CN110874876B - Unlocking method and device - Google Patents

Unlocking method and device Download PDF

Info

Publication number
CN110874876B
CN110874876B CN201811005716.5A CN201811005716A CN110874876B CN 110874876 B CN110874876 B CN 110874876B CN 201811005716 A CN201811005716 A CN 201811005716A CN 110874876 B CN110874876 B CN 110874876B
Authority
CN
China
Prior art keywords
data
equipment
face information
server
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811005716.5A
Other languages
Chinese (zh)
Other versions
CN110874876A (en
Inventor
陈聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811005716.5A priority Critical patent/CN110874876B/en
Publication of CN110874876A publication Critical patent/CN110874876A/en
Application granted granted Critical
Publication of CN110874876B publication Critical patent/CN110874876B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Abstract

The embodiment of the application provides an unlocking method and device, wherein the method comprises the following steps: the second equipment acquires a user characteristic image; the second equipment judges whether the user has a target operation intention or not according to the user characteristic image; the second equipment acquires first face information of a user; when the target operation intention is judged, the second equipment sends the first face information to the server; the server is used for comparing the first face information with the second face information to obtain a comparison result; sending the unlocking key data to the second equipment according to the comparison result; the second equipment adopts the unlocking key data to unlock the first equipment; in the embodiment of the application, the face unlocking function is realized on the basis of the original security system, and the living body identification based on the depth camera can effectively avoid the situation of using photos for unlocking, so that the safety of face unlocking is improved.

Description

Unlocking method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to an unlocking method and an unlocking device.
Background
The intelligent lock is different from a traditional mechanical lock and is a lock which is more intelligent in the aspects of user identification, safety and manageability. The intelligent lock is an execution component for locking a door in the access security system.
The intelligent lock can comprise a fingerprint lock, a finger vein lock and an iris recognition access control; the safety of the biological recognition lock is high, and the condition that the unlocking device is lost and damaged does not exist; but the convenience of the biometric lock configuration is not high and the cost is high; in addition, the intelligent lock can also comprise a non-contact Bluetooth lock, such as a magnetic card lock and a radio frequency card lock; the non-contact type lock has high safety, and the unlocking device made of plastic materials is convenient to configure and carry and has low price.
However, the existing bluetooth lock only supports door card unlocking or mobile phone bluetooth unlocking, the bluetooth lock does not have a network interface, and the internal logic of the bluetooth lock is closed loop, so that customization and development cannot be performed; the existing unlocking scheme of the Bluetooth lock cannot give consideration to safety, stability and convenience at the same time.
Disclosure of Invention
In view of the above, embodiments of the present application are proposed to provide an unlocking method and a corresponding unlocking device that overcome or at least partially solve the above problems.
In order to solve the above problems, the present application discloses an unlocking method, which is applied to a security system, where the security system includes a first device, a second device, and a server; the server is preset with unlocking key data and second face information, and the method comprises the following steps:
the second equipment acquires a user characteristic image;
the second equipment judges whether the user has a target operation intention or not according to the user characteristic image;
the second equipment acquires first face information of a user;
when the target operation intention is judged, the second equipment sends the first face information to the server; the server is used for comparing the first face information with the second face information to obtain a comparison result; sending the unlocking key data to the second equipment according to the comparison result;
and the second equipment adopts the unlocking key data to unlock the first equipment.
Preferably, the second device comprises a camera; the step of acquiring the user characteristic image by the second equipment comprises the following steps:
and the second equipment acquires the user characteristic image through the camera.
Preferably, the user feature image comprises depth data; the step of judging whether the user has the target operation intention or not by the second device according to the user characteristic image comprises the following steps:
the second device separating the depth data into background data and non-background data;
the second device obtaining sequence data from the non-background data;
the second device calculates speed data of each sequence data;
and when the continuous speed data in a certain time period is smaller than a preset threshold value, the second equipment determines that the user has a target operation intention.
Preferably, the sequence data comprises coordinate data and corresponding motion time data; the non-background data comprises horizontal position data; the step of the second device obtaining sequence data from the non-background data comprises:
the second equipment establishes a coordinate system by taking the position of the camera as an origin, takes the mean value of the non-background data as first coordinate data, takes the corrected horizontal position data as second coordinate data, and combines the first coordinate data and the second coordinate data into coordinate data;
the second equipment acquires motion time data corresponding to the coordinate data;
the second device combines the coordinate data and the motion time data into the sequence data.
Preferably, the step of acquiring the first face information of the user by the second device includes:
when a human face is detected, the second equipment performs living body identification operation according to the user characteristic image;
when a living body is recognized, the second device acquires first face information of a user.
Preferably, the method further comprises the following steps:
and when the second equipment receives the failure information of the unlocking key data, marking the unlocking key data as the failure key data.
In order to solve the above problem, an embodiment of the present application discloses an unlocking method, which is applied to a security system, where the security system includes a first device, a second device, and a server; second face information and unlocking key data are preset in the server; the method comprises the following steps:
when first face information of the second device is received, the server searches corresponding second face information; the second device is used for sending the first face information to the server when the target operation intention is judged to exist;
the server compares the first face information with the second face information to obtain a comparison result;
the server sends unlocking key data to the second equipment according to the comparison result; wherein the second device is further configured to unlock the first device by the unlocking key data.
Preferably, when the first face information of the second device is received, the step of the server finding the corresponding second face information further includes:
when first face information of the second device is received, the server acquires a device identifier of the second device;
and the server searches the corresponding second face information according to the equipment identifier.
Preferably, the alignment result further comprises an alignment success result; the step of sending, by the server, the unlocking key data to the second device according to the comparison result includes:
and when the comparison result is a comparison success result, the server sends the unlocking key data to the second equipment.
Preferably, the alignment result further comprises an alignment failure result; the method further comprises the following steps:
and when the comparison result is a comparison failure result, the server sends the failure information of the unlocking key data to the second equipment.
In order to solve the above problem, an embodiment of the present application discloses an unlocking device, which is applied to a security system, where the security system includes a first device, a second device, and a server; wherein, the server is preset with unlocking key data and second face information, and the device comprises:
the user characteristic image acquisition module is used for acquiring a user characteristic image by the second equipment;
the target operation intention judging module is used for judging whether the user has a target operation intention or not by the second equipment according to the user characteristic image;
the first face information acquisition module is used for acquiring first face information of the user by the second equipment;
the first face information sending module is used for sending the first face information to the server by the second equipment when the target operation intention is judged to exist; the server is used for comparing the first face information with the second face information to obtain a comparison result; sending the unlocking key data to the second equipment according to the comparison result;
and the first equipment unlocking module is used for unlocking the first equipment by the second equipment by adopting the unlocking key data.
Preferably, the second device comprises a camera; the user characteristic image acquisition module includes:
and the user characteristic image acquisition sub-module is used for acquiring the user characteristic image by the second equipment through the camera.
Preferably, the user feature image comprises depth data; the target operation intention judging module comprises:
a separation submodule for the second device to separate the depth data into background data and non-background data;
a sequence data obtaining sub-module for obtaining sequence data by the second device according to the non-background data;
a speed calculation sub-module for calculating speed data of each sequence data by the second device;
and the determining submodule is used for determining that the user has the target operation intention by the second equipment when the continuous speed data in a certain time period is smaller than a preset threshold value.
Preferably, the sequence data comprises coordinate data and corresponding motion time data; the non-background data comprises horizontal position data; the sequence data obtaining sub-module comprises:
a coordinate system establishing unit, configured to establish a coordinate system with the position of the camera as an origin, use the mean value of the non-background data as first coordinate data, use the corrected horizontal position data as second coordinate data, and combine the first coordinate data and the second coordinate data into coordinate data;
the acquisition unit is used for acquiring the motion time data corresponding to the coordinate data by the second equipment;
a combining unit for the second device to combine the coordinate data and the motion time data into the sequence data.
Preferably, the first face information acquiring module includes:
the living body identification operation sub-module is used for carrying out living body identification operation on the second equipment according to the user characteristic image when a human face is detected;
and the first face information acquisition sub-module is used for acquiring the first face information of the user by the second equipment when the living body is identified.
Preferably, the method further comprises the following steps:
and the marking module is used for marking the unlocking key data as invalid key data when the second equipment receives the invalid information of the unlocking key data.
In order to solve the above problem, an embodiment of the present application discloses an unlocking device, which is applied to a security system, where the security system includes a first device, a second device, and a server; second face information and unlocking key data are preset in the server; the device comprises:
the second face information searching module is used for searching corresponding second face information by the server when the first face information of the second equipment is received; the second device is used for sending the first face information to the server when the target operation intention is judged to exist;
a comparison result obtaining module, configured to compare the first face information with the second face information by the server to obtain a comparison result;
the unlocking key data sending module is used for sending unlocking key data to the second equipment by the server according to the comparison result; wherein the second device is further configured to unlock the first device by the unlocking key data.
Preferably, the second face information searching module includes:
the device identifier obtaining sub-module is used for obtaining the device identifier of the second device by the server when the first face information of the second device is received;
and the searching submodule is used for the server to search the corresponding second face information according to the equipment identifier.
Preferably, the alignment result further comprises an alignment success result; the unlocking key data transmission module includes:
and the unlocking key data sending submodule is used for sending the unlocking key data to the second equipment by the server when the comparison result is a successful comparison result.
Preferably, the alignment result further comprises an alignment failure result; the device further comprises:
and the failure information sending module is used for sending the failure information of the unlocking key data to the second equipment by the server when the comparison result is a comparison failure result.
In order to solve the above problem, an embodiment of the present application discloses an apparatus, including: one or more processors; and one or more machine readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform one or more of the methods of embodiments of the present application.
To address the above issues, embodiments of the present application disclose one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform one or more of the methods described in embodiments of the present application.
Compared with the background art, the embodiment of the application has the following advantages:
in the embodiment of the application, the face unlocking function is realized on the basis of the original security system, and the situation of using photos for unlocking can be effectively avoided based on the living body identification of the depth camera, so that the safety of face unlocking is improved; the problem that a user does not want to unlock and is carelessly captured and unlocked can be effectively avoided through target operation intention recognition based on the depth camera; the problem that the equipment runs when no user approaches the equipment is effectively avoided, and meanwhile, the load rate of the first equipment and the server is reduced; the identification of the target operation intention and the acquisition of the face information can be synchronously carried out, the time required by unlocking can be effectively reduced, the face detection is continuously carried out in the time period for judging the target operation intention, the probability of the captured high-quality face information can be increased, the passing rate of subsequent face comparison is increased, the overall unlocking experience is improved, and the overall overhead of the system is reduced.
Drawings
FIG. 1 is a flowchart illustrating steps of a first embodiment of an unlocking method according to the present application;
FIG. 2 is a flowchart illustrating steps of a second embodiment of an unlocking method according to the present application;
FIG. 3 is a block diagram of a first embodiment of an unlocking device according to the present application;
fig. 4 is a block diagram of a second unlocking device according to the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
An existing security system generally includes a first device, which may be a bluetooth lock, that is, the first device may be locked to a fixed facility, such as a safe, a hotel room door, etc., although the bluetooth function of an intelligent terminal (such as a mobile phone) may be used for unlocking, the unlocking experience of a user is always poor due to the forgetting of the user and the single unlocking mode;
based on this, one of the core concepts of the embodiment of the present application is provided, and a second device is added to the original security system (the first device, the server, or the separate first device); the second device may include a camera that may output depth data, perform face detection of a user based on the camera, and also perform intention recognition, liveness detection, and the like based on the depth data.
The face unlocking function is added to the original security system, so that the unlocking device can be unlocked even if a user forgets to unlock the device, a multi-element unlocking scheme is provided, and the unlocking experience of the user is improved.
Referring to fig. 1, a flowchart of a first step of an unlocking method of an embodiment of the present application is shown, and is applied to a security system, where the security system includes a first device, a second device, and a server; the server is preset with unlocking key data and second face information, and the method specifically includes the following steps:
step 101, the second equipment acquires a user characteristic image;
it should be noted that the security system may be a system that prevents unauthorized users from entering a facility; the security system may include a first device, a second device, and a server.
The first device may be a lock device, such as a bluetooth lock, a fingerprint lock, an electronic coded lock, and the like, which is not limited in the embodiment of the present application; further, the second device may comprise a mobile terminal, such as a mobile phone, a tablet computer, a personal digital assistant, a wearable device (such as glasses, a watch, etc.), and so on.
In the embodiment of the present application, the operating system of the mobile terminal may include Android (Android), IOS, Windows Phone, Windows, and the like.
In practical application to the embodiment of the present application, the second device may include a camera, and the camera may include a depth camera, and the depth camera may be used for face detection, target operation intention recognition, living body detection, or the like, which is not limited by the embodiment of the present application.
The second equipment can acquire a user characteristic image through the camera; the user characteristic image may include depth data or the like, and the second device may perform target operation intention recognition and living body detection by the depth data. In addition, the user feature image may further include image data including a face of the user, which is not limited in this embodiment of the application.
The connection mode between the first device and the second device may include a wireless connection or a wired connection, for example, when the first device is a bluetooth lock, the first device and the second device may be connected through respective bluetooth components; in addition, the first device and the second device may also be connected through other wireless connection manners, for example, through respective NFC (Near Field Communication ) components, which is not limited in this embodiment of the application.
The wired connection between the first device and the second device means that the first device and the second device are connected through a communication cable, so that the data transmission is more reliable and the stability is higher.
The server can be respectively connected with the first equipment and the second equipment, and second face information and unlocking key data can be preset in the server; it should be noted that, when the security system has a plurality of second devices and the number of the first devices, the server may preset second face information and unlocking key data corresponding to each first device, and the second device may unlock the corresponding first device through the unlocking key data;
in practical application to the embodiment of the present application, the unlocking key data may include a device identifier, binary key data, and may further include user information, and the like, which is not limited in the embodiment of the present application.
In a preferred embodiment of the present application, the security system may further include a third device, where the third device may be configured to unlock the first device after receiving the unlocking key data, and the third device may be a portable mobile terminal, which is convenient for a user to carry and provides multiple unlocking modes.
102, the second equipment judges whether the user has a target operation intention according to the user characteristic image;
in the embodiment of the application, the second device can judge whether the user has a target operation intention according to the user characteristic image; the user characteristic image comprises depth data, and whether a user has a target operation intention is judged through the depth data; the target operation intention may include an unlocking intention, a door opening intention, and the like.
In particular, the user feature image may include depth data; the step of judging whether the user has the target operation intention or not by the second equipment according to the user characteristic image comprises the following substeps:
substep S11, the second device separating the depth data into background data and non-background data;
a substep S12, the second device obtaining sequence data from the non-background data;
a substep S13 of calculating, by the second device, velocity data of each sequence data;
and a substep S14, determining that the user has the target operation intention when the continuous speed data in a certain time period is less than the preset threshold value.
In the embodiment of the application, the depth data is firstly separated into background data and non-background data, the non-background data is data containing a user image, the non-background data is further processed, specifically, a coordinate system is established, the non-background data is processed into coordinate data, and the coordinate data and corresponding motion time data are combined into sequence data.
In the embodiment of the application, the second device calculates the speed data of each sequence data; and when the continuous speed data in a certain time period is smaller than a preset threshold value, the second equipment determines that the user has a target operation intention.
In a preferred embodiment of the present application, the sequence data includes coordinate data and corresponding motion time data; the non-background data comprises horizontal position data; the step of the second device obtaining sequence data from the non-background data comprises the sub-steps of:
in the substep S21, the second device establishes a coordinate system with the position of the camera as an origin, uses the mean value of the non-background data as first coordinate data, uses the corrected horizontal position data as second coordinate data, and combines the first coordinate data and the second coordinate data into coordinate data;
in the substep S22, the second device acquires motion time data corresponding to the coordinate data;
sub-step S23, the second apparatus combines the coordinate data and the motion time data into the sequence data.
The position of the camera is taken as an origin, the mean value of the non-background data is taken as first coordinate data, the corrected horizontal position data is taken as second coordinate data, and the first coordinate data and the second coordinate data are combined into coordinate data.
And after the coordinate data are obtained, combining the coordinate data and the corresponding motion time data into the sequence data.
103, the second device acquires first face information of a user;
further applied to the embodiment of the application, the second device may further obtain the first face information of the user, that is, the first face information of the user is obtained by performing face detection through the camera; wherein the first face information may include a plurality of face features.
It should be noted that, steps 103 and 102 may be executed synchronously or asynchronously, that is, the operation of face detection and the operation of determining the target operation intention may be executed synchronously or asynchronously, which is not limited in this embodiment of the application.
In a preferred embodiment of the present application, the step of acquiring, by the second device, first facial information of a user includes: when a human face is detected, the second equipment performs living body identification operation according to the user characteristic image; when a living body is recognized, the second device acquires first face information of a user.
In the embodiment of the application, before the first face information of the user is acquired, living body identification operation can be performed according to the user characteristic image, and unlocking safety is further improved.
Specifically, the second device may perform a living body recognition operation based on the depth data in the user feature image, for example, by extracting three-dimensional information of a plurality of feature points of a face region and a non-face region, and performing initial analysis processing on a geometric relationship between the features;
secondly, extracting three-dimensional information of the whole face area, further processing corresponding feature points, training positive and negative sample data by adopting a Co-training method, and then carrying out primary classification by using an obtained classifier;
and finally, performing surface fitting by using the feature points extracted in the two steps to describe the characteristics of the three-dimensional model, extracting convex regions from the depth image according to the curvature of the surface, extracting the characteristics of EGI (Extended Gaussian Images) in each region, and finally performing reclassification identification by using the spherical correlation degree.
And shooting a face by using a depth camera to obtain 3D data of a corresponding face area, further analyzing the data, selecting the features with the highest discrimination to train a classifier, and performing living body recognition operation by using the trained classifier.
Of course, the above-mentioned method for performing the living body identification operation is only an example of the embodiment of the present application, and the living body identification may be performed in other methods, which is not limited by the embodiment of the present application.
104, when the target operation intention is judged, the second equipment sends the first face information to the server; the server is used for comparing the first face information with the second face information to obtain a comparison result; sending the unlocking key data to the second equipment according to the comparison result;
in practical application to the embodiment of the application, when the second device determines that the user has the target operation intention, the first face information is sent to the server.
It should be noted that, after receiving the first face information, the server compares the first face information with the preset second face information to obtain a comparison result, and the server may further send the unlocking key data to the second device according to the comparison result.
And 105, the second device unlocks the first device by adopting the unlocking key data.
Specifically, in this embodiment, the second device sends the unlocking key data to the first device, and the first device verifies the unlocking key data and the preset key data, and if the unlocking key data and the preset key data are consistent, the first device is unlocked.
In a preferred embodiment of the present application, the method further includes: and when the second equipment receives the failure information of the unlocking key data, marking the unlocking key data as the failure key data.
In addition, when the face comparison result is a comparison failure result, the server may further send invalidation information of the unlocking key data to the second device, and the second device marks the unlocking key data as invalidation key data.
In the embodiment of the application, the face unlocking function is realized on the basis of the original security system, and living body identification based on the depth camera can effectively avoid the situation of using photos for unlocking, so that the safety of face unlocking is improved; the problem that a user does not want to unlock and is carelessly captured and unlocked can be effectively avoided through target operation intention recognition based on the depth camera; the problem that the equipment runs when no user approaches the equipment is effectively avoided, and meanwhile, the load rate of the first equipment and the server is reduced; the identification of the target operation intention and the acquisition of the face information can be synchronously carried out, the time required by unlocking can be effectively reduced, the face detection is continuously carried out in the time period for judging the target operation intention, the probability of the captured high-quality face information can be increased, the passing rate of subsequent face comparison is increased, the overall unlocking experience is improved, and the overall overhead of the system is reduced.
Referring to fig. 2, a flowchart of steps of a second embodiment of an unlocking method according to the present application is shown, and the second embodiment of the unlocking method is applied to a security system, where the security system includes a first device, a second device, and a server; second face information and unlocking key data are preset in the server; the method specifically comprises the following steps:
step 201, when first face information of the second device is received, the server finds corresponding second face information; the second device is used for sending the first face information to the server when the target operation intention is judged to exist;
it should be noted that the server includes preset second face information and unlocking key data, and further, may preset an equipment identifier of the second equipment; that is, the server may include a plurality of mapping tables, for example, a mapping table including a mapping relationship between the second face information and the second device identifier, a mapping table including a mapping relationship between the second face information and the unlocking key data, a mapping table including a mapping relationship between the first device identifier and the unlocking key data, and the like, which is not limited in the embodiment of the present application.
In a preferred embodiment of the present application, when receiving the first face information of the second device, the step of the server finding the corresponding second face information further includes: when first face information of the second device is received, the server acquires a device identifier of the second device; and the server searches the corresponding second face information according to the equipment identifier.
After the server obtains the device identifier of the second device, the server searches preset second face information according to the mapping relation and the device identifier, and compares the second face information with the first face information.
Step 202, the server compares the first face information with the second face information to obtain a comparison result;
further, the server compares the first face information with the second face information to obtain a comparison result; specifically, the face features of the first face information may be compared with the face features of the second face information to obtain a comparison result.
Step 203, the server sends unlocking key data to the second device according to the comparison result; wherein the second device is further configured to unlock the first device by the unlocking key data.
Specifically, the comparison result may include a comparison success result or a comparison failure result; and when the comparison result is a comparison success result, the server sends the unlocking key data to the second equipment.
In a preferred embodiment of the embodiments of the present application, the method further includes: and when the comparison result is a comparison failure result, the server sends the failure information of the unlocking key data to the second equipment.
In the embodiment of the application, the server can send unlocking key data after comparing the face information, so that unlocking safety is improved, a multi-element unlocking mode is provided, load of a server is reduced, and success rate of face comparison is increased.
In order to make the embodiments of the present application better understood by those skilled in the art, the following description is given by way of a specific example:
first device (bluetooth lock): the hotel lock equipment is produced by a three-party manufacturer and has room card unlocking and mobile phone Bluetooth unlocking capabilities.
The Server comprises a CheckIn Server, a CheckOut Server, a LockServer (partner) Local, a face recognition Server or a LockServer and the like;
CheckIn Server: the cloud server for realizing the CheckIn function of the hotel user and a related service system on the cloud server.
CheckOut Server: and the cloud server for realizing the CheckOut function of the hotel user and a related service system on the cloud server.
LockServer (partner) Local: the service system is provided by a three-party Bluetooth lock manufacturer, is deployed in the local hotel and is related to the door lock function, and the server is borne. lockServer (partner) Remote: systems deployed on vendor private clouds, provided by three-party bluetooth lock vendors, provide lock (i.e., bluetooth lock) related functionality to the lockserver (partner) Local, the vendor-provided client bluetooth unlock SDK, and the hotel system.
The lockServer is a cloud server for realizing the related functions of the door lock and the key of the hotel user and a related service system on the cloud server, and the core function directly related to the door lock is realized by calling the two systems.
Second apparatus (door front apparatus): a electronic equipment for putting in front of hotel room door carries on tall and erect system to contain bluetooth module, this second equipment can include the degree of depth camera.
LockApp: the application installed on the door front device integrates the unlocking SDK of a three-party Bluetooth lock manufacturer and other SDKs self-developed by a hotel in the application, and is core software for completing face unlocking.
The depth camera: and the camera can also output the depth information corresponding to the image on the basis of the function of the traditional camera.
The method is mainly described in four points of hardware design, a CheckIn flow, a face unlocking flow and a CheckOut flow of the door front equipment.
In the first part, in the hardware design of the door front equipment, each guest room is provided with 1 of the following hardware: bluetooth lock: the bluetooth lock of a common three-party manufacturer is used and placed at a normal position on a door. A camera: the depth camera of the three-party manufacturer is placed at a position 1.5m high away from the ground, and can output depth data besides RGB data, so that living body detection and unlocking intention identification are facilitated. Door front equipment: the method comprises the following steps that equipment of an android system is arranged near a room door, and a LockApp with Bluetooth unlocking capability is integrated to solve the problem that a three-party Bluetooth lock cannot support face unlocking; the door front equipment can be replaced by other operating systems such as iOS, Linux, Windows and the like, and the key point is that the Bluetooth unlocking SDK of the client side provided by a three-party door lock manufacturer can be matched.
Second part, CheckIn flow: after the normal CheckIn process is finished, the CheckIn Server calls a relevant interface of the LockServer to apply for preparing a mobile phone (third device) bluetooth key and a human face unlocking key for the user. After the LockServer processes the logic related to the hotel, it calls LockServer (partner) -Local to transmit the device IDs of the user's mobile phone and the door equipment, and then simultaneously issues the Bluetooth key to the user's mobile phone and the door equipment. Wherein, the bluetooth key contains: binary key data and time of day, room number, order number, user information, etc.;
the third part is a face unlocking process: under a general state, the lockApp on the door front equipment only reads the depth data of the depth camera in real time and analyzes the depth data in real time to judge whether a user enters a space in front of the door. When the lockApp identifies that a user enters, the RGB and the depth data of the depth camera can be read in real time, and two parallel processing flows are started:
1. and identifying unlocking intention: and analyzing whether the object in front of the door has the intention of unlocking or not based on the motion characteristics of the object in front of the door generated by the real-time depth data.
Specifically, separation into background and non-background based on depth data (hotel aisle depth as threshold); and (4) assuming the separated non-background data as door object depth data, (establishing a coordinate system by taking a camera as an origin of the coordinate system, taking the door front direction as a y axis and taking the direction parallel to the door as an x axis). The mean value Of the depth numbers is a value Of y (second coordinate data), a depth FOV (Field Of View) correction is added to the data Of the horizontal position Of the image (i.e., horizontal position data), and the value is calculated as a value Of x (first coordinate data), thereby calculating the coordinates Of the door front object, and further, the value has sequence data (coordinate data and motion time data) Of the motion Of the door front object; calculating a velocity for each data based on the sequence data; and when the continuous speed data in a certain time period is smaller than a preset threshold value, determining that the user has the unlocking intention.
2. Local face detection: and the second equipment carries out face detection, carries out living body identification based on depth data after the face is detected, and caches corresponding first face information in the unlocking period. And when the unlocking intention is successfully identified, the lockApp sends the cached first face information and the equipment ID of the lockApp to a face identification server for face comparison. The face recognition server can search the room number through the equipment ID, further search second face information authorized by the check-in user, further perform face comparison, check the security model of hotel self-research after the comparison is completed, and return a result of face comparison success to the LockApp when the conditions are met, otherwise return a result of failure. And after receiving the successful return of the face recognition server, the lockApp calls a Bluetooth unlocking interface of the client SDK of the three-party Bluetooth lock, and then completes Bluetooth unlocking, namely door opening operation.
Fourth, the CheckOut flow: after the normal CheckOut process is finished, the CheckOut Server calls an interface of a LockServer to apply for a mobile phone Bluetooth key and a face unlocking key of a disabled user. After the LockServer processes the logic related to the hotel, the LockServer (partner) -Local is called, and the device IDs of the user mobile phone and the door equipment are transmitted, so that the Bluetooth keys are disabled for the user mobile phone and the door equipment at the same time.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 3, a block diagram of a first unlocking device of an embodiment of the present application is shown, and the first unlocking device is applied to a security system, where the security system includes a first device, a second device, and a server; the server is preset with unlocking key data and second face information, and specifically may include the following modules:
a user characteristic image obtaining module 301, configured to obtain a user characteristic image by the second device;
a target operation intention determining module 302, configured to determine, by the second device, whether the user has a target operation intention according to the user feature image;
a first facial information obtaining module 303, configured to obtain, by the second device, first facial information of a user;
a first facial information sending module 304, configured to, when it is determined that there is a target operation intention, send the first facial information to the server by the second device; the server is used for comparing the first face information with the second face information to obtain a comparison result; sending the unlocking key data to the second equipment according to the comparison result;
a first device unlocking module 305, configured to unlock the first device by the second device using the unlocking key data.
Preferably, the second device comprises a camera; the user characteristic image acquisition module includes:
and the user characteristic image acquisition sub-module is used for acquiring the user characteristic image by the second equipment through the camera.
Preferably, the user feature image comprises depth data; the target operation intention judging module comprises:
a separation submodule for the second device to separate the depth data into background data and non-background data;
a sequence data obtaining sub-module for obtaining sequence data by the second device according to the non-background data;
a speed calculation sub-module for calculating speed data of each sequence data by the second device;
and the determining submodule is used for determining that the user has a target operation intention by the second equipment when the continuous speed data in a certain time period is smaller than a preset threshold value.
Preferably, the sequence data comprises coordinate data and corresponding motion time data; the non-background data comprises horizontal position data; the sequence data obtaining sub-module comprises:
a coordinate system establishing unit, configured to establish a coordinate system with the position of the camera as an origin, use the mean value of the non-background data as first coordinate data, use the corrected horizontal position data as second coordinate data, and combine the first coordinate data and the second coordinate data into coordinate data;
the acquisition unit is used for acquiring the motion time data corresponding to the coordinate data by the second equipment;
a combining unit for the second device to combine the coordinate data and the motion time data into the sequence data.
Preferably, the first face information acquiring module includes:
the living body identification operation sub-module is used for carrying out living body identification operation on the second equipment according to the user characteristic image when a human face is detected;
and the first face information acquisition sub-module is used for acquiring the first face information of the user by the second equipment when the living body is identified.
Preferably, the method further comprises the following steps:
and the marking module is used for marking the unlocking key data as invalid key data when the second equipment receives the invalid information of the unlocking key data.
Referring to fig. 4, a block diagram of a second embodiment of an unlocking device in the present application is shown, and the second embodiment of the present application is applied to a security system, where the security system includes a first device, a second device, and a server; second face information and unlocking key data are preset in the server; the method specifically comprises the following modules:
a second face information search module 401, configured to, when first face information of the second device is received, search, by the server, corresponding second face information; the second device is used for sending the first face information to the server when the target operation intention is judged to exist;
a comparison result obtaining module 402, configured to compare the first face information with the second face information by the server, to obtain a comparison result;
an unlocking key data sending module 403, configured to send, by the server, unlocking key data to the second device according to the comparison result; wherein the second device is further configured to unlock the first device by the unlocking key data.
Preferably, the second face information searching module includes:
the device identifier obtaining sub-module is used for obtaining the device identifier of the second device by the server when the first face information of the second device is received;
and the searching submodule is used for the server to search the corresponding second face information according to the equipment identifier.
Preferably, the alignment result further comprises an alignment success result; the unlocking key data transmission module includes:
and the unlocking key data sending submodule is used for sending the unlocking key data to the second equipment by the server when the comparison result is a successful comparison result.
Preferably, the alignment result further comprises an alignment failure result; the device further comprises:
and the failure information sending module is used for sending the failure information of the unlocking key data to the second equipment by the server when the comparison result is a comparison failure result.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
An embodiment of the present application further provides an apparatus, including: one or more processors; and one or more machine readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform one or more of the methods of example 1 and/or example 2.
Embodiments of the application also provide one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an apparatus to perform one or more of the methods described in embodiments 1 and/or 2.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In a typical configuration, the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (fransitory media), such as modulated data signals and carrier waves.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The above detailed description is given to an unlocking method and an unlocking device provided by the present application, and specific examples are applied herein to explain the principle and the implementation of the present application, and the description of the above embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (22)

1. An unlocking method is characterized by being applied to a security system, wherein the security system comprises a first device, a second device and a server; the server is preset with unlocking key data and second face information, and the method comprises the following steps:
the second equipment acquires a user characteristic image;
the second equipment judges whether the user has a target operation intention or not according to the user characteristic image;
the second equipment acquires first face information of a user;
when the target operation intention is judged, the second equipment sends the first face information to the server; the server is used for comparing the first face information with the second face information to obtain a comparison result; sending the unlocking key data to the second equipment according to the comparison result;
the second equipment adopts the unlocking key data to unlock the first equipment;
wherein the user feature image comprises depth data comprising non-background data; determining the target operation intention when the continuous speed data of the sequence data is smaller than a preset threshold value; the sequence data is obtained by combining coordinate data and corresponding motion time data, and the coordinate data is determined by the non-background data.
2. The method of claim 1, wherein the second device comprises a camera; the step of acquiring the user characteristic image by the second device comprises the following steps:
and the second equipment acquires the user characteristic image through the camera.
3. The method according to claim 1 or 2, wherein the step of the second device judging whether the user has the target operation intention according to the user characteristic image comprises the following steps:
the second device separating the depth data into background data and non-background data;
the second device obtaining sequence data from the non-background data;
the second device calculates speed data of each sequence data;
and when the continuous speed data in a certain time period is smaller than a preset threshold value, the second equipment determines that the user has a target operation intention.
4. The method of claim 3, wherein the sequence data includes coordinate data and corresponding motion time data; the non-background data comprises horizontal position data; the step of the second device obtaining sequence data from the non-background data comprises:
the second equipment establishes a coordinate system by taking the position of the camera as an origin, takes the mean value of the non-background data as first coordinate data, takes the corrected horizontal position data as second coordinate data, and combines the first coordinate data and the second coordinate data into coordinate data;
the second equipment acquires motion time data corresponding to the coordinate data;
the second device combines the coordinate data and the motion time data into the sequence data.
5. The method according to claim 1 or 2, wherein the step of the second device acquiring the first face information of the user comprises:
when a human face is detected, the second equipment performs living body identification operation according to the user characteristic image;
when a living body is recognized, the second device acquires first face information of a user.
6. The method of claim 1 or 2, further comprising:
and when the second equipment receives the failure information of the unlocking key data, marking the unlocking key data as the failure key data.
7. An unlocking method is characterized by being applied to a security system, wherein the security system comprises a first device, a second device and a server; second face information and unlocking key data are preset in the server; the method comprises the following steps:
when first face information of the second device is received, the server searches corresponding second face information; the second device is used for sending the first face information to the server when the target operation intention is judged to exist;
the server compares the first face information with the second face information to obtain a comparison result;
the server sends unlocking key data to the second equipment according to the comparison result; wherein the second device is further configured to unlock the first device by the unlocking key data;
the second device is further configured to obtain a user feature image, where the user feature image includes depth data, and the depth data includes non-background data; determining the target operation intention when the continuous speed data of the sequence data is smaller than a preset threshold value; the sequence data is obtained by combining coordinate data and corresponding motion time data, and the coordinate data is determined by the non-background data.
8. The method according to claim 7, wherein the step of the server finding the corresponding second face information when receiving the first face information of the second device further comprises:
when first face information of the second device is received, the server acquires a device identifier of the second device;
and the server searches corresponding second face information according to the equipment identification.
9. The method of claim 7 or 8, wherein the alignment result further comprises an alignment success result; the step of sending, by the server, the unlocking key data to the second device according to the comparison result includes:
and when the comparison result is a comparison success result, the server sends the unlocking key data to the second equipment.
10. The method of claim 7 or 8, wherein the alignment results further comprise alignment failure results; the method further comprises the following steps:
and when the comparison result is a comparison failure result, the server sends the failure information of the unlocking key data to the second equipment.
11. An unlocking device is characterized by being applied to a security system, wherein the security system comprises a first device, a second device and a server; wherein, the server is preset with unlocking key data and second face information, and the device comprises:
the user characteristic image acquisition module is used for acquiring a user characteristic image by the second equipment;
the target operation intention judging module is used for judging whether the user has a target operation intention or not by the second equipment according to the user characteristic image;
the first face information acquisition module is used for acquiring first face information of a user by the second equipment;
the first face information sending module is used for sending the first face information to the server by the second equipment when the target operation intention is judged to exist; the server is used for comparing the first face information with the second face information to obtain a comparison result; sending the unlocking key data to the second equipment according to the comparison result;
the first equipment unlocking module is used for the second equipment to unlock the first equipment by adopting the unlocking key data;
wherein the user feature image comprises depth data comprising non-background data; determining the target operation intention when the continuous speed data of the sequence data is smaller than a preset threshold value; the sequence data is obtained by combining coordinate data and corresponding motion time data, and the coordinate data is determined by the non-background data.
12. The apparatus of claim 11, wherein the second device comprises a camera; the user characteristic image acquisition module includes:
and the user characteristic image acquisition sub-module is used for acquiring the user characteristic image by the second equipment through the camera.
13. The apparatus according to claim 11 or 12, wherein the target operation intention determining module comprises:
a separation submodule for the second device to separate the depth data into background data and non-background data;
a sequence data obtaining sub-module for obtaining sequence data by the second device according to the non-background data;
a speed calculation sub-module for calculating speed data of each sequence data by the second device;
and the determining submodule is used for determining that the user has the target operation intention by the second equipment when the continuous speed data in a certain time period is smaller than a preset threshold value.
14. The apparatus of claim 13, wherein the sequence data comprises coordinate data and corresponding motion time data; the non-background data comprises horizontal position data; the sequence data obtaining sub-module comprises:
a coordinate system establishing unit, configured to establish a coordinate system with the position of the camera as an origin, use the mean value of the non-background data as first coordinate data, use the corrected horizontal position data as second coordinate data, and combine the first coordinate data and the second coordinate data into coordinate data;
the acquisition unit is used for acquiring the motion time data corresponding to the coordinate data by the second equipment;
a combining unit for the second device to combine the coordinate data and the motion time data into the sequence data.
15. The apparatus according to claim 11 or 12, wherein the first facial information acquiring module includes:
the living body identification operation sub-module is used for carrying out living body identification operation on the second equipment according to the user characteristic image when a human face is detected;
and the first face information acquisition sub-module is used for acquiring the first face information of the user by the second equipment when the living body is identified.
16. The apparatus of claim 11 or 12, further comprising:
and the marking module is used for marking the unlocking key data as invalid key data when the second equipment receives the invalid information of the unlocking key data.
17. An unlocking device is characterized by being applied to a security system, wherein the security system comprises a first device, a second device and a server; second face information and unlocking key data are preset in the server; the device comprises:
the second face information searching module is used for searching corresponding second face information by the server when the first face information of the second equipment is received; the second device is used for sending the first face information to the server when the target operation intention is judged to exist;
a comparison result obtaining module, configured to compare the first face information with the second face information by the server to obtain a comparison result;
the unlocking key data sending module is used for sending unlocking key data to the second equipment by the server according to the comparison result; wherein the second device is further configured to unlock the first device by the unlocking key data;
the second device is further configured to obtain a user feature image, where the user feature image includes depth data, and the depth data includes non-background data; determining the target operation intention when the continuous speed data of the sequence data is smaller than a preset threshold value; the sequence data is obtained by combining coordinate data and corresponding motion time data, and the coordinate data is determined by the non-background data.
18. The apparatus of claim 17, wherein the second face information lookup module comprises:
the device identifier obtaining sub-module is used for obtaining the device identifier of the second device by the server when the first face information of the second device is received;
and the searching submodule is used for the server to search the corresponding second face information according to the equipment identifier.
19. The apparatus of claim 17 or 18, wherein the alignment result further comprises an alignment success result; the unlocking key data transmission module includes:
and the unlocking key data sending submodule is used for sending the unlocking key data to the second equipment by the server when the comparison result is a comparison success result.
20. The apparatus of claim 17 or 18, wherein the alignment results further comprise an alignment failure result; the device further comprises:
and the failure information sending module is used for sending the failure information of the unlocking key data to the second equipment by the server when the comparison result is a comparison failure result.
21. A terminal device, comprising: one or more processors; and one or more machine readable media having instructions stored thereon, which when executed by the one or more processors, cause the processors to perform the method of one or more of claims 1-10.
22. One or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the method of one or more of claims 1-10.
CN201811005716.5A 2018-08-30 2018-08-30 Unlocking method and device Active CN110874876B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811005716.5A CN110874876B (en) 2018-08-30 2018-08-30 Unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811005716.5A CN110874876B (en) 2018-08-30 2018-08-30 Unlocking method and device

Publications (2)

Publication Number Publication Date
CN110874876A CN110874876A (en) 2020-03-10
CN110874876B true CN110874876B (en) 2022-07-05

Family

ID=69715662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811005716.5A Active CN110874876B (en) 2018-08-30 2018-08-30 Unlocking method and device

Country Status (1)

Country Link
CN (1) CN110874876B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112509198A (en) * 2020-12-24 2021-03-16 上海风骑信息科技有限公司 Linux and android dual-system infrared temperature measurement face recognition access control system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100740809B1 (en) * 2006-05-11 2007-07-19 장종복 Free hinge for opening and closing a door
CN103927802A (en) * 2014-04-18 2014-07-16 深圳市威富安防有限公司 Door lock control method and system
JP2015220484A (en) * 2014-05-14 2015-12-07 株式会社東海理化電機製作所 Remote operation system
CN105913528A (en) * 2016-05-25 2016-08-31 腾讯科技(深圳)有限公司 Method and device for processing access control data, method and device for access control
CN107657218A (en) * 2017-09-12 2018-02-02 广东欧珀移动通信有限公司 Face identification method and Related product

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258208A (en) * 2013-05-10 2013-08-21 杭州电子科技大学 Method for distinguishing whether head has intentions or not based on vision
CN106033601B (en) * 2015-03-09 2019-01-18 株式会社理光 The method and apparatus for detecting abnormal case
JP6068694B1 (en) * 2016-01-13 2017-01-25 東芝エレベータ株式会社 Elevator boarding detection system
CN107729866A (en) * 2017-10-31 2018-02-23 武汉理工大学 Ship based on timing diagram picture touches mark automatic detection device and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100740809B1 (en) * 2006-05-11 2007-07-19 장종복 Free hinge for opening and closing a door
CN103927802A (en) * 2014-04-18 2014-07-16 深圳市威富安防有限公司 Door lock control method and system
JP2015220484A (en) * 2014-05-14 2015-12-07 株式会社東海理化電機製作所 Remote operation system
CN105913528A (en) * 2016-05-25 2016-08-31 腾讯科技(深圳)有限公司 Method and device for processing access control data, method and device for access control
CN107657218A (en) * 2017-09-12 2018-02-02 广东欧珀移动通信有限公司 Face identification method and Related product

Also Published As

Publication number Publication date
CN110874876A (en) 2020-03-10

Similar Documents

Publication Publication Date Title
KR101997371B1 (en) Identity authentication method and apparatus, terminal and server
AU2019203766B2 (en) System and method for biometric authentication in connection with camera-equipped devices
RU2589344C2 (en) Method, apparatus and system of authentication based on biological characteristics
US20170262472A1 (en) Systems and methods for recognition of faces e.g. from mobile-device-generated images of faces
US20190102531A1 (en) Identity authentication method and apparatus
CN105590097B (en) Dual camera collaboration real-time face identification security system and method under the conditions of noctovision
US9607138B1 (en) User authentication and verification through video analysis
US10943095B2 (en) Methods and systems for matching extracted feature descriptors for enhanced face recognition
US9082235B2 (en) Using facial data for device authentication or subject identification
TW202016781A (en) Smart lock unlocking method, mobile terminal, server, and readable storage medium
CN103434484A (en) Vehicle-mounted identification and authentication device, mobile terminal and intelligent vehicle key control system and method
KR101724971B1 (en) System for recognizing face using wide angle camera and method for recognizing face thereof
Kurkovsky et al. Experiments with simple iris recognition for mobile phones
EP3594879A1 (en) System and method for authenticating transactions from a mobile device
CN115830670A (en) Electronic device with face recognition function
US10733857B1 (en) Automatic alteration of the storage duration of a video
EP3341916A1 (en) System and method for in motion identification
US20170300685A1 (en) Method and system for visual authentication
CN110874876B (en) Unlocking method and device
JP2015041307A (en) Collation device and collation method and collation system and computer program
KR101718244B1 (en) Apparatus and method of processing wide angle image for recognizing face
CN113065507B (en) Method and device for realizing face authentication
CN112183167A (en) Attendance checking method, authentication method, living body detection method, device and equipment
Sankar et al. Intelligent Door Assist system using Chatbot and Facial Recognition
TW201602920A (en) Biometric recognition system, recognition method, storage medium and biometric recognition processing chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant