CN111882740A - Entrance guard verification method, entrance guard device, server and system - Google Patents

Entrance guard verification method, entrance guard device, server and system Download PDF

Info

Publication number
CN111882740A
CN111882740A CN202010705084.4A CN202010705084A CN111882740A CN 111882740 A CN111882740 A CN 111882740A CN 202010705084 A CN202010705084 A CN 202010705084A CN 111882740 A CN111882740 A CN 111882740A
Authority
CN
China
Prior art keywords
user
information
finger vein
fingerprint
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010705084.4A
Other languages
Chinese (zh)
Inventor
林跃东
龚小龙
唐绮雯
饶宇熹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010705084.4A priority Critical patent/CN111882740A/en
Publication of CN111882740A publication Critical patent/CN111882740A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an access control verification method, an access control device, a server and a system, wherein the method comprises the following steps: responding to the fact that the user enters the effective area, and prompting the user to perform fingerprint acquisition operation through voice; responding to the finger placement of a user, and acquiring user fingerprint information and user finger vein information; the acquired user fingerprint information and the user finger vein information are sent to a server, so that the server can verify the user fingerprint information and the user finger vein information respectively; and receiving user fingerprint information and/or user finger vein information verification success information from the server, and performing corresponding authorization operation on the user. By the invention, the safety of the access control system can be improved.

Description

Entrance guard verification method, entrance guard device, server and system
Technical Field
The invention relates to the field of access control systems, in particular to an access control verification method, an access control device, a server and a system.
Background
In the current information-based society, an access control system plays a vital role in the safety management of a vault, a house, a factory building and a park. At present, an access control system generally using a traditional password and a single biological feature (fingerprint or human face) identification technology is limited by inherent limitations of the access control system, cannot well guarantee personal identity information security, and is easy to attack and steal when the access control system uses a fixed single mode, so that the security of the access control system is damaged.
Disclosure of Invention
In view of the above, the present invention provides an access verification method, an access device, a server and a system to solve at least one of the above problems.
According to a first aspect of the present invention, there is provided an access control verification method, the method comprising:
responding to the fact that the user enters the effective area, and prompting the user to perform fingerprint acquisition operation through voice;
responding to the finger placement of a user, and acquiring user fingerprint information and user finger vein information;
the acquired user fingerprint information and user finger vein information are sent to a server, so that the server can verify the user fingerprint information and the user finger vein information respectively;
and receiving the user fingerprint information and/or user finger vein information verification success information from the server, and performing corresponding authorization operation on the user.
According to a second aspect of the present invention, there is provided an access control verification method, the method comprising:
receiving user fingerprint information and user finger vein information from an access control device;
respectively identifying the user fingerprint information and the user finger vein information according to prestored fingerprint-finger vein information so as to verify the user fingerprint information and the user finger vein information;
and responding to the successful verification of the user fingerprint information and/or the user finger vein information, and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user.
According to a third aspect of the present invention, there is provided an access control apparatus comprising:
the voice unit is used for responding to the fact that a user enters the effective area and prompting the user to perform fingerprint acquisition operation through voice;
the information acquisition unit is used for responding to the finger put by the user and acquiring the fingerprint information and the finger vein information of the user;
the information sending unit is used for sending the acquired user fingerprint information and the user finger vein information to the server so as to be convenient for the server to respectively verify the user fingerprint information and the user finger vein information;
and the authorization unit is used for receiving the user fingerprint information and/or user finger vein information verification success information from the server and carrying out corresponding authorization operation on the user.
According to a fourth aspect of the present invention, there is provided a server comprising:
the information receiving unit is used for receiving user fingerprint information and user finger vein information from the access control device;
the identification unit is used for respectively identifying the user fingerprint information and the user finger vein information according to the pre-stored fingerprint-finger vein information so as to verify the user fingerprint information and the user finger vein information;
and the authorization instruction sending unit is used for responding to the successful verification of the user fingerprint information and/or the user finger vein information and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user.
According to a fifth aspect of the present invention, there is provided an access control system, the system comprising: the access control device and the server are provided.
According to a sixth aspect of the present invention, there is provided an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the program.
According to a seventh aspect of the present invention, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above method.
According to the technical scheme, when a user enters an effective area, the user is prompted to conduct fingerprint collection operation through voice, when the user puts a finger, user fingerprint information and user finger vein information are collected and obtained, then the obtained user fingerprint information and the obtained user finger vein information are sent to the server, so that the server can conveniently verify the user fingerprint information and the user finger vein information respectively, when the user fingerprint information and/or the user finger vein information are verified successfully, corresponding authorization operation is conducted on the user, compared with the single biological characteristic identification technology in the prior art, the technical scheme combines the fingerprint information and the finger vein information for identification, and safety of the access control system is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a block diagram illustrating an access control system according to an embodiment of the present invention;
fig. 2 is a block diagram of the door control device 1 according to the embodiment of the present invention;
fig. 3 is a block diagram of the structure of the server 2 according to the embodiment of the present invention;
fig. 4 is a detailed configuration block diagram of the server 2 according to an embodiment of the present invention;
FIG. 5 is a block diagram of an exemplary structure of a dual-mode security access control system based on fingerprint and finger vein recognition according to an embodiment of the present invention;
FIG. 6 is a flow chart based on the system of FIG. 5;
FIG. 7 is a flowchart of a method for verifying access control according to an embodiment of the present invention;
fig. 8 is another flowchart of a door access verification method according to an embodiment of the present invention;
fig. 9 is a schematic block diagram of a system configuration of an electronic apparatus 600 according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Because the security of the access control system based on the traditional password or based on single biological characteristic identification is low, the embodiment of the invention provides the access control system which can identify and verify the user by combining the fingerprint and the finger vein, thereby improving the security of the access control system. Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Fig. 1 is a block diagram of an access control system according to an embodiment of the present invention, and as shown in fig. 1, the access control system includes: the system comprises an access control device 1 and a server 2, wherein the access control device is used for acquiring fingerprint information and finger vein information of a user and sending the fingerprint information and the finger vein information to the server, and after the fingerprint information and the finger vein information are verified by the server, an authorization instruction is sent to the access control device according to a verification result so as to perform corresponding authorization operation on the user. Compared with the single biological characteristic identification technology in the prior art, the access control system provided by the embodiment of the invention is identified by combining the fingerprint information and the finger vein information, so that the safety of the access control system is improved.
The access control device and the server are described in detail below.
Fig. 2 is a block diagram of the door lock device 1, and as shown in fig. 2, the door lock device 1 includes: speech unit 11, information acquisition unit 12, information transmission unit 13 and authorization unit 14, wherein:
the voice unit 11 is used for responding to the fact that a user enters the effective area and prompting the user to perform fingerprint acquisition operation through voice;
an information acquisition unit 12 for acquiring user fingerprint information and user finger vein information in response to a user putting a finger;
the information sending unit 13 is configured to send the acquired user fingerprint information and user finger vein information to a server, so that the server can verify the user fingerprint information and the user finger vein information respectively;
and the authorization unit 14 is used for receiving the user fingerprint information and/or user finger vein information verification success information from the server and performing corresponding authorization operation on the user.
When a user enters an effective area, the voice unit 11 prompts the user to perform fingerprint acquisition operation, when the user puts a finger, the information acquisition unit 12 acquires user fingerprint information and user finger vein information, then the information transmission unit 13 transmits the acquired user fingerprint information and user finger vein information to the server, so that the server can verify the user fingerprint information and the user finger vein information respectively, and when the user fingerprint information and/or the user finger vein information are verified successfully, the authorization unit 14 performs corresponding authorization operation on the user.
In practical operation, above-mentioned entrance guard's device still includes: and the camera device is used for shooting the effective area so as to monitor whether a user enters the effective area.
Fig. 3 is a block diagram of the server 2, and as shown in fig. 3, the server 2 includes: an information receiving unit 21, an identification unit 22, and an authorization instruction transmitting unit 23, wherein:
an information receiving unit 21 for receiving user fingerprint information and user finger vein information from the door access device;
an identifying unit 22, configured to respectively identify the user fingerprint information and the user finger vein information according to pre-stored fingerprint-finger vein information (e.g., fingerprint library, finger vein library) to verify the user fingerprint information and the user finger vein information;
and the authorization instruction sending unit 23 is configured to send an authorization instruction to the access control device in response to that the user fingerprint information and/or the user finger vein information are successfully verified, so as to perform corresponding authorization operation on the user.
Compared with the single biological characteristic identification technology in the prior art, the embodiment of the invention can improve the safety of the access control system.
Preferably, as shown in fig. 4, the server 2 may further include: a random number generation unit 24 and a selection unit 25, wherein:
a random number generation unit 24 for generating a random number in response to receiving information that the user has entered the effective area;
and a selecting unit 25, configured to select, based on a random number predetermined rule, to verify the user fingerprint information or the user finger vein information according to the generated random number. The predetermined random number rule may be that different random numbers correspond to different identification and verification rules, for example, the random number a only needs to identify and verify fingerprint information, the random number B only needs to identify and verify finger vein information, and the random number C needs to identify and verify fingerprint information and finger vein information at the same time. Here A, B and C may also represent random number types.
Through the random number generation unit 24 and the selection unit 25, the user fingerprint information and/or the user finger vein information can be randomly selected to be identified and verified, and the safety of the access control system can be further improved.
In practical operation, the units may be arranged in combination or in a single arrangement, and the present invention is not limited thereto.
For a better understanding of the present invention, embodiments of the present invention are described in detail below in conjunction with the exemplary framework of a system illustrated in FIG. 5.
Fig. 5 is a block diagram of an exemplary structure of a dual-mode security access control system based on fingerprint and finger vein recognition according to an embodiment of the present invention, and as shown in fig. 5, the system includes: the system comprises a master control system module 1, a control bus module 2, a display screen module 3, a fingerprint acquisition module 4, a finger vein acquisition module 5, a voice prompt module 6, a camera monitoring module 7, a random number generation module 8, a fingerprint identification module 9, a finger vein identification module 10, a bimodal fusion module 11, a bimodal decision module 12, a fingerprint library 13 and a finger vein library 14. The master control system module 1 transmits information and instructions with other modules through a control bus. Each module is described in detail below.
The master control system module: and the system is responsible for controlling instruction issue and information processing of the bimodal security access control system.
A control bus module: and the system is responsible for transmitting instructions, finger veins, videos, fingerprint photos, bimodal fusion results, bimodal decision results and other information of the bimodal security access control system.
A display screen module: and the system is responsible for displaying information such as operation prompt, access control processing result and the like of the bimodal security access control system.
Fingerprint collection module: and receiving a control bus to transmit a fingerprint acquisition instruction, acquiring fingerprint information of a field user, and transmitting the fingerprint information to the fingerprint identification module through the control bus module.
The finger vein collection module: and receiving a finger vein acquisition instruction transmitted by the control bus module, acquiring a finger vein of a field user, and transmitting the finger vein acquisition instruction to the finger vein identification module for processing through the control bus module.
The voice prompt module: and receiving prompt information transmitted by the control bus module, and reminding a field user to place a finger into the fingerprint/finger vein acquisition instrument in a voice mode.
Camera monitor module: and the monitoring system is responsible for monitoring whether a user enters an effective area or not and transmitting a monitoring result to the master control system module through the control bus module.
A random number generation module: receiving a random number generating instruction transmitted by the control bus module, generating a random number with 5 to 10 bits by using the current time as a random number generating seed, and transmitting the random number to the bimodal decision module through the control bus module. The random number is used to specify the result of the processing by the fingerprint recognition module and/or the finger vein recognition module to authenticate the user.
Fingerprint identification module: and receiving fingerprint information acquired by the fingerprint acquisition module, extracting fingerprint characteristics of the user, and identifying the identity of the user from a fingerprint library by a fingerprint identification technology.
Finger vein identification module: and receiving the user finger vein information acquired by the finger vein acquisition module, extracting the user finger vein characteristics, and identifying the user identity from a finger vein library by a finger vein identification technology.
It should be noted that the fingerprint and finger vein collection and identification process in this document may adopt the technology in the prior art, and the present invention is not limited thereto.
A bimodal fusion module: and receiving and fusing the processing results of the fingerprint identification module and the finger vein identification module, and outputting whether the identification result is successful and the identified user information.
A bimodal decision module: and receiving the result of the bimodal fusion module, making a decision by combining random numbers, judging whether the user has access control authority, and feeding back the final decision result to the master control system module.
Fingerprint database: and storing the user fingerprint characteristic information of the security access control system.
Finger vein bank: and storing the finger vein characteristic information of the user of the security access control system.
Fig. 6 is a flow chart based on the system shown in fig. 5, and as shown in fig. 6, the flow chart comprises:
step 601: the camera monitors an effective operation area;
step 602: determine if the user has reached the valid operating region? If the user does not reach the effective operation area, continuing to step 601, otherwise, performing step 603;
step 603: informing a master control system module that a user reaches an effective area;
step 604: the master control system module informs the random number generation module of processing;
step 605: the random number generation module generates 5-10 bit random numbers;
step 606: the master control system module drives the display screen and the voice prompt module through the control bus to prompt a user to face the display screen and put fingers in for collection;
step 607: the fingerprint acquisition module acquires user fingerprint information, and the finger vein acquisition module acquires user finger vein information;
step 608: the collected information is distributed to a fingerprint identification module and a finger vein identification module for processing;
step 609: identifying a user from a fingerprint database through a fingerprint identification technology;
step 610: acquiring user information according to the user identified by the fingerprint;
step 611: identifying a user from a finger vein bank through a finger vein identification technology;
step 612: acquiring user information according to the user identified by the finger vein;
step 613: and (3) performing bimodal fusion treatment to form a fusion result: whether the identification is successful or not and the identified user information;
step 614: making a decision according to the fusion result and the random number information in the step 613, verifying the user according to the fingerprint identification result and/or the finger vein identification result, and judging whether the user is legal;
step 615: identifying and legalizing the user, and authorizing the user by the security access control system;
step 616: if the user is not identified or the user is illegal, the operation is illegal, and the user does not allow the operation;
step 617: and finishing the flow of the bimodal security access control system, and finishing the flow.
The dual-mode security access control system based on fingerprint and finger vein recognition provided by the embodiment of the invention can solve the limitation and defect of single biological characteristic recognition and authentication and improve the security of client identity authentication. In addition, through a random number mechanism, the dual-mode security access control system can use 3 identification modes of single finger vein, single fingerprint or finger vein and fingerprint identification for identification, and the capability of the access control system for resisting attacks is further enhanced.
Based on similar inventive concepts, the embodiment of the invention also provides an access control verification method, which is preferably applicable to the access control device.
Fig. 7 is a flowchart of the access authentication method, and as shown in fig. 7, the method includes:
step 701, responding to the fact that a user enters an effective area, and prompting the user to perform fingerprint acquisition operation through voice;
step 702, responding to the finger put in by the user, and acquiring the fingerprint information and the finger vein information of the user;
step 703, sending the acquired user fingerprint information and user finger vein information to a server, so that the server can verify the user fingerprint information and the user finger vein information respectively;
step 704, receiving the user fingerprint information and/or user finger vein information verification success information from the server, and performing corresponding authorization operation on the user.
In actual operation, the effective area can be monitored through the camera device to judge whether a user enters the effective area.
When a user enters an effective area, the voice prompts the user to perform fingerprint acquisition operation, when the user puts a finger, user fingerprint information and user finger vein information are acquired and acquired, then the acquired user fingerprint information and user finger vein information are sent to the server, so that the server can verify the user fingerprint information and the user finger vein information respectively, and when the user fingerprint information and/or the user finger vein information are verified successfully, the corresponding authorization operation is performed on the user.
The embodiment of the invention also provides an access control verification method, which is preferably applicable to the server.
Fig. 8 is a flowchart of the access authentication method, and as shown in fig. 8, the method includes:
step 801, receiving user fingerprint information and user finger vein information from an access control device;
step 802, respectively identifying the user fingerprint information and the user finger vein information according to pre-stored fingerprint-finger vein information so as to verify the user fingerprint information and the user finger vein information;
and 803, responding to the successful verification of the user fingerprint information and/or the user finger vein information, and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user.
Compared with the single biological characteristic identification technology in the prior art, the embodiment of the invention can improve the safety of the access control system.
Preferably, when receiving the information that the user has entered the valid area, a random number may be generated; and then based on a preset random number rule, selecting to verify the user fingerprint information or the user finger vein information according to the generated random number. The predetermined random number rule may be that different random numbers correspond to different identification and verification rules, for example, only fingerprint information needs to be identified and verified, only finger vein information needs to be identified and verified, or both fingerprint information and finger vein information need to be identified and verified.
Through the random number, the fingerprint information and/or the finger vein information of the user can be randomly selected to be identified and verified, and the safety of the access control system can be further improved.
The present embodiment also provides an electronic device, which may be a desktop computer, a tablet computer, a mobile terminal, and the like, but is not limited thereto. In this embodiment, the electronic device may be implemented with reference to the above method embodiment and the access control device, the server and the system embodiment, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
Fig. 9 is a schematic block diagram of a system configuration of an electronic apparatus 600 according to an embodiment of the present invention. As shown in fig. 9, the electronic device 600 may include a central processor 100 and a memory 140; the memory 140 is coupled to the central processor 100. Notably, this diagram is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the access control function may be integrated into the central processor 100. The central processor 100 may be configured to control as follows:
step 701, responding to the fact that a user enters an effective area, and prompting the user to perform fingerprint acquisition operation through voice;
step 702, responding to the finger put in by the user, and acquiring the fingerprint information and the finger vein information of the user;
step 703, sending the acquired user fingerprint information and user finger vein information to a server, so that the server can verify the user fingerprint information and the user finger vein information respectively;
step 704, receiving the user fingerprint information and/or user finger vein information verification success information from the server, and performing corresponding authorization operation on the user.
When a user enters an effective area, the voice prompts the user to perform fingerprint acquisition operation, when the user puts a finger, user fingerprint information and user finger vein information are acquired and acquired, then the acquired user fingerprint information and user finger vein information are sent to the server, so that the server can verify the user fingerprint information and the user finger vein information respectively, and when the user fingerprint information and/or the user finger vein information are verified successfully, the corresponding authorization operation is performed on the user.
In another embodiment, the access control device, the server and the system may be configured separately from the central processing unit 100, for example, the access control device, the server and the system may be configured as a chip connected to the central processing unit 100, and the access control function is realized by the control of the central processing unit.
As shown in fig. 9, the electronic device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the electronic device 600 does not necessarily include all of the components shown in FIG. 9; furthermore, the electronic device 600 may also comprise components not shown in fig. 9, which may be referred to in the prior art.
As shown in fig. 9, the central processor 100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the electronic device 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the electronic device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the electronic device 600 by the central processing unit 100.
The memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by the electronic device. The driver storage portion 144 of the memory 140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging application, address book application, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
Embodiments of the present invention also provide a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of the above-mentioned method.
In summary, the embodiments of the present invention provide a security access control system based on fingerprint and finger vein recognition, which provides comprehensive and comprehensive identity authentication service and information security guarantee for customers by using technical methods such as random number, fingerprint video biopsy, fingerprint recognition, finger vein recognition service, and the like. The embodiment of the invention improves the safety of the access control system by a dual-mode biological characteristic identification technology of fingerprint video living body detection and identification and finger vein identification.
The preferred embodiments of the present invention have been described above with reference to the accompanying drawings. The many features and advantages of the embodiments are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the embodiments which fall within the true spirit and scope thereof. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the embodiments of the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope thereof.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (11)

1. A method for verifying an access control, the method comprising:
responding to the fact that the user enters the effective area, and prompting the user to perform fingerprint acquisition operation through voice;
responding to the finger placement of a user, and acquiring user fingerprint information and user finger vein information;
the acquired user fingerprint information and user finger vein information are sent to a server, so that the server can verify the user fingerprint information and the user finger vein information respectively;
and receiving the user fingerprint information and/or user finger vein information verification success information from the server, and performing corresponding authorization operation on the user.
2. The method of claim 1, further comprising:
and monitoring the effective area through the camera equipment to judge whether a user enters the effective area.
3. A method for verifying an access control, the method comprising:
receiving user fingerprint information and user finger vein information from an access control device;
respectively identifying the user fingerprint information and the user finger vein information according to prestored fingerprint-finger vein information so as to verify the user fingerprint information and the user finger vein information;
and responding to the successful verification of the user fingerprint information and/or the user finger vein information, and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user.
4. The method of claim 3, further comprising:
generating a random number in response to receiving information that a user has entered a valid area;
and based on a preset random number rule, selecting to verify the user fingerprint information or the user finger vein information according to the generated random number.
5. An access control device, characterized in that, access control device includes:
the voice unit is used for responding to the fact that a user enters the effective area and prompting the user to perform fingerprint acquisition operation through voice;
the information acquisition unit is used for responding to the finger put by the user and acquiring the fingerprint information and the finger vein information of the user;
the information sending unit is used for sending the acquired user fingerprint information and the user finger vein information to the server so as to be convenient for the server to respectively verify the user fingerprint information and the user finger vein information;
and the authorization unit is used for receiving the user fingerprint information and/or user finger vein information verification success information from the server and carrying out corresponding authorization operation on the user.
6. The apparatus of claim 5, further comprising:
and the camera device is used for shooting the effective area so as to monitor whether a user enters the effective area.
7. A server, characterized in that the server comprises:
the information receiving unit is used for receiving user fingerprint information and user finger vein information from the access control device;
the identification unit is used for respectively identifying the user fingerprint information and the user finger vein information according to the pre-stored fingerprint-finger vein information so as to verify the user fingerprint information and the user finger vein information;
and the authorization instruction sending unit is used for responding to the successful verification of the user fingerprint information and/or the user finger vein information and sending an authorization instruction to the access control device so as to perform corresponding authorization operation on the user.
8. The server according to claim 7, wherein the server comprises:
a random number generation unit for generating a random number in response to receiving information that a user has entered an effective area;
and the selecting unit is used for selecting to verify the user fingerprint information or the user finger vein information according to the generated random number based on a random number preset rule.
9. An access control system, the system comprising: the door access device of claim 5 or 6, and the server of claim 7 or 8.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented when the processor executes the program.
11. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4.
CN202010705084.4A 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system Pending CN111882740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010705084.4A CN111882740A (en) 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010705084.4A CN111882740A (en) 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system

Publications (1)

Publication Number Publication Date
CN111882740A true CN111882740A (en) 2020-11-03

Family

ID=73156386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010705084.4A Pending CN111882740A (en) 2020-07-21 2020-07-21 Entrance guard verification method, entrance guard device, server and system

Country Status (1)

Country Link
CN (1) CN111882740A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504722A (en) * 2009-03-20 2009-08-12 公安部第一研究所 Multi-mode combined identity authentication system and method
CN104217480A (en) * 2014-08-29 2014-12-17 华南理工大学 Intelligent entrance guard system based on fingerprint and finger vein joint recognition
CN104978510A (en) * 2015-06-30 2015-10-14 大丰云润科技有限公司 Multi-mode biological characteristic authentication device and system
CN105046798A (en) * 2015-09-01 2015-11-11 四川正好科技发展有限公司 High-safety intelligent entrance guard device and control method thereof
CN105303661A (en) * 2015-11-10 2016-02-03 成都智慧数联信息技术有限公司 Intelligent community system and method based on fingerprint and finger-vein recognition
CN205230173U (en) * 2015-12-25 2016-05-11 成都工百利自动化设备有限公司 Entrance guard's device based on proximity switch
CN105654584A (en) * 2015-12-24 2016-06-08 歌尔声学股份有限公司 Access control monitoring method and system thereof
CN107170093A (en) * 2017-05-18 2017-09-15 哈尔滨工业大学(威海) Authentication gate control system
CN109635756A (en) * 2018-12-17 2019-04-16 黑龙江大学 It merges fingerprint and refers to the two dimensional code identity identifying method of vein
CN110768942A (en) * 2018-07-27 2020-02-07 深圳博科智能科技有限公司 Identity authentication system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504722A (en) * 2009-03-20 2009-08-12 公安部第一研究所 Multi-mode combined identity authentication system and method
CN104217480A (en) * 2014-08-29 2014-12-17 华南理工大学 Intelligent entrance guard system based on fingerprint and finger vein joint recognition
CN104978510A (en) * 2015-06-30 2015-10-14 大丰云润科技有限公司 Multi-mode biological characteristic authentication device and system
CN105046798A (en) * 2015-09-01 2015-11-11 四川正好科技发展有限公司 High-safety intelligent entrance guard device and control method thereof
CN105303661A (en) * 2015-11-10 2016-02-03 成都智慧数联信息技术有限公司 Intelligent community system and method based on fingerprint and finger-vein recognition
CN105654584A (en) * 2015-12-24 2016-06-08 歌尔声学股份有限公司 Access control monitoring method and system thereof
CN205230173U (en) * 2015-12-25 2016-05-11 成都工百利自动化设备有限公司 Entrance guard's device based on proximity switch
CN107170093A (en) * 2017-05-18 2017-09-15 哈尔滨工业大学(威海) Authentication gate control system
CN110768942A (en) * 2018-07-27 2020-02-07 深圳博科智能科技有限公司 Identity authentication system
CN109635756A (en) * 2018-12-17 2019-04-16 黑龙江大学 It merges fingerprint and refers to the two dimensional code identity identifying method of vein

Similar Documents

Publication Publication Date Title
US9712526B2 (en) User authentication for social networks
KR100992573B1 (en) Authentication method and system using mobile terminal
CN111862432B (en) Entrance guard verification method, entrance guard device, server and system
TWI660308B (en) Electronic ticket admission verification anti-counterfeiting system and method
US20240022572A1 (en) System and method for providing a web service using a mobile device capturing dual images
US20130179692A1 (en) Systems and methods for three-factor authentication
US11057372B1 (en) System and method for authenticating a user to provide a web service
CN108449321B (en) Login method, server and client
US9830445B1 (en) Personal identification number (PIN) replacement in a one-time passcode based two factor authentication system
CN105939197A (en) Identity authentication method and system
JP2008090712A (en) Authentication system and its method
CN111882739B (en) Entrance guard verification method, entrance guard device, server and system
US10936705B2 (en) Authentication method, electronic device, and computer-readable program medium
CN105577378A (en) Identity authentication method, apparatus, and system
KR20200006991A (en) Method, system and medium for authenticating a user using biometric signatures
CN110602700B (en) Seed key processing method and device and electronic equipment
JP2002269047A (en) Sound user authentication system
CN111882740A (en) Entrance guard verification method, entrance guard device, server and system
CN106156573A (en) A kind of method controlling intelligent terminal and the device of control intelligent terminal
CN113159785A (en) Method, device and system for remotely acquiring verification code of bank security authentication tool
WO2016112792A1 (en) Identity authentication method and device
CN112613005A (en) Identity verification method and device
CN112054997B (en) Voiceprint login authentication method and related product thereof
CN111179522A (en) Self-service equipment program installation method, device and system
KR101511378B1 (en) Data processing device and data securing method for storage device using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201103