CN114090678A - Database information management method and system - Google Patents
Database information management method and system Download PDFInfo
- Publication number
- CN114090678A CN114090678A CN202210051804.9A CN202210051804A CN114090678A CN 114090678 A CN114090678 A CN 114090678A CN 202210051804 A CN202210051804 A CN 202210051804A CN 114090678 A CN114090678 A CN 114090678A
- Authority
- CN
- China
- Prior art keywords
- information
- comparison
- verification
- database
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the application provides a database information management method and system. The method comprises the following steps: acquiring first information and second information of an object, wherein the first information and the second information belong to the same information type; acquiring auxiliary information of the object, the auxiliary information including first and second comparison information corresponding to the first and second information, respectively; and confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
Description
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a database information management method and system.
Background
With the development of computer technology, many fields need to collect, store and process data information, so that effective management of data information is particularly important. For example, information such as identification of different users can be collected and/or managed by the server, and information such as attribute, identification and the like of the article can be managed by the computer. In order to facilitate the recording and calling of information, data information is currently generally recorded and stored in a database.
Therefore, it is desirable to provide an efficient and reliable database information management method.
Disclosure of Invention
One aspect of the present application provides a database information management method. The method comprises the following steps: acquiring first information and second information of an object, wherein the first information and the second information belong to the same information type; acquiring auxiliary information of the object, the auxiliary information including first and second comparison information corresponding to the first and second information, respectively; and confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
In some embodiments, the first information and the second information are both biological information, and the first information and the second information belong to different biological information categories; confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information, comprising: acquiring a first threshold corresponding to the first information; adaptively adjusting a first threshold value based on a verification result of the second information and the second comparison information; and confirming the information record of the object in the database based on the adjusted first threshold value and the verification result of the first information and the first comparison information.
In some embodiments, the auxiliary information further includes historical verification information corresponding to the first information; the method further comprises the following steps: acquiring historical verification information corresponding to the first information; confirming the information record of the object in the database based on the historical verification information, the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
In some embodiments, confirming the information record of the object in the database based on the historical verification information, the verification result of the first information and the first comparison information, and the verification result of the second information and the second comparison information comprises: acquiring the accumulated verification failure times of the first information and the verification failure time; adaptively adjusting a first threshold corresponding to the first information based on the accumulated verification failure times, the verification failure time and the verification result of the second information and the second comparison information; and confirming the information record of the object in the database based on the adjusted first threshold value and the verification result of the first information and the first comparison information.
In some embodiments, the auxiliary information further comprises a biometric marker associated with the first information.
In some embodiments, the first information includes fingerprint information.
In some embodiments, the above method further comprises: when the object has a corresponding information record in the database, judging whether the similarity between the first information and the first comparison information is greater than a second threshold value; and replacing the first comparison information of the object in the database with the first information in response to the similarity between the first information and the first comparison information being greater than a second threshold value.
In some embodiments, the above method further comprises: and when the object has a corresponding information record in the database, updating the comprehensive information base of the object based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
In some embodiments, the first information and the second information are both attribute information, which includes a physical attribute and/or an identification attribute.
Another aspect of the present application provides a database information management system, including: the device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring first information and second information of an object, and the first information and the second information belong to the same information type; and acquiring auxiliary information of the object, the auxiliary information including first and second comparison information corresponding to the first and second information, respectively; and the information management module is used for confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
Another aspect of the present application provides a computer-readable storage medium, wherein the storage medium stores computer instructions, and when the computer reads the computer instructions in the storage medium, the computer executes the database information management method as described above.
Another aspect of the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the database information management method as described above when executing the computer program.
Drawings
The present application will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals are used to indicate like structures, wherein:
FIG. 1 is a schematic diagram of an application scenario of an exemplary database information management system, according to some embodiments of the present application;
FIG. 2 is a diagram of the hardware and/or software of an exemplary database information management system according to some embodiments of the present application;
FIG. 3 is a schematic diagram of the hardware and/or software of an exemplary computing device shown in accordance with some embodiments of the present application;
FIG. 4 is a system block diagram of an exemplary database information management system, shown in accordance with some embodiments of the present application;
FIG. 5 is a schematic flow diagram of an exemplary database information management method according to some embodiments of the present application;
FIG. 6 is a flow diagram illustrating an exemplary database information management method according to further embodiments of the present application;
FIG. 7 is a schematic diagram of an exemplary integrated arbiter, according to some embodiments of the present application.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only examples or embodiments of the application, from which the application can also be applied to other similar scenarios without inventive effort for a person skilled in the art. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
The embodiment of the application provides a database information management method, which includes the steps of obtaining first information and second information which belong to the same information type and are different in information type of an object respectively, obtaining first comparison information and second comparison information which correspond to the first information and the second information respectively, confirming information records of the object in a database based on verification results of the first information and the first comparison information and verification results of the second information and the second comparison information, identifying the object based on the information records, and further controlling related equipment.
FIG. 1 is a schematic diagram of an application scenario of an exemplary database information management system according to some embodiments of the present application.
As shown in fig. 1, the database information management scenario 100 may include: server 110, network 120, intelligent lock 130 and terminal device 140. Network 120 is used to provide a medium for communication links between server 110, smart lock 130, and end device 140. Network 120 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The server 110 may be a server providing various services, for example, the server 110 may perform verification analysis and other processing on the first information and the second information of the object in response to receiving the first information and the second information of the object sent by the smart lock 130 or the terminal device 140, obtain a verification result of the first information and the first comparison information and a verification result of the second information and the second comparison information, confirm an information record of the object in the database based on the verification result, and send the confirmation result to the smart lock 130 or the terminal device 140, so as to implement control over the smart lock 130 or the terminal device 140. As another example, the terminal device 140 may be configured to generate a remote control instruction in response to a remote target operation input by a user (i.e., an object), and transmit the remote control instruction to the server 110; the server 110 is configured to receive the remote control instruction, obtain an intelligent lock identifier corresponding to the remote control instruction, generate a remote control request, and send the remote control request and the intelligent lock identifier to the internet of things gateway, so that the internet of things gateway sends the remote control request to the intelligent lock 130 corresponding to the intelligent lock identifier.
The server 110 may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
In some embodiments, the server 110 may be located inside the smart lock 130/terminal device 140, and the smart lock 130/terminal device 140 and the server 110 are connected through an internal wired network. In some embodiments, the server 110 may also be located in the cloud and connected to the smart lock 130/the terminal device 140 through a wireless network. Some or all of the operations of some of the modules in the smart lock 130/end device 140 may be performed by the server 110.
A user may use terminal device 140 to interact with server 110 over network 120 to receive or send messages and the like. Various client applications, such as a remote control application, a social application, a music application, a video application, a financial application, etc., may be installed on the terminal device 140. In some embodiments, the network 120 may be any one of, or a combination of, a wired network or a wireless network. By way of example only, network 120 may include a cable network, a wired network, a fiber optic network, a remote communication network, an intranet, the internet, a Local Area Network (LAN), a Wide Area Network (WAN), a Wireless Local Area Network (WLAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a Public Switched Telephone Network (PSTN), a bluetooth network, a ZigBee network, a Near Field Communication (NFC) network, the like, or any combination of the above.
In some embodiments, the smart lock 130 may be used to perform the methods disclosed herein as applied to database information management. The intelligent lock 130 and the server 110 may communicate directly through the network 120 or may be connected through an internet of things gateway (not shown). For example, the smart lock 130 and the internet of things gateway may communicate with each other based on a Zigbee protocol, and the internet of things gateway and the server 110 may communicate with each other based on a cellular mobile network or a Wi-Fi network. The smart lock 130 and the terminal device 140 may also communicate with each other based on short-range wireless communication, including but not limited to bluetooth protocol communication, Near Field Communication (NFC), infrared communication, etc.
In some embodiments, the terminal device 140 may be configured to perform the methods disclosed herein as applied to database information management. The terminal device 140 may be hardware or software. When the end device 140 is hardware, it may be a variety of electronic devices with a display screen, including but not limited to a smartphone 140-1, a tablet 140-2, a laptop computer 140-3, a desktop computer, etc. When the terminal device 140 is software, it can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For convenience of understanding, in the embodiment of the present application, an example in which the database information management method is applied to an unlocking control scenario of an intelligent lock is mainly used for description. It should be noted that, in the present application, the embodiment that the database information management method is applied to the smart lock unlocking control scenario is only an example, and is not a limitation to the present application, for example, the database information management method may also be applied to the smart device identification and/or control scenario, such as a scenario of renting and returning a shared device.
FIG. 2 is a diagram of hardware and/or software of an exemplary database information management system according to some embodiments of the present application.
As shown in fig. 2, the database information management system 200 may include a sensing module 210, a processing module 220, a storage module 230, a communication module 240, a power supply module 250, and an input/output module 260.
It should be noted that the modules, units and sub-units mentioned in the present application can be implemented by hardware, software or a combination of software and hardware. The hardware implementation may include a circuit or a structure formed by solid components; the implementation of software may include storing operations corresponding to the modules, units, and sub-units in a memory in the form of codes, which are executed by appropriate hardware, such as a microprocessor. When a module, a unit or a sub-unit mentioned herein performs its operation, if not specifically stated, it may mean that software code including the function is executed or that hardware having the function is used. Meanwhile, when the modules, units and sub-units mentioned herein correspond to hardware, the structures of the corresponding hardware are not limited, and the hardware capable of realizing the functions is within the protection scope of the present application. For example, different modules, units, sub-units mentioned herein may correspond to the same hardware structure. Also for example, reference herein to the same module, unit or sub-unit may correspond to multiple separate hardware configurations.
The sensing module 210 may be used to acquire information of an object, such as fingerprint information, palm print information, vein information, and the like of a user, or attribute information of a shape, a size, and the like of an article. In some embodiments, the sensing module 210 may include a fingerprint sensor, a palm print sensor, a vein sensor, and the like. In some embodiments, the sensing module 210 may be configured to sense a state or an action performed by the smart device, such as an open state, a closed state, and other states of the smart lock. For example, the sensing module 210 may include at least one of an angle sensor, a hall sensor, a gyroscope sensor, an accelerometer, a geomagnetic sensor, and the like. In some embodiments, the sensing module 210 may also be used to identify attribute information and/or status information of the item, such as identification information, location information, closed status, and other status of the shared device. For example, the sensing module 210 may include an infrared sensor, a magnetic field sensor, a contact sensor, a vision sensor, a pressure sensor, and the like.
The processing module 220 may be used to process information and data related to the database information management system 200 to perform one or more of the functions described herein. For example, the processing module 220 may obtain first information and second information of the object, and first comparison information and second comparison information corresponding to the first information and the second information, respectively, confirm an information record of the object in the database based on a verification result of the first information and the first comparison information and a verification result of the second information and the second comparison information, and execute a corresponding control instruction and/or update the information record in the database based on the confirmation result, such as performing identity authentication on the user, controlling the smart lock 130 to unlock, and the like. For another example, the processing module 220 may adaptively adjust a first threshold corresponding to the first information based on the auxiliary information, and confirm the information record of the target in the database based on the adjusted first threshold and the verification result of the first information and the first comparison information. By way of example only, processing module 220 may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), an application specific instruction set processor (ASIP), an image processing unit (GPU), a physical arithmetic processing unit (PPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), a Programmable Logic Device (PLD), a controller, a Micro Controller Unit (MCU), a Reduced Instruction Set Computer (RISC), a microprocessor, or the like, or any combination thereof.
In some embodiments, the processing module 220 may include an input/output interface. The processing module 220 may receive information and/or data from one or more modules of the database information management system 200 (e.g., the sensing module 210, the storage module 230) or send information and/or data to one or more modules of the database information management system 200 (e.g., the sensing module 210, the storage module 230) via the input/output interface. In some embodiments, the input/output interface may be integrated into the communication module 240, and the processing module 220 may exchange information and/or data with one or more modules (e.g., the sensing module 210, the storage module 230) of the database information management system 200 through the communication module 240.
The storage module 230 may be used to store instructions and/or data for the various modules (e.g., the sensing module 210, the processing module 220) of the database information management system 200. For example, the storage module 230 may store the first comparison information, the second comparison information, historical verification information corresponding to the first information, a biometric marker associated with the first information, and the like. In some embodiments, the storage module 230 may include mass storage, removable storage, volatile read-write memory, read-only memory (ROM), the like, or any combination thereof. In some embodiments, storage module 230 may be implemented on a cloud platform. By way of example only, the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud, a distributed cloud, an interconnected cloud, a multi-cloud, and the like, or any combination thereof.
The communication module 240 may be used for signal transmission between the modules (e.g., the sensing module 210, the processing module 220, the storage module 230) of the database information management system 200. In some embodiments, the communication module 240 may also establish communication with a client (e.g., the terminal device 140, etc.) to feed back the information record confirmation result of the object in the database. In some embodiments, the communication module 240 may be further configured to send the information verification result (e.g., the verification result of the first information and the first comparison information, the verification result of the second information and the second comparison information) and/or the integrated verification result to the client (e.g., the terminal device 140) or the server (e.g., the server 110).
In some embodiments, the communication module 240 may be used for the exchange of information or data. In some embodiments, the communication module 240 may be used for communication between components within the database information management system 200 (e.g., the sensing module 210, the processing module 220, the storage module 230, the power module 250, the input/output module 260, and/or the drive module 270). In some embodiments, the communication module 240 may also be used for communication between intelligent devices (e.g., intelligent locks 130, end devices 140) and other components (e.g., servers 110) in the database information management scenario 100. For example, the communication module 240 may exchange information with the server 110 or the terminal device 140 through the network 120. The communication module 240 may employ wired, wireless, and hybrid wired/wireless technologies. The cabling may be based on one or more fiber optic cable combinations, such as metallic cables, hybrid cables, fiber optic cables, and the like. The wireless technologies may include Bluetooth (Bluetooth), wireless network (Wi-Fi), ZigBee (ZigBee), Near Field Communication (NFC), Radio Frequency Identification (RFID), cellular networks (including GSM, CDMA, 3G, 4G, 5G, etc.), narrowband Internet of Things over cellular (NBIoT), and so on.
In some embodiments, other modules of the database information management system 200 may be distributed across multiple devices, in which case each of the other modules may include one or more communication modules 240 for inter-module information transfer. In some embodiments, the communication module 240 may also have a reminder or/and alarm function. In some embodiments, the alert means may include an audible alert, a light alert, a remote alert, etc., or any combination thereof. For example, when the alarm mode is remote alarm, the communication module 240 may send a reminding message or an alarm message to the associated user terminal device, and the communication module 240 may further establish communication (e.g., voice call, video call) between the intelligent device and the associated user terminal device.
The power module 250 may be used to supply power to the database information management system 200. For example, the power supply module 250 may include a battery, a farad capacitor, and the like. In some embodiments, a battery may be connected in parallel with the farad capacitance and the sensor. The battery can power the farad capacitor and the sensor when the battery is charged. The farad capacitor may power the sensor when the battery is dead or disconnected (e.g., battery replacement). In some embodiments, the power module 250 may provide power to other components (e.g., the sensing module 210, the processing module 220, the storage module 230, the communication module 240, the input/output module 260, the drive module 270) in the database information management system 200. In some embodiments, the power module 250 may receive control signals from the processing module 220 to control the power output of a smart device (e.g., the smart lock 130) or an item. For example, when there is an information record matching the object in the database, the power supply module 250 may control the smart lock 130 to unlock or control the shared device to unlock for the user based on an instruction related to the confirmation of the existence of the information obtained from the processing module 220 or the like.
Input/output module 260 may acquire, transmit, and send signals. The input/output module 260 may be connected to or in communication with other components in the database information management system 200. Other components in the database information management system 200 may be connected or in communication via the input/output module 260. The input/output module 260 may be a wired USB interface, a serial communication interface, a parallel communication interface, or a wireless bluetooth, infrared, Radio-Frequency Identification (RFID), Wlan Authentication and Privacy Infrastructure (wap), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), or the like, or any combination thereof. In some embodiments, the input/output module 260 may be connected to the network 120 and obtain information via the network 120.
In some embodiments, the database information management system 200 may also include a drive module 270 (also referred to as a motor drive module) and a mechanical structure 280. In some embodiments, the drive module 270 may include one or more drive power sources or drive components. In some embodiments, the driving force source may include a driving motor driven with electric power. The processing module 220 may control the operation of the driving module 270, and the driving module 270 acts on the mechanical structure 280 to complete the target operation. For example, when the first information and the second information are biological information, and the smart lock 130 is applied to a door lock or a vehicle lock device, after the verification of the biological information of the user passes, the driving module 270 may drive the mechanical structure 280 (e.g., a bolt) connected thereto to complete unlocking (i.e., unlock the smart lock).
It should be noted that the above description of the database information management system 200 and the modules thereof is merely for convenience of description, and is not intended to limit the present application within the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, given the teachings of the present system, any combination of modules or sub-system configurations may be used to connect to other modules without departing from such teachings. For example, the processing module 220 and the communication module 240 may be two modules, or one module may have both a processing function and a communication function. For example, each module may share one memory module, and each module may have its own memory module. Such variations are within the scope of the present application.
FIG. 3 is a schematic diagram of the hardware and/or software of an exemplary computing device according to some embodiments of the present application.
In some embodiments, server 110 and/or terminal device 140 may be implemented on computing device 300. For example, the processing device may implement and perform the functions of the processing device disclosed herein on the computing device 300. As shown in fig. 3, computing device 300 may include internal communication bus 310, processor 320, read only memory 330, random access memory 340, communication interface 350, input/output interface 360, hard disk 370, and user interface 380.
The memory (e.g., Read Only Memory (ROM) 330, Random Access Memory (RAM) 340, hard disk 370, etc.) of the computing device 300 may store data/information obtained from any other component of the database information management scenario 100. For example, the hard disk 370 may store first contrast information, second contrast information, historical verification information corresponding to the first biometric information, a biometric marker associated with the first biometric information, and the like. In some embodiments, the memory of the computing device 300 may be located in a smart device (e.g., smart lock 130, end device 140) or may be located in the server 110.
The input/output interface 360 may be used to input or output signals, data, or information. In some embodiments, the input/output interface 360 may enable a user to interact with the database information management scenario 100. For example, the input/output interface 360 may include the communication module 240 to implement the communication function of the database information management scenario 100. In some embodiments, input/output interface 360 may include an input device and an output device. Exemplary input devices may include a keyboard, mouse, touch screen, microphone, and the like, or any combination thereof. Exemplary output devices may include a display device, speakers, printer, projector, etc., or any combination thereof.
FIG. 4 is a system block diagram of an exemplary database information management system, shown in accordance with some embodiments of the present application.
As shown in fig. 4, the embodiment of the present application provides a database information management system, which can be applied to an intelligent device, such as an intelligent lock 130, a terminal device 140, or the like, or a server. Such as server 110. In some embodiments, the database information management system 400 may include an acquisition module 410, an information management module 420, and a data update module 430.
The acquisition module 410 may be used to acquire information. In some embodiments, the obtaining module 410 may be configured to obtain first information and second information of the object, the first information and the second information belonging to the same information type. In some embodiments, the first information and the second information may both be biological information, and the first information and the second information belong to different categories of biological information. In some embodiments, the first biometric information may include fingerprint information. In some embodiments, the first information and the second information may both be attribute information of the article.
In some embodiments, the acquisition module 410 may be used to acquire auxiliary information of the object. In some embodiments, the auxiliary information may include first and second comparison information corresponding to the first and second information, respectively. In some embodiments, the auxiliary information may further include historical verification information corresponding to the first information and/or a biometric marker associated with the first information.
In some embodiments, the acquisition module 410 may further include an input information acquisition unit 413 and an auxiliary information acquisition unit 415. The input information acquiring unit 413 may be configured to acquire first information and/or second information of the object. The auxiliary information acquisition unit 415 may be configured to acquire auxiliary information of the subject, for example, first and second comparison information corresponding to the first and second information, respectively, historical verification information corresponding to the first information, and/or a biometric marker associated with the first information.
In some embodiments, the obtaining module 410 may also be configured to obtain other information for implementing database information management, for example, the obtaining module 410 may also be configured to obtain environmental information, big data statistics information related to the first information, and the like, which is not limited herein.
The information management module 420 may be used to validate the information records of the object in the database. In some embodiments, the information management module 420 may be configured to confirm the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information. In some embodiments, the information management module 420 may be configured to execute a corresponding instruction based on the result of the information record confirmation of the object in the database. In some embodiments, the information management module 420 may be configured to obtain a first threshold corresponding to the first information, and adaptively adjust the first threshold based on a verification result of the second information and the second comparison information; and confirming the information record of the object in the database based on the adjusted first threshold value and the verification result of the first information and the first comparison information.
In some embodiments, the information management module 420 may be configured to confirm the information record of the object in the database based on the historical verification information corresponding to the first information, the verification result of the first information and the first comparison information, and the verification result of the second information and the second comparison information. In some embodiments, the information management module 420 may be configured to adaptively adjust a first threshold corresponding to the first information based on the accumulated number of times of verification failures of the first information, the time of verification failures, and the verification result of the second information and the second comparison information; and confirming the information record of the object in the database based on the adjusted first threshold value and the verification result of the first information and the first comparison information.
In some embodiments, the information management module 420 may further include a first information verification unit 423, a comprehensive verification unit 425, and a threshold adjustment unit 427. The first information verifying unit 423 may be configured to perform a first information verification, such as determining a verification result of the object first information and the first comparison information. The integrated authentication unit 425 may be configured to perform integrated authentication based on the auxiliary information and the first information of the subject, such as determining an authentication result of the second biometric information and the second comparison information of the user. The threshold adjusting unit 427 may be configured to adjust a first threshold corresponding to the first information, such as adaptively adjusting the first threshold corresponding to the first information based on the accumulated verification failure times of the first information, the verification failure time, and the verification result of the second information and the second comparison information.
The data update module 430 may be used to update the database. In some embodiments, the data updating module 430 may be configured to determine whether the similarity between the first information and the first comparison information is greater than a second threshold when the corresponding information record exists in the database for the object; in response to the similarity between the first information and the first comparison information being greater than a second threshold, the first comparison information of the object in a database (e.g., a comprehensive information base of the user) is replaced with the first information. In some embodiments, the data update module 430 may be configured to update the integrated information base of the object based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information when the corresponding information record exists in the database of the object. In some embodiments, the data update module 430 may also be used to update the integrated information base of the object based on the integrated verification results.
It should be noted that the above description of the database information management system 400 and the unit modules thereof is only for convenience of description, and is not intended to limit the present application within the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, having the benefit of this disclosure, any combination of the various unit modules or sub-assemblies may be connected to other modules without departing from the scope of this disclosure.
FIG. 5 is a flow diagram illustrating an exemplary database information management method according to some embodiments of the present application.
Step 510, obtaining first information and second information of the object. In some embodiments, step 510 may be performed by server 110, smart lock 130, terminal device 140, database information management system 200, computing device 300, or database information management system 400 (e.g., input information acquisition unit 413).
In some embodiments, the first information and the second information may be of the same information type. In some embodiments, the first information and the second information may both be biological information, and for ease of understanding, such first information and second information will be referred to as first biological information and second biological information, respectively, below, accordingly.
The biological information may reflect characteristics of a living being. In some embodiments, the first biological information and the second biological information may belong to different biological information categories, for example, the first biological information is face information, the second biological information is fingerprint information, and the like. In some embodiments, the first biological information may include fingerprint information, and the second biological information may include non-fingerprint biological information, such as palm print information, vein information, face information, voice information, iris information, and the like. In some embodiments, the second biometric information may include fingerprint information, and the first biometric information may include non-fingerprint type biometric information. In some embodiments, the first biometric information may be primary verification information and the second biometric information may be secondary verification information. For example, in the smart lock with fingerprint identification function, the first biological information of the user may be fingerprint information, and the second biological information may be one or more types of non-fingerprint biological information.
In some embodiments, the first biometric information and/or the second biometric information may be obtained by a smart device (e.g., smart lock 130, terminal device 140, etc.). For example, the fingerprint information of the user may be acquired by a fingerprint sensor of the smart lock 130/the terminal device 140, or the vein information of the user may be acquired by a finger vein sensor of the smart lock 130/the terminal device 140. In some embodiments, the first biological information and/or the second biological information of the user may be acquired by other terminal devices. For example, the face information of the user (i.e., the object) of the smart lock 130 and the like may be acquired through the terminal device 140. In some embodiments, the first or second biometric information may be acquired by another device connected to the smart device or the server. For example, when the smart device is a door lock, the face information of the user can be obtained through a camera device (such as a cat eye camera) installed on or around the door.
In some embodiments, the first biological information and/or the second biological information of the user may be acquired in response to a user operation instruction. For example, fingerprint information of the user may be acquired in response to the user pressing a fingerprint sensor of the smart lock 130. As another example, the face information of the user may be obtained in response to the user opening an unlocking or login interface of the terminal device 140.
In some embodiments, the first and second biometric information of the user may be acquired simultaneously. In some embodiments, the second biometric information of the user may be acquired in response to a failure of the first biometric information verification of the user. For example, when the user fails the unlock authentication after inputting the fingerprint information, the smart lock 130/the terminal device 140 may acquire other types of biometric information of the user, such as face information. In some embodiments, only the first biometric information or the second biometric information of the user may be acquired.
In some embodiments, the first information and the second information may both be item attribute information. The attribute information may reflect characteristics of the article, such as physical attributes of the article, such as shape, size, weight, density, or identification attributes of the code. In some embodiments, the first information and the second information may be the same or different types of attribute information. For example, the first information may be identification information of the article, and the second information may be physical information of the article. Such information is obtained in a manner similar to the biological information, and for more details, reference may be made to the above-mentioned related contents related to the obtaining of the first biological information and/or the second biological information, and details are not repeated here.
In step 520, auxiliary information of the object is obtained, wherein the auxiliary information comprises first comparison information and second comparison information corresponding to the first information and the second information respectively. In some embodiments, step 520 may be performed by the server 110, the smart lock 130, the terminal device 140, the database information management system 200, the computing device 300, or the database information management system 400 (e.g., the auxiliary information acquisition unit 415).
The assistance information may refer to information that assists the subject in verifying the first information or the second information (e.g., the first biological information or the second biological information). In some embodiments, the auxiliary information may include first and second comparison information corresponding to the first and second information, respectively. The comparison information may refer to pre-stored information in a database for performing a comparison analysis with the first information or the second information. For example, the comparison information may be pre-stored biological information used for user identity identification, such as fingerprint information, face information, vein information, and the like used for identity authentication, which are entered by an associated user when setting is performed by the intelligent device associated user. For another example, the comparison information may be pre-stored attribute information used for article identification, such as identification information, article type information, shape information, article provider name, and manufacturer name, which are entered in association with the corresponding article when the article is registered.
In some embodiments, first and second comparison information corresponding to first and second biological information of a user, respectively, may be acquired based on a feature of the biological information. For example, the pre-stored fingerprint information in the integrated information base or the pre-stored fingerprint information matched with the input fingerprint information may be acquired based on the fingerprint information input by the user. In some embodiments, the first contrast information or the second contrast information may include one or more pieces of biological information. For example, when the first biometric information is fingerprint information, the first comparison information corresponding to the first biometric information may include a plurality of pieces of fingerprint information entered in advance, or a piece of fingerprint information most similar to the input fingerprint information.
In some embodiments, the auxiliary information may further include historical verification information corresponding to the first information, such as historical verification information corresponding to the first biological information. The historical verification information may reflect historical verification of the first information, for example, input fingerprint information and corresponding verification results of the historical fingerprint verification that passed or failed verification. In some embodiments, the historical verification information corresponding to the first information may include at least one of a cumulative number of verification failures, a time of verification failures, a characteristic of the information corresponding to the verification failures, and the like corresponding to the first information. In some embodiments, historical verification information corresponding to the first information may be obtained based on a verification result of the first information. For example, historical authentication information corresponding to pre-stored fingerprint information that matches the user input fingerprint information may be acquired based on the matching result of the user fingerprint information. In some embodiments, historical verification information corresponding to the first information may be obtained based on the user information. For example, historical verification information corresponding to the first biological information of the user can be acquired based on the identity characteristics of the user.
In some embodiments, the auxiliary information may further include a biometric marker associated with the first biometric information. The biometric marker may reflect a characteristic of the biometric information. For example, the biometric markers associated with fingerprint information may include fingerprint depth, fingerprint wear, finger dryness, and the like. In some embodiments, the biometric indicia associated with the first biometric information may also include associated user characteristics, such as user age, gender, and the like. The biometric characteristics may be different for users of different genders or ages, such as an older user may have dry fingers, a female user may have light fingerprint texture, and so on. In some embodiments, the biometric indicia of the biometric information may be manually entered by the user. For example, a user may actively enter a corresponding biometric marker when registering biometric information in a smart device (e.g., smart lock 130), or passively enter a corresponding biometric marker based on system prompts. In some embodiments, the corresponding biometric marker may be automatically determined based on historical verification information of the user's first biometric information. For example, the biometric mark of the fingerprint information of the user can be determined based on the biometric features of the fingerprint depth, dryness, wetness and the like of the input fingerprint information in the verification of the historical fingerprint information of the user. In some embodiments, the relevant biometric marker may be determined based on big data statistics associated with the first biometric information. For example, fingerprint characteristics of different classes of users may be determined based on fingerprint information of a large number of users. In some embodiments, a biometric marker associated with the first biometric information may be determined based on the environmental information. For example, the environmental information may include season, climate (e.g., rainy, sunny, warm, humid, etc.), time (e.g., morning and evening, etc.), and the like. For example only, the biometric indicia of the fingerprint information may be determined during the winter season based on the season: dry, determine the biometric signature of fingerprint information during summer: and (4) wetting.
In some embodiments, the assistance information may also include environmental information, big data statistics related to the first information, and the like.
In some embodiments, the auxiliary information may be obtained from a database (e.g., a comprehensive information base that matches the object). For example, the smart lock 130/the terminal device 140 may obtain the first comparison information, the second comparison information, the historical verification information corresponding to the first biometric information, the biometric marker associated with the first biometric information, and the like from the database. In some embodiments, the auxiliary information may be obtained from a storage device (e.g., storage module 230, Read Only Memory (ROM) 330, Random Access Memory (RAM) 340, hard disk 370, etc.). In some embodiments, the assistance information may be obtained over a network. For example, the intelligent lock 130 or the terminal device 140 may obtain environmental information such as time, climate, season, etc., or big data statistics information related to the first information, etc., through the network 120.
Step 530, confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information. In some embodiments, step 530 may be performed by server 110, smart lock 130, terminal device 140, database information management system 200, computing device 300, or database information management system 400 (e.g., information management module 420).
In some embodiments, the verification result of the first information and the first comparison information may refer to a similarity between the first information and the first comparison information of the object. In some embodiments, the verification result of the second information and the second comparison information may refer to a similarity between the second information and the second comparison information of the object.
In some embodiments, a first threshold corresponding to the first information may be obtained. The first threshold may reflect a similarity when the first information matches the first comparison information, such as a similarity when the first biological information of the user matches the first comparison information.
In some embodiments, it may be determined whether the first information is validated based on a first threshold. For example, if the similarity between the first biological information of the user and the first comparison information is greater than a first threshold, it is determined that the first biological information of the user is verified. In some embodiments, the first threshold may be any reasonable value, such as 80%, 90%, 95%, etc.
In some embodiments, the initial value of the first threshold may be determined based on big data statistics of the first information.
In some embodiments, the first threshold corresponding to the first information may be adaptively adjusted based on a result of the verification of the second information with the second comparison information. In some embodiments, the first threshold may be increased or decreased based on a similarity between the second information and the second comparison information. For example, when the similarity between the second biological information of the user and the second comparison information is high, the first threshold corresponding to the first biological information of the user may be decreased; when the similarity between the second biological information of the user and the second comparison information is low, the first threshold corresponding to the first biological information of the user may be increased. In some embodiments, the first threshold for increasing or decreasing the first biometric information of the respective user may be determined based on a similarity threshold between the second biometric information of the user and the second comparison information.
In some embodiments, the information record of the object in the database may be confirmed based on the adjusted first threshold value and the verification result of the first information and the first comparison information. For example only, it may be determined whether the similarity between the first biological information of the user and the first comparison information is greater than or equal to the adjusted first threshold, when the similarity is greater than or equal to the adjusted first threshold, it is determined that the first biological information of the user is verified, that is, the object has a corresponding information record in the database, and when the similarity is less than the adjusted first threshold, it is determined that the first biological information of the user is verified, that is, the object has no corresponding information record in the database. The existence of the corresponding information record in the database of the object indicates that the object is legal, such as that the user is legally authorized or the article is legally registered. For example only, the similarity between the second biological information of the user and the second comparison information is higher, which indicates that the matching degree of the legal user identity associated with the user and the smart device (such as the smart lock 130 or the terminal device 140) is higher, the first threshold corresponding to the first biological information of the user is adaptively reduced, and the verification efficiency and accuracy of the user can be improved, so that the reliability and convenience of the smart device are improved.
In some embodiments, the first threshold may be adaptively adjusted based on historical verification information corresponding to the first information. In some embodiments, the verification failure distribution condition of the first information in a certain period may be determined based on the accumulated verification failure times corresponding to the first information and the verification failure time, and the first threshold value may be adaptively adjusted based on the verification failure distribution condition. For example, the first threshold value of the time period in which the number of verification failures is large (e.g., a specific day such as a working day and a holiday, or a specific time period such as morning and evening) may be adaptively reduced based on the distribution of the verification failures of the first biometric information in a week or a month and the time information. As another example, the first threshold for the respective season may be adaptively decreased based on a distribution of verification failures of the first biometric information over the year. In some embodiments, the first threshold may be adaptively adjusted based on historical verification information corresponding to the first information over a recent period of time (e.g., a recent week, a recent month, etc.).
In some embodiments, the first threshold value may be adaptively adjusted based on a biometric characteristic of input fingerprint information that fails to be verified in historical verification information corresponding to the first biometric information of the user. By way of example only, fingerprint information of a user authentication failure may be obtained, features of the fingerprint information of the user authentication failure may be analyzed through a machine learning model, a boundary extraction, and other techniques, types of the fingerprint information of the user authentication failure such as a lighter fingerprint, a worn fingerprint, a damaged finger, and the like may be determined based on the features, and the first threshold of the fingerprint information of the time may be adjusted during the fingerprint authentication process based on the type of the currently input fingerprint information, and the first threshold may be decreased during the authentication process if the type of the fingerprint information of the user authentication failure is a damaged finger, or the first threshold of the user fingerprint authentication process may be decreased if the type of the fingerprint information of the user authentication failure is a worn fingerprint.
In some embodiments, the first threshold may be adaptively adjusted based on a biometric marker associated with the first biometric information. For example, the first threshold for fingerprint information verification may be adaptively decreased for fingerprint types that are difficult to identify, such as elderly people, worn fingerprints, shallow fingerprints, etc., and adaptively increased for fingerprint types that are easy to identify, such as deep fingerprints, etc. In some embodiments, the first threshold may be adaptively adjusted based on the user information and a biometric marker associated with the first biometric information. For example only, the fingerprint information mark type of the user corresponding to the currently input fingerprint information (for example, according to the similarity between the input fingerprint information and the prestored fingerprint information in the integrated information base, it is determined that the user corresponding to the prestored fingerprint information with the highest similarity to the input fingerprint information is the user corresponding to the currently input fingerprint information) may be determined based on the mark types of the prestored fingerprint information for the elderly, the fingerprint wear, the fingerprint light, the fingerprint dark, the finger dry, the finger wet, and the like, and the first threshold value of the fingerprint information verification this time may be reduced or increased.
In some embodiments, the first threshold may be adaptively adjusted based on big data statistics associated with the first information. In some embodiments, the big data statistics may reflect a rate of authentication failure of the first information over a particular time period and/or a rate of authentication failure of a particular population/item. For example, the first threshold of fingerprint information verification in the corresponding time period may be adaptively decreased or increased based on the time period with a higher or lower big data statistics fingerprint information verification failure rate, and if the fingerprint verification failure rate is higher in summer or winter, the nodes are divided by days, and the first threshold of fingerprint information verification is decreased in the time period with a higher failure frequency. For another example, the first threshold for fingerprint information verification of users in the age group with a higher verification failure rate may be adaptively decreased and the first threshold for fingerprint information verification of users in the age group with a lower verification failure rate may be increased based on the big data statistics and the characteristics of the users (such as the ages and sexes of the users). As another example, the first threshold for the first information verification of the article with a large form autonomy change (e.g., different shapes at different temperatures) may be adaptively decreased and the first threshold for the first information verification of the article with a small form autonomy change may be increased based on the big data statistics and the characteristics of the article, such as different forms of the article under different environments.
In some embodiments, the first threshold may be adaptively adjusted based on an evaluation of the biometrics of the first biometric information. For example only, taking one successful authentication (e.g. unlocking the smart lock/unlocking the terminal device/logging in the application program, etc.) as an end time point of a Session, the fingerprint verification condition in the Session may be counted, for example: after the user A fails to use the fingerprint to try authentication for 2 times, if the authentication succeeds in using the fingerprint for the 3 rd time, the failure times in the Session are 2; after the user B fails to use the fingerprint to try authentication for 2 times, giving up fingerprint authentication, and if the password authentication is successful, the failure times in the Session are 2; after the user C fails to attempt authentication N times by using the fingerprint, authentication is aborted, and the Session data is discarded (the user finally fails to authenticate, and does not control the smart device to execute corresponding instructions, such as unlocking failure/login failure, etc., indicating that the user may not be authorized or no information record matching with the user exists in the database, and therefore the set of data is discarded). The Session start time point and failure time calculation rule may be: 1) the fingerprint failure times between the last successful control of the intelligent device (such as the intelligent lock 130 or the terminal device 140) and the execution of the corresponding instruction (such as unlocking) within 3 seconds (or other numerical values) before the time point when the intelligent device is controlled by any authentication mode to successfully execute the corresponding instruction are marked as A; 2) if a1= X, the Session start time point is X; if A1> X, taking the time point of the earliest failure as a new starting point, and returning to the first step to continue the accumulation of A2, A3, … and An, wherein X can be any reasonable positive integer; 3) discarding sessions meeting the following conditions: session ends with non-fingerprint authentication. Finally, the distribution of authentication failure times in each Session may be counted, and the distribution of the failure times when the user tries to perform fingerprint authentication in a certain period (e.g., week and month) is known, so as to evaluate the specific improvement condition after the subsequent improvement measures are introduced, for example, the identification rate index = all identification success times/(all identification success times + the accumulated value).
In some embodiments, the first threshold may be adaptively adjusted based on the context information. For example, the temperature and/or humidity of the finger may be obtained based on a temperature and humidity sensor, and the first threshold may be adjusted based on the temperature and/or humidity of the finger, for example, the value of the first threshold may be decreased when the temperature and/or humidity of the finger is low and/or high. For another example, the climate information may be acquired through a network, and the first threshold value may be decreased on dry days such as sunny days, and the first threshold value may be increased on wet days such as rainy days. As another example, the climate information may be acquired via a network, and the first threshold value may be reduced on days when the intensity of sunlight is high or the like, which may affect the accuracy of acquiring the item information.
In some embodiments, the first threshold may be adaptively adjusted based on at least two of a result of the verification of the second information with the second comparative information, historical verification information corresponding to the first information, a biometric marker associated with the first information, big data statistics associated with the first information, environmental information, and the like. For example, the first threshold corresponding to the first biological information may be adaptively adjusted based on the accumulated number of verification failures of the first biological information, the time of verification failure, and the verification result of the second biological information and the second comparative information of the user.
In some embodiments, a first threshold section related to the first information and a second threshold section related to the second information may be acquired, and the information record of the object in the database may be confirmed based on the first threshold section, the second threshold section, the verification result of the first information and the first comparison information, and the verification result of the second information and the second comparison information. For example, if the similarity between the first biological information and the first comparison information of the user is in a first threshold interval, and the similarity between the second biological information and the second comparison information of the user is in a second threshold interval, it is determined that the user identity authentication is successful (i.e., the object has a corresponding information record in the database), and the user may control the smart device to execute a corresponding control instruction (e.g., control the smart lock 130 to unlock). For another example, if the similarity between the article identification information and the first comparison information is in a first threshold interval, and the similarity between the physical information and the second comparison information is in a second threshold interval, it is determined that the object has a corresponding information record in the database.
In some embodiments, the first information of the subject may be comprehensively verified based on at least one of the second information, historical verification information corresponding to the first information, a biometric marker associated with the first information, big data statistics associated with the first information, environmental information, and the like, and the information record of the subject in the database may be confirmed based on the comprehensive verification result. Further details can be found in fig. 6 and its related description, which are not repeated herein.
In some embodiments, the integrated information base of the object may be updated based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information when the corresponding information record exists in the database for the object. The integrated information base may refer to a database storing information of corresponding objects, such as a database storing first comparison information, second comparison information, historical verification information corresponding to the first biological information, a biometric mark related to the first biological information, and the like of a user corresponding to an intelligent device (e.g., the intelligent lock 130). In some embodiments, the integrated information base may be part of a storage device (e.g., storage module 230, read-only memory 330, random access memory 340, or hard disk 370).
In some embodiments, it may be determined whether the similarity between the first information and the first comparison information is greater than a second threshold when the object has a corresponding information record in the database; and replacing the first comparison information of the object in the database with the first information in response to the similarity between the first information and the first comparison information being greater than a second threshold value. For example, it may be determined whether the similarity between the first biological information and the first comparison information of the user is greater than a second threshold; and in response to the similarity between the first biological information of the user and the first comparison information being larger than a second threshold value, replacing the first comparison information in the comprehensive information base of the user with the first biological information, namely using the first biological information of the next time as the first comparison information of the first biological information verification of the next time. In some embodiments, it may be determined whether a new identifying characteristic exists between the first biometric information and the first comparison information of the user, and the new identifying characteristic may be stored in the integrated information base of the user in response to the new identifying characteristic existing. In some embodiments, whether to update the integrated information repository may be determined based on the storage capabilities of the integrated information repository. For example, the system will stop the update learning when the storage space of the user integrated information base is insufficient.
In some embodiments, the corresponding instruction may be performed based on the result of the confirmation of the information record of the object in the database. For example, when it is determined that the object has a corresponding information record in the database, the smart lock 130 may determine that the corresponding user identity authentication is passed based on the result, and thus control the smart lock to unlock. For another example, when it is determined that the object has a corresponding information record in the database, the smart phone 140-1 may determine, based on the result, that the corresponding user identity authentication passes, and unlock the smart phone, so that the user may use the smart phone to perform a call, receive and send information, operate an application program, and the like. For another example, when it is determined that the object has a corresponding information record in the database, the smart car may unlock the vehicle based on a result of the determination that the corresponding user id passes, so that the user may use the smart car. For another example, when the server 110 determines that the object has a corresponding information record in the database, it may determine that the object is legitimate, and authorize the object to execute a corresponding instruction, such as unlocking.
For example only, the server 110 may obtain density information (i.e., first information) and shape information (i.e., second information) of the article through the infrared sensor, and obtain first comparison information and second comparison information corresponding to the density information and the shape information, respectively, of the same type of article from the database. The first and second comparison information may be pre-stored density information and form information (e.g., size/shape) of the legally registered article, respectively. Further, the server 110 may compare the acquired density information of the article with the first comparison information, and compare the form information with the second comparison information, to obtain a verification result of the density information of the article and the first comparison information, and a verification result of the form information and the second comparison information; and when the verification results of the two kinds of information are both larger than the corresponding threshold value, confirming that the corresponding information record exists in the database for the article, wherein the article belongs to the legally registered article. Alternatively, the server 110 may adjust the first threshold value based on the verification result of the form information and the second comparison information of the article, for example, if the verification result of the form information and the second comparison information is greater than the second threshold value, the first threshold value is decreased, and if the verification result is less than the second threshold value, the first threshold value is increased; and confirming that the corresponding information record exists in the database of the article when the verification result of the density information and the first comparison information is greater than the adjusted first threshold value.
It should be noted that the above description related to the flow 500 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 500 may occur to those skilled in the art upon review of the present application. For example, the second biometric information may be primary verification information, and the first biometric information may be secondary verification information. As another example, the auxiliary information may include historical authentication information and/or a biometric marker corresponding to the second biometric information. However, such modifications and variations are intended to be within the scope of the present application.
FIG. 6 is a flow diagram illustrating an exemplary database information management method according to further embodiments of the present application.
As shown in fig. 6, taking the database information management method as an example of being applied to an unlocking control scenario of an intelligent lock, in some embodiments, the process 600 may perform comprehensive verification based on the user auxiliary information and the first biometric verification result of the user when the first biometric verification of the user fails, and control unlocking of the intelligent lock in response to passing of the comprehensive verification. It should be noted that the first biological information in this embodiment is only an example and is not a limitation to the present application, and for example, the first biological information may also be palm print information, vein information, and the like.
In some embodiments, the first biometric information may include fingerprint information. In some embodiments, the first biological information of the user can be acquired in response to the user operation instruction. For example, the smart lock 130 may acquire fingerprint information of the user in response to the user pressing a fingerprint sensor of the smart lock 130.
In step 620, first comparison information is obtained. In some embodiments, step 620 may be performed by the server 110, the smart lock 130, the database information management system 200, the computing device 300, or the database information management system 400 (e.g., the auxiliary information acquisition unit 415).
In some embodiments, the smart lock 130 may obtain the pre-stored first biometric information (e.g., fingerprint information) as the first comparison information from the integrated information base.
In step 630, it is determined whether the first biometric information is verified. In some embodiments, step 630 may be performed by server 110, smart lock 130, database information management system 200, computing device 300, or database information management system 400 (e.g., first biometric verification unit 423).
In some embodiments, the smart lock 130 may determine whether the first biometric information of the user is verified based on a similarity between the first biometric information of the user and the first comparison information. For example, the smart lock 130 may determine that the first biometric information of the user passes the verification, that is, the user identity authentication is successful, in response to the similarity between the first biometric information of the user and the first comparison information being greater than or equal to a first threshold, and otherwise, consider that the first biometric information of the user fails to be verified. In some embodiments, the similarity between the first biological information of the user and all pre-stored first biological information in the comprehensive information base can be calculated respectively to determine whether the first biological information passes the verification. In some embodiments, it may be determined that the first biometric information of the user is verified in response to a similarity between the first biometric information of the user and one of the first comparison information being greater than or equal to a first threshold.
In some embodiments, step 650 may be performed to control unlocking of the smart lock in response to the user verifying the first biometric information. In some embodiments, when the user first biometric authentication fails, step 633 or step 635 may be performed. It is noted that the execution sequence of step 633, step 635, and step 637 in fig. 6 is only an example, and in some embodiments, step 633, step 635, and step 637 may be executed first.
In some embodiments, the second biological information may include non-fingerprint biological information, such as palm print information, vein information, face information, voice information, iris information, and the like. In some embodiments, the second biometric information of the user may be obtained through the smart lock. For example, the vein information of the user may be acquired as the second biological information by the finger vein sensor of the smart lock 130. In some embodiments, the second biometric information of the user may be obtained through other devices connected to the smart lock or the server. For example, when the smart lock is a door lock, the face information of the user can be acquired as the second biological information through a camera device (such as a cat eye camera) installed on or around the door. In some embodiments, two or more types of non-fingerprint-type biometric information of the user may be acquired as the second biometric information. In some embodiments, the first biological information and the second biological information may be acquired simultaneously by the same device. For example, when the user inputs a fingerprint, fingerprint information and vein information of the user may be simultaneously acquired through the finger vein sensor of the smart lock 130.
Step 635, obtain the first biometric information verification result. In some embodiments, step 635 may be performed by server 110, smart lock 130, database information management system 200, computing device 300, or database information management system 400 (e.g., acquisition module 410).
In some embodiments, the first biometric information verification result may include first comparison information closest to the first biometric information of the user (e.g., pre-stored fingerprint information having a highest similarity to the fingerprint information input by the user) and a similarity therebetween.
In some embodiments, the assistance information may include the second contrast information, historical verification information corresponding to the first biometric information, and a biometric marker associated with the first biometric information. In some embodiments, the second comparison information may include all second biological information pre-stored in the integrated information base, such as all pre-stored face information. In some embodiments, the historical verification information corresponding to the first biometric information may include an identification score of the past verification of the first biometric information, such as a similarity value between the past input fingerprint and the closest pre-stored fingerprint.
And step 640, performing comprehensive verification based on the user auxiliary information, the first biological information verification result and the second biological information. In some embodiments, step 640 may be performed by server 110, smart lock 130, database information management system 200, computing device 300, or database information management system 400 (e.g., integrated validation unit 425).
In some embodiments, it may be determined whether to adjust the first threshold corresponding to the first biological information based on the supplementary information and the second biological information. For example only, the smart lock 130 may determine whether to adjust the first threshold based on the similarity between the second biometric information and the second comparison information of the user (e.g., if the similarity between the second biometric information and the closest second comparison information of the user is greater than a predetermined value or within a second threshold interval, the first threshold is decreased), based on historical verification information of the first biometric information (e.g., if the first threshold is decreased for a period of time in which the verification failure rate is higher based on the distribution of historical verification failures), or based on a biometric marker associated with the first biometric information (e.g., if the first threshold of the relevant user is decreased for a drier fingerprint type). In some embodiments, the first threshold corresponding to the first biological information may be adjusted in response to the at least one result being that the first threshold needs to be adjusted. In some embodiments, the first biometric information of the user may be verified based on the adjusted first threshold, and in response to the similarity between the first biometric information of the user and the closest first comparison information being greater than or equal to the adjusted first threshold, it is determined that the comprehensive verification is passed, that is, the user identity authentication is successful, otherwise, the verification is considered to be failed.
In some embodiments, this time of verification may be ended when the comprehensive verification fails, and step 650 may be performed when the comprehensive verification passes, so as to control the smart lock to unlock.
And step 660, updating the user comprehensive information base. In some embodiments, step 660 may be performed by server 110, smart lock 130, database information management system 200, computing device 300, or database information management system 400 (e.g., data update module 430). For more details on updating the integrated information base, reference may be made to fig. 5 and the related description thereof, which are not repeated herein.
It should be noted that the above description related to the flow 600 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 600 may occur to those skilled in the art, given the benefit of this disclosure. For example, in step 640, the comprehensive verification may be performed with the first biological information of the user based on only one of the supplementary information. For another example, the smart lock in the process 600 may be replaced with a terminal device, and in step 650, when the user identity authentication is successful, the terminal device may be controlled to unlock, or log in an application program (such as a social software client, a financial software client, a video software client, a music software client, etc.) of the terminal device, or complete payment by using the terminal device, etc. However, such modifications and variations are intended to be within the scope of the present application.
FIG. 7 is a schematic diagram of an exemplary integrated arbiter, according to some embodiments of the present application.
The integrated discriminator 700 may be used for integrated verification, for example, integrated verification based on the user assistance information and the first biometric information. As shown in fig. 7, in some embodiments, the integrated discriminator 700 may include a first biological information discriminator 710, a second biological information discriminator 720, an information adjustment discriminator 730, and a biometric mark discriminator 740. The integrated discriminator 700 and the integrated verification unit 425 in fig. 4 may have the same or similar structures, and the first biological information discriminator 710 and the first information verification unit 423 may have the same or similar structures.
The first biometric information discriminator 710 may be used to perform a first biometric information verification. The second biometric information discriminator 720 may be used to perform second biometric information verification. The information adjustment arbiter 730 may be configured to determine whether to adjust the first comparison information, for example, whether to replace the pre-stored first biometric information with the first biometric information input by the user. In some embodiments, the information adjustment arbiter 730 may further be configured to determine whether to adjust the first threshold based on the historical verification information corresponding to the first biological information. The biomarker discriminator 740 may be used to determine whether to characterize the first biometric information and/or whether to modify or update the biometric marker. In some embodiments, the biomarker discriminator 740 may also be configured to determine whether to adjust the first threshold based on the biomarker of the first biometric information.
It should be noted that the above description relating to 700 is for purposes of illustration and description only and is not intended to limit the scope of applicability of the present application. Various modifications and changes may be made to fig. 7 by those skilled in the art in light of the teachings herein. For example, the integrated discriminator 700 may include a first information discriminator for verification of first information of the object, a second information discriminator for verification of second information, and an information adjustment discriminator for determining whether to update information in the database. However, such modifications and variations are intended to be within the scope of the present application.
The database information management method provided by the above embodiment of the present application performs (1) verification based on two types of information belonging to different information categories, and can improve accuracy and reliability of article identification; (2) the first threshold of the first information is adjusted based on auxiliary information such as the second information, the historical verification information and the biological feature marks, so that the identification accuracy of the first information can be improved, and the reliability of relevant intelligent equipment is improved.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the broad application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, the present application uses specific words to describe embodiments of the specification. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this application are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the present application may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present application may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereon. Accordingly, various aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which elements and sequences of the processes described herein are processed, the use of alphanumeric characters, or the use of other designations, is not intended to limit the order of the processes and methods described herein, unless explicitly claimed. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the number allows a variation of ± 20%. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
The entire contents of each patent, patent application publication, and other material cited in this application, such as articles, books, specifications, publications, documents, and the like, are hereby incorporated by reference into this application. Except where the application is filed in a manner inconsistent or contrary to the present disclosure, and except where the claim is filed in its broadest scope (whether present or later appended to the application) as well. It is noted that the descriptions, definitions and/or use of terms in this application shall control if they are inconsistent or contrary to the statements and/or uses of the present application in the material attached to this application.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the present application. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the present application can be viewed as being consistent with the teachings of the present application. Accordingly, the embodiments of the present application are not limited to only those embodiments explicitly described and depicted herein.
Claims (12)
1. A database information management method, the method comprising:
acquiring first information and second information of an object, wherein the first information and the second information belong to the same information type;
acquiring auxiliary information of the object, wherein the auxiliary information comprises first comparison information and second comparison information respectively corresponding to the first information and the second information;
confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
2. The method of claim 1,
the first information and the second information are both biological information, and the first information and the second information belong to different biological information categories;
the confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information comprises:
acquiring a first threshold corresponding to the first information;
adaptively adjusting the first threshold value based on a verification result of the second information and the second comparison information;
confirming the information record of the object in the database based on the adjusted first threshold value and the verification result of the first information and the first comparison information.
3. The method of claim 2,
the auxiliary information further comprises historical verification information corresponding to the first information;
the method further comprises the following steps:
acquiring historical verification information corresponding to the first information;
confirming the information record of the object in the database based on the historical verification information, the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
4. The method of claim 3, wherein the validating the information record of the object in the database based on the historical verification information, the verification result of the first information and the first comparison information, and the verification result of the second information and the second comparison information comprises:
acquiring the accumulated verification failure times and verification failure time of the first information;
adaptively adjusting a first threshold corresponding to the first information based on the accumulated verification failure times, the verification failure time and the verification results of the second information and the second comparison information;
confirming the information record of the object in the database based on the adjusted first threshold value and the verification result of the first information and the first comparison information.
5. The method of claim 2, wherein the auxiliary information further comprises a biometric marker associated with the first information.
6. The method of claim 2, wherein the first information comprises fingerprint information.
7. The method of claim 1, further comprising:
when the object has a corresponding information record in the database, judging whether the similarity between the first information and the first comparison information is greater than a second threshold value;
replacing the first comparison information of the object in the database with the first information in response to the similarity between the first information and the first comparison information being greater than the second threshold.
8. The method of claim 1, further comprising:
and when the object has a corresponding information record in the database, updating the comprehensive information base of the object based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
9. The method of claim 1, wherein the first information and the second information are both item attribute information, and the attribute information includes a physical attribute and/or an identification attribute.
10. A database information management system, the system comprising:
the device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring first information and second information of an object, and the first information and the second information belong to the same information type; and acquiring auxiliary information of the object, the auxiliary information including first and second comparison information corresponding to the first and second information, respectively;
and the information management module is used for confirming the information record of the object in the database based on the verification result of the first information and the first comparison information and the verification result of the second information and the second comparison information.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1-9 when executing the computer program.
12. A computer-readable storage medium storing computer instructions which, when read by a computer, cause the computer to perform the method of any one of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210051804.9A CN114090678A (en) | 2022-01-18 | 2022-01-18 | Database information management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210051804.9A CN114090678A (en) | 2022-01-18 | 2022-01-18 | Database information management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114090678A true CN114090678A (en) | 2022-02-25 |
Family
ID=80308705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210051804.9A Pending CN114090678A (en) | 2022-01-18 | 2022-01-18 | Database information management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114090678A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101097596A (en) * | 2006-06-29 | 2008-01-02 | 富士通株式会社 | Biometric authentication method and system |
CN110443014A (en) * | 2019-07-31 | 2019-11-12 | 成都商汤科技有限公司 | Auth method, the electronic equipment for authentication and server, system |
CN113177850A (en) * | 2021-04-15 | 2021-07-27 | 国任财产保险股份有限公司 | Method and device for multi-party identity authentication of insurance |
CN113343211A (en) * | 2021-06-24 | 2021-09-03 | 工银科技有限公司 | Data processing method, processing system, electronic device and storage medium |
CN113870468A (en) * | 2021-12-02 | 2021-12-31 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
-
2022
- 2022-01-18 CN CN202210051804.9A patent/CN114090678A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101097596A (en) * | 2006-06-29 | 2008-01-02 | 富士通株式会社 | Biometric authentication method and system |
CN110443014A (en) * | 2019-07-31 | 2019-11-12 | 成都商汤科技有限公司 | Auth method, the electronic equipment for authentication and server, system |
CN113177850A (en) * | 2021-04-15 | 2021-07-27 | 国任财产保险股份有限公司 | Method and device for multi-party identity authentication of insurance |
CN113343211A (en) * | 2021-06-24 | 2021-09-03 | 工银科技有限公司 | Data processing method, processing system, electronic device and storage medium |
CN113870468A (en) * | 2021-12-02 | 2021-12-31 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9762581B1 (en) | Multifactor authentication through wearable electronic device | |
CN103324909B (en) | Facial feature detection | |
KR101170222B1 (en) | User authentication device, user authentication method, and computer-readable recording medium having user authentication program | |
US20180189583A1 (en) | Trusted mobile biometric enrollment | |
CN113870468B (en) | Control method and system of intelligent lock | |
EP4050846A1 (en) | Remote usage of locally stored biometric authentication data | |
US20130082823A1 (en) | Method and system to authenticate an object | |
CN107924436A (en) | Control is accessed using the electronic device of biological identification technology | |
CA2557203A1 (en) | System for personal identity verification | |
US11611881B2 (en) | Integrated systems and methods for passive authentication | |
CN112330322A (en) | Device, method and system for user identity verification | |
JP2018128736A (en) | Face authentication system, face authentication method and face authentication program | |
CN113792668A (en) | Face recognition and access control method and device, computer equipment and storage medium | |
KR102098936B1 (en) | Smart access management system | |
Yang et al. | Retraining and dynamic privilege for implicit authentication systems | |
CN114090678A (en) | Database information management method and system | |
Chaitanya et al. | Verification of pattern unlock and gait behavioural authentication through a machine learning approach | |
JP5422326B2 (en) | Biometric authentication device | |
CN114139021B (en) | Index information management method and system | |
CN114021181A (en) | Mobile intelligent terminal privacy continuous protection system and method based on use habits | |
JP7176157B1 (en) | LEARNING MODEL CREATION SYSTEM, LEARNING MODEL CREATION METHOD AND PROGRAM | |
CN117010893A (en) | Transaction risk control method and device based on biological recognition and computer equipment | |
KR102177392B1 (en) | User authentication system and method based on context data | |
Saravanakumar et al. | Secure personal authentication in fog devices via multimodal rank‐level fusion | |
CN110942317A (en) | Safety tool recommendation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220225 |