reference may be made to the related description of the embodiment shown in fig. 4 for a part of this embodiment that is not described in detail. The implementation process and technical effect of the technical solution refer to the description in the embodiment shown in fig. 4, and are not described herein again.
In one possible design, the structure of the identification apparatus shown in fig. 7 may be implemented as an electronic device, such as a mobile phone, a smart card, and the like, and as shown in fig. 8, the electronic device may include: a second processor 41, a second memory 42 and a second communication interface 43. Wherein the second memory 42 is used for storing programs that support the electronic device to execute the identification method provided in the embodiment shown in fig. 4, and the second processor 41 is configured to execute the programs stored in the second memory 42.
The program comprises one or more computer instructions which, when executed by the second processor 41, are capable of performing the steps of:
receiving a positioning request sent by a server through the second communication interface 43, where the positioning request is sent to a terminal device of a legal user by the server when the server determines that a face image of the user at a current position matches a reference face image of the legal user corresponding to the current position after acquiring the face image;
and sending the location information of the terminal equipment of the legal user to the server through the second communication interface 43, so that the server determines that the user is the legal user when determining that the location information is matched with the current location.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the identity recognition method in the embodiment of the method shown in fig. 4.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by adding a necessary general hardware platform, and of course, can also be implemented by a combination of hardware and software. With this understanding in mind, the above-described aspects and portions of the present technology which contribute substantially or in part to the prior art may be embodied in the form of a computer program product, which may be embodied on one or more computer-usable storage media having computer-usable program code embodied therein, including without limitation disk storage, CD-ROM, optical storage, and the like.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable identification device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable identification device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable identification device to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable identification device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer implemented process such that the instructions which execute on the computer or other programmable device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (fl ash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (13)

1. An identity recognition method, comprising:
acquiring a face image of a user at the current position;
if the face image is determined to be matched with the reference face image of the legal user corresponding to the current position, acquiring the position information of the terminal equipment of the legal user;
and if the position information is matched with the current position, determining that the user is the legal user.
2. The method of claim 1, wherein the current location is a room doorway location, and wherein after determining that the user is the legitimate user, further comprising:
and controlling the door lock of the room to be unlocked.
3. The method of claim 2, wherein the obtaining the location information of the terminal device of the valid user comprises:
and if the room door lock is not opened within the preset time, acquiring the position information of the terminal equipment of the legal user.
4. The method of claim 2, further comprising:
and if the face image is determined to be matched with the reference face image of the legal user and the door lock of the room is opened within the preset time, determining that the user is the legal user.
5. The method according to claim 2 or 3, wherein the obtaining the location information of the terminal device of the legal user comprises:
and if the room is determined to be unmanned, acquiring the position information of the terminal equipment of the legal user.
6. The method according to claim 2 or 3, wherein the obtaining the location information of the terminal device of the legal user comprises:
if the room is determined to be occupied, acquiring the leaving state of the terminal equipment of the legal user, wherein the leaving state indicates whether the terminal equipment of the legal user is in the room;
and if the legal user is determined not to be in the room according to the room leaving state, acquiring the position information of the terminal equipment of the legal user.
7. The method of claim 6, further comprising:
and if the legal user is determined to be in the room according to the room leaving state, determining that the user is not the legal user.
8. The method of claim 6, further comprising:
if the positions of the terminal equipment of the legal user in the continuous preset time length are all located near the room, marking the room leaving state as the state of the terminal equipment of the legal user in the room;
and if the position of the terminal equipment of the legal user is not positioned near the room, marking the room leaving state as a state that the terminal equipment of the legal user is not positioned in the room.
9. An identity recognition method, comprising:
receiving a positioning request sent by a server, wherein the positioning request is sent to terminal equipment of a legal user by the server when the server determines that a face image of the user at the current position is matched with a reference face image of the legal user corresponding to the current position after acquiring the face image of the user at the current position;
and sending the position information of the terminal equipment of the legal user to the server so as to determine that the user is the legal user when the server determines that the position information is matched with the current position.
10. An identification device, comprising:
the image acquisition module is used for acquiring a face image of a user at the current position;
the image identification module is used for determining whether the face image is matched with a reference face image of a legal user corresponding to the current position;
the position acquisition module is used for acquiring the position information of the terminal equipment of the legal user if the image recognition module determines that the face image is matched with the reference face image of the legal user corresponding to the current position;
and the identity determining module is used for determining that the user is the legal user if the position information is matched with the current position.
11. An identification device, comprising:
the system comprises a receiving module, a positioning module and a processing module, wherein the receiving module is used for receiving a positioning request sent by a server, and the positioning request is sent to terminal equipment of a legal user by the server when the server determines that a face image of a user at a current position is matched with a reference face image of the legal user corresponding to the current position after acquiring the face image of the user at the current position;
and the sending module is used for sending the position information of the terminal equipment of the legal user to the server so as to determine that the user is the legal user when the server determines that the position information is matched with the current position.
12. An electronic device, comprising: a memory, a processor; wherein the memory is to store one or more computer instructions that when executed by the processor implement:
acquiring a face image of a user at the current position;
if the face image is determined to be matched with the reference face image of the legal user corresponding to the current position, acquiring the position information of the terminal equipment of the legal user;
and if the position information is matched with the current position, determining that the user is the legal user.
13. An electronic device, comprising: a memory, a processor, a communication interface; wherein the memory is to store one or more computer instructions that when executed by the processor implement:
receiving a positioning request sent by a server through the communication interface, wherein the positioning request is sent to terminal equipment of a legal user by the server when the server determines that a face image of the user at the current position is matched with a reference face image of the legal user corresponding to the current position after acquiring the face image of the user at the current position;
and sending the position information of the terminal equipment of the legal user to the server through the communication interface, so that the server determines that the user is the legal user when determining that the position information is matched with the current position.
CN201810953392.1A 2018-08-21 2018-08-21 Identity recognition method, device and equipment Active CN110858419B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810953392.1A CN110858419B (en) 2018-08-21 2018-08-21 Identity recognition method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810953392.1A CN110858419B (en) 2018-08-21 2018-08-21 Identity recognition method, device and equipment

Publications (2)

Publication Number Publication Date
CN110858419A true CN110858419A (en) 2020-03-03
CN110858419B CN110858419B (en) 2022-01-11

Family

ID=69634907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810953392.1A Active CN110858419B (en) 2018-08-21 2018-08-21 Identity recognition method, device and equipment

Country Status (1)

Country Link
CN (1) CN110858419B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020132663A1 (en) * 1997-08-22 2002-09-19 Blake Cumbers Passive biometric customer identification and tracking system
CN1555543A (en) * 2001-09-20 2004-12-15 �������¹ɷ����޹�˾ Security method for gaining access, access verification device, and elevator
CN203480546U (en) * 2013-08-18 2014-03-12 安徽斯玛特物联网科技有限公司 Intelligent hotel management system based on internet of things
US20150116085A1 (en) * 2012-05-22 2015-04-30 Trw Automotive U.S. Llc Method and apparatus for hands-free opening of a door
CN106097497A (en) * 2016-06-07 2016-11-09 杭州虹云网络科技有限公司 Based on the smart lock of GPS and Bluetooth control and realize the method that safety automation opens the door
CN106251445A (en) * 2016-08-03 2016-12-21 北海和思科技有限公司 A kind of gate control system of automatic repair-reporting
CN107004317A (en) * 2014-12-18 2017-08-01 亚萨合莱有限公司 To the certification for the user for accessing physical space
CN107060571A (en) * 2016-01-15 2017-08-18 福特全球技术公司 Method for the operation of the remote control of the rear baffle of motor vehicles
CN107682339A (en) * 2017-10-13 2018-02-09 唐利伟 lodging data processing method, device, storage medium and computer equipment
JP2018060354A (en) * 2016-10-05 2018-04-12 テックファーム株式会社 Mobile terminal, authentication system, authentication method, and authentication program
CN107945323A (en) * 2017-11-13 2018-04-20 安徽辛巴教育科技有限公司 A kind of safety protection method based on Intelligent campus
CN108035621A (en) * 2017-12-29 2018-05-15 深圳市欧瑞博科技有限公司 A kind of intelligent door lock control method and device
CN108154575A (en) * 2017-11-23 2018-06-12 刘为民 Intelligent network door lock hotel check-in system based on recognition of face

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020132663A1 (en) * 1997-08-22 2002-09-19 Blake Cumbers Passive biometric customer identification and tracking system
CN1555543A (en) * 2001-09-20 2004-12-15 �������¹ɷ����޹�˾ Security method for gaining access, access verification device, and elevator
US20150116085A1 (en) * 2012-05-22 2015-04-30 Trw Automotive U.S. Llc Method and apparatus for hands-free opening of a door
CN203480546U (en) * 2013-08-18 2014-03-12 安徽斯玛特物联网科技有限公司 Intelligent hotel management system based on internet of things
CN107004317A (en) * 2014-12-18 2017-08-01 亚萨合莱有限公司 To the certification for the user for accessing physical space
CN107060571A (en) * 2016-01-15 2017-08-18 福特全球技术公司 Method for the operation of the remote control of the rear baffle of motor vehicles
CN106097497A (en) * 2016-06-07 2016-11-09 杭州虹云网络科技有限公司 Based on the smart lock of GPS and Bluetooth control and realize the method that safety automation opens the door
CN106251445A (en) * 2016-08-03 2016-12-21 北海和思科技有限公司 A kind of gate control system of automatic repair-reporting
JP2018060354A (en) * 2016-10-05 2018-04-12 テックファーム株式会社 Mobile terminal, authentication system, authentication method, and authentication program
CN107682339A (en) * 2017-10-13 2018-02-09 唐利伟 lodging data processing method, device, storage medium and computer equipment
CN107945323A (en) * 2017-11-13 2018-04-20 安徽辛巴教育科技有限公司 A kind of safety protection method based on Intelligent campus
CN108154575A (en) * 2017-11-23 2018-06-12 刘为民 Intelligent network door lock hotel check-in system based on recognition of face
CN108035621A (en) * 2017-12-29 2018-05-15 深圳市欧瑞博科技有限公司 A kind of intelligent door lock control method and device

Also Published As

Publication number Publication date
CN110858419B (en) 2022-01-11

Similar Documents

Publication Publication Date Title
KR102467468B1 (en) Method and system for automated physical access control system using biometrics combined with tag authentication
US11205312B2 (en) Applying image analytics and machine learning to lock systems in hotels
US10482737B2 (en) Parcel theft deterrence for A/V recording and communication devices
CN109243026B (en) Visitor management method and system
US10511810B2 (en) Accessing cameras of audio/video recording and communication devices based on location
CN108269333A (en) Face identification method, application server and computer readable storage medium
WO2017016283A1 (en) Video monitoring method, device and system
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
CN101496074A (en) Device and method for detecting suspicious activity, program, and recording medium
CN109979059A (en) A kind of method, apparatus, equipment and storage medium controlling gate
CN111415448A (en) Access control system, method and device and intelligent sound box
CN106586731A (en) Visitor identifying system and method and cat eye
CN112183167B (en) Attendance checking method, authentication method, living body detection method, device and equipment
Rodavia et al. Web and mobile based facial recognition security system using Eigenfaces algorithm
US10176379B1 (en) Integrating computer vision and wireless data to provide identification
KR20150087561A (en) Fire safety management and security agency system, and method therefor
CN111523348A (en) Information generation method and device and equipment for man-machine interaction
US10452963B2 (en) Arming and/or altering a home alarm system by specified positioning of everyday objects within view of a security camera
CN110858419B (en) Identity recognition method, device and equipment
CN106934264A (en) A kind of intelligent unlocking method, device and lock device
CN109583296A (en) One kind preventing error detection method, apparatus, system and computer storage medium
US20210217263A1 (en) Method and a device for authenticating a person to provide access of a premises
CN110874804B (en) Resource acquisition processing method, device and system
CN113610480A (en) Storage management system and method for electric power tools
CN112669509A (en) Access control management method, system, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant