CN114093046B - Sign-in method, device and equipment based on two-dimension code - Google Patents

Sign-in method, device and equipment based on two-dimension code Download PDF

Info

Publication number
CN114093046B
CN114093046B CN202111320123.XA CN202111320123A CN114093046B CN 114093046 B CN114093046 B CN 114093046B CN 202111320123 A CN202111320123 A CN 202111320123A CN 114093046 B CN114093046 B CN 114093046B
Authority
CN
China
Prior art keywords
dimensional
sign
video data
dimensional code
display device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111320123.XA
Other languages
Chinese (zh)
Other versions
CN114093046A (en
Inventor
苏千秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202111320123.XA priority Critical patent/CN114093046B/en
Publication of CN114093046A publication Critical patent/CN114093046A/en
Application granted granted Critical
Publication of CN114093046B publication Critical patent/CN114093046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • G06K7/1443Methods for optical code recognition including a method step for retrieval of the optical code locating of the code in an image

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The embodiment of the specification discloses a sign-in method, a sign-in device and sign-in equipment based on two-dimension codes. The scheme may include: after target video data acquired by using a depth-of-field camera device is acquired, judging whether the target video data is video data acquired by acquiring a sign-in two-dimensional code carried in a three-dimensional display device, and if so, performing sign-in processing on target matters based on the sign-in two-dimensional code in the target video data. The three-dimensional display device can comprise a sign-in code display surface and a three-dimensional identification auxiliary surface, the sign-in code display surface and the three-dimensional identification auxiliary surface are located in different planes, the sign-in code display surface can be used for displaying sign-in two-dimensional codes, and the three-dimensional identification auxiliary surface can be used for assisting in generating the judging result.

Description

Sign-in method, device and equipment based on two-dimension code
Technical Field
The application relates to the technical field of two-dimensional codes, in particular to a sign-in method, a sign-in device and sign-in equipment based on two-dimensional codes.
Background
The application of the mobile internet technology is not separated from the interaction and sharing of information, and the two-dimensional code (Quick Response Code) has the characteristics of large data storage capacity, good confidentiality and the like, so that the application of the two-dimensional code technology is wider and wider under the mobile internet service mode. For example, tracking and tracing of material circulation are realized by using a two-dimensional code, electronic payment is performed by using a two-dimensional code for collection or a two-dimensional code for payment, sign-in is performed based on the two-dimensional code, and the like. Because the user may be required to check in on site at the designated check-in place in the check-in scene, lawless persons can take and transmit the photos or videos of the check-in two-dimensional code, so that the user who is not at the designated check-in place can check in on site based on the photos or videos of the check-in two-dimensional code.
Based on the above, how to prevent users from cheating based on two-dimension code sign-in becomes a technical problem to be solved urgently.
Disclosure of Invention
The sign-in method, the sign-in device and the sign-in equipment based on the two-dimension code, which are provided by the embodiment of the specification, can prevent the user from cheating when signing in based on the two-dimension code, so as to ensure the authenticity of the sign-in result of the user.
In order to solve the above technical problems, the embodiments of the present specification are implemented as follows:
The sign-in method based on the two-dimensional code provided by the embodiment of the specification comprises the following steps:
Acquiring target video data acquired by a field depth camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target matters;
Judging whether the target video data are video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device or not, and obtaining a judging result; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the three-dimensional identification auxiliary surface is used for assisting in generating the judging result;
And if the judging result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device, sign-in processing is performed on the target matters based on the sign-in two-dimensional codes in the target video data.
The embodiment of the specification provides a sign-in device based on two-dimensional code, includes:
the first acquisition module is used for acquiring target video data acquired by using a depth-of-field camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target matters;
The judging module is used for judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device or not, and obtaining a judging result; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the three-dimensional identification auxiliary surface is used for assisting in generating the judging result;
and the sign-in processing module is used for carrying out sign-in processing on the target item based on the sign-in two-dimensional code in the target video data if the judgment result indicates that the target video data is the video data obtained by collecting the sign-in two-dimensional code carried in the three-dimensional display device.
The embodiment of the present specification provides a sign-in equipment based on two-dimensional code, includes:
At least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to:
Acquiring target video data acquired by a field depth camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target matters;
Judging whether the target video data are video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device or not, and obtaining a judging result; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the three-dimensional identification auxiliary surface is used for assisting in generating the judging result;
And if the judging result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device, sign-in processing is performed on the target matters based on the sign-in two-dimensional codes in the target video data.
At least one embodiment provided in this specification enables the following benefits:
After target video data acquired by a user to be checked in for a target item by using a depth-of-field camera device and acquired by a two-dimensional code to be checked in is acquired, whether the target video data is the video data acquired by acquiring the two-dimensional code to be checked in carried in a three-dimensional display device is judged, if so, the user to be checked in can be indicated to be on site of a designated check-in site for the target item, so that the user to be checked in can be checked in for the target item based on the two-dimensional code to be checked in the target video data acquired by the user to be checked in, the user to be checked in can be prevented from being checked in for the target item even if the user to be checked in is not at the designated check-in site, the possibility that the user to be checked in is cheated when the user to be checked in based on the two-dimensional code is reduced, and the reality of the user check-in result is improved.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments described in the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of an overall scheme of a sign-in method based on a two-dimensional code in an embodiment of the present disclosure;
Fig. 2 is a flow chart of a sign-in method based on two-dimension codes according to an embodiment of the present disclosure;
Fig. 3 is a schematic diagram of graphic information to be displayed by the stereoscopic display device according to the embodiment of the present disclosure;
Fig. 4 is a schematic diagram of a lane flow corresponding to the two-dimensional code-based check-in method in fig. 2 according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a sign-in device based on two-dimensional code corresponding to fig. 2 according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a sign-in device based on two-dimensional code corresponding to fig. 2 according to an embodiment of the present disclosure.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of one or more embodiments of the present specification more clear, the technical solutions of one or more embodiments of the present specification will be clearly and completely described below in connection with specific embodiments of the present specification and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present specification. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without undue burden, are intended to be within the scope of one or more embodiments herein.
The following describes in detail the technical solutions provided by the embodiments of the present specification with reference to the accompanying drawings.
In the prior art, the two-dimensional code has the characteristics of convenient use, large information storage capacity, high fault tolerance and the like, and is widely applied to check-in activities. The sign-in event organizer can use the target application program in advance to generate a sign-in two-dimensional code aiming at the target item, and sign-in two-dimensional code photos printed are posted at a designated sign-in place, or the sign-in two-dimensional code is displayed at the designated sign-in place through an electronic screen, so that a sign-in user can sign in by scanning the sign-in two-dimensional code through using terminal equipment, the process of queuing sign-in information and the like by the user can be omitted, and the sign-in efficiency and user experience can be improved.
However, in a part of check-in scenes, a user to be checked-in needs to check in on site at a designated check-in site, for example, a work attendance check-in scene, a site check-in gift scene, a conference check-in scene, etc., at present, when the user to be checked-in uses terminal equipment to scan a check-in two-dimensional code to check in, positioning information of the terminal equipment is generally obtained, whether the positioning information of the terminal equipment is consistent with the positioning information of the designated check-in site or not is verified, if so, it is indicated that the user to which the terminal equipment belongs (i.e., the user to be checked-in) performs on site at the designated check-in site, and then the user to be checked-in can be allowed to finish check-in based on the check-in two-dimensional code.
The user can modify the positioning information of the terminal equipment by utilizing the virtual positioning application carried at the terminal equipment, so that lawless persons can sign in by tampering with the positioning information of the terminal equipment and based on photos or videos of the sign-in two-dimensional codes transmitted by other people, and the sign-in can be completed on site under the condition that the person does not sign in the site. Obviously, based on the existing signing-in scheme, the user cannot be prevented from cheating when signing in based on the two-dimensional code, and the authenticity of the signing-in result cannot be guaranteed.
In order to solve the drawbacks of the prior art, the present solution provides the following embodiments:
fig. 1 is a schematic flow chart of an overall scheme of a sign-in method based on two-dimension codes in an embodiment of the present disclosure.
As shown in fig. 1, when a sign-in activity organizer needs to make a user to be signed in for a target item, the sign-in activity organizer can generate a sign-in two-dimensional code and an encrypted image-text for the target item by using a target application, and the sign-in two-dimensional code and the encrypted image-text are displayed by a sign-in code display surface and a three-dimensional identification auxiliary surface located in different planes in the three-dimensional display device 102 respectively. The check-in event organizer may further place the stereoscopic display device 102 at a designated check-in site for the target item, for example, a commodity to be traced, a corporate office site, or a check-in event holding site, so that a user to be checked-in arriving at the designated check-in site may use the depth camera 104 to perform video capturing for the stereoscopic display device 102 to obtain the target video data.
The user to be checked in can also judge whether the target video data is video data obtained by collecting the check-in two-dimensional code carried in the three-dimensional display device or not by utilizing the client side of the target application or the service side of the target application carried by the terminal equipment, so as to obtain a judging result, if the judging result is yes, the user to be checked in and the three-dimensional display device are located at the same place, namely, the user to be checked in and checked out can check in the appointed check-in place aiming at the target item, so that the user to be checked in and checked out can check in aiming at the target item based on the check-in two-dimensional code in the target video data collected by the user to be checked in, and if the judging result is no, the user to be checked in and checked in can be indicated not to be checked in the appointed check-in place aiming at the target item, so that the user to be checked in and checked in can be prevented from being checked in based on the appointed check-in place, the fact that the user to be checked in and checked in can be finished aiming at the target item, and the fact that the user to be checked in and checked in is not based on the two-dimensional code is guaranteed is favorable.
Next, a sign-in method based on two-dimensional code provided for an embodiment of the specification will be specifically described with reference to the accompanying drawings:
Fig. 2 is a flow chart of a sign-in method based on two-dimension codes according to an embodiment of the present disclosure. From the program perspective, the execution body of the process may be a terminal device of the user to be checked in, or a target application for checking in carried at the terminal device of the user to be checked in, or a server of the target application. As shown in fig. 2, the process may include the steps of:
step 202: target video data acquired by using a depth-of-field camera device for a check-in two-dimensional code is acquired, wherein the check-in two-dimensional code is used for checking in for target matters.
In this embodiment of the present disclosure, when a check-in activity organizer needs to make a user check-in for a target item, the check-in activity organizer may generate a check-in two-dimensional code for the target item by using a target application, and display the check-in two-dimensional code on a designated check-in site for the target item through a stereoscopic display device, so that a user to be checked-in to reach the designated check-in site may check-in on the basis of the stereoscopic display device displaying the check-in two-dimensional code.
Depth of field (DOF) may refer to the distance range of a clear image presented by an imaging device in the range before and after focusing is completed. The depth camera may include a camera with a zoom function and/or a camera capable of acquiring depth information, such as a time-of-flight camera, a three-dimensional structured light camera, etc.
Because the mobile terminal such as a mobile phone, a portable computer, a smart watch and the like is usually provided with a depth-of-field camera device, when a user to be checked in needs to check in on site aiming at a target item, the user to be checked in can utilize the depth-of-field camera device provided with the mobile terminal to acquire video of the stereoscopic display device displaying the checked-in two-dimension code so as to obtain target video data. The target video data not only needs to contain the image of the check-in two-dimensional code, but also needs to contain the image of the two-dimensional code display device for displaying the check-in two-dimensional code, so that the check-in cheating identification is conducted based on the image of the two-dimensional code display device in the target video data, and the check-in processing is conducted based on the image of the check-in two-dimensional code in the target video data.
Step 204: judging whether the target video data are video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device or not, and obtaining a judging result; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the three-dimensional identification auxiliary surface is used for assisting in generating the judgment result.
In the embodiment of the present disclosure, the stereoscopic display device for carrying the check-in two-dimensional code may be selected by the check-in activity organizer, or may be specified by the target application for generating the check-in two-dimensional code. The three-dimensional display device can have various patterns, for example, regular three-dimensional patterns formed by planes, such as pyramids, quadrangular prisms and the like, irregular three-dimensional patterns formed by planes and curved surfaces, or three-dimensional patterns formed by splicing a plurality of regular three-dimensional patterns and/or irregular three-dimensional patterns, and the like, and different component surfaces of the three-dimensional display device can be intersected or not intersected, so that the three-dimensional display device is not limited in particular.
In the embodiment of the present disclosure, by determining whether the target video data is video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device, it may be determined whether the user to be checked-in is directly shooting the stereoscopic display device displaying the check-in two-dimensional code or shooting a photograph or video including the stereoscopic display device, so as to indirectly shoot the stereoscopic display device displaying the check-in two-dimensional code.
Because the stereoscopic display device bearing the check-in two-dimensional code is usually placed at the designated check-in site aiming at the target item, when the user to be checked-in is directly shooting the stereoscopic display device bearing the check-in two-dimensional code, the user to be checked-in and the stereoscopic display device are both located at the designated check-in site aiming at the target item, so that the user to be checked-in can be considered to be checked-in on the site. If it is determined that the user to be checked-in is in a place where the user to be checked-in is not in a designated check-in place for the target item, by taking a photo or video containing the stereoscopic display device, so that the stereoscopic display device displaying the check-in two-dimensional code is indirectly taken, the user to be checked-in can be considered to be in a check-in cheating mode.
Step 206: and if the judging result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device, sign-in processing is performed on the target matters based on the sign-in two-dimensional codes in the target video data.
And if the judging result indicates that the target video data is not video data obtained by collecting the check-in two-dimensional codes carried in the three-dimensional display device, prohibiting check-in processing for the target item based on the check-in two-dimensional codes in the target video data.
In the embodiment of the present disclosure, when it is determined that the target video data is video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device, the user to be checked in may be considered to check in on site at the designated check-in site for the target item where the stereoscopic display device is placed, so that the user to be checked in may check in for the target item based on the check-in two-dimensional code in the target video data.
Specifically, when the user to be checked in is checked in based on the check-in two-dimensional code in the target video data, the method may include: analyzing the sign-in two-dimensional code to obtain a sign-in link; acquiring user information; generating and sending a sign-in request for a user corresponding to the user information based on the sign-in link; in response to the check-in request, information prompting the user to check-in for the target item is generated and presented. The obtained user information may be user information of a logged-in account of a target application used by the user to be signed in, or may be device information of a terminal device used by the user to be signed in, which is not limited specifically.
In the embodiment of the present disclosure, when it is determined that the target video data is not video data obtained by collecting the two-dimensional code for sign-in carried in the stereoscopic display device, it may be considered that the user to be signed-in is not at the designated sign-in site for the target item where the stereoscopic display device is placed, that is, the user to be signed-in has a sign-in cheating behavior, so that the user to be signed-in may be prohibited from signing in for the target item based on the two-dimensional code for sign-in the target video data, so as to avoid the sign-in success of the user to be signed-in. In practical application, information prompting the user to check in failure can be displayed to the user to check in, so that the user to check in can acquire video again or stop executing the check in cheating behavior.
In the method in fig. 2, after the target video data acquired by the user for the check-in two-dimensional code of the target item by using the depth-of-field camera device is acquired, whether the target video data is the video data acquired by acquiring the check-in two-dimensional code carried in the stereoscopic display device is judged, if yes, the user can be indicated to check in the scene at the appointed check-in site for the target item, so that the user can check in for the target item based on the check-in two-dimensional code in the target video data acquired by the user, the situation that the user can check in for the target item even without the appointed check-in site is prevented, the possibility of cheating when the user checks in based on the two-dimensional code is reduced, and the reality of the user check-in result is improved.
Based on the method in fig. 2, the examples of the present specification also provide some specific embodiments of the method, as described below.
In the embodiment of the present disclosure, whether the target video data is acquired directly for the stereoscopic display device carrying the check-in two-dimensional code is required to be identified, so as to identify check-in cheating. Therefore, the user to be checked in can change the lens focal length parameters of the depth-of-field camera device in the process of collecting the target video data, and when the depth-of-field camera device collects the target video data under different lens focal length parameters, the target video data can reflect the motion condition of the two-dimension code display device bearing the check-in two-dimension code and the depth-of-field change information. Based on the motion condition and depth of field change information of the two-dimensional code display device, whether a user to be checked in is directly photographed to the three-dimensional display device or photographed to a photo or video containing the three-dimensional display device can be determined, so that check-in cheating identification is realized.
Based on this, step 202 may specifically include: and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
In this embodiment of the present disclosure, to facilitate the user to check in knowing the operation requirement of collecting the target video data, the user to check in may further be prompted, that is, before step 202, may further include:
And acquiring a sign-in trigger operation of the user.
And displaying video acquisition prompt information, wherein the video acquisition prompt information is used for prompting a user to change the lens focal length parameter of the depth-of-field camera device in the target video data acquisition process. The video acquisition prompt information can also be used for prompting a user not to move the depth of field camera device, the display position of the sign-in two-dimensional code and the like.
In the embodiment of the present disclosure, a user to be checked in may need to check in using a target application carried in a terminal device, and therefore, the user to be checked in may trigger a check-in control of the target application to execute a check-in triggering operation. In response to the check-in trigger operation, the target application may invoke the depth camera for video capture. Before video acquisition by using the depth camera device, or during video acquisition by using the depth camera device, the target application may display video acquisition prompt information, for example, "please stretch the camera," to facilitate the user to acquire target video data according to the prompt information.
In practical applications, the operation of changing the lens focal length parameter of the depth of view image capturing apparatus by the user may be identified by the terminal device or the target application carried at the terminal device, so that the terminal device or the target application may combine the video data collected before the execution of the focusing operation and the video data collected after the execution of the focusing operation as the target video data after the identification of the user has executed the focusing operation.
In the embodiment of the present disclosure, the implementation manner of determining whether the target video data in step 204 is the video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device may be various.
Implementation one
Step 204 may specifically include:
Determining motion trail data of a two-dimensional code display device in the target video data; the two-dimensional code display device displays the sign-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the motion trail data.
In the embodiment of the present disclosure, since the focal length parameter of the scene depth camera device changes during the acquisition process of the target video data, although the position of the two-dimensional code display device displaying the checked-in two-dimensional code does not change, there is still a relative operation between the lens of the depth camera device and the checked-in two-dimensional code, so that the motion trail data of the two-dimensional code display device in the target video data can be determined.
Because the motion trail data of the three-dimensional object and the motion trail data of the planar object are not consistent, if the motion trail data of the two-dimensional code display device are consistent with the motion trail data of the three-dimensional display device caused by stretching the depth of field camera device, it can be determined that the target video data is obtained by shooting the check-in two-dimensional code carried in the three-dimensional display device, but not by shooting a photo or video containing the three-dimensional display device carrying the check-in two-dimensional code, and at the moment, the check-in cheating risk is low. Similarly, if the motion trail data of the two-dimensional code display device is inconsistent with the motion trail data of the three-dimensional display device caused by the stretching depth of field camera device, it can be determined that the target video data is obtained by shooting a photo or video of the three-dimensional display device containing the check-in two-dimensional code instead of collecting the check-in two-dimensional code carried in the three-dimensional display device, and at this time, the check-in cheating risk is high.
In practical applications, there may be various ways to determine the motion trail data of the two-dimensional code display device in the target video data. For example, optical flow (Optical flow or optic flow) may be used to describe the motion of an observed object, surface, or edge caused by motion relative to an observer, and thus may be used to calculate the motion vector of a two-dimensional code presentation device in adjacent image frames within the target video data, thereby determining the motion trajectory data of the two-dimensional code presentation device in the target video data. Or the video data sample containing the two-dimensional code display device and the motion trail data of the two-dimensional code display device corresponding to the video data sample can be used for training the neural network model, so that the motion trail data and the like of the two-dimensional code display device in the target video data can be determined by using the neural network model. This is not particularly limited.
In the embodiment of the present disclosure, the user to check in may not perform the focusing operation during the process of collecting the target video data, but simulate the focusing operation by moving the depth camera, but in reality, there is a large difference between the motion track data of the two-dimensional code display device in the video data collected based on the focusing operation and the motion track data of the two-dimensional code display device in the target video data collected based on the moving depth camera, so the scheme provided in the embodiment can also prevent the problem of the user to check in and cheat by moving the depth camera.
Implementation II
Step 204 may specifically include:
performing three-dimensional reconstruction processing on a two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model; the two-dimensional code display device displays the sign-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the three-dimensional reconstruction model.
In the embodiment of the present disclosure, the target video data collected by the depth-of-field camera device may include depth information, so that three-dimensional reconstruction can be performed on the two-dimensional code display device in the target video data based on the depth information, and if the obtained three-dimensional reconstruction model is consistent with the model corresponding to the stereoscopic display device, it can be determined that the target video data is video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device, and at this time, the risk of check-in cheating is low. If the obtained three-dimensional reconstruction model is inconsistent with the model corresponding to the stereoscopic display device, for example, the three-dimensional reconstruction model belongs to a planar structure or a two-dimensional structure, it can be determined that the target video data is obtained by shooting a photograph or video of the stereoscopic display device containing the sign-in two-dimensional code instead of collecting the sign-in two-dimensional code carried in the stereoscopic display device, and at this time, the sign-in cheating risk is high.
In practical applications, there are various implementation manners for performing three-dimensional reconstruction processing on the two-dimensional code display device in the target video data, for example, a three-dimensional reconstruction manner based on DynamicFusion methods, a three-dimensional reconstruction manner based on KinectFusion algorithm, a dense reconstruction (Multiple View Stereo) manner, and the like, which are not particularly limited.
In the embodiment of the specification, in order to prevent illegal molecules from printing the sign-in two-dimensional code by themselves, and after the sign-in two-dimensional code is placed in the three-dimensional display device, video acquisition is performed to perform sign-in cheating, and encryption graphics and texts can be displayed in the three-dimensional display device so as to improve the authenticity of a sign-in result based on the encryption graphics and texts.
Specifically, before executing step 202, the sign-in activity organizer may request the target application to generate a sign-in two-dimensional code for the target item, and after receiving the two-dimensional code information generation request for the target item, the target application may respond to the two-dimensional code information generation request to generate a sign-in two-dimensional code and an encrypted image-text, and establish a corresponding relationship between the encrypted image-text and the sign-in two-dimensional code. The encryption image-text can be obtained by encrypting the appointed information, and the target application can also obtain the appointed information by decrypting the encryption image-text. In the present embodiment, the content of the specification information is not limited.
In this embodiment of the present disclosure, the stereoscopic display device may include a sign-in code display surface and a stereoscopic identification auxiliary surface located on different planes, where the sign-in code display surface may be used to display a sign-in two-dimensional code, and then the stereoscopic identification auxiliary surface may be used to display encrypted graphics. Based on the above, the target application needs to perform adaptation processing on the check-in two-dimensional code, the encrypted image and text and the three-dimensional display device in addition to generating the check-in two-dimensional code and the encrypted image and text so as to generate image and text information which can be displayed on the check-in code display surface and the three-dimensional identification auxiliary surface of the three-dimensional display device.
In practical application, the three-dimensional identification auxiliary surfaces of the three-dimensional display device can be multiple, wherein part or all of the three-dimensional identification auxiliary surfaces can be used for displaying the encrypted image and text. Correspondingly, the target application can generate an encrypted image and text independently aiming at each three-dimensional identification auxiliary surface needing to display the encrypted image and text. Or the target application can also only generate one encrypted image and extract the encrypted image in each appointed area in the encrypted image to be used as the encrypted image to be displayed on each three-dimensional identification auxiliary surface, and determine each three-dimensional identification auxiliary surface to be displayed on each encrypted image according to the extracted display area of each encrypted image in the encrypted image.
For ease of understanding, fig. 3 is a schematic diagram of graphic information to be displayed by a stereoscopic display device according to an embodiment of the present disclosure, as shown in fig. 3, the stereoscopic display device is a quadrangular frustum, a top surface of the stereoscopic display device is a sign-in code display surface 302, and the stereoscopic display device has four stereoscopic identification auxiliary surfaces, wherein three stereoscopic identification auxiliary surfaces 304 are required to display encrypted graphics, and one stereoscopic identification auxiliary surface 306 is not required to display encrypted graphics. And, the stereoscopic display device may not need to have a bottom surface parallel to the top surface 302.
In the embodiment of the present disclosure, since the encrypted graphics may be displayed in the stereoscopic display device carrying the check-in two-dimensional code, it is necessary to perform check-in processing on the user to be checked-in after verifying the encrypted graphics displayed at the two-dimensional code display device in the target video data.
Namely step 206: based on the sign-in two-dimensional code in the target video data, before the sign-in processing is performed on the target item, the method may further include:
And acquiring the encrypted image-text displayed at the stereoscopic identification auxiliary surface in the target video data.
And verifying the encrypted image and text to obtain a verification result.
Step 206 may specifically include: and if the verification result indicates that verification is passed, performing sign-in processing on the target item based on the sign-in two-dimensional code in the target video data.
The scheme in fig. 2 may further include: and if the verification result indicates that the verification is not passed, prohibiting sign-in processing of the target item based on the sign-in two-dimensional code in the target video data.
The verifying the encrypted image and text specifically may include:
Decrypting the encrypted graphics context; and/or verifying whether the encrypted image-text and the sign-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
In the embodiment of the present disclosure, if the encryption of the graphics context is successful, it may indicate that the possibility that the user to be checked in is forged against the stereoscopic display device is low, so as to allow the user to be checked in to check in based on the check-in two-dimensional code in the target video data. If the encryption image-text decryption fails, the possibility that the user to be checked-in is forged for the stereoscopic display device can be indicated, so that the user to be checked-in is forbidden to check-in based on the check-in two-dimensional code in the target video data for target matters.
Subsequently, if it is determined that the information obtained by decrypting the encrypted image text in the target video data has a corresponding relation with the check-in two-dimensional code, the encrypted image text in the target video data and the check-in two-dimensional code can be represented as information generated by the target application in response to the two-dimensional code information generation request for the target item, at this time, the possibility that the user to be checked-in uses the fake three-dimensional display device to check-in is low, namely the check-in cheating risk is low, so that the user to be checked-in can be allowed to check-in based on the check-in two-dimensional code in the target video data.
If it is determined that the information obtained by decrypting the encrypted image and text in the target video data does not have a corresponding relation with the sign-in two-dimensional code, the fact that the user to be signed in is likely to sign in by using the fake three-dimensional display device can be indicated, at the moment, the sign-in cheating risk is higher, and therefore the sign-in processing of the user to be signed in aiming at the target item based on the sign-in two-dimensional code in the target video data can be forbidden, the fact that illegal persons sign in and cheat through the fake three-dimensional display device corresponding to the sign-in two-dimensional code is avoided, and the reality of the sign-in result based on the two-dimensional code is facilitated to be improved.
Fig. 4 is a schematic flow chart of a lane corresponding to the sign-in method based on two-dimension codes in fig. 2 according to an embodiment of the present disclosure. As shown in fig. 4, the two-dimensional code-based check-in flow may involve a check-in event organizer, a user to check in, a depth camera, a target application for providing a check-in service, and the like. It should be noted that, although the same target application is used by the sign-in event organizer and the user to be signed-in, the target applications used by the sign-in event organizer and the user to be signed-in are usually target applications carried at different devices.
In the generation stage of the stereoscopic display device, a check-in activity organizer can request a target application to generate two-dimensional code information for target matters. The target application can respond to the request to generate a sign-in two-dimensional code and an encrypted image-text aiming at the target item, and carry out adaptation processing on the sign-in two-dimensional code and the encrypted image-text according to the three-dimensional display device to obtain image-text information required to be displayed on each surface of the three-dimensional display device, and display the image-text information required to be displayed on each surface of the three-dimensional display device to a sign-in movable organizer. The sign-in activity organizer can manufacture the stereoscopic display device according to the graphic information required to be displayed on each surface of the stereoscopic display device provided by the target application, and place the manufactured stereoscopic display device at the appointed sign-in place aiming at the target item.
In the check-in stage, a user to be checked-in can execute a check-in triggering operation aiming at an application page of a target application carried at the mobile terminal, and the target application responds to the check-in triggering operation, so that video acquisition prompt information can be displayed for the user to be checked-in before the user to be checked-in acquires target video data or in the process of acquiring the target video data, so as to prompt the user to change the lens focal length parameter of the depth-of-field camera device in the process of acquiring the target video data. The target application can also respond to the sign-in triggering operation to call a depth-of-field camera device carried at the terminal equipment to acquire video so as to obtain target video data acquired by the depth-of-field camera device aiming at the sign-in two-dimensional code.
The target application can also judge whether the target video data is video data obtained by collecting the sign-in two-dimensional code carried in the three-dimensional display device, if not, the sign-in user is forbidden to sign in the target video data based on the sign-in two-dimensional code, and if so, the encrypted image-text displayed at the three-dimensional identification auxiliary surface of the three-dimensional display device in the target video data is verified, so that a verification result is obtained. If the verification result shows that the verification is passed, based on the two-dimensional code in the target video data, the user to be checked in is enabled to check in for the target item, and if the verification result shows that the verification is not passed, the user to be checked in is disabled to check in for the target item based on the two-dimensional code in the target video data.
Based on the same thought, the embodiment of the specification also provides a device corresponding to the method. Fig. 5 is a schematic structural diagram of a sign-in device based on two-dimension codes corresponding to fig. 2 according to an embodiment of the present disclosure. As shown in fig. 5, the apparatus may include:
the first obtaining module 502 is configured to obtain target video data obtained by using a depth camera to collect a check-in two-dimensional code, where the check-in two-dimensional code is used to check in for a target item.
The judging module 504 is configured to judge whether the target video data is video data obtained by collecting the sign-in two-dimensional code carried in the stereoscopic display device, so as to obtain a judging result; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the three-dimensional identification auxiliary surface is used for assisting in generating the judgment result.
And a sign-in processing module 506, configured to, if the determination result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional code carried in the stereoscopic display device, perform sign-in processing on the target item based on the sign-in two-dimensional code in the target video data.
The present description example also provides some specific embodiments of the device based on the device of fig. 5, which is described below.
Optionally, the first obtaining module 502 may specifically be configured to:
and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
Optionally, the apparatus in fig. 5 may further include:
The second acquisition module is used for acquiring the sign-in triggering operation of the user.
The display module is used for displaying video acquisition prompt information, and the video acquisition prompt information is used for prompting a user to change the lens focal length parameter of the depth-of-field camera device in the target video data acquisition process.
Optionally, the determining module 504 may specifically be configured to:
Determining motion trail data of a two-dimensional code display device in the target video data; the two-dimensional code display device displays the sign-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the motion trail data.
Optionally, the determining module 504 may specifically be configured to:
performing three-dimensional reconstruction processing on a two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model; the two-dimensional code display device displays the sign-in two-dimensional code.
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the three-dimensional reconstruction model.
Optionally, the stereoscopic identification auxiliary surface is provided with an encrypted image and text; the apparatus in fig. 5 may further include:
And the third acquisition module is used for acquiring the encrypted image-text displayed at the three-dimensional identification auxiliary surface in the target video data.
And the verification module is used for verifying the encrypted image and text to obtain a verification result.
The check-in processing module 506 may specifically be configured to:
And if the verification result indicates that verification is passed, performing sign-in processing on the target item based on the sign-in two-dimensional code in the target video data.
Optionally, the apparatus in fig. 5 may further include:
And the first sign-in prohibition module is used for prohibiting sign-in processing for the target item based on the sign-in two-dimensional code in the target video data if the verification result indicates that verification is not passed.
Optionally, the verification module may specifically be configured to:
Decrypting the encrypted graphics context; and/or verifying whether the encrypted image-text and the sign-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
Optionally, the apparatus in fig. 5 may further include:
and the second sign-in prohibition module is used for prohibiting sign-in processing for the target item based on the sign-in two-dimensional code in the target video data if the judgment result indicates that the target video data is not the video data obtained by collecting the sign-in two-dimensional code carried in the three-dimensional display device.
Based on the same thought, the embodiment of the specification also provides equipment corresponding to the method.
Fig. 6 is a schematic structural diagram of a sign-in device based on two-dimensional code corresponding to fig. 2 according to an embodiment of the present disclosure. As shown in fig. 6, the apparatus 600 may include:
at least one processor 610; and
A memory 630 communicatively coupled to the at least one processor; wherein,
The memory 630 stores instructions 620 executable by the at least one processor 610 to enable the at least one processor 610 to:
target video data acquired by using a depth-of-field camera device for a check-in two-dimensional code is acquired, wherein the check-in two-dimensional code is used for checking in for target matters.
Judging whether the target video data are video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device or not, and obtaining a judging result; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, and the three-dimensional identification auxiliary surface is used for assisting in generating the judgment result.
And if the judging result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device, sign-in processing is performed on the target matters based on the sign-in two-dimensional codes in the target video data.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the apparatus shown in fig. 6, the description is relatively simple, as it is substantially similar to the method embodiment, with reference to the partial description of the method embodiment.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable GATE ARRAY, FPGA)) is an integrated circuit whose logic functions are determined by user programming of the device. The designer programs itself to "integrate" a digital system onto a single PLD without requiring the chip manufacturer to design and fabricate application specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented with "logic compiler (logic compiler)" software, which is similar to the software compiler used in program development and writing, and the original code before being compiled is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but HDL is not just one, but a plurality of kinds, such as ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language), and VHDL (Very-High-SPEED INTEGRATED Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application SPECIFIC INTEGRATED Circuits (ASICs), programmable logic controllers, and embedded microcontrollers, examples of controllers include, but are not limited to, the following microcontrollers: ARC625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in the same piece or pieces of software and/or hardware when implementing the present application.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (19)

1. A sign-in method based on two-dimensional codes, comprising:
Acquiring target video data acquired by a field depth camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target matters;
Judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the motion trail data of the two-dimensional code display device in the target video data or the three-dimensional reconstruction model of the two-dimensional code display device, and obtaining a judgment result, wherein the sign-in two-dimensional codes are displayed in the two-dimensional code display device, and the three-dimensional reconstruction model of the two-dimensional code display device is obtained by three-dimensionally reconstructing the two-dimensional code display device; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, an encrypted image and text is displayed in the three-dimensional identification auxiliary surface, and the three-dimensional identification auxiliary surface is used for assisting in generating the judging result;
And if the judging result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device, sign-in processing is performed on the target matters based on the sign-in two-dimensional codes in the target video data.
2. The method of claim 1, wherein the acquiring the target video data acquired by the depth camera for the check-in two-dimensional code specifically comprises:
and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
3. The method of claim 2, further comprising, before the acquiring the target video data acquired for the check-in two-dimensional code by using the depth camera,:
Acquiring a sign-in trigger operation of a user;
And displaying video acquisition prompt information, wherein the video acquisition prompt information is used for prompting a user to change the lens focal length parameter of the depth-of-field camera device in the target video data acquisition process.
4. The method of claim 1, wherein the determining whether the target video data is video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device specifically comprises:
determining motion trail data of a two-dimensional code display device in the target video data;
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the motion trail data.
5. The method of claim 1, wherein the determining whether the target video data is video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device specifically comprises:
Performing three-dimensional reconstruction processing on a two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model;
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the three-dimensional reconstruction model.
6. The method of claim 1, wherein the signing process for the target item based on the two-dimensional code of signing in the target video data further comprises:
Acquiring an encrypted image-text displayed at the three-dimensional identification auxiliary surface in the target video data;
verifying the encrypted image and text to obtain a verification result;
The sign-in processing is performed for the target item based on the sign-in two-dimensional code in the target video data, and specifically includes:
And if the verification result indicates that verification is passed, performing sign-in processing on the target item based on the sign-in two-dimensional code in the target video data.
7. The method of claim 6, wherein the verifying the encrypted text, after obtaining the verification result, further comprises:
And if the verification result indicates that the verification is not passed, prohibiting sign-in processing of the target item based on the sign-in two-dimensional code in the target video data.
8. The method according to any one of claims 6 or 7, wherein the verifying the encrypted text specifically comprises:
decrypting the encrypted graphics context; and/or the number of the groups of groups,
And verifying whether the encrypted image-text and the sign-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
9. The method of claim 1, wherein the determining whether the target video data is video data obtained by collecting the check-in two-dimensional code carried in the stereoscopic display device further comprises:
And if the judging result indicates that the target video data is not the video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device, prohibiting sign-in processing for the target item based on the sign-in two-dimensional codes in the target video data.
10. Sign-in device based on two-dimensional code includes:
the first acquisition module is used for acquiring target video data acquired by using a depth-of-field camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target matters;
The judging module is used for judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the motion trail data of the two-dimensional code display device in the target video data or the three-dimensional reconstruction model of the two-dimensional code display device, so as to obtain a judging result, wherein the sign-in two-dimensional codes are displayed in the two-dimensional code display device, and the three-dimensional reconstruction model of the two-dimensional code display device is used for carrying out three-dimensional reconstruction on the two-dimensional code display device; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, an encrypted image and text is displayed in the three-dimensional identification auxiliary surface, and the three-dimensional identification auxiliary surface is used for assisting in generating the judging result;
and the sign-in processing module is used for carrying out sign-in processing on the target item based on the sign-in two-dimensional code in the target video data if the judgment result indicates that the target video data is the video data obtained by collecting the sign-in two-dimensional code carried in the three-dimensional display device.
11. The apparatus of claim 10, the first acquisition module being specifically configured to:
and acquiring target video data acquired by the depth-of-field camera device aiming at the check-in two-dimensional code under different lens focal length parameters.
12. The apparatus of claim 11, further comprising:
The second acquisition module is used for acquiring sign-in triggering operation of the user;
the display module is used for displaying video acquisition prompt information, and the video acquisition prompt information is used for prompting a user to change the lens focal length parameter of the depth-of-field camera device in the target video data acquisition process.
13. The apparatus of claim 10, wherein the judging module is specifically configured to:
determining motion trail data of a two-dimensional code display device in the target video data;
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the motion trail data.
14. The apparatus of claim 10, wherein the judging module is specifically configured to:
Performing three-dimensional reconstruction processing on a two-dimensional code display device in the target video data to obtain a three-dimensional reconstruction model;
And judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the three-dimensional reconstruction model.
15. The apparatus of claim 10, further comprising:
the third acquisition module is used for acquiring the encrypted image-text displayed at the three-dimensional identification auxiliary surface in the target video data;
the verification module is used for verifying the encrypted image and text to obtain a verification result;
The sign-in processing module is specifically configured to:
And if the verification result indicates that verification is passed, performing sign-in processing on the target item based on the sign-in two-dimensional code in the target video data.
16. The apparatus of claim 15, further comprising:
And the first sign-in prohibition module is used for prohibiting sign-in processing for the target item based on the sign-in two-dimensional code in the target video data if the verification result indicates that verification is not passed.
17. The apparatus according to any one of claims 15 or 16, wherein the verification module is specifically configured to:
decrypting the encrypted graphics context; and/or the number of the groups of groups,
And verifying whether the encrypted image-text and the sign-in two-dimensional code are information generated by a target application in response to a two-dimensional code information generation request aiming at the target item.
18. The apparatus of claim 10, further comprising:
and the second sign-in prohibition module is used for prohibiting sign-in processing for the target item based on the sign-in two-dimensional code in the target video data if the judgment result indicates that the target video data is not the video data obtained by collecting the sign-in two-dimensional code carried in the three-dimensional display device.
19. Sign-in equipment based on two-dimensional code includes:
At least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to:
Acquiring target video data acquired by a field depth camera device aiming at a check-in two-dimensional code, wherein the check-in two-dimensional code is used for checking in aiming at target matters;
Judging whether the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device according to the motion trail data of the two-dimensional code display device in the target video data or the three-dimensional reconstruction model of the two-dimensional code display device, and obtaining a judgment result, wherein the sign-in two-dimensional codes are displayed in the two-dimensional code display device, and the three-dimensional reconstruction model of the two-dimensional code display device is obtained by three-dimensionally reconstructing the two-dimensional code display device; the three-dimensional display device comprises a sign-in code display surface and a three-dimensional identification auxiliary surface, wherein the sign-in code display surface and the three-dimensional identification auxiliary surface are positioned on different planes, the sign-in code display surface is used for displaying the sign-in two-dimensional code, an encrypted image and text is displayed in the three-dimensional identification auxiliary surface, and the three-dimensional identification auxiliary surface is used for assisting in generating the judging result;
And if the judging result indicates that the target video data is video data obtained by collecting the sign-in two-dimensional codes carried in the three-dimensional display device, sign-in processing is performed on the target matters based on the sign-in two-dimensional codes in the target video data.
CN202111320123.XA 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code Active CN114093046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111320123.XA CN114093046B (en) 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111320123.XA CN114093046B (en) 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code

Publications (2)

Publication Number Publication Date
CN114093046A CN114093046A (en) 2022-02-25
CN114093046B true CN114093046B (en) 2024-06-07

Family

ID=80299636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111320123.XA Active CN114093046B (en) 2021-11-09 2021-11-09 Sign-in method, device and equipment based on two-dimension code

Country Status (1)

Country Link
CN (1) CN114093046B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10143621A (en) * 1996-10-29 1998-05-29 American Bank Note Holographic Inc Card security system, method for improving security, card reading device and card issuing device and hologram reading device
JP2005010581A (en) * 2003-06-20 2005-01-13 Fuji Xerox Co Ltd Method and device for confirming article
WO2013033442A1 (en) * 2011-08-30 2013-03-07 Digimarc Corporation Methods and arrangements for identifying objects
JP2014049063A (en) * 2012-09-04 2014-03-17 Casio Comput Co Ltd Three-dimensional code reading method and three-dimensional code reading device
CN104504767A (en) * 2014-11-26 2015-04-08 广东安居宝数码科技股份有限公司 Check-in information verification method and system
CN104581630A (en) * 2014-12-31 2015-04-29 浙江融创信息产业有限公司 Self-service anti-cheating sign-in method based on position service and two-dimensional code technology
CN104715337A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Attendance method, and attendance management method and device
WO2015117441A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Mobile terminal, and automatic external lens recognition method, device, and storage medium
CN205540982U (en) * 2016-01-29 2016-08-31 上海好想法网络科技有限公司 Handheld wireless equipment of registering
CN206147769U (en) * 2016-09-28 2017-05-03 郑州北斗七星通讯科技有限公司 Classroom management equipment of registering based on two -dimensional code and face identification
CN108537315A (en) * 2018-04-13 2018-09-14 中国人民武装警察部队工程大学 A kind of generation of safe Quick Response Code and authentication method
WO2019119978A1 (en) * 2017-12-19 2019-06-27 阿里巴巴集团控股有限公司 Carrier article, and service information obtaining method, apparatus and device
CN111432126A (en) * 2020-03-31 2020-07-17 浙江大华技术股份有限公司 Intelligent identification method and device, camera and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10143621A (en) * 1996-10-29 1998-05-29 American Bank Note Holographic Inc Card security system, method for improving security, card reading device and card issuing device and hologram reading device
JP2005010581A (en) * 2003-06-20 2005-01-13 Fuji Xerox Co Ltd Method and device for confirming article
WO2013033442A1 (en) * 2011-08-30 2013-03-07 Digimarc Corporation Methods and arrangements for identifying objects
JP2014049063A (en) * 2012-09-04 2014-03-17 Casio Comput Co Ltd Three-dimensional code reading method and three-dimensional code reading device
WO2015117441A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Mobile terminal, and automatic external lens recognition method, device, and storage medium
CN104504767A (en) * 2014-11-26 2015-04-08 广东安居宝数码科技股份有限公司 Check-in information verification method and system
CN104581630A (en) * 2014-12-31 2015-04-29 浙江融创信息产业有限公司 Self-service anti-cheating sign-in method based on position service and two-dimensional code technology
CN104715337A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Attendance method, and attendance management method and device
CN205540982U (en) * 2016-01-29 2016-08-31 上海好想法网络科技有限公司 Handheld wireless equipment of registering
CN206147769U (en) * 2016-09-28 2017-05-03 郑州北斗七星通讯科技有限公司 Classroom management equipment of registering based on two -dimensional code and face identification
WO2019119978A1 (en) * 2017-12-19 2019-06-27 阿里巴巴集团控股有限公司 Carrier article, and service information obtaining method, apparatus and device
CN108537315A (en) * 2018-04-13 2018-09-14 中国人民武装警察部队工程大学 A kind of generation of safe Quick Response Code and authentication method
CN111432126A (en) * 2020-03-31 2020-07-17 浙江大华技术股份有限公司 Intelligent identification method and device, camera and storage medium

Also Published As

Publication number Publication date
CN114093046A (en) 2022-02-25

Similar Documents

Publication Publication Date Title
TWI698764B (en) Identity verification method, system, device and equipment, server and acquisition equipment
CN106407914B (en) Method and device for detecting human face and remote teller machine system
Sepas-Moghaddam et al. Light field-based face presentation attack detection: reviewing, benchmarking and one step further
CN108629220A (en) A kind of two dimension code reading method, apparatus and equipment
CN109086645A (en) Face identification method, the recognition methods of device and fictitious users, device
CN110263775A (en) Image-recognizing method, device, equipment and authentication method, device, equipment
CN115457664A (en) Living body face detection method and device
TW201937400A (en) A living body detection method, device and apparatus
CN112990053B (en) Image processing method, device, equipment and storage medium
CN111242090A (en) Human face recognition method, device, equipment and medium based on artificial intelligence
CN117043863A (en) Recording augmented reality content on a glasses device
CN109002796A (en) A kind of image-pickup method, device and system and electronic equipment
Farrukh et al. FaceRevelio: a face liveness detection system for smartphones with a single front camera
CN116824339A (en) Image processing method and device
Younus et al. Abbreviated view of deepfake videos detection techniques
CN113343295B (en) Image processing method, device, equipment and storage medium based on privacy protection
CN114093046B (en) Sign-in method, device and equipment based on two-dimension code
CN111274602B (en) Image characteristic information replacement method, device, equipment and medium
CN109788199B (en) Focusing method suitable for terminal with double cameras
CN111199231A (en) Image identification method and device
Sutanto et al. 3D integral imaging based augmented reality with deep learning implemented by faster R-CNN
CN116977804A (en) Image fusion method, electronic device, storage medium and computer program product
US10044464B1 (en) Blocking the capture of photo and video content
CN113673374B (en) Face recognition method, device and equipment
CN111127345B (en) Image processing method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant