CN111209769A - Identity authentication system and method, electronic device, and storage medium - Google Patents

Identity authentication system and method, electronic device, and storage medium Download PDF

Info

Publication number
CN111209769A
CN111209769A CN201811312207.7A CN201811312207A CN111209769A CN 111209769 A CN111209769 A CN 111209769A CN 201811312207 A CN201811312207 A CN 201811312207A CN 111209769 A CN111209769 A CN 111209769A
Authority
CN
China
Prior art keywords
target object
access control
information
database
reference image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811312207.7A
Other languages
Chinese (zh)
Other versions
CN111209769B (en
Inventor
徐宇博
钟敏欣
张广程
王晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN201811312207.7A priority Critical patent/CN111209769B/en
Publication of CN111209769A publication Critical patent/CN111209769A/en
Application granted granted Critical
Publication of CN111209769B publication Critical patent/CN111209769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items

Landscapes

  • Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The present disclosure relates to an authentication system and method, an electronic device, and a storage medium, the system including: the system comprises acquisition equipment, a database, front-end equipment and a terminal, wherein the front-end equipment is configured to: according to the second video stream, storing a visit record of a target object entering through the access control equipment in an access control database; and detecting a first object image having a first target object from the first video stream; according to the first object image and the reference image information, performing identity authentication on the first target object to obtain a first identity authentication result; generating prompt information according to at least one of the first identity verification result and the access control database; and sending prompt information to the terminal. According to the embodiment of the disclosure, security loopholes of persons who illegally enter the access control equipment can be made up, a prompt can be given for a first target object which illegally enters the access control equipment, and security strength is improved.

Description

Identity authentication system and method, electronic device, and storage medium
Technical Field
The present disclosure relates to the field of security technologies, and in particular, to an authentication system and method, an electronic device, and a storage medium.
Background
With the enhancement of safety management consciousness of governments, enterprises and individuals and the popularization of security equipment, more and more novel identity verification equipment is put into practical application, for example, technologies such as face recognition can be applied to access control equipment. However, in practical applications, there may be a case where the entrance guard device is illegally intruded, for example, a security hole exists when a person who passes through the entrance guard device legally passes through the entrance guard device.
Disclosure of Invention
The present disclosure provides an identity authentication system and method, an electronic device, and a storage medium.
According to an aspect of the present disclosure, there is provided an authentication system including:
the system comprises acquisition equipment and a monitoring device, wherein the acquisition equipment comprises one or more first cameras and one or more second cameras, the first cameras are used for acquiring a first video stream of a monitoring area, and the second cameras are used for acquiring a second video stream at the position of access control equipment;
the database comprises a reference image database used for storing one or more pieces of reference image information and an access control database used for storing the visit record of the target object through the access control equipment;
a front-end device connected to the capturing device for receiving the first video stream and the second video stream from the capturing device and connected to the database for invoking at least one of the reference image information and the visit record,
wherein the front-end device is configured to:
according to the second video stream, storing an access record of a target object accessed through the access control equipment in the access control database; and
detecting a first object image having a first target object from the first video stream;
according to the first object image and the reference image information, performing identity authentication on the first target object to obtain a first identity authentication result;
generating prompt information according to the first identity verification result and at least one of the access control databases;
sending the prompt information to a terminal;
and the terminal is connected to the front-end equipment and used for receiving the prompt information and displaying a prompt corresponding to the prompt information.
According to the identity verification system disclosed by the embodiment of the disclosure, the front-end equipment can detect the first object image in the video stream acquired by one or more cameras, carry out identity verification on the first object image, generate prompt information if the identity verification fails or the visit record of the first object passing through the access control equipment does not exist, make up security loopholes of persons illegally entering the access control equipment, prompt the first object illegally entering the access control equipment, and improve security.
In one possible implementation, the front-end device is further configured to:
according to the second video stream and the reference image information, performing identity authentication on a second target object to obtain a second identity authentication result, wherein the second target object is any one target object at the access control equipment;
generating a release command to control the access control device to allow the second target object to enter through the access control device under the condition that the second identity authentication result is passed;
and storing a second target object in the access control database through the access record of the access control equipment.
In one possible implementation, the front-end device is further configured to:
determining whether reference image information matched with a first target object exists in the reference image database according to the characteristic information of the first target object in the first object image;
and determining that the identity verification result is failed in the case that the reference image information matched with the first target object does not exist in the reference image database.
In one possible implementation, the front-end device is further configured to:
and under the condition that the second camera detects that the second target object leaves through the access control equipment, deleting the visit record of the second target object passing through the access control equipment from the access control database.
By the method, the visit record of the second target object can be recorded, and the visit record is deleted when the second target object leaves, so that the second target object enters the access control equipment at each time, the identity of the second target object needs to be verified, the visit record is saved for verification, and the security protection degree is improved.
In one possible implementation, the hint information includes at least one of location information and time information of the first target object,
the front-end device is further configured to perform at least one of the following steps:
determining the position information of the first target object according to a monitoring area of a camera for collecting the first object image;
and determining the time information of the first target object according to the time stamp of the first object image.
By the mode, the activity route and the activity area of the target object can be determined through the position information and/or the time information, and the security protection strength is improved.
In one possible implementation, the front-end device is further configured to:
and starting a first camera of an adjacent area of a monitoring area where the first target object is located according to the position information of the first target object.
In one possible implementation, the front-end device is further configured to:
and determining the activity track of the first target object according to the time information and the position information of the first target object.
Through this kind of mode, the activity orbit of first target object can be drawn automatically to accessible time information and positional information, need not to watch one by one and distinguish the video of each camera, saves the manpower of drawing the activity orbit, promotes the security protection dynamics.
In one possible implementation, the front-end device is further configured to:
and determining group activity tracks according to the activity tracks of the plurality of first target objects.
By the method, the group activity track can be obtained according to the activity tracks of the first target objects, the group activity characteristics can be analyzed, and the analysis efficiency is improved.
In one possible implementation, the front-end device is further configured to:
and clustering at least one of the identity information, the time information and the position information of the first target object to obtain clustering information.
By the method, at least one of identity information, time information and position information of the first target object can be clustered to obtain clustering information, so that workload of manual searching and statistics is saved, and analysis efficiency is improved.
In one possible implementation, the front-end device is further configured to:
and generating prompt information under the condition that the first identity verification result is not passed and/or the visiting record of the first target object does not exist in the access control database.
In one possible implementation, the front-end device is further configured to:
and responding to the task operation command, and executing at least one of task creation operation, task inquiry operation, task deletion operation and task editing operation.
By the method, the flexibility of task operation can be improved, and the use convenience of the identity verification system is improved.
In one possible implementation, the front-end device is further configured to:
and responding to the database operation command, and executing at least one of adding reference image information, deleting reference image information and editing reference image information in the reference image database.
In one possible implementation, the reference image database includes: at least one of a vital people database, a general people database, and a visitor database.
In a possible implementation manner, the reference image databases corresponding to the first cameras of the acquisition device are the same or different.
In a possible implementation manner, in a case that the first authentication result is failed, the prompt information is used to prompt that the first target object is an illegally-entered object.
Through this kind of mode, the accessible makes each camera correspond different databases, increases authentication's flexibility, strengthens important regional security protection dynamics.
According to another aspect of the present disclosure, there is provided an authentication method, the method including:
according to a second video stream acquired by acquisition equipment at the access control equipment, storing a visit record of a target object entering through the access control equipment in an access control database; and
detecting a first object image with a first target object from a first video stream acquired by acquisition equipment in a monitoring area;
according to the first object image and reference image information in a reference image database, performing identity authentication on the first target object to obtain a first identity authentication result, wherein the reference image database is used for storing one or more pieces of reference image information;
generating prompt information according to the first identity verification result and at least one of the access control databases;
and sending the prompt information to a terminal so that the terminal displays a prompt corresponding to the prompt information.
In one possible implementation manner, according to a second video stream acquired by an acquisition device at the access control device, storing a visit record of a target object entering through the access control device in an access control database, includes:
according to the second video stream and the reference image information, performing identity authentication on a second target object to obtain a second identity authentication result, wherein the second target object is any one target object at the access control equipment;
generating a release command to control the access control device to allow the second target object to enter through the access control device under the condition that the second identity authentication result is passed;
and storing a second target object in the access control database through the access record of the access control equipment.
In a possible implementation manner, performing identity authentication on the first target object according to the first object image and reference image information in a reference image database to obtain a first identity authentication result includes:
determining whether reference image information matched with a first target object exists in the reference image database according to the characteristic information of the first target object in the first object image;
and determining that the identity verification result is failed in the case that the reference image information matched with the first target object does not exist in the reference image database.
In one possible implementation, the method further includes:
and under the condition that the acquisition equipment detects that a second target object leaves through the access control equipment, deleting the visit record of the second target object passing through the access control equipment from the access control database.
In one possible implementation, the hint information includes at least one of location information and time information of the first target object,
wherein the method further comprises at least one of the following steps:
determining the position information of the first target object according to a monitoring area where acquisition equipment for acquiring the first object image is located;
and determining the time information of the first target object according to the time stamp of the first object image.
In one possible implementation, the method further includes:
and starting acquisition equipment of an adjacent area of the monitoring area where the first target object is located according to the position information of the first target object.
In one possible implementation, the method further includes:
and determining the activity track of the first target object according to the time information and the position information of the first target object.
In one possible implementation, the method further includes:
and determining group activity tracks according to the activity tracks of the plurality of first target objects.
In one possible implementation, the method further includes:
and clustering at least one of the identity information, the time information and the position information of the first target object to obtain clustering information.
In a possible implementation manner, generating a prompt message according to the first authentication result and at least one of the access control databases includes:
and generating prompt information under the condition that the first identity verification result is not passed and/or the visiting record of the first target object does not exist in the access control database.
In one possible implementation, the method further includes:
and responding to the task operation command, and executing at least one of task creation operation, task inquiry operation, task deletion operation and task editing operation.
In one possible implementation, the method further includes:
at least one of adding reference image information, deleting reference image information, and editing reference image information in the reference image database is performed in response to the database operation command.
In one possible implementation, the reference image database includes: at least one of a vital people database, a general people database, and a visitor database.
In one possible implementation, the reference image databases corresponding to the respective capturing devices are the same or different.
In a possible implementation manner, in a case that the first authentication result is failed, the prompt information is used to prompt that the first target object is an illegally-entered object.
According to an aspect of the present disclosure, there is provided an electronic device including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the above-described authentication method is performed.
According to an aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described authentication method.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
Fig. 1 shows a block diagram of an identity verification system according to an embodiment of the present disclosure;
FIG. 2 shows a schematic diagram of an activity track according to an embodiment of the present disclosure;
FIG. 3 shows a schematic diagram of an application of an authentication system according to an embodiment of the present disclosure;
FIG. 4 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 5 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 6 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 7 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 8 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 9 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 10 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 11 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 12 shows a flow diagram of an authentication method according to an embodiment of the present disclosure;
FIG. 13 shows a block diagram of an electronic device in accordance with an embodiment of the disclosure;
fig. 14 illustrates a block diagram of an electronic device in accordance with an embodiment of the disclosure.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
Fig. 1 shows a block diagram of an authentication system according to an embodiment of the present disclosure, as shown in fig. 1, the system comprising:
the system comprises acquisition equipment 11, a monitoring center and a monitoring center, wherein the acquisition equipment 11 comprises one or more first cameras and one or more second cameras, the first cameras are used for acquiring a first video stream of a monitoring area, and the second cameras are used for acquiring a second video stream at an access control device;
a database 14, including a reference image database for storing one or more pieces of reference image information, and an access control database for storing a record of the target object visiting through the access control device;
a front-end device 12 connected to the capturing device for receiving the first video stream and the second video stream from the capturing device and connected to the database for invoking at least one of the reference image information and the visit record, wherein the front-end device 12 is configured to:
according to the second video stream, storing a visit record of a target object entering through the access control equipment in the access control database; and
detecting a first object image having a first target object from a first video stream;
according to the first object image and the reference image information, performing identity authentication on the first target object to obtain a first identity authentication result;
generating prompt information according to the first identity verification result and at least one of the access control databases;
and sending the prompt information to a terminal.
And the terminal 13 is connected to the front-end equipment and used for receiving the prompt information and displaying a prompt corresponding to the prompt information.
According to the identity verification system disclosed by the embodiment of the disclosure, the front-end equipment can detect the first object image in the video stream acquired by one or more cameras, carry out identity verification on the first object image, generate prompt information if the identity verification fails or the visit record of the first object passing through the access control equipment does not exist, make up security loopholes of persons illegally entering the access control equipment, prompt the first object illegally entering the access control equipment, and improve security.
In a possible implementation, the capturing device 11 may include one or more first cameras, which may capture a first video stream of the monitored area. In an example, the monitoring area is an area inside the access control device, for example, an area inside a certain field, a certain building or a certain room, and the first camera may be disposed in the monitoring area to capture the first video stream. In an example, the capturing device 11 may further include one or more second cameras for capturing a second video stream at the access control device.
In one possible implementation, the front-end device 12 may include a locally-located front-end server or other processing device, such as a computing device in the background of the first camera or the second camera. The front-end device 12 may be connected with the capturing device 11, that is, connected with the first camera or the second camera, to receive the first video stream or the second video stream captured by the first camera or the second camera, and process the first video stream or the second video stream.
In a possible implementation manner, the terminal 13 may be a device for presenting prompt information. In examples, a User Equipment (UE), a mobile device, a cellular phone, a cordless phone, a Personal Digital Assistant (PDA), a handheld device, a computing device, an in-vehicle device, a wearable device, and so forth. Further, the terminal can also be used for displaying the video streams acquired by the cameras. In an example, the prompt information is a text prompt, the terminal 13 is a mobile device, and the text prompt may be sent to the mobile device in the form of a short message, or the terminal 13 is a computing device, and a display of the computing device may display the text prompt. In an example, the prompt information is a voice prompt, the terminal 13 may be a computing device or a mobile device having a speaker, and the terminal 13 may play the voice prompt through the speaker. In an example, the terminal 13 may be a speaker, and the speaker may be disposed at each camera, for example, a first target object may be included in a video stream captured by a certain camera, and in a case that the first authentication result is failed, the prompt information may be used to prompt that the first target object is an illegally-entering object, and the prompt information may be sent to the terminal 13 (i.e., the speaker) disposed at the camera, so as to play the prompt information through the speaker (e.g., an audio prompt prompting that the first target object leaves the monitored area).
In one possible implementation, the access control device may include a gate or a door with a controllable door lock assembly, and the controllable door lock assembly may include a door lock controlled by a relay, a solenoid valve, or the like, and the present disclosure does not limit the kind of the access control device. The access control device may open the access control device (e.g., open a gate) upon receiving the clearance command to allow a target object outside the access control device to pass through the access control device.
In one possible implementation, the front-end device 12 may store a visit record of the target object accessed through the access control device in an access control database. The second camera at the access control device can shoot a second video stream of a target object which is about to enter a monitoring area through the access control device, the front-end device 12 can perform identity verification on the target object in the second video stream, if the identity verification passes, the access control device can be opened to allow the target object to pass through, and the visit record of the target object is stored.
In one possible implementation, the front-end device 12 is further configured to: according to the second video stream and the reference image information, performing identity authentication on a second target object to obtain a second identity authentication result, wherein the second target object is any one target object at the access control equipment; generating a release command to control the access control device to allow the second target object to enter through the access control device under the condition that the second identity authentication result is passed; and storing a second target object in the access control database through the access record of the access control equipment.
In one possible implementation, when there is a target object (e.g., a second target object) that wants to pass through the access control device, the second camera may obtain a second video stream about the second target object.
In one possible implementation, the front-end device 12 may detect a second object image having a second target object from a second video stream. For example, when a face image is detected to appear in the second video stream, a screenshot, a snapshot, or a selection may be performed on a video frame of the second video stream to obtain the second object image. The front-end device 12 may perform identity verification on the second object in the second object image, for example, the reference image database corresponding to the second camera disposed at the access control device may include an important person database, a general person database, and a visitor database, the front-end device may compare the feature information of the second object with the reference image information in each reference image database in sequence to obtain a second identity verification result, and if the reference image information matched with the feature information of the second object exists in the database, the second identity verification result is passed.
In a possible implementation manner, the front-end device 12 may generate a release command if the second authentication result is that the second target object passes through the second authentication result, and send the release command to the access control device, so as to control the access control device to allow the second target object to enter through the access control device. For example, the access control device is a gate, and when the release command is received, the gate can be opened to allow the second target object to enter the monitoring area through the gate.
In a possible implementation manner, the access control database is used for storing the visit record of the target object passing through the access control device. The front-end device 12 may store the visit record of the second target object through the access control device in the access control database, for example, store the feature information or the identity information of the second target object in the access control database.
In a possible implementation manner, if the second authentication result is failed, for example, the second target object is not a company employee, the front-end device does not generate the release command, the access control device keeps the closed state, and the second target object is not allowed to pass. In an example, the front-end device may further generate a prompt message and send the prompt message to the terminal 13, for example, the terminal 13 may be a speaker disposed at the second camera, and the speaker may wave a prompt corresponding to the prompt message, for example, a prompt reminding the second target object to leave. In an example, the prompt may include location information and/or time information of the second target object to know when the second target object is present at which access control device.
In a possible implementation manner, the manner of verifying the identity of the second target object may further include detecting information such as a fingerprint and an iris of the second target object, or reading radio frequency information of an employee card of the second target object, and the like.
In one possible implementation, the first camera may obtain a video stream of a first target object entering the monitored area, and the front-end device 12 may detect a first object image with the first target object from the first video stream. In an example, the first target object may be a living target, e.g., a person. The first object image may include a face image. In an example, when a face image is detected to appear in a first video stream, a video frame of the first video stream is subjected to screenshot, snapshot or selection to obtain the first object image.
In a possible implementation manner, the front-end device 12 may perform authentication on the first target object to obtain a first authentication result. Wherein the front-end device 12 may be further configured to: determining whether reference image information matched with a first target object exists in a reference image database according to the characteristic information of the first target object in the first object image; and determining that the identity verification result is failed in the case that the reference image information matched with the first target object does not exist in the reference image database. And determining that the identity verification result is passed if reference image information matched with the first target object exists in the reference image database.
In a possible implementation manner, the databases corresponding to the cameras of the acquisition device are the same or different. The reference image database includes: at least one of a vital people database, a general people database, and a visitor database. The important person database may include reference image information of one or more important persons, for example, reference image information of persons such as a manager of a company, financial persons, and important clients. The general staff database may include reference image information of one or more general staff members. The visitor database may include reference image information for one or more people who are about to visit.
In one possible implementation, the reference image information in the reference image database may be added, deleted, edited, and the like. The front-end device 12 is further configured to: and responding to the database operation command, and executing at least one of adding reference image information, deleting reference image information and editing reference image information in the reference image database.
In a possible implementation manner, the reference image information may be added or deleted as needed in the reference image database, for example, the company hires a new employee, and the reference image information of the new employee may be added in the general staff database through a database operation command, or if the company has a guest visit, the reference image information of the visitor may be added in the visitor database, and the visitor information may be deleted from the visitor database after the visitor leaves. The reference image information in the database can be edited according to the requirement, for example, the reference image information can be edited or replaced by the reference image information of a certain employee through the database operation command if the appearance of the employee changes (for example, wearing glasses). For another example, when the position of the employee changes (for example, the employee is promoted to an important person such as a manager), the identity information corresponding to the reference image information of the employee can be edited through the database operation command. The present disclosure is not limited as to the type of command that is operated on by the database.
In an example, a camera of a capture device may be added or turned off as needed, e.g., a region of a company is temporarily unused, a camera of the region may be turned off, and a camera of the region may be turned on when the region is put into use.
Through this kind of mode, the accessible makes each camera correspond different databases, increases authentication's flexibility, strengthens important regional security protection dynamics.
In a possible implementation manner, the prompt message may be generated according to at least one of the first identity verification result and a visit record stored in the access control database. In an example, the prompt message may be generated and sent to the terminal 13 when the first authentication result is that the first target object fails and/or the visit record of the first target object does not exist in the access database. The access control database is used for storing the visit records of the target objects passing through the access control equipment.
In an example, if the first authentication result is failed, it indicates that there is no reference image information matching the feature information of the first target object in the database corresponding to the first camera, that is, that the first target object is an illegally-entered object. In an example, the first target object is a general employee of a company, reference image information of the general employee is stored in a general employee database, a first camera set in an office area of the general employee and a second camera set at the access control device may both correspond to the general employee database, and an authentication result of the general employee when performing authentication at the access control device is passed, the general employee may pass through the access control device and enter the office area of the general employee, an authentication result of the general employee when performing authentication in the office area of the general employee is still passed, and a visit record of the general employee exists in the access control database, the front-end device 12 may not generate prompt information, however, if the general employee enters an important area (e.g., an important area such as a financial office or a manager office, the database corresponding to the first camera set in the important area may be an important person database, and the important person database does not include the feature information of the general employee), and the front-end device 12 may generate the prompt message if the first authentication result is failed. And under the condition that the first identity authentication result is failed, the prompt information is used for prompting that the first target object is an object illegally entering an important area. The prompt message may be sent to the terminal 13, and the terminal 13 may be a speaker disposed at the first camera, and the speaker may play a prompt corresponding to the prompt message (e.g., a prompt to remind the general staff of leaving an important area).
In an example, if the first authentication result is that the first target object is not authenticated and the access record of the first target object does not exist in the access database, it indicates that the first target object is an illegally-entering object. In an example, the first target object may trail an employee of the company to illegally pass through the access control device, enter a monitored area (e.g., an office area or a critical area of a general employee, etc.). The first camera acquires a video stream of the first target object, the front-end device 12 may perform identity authentication on the first target object, the identity authentication result of the first target object is failed, and if the access record of the first target object does not exist in the access database, the first target object is an illegally-entering object. The head-end 12 may generate the reminder information. And under the condition that the first identity authentication result is failed, the prompt information is used for prompting that the first target object is an object illegally entering an important area. The prompt message may be sent to the terminal 13, and the terminal 13 may be a speaker provided at the first camera, and the speaker may play a prompt corresponding to the prompt message (e.g., a prompt warning the first target object to leave the monitored area).
In an example, if the first authentication result is pass and the access database does not have the visit record of the first target object, it may indicate that the legal person illegally passes through the access control device. For example, the first target object is a general employee of the company, the first camera acquires a video stream of the first target object, the front-end device 12 may perform authentication on the first target object, the authentication result of the first target object is that the first target object passes, but the access record of the general employee does not exist in the access database, the regular employee may enter along with other employees and pass through the access control device without authentication (e.g., pass through the access control device without being captured by a second camera at the access control, or not swiping a card, etc., no visit record exists in the access control database for the regular employee), the front-end device 12 generates a prompt message, the prompt message may be sent to the terminal 13, where the terminal 13 may be a speaker disposed at the first camera, and the speaker may play a prompt corresponding to the prompt message (e.g., a prompt message for prompting the general staff to return to the access control device for authentication).
In an example, if the first authentication result is that the first target object passes the first authentication result and the access record of the first target object exists in the access database, it indicates that the first target object is a person who legally enters the monitoring area, and the front-end device 12 may not generate the prompt message. For another example, if the identity information of the first target object is determined to be an important person (e.g., an important visitor) after the identity verification, the front-end device 12 may generate a prompt message (e.g., a prompt message for prompting a receptionist) and send the prompt message to the terminal 13, where the terminal 13 may be a mobile phone of the receptionist, and the prompt message may be displayed to prompt the receptionist to prepare for reception.
In one possible implementation, the prompt information includes at least one of location information and time information of the first target object. The front-end device 12 is further configured to perform at least one of the following steps: determining the position information of the first target object according to a monitoring area of a camera for collecting the first object image; and determining the time information of the first target object according to the time stamp of the first object image.
In a possible implementation manner, the first camera may have a unique identifier, the unique identifier may correspond to an area monitored by the first camera, and the front-end device may determine the position information of the first target object by shooting the unique identifier of the first camera of the first target object. In addition, the front-end equipment can also acquire a time stamp in a first object image of the first video stream so as to obtain time information of the first target object appearing in an area monitored by the first camera according to the time stamp. The position information and/or the time information may be included in the prompt information to know the time and the position of the first target object. In an example, if a non-company employee illegally enters the company, the activity area, time and the like of the non-company employee in the company can be known according to the position information and/or the time information.
By the mode, the activity route and the activity area of the target object can be determined through the position information and/or the time information, and the security protection strength is improved.
In one possible implementation, the front-end device 12 is further configured to: and starting a first camera of an adjacent area of a monitoring area where the first target object is located according to the position information of the first target object.
In one possible implementation, the first target object may be deployed. For example, if the first target object is an illegal entering person (for example, the first authentication result is failed), the first target object may be controlled, the position information of the first target object may be determined according to the unique identifier of the first camera that photographs the first target object, the first camera of the adjacent area of the area where the first target object is located may be turned on, and if the position of the first target object moves, for example, moves from the area where the first target object is located to the adjacent area, the first camera of the adjacent area may continue to monitor the first target object. The area where the first target object is located may have a plurality of adjacent areas, cameras of the plurality of adjacent areas may be turned on, if the position of the first target object moves, the first target object may enter any one of the plurality of adjacent areas, and the first camera in the adjacent area may continue to monitor the first target object. Further, after the first target object enters the adjacent area, the camera in the area adjacent to the adjacent area may also be turned on, so as to continue monitoring the first target object when the position of the first target object continues to move until the first target object leaves the monitoring area.
In one possible implementation, the front-end device 12 is further configured to: and determining the motion track of the first target object according to the time information and the position information of the first target object.
In one possible implementation, the front-end device 12 may use the position of the camera (including the first camera and the second camera) that shot the video stream of the first target object for the first time in the current day as the starting point of the activity track, and search for the next camera shot of the first target object in time sequence until the first target object leaves the monitoring area or the first target object does not go to other positions in the current day (i.e., no camera in other positions shoots the first target object).
In one possible implementation manner, positions of cameras shooting the first target object may be connected in time sequence, and an activity track of the first target object may be obtained. In an example, the positions may be connected by line segments, and line segments with different chromaticities, different grayscales, or different luminances may be used according to the time information, for example, the sequence of time may be represented by the shade of color, the line segment of the active track closest to the current time may be the darkest in color, and the line segment of the active track farther from the current time may be the lighter in color.
FIG. 2 shows a schematic diagram of an activity track according to an embodiment of the present disclosure. As shown in fig. 2, the area may be a monitoring area in a shopping mall, and the camera a, the camera B, the camera C, the camera D, the camera E, the camera H, the camera J, the camera K, the camera L, the camera I, the camera G, and the camera F may be any cameras in the area, such as a monitoring camera, a camera on an automatic teller machine, or a camera on an access control device, and the like. The first target object can enter a monitoring area from the access control equipment, the first target object is firstly shot by a camera A at the access control equipment on the same day, the camera A is a starting point of an activity track, then the first target object sequentially passes through a camera C, a camera D, a camera E, a camera H, a camera J, a camera K and a camera C, leaves the monitoring area from the access control equipment, and the first target object is finally shot by the camera B at the access control equipment, so that the position of the camera B is a terminal point of the activity track, in an example, the color of a line segment CB is the darkest, and then the color of the track (line segment AC) of the line segment KC … farthest from the current time is the lightest.
In an example, a first target object for which an activity route is to be acquired may be set, and an activity trajectory of the first target object may be acquired. The first target object may be a target object with a known identity (for example, reference image information of the first target object is in a reference image database), and the activity track of the first target object may be obtained after the identity of the first target object is recognized. The first target object may also be a target object whose identity is unknown (for example, reference image information of the first target object does not exist in a reference image database), and after the first target object is set, the first target object may be searched for by each camera (for example, the first target object is searched for in a video stream captured by each camera by a face recognition method), and time information and position information are obtained in the video stream captured by the first target object, so as to obtain an activity track of the first target object. For example, a customer's activity track may be analyzed to learn the customer's preferences. For another example, the activity track of wanted people can be automatically drawn in the monitoring video, the police force can be saved, and police officers can be helped to make a capture scheme and the like.
In an example, the activity track may be included in the reminder information and sent to the terminal 13, and the terminal 13 may be a computing device having a display on which the activity track may be displayed.
Through this kind of mode, the activity orbit of first target object can be drawn automatically to accessible time information and positional information, need not to watch one by one and distinguish the video of each camera, saves the manpower of drawing the activity orbit, promotes the security protection dynamics.
In one possible implementation, the activity tracks of the plurality of first target objects may also be analyzed. The front-end device 13 is further configured to: and determining group activity tracks according to the activity tracks of the plurality of first target objects.
In one possible implementation manner, the activity tracks of the plurality of first target objects may be obtained, and the group activity track may be determined according to the activity tracks of the plurality of first target objects.
In an example, the plurality of first target objects may be customers of a certain mall (for example, randomly selected customers, reference image information of the customers may not be available in the reference image database), the activity tracks of the plurality of first target objects may be obtained to determine group activity tracks, so as to determine high-frequency routes of the customers in the mall, the preferences of most users may be analyzed, and the operation of the mall may be reasonably planned according to the preferences of the users.
In an example, the first target objects may be wanted persons (e.g., wanted persons referring to a plurality of similar cases in an image database), the activity tracks of the wanted persons may be obtained to determine group activity tracks, the action characteristics of the wanted persons may be analyzed, and police force arrangement and capture scheme formulation are facilitated.
By the method, the group activity track can be obtained according to the activity tracks of the first target objects, the group activity characteristics can be analyzed, and the analysis efficiency is improved.
In one possible implementation, the obtained information of the plurality of target objects may be clustered to analyze the group activity characteristics. In one possible implementation, the front-end device 12 is further configured to: and clustering at least one of the identity information, the time information and the position information of the first target object to obtain clustering information.
In one possible implementation, the authentication results of a plurality of first target objects may be obtained, for example, the plurality of first target objects may be customers of a certain store (for example, randomly selected customers, reference image information of the customers may not be available in the database 12), and the locations (i.e., location information) where the plurality of first target objects go may be clustered, and clustering information indicating group preferences may be obtained, for example, the most popular of a certain merchant in the store, and the like.
In a possible implementation manner, each location may be labeled, for example, as a dining place, an entertainment place, a shopping place, and the like, and the locations where the first target object goes are clustered, so that clustered information indicating a preference of the first target object may be obtained, for example, a certain first target object likes shopping or a certain first target object likes dining. Furthermore, the shopping type or the catering type can be labeled to further analyze the preference of the first target object, for example, the shopping places can be classified into clothing shopping places, daily department shopping places, video shopping places, and the like, and the place where the first target object goes can be clustered to obtain the shopping preference of the first target object.
In one possible implementation manner, the clustering process may be performed on the locations where the plurality of first target objects go according to the identity information of the plurality of first target objects (for example, the database 12 has the reference image information of the first target objects and has the identity information of nationality, age, sex, occupation, and the like of the customer), and the clustering information indicating the preference or feature of the first target objects of different types may be obtained. For example, a female customer with a Chinese nationality and an age between 18 and 25 years typically goes to a clothing shopping venue or the like.
In one possible implementation, the passenger flow volume of each place may be clustered, for example, the customers of each time period (i.e., time information) and each place (i.e., position information) may be clustered, and the clustering information indicating the peak time period of the passenger flow of each place may be obtained. The present disclosure does not limit the type of clustering information.
By the method, at least one of identity information, time information and position information of the first target object can be clustered to obtain clustering information, so that workload of manual searching and statistics is saved, and analysis efficiency is improved.
In a possible implementation manner, the processes of identifying identity, obtaining an activity track and a cluster of a target object, and the like may be used as tasks, and the front-end device 13 is further configured to: and responding to the task operation command, and executing at least one of task creation operation, task inquiry operation, task deletion operation and task editing operation.
In one possible implementation, a task of the front-end device 13, that is, a task creation operation, may be set, for example, a certain first target object appears in a video stream shot by a certain camera, and a task operation command may be input to the front-end device 13 to create at least one of a liveness detection task, an authentication task, an activity trajectory determination task, and a task of acquiring cluster information for the first target object.
In an example, if a police party observes that the appearance features of a certain first target object are similar to those of a wanted person in a monitoring video stream, the police party may cause the front-end device 13 to perform an identity verification task on the first target object through a task operation command, and if the first target object is the wanted person, a task for determining an activity track of the first target object is created, and the like. The front-end device 13 may execute the above-mentioned person to verify the identity of the first target object, and determine the motion trajectory of the first target object through the time information of the first target object captured by the multiple cameras and the position information of the cameras capturing the first target object.
In a possible implementation manner, the task operation command may further include an operation of turning on a camera, for example, a camera in a certain area in an office area is in a turned-off state, and the camera in the certain area may be turned on through the task creation command, so that the camera in the certain area acquires a video stream of a person entering the certain area to perform processes such as living body detection and identity verification.
In one possible implementation, the tasks that the front-end device performed in the past (i.e., task query operations) may be queried, for example, to query the authentication result of a certain first target object or the activity track of a certain person, etc.
In one possible implementation, the task currently being executed may be stopped, e.g., the task currently being executed may be deleted by a task delete operation, and the task may be stopped. For another example, the record of the task executed in the past may also be deleted by a task deletion operation, for example, deleting the authentication result of a certain first target object.
In one possible implementation, the tasks may be edited (i.e., a task editing operation), for example, the order of execution of the tasks is edited, an authentication task of a certain first target object in the video stream is added or deleted, and the like.
By the method, the flexibility of task operation can be improved, and the use convenience of the identity verification system is improved.
In one possible implementation, the front-end device 12 is further configured to: and under the condition that the second camera detects that the second target object leaves through the access control equipment, deleting the visit record of the second target object passing through the access control equipment from the access control database.
In one possible implementation manner, if the authentication result of the second target object is pass, the second target object may enter the access control device. In an example, the second target object may be an employee or visitor of a company, and when the second target object enters the access control device, a visit record of the second target object may be saved. When the second target object leaves through the access control device (e.g., visitor leaves or employee leaves), the front-end device may delete the visit record of the second target object in the access control database. Under the condition, the second target object needs to be authenticated and the visiting record is recorded every time the second target object enters the access control device, and after the second target object enters the access control device, the front-end device cannot generate prompt information when the first camera of the monitoring area acquires the video stream of the second target object. In an example, the visit record may be retained for a period of time, such as a day, week, or month, within which the visit record may be viewed.
By the method, the visit record of the second target object can be recorded, and the visit record is deleted when the second target object leaves, so that the second target object enters the access control equipment at each time, the identity of the second target object needs to be verified, the visit record is saved for verification, and the security protection degree is improved.
Fig. 3 shows a schematic application diagram of an authentication system according to an embodiment of the present disclosure. As shown in fig. 3, a company's office may be included in fig. 3, and the office may include two access control devices (i.e., access control device 1 and access control device 2) and four areas (i.e., area 1, area 2, area 3, and area 4).
In a possible implementation manner, 6 cameras are set in the office, wherein the second camera 1 is used for collecting a second video stream of the access control device 1, the access control camera 2 is used for collecting a second video stream of the access control device 2, the first camera 1 is used for collecting a first video stream of the area 1, the camera 2 is used for collecting a first video stream of the area 2, the camera 3 is used for collecting a first video stream of the area 3, the camera 4 is used for collecting a first video stream of the area 4, and the 6 cameras all send the collected video streams to the front-end device 21.
In one possible implementation, the database 23 includes a reference image database and a door access database, the reference image database may include multiple databases, and the reference image database corresponding to each camera may be different, for example, the reference image databases corresponding to the second camera 1 and the second camera 2 may be a significant person database, a general person database, and a visitor database. Area 1 and area 2 can be staff's office area, the reference image database that first camera 1 and first camera 2 correspond is important personnel database and ordinary personnel database, area 3 can be the reception area (for example, reception room or tea water room etc.), the reference image database that first camera 3 corresponds is important personnel database, ordinary personnel database and visitor's database, area 4 is the important area (for example manager's office or financial office etc.) of this company, the reference image database that first camera 4 corresponds is important personnel database. The reference image information in the reference image database can be added, deleted, edited and the like through database operation commands.
In one possible implementation, the front-end device 21 may sequentially query each database for whether there is reference image information matching the target object. In an example, the second camera 1 may obtain a second video stream at the access control device 1, the front-end device 21 may obtain an object image of the target object, and sequentially match the object image with reference image information in an important person database, a general person database, and a visitor database, if any one of the three databases has reference image information matched with the target object, the authentication result is passed, otherwise, the authentication result is failed, and prompt information may be generated and sent to the terminal 22. In an example, the first camera 4 may obtain a first video stream of the area 4, the front-end device 21 may obtain an object image of the target object, and match the object image with reference image information in the important person database, if the important person database has the reference image information matched with the target object, the authentication result is passed, otherwise, the authentication result is failed, and prompt information may be generated and sent to the terminal 22.
In a possible implementation manner, when a person a arrives at the access control device 1 and intends to enter an office, the front-end device 21 may detect an object image of the person a from a second video stream acquired by the second camera 1 and perform identity verification, that is, matching feature information of the person a with reference image information in an important person database, a general person database and a visitor database in sequence, and if the identity verification result is failed, the front-end device 21 may send prompt information to the terminal 22. In the prompt message, the location information and the time information of the person are included, for example, 9:00 am and the access control device 1, the terminal 22 may be a monitoring device used by the security personnel, and a prompt corresponding to the prompt message may be displayed on a display of the terminal 22, for example, a text prompt of "a stranger attempts to enter the office space at the access control device 1 at 9:00 am" may be displayed to prompt the security personnel to pay attention to the person a. Alternatively, the terminal 22 may be a speaker provided at the second camera 1, the prompt may be a voice prompt asking the person a to leave, and the terminal 22 may play the prompt.
In a possible implementation manner, when a person B comes to the access control device 2 and intends to enter an office, the front-end device 21 may detect an object image of the person B from a second video stream acquired by the second camera 2, perform identity verification, and if the result of the identity verification is positive, the front-end device 21 generates a release command to control the access control device 2 to allow the person B to enter through the access control device, and store an arrival record of the person B through the access control device 2 in the access control database. After the person B enters the access control device, for example, the person B is a common employee, and when the person B enters an office area or a reception room of the common employee, the front-end device 21 does not generate a prompt message. Further, when the person B leaves the office area through any access control device, the visit record of the person B in the access control database can be deleted.
In one possible implementation, person C is a regular employee of the company, but person C may follow other employees through the access control device, where no authentication is performed, and no record of visits is saved. When the person C enters the area 1 or the area 2, the first camera 1 or the second camera 2 may obtain a first video stream of the person C, the front-end device 21 may perform identity verification on the person C, the identity verification result is that the person C passes, but no visit record of the person C exists in the access database, the front-end device 21 may generate a prompt message and send the prompt message to the terminal 22, where the terminal 22 may be a speaker disposed at the first camera 1 or the first camera 2, and the speaker may play a prompt corresponding to the prompt message (e.g., a prompt message for prompting the person C to return to any access control device for authentication), the terminal 22 may be a mobile terminal (e.g., a mobile phone, etc.) of the person C, and the prompt message may be sent to the mobile terminal of the person C in the form of a short message, etc. to prompt the person C to return to any access control device for authentication.
In a possible implementation manner, the person D is a stranger who enters the office area following the staff of the company (i.e., is not the staff of the company and is not a visitor of the company), after entering the office area, any first camera can acquire a first video stream of the person D, the front-end device 21 can perform authentication on the person D, the authentication result is that the person D fails, and no visit record of the person D exists in the access database, the front-end device 21 can generate prompt information and send the prompt information to the terminal 22, the prompt information includes position information and time information of the person, for example, 9:00 am and area 1, the terminal 22 can be a monitoring device used by security personnel, a prompt corresponding to the prompt information can be displayed on a display of the terminal 22, for example, a text prompt of "9:00 am indicates that a stranger enters the office area 1" can be displayed, to prompt security personnel to pay attention to person D. Alternatively, the terminal 22 may be a speaker provided at the first camera 1, the prompt may be a voice prompt asking the person D to leave, and the terminal 22 may play the prompt.
In one possible implementation, the person E appears in the important area (i.e., the area 4), the first camera 4 may obtain a first video stream of the person E, the front-end device 21 may perform identity verification on the person E, and if there is no reference image information matching with the feature information of the person E in the important task database, the identity verification result of the person E is considered as failed, regardless of whether the person E is a staff of the company. Further, the front-end device 21 may generate a prompt message, where the prompt message may include location information and time information of the person E, for example, 10:00 am and area 4, and the terminal 22 may be a monitoring device used by the security personnel, and a prompt corresponding to the prompt message may be displayed on a display of the terminal 22, for example, a text prompt of "there is an unimportant person entering in area 4 at 10:00 am" to prompt the security personnel to pay attention to the person E.
In one possible implementation manner, the motion track of the target object can be determined according to the time when each camera shoots the target object and the position of each camera. In an example, a person F enters from the entrance guard 2 at 9 am, the camera 2 acquires a video stream of the person F, the front-end device 21 performs living body detection and identity verification according to the video stream, and records the time when the person F is shot. The person F sequentially passes through the area 2, the area 4, the area 3 and the area 1 and leaves the office from the entrance guard 1, the camera 4, the camera 6, the camera 5, the camera 3 and the camera 1 sequentially record the time of shooting the person F, and the front-end device 21 can determine the movement track of the person F according to the time (namely, time information) recorded by each camera and the area (namely, position information) where each camera is located. In the same manner, the front-end device 21 may determine the activity trajectories of a plurality of persons and determine the group activity trajectory.
In a possible implementation manner, clustering processing may be performed on at least one of identity information, time information, and location information of a person in an office area, and clustering information such as a relationship between a person flow and time in a certain area and an identity of a person who frequently enters the certain area may be obtained.
In a possible implementation manner, tasks such as a task of authenticating a certain person, determining an activity track of a certain person, and acquiring clustering information may be created through a task operation command, tasks performed in the past may also be queried, for example, a task execution result may be queried (for example, a result of authenticating a certain person or an activity track of a certain person may be queried), or a task may be deleted, for example, a task being performed may be deleted (for example, a current task is stopped) or a task execution result saved in the past may be deleted.
In a possible implementation manner, the authentication system according to the embodiment of the present disclosure may be used in a scenario of employee attendance or area monitoring, and the present disclosure does not limit a usage scenario of the authentication system.
According to the identity verification system disclosed by the embodiment of the disclosure, the front-end equipment can record the visit record of each target object and delete the visit record when the target object leaves, so that the target object can enter the access control equipment at each time, the identity of the target object needs to be verified, the visit record is recorded for verification, and the security protection degree is improved. And the front-end equipment can carry out identity verification on an object image in a video stream of a target object acquired by the first camera, and if the identity verification fails or the visit record of the target object passing through the access control equipment does not exist, prompt information is generated, so that the security vulnerability of persons illegally entering the access control equipment can be compensated, the prompt can be carried out on the target object illegally entering the access control equipment, and the security strength is improved. Still can increase the flexibility of authentication through making each camera correspond different databases, strengthen the security protection dynamics of important region to the activity route and the activity region of accessible position information and/or time information come to confirm the target object, promote security protection dynamics. Furthermore, the activity track of the first target object can be determined through the position information and/or the time information, the security protection strength is improved, the manpower for drawing the activity track is saved, the clustering information of at least one of the identity information, the time information and the position information can be obtained, and the analysis efficiency is improved.
It is understood that the above-mentioned embodiments of the present disclosure can be combined with each other to form a combined embodiment without departing from the logic of the principle, which is limited by the space, and the detailed description of the present disclosure is omitted.
Fig. 4 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 4, the method includes:
in step S11, storing, in an access control database, an access record of a target object accessed through an access control device, according to a second video stream acquired by an acquisition device at the access control device; and
in step S12, a first object image having a first target object is detected from a first video stream captured by a capturing device in a monitored area;
in step S13, performing identity authentication on the first target object according to the first object image and reference image information in a reference image database, to obtain a first identity authentication result, where the reference image database is used to store one or more pieces of reference image information;
in step S14, generating a prompt message according to the first authentication result and at least one of the access databases;
in step S15, the prompt information is sent to a terminal, so that the terminal displays a prompt corresponding to the prompt information.
In one possible implementation, step S11 includes: according to the second video stream and the reference image information, performing identity authentication on a second target object to obtain a second identity authentication result, wherein the second target object is any one target object at the access control equipment; generating a release command to control the access control device to allow the second target object to enter through the access control device under the condition that the second identity authentication result is passed; and storing a second target object in the access control database through the access record of the access control equipment.
In one possible implementation, step S13 includes: determining whether reference image information matched with a first target object exists in the reference image database according to the characteristic information of the first target object in the first object image; and determining that the identity verification result is failed in the case that the reference image information matched with the first target object does not exist in the reference image database.
In one possible implementation, the prompt information includes at least one of location information and time information of the first target object.
In a possible implementation manner, the prompt message is generated when the first authentication result is that the first target object fails and/or the access record of the first target object does not exist in the access database.
Fig. 5 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 5, the method further includes:
in step S16, at least one of adding reference image information, deleting reference image information, and editing reference image information in the reference image database is performed in response to the database operation command.
In one possible implementation, the reference image database includes: at least one of a vital people database, a general people database, and a visitor database.
In one possible implementation, the reference image databases corresponding to the respective capturing devices are the same or different.
In a possible implementation manner, in a case that the first authentication result is failed, the prompt information is used to prompt that the first target object is an illegally-entered object.
Fig. 6 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 6, the method further comprising at least one of the following steps:
in step S17, determining position information of the first target object according to a monitoring area in which an acquisition device that acquires the first object image is located;
in step S18, time information of the first target object is determined based on the time stamp of the first object image.
Fig. 7 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 7, the method further includes:
in step S19, according to the position information of the first target object, the acquisition devices of the neighboring areas of the monitoring area where the first target object is located are turned on.
In one possible implementation, the method may not be limited to the order in fig. 7, and step S19 may be performed at any time after the time information and the position information of the first target object are determined.
Fig. 8 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 8, the method further includes:
in step S31, an activity trajectory of the first target object is determined based on the time information and the position information of the first target object.
In one possible implementation, the method may not be limited to the order in fig. 8, and step S31 may be performed at any time after the time information and the position information of the first target object are determined.
Fig. 9 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 9, the method further includes:
in step S32, a group activity trajectory is determined from the activity trajectories of the plurality of first target objects.
Fig. 10 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 10, the method further includes:
in step S33, at least one of the identity information, the time information, and the location information of the first target object is clustered to obtain cluster information.
In one possible implementation, the method may not be limited to the order in fig. 10, and step S33 may be performed at any time after determining the identity information and the location information of the first target object.
Fig. 11 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 11, the method further includes:
in step S34, at least one of a task creation operation, a task inquiry operation, a task deletion operation, and a task editing operation is performed in response to the task operation command.
Fig. 12 shows a flow chart of an authentication method according to an embodiment of the present disclosure, as shown in fig. 12, the method further includes:
in step S35, when the acquisition device detects that a second target object leaves through the access control device, the access record of the second target object passing through the access control device is deleted from the access control database.
In addition, the present disclosure also provides an authentication apparatus, an electronic device, a computer-readable storage medium, and a program, which can be used to implement any one of the authentication methods provided by the present disclosure, and the corresponding technical solutions and descriptions and corresponding descriptions in the methods section are omitted for brevity.
It will be understood by those skilled in the art that in the method of the present invention, the order of writing the steps does not imply a strict order of execution and any limitations on the implementation, and the specific order of execution of the steps should be determined by their function and possible inherent logic.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and for specific implementation, reference may be made to the description of the above method embodiments, and for brevity, details are not described here again
Embodiments of the present disclosure also provide a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the above-mentioned method. The computer readable storage medium may be a non-volatile computer readable storage medium.
An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured as the above method.
The electronic device may be provided as a terminal, server, or other form of device.
Fig. 13 is a block diagram illustrating an electronic device 800 in accordance with an example embodiment. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like terminal.
Referring to fig. 13, electronic device 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the electronic device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 800 is in an operation mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the electronic device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium, such as the memory 804, is also provided that includes computer program instructions executable by the processor 820 of the electronic device 800 to perform the above-described methods.
Fig. 14 is a block diagram illustrating an electronic device 1900 according to an example embodiment. For example, the electronic device 1900 may be provided as a server. Referring to fig. 14, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. The electronic device 1900 may operate based on an operating system stored in memory 1932, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
In an exemplary embodiment, a non-transitory computer readable storage medium, such as the memory 1932, is also provided that includes computer program instructions executable by the processing component 1922 of the electronic device 1900 to perform the above-described methods.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terms used herein were chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the techniques in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. An identity verification system, comprising:
the system comprises acquisition equipment and a monitoring device, wherein the acquisition equipment comprises one or more first cameras and one or more second cameras, the first cameras are used for acquiring a first video stream of a monitoring area, and the second cameras are used for acquiring a second video stream at the position of access control equipment;
the database comprises a reference image database used for storing one or more pieces of reference image information and an access control database used for storing the visit record of the target object through the access control equipment;
a front-end device connected to the capturing device for receiving the first video stream and the second video stream from the capturing device and connected to the database for invoking at least one of the reference image information and the visit record,
wherein the front-end device is configured to:
according to the second video stream, storing an access record of a target object accessed through the access control equipment in the access control database; and
detecting a first object image having a first target object from the first video stream;
according to the first object image and the reference image information, performing identity authentication on the first target object to obtain a first identity authentication result;
generating prompt information according to the first identity verification result and at least one of the access control databases;
sending the prompt information to a terminal;
and the terminal is connected to the front-end equipment and used for receiving the prompt information and displaying a prompt corresponding to the prompt information.
2. The system of claim 1, wherein the front-end device is further configured to:
according to the second video stream and the reference image information, performing identity authentication on a second target object to obtain a second identity authentication result, wherein the second target object is any one target object at the access control equipment;
generating a release command to control the access control device to allow the second target object to enter through the access control device under the condition that the second identity authentication result is passed;
and storing a second target object in the access control database through the access record of the access control equipment.
3. The system of claim 1, wherein the front-end device is further configured to:
determining whether reference image information matched with a first target object exists in the reference image database according to the characteristic information of the first target object in the first object image;
and determining that the identity verification result is failed in the case that the reference image information matched with the first target object does not exist in the reference image database.
4. The system of claim 2, wherein the front-end device is further configured to:
and under the condition that the second camera detects that the second target object leaves through the access control equipment, deleting the visit record of the second target object passing through the access control equipment from the access control database.
5. The system of claim 1, wherein the prompt information includes at least one of location information and time information of the first target object,
the front-end device is further configured to perform at least one of the following steps:
determining the position information of the first target object according to a monitoring area of a camera for collecting the first object image;
and determining the time information of the first target object according to the time stamp of the first object image.
6. The system of claim 5, wherein the front-end device is further configured to:
and starting a first camera of an adjacent area of a monitoring area where the first target object is located according to the position information of the first target object.
7. The system of claim 5, wherein the front-end device is further configured to:
and determining the activity track of the first target object according to the time information and the position information of the first target object.
8. An identity verification method, comprising:
according to a second video stream acquired by acquisition equipment at the access control equipment, storing a visit record of a target object entering through the access control equipment in an access control database; and
detecting a first object image with a first target object from a first video stream acquired by acquisition equipment in a monitoring area;
according to the first object image and reference image information in a reference image database, performing identity authentication on the first target object to obtain a first identity authentication result, wherein the reference image database is used for storing one or more pieces of reference image information;
generating prompt information according to the first identity verification result and at least one of the access control databases;
and sending the prompt information to a terminal so that the terminal displays a prompt corresponding to the prompt information.
9. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: performing the method of claim 8.
10. A computer readable storage medium having computer program instructions stored thereon, wherein the computer program instructions, when executed by a processor, implement the method of claim 8.
CN201811312207.7A 2018-11-06 2018-11-06 Authentication system and method, electronic device and storage medium Active CN111209769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811312207.7A CN111209769B (en) 2018-11-06 2018-11-06 Authentication system and method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811312207.7A CN111209769B (en) 2018-11-06 2018-11-06 Authentication system and method, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN111209769A true CN111209769A (en) 2020-05-29
CN111209769B CN111209769B (en) 2024-03-08

Family

ID=70786273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811312207.7A Active CN111209769B (en) 2018-11-06 2018-11-06 Authentication system and method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN111209769B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111860345A (en) * 2020-07-22 2020-10-30 海尔优家智能科技(北京)有限公司 Method and device for determining object position, storage medium and electronic device
CN112037206A (en) * 2020-09-01 2020-12-04 成都睿畜电子科技有限公司 Target characteristic data calculation method and device and computer readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354552A (en) * 2015-11-10 2016-02-24 成都智慧数联信息技术有限公司 Human face identification and expression analysis based online monitoring system and method
CN206097257U (en) * 2016-10-10 2017-04-12 云南铸庚科技有限公司 Security protection intelligent monitoring system
CN106652136A (en) * 2016-12-22 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal-based access control management information processing method and device
CN107547858A (en) * 2016-09-20 2018-01-05 郑州蓝视科技有限公司 The antitheft method of cell is carried out using camera
CN207082203U (en) * 2017-09-05 2018-03-09 深圳工杰技术有限公司 A kind of intelligent safety defense monitoring system
CN108062809A (en) * 2017-11-28 2018-05-22 特斯联(北京)科技有限公司 A kind of house access control system for realizing personnel's big data collection analysis
CN108133172A (en) * 2017-11-16 2018-06-08 北京华道兴科技有限公司 Method, the analysis method of vehicle flowrate and the device that Moving Objects are classified in video
CN108134920A (en) * 2017-11-28 2018-06-08 特斯联(北京)科技有限公司 A kind of intelligence system and method for realizing building visitor identification and current management
CN108171842A (en) * 2017-12-28 2018-06-15 深圳市泛海三江科技发展有限公司 A kind of personnel management system
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108600700A (en) * 2018-04-25 2018-09-28 北京市电话工程有限公司 A kind of cell video monitoring system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354552A (en) * 2015-11-10 2016-02-24 成都智慧数联信息技术有限公司 Human face identification and expression analysis based online monitoring system and method
CN107547858A (en) * 2016-09-20 2018-01-05 郑州蓝视科技有限公司 The antitheft method of cell is carried out using camera
CN206097257U (en) * 2016-10-10 2017-04-12 云南铸庚科技有限公司 Security protection intelligent monitoring system
CN106652136A (en) * 2016-12-22 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal-based access control management information processing method and device
CN207082203U (en) * 2017-09-05 2018-03-09 深圳工杰技术有限公司 A kind of intelligent safety defense monitoring system
CN108133172A (en) * 2017-11-16 2018-06-08 北京华道兴科技有限公司 Method, the analysis method of vehicle flowrate and the device that Moving Objects are classified in video
CN108062809A (en) * 2017-11-28 2018-05-22 特斯联(北京)科技有限公司 A kind of house access control system for realizing personnel's big data collection analysis
CN108134920A (en) * 2017-11-28 2018-06-08 特斯联(北京)科技有限公司 A kind of intelligence system and method for realizing building visitor identification and current management
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108171842A (en) * 2017-12-28 2018-06-15 深圳市泛海三江科技发展有限公司 A kind of personnel management system
CN108600700A (en) * 2018-04-25 2018-09-28 北京市电话工程有限公司 A kind of cell video monitoring system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111860345A (en) * 2020-07-22 2020-10-30 海尔优家智能科技(北京)有限公司 Method and device for determining object position, storage medium and electronic device
CN112037206A (en) * 2020-09-01 2020-12-04 成都睿畜电子科技有限公司 Target characteristic data calculation method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN111209769B (en) 2024-03-08

Similar Documents

Publication Publication Date Title
US20220004742A1 (en) Method for face recognition, electronic equipment, and storage medium
CN109658572B (en) Image processing method and device, electronic equipment and storage medium
CN110942036B (en) Person identification method and device, electronic equipment and storage medium
CN110569777B (en) Image processing method and device, electronic device and storage medium
CN111222404A (en) Method, device and system for detecting co-pedestrian, electronic equipment and storage medium
CN110675539B (en) Identity verification method and device, electronic equipment and storage medium
CN110837512A (en) Visitor information management method and device, electronic equipment and storage medium
CN104008348A (en) Application program control method, application program control device and terminal
CN110992562A (en) Access control method and device, electronic equipment and storage medium
CN106331761A (en) Live broadcast list display method and apparatuses
WO2022227562A1 (en) Identity recognition method and apparatus, and electronic device, storage medium and computer program product
CN110555930B (en) Door lock control method and device, electronic equipment and storage medium
US10515224B2 (en) Method, device and storage medium for printing information
CN106020587A (en) Method and device for message display
CN106919629A (en) The method and device of information sifting is realized in group chat
CN109544716A (en) Student registers method and device, electronic equipment and storage medium
CN114648796A (en) User identification method, device, storage medium and electronic equipment
CN112101216A (en) Face recognition method, device, equipment and storage medium
CN111209769B (en) Authentication system and method, electronic device and storage medium
CN113791408B (en) Method, device and storage medium for indoor positioning target object
CN110781842A (en) Image processing method and device, electronic equipment and storage medium
CN111027812A (en) Person identification method, person identification system, and computer-readable storage medium
CN111209768A (en) Identity authentication system and method, electronic device, and storage medium
CN111753611A (en) Image detection method, device and system, electronic equipment and storage medium
CN110609933A (en) Image processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant