CN111882739B - Entrance guard verification method, entrance guard device, server and system - Google Patents

Entrance guard verification method, entrance guard device, server and system Download PDF

Info

Publication number
CN111882739B
CN111882739B CN202010703835.9A CN202010703835A CN111882739B CN 111882739 B CN111882739 B CN 111882739B CN 202010703835 A CN202010703835 A CN 202010703835A CN 111882739 B CN111882739 B CN 111882739B
Authority
CN
China
Prior art keywords
information
verification
user
server
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010703835.9A
Other languages
Chinese (zh)
Other versions
CN111882739A (en
Inventor
林跃东
宁博
冯智斌
匡霁玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010703835.9A priority Critical patent/CN111882739B/en
Publication of CN111882739A publication Critical patent/CN111882739A/en
Application granted granted Critical
Publication of CN111882739B publication Critical patent/CN111882739B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Abstract

The invention discloses an access control verification method, an access control device, a server and a system, wherein the method comprises the following steps: responding to the user entering the effective area, and sending verification starting information to the server; receiving verification information from a server, and prompting a user to perform verification operation by voice; acquiring video information and audio information of user verification operation; sending the acquired video information and audio information to a server so that the server can verify the video information and the audio information conveniently; and receiving the video information and/or audio information verification success information from the server, and performing corresponding authorization operation on the user. The invention can improve the safety of the access control system.

Description

Entrance guard verification method, entrance guard device, server and system
Technical Field
The invention relates to the field of access control systems, in particular to an access control verification method, an access control device, a server and a system.
Background
In the current information-based society, an access control system plays a vital role in the safety management of a vault, a house, a factory building and a park. At present, an access control system generally using a traditional password and a single biological feature (fingerprint or human face) identification technology is limited by inherent limitations of the access control system, cannot well guarantee personal identity information security, and is easy to attack and steal when the access control system uses a fixed single mode, so that the security of the access control system is damaged.
Disclosure of Invention
In view of the above, the present invention provides an access verification method, an access device, a server and a system to solve at least one of the above problems.
According to a first aspect of the present invention, there is provided an access control verification method, the method comprising:
responding to the user entering the effective area, and sending verification starting information to the server;
receiving verification information from the server, and prompting a user to perform verification operation by voice;
acquiring video information and audio information of user verification operation;
sending the acquired video information and audio information to the server so that the server can verify the video information and the audio information;
and receiving the video information and/or audio information verification success information from the server, and performing corresponding authorization operation on the user.
According to a second aspect of the present invention, there is provided an access control verification method, the method comprising:
responding to the received verification starting information from the access control device, generating verification information, and sending the verification information to the access control device so as to facilitate the user to carry out verification operation;
receiving video information and audio information from the access control device;
respectively identifying the video information and the audio information according to the pre-stored face-voiceprint information so as to verify the video information and the audio information;
and responding to the successful verification of the video information and/or the audio information, and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user.
According to a third aspect of the present invention, there is provided an access control apparatus, the apparatus comprising:
the starting information sending unit is used for responding to the fact that the user enters the effective area and sending verification starting information to the server;
an authentication information receiving unit for receiving authentication information from the server;
the voice unit is used for prompting the user to carry out verification operation by voice;
the user information acquisition unit is used for acquiring video information and audio information of user authentication operation;
the user information sending unit is used for sending the acquired video information and audio information to the server so as to be convenient for the server to verify the video information and the audio information;
and the authorization unit is used for receiving the video information and/or audio information verification success information from the server and carrying out corresponding authorization operation on the user.
According to a fourth aspect of the present invention, there is provided a server comprising:
the system comprises a verification information generating and sending unit, a verification starting unit and a verification information receiving unit, wherein the verification information generating and sending unit is used for responding to received verification starting information from the access control device, generating verification information and sending the verification information to the access control device so as to facilitate a user to carry out verification operation;
the user information receiving unit is used for receiving video information and audio information from the access control device;
the identification unit is used for respectively identifying the video information and the audio information according to the pre-stored face-voiceprint information so as to verify the video information and the audio information;
and the authorization instruction sending unit is used for responding to the successful verification of the video information and/or the audio information and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user.
According to a fifth aspect of the present invention, there is provided an access control system, the system comprising: the access control device and the server are provided.
According to a sixth aspect of the present invention, there is provided an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the program.
According to a seventh aspect of the invention, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method described above.
According to the technical scheme, when a user enters the effective area, the verification starting information is sent to the server, then the user is prompted by voice to perform verification operation according to the received verification information from the server, then the video information and the audio information of the user verification operation are obtained and sent to the server, so that the server can conveniently verify the video information and the audio information, and when the video information and/or the audio information are verified successfully, corresponding authorization operation is performed on the user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a block diagram illustrating an access control system according to an embodiment of the present invention;
fig. 2 is a block diagram of the door control device 1 according to the embodiment of the present invention;
fig. 3 is a block diagram of the structure of the server 2 according to the embodiment of the present invention;
FIG. 4 is a block diagram of a bimodal security access control system based on face and voice print recognition according to an embodiment of the present invention;
FIG. 5 is a flow chart of the operational principle of the exemplary system based on FIG. 4 according to an embodiment of the present invention;
fig. 6 is a flowchart of a method for verifying access control according to an embodiment of the present invention;
fig. 7 is another flowchart of a method for authenticating a door access according to an embodiment of the present invention;
fig. 8 is a schematic block diagram of a system configuration of an electronic apparatus 600 according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Because the security of the access control system based on the traditional password or based on single biological feature recognition is low, the embodiment of the invention provides the access control system based on the fact that the system identifies and verifies the user based on the face and the voiceprint, thereby improving the security of the access control system. Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Fig. 1 is a block diagram of an access control system according to an embodiment of the present invention, and as shown in fig. 1, the access control system includes: the system comprises an access control device 1 and a server 2, wherein when a user is located in an effective area, the access control device sends verification starting information to the server, the server generates and sends verification information to the access control device, the access control device prompts the user to perform verification operation through voice, then video information and audio information of the user in the verification operation process are obtained and sent to the server, and after the server verifies the video information and the audio information, an authorization instruction is sent to the access control device according to a verification result so as to perform corresponding authorization operation on the user.
Compared with the single biological characteristic identification technology in the prior art, the embodiment of the invention combines the video information and the audio information for identification, thereby improving the safety of the access control system.
The access control device and the server are described in detail below.
Fig. 2 is a block diagram of the door lock device 1, and as shown in fig. 2, the door lock device 1 includes: a start information transmitting unit 11, an authentication information receiving unit 12, a voice unit 13, a user information acquiring unit 14, a user information transmitting unit 15, and an authorization unit 16, wherein:
and a start information transmitting unit 11 for transmitting the authentication start information to the server in response to the user entering the valid area.
An authentication information receiving unit 12 for receiving authentication information from the server.
And the voice unit 13 is used for prompting the user to perform verification operation by voice.
In practice, the verification information may be a random number (nonce) generated by the server, and the speech unit 13 may voice prompt the user to read the random number.
A user information obtaining unit 14 for obtaining video information and audio information of the user authentication operation.
And the user information sending unit 15 is used for sending the acquired video information and audio information to the server so as to be verified by the server.
Specifically, the verification of the video information comprises the operations of identifying and verifying a face image in the video information.
And the authorization unit 16 receives the video information and/or audio information verification success information from the server, and performs corresponding authorization operation on the user.
When a user enters an effective area, the starting information sending unit 11 sends verification starting information to the server, then the voice unit 13 prompts the user to perform verification operation according to the verification information from the server received by the verification information receiving unit 12 in a voice mode, then the user information sending unit 15 sends video information and audio information of the user verification operation acquired by the user information acquiring unit 14 to the server so that the server can verify the video information and the audio information, and when the video information and the audio information are verified successfully, the authorization unit 14 performs corresponding authorization operation on the user.
In practical operation, above-mentioned entrance guard's device still includes: and the shooting unit is used for shooting the effective area so as to monitor whether a user enters the effective area.
Fig. 3 is a block diagram of the server 2, and as shown in fig. 3, the server 2 includes: an authentication information generation transmitting unit 21, a user information receiving unit 22, an identification unit 23, and an authorization instruction transmitting unit 24, wherein:
the authentication information generation and transmission unit 21 is configured to generate authentication information in response to receiving authentication start information from the access control device, and transmit the authentication information to the access control device, so that a user performs an authentication operation. The authentication information here may be the random code described above.
And the user information receiving unit 22 is used for receiving the video information and the audio information from the entrance guard device.
The recognition unit 23 is configured to recognize the video information and the audio information according to pre-stored face-voiceprint information (e.g., a face library, a voiceprint library) to verify the video information and the audio information, respectively.
Specifically, the identification unit 23 may include: the device comprises a feature extraction module and an identification module, wherein:
the characteristic extraction module is used for extracting a face image in the video information and extracting voiceprint information in the audio information;
and the recognition module is used for respectively recognizing the face image and the voiceprint information according to the pre-stored face-voiceprint information.
And the authorization instruction sending unit 24 is configured to send an authorization instruction to the access control device in response to that the video information and/or the audio information is successfully verified, so as to perform a corresponding authorization operation on the user.
Compared with the single biological characteristic identification technology in the prior art, the embodiment of the invention can improve the safety of the access control system by identifying the video information and the audio information received by the user information receiving unit 22 through the identification unit 23 and authorizing the user based on the identification result.
In practical operation, the server may further include: a selection unit configured to select to verify the video information or the audio information according to a generated random number (e.g., the random code described above) based on a predetermined random number rule.
The predetermined random number rule here may be that different random numbers correspond to different identification verification rules, for example, the random number a only needs to identify and verify the video information, the random number B only needs to identify and verify the audio information, and the random number C needs to identify and verify both the video information and the audio information. Here A, B and C may also represent random number types.
Through the selection unit, the user video information and/or the user audio information can be randomly selected to be identified and verified, and the safety of the access control system can be further improved.
In practical operation, the units and the modules may be combined or may be singly arranged, and the present invention is not limited thereto.
For further understanding of the present invention, the following describes an embodiment of the present invention in detail with reference to the exemplary architecture of the door access system shown in fig. 4.
Fig. 4 is a block diagram of a dual-mode security access control system based on face and voice print recognition according to an embodiment of the present invention, and as shown in fig. 4, the system includes: a general control system module 1 (for convenience of display, two characters of a "module" are not shown in fig. 4, and other modules are similar to the following modules), a control bus module 2, a display screen module 3, an audio acquisition module 4, a video acquisition module 5, a voice prompt module 6, a camera monitoring module 7, a random number generation module 8, a voiceprint recognition module 9, a video biopsy module 10, a face recognition module 11, a bimodal fusion module 12, a bimodal decision module 13, a voiceprint library 14 and a face library 15. The master control system module 1 transmits information and instructions with other modules through a control bus. The modules are described in detail below.
The master control system module: and the system is responsible for controlling instruction issue and information processing of the bimodal security access control system.
A control bus module: and the system is responsible for transmitting instructions of the bimodal security access control system, voiceprints (acquired from audio), videos, face images (acquired from videos), bimodal fusion results, bimodal decision results and other information.
A display screen module: and the system is responsible for displaying information such as operation prompt, random number, access control processing result and the like of the bimodal security access control system.
The audio acquisition module: and receiving an audio acquisition instruction transmitted by the control bus, acquiring the audio information of the field user, and transmitting the audio information to the voiceprint recognition module through the control bus module.
The video acquisition module: and receiving a video acquisition instruction transmitted by the control bus module, acquiring a field user video, and transmitting the video to the video biopsy module for processing through the control bus module.
The voice prompt module: and receiving prompt information transmitted by the control bus module, and reminding a field user in a voice mode.
Camera monitor module: and the monitoring system is responsible for monitoring whether a user enters an effective area or not and transmitting a monitoring result to the master control system module through the control bus module.
A random number generation module: receiving a random number generating instruction transmitted by the control bus module, generating 5 to 10 bits of random numbers by using the current time as a random number generating seed, and transmitting the random numbers to the display screen module and the bimodal decision module through the control bus module.
A voiceprint recognition module: and receiving audio information acquired by the audio acquisition module, extracting user voiceprint characteristics from the audio information, and identifying the user identity from a voiceprint library through a voiceprint identification technology.
A video biopsy module: the method comprises the steps of receiving a video acquired by a video acquisition module, detecting the activity of a current user from the video, namely judging whether the user operates on site or not, and acquiring a user face picture (or called a face image) with optimal quality in the process of operating on site.
A face recognition module: and receiving the face picture of the user acquired by the video biopsy module, and identifying the identity of the user from a face library.
It should be noted that, in this document, the processes of acquiring a face image from video information, and identifying and verifying the face image and the voiceprint may adopt the techniques in the prior art, and the present invention is not limited thereto.
A bimodal fusion module: and receiving and fusing the processing results of the voiceprint recognition module, the video biopsy module and the face recognition module, and outputting a recognition result which comprises whether the recognition is successful and the recognized user information.
A bimodal decision module: and receiving the result of the bimodal fusion module, carrying out verification decision by combining random numbers, judging whether the user has access control authority, and feeding back the final decision result to the master control system module.
Voiceprint library: and storing the voiceprint characteristic information of the user of the security access control system.
Face library: and storing the face feature information of the user of the security access control system.
Fig. 5 is a flow chart of the operation principle of the system illustrated in fig. 4, and as shown in fig. 5, the flow chart includes:
step 501: the camera monitors an effective operation area;
step 502: judging whether the user reaches the effective operation area, if not, continuing to step 501, otherwise, performing step 503;
step 503: informing a master control system module that a user reaches an effective area;
step 504: the master control system module informs the random number generation module of processing;
step 505: the random number generation module generates 5-10 bit random numbers;
step 506: the master control system module drives the display screen and the voice prompt module through the control bus module to prompt a user to face the display screen and read out the random number; specifically, the random number can be displayed through a display screen and played to a user through a loudspeaker, and the user reads the random number facing to the camera;
step 507: the video acquisition module acquires a video operated by a user and acquires audio information at the same time;
step 508: distributing the collected information to a voiceprint recognition and video biopsy module for processing;
step 509: judging the activity of a user and outputting a face picture with optimal quality in the operation process through a video biopsy module;
step 510: identifying a user from a face library through a face identification technology;
step 511: acquiring user information according to the user identified by the face;
step 512: identifying a user from a voiceprint library through a voiceprint identification technology;
step 513: acquiring user information according to the user identified by the voiceprint;
step 514: and (3) performing bimodal fusion processing to form a fusion result, wherein the result comprises: identifying whether the user information is successful or not and the identified user information;
step 515: performing verification decision according to the fusion result and the random number information in the step 514, selecting to verify the user according to the living body detection, the face recognition result and/or the voiceprint recognition result, and judging whether the user is legal;
step 516: identifying and legalizing the user, and authorizing the user by the security access control system;
step 517: if the living body detection fails, the user is not identified or the user is illegal, the authorization operation is illegal, and the user does not allow the authorization operation;
step 518: and finishing the flow of the bimodal security access control system, and finishing the flow.
The bimodal security access control system based on face and voiceprint recognition provided by the embodiment of the invention can solve the limitation and defect of single biological feature recognition authentication, improve the security of client identity authentication, realize non-contact recognition of a user and improve the experience of the user. Meanwhile, through a random number mechanism, the dual-mode security access control system can use 3 recognition modes of single voiceprint, single face or voiceprint and face recognition to perform recognition, and the capability of the system for resisting attacks is further enhanced.
Based on similar inventive concepts, the embodiment of the invention also provides an access control verification method, which is preferably applicable to the access control device.
Fig. 6 is a flowchart of the access authentication method, and as shown in fig. 6, the method includes:
step 601, responding to the user entering the effective area, and sending verification starting information to a server.
In one embodiment, the effective area may be monitored by an image pickup apparatus to determine whether a user enters the effective area.
Step 602, receiving the verification information from the server, and prompting the user to perform verification operation by voice.
In actual operation, the verification information may be a random code, and the verification operation is that the user reads the random code.
Step 603, obtaining video information and audio information of the user verification operation.
Step 604, sending the obtained video information and audio information to the server, so that the server can verify the video information and the audio information.
Step 605, receiving the video information and/or audio information verification success information from the server, and performing corresponding authorization operation on the user.
When a user enters an effective area, the verification starting information is sent to the server, then the user is prompted by voice to perform verification operation according to the received verification information from the server, then video information and audio information of the user verification operation are obtained and sent to the server, so that the server can conveniently verify the video information and the audio information, and when the video information and/or the audio information are verified successfully, corresponding authorization operation is performed on the user.
The embodiment of the invention also provides an access control verification method, which is preferably applicable to the server.
Fig. 7 is a flowchart of the access authentication method, and as shown in fig. 7, the method includes:
step 701, in response to receiving verification start information from the access control device, generating verification information, and sending the verification information to the access control device, so as to facilitate a user to perform verification operation. The authentication information may be a random code, and is randomly generated by the server.
Step 702, receiving video information and audio information from the access control device.
And 703, respectively identifying the video information and the audio information according to the pre-stored face-voiceprint information so as to verify the video information and the audio information.
Specifically, firstly, extracting a face image in the video information and extracting voiceprint information in the audio information; and then respectively identifying the face image and the voiceprint information according to the pre-stored face-voiceprint information.
Step 704, in response to the successful verification of the video information and/or the audio information, sending an authorization instruction to the access control device to perform corresponding authorization operation on the user.
Compared with the single biological characteristic identification technology in the prior art, the embodiment of the invention can improve the safety of the access control system by identifying the received video information and audio information of the user and authorizing the user based on the identification result.
In one embodiment, the video information or the audio information may be further verified according to the generated random number selection based on a predetermined random number rule.
The present embodiment also provides an electronic device, which may be a desktop computer, a tablet computer, a mobile terminal, and the like, but is not limited thereto. In this embodiment, the electronic device may be implemented with reference to the above method embodiment and the access control device, the server and the system embodiment, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
Fig. 8 is a schematic block diagram of a system configuration of an electronic apparatus 600 according to an embodiment of the present invention. As shown in fig. 8, the electronic device 600 may include a central processor 100 and a memory 140; the memory 140 is coupled to the central processor 100. Notably, this diagram is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the access control function may be integrated into the central processor 100. The central processor 100 may be configured to control as follows:
step 601, responding to the user entering the effective area, and sending verification starting information to the server.
Step 602, receiving the verification information from the server, and prompting the user to perform verification operation by voice.
Step 603, obtaining video information and audio information of the user verification operation.
Step 604, sending the obtained video information and audio information to the server, so that the server can verify the video information and the audio information.
Step 605, receiving the video information and/or audio information verification success information from the server, and performing corresponding authorization operation on the user.
When a user enters an effective area, the verification starting information is sent to the server, then the user is prompted by voice to perform verification operation according to the received verification information from the server, then video information and audio information of the user verification operation are obtained and sent to the server, so that the server can conveniently verify the video information and the audio information, and when the video information and/or the audio information are verified successfully, corresponding authorization operation is performed on the user.
In another embodiment, the access control device, the server and the system may be configured separately from the central processing unit 100, for example, the access control device, the server and the system may be configured as a chip connected to the central processing unit 100, and the access control function is realized by the control of the central processing unit.
As shown in fig. 8, the electronic device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the electronic device 600 does not necessarily include all of the components shown in FIG. 8; furthermore, the electronic device 600 may also comprise components not shown in fig. 8, which may be referred to in the prior art.
As shown in fig. 8, the central processor 100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the electronic device 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the electronic device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the electronic device 600 by the central processing unit 100.
The memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by the electronic device. The driver storage portion 144 of the memory 140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging application, address book application, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, and the computer program is executed by a processor to implement the steps of the access control verification method.
In summary, the embodiments of the present invention provide a security access control system based on face and voiceprint recognition, and provide comprehensive and comprehensive identity authentication service and information security guarantee by using technologies such as random number, face video live detection, face recognition, voiceprint recognition service, and the like. Through the bimodal biological characteristic recognition technology of face video living body detection and recognition and voiceprint recognition, the safety of the access control system is improved, non-contact recognition of a user can be achieved, and the user experience is further improved.
The preferred embodiments of the present invention have been described above with reference to the accompanying drawings. The many features and advantages of the embodiments are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the embodiments which fall within the true spirit and scope thereof. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the embodiments of the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope thereof.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (11)

1. A method for verifying an access control, the method comprising:
responding to the user entering the effective area, and sending verification starting information to the server;
receiving verification information from the server, and prompting a user to perform verification operation by voice;
acquiring video information and audio information of user verification operation;
sending the acquired video information and audio information to the server so that the server can verify the video information and/or the audio information;
receiving the video information and/or audio information verification success information from the server, and performing corresponding authorization operation on the user;
wherein the verification information is a random code for instructing the server to select verification of the video information and/or the audio information based on a predetermined random number rule,
the voice prompting of the user for verification operation comprises: and prompting the user to read the random code by voice.
2. The method of claim 1, further comprising:
and monitoring the effective area through the camera equipment to judge whether a user enters the effective area.
3. A method for verifying an access control, the method comprising:
responding to the received verification starting information from the access control device, generating verification information, and sending the verification information to the access control device so as to facilitate the user to carry out verification operation;
receiving video information and audio information from the access control device;
respectively identifying the video information and the audio information according to the pre-stored face-voiceprint information so as to verify the video information and the audio information;
responding to the video information and/or audio information verification success, and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user;
the verification information is a random code, the random code is used for indicating and selecting to verify the video information and/or the audio information based on a preset random number rule, and the verification operation is that a user is prompted by voice to read the random code.
4. The method of claim 3, wherein identifying the video information and the audio information respectively according to pre-stored face-voiceprint information comprises:
extracting a face image in the video information and extracting voiceprint information in the audio information;
and respectively identifying the face image and the voiceprint information according to the pre-stored face-voiceprint information.
5. An access control apparatus, the apparatus comprising:
the starting information sending unit is used for responding to the fact that the user enters the effective area and sending verification starting information to the server;
an authentication information receiving unit for receiving authentication information from the server;
the voice unit is used for prompting a user to carry out verification operation by voice;
the user information acquisition unit is used for acquiring video information and audio information of user authentication operation;
the user information sending unit is used for sending the acquired video information and audio information to the server so as to be convenient for the server to verify the video information and/or the audio information;
the authorization unit is used for receiving the video information and/or audio information verification success information from the server and carrying out corresponding authorization operation on the user;
wherein the verification information is a random code for instructing the server to select verification of the video information and/or the audio information based on a predetermined random number rule,
the speech unit is specifically configured to: and prompting the user to read the random code by voice.
6. The apparatus of claim 5, further comprising:
and the camera shooting unit is used for shooting the effective area so as to judge whether a user enters the effective area.
7. A server, characterized in that the server comprises:
the system comprises a verification information generating and sending unit, a verification starting unit and a verification information receiving unit, wherein the verification information generating and sending unit is used for responding to received verification starting information from the access control device, generating verification information and sending the verification information to the access control device so as to facilitate a user to carry out verification operation;
the user information receiving unit is used for receiving video information and audio information from the access control device;
the identification unit is used for respectively identifying the video information and the audio information according to the pre-stored face-voiceprint information so as to verify the video information and the audio information;
the authorization instruction sending unit is used for responding to the successful verification of the video information and/or the audio information and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on a user;
wherein, the verification information is a random code, the verification operation is that a voice prompts a user to read the random code, and the server further comprises:
and the selection unit is used for selecting and verifying the video information and/or the audio information according to the random number based on a preset random number rule.
8. The server according to claim 7, wherein the identifying unit includes:
the characteristic extraction module is used for extracting a face image in the video information and extracting voiceprint information in the audio information;
and the recognition module is used for respectively recognizing the face image and the voiceprint information according to the pre-stored face-voiceprint information.
9. An access control system, the system comprising: the door access device of any one of claims 5 to 6, and the server of claim 7 or 8.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any one of claims 1 to 4 when executing the program.
11. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4.
CN202010703835.9A 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system Active CN111882739B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010703835.9A CN111882739B (en) 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010703835.9A CN111882739B (en) 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system

Publications (2)

Publication Number Publication Date
CN111882739A CN111882739A (en) 2020-11-03
CN111882739B true CN111882739B (en) 2022-05-17

Family

ID=73154567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010703835.9A Active CN111882739B (en) 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system

Country Status (1)

Country Link
CN (1) CN111882739B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079398A (en) * 2021-03-26 2021-07-06 深圳创维-Rgb电子有限公司 Access control device control method and device, television and computer readable storage medium
CN114648826A (en) * 2022-03-08 2022-06-21 浙江普鲁狮电子科技有限公司 Driving system of anti-theft fingerprint lock

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017004754A1 (en) * 2015-07-03 2017-01-12 马岩 Remote meeting verification method and system
CN105160732A (en) * 2015-07-23 2015-12-16 青岛文创科技有限公司 Novel voice-based door control system having warning function
CN205314704U (en) * 2015-12-01 2016-06-15 宁波普天通信技术有限公司 Intelligence lock and system
CN106790054A (en) * 2016-12-20 2017-05-31 四川长虹电器股份有限公司 Interactive authentication system and method based on recognition of face and Application on Voiceprint Recognition
CN109754496A (en) * 2017-11-06 2019-05-14 中国电信股份有限公司 Guard method and system
CN110164001A (en) * 2019-04-04 2019-08-23 深圳市思为软件技术有限公司 Access control method, device and terminal device

Also Published As

Publication number Publication date
CN111882739A (en) 2020-11-03

Similar Documents

Publication Publication Date Title
KR100992573B1 (en) Authentication method and system using mobile terminal
US20240022572A1 (en) System and method for providing a web service using a mobile device capturing dual images
TWI660308B (en) Electronic ticket admission verification anti-counterfeiting system and method
US20130179692A1 (en) Systems and methods for three-factor authentication
US11057372B1 (en) System and method for authenticating a user to provide a web service
CN108449321B (en) Login method, server and client
CN111882739B (en) Entrance guard verification method, entrance guard device, server and system
WO2017206524A1 (en) Electronic device control method, terminal and control system
US9467860B2 (en) Wireless security configuration
CN111862432B (en) Entrance guard verification method, entrance guard device, server and system
US9461987B2 (en) Audio authentication system
CN105939197A (en) Identity authentication method and system
CN109840406B (en) Living body verification method and device and computer equipment
US10936705B2 (en) Authentication method, electronic device, and computer-readable program medium
JP2009193272A (en) Authentication system and mobile terminal
CN111917728A (en) Password verification method and device
CN106797386B (en) Security verification method and device, terminal equipment and server
CN111882740A (en) Entrance guard verification method, entrance guard device, server and system
CN111179522B (en) Self-service equipment program installation method, device and system
CN112613005A (en) Identity verification method and device
CN110612712B (en) Online verification method and system for verifying identity of object
KR100670784B1 (en) Method and apparatus for authentication of mobile phone equipped USIM card through authentication smart card
JP2000306090A (en) Device and method for authenticating individual and recording medium
CN112054997B (en) Voiceprint login authentication method and related product thereof
WO2023149510A1 (en) Authentication device, authentication support method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant