CN114299652A - Access control verification method, system, device and storage medium - Google Patents

Access control verification method, system, device and storage medium Download PDF

Info

Publication number
CN114299652A
CN114299652A CN202111638287.7A CN202111638287A CN114299652A CN 114299652 A CN114299652 A CN 114299652A CN 202111638287 A CN202111638287 A CN 202111638287A CN 114299652 A CN114299652 A CN 114299652A
Authority
CN
China
Prior art keywords
face
user
information
verification
face information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111638287.7A
Other languages
Chinese (zh)
Inventor
毕化镭
刘哲
王摞摞
刘浩辰
程琪榕
朱尔亮
胡立宏
朱徐立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202111638287.7A priority Critical patent/CN114299652A/en
Publication of CN114299652A publication Critical patent/CN114299652A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The application discloses an access control verification method, a system, equipment and a storage medium, wherein the method comprises the following steps: reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user; receiving first epidemic prevention data of the first user, fed back by the backend platform based on the identification code information; acquiring second face information within a preset image acquisition range, and performing one-to-one comparison on the second face information and the first face information; and if the first similarity between the second face information and the first face information is greater than or equal to a first preset threshold value, determining whether to issue an opening instruction to the access control equipment or not based on the first epidemic prevention data of the first user. The application ensures the consistency of the human code.

Description

Access control verification method, system, device and storage medium
Technical Field
The present application relates to the field of door access, and in particular, to a method, a system, a device, and a storage medium for verifying a door access.
Background
In order to ensure safety during the occurrence of infectious diseases or epidemic situations, strict epidemic prevention verification needs to be carried out on personnel in places such as subways, buses, markets, hospitals and the like, and the personnel passing the verification can pass through the access control in the places.
The existing method for carrying out epidemic prevention and verification on personnel is as follows: the security personnel manually judge whether the health codes and the like displayed in the mobile terminals of the personnel who need to enter the places meet the requirements, if so, the security personnel pass, however, the manual verification of the security personnel is easy to appear that the personnel acquire the health codes of other people and then enter the corresponding places.
That is, in the prior art, the accuracy of the human code consistency verification during the epidemic prevention verification is not high, so that the epidemic situation prevention and control risk is high.
Disclosure of Invention
In view of this, embodiments of the present application provide a method, a system, a device and a storage medium for access control verification, which aim to solve the technical problem that the verification accuracy of human code consistency is not high during the existing epidemic prevention verification, which causes high risk of epidemic situation prevention and control.
The embodiment of the application provides an access control verification method, which is applied to a verification component and comprises the following steps:
reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user;
receiving first epidemic prevention data of the first user, fed back by the backend platform based on the identification code information;
acquiring second face information within a preset image acquisition range, and performing one-to-one comparison on the second face information and the first face information;
and if the first similarity between the second face information and the first face information is greater than or equal to a first preset threshold value, determining whether to issue an opening instruction to the access control equipment or not based on the first epidemic prevention data of the first user.
In a possible implementation manner of the present application, the verification component is externally connected with an identification code reader through different external connection manners, the step of reading the identification code of the first user for epidemic prevention verification to obtain the identification code information includes:
reading the identification code of the first user for epidemic prevention verification through the identification code reader;
wherein, different external modes include external RS485, external RS232 and external USB mode.
In a possible implementation manner of the application, before receiving the first epidemic prevention data of the first user fed back by the backend platform based on the identification code information, third face information of the first user is further collected,
the step of comparing the second face information with the first face information in a one-to-one manner includes:
comparing the third face information with the second face information;
and if the second similarity of the third face information and the second face information is greater than or equal to a second preset threshold, performing one-to-one comparison on the second face information and the first face information, wherein the second preset threshold is greater than or equal to the first preset threshold.
In a possible implementation manner of the present application, after the step of performing one-to-one comparison on the second face information and the first face information, the method includes: if the first similarity of the second face information and the first face information is smaller than the first preset threshold value, determining that the face epidemic prevention verification of the first user fails, calling the first user to be inconsistent with the back-end platform user, reminding the first user to re-scan the first information of the identification code for epidemic prevention verification, and outputting the first information;
or after the step of comparing the third face information with the second face information, the method includes: if the second similarity is smaller than the second preset threshold, determining that the face epidemic prevention verification of the first user fails, calling the face of the first user to be replaced, reminding the first user to rescan the second information of the identification code for epidemic prevention verification, and outputting the second information.
In a possible embodiment of the present application, after the step of determining that the face of the first user fails the epidemic prevention verification, the method includes:
and deleting the second face information, the third face information and the first epidemic prevention data within a preset time period after the face verification fails.
In a possible embodiment of the present application, after the step of determining that the face of the first user fails the epidemic prevention verification, the method includes:
if the number of times of the face epidemic prevention verification failure of the first user exceeds the preset number of times, determining whether request information for managing a user to request to start an acquisition mode is received;
if the request information is received, acquiring target face information of the first user based on the acquisition mode;
and uploading the target face information to the back-end platform so that the back-end platform can update the first epidemic prevention data based on the target face information.
In a possible implementation manner of the present application, the face information is a face image, and the access control verification method further includes:
determining a face pitch angle, a face deflection angle and an eye distance of a second face image, and determining a second quality score of the second face image based on the face pitch angle, the face deflection angle and the eye distance of the second face image;
determining a face pitch angle, a face deflection angle and an eye distance of a third face image, and determining a third quality score of the third face image based on the face pitch angle, the face deflection angle and the eye distance of the third face image;
selecting a target quality score from the first quality score, the second quality score and the first quality score;
and sending the face information corresponding to the target quality score to the back-end platform so that the back-end platform can update the corresponding face information in the epidemic prevention data.
In a possible implementation manner of the present application, a local epidemic prevention database is set in the verification component, second epidemic prevention data of the local user is stored in the local epidemic prevention database, and the second epidemic prevention data includes fifth face information of the local user, and the method further includes:
if the touch operation on the face recognition button is detected, acquiring fourth face information of the second user;
comparing the fourth face information with the fifth face information in a one-to-many manner;
if the similarity between the fourth face information and the fifth face information is greater than or equal to a third preset threshold value, determining that the face epidemic prevention verification of the second user is successful;
and determining whether to issue an opening instruction to the access control equipment or not based on the second epidemic prevention data.
The application further provides an access control verification system, the access control verification system still includes:
a backend platform to: collecting first epidemic prevention data of a first user, wherein the first epidemic prevention data comprises first face information of the first user and first health code data of the first user; the first epidemic prevention data of the first user are fed back based on the identification code information of the verification component; the system is also used for receiving the face information corresponding to the target quality score sent by the verification component, updating the first epidemic prevention data based on the face information corresponding to the target quality score, receiving the target face information of the first user acquired by the verification component based on an acquisition mode, and updating the first epidemic prevention data based on the target face information;
entrance guard's equipment, entrance guard's equipment is used for: opening the access control when receiving an opening instruction of the verification assembly;
a verification component to: reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user; receiving first epidemic prevention data of the first user, fed back by the backend platform based on the identification code information; acquiring second face information within a preset image acquisition range, and performing one-to-one comparison on the second face information and the first face information; and if the first similarity between the second face information and the first face information is larger than or equal to a first preset threshold value, determining whether to issue an opening instruction to the access control equipment or not based on the first health code data of the first user.
In one possible implementation manner of the present application, the verification component is externally connected with an identification code card reader through different external connection manners, and the verification component is further configured to read an identification code of the first user for epidemic prevention verification through the identification code card reader; the different external connection modes comprise an external RS485 mode, an external RS232 mode and an external USB mode;
and/or before receiving first epidemic prevention data of the first user, which is fed back by the back-end platform based on the identification code information, the verification component is further used for acquiring third face information of the first user and comparing the third face information with the second face information; if the second similarity between the third face information and the second face information is greater than or equal to a second preset threshold, performing one-to-one comparison on the second face information and the first face information, wherein the second preset threshold is greater than or equal to the first preset threshold;
and/or after the one-to-one comparison between the second face information and the first face information is performed, the verification component is further configured to determine that the face epidemic prevention verification of the first user fails, call the first user that the first user is inconsistent with the back-end platform user, remind the first user to rescan the first information of the identification code for epidemic prevention verification, and output the first information if the first similarity between the second face information and the first face information is smaller than the first preset threshold; after the step of comparing the third face information with the second face information, if the second similarity is smaller than the second preset threshold, determining that the face anti-epidemic verification of the first user fails, calling the face of the first user to be replaced, reminding the first user to rescan the second information of the identification code for anti-epidemic verification, and outputting the second information;
and/or after determining that the face epidemic prevention verification of the first user fails, the verification component is further configured to delete the second face information, the third face information and the first epidemic prevention data within a preset time period after the face verification fails;
and/or after determining that the face epidemic prevention verification of the first user fails, the verification component is further configured to determine whether request information for managing a user to request to start an acquisition mode is received if the number of times of the face epidemic prevention verification failure of the first user exceeds a preset number of times; if the request information is received, acquiring target face information of the first user based on the acquisition mode; uploading the target face information to the back-end platform, so that the back-end platform updates the first epidemic prevention data based on the target face information;
and/or the face information is a face image, the verification component is further used for determining a face pitch angle, a face deflection angle and an eye distance of a second face image, and determining a second quality score of the second face image based on the face pitch angle, the face deflection angle and the eye distance of the second face image; the image quality evaluation system is also used for determining a face pitch angle, a face deflection angle and an eye distance of a third face image, and determining a third quality score of the third face image based on the face pitch angle, the face deflection angle and the eye distance of the third face image; selecting a target quality score from the first quality score, the second quality score, and the third quality score; sending the face information corresponding to the target quality score to the back-end platform so that the back-end platform can update the corresponding face information in the epidemic prevention data;
and/or the verification component is further used for setting a local epidemic prevention database, second epidemic prevention data of the local user are stored in the local epidemic prevention database, the second epidemic prevention data comprise fifth face information of the local user and second health code data of the local user, and the verification component is further used for collecting fourth face information of the second user if touch operation on a face recognition button is detected; comparing the fourth face information with the fifth face information in a one-to-many manner; if the similarity between the fourth face information and the fifth face information is greater than or equal to a third preset threshold value, determining that the face epidemic prevention verification of the second user is successful; and determining whether to issue an opening instruction to the access control equipment or not based on the second health code data.
This application still provides an entrance guard check equipment, entrance guard check equipment is entity node equipment, entrance guard check equipment includes: the access control verification method comprises a memory, a processor and a program of the access control verification method, wherein the program of the access control verification method is stored in the memory and can run on the processor, and the steps of the access control verification method can be realized when the program of the access control verification method is executed by the processor.
In order to achieve the above object, there is also provided a storage medium having an access verification program stored thereon, wherein the access verification program, when executed by a processor, implements any of the steps of the access verification method.
Compared with the prior epidemic situation prevention and control period, the verification method, the system, the equipment and the storage medium for entrance guard, wherein the verification of the consistency of the person code is manually carried out by security personnel, so that the verification accuracy of the consistency of the person code during the epidemic situation prevention and control period is not high, and the risk of epidemic situation prevention and control is high, in the application, after a first user scans an identification code for epidemic prevention and control, a verification component sends read identification code information to a rear-end platform (the consistency of the current verified terminal information and the terminal information collected by the rear-end platform is ensured), the received rear-end platform returns the identification code information corresponding to first epidemic prevention data (comprising first face information of the first user and first health code data of the first user, obviously, second face information is bound with the terminal information collected by the rear-end platform) to the verification component, and in the process, the verification component is in a preset image collection range, gather second face information, and will second face information with first face information compares, if first face information with the first similarity more than or equal to first predetermined threshold value of second face information, at this moment, first face information with second face information is unanimous, and because the terminal information of current verification is unanimous with the terminal information that rear end platform gathered, it is very obvious that the terminal information of current verification is unanimous with first face information, promptly, ensures that the people code is the uniformity, ensures that the people code is after the uniformity, again based on first user's first health code data, confirm whether to issue opening instruction and give access control equipment, avoid other people to acquire health code data, and then get into the condition in corresponding place, therefore promote the epidemic situation verification degree of accuracy, reduce the epidemic situation prevention and control risk.
Drawings
Fig. 1 is a schematic flow chart of a first embodiment of the access control verification method of the present application;
fig. 2 is a schematic detailed flow chart of step S30 in the first embodiment of the access control verification method of the present application;
FIG. 3 is a schematic diagram of an apparatus configuration of a hardware operating environment according to an embodiment of the present application;
fig. 4 is a scene schematic diagram related to the access control verification method of the present application.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The embodiment of the application provides an access control verification method, and in a first embodiment of the access control verification method, referring to fig. 1, the access control verification method is applied to a verification component, and the method includes:
step S10, reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user;
step S20, receiving first epidemic prevention data of the first user fed back by the backend platform based on the identification code information;
step S30, collecting second face information within a preset image collecting range, and carrying out one-to-one comparison on the second face information and the first face information;
step S40, if the first similarity between the second face information and the first face information is greater than or equal to a first preset threshold, determining whether to issue an opening instruction to the access control device based on the first epidemic prevention data of the first user.
The present embodiment is intended to: during the epidemic prevention verification, the consistency of the human codes in the verification process is ensured, and the verification accuracy is improved.
The method comprises the following specific steps:
step S10, reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user;
as an example, the access control verification method may be applied to an access control verification device belonging to a verification component belonging to an access control verification system belonging to an access control verification device.
As an example, the access verification system further includes a backend platform and an access control device.
As an example, the verification component and the backend platform are combined to perform people code consistency verification on the user and perform epidemic prevention data verification on the people, and after the people code consistency verification and the epidemic prevention data verification are passed, the verification component controls the entrance guard equipment to be opened so as to pass the verified user.
As an example, the verification component may be a human face device, as shown in fig. 4, or may be a device for recognizing other biometric features of the user, and the like, and is not limited in this respect.
As an example, the verification assembly includes a camera, the camera is used for scanning the two-dimensional code and collecting face information, and the camera body in the verification assembly may be: the types of standard definition cameras, high definition cameras, and the like are not particularly limited.
As an example, the access control device includes a door lock, a gate, and the like, which is not limited in particular.
As an example, the access control verification method may be applied to places such as subways, buses, shopping malls, hospitals, and the like.
As an example, the access control verification method is applied to a control scene requiring strict epidemic situations.
As an example, the verification component determines the local epidemic prevention configuration, and if the local epidemic prevention configuration is forced to wear the mask or forced to be normal in body temperature, the verification component needs to perform mask identification and body question detection before the face comparison, and can perform the subsequent face comparison verification process after the determination is passed.
The verification component reads the identification code of the first user for epidemic prevention verification to obtain identification code information.
As an example, the verification component main interface guides the user to expose an identification code for verification.
As an example, the identification code may be a two-dimensional code or a barcode, and is not limited specifically.
As an example, the identification code may be a health code, an health code, a reissue code, and the like, which are placed in the terminal application for epidemic prevention verification.
As an example, the identification code may be generated by information output by the first user after scanning a two-dimensional code for epidemic prevention verification.
As an example, the verification component is externally connected with an identification code reader in different external connection modes, and the step of reading the identification code of the first user for epidemic prevention verification to obtain the identification code information includes:
step S11, reading the identification code of the first user for epidemic prevention verification through the identification code reader;
wherein, different external modes include external RS485, external RS232 and external USB mode.
As an example, the verification component is externally connected with an identification code reader (two-dimensional code reader) through different external connection modes, such as external RS485 (a connection mode), external RS232 (a connection mode), external USB and the like, and is externally connected with an identification code scanning gun (a type of two-dimensional code reader) through the external RS485, the external RS232, the external USB and the like, so as to identify a corresponding identification code.
Wherein, set up the aim at of external RS485 (a mode of connection), external RS232 (a mode of connection) and external USB etc. in verifying the subassembly: the camera identification is prevented from being inaccurate or the identification speed is prevented from being too slow.
As an example, the verification component performs encryption and decryption processing or transparent transmission processing on the read identification code information, and sends the processed data to the back-end platform, where how to process the identification code information needs to complete negotiation between the verification component and the back-end platform, so that after the verification component performs encryption and decryption processing or transparent transmission processing on the identification code information, the back-end platform can decrypt or receive the information to obtain corresponding data.
As an example, since the encryption and decryption operations are time consuming, if the backend platform processes a large amount of identification code information, the load is too large, and therefore, after the verification component reads the identification code information, the verification component locally decrypts the identification code information to obtain the key data in the identification code information, and uploads the key data to the platform, so that the resource consumption of the backend platform for encryption and decryption is reduced.
As an example, the backend platform directly reads only the key data in the identification code information, so that the resource consumption of the backend platform for encryption and decryption is reduced, and the security effect of the method is stronger.
After the verification component reads the identification code information, the identification code information is sent to a back-end platform in communication connection with the verification component, wherein the back-end platform can be a cloud platform.
As an example, the backend platform collects first epidemic prevention data of each user (including the first user), wherein the first epidemic prevention data comprises first face information of each user and first health code data of the first user.
As an example, the face information is a face picture or a face feature value, where the face feature value includes less face data, and the data amount of the face feature value is smaller than that of the face picture.
As an example, the face feature value may be a face contour feature value, a face facial feature value, and the like.
As an example, the first epidemic prevention data includes first health code data including health code status, person trip information, vaccination information, vaccine antibody information, nucleic acid detection information, and the like, in addition to the first face information.
As an example, the back-end platform has a corresponding front-end app, each user completes a health application in the front-end app and completes uploading of a face picture, the back-end platform verifies the health application of the user through the platform end or the device interface and verifies a picture uploaded by the user, and after the picture uploaded by the user passes verification, corresponding first face information is stored.
As an example, the backend platform may collect the corresponding first facial information only after the user agrees with the privacy protocol.
As an example, when each user performs a face picture in the front-end app, the face picture needs to be checked based on preset personnel modeling requirements, and if the face picture meets the modeling requirements, the face picture is uploaded.
Step S20, receiving first epidemic prevention data of the first user fed back by the backend platform based on the identification code information;
in this embodiment, after receiving the identification code information, the backend platform acquires the first epidemic prevention data of the corresponding first user based on the identification code information.
As an example, the backend platform performs data retrieval based on the identification code information of the first user, and obtains first epidemic prevention data, including information such as terminal information, health code status, and first facial information, stored by the first user on the backend platform.
As an example, the backend platform employs encryption when returning the first epidemic prevention data to the verification component.
Step S30, collecting second face information within a preset image collecting range, and carrying out one-to-one comparison on the second face information and the first face information;
after receiving the first epidemic prevention data, the verification component calls a camera shooting function of the camera to shoot the face (shoot the face in the acquisition range of the camera), and second face information is obtained.
As an example, after the user scans the code, the verification component reminds the corresponding person to approach the device camera to collect the second face information.
And after second face information is obtained, performing one-to-one comparison on the second face information and the first face information.
Wherein the one-to-one comparing the second face information and the first face information comprises:
in a first mode, a second face image in the second face information and a first face image in the first face information are compared one to one;
or in a second mode, performing one-to-one comparison on the second face characteristic value in the second face information and the first face characteristic value in the first face information.
As an example, a one-to-one comparison may be performed between a second face feature value in the second face information and a first face feature value in the first face information, so that the verification component and the backend platform may interact with less face data, and the interaction speed is increased.
In this embodiment, one-to-one refers to: and comparing the face picture acquired on site with a known face picture to obtain the similarity, comparing the similarity with a set similarity threshold, and judging whether the person acquiring the face picture on site is the person acquiring the face picture on known.
Step S40, if the first similarity between the second face information and the first face information is greater than or equal to a first preset threshold, determining whether to issue an opening instruction to the access control device based on the first epidemic prevention data of the first user.
And if the first similarity between the second face information and the first face information is greater than or equal to a first preset threshold value, determining that the first user corresponding to the second face information is the same as the user corresponding to the first face information.
And after the confirmation of the same person, the verification component determines whether to issue an opening instruction to the access control equipment based on the first epidemic prevention data of the first user.
As an example, if the health code of the first user in the first epidemic prevention data is a green code, it is determined to issue an opening instruction to the access control device.
As an example, if the health code of the first user in the first epidemic prevention data is a green code, that is, when the verification passes, the corresponding verification result is also displayed on the liquid crystal screen of the access control device or the device corresponding to the verification component.
As an example, the liquid crystal screen is partially hidden from personal sensitive information such as names of people, and information leakage is prevented.
As an example, the verification component determines whether to issue an opening instruction to the access control device based on the first epidemic prevention data of the first user and the local epidemic prevention configuration.
As an example, if the local epidemic prevention is configured to forcibly wear a mask, after determining that the health code of the first user is a green code, it is also determined whether the first user wears the mask, and if the first user wears the mask, it is determined to issue an opening instruction to the access control device.
As an example, the local epidemic prevention configuration may further include other configuration information such as human detection, user body temperature information, and the like, which is not limited specifically.
As an example, the access control device opens the door path and passes the first user when receiving the opening instruction of the verification component.
In this embodiment, ensure that the people code is the uniformity after, again based on first user's first epidemic prevention data, confirm whether to issue opening instruction and give entrance guard's equipment, avoid other people user to acquire other people health code, and then get into the condition in corresponding place, therefore promote epidemic situation verification degree of accuracy, reduce epidemic situation prevention and control risk.
Wherein before receiving first epidemic prevention data of the first user fed back by the backend platform based on the identification code information, third face information of the first user is also collected,
referring to fig. 2, the step of comparing the second face information with the first face information in a one-to-one manner includes the following steps S31-S32:
step S31, comparing the third face information with the second face information;
step S32, if the second similarity between the third face information and the second face information is greater than or equal to a second preset threshold, performing a one-to-one comparison between the second face information and the first face information, where the second preset threshold is greater than or equal to the first preset threshold.
In this embodiment, the application scenario for which the method is applied is as follows:
due to the influences of makeup, wearing and the like of the user, the first face information and the second face information collected by the verification component are different (it is determined that the first preset threshold value cannot be set too high), that is, the first preset threshold value only ensures the accuracy of the person code verification under the normal state. In a special or extreme case, for example, if two twins or a person with a similarity greater than a first preset threshold is replaced (in the case that a and B are extremely similar, the similarity between the first face information stored by the a user on the backend platform and the second face information of the B user collected by the a user may be greater than or equal to the first preset threshold), based on the first preset threshold (the first preset threshold is 70% similar), the second face information and the first face information are compared in a one-to-one manner, and the person code check consistency cannot be ensured.
In this embodiment, in the abnormal situation, the human code verification consistency is ensured.
Under the abnormal condition, in order to ensure the consistency of the person code verification, the verification component collects the third face information of the first user before receiving the first epidemic prevention data of the first user fed back by the back-end platform based on the identification code information.
The third face information is a third face image or third face information.
After third face information is collected, comparing the third face information with the second face information, and if the second similarity between the third face information and the second face information is greater than or equal to a second preset threshold, the user corresponding to the third face information and the user corresponding to the second face information are the same user. In this embodiment, since the third face information and the second face information are collected at short time intervals, and are not affected by makeup, wearing, and the like of the user, the second preset threshold is larger than the first preset threshold, and since the second preset threshold (the second preset threshold is 95% similar) is larger than the first preset threshold (the first preset threshold is 70% similar), the consistency of the human code verification in the abnormal state is ensured (in the case where the similarity between the a user and the B user is larger than the first preset threshold, the similarity between the first face information stored in the backend platform by the a user and the second face information collected by the B user is still smaller than the second preset threshold).
And if the user corresponding to the third face information and the user corresponding to the second face information are the same user, performing one-to-one comparison on the second face information and the first face information, and if the user corresponding to the third face information and the user corresponding to the second face information are not the same user, not performing one-to-one comparison on the second face information and the first face information so as to save a comparison process.
Overall, the present embodiment aims at: during the epidemic prevention verification, under the abnormal condition, the consistency of the human codes in the verification process is ensured, and the verification accuracy is improved.
The application provides a door control verification method, a system, equipment and a storage medium, compared with the existing epidemic situation prevention and control period, the people code consistency verification is carried out manually by security personnel, so that the people code consistency verification accuracy during the epidemic situation verification is not high, and the epidemic situation prevention and control risk is high, in the application, after a first user scans an identification code for epidemic prevention verification, a verification component sends the read identification code information to a rear-end platform (the consistency of the terminal information of the current verification and the terminal information collected by the rear-end platform is ensured), the receiving rear-end platform returns the identification code information corresponding to first epidemic prevention data (including first face information, obviously, second face information is bound with the terminal information collected by the rear-end platform) to the verification component, in the process, the verification component collects the second face information within a preset image collection range, and compares the second face information with the first face information, if first face information with the first similarity more than or equal to first preset threshold value of second face information, this moment, first face information with second face information is unanimous, and because the terminal information of current verification is unanimous with the terminal information that the rear end platform gathered, it is very obvious, the terminal information and the first face information of current verification are unanimous, promptly, ensure that the people's code is the uniformity, after ensuring that the people's code is the uniformity, again based on first user's first epidemic prevention data, confirm whether to issue opening instruction and give entrance guard's equipment, avoid other people's user to acquire other people's health code, and then get into the condition in corresponding place, therefore promote the epidemic situation verification degree of accuracy, reduce epidemic situation prevention and control risk.
Further, based on the first embodiment in the present application, there is provided another embodiment of the present application in which, in this embodiment,
after the step of performing one-to-one comparison between the second face information and the first face information, the method includes:
step A1, if the first similarity between the second face information and the first face information is smaller than the first preset threshold, determining that the face epidemic prevention verification of the first user fails, calling that the first user is inconsistent with the back-end platform user, reminding the first user to rescan the first information of the identification code for epidemic prevention verification, and outputting the first information;
in this embodiment, if the first similarity between the second face information and the first face information is smaller than the first preset threshold, it is determined that the first user face epidemic prevention verification fails, after it is determined that the first user face epidemic prevention verification fails, the face authentication process is completed, at this time, the verification component calls the pre-stored first information and outputs the first information, where the first information includes information that the first user is inconsistent with the back-end platform user, and the information reminds the first user to rescan the identification code for epidemic prevention verification, so as to save the verification process.
Or after the step of comparing the third face information with the second face information, the method includes:
step A2, if the second similarity is smaller than the second preset threshold, determining that the face epidemic prevention verification of the first user fails, calling the face of the first user to be replaced, reminding the first user to rescan the second information of the identification code for epidemic prevention verification, and outputting the second information.
In this embodiment, if the second similarity is smaller than the second preset threshold, it is determined that the face anti-epidemic verification of the first user fails, and the face anti-epidemic verification fails because the face of the first user is replaced, after it is determined that the face anti-epidemic verification of the first user fails, the face authentication process is completed, at this time, the verification component calls the pre-stored second information and outputs the second information, where the second information includes information that the face of the first user is replaced, and information that prompts the first user to re-scan the identification code for anti-epidemic verification.
In this embodiment, as long as it is determined that the face epidemic prevention verification of the first user fails, it is determined that the face code verification fails, and verification of other epidemic prevention data is not performed, so as to save a verification process.
Wherein after the step of determining that the face epidemic prevention verification of the first user fails, the method comprises:
and step B1, deleting the second face information, the third face information and the first epidemic prevention data in a preset time period after the face verification fails.
In this embodiment, the application scenarios targeted are:
scene one: the internal storage space of the verification component is limited, and the verification is slow due to the fact that epidemic prevention data are stored.
Scene two: the verification component stores user data, and it is difficult to ensure privacy of user information.
In this embodiment, if it is determined that the face epidemic prevention verification of the first user fails based on the information that the first similarity between the second face information and the first face information is smaller than the first preset threshold, the second face information, the third face information, and the first epidemic prevention data are deleted within a preset time period, for example, within 1 s.
Or based on the information that the second similarity is smaller than the second preset threshold, after the face epidemic prevention verification of the first user fails, deleting the second face information, the third face information and the first epidemic prevention data within a preset time period, such as 1 s.
As an example, the verification component stores the second face information, the third face information and the first epidemic prevention data in a cache, and deletes the second face information, the third face information and the first epidemic prevention data in the cache when the verification component is powered off.
In the embodiment, the verification component does not store the face data and epidemic prevention data of the user, so that the verification is prevented from being slow, and the privacy of the user is prevented from being revealed.
Further, based on the first embodiment and the second embodiment in the present application, another embodiment of the present application is provided, in which after the step of determining that the face epidemic prevention verification of the first user fails, the method includes:
step C1, if the number of times of the face epidemic prevention verification failure of the first user exceeds the preset number of times, determining whether request information for requesting to start an acquisition mode by a management user is received;
step C2, if the request information is received, acquiring the target face information of the first user based on the acquisition mode;
and step C3, uploading the target face information to the back-end platform, so that the back-end platform can update the first epidemic prevention data based on the target face information.
In this embodiment, the application scenarios targeted are:
the first user cannot check the first face data stored in the back-end platform, or the first face data is identified by the check component, so that remedial measures need to be taken.
As an example, the preset number of times may be 3 times.
As an example, the remedial action may be: if the field worker (management user) judges that the user is the holder, the field worker sends an opening instruction to the access control device through the verification component, so that the access control device can open the access control device to allow the first user to pass.
As an example, when the field worker issues the opening instruction to the access control device through the verification component, the field worker requests the management authority through a request button on the verification component (the verification component may collect and judge the face of the field worker to determine whether to issue the management authority to the field worker). If the field working personnel (management user) obtains the management authority, the request information of requesting to start the acquisition mode is triggered to the verification component through the management authority.
As an example, if the verification component receives the request information, the target face information of the first user is collected based on the collection mode, and the target face information is uploaded to the backend platform, so that the backend platform updates the first epidemic prevention data based on the target face information.
As an example, after the first user updates the first epidemic prevention data at the backend platform, the first user performs a verification here.
As an example, the collection mode may also be started based on the mobile terminal, the first face information of the first user is collected and uploaded to the backend platform for the first epidemic prevention data of the backend platform, and after the first user updates the first epidemic prevention data on the backend platform, the first user performs the verification here.
In the embodiment, remedial measures are taken for users who fail to pass the people code verification for many times, so that convenience is provided for the users to pass.
Further, based on the first embodiment, the second embodiment and the third embodiment in the present application, another embodiment of the present application is provided, in which the face information is a face image, and the access control verification method further includes:
step S50, determining a face pitch angle, a face deflection angle and an eye distance of a second face image, and determining a second quality score of the second face image based on the face pitch angle, the face deflection angle and the eye distance of the second face image;
step S60, determining a face pitch angle, a face deflection angle and an eye distance of a third face image, and determining a third quality score of the third face image based on the face pitch angle, the face deflection angle and the eye distance of the third face image;
step S70, selecting a target quality score from the first quality score, the second quality score and the first quality score;
step S80, sending the face information corresponding to the target quality score to the backend platform, so that the backend platform updates the face information corresponding to the epidemic prevention data.
In this embodiment, the application scenarios targeted are:
if the first face information acquired by the rear-end platform is the face information with the lowest requirement, and if the first face information acquired by the rear-end platform is the face information with the lowest pixel requirement, the comparison consumes too long time or is inaccurate if the rear-end platform always compares the information based on the first face information with the lowest pixel requirement.
In this embodiment, after the verification component acquires the second face image, a face pitch angle, a face deflection angle and an eye distance of the second face image are determined, where the face pitch angle, the face deflection angle and the eye distance are determined based on camera coordinates inside the camera.
And determining the influence weights (which can be prestored) of the face pitch angle, the face deflection angle and the eye distance on the face image quality score.
And determining a second quality score of the second face image based on the face pitch angle, the face deflection angle and the eye distance of the second face image and the corresponding influence weight.
And determining a third quality score of the third face image in the same manner of obtaining the second quality score.
As one example, the verification component further determines a first quality score for the first facial image in a manner to derive a second quality score.
As one example, the verification component directly receives a first quality score of a first facial image sent by the backend platform.
As an example, a target (highest) quality score is selected from the first quality score, the second quality score and the first quality score;
and sending the face information corresponding to the target (highest) quality score to the back-end platform so that the back-end platform can update the corresponding face information in the epidemic prevention data.
In this embodiment, the face information corresponding to the target quality score is further sent to the backend platform, so that the backend platform updates the face information corresponding to the epidemic prevention data. The comparison accuracy of the subsequent face verification for too long is improved.
Further, based on the first embodiment, the second embodiment, the third embodiment, and the fourth embodiment in the present application, in this embodiment, a local epidemic prevention database is set in the verification component, second epidemic prevention data of the local user is stored in the local epidemic prevention database, and the second epidemic prevention data includes fifth face information of the local user, and the method further includes:
step D1, if the touch operation to the face recognition button is detected, acquiring fourth face information of the second user;
step D2, comparing the fourth face information with the fifth face information in a one-to-many manner;
step D3, if the similarity between the fourth face information and the fifth face information is greater than or equal to a third preset threshold, determining that the face epidemic prevention verification of the second user is successful;
and D4, determining whether to issue an opening instruction to the access control equipment based on the second epidemic prevention data.
In this embodiment, the application scenarios targeted are:
for the staff who frequently gets into the entrance guard scene, like doctors in the hospital, nurses etc., all have the access guard of business turn over every day, carry out one-to-one with second people's face information and first people's face information and compare, verify too slowly, and can too much consume manpower and materials resource.
In this embodiment, a local epidemic prevention database is arranged in the verification component, second epidemic prevention data of a local user (local staff) is stored in the local epidemic prevention database, and the second epidemic prevention data includes fifth face information of the local user.
In this embodiment, the fourth face information and the fifth face information are subjected to one-to-many comparison, where the one-to-many comparison refers to: comparing a fourth face image acquired on site with all fifth face images in a local epidemic prevention database to obtain a face with the maximum matching similarity (if the similarity between the fourth face information and the fifth face information is greater than or equal to a third preset threshold value and the face with the maximum matching similarity is selected), determining that the second user face epidemic prevention verification is successful (an authentication mode for acquiring the identity of a person).
And determining whether to issue an opening instruction to the access control equipment or not based on the second epidemic prevention data.
In this embodiment, for the staff who frequently gets into the entrance guard scene, the epidemic prevention data based on the local storage of verification subassembly is verified, promotes verification speed.
Referring to fig. 3, fig. 3 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present application.
As shown in fig. 3, the access control verification device may include: a processor 1001, a memory 1005, and a communication bus 1002. The communication bus 1002 is used to enable connection communication between the processor 1001 and the memory 1005.
Optionally, the access control verification device may further include a user interface, a network interface, a camera, an RF (Radio Frequency) circuit, a sensor, a WiFi module, and the like. The user interface may comprise a Display screen (Display), an input sub-module such as a Keyboard (Keyboard), and the optional user interface may also comprise a standard wired interface, a wireless interface. The network interface may include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Those skilled in the art will appreciate that the access verification device configuration shown in fig. 3 does not constitute a limitation of access verification devices and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 3, a memory 1005, which is a storage medium, may include an operating system, a network communication module, and an access verification program. The operating system is a program for managing and controlling hardware and software resources of the access control verification equipment, and supports the operation of the access control verification program and other software and/or programs. The network communication module is used to implement communication between the components inside the memory 1005 and with other hardware and software in the gate verification system.
In the access verification apparatus shown in fig. 3, the processor 1001 is configured to execute the access verification program stored in the memory 1005, so as to implement the steps of the access verification method described in any one of the above.
The specific implementation mode of the access control verification equipment is basically the same as that of each embodiment of the access control verification method, and is not repeated here.
The application further provides an access control verification system, the access control verification system still includes:
a backend platform to: collecting first epidemic prevention data of a first user, wherein the first epidemic prevention data comprises first face information of the first user and first health code data of the first user; the first epidemic prevention data of the first user are fed back based on the identification code information of the verification component; the system is also used for receiving the face information corresponding to the target quality score sent by the verification component, updating the first epidemic prevention data based on the face information corresponding to the target quality score, receiving the target face information of the first user acquired by the verification component based on an acquisition mode, and updating the first epidemic prevention data based on the target face information;
entrance guard's equipment, entrance guard's equipment is used for: opening the access control when receiving an opening instruction of the verification assembly;
a verification component to: reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user; receiving first epidemic prevention data of the first user, fed back by the backend platform based on the identification code information; acquiring second face information within a preset image acquisition range, and performing one-to-one comparison on the second face information and the first face information; and if the first similarity between the second face information and the first face information is larger than or equal to a first preset threshold value, determining whether to issue an opening instruction to the access control equipment or not based on the first health code data of the first user.
In one possible implementation manner of the present application, the verification component is externally connected with an identification code card reader through different external connection manners, and the verification component is further configured to read an identification code of the first user for epidemic prevention verification through the identification code card reader; the different external connection modes comprise an external RS485 mode, an external RS232 mode and an external USB mode;
and/or before receiving first epidemic prevention data of the first user, which is fed back by the back-end platform based on the identification code information, the verification component is further used for acquiring third face information of the first user and comparing the third face information with the second face information; if the second similarity between the third face information and the second face information is greater than or equal to a second preset threshold, performing one-to-one comparison on the second face information and the first face information, wherein the second preset threshold is greater than or equal to the first preset threshold;
and/or after the one-to-one comparison between the second face information and the first face information is performed, the verification component is further configured to determine that the face epidemic prevention verification of the first user fails, call the first user that the first user is inconsistent with the back-end platform user, remind the first user to rescan the first information of the identification code for epidemic prevention verification, and output the first information if the first similarity between the second face information and the first face information is smaller than the first preset threshold; after the step of comparing the third face information with the second face information, if the second similarity is smaller than the second preset threshold, determining that the face anti-epidemic verification of the first user fails, calling the face of the first user to be replaced, reminding the first user to rescan the second information of the identification code for anti-epidemic verification, and outputting the second information;
and/or after determining that the face epidemic prevention verification of the first user fails, the verification component is further configured to delete the second face information, the third face information and the first epidemic prevention data within a preset time period after the face verification fails;
and/or after determining that the face epidemic prevention verification of the first user fails, the verification component is further configured to determine whether request information for managing a user to request to start an acquisition mode is received if the number of times of the face epidemic prevention verification failure of the first user exceeds a preset number of times; if the request information is received, acquiring target face information of the first user based on the acquisition mode; uploading the target face information to the back-end platform, so that the back-end platform updates the first epidemic prevention data based on the target face information;
and/or the face information is a face image, the verification component is further used for determining a face pitch angle, a face deflection angle and an eye distance of a second face image, and determining a second quality score of the second face image based on the face pitch angle, the face deflection angle and the eye distance of the second face image; the image quality evaluation system is also used for determining a face pitch angle, a face deflection angle and an eye distance of a third face image, and determining a third quality score of the third face image based on the face pitch angle, the face deflection angle and the eye distance of the third face image; selecting a target quality score from the first quality score, the second quality score, and the third quality score; sending the face information corresponding to the target quality score to the back-end platform so that the back-end platform can update the corresponding face information in the epidemic prevention data;
and/or the verification component is further used for setting a local epidemic prevention database, second epidemic prevention data of the local user are stored in the local epidemic prevention database, the second epidemic prevention data comprise fifth face information of the local user and second health code data of the local user, and the verification component is further used for collecting fourth face information of the second user if touch operation on a face recognition button is detected; comparing the fourth face information with the fifth face information in a one-to-many manner; if the similarity between the fourth face information and the fifth face information is greater than or equal to a third preset threshold value, determining that the face epidemic prevention verification of the second user is successful; and determining whether to issue an opening instruction to the access control equipment or not based on the second health code data.
The specific implementation of the access control verification system of the application is basically the same as that of each embodiment of the access control verification method, and is not repeated here.
The embodiment of the present application provides a storage medium, and the storage medium stores one or more programs, and the one or more programs are further executable by one or more processors for implementing the steps of the access control verification method described in any one of the above.
The specific implementation of the storage medium of the present application is substantially the same as the embodiments of the above-mentioned access control verification method, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments may be implemented by a software plus hardware platform, or may be implemented by hardware, but in many cases, the former is a better embodiment. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (12)

1. An access control verification method, applied to a verification component, the method comprising:
reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user;
receiving first epidemic prevention data of the first user, fed back by the backend platform based on the identification code information;
acquiring second face information within a preset image acquisition range, and performing one-to-one comparison on the second face information and the first face information;
and if the first similarity between the second face information and the first face information is larger than or equal to a first preset threshold value, determining whether to issue an opening instruction to the access control equipment or not based on the first health code data of the first user.
2. The access control verification method of claim 1, wherein the verification component is externally connected with an identification code reader through different external connection modes, and the step of reading the identification code of the first user for epidemic prevention verification to obtain the identification code information comprises the following steps:
reading the identification code of the first user for epidemic prevention verification through the identification code reader;
wherein, different external modes include external RS485, external RS232 and external USB mode.
3. The access control verification method of claim 1, further comprising collecting third face information of the first user before receiving first epidemic prevention data of the first user fed back by the backend platform based on the identification code information,
the step of comparing the second face information with the first face information in a one-to-one manner includes:
comparing the third face information with the second face information;
and if the second similarity of the third face information and the second face information is greater than or equal to a second preset threshold, performing one-to-one comparison on the second face information and the first face information, wherein the second preset threshold is greater than or equal to the first preset threshold.
4. The access control verification method of claim 3,
after the step of performing one-to-one comparison between the second face information and the first face information, the method includes: if the first similarity of the second face information and the first face information is smaller than the first preset threshold value, determining that the face epidemic prevention verification of the first user fails, calling the first user to be inconsistent with the back-end platform user, reminding the first user to re-scan the first information of the identification code for epidemic prevention verification, and outputting the first information;
or after the step of comparing the third face information with the second face information, the method includes: if the second similarity is smaller than the second preset threshold, determining that the face epidemic prevention verification of the first user fails, calling the face of the first user to be replaced, reminding the first user to rescan the second information of the identification code for epidemic prevention verification, and outputting the second information.
5. The access control verification method of claim 4, wherein after the step of determining that the first user face epidemic prevention verification fails, the method comprises:
and deleting the second face information, the third face information and the first epidemic prevention data within a preset time period after the face verification fails.
6. The access control verification method of claim 4, wherein after the step of determining that the first user face epidemic prevention verification fails, the method comprises:
if the number of times of the face epidemic prevention verification failure of the first user exceeds the preset number of times, determining whether request information for managing a user to request to start an acquisition mode is received;
if the request information is received, acquiring target face information of the first user based on the acquisition mode;
and uploading the target face information to the back-end platform so that the back-end platform can update the first epidemic prevention data based on the target face information.
7. The access control verification method of claim 1, wherein the face information is a face image, the access control verification method further comprising:
determining a face pitch angle, a face deflection angle and an eye distance of a second face image, and determining a second quality score of the second face image based on the face pitch angle, the face deflection angle and the eye distance of the second face image;
determining a face pitch angle, a face deflection angle and an eye distance of a third face image, and determining a third quality score of the third face image based on the face pitch angle, the face deflection angle and the eye distance of the third face image;
selecting a target quality score from the first quality score, the second quality score, and the third quality score;
and sending the face information corresponding to the target quality score to the back-end platform so that the back-end platform can update the corresponding face information in the epidemic prevention data.
8. The entrance guard inspection method according to any one of claims 1 to 7, wherein a local epidemic prevention database is disposed in the inspection component, and second epidemic prevention data of the local user is stored in the local epidemic prevention database, and the second epidemic prevention data includes fifth face information of the local user and second health code data of the local user, and the method further includes:
if the touch operation on the face recognition button is detected, acquiring fourth face information of the second user;
comparing the fourth face information with the fifth face information in a one-to-many manner;
if the similarity between the fourth face information and the fifth face information is greater than or equal to a third preset threshold value, determining that the face epidemic prevention verification of the second user is successful;
and determining whether to issue an opening instruction to the access control equipment or not based on the second health code data.
9. The utility model provides an entrance guard verification system which characterized in that, entrance guard verification system still includes:
a backend platform to: collecting first epidemic prevention data of a first user, wherein the first epidemic prevention data comprises first face information of the first user and first health code data of the first user; the first epidemic prevention data of the first user are fed back based on the identification code information of the verification component; the system is also used for receiving the face information corresponding to the target quality score sent by the verification component, updating the first epidemic prevention data based on the face information corresponding to the target quality score, receiving the target face information of the first user acquired by the verification component based on an acquisition mode, and updating the first epidemic prevention data based on the target face information;
entrance guard's equipment, entrance guard's equipment is used for: opening the access control when receiving an opening instruction of the verification assembly;
a verification component to: reading an identification code of a first user for epidemic prevention verification to obtain identification code information, and sending the identification code information to a back-end platform, wherein the back-end platform collects first epidemic prevention data of the first user, and the first epidemic prevention data comprises first face information of the first user and first health code data of the first user; receiving first epidemic prevention data of the first user, fed back by the backend platform based on the identification code information; acquiring second face information within a preset image acquisition range, and performing one-to-one comparison on the second face information and the first face information; and if the first similarity between the second face information and the first face information is larger than or equal to a first preset threshold value, determining whether to issue an opening instruction to the access control equipment or not based on the first health code data of the first user.
10. An access control verification system is characterized in that,
the verification component is externally connected with an identification code card reader in different external connection modes and is also used for reading an identification code of a first user for epidemic prevention verification through the identification code card reader; the different external connection modes comprise an external RS485 mode, an external RS232 mode and an external USB mode;
and/or before receiving first epidemic prevention data of the first user, which is fed back by the back-end platform based on the identification code information, the verification component is further used for acquiring third face information of the first user and comparing the third face information with the second face information; if the second similarity between the third face information and the second face information is greater than or equal to a second preset threshold, performing one-to-one comparison on the second face information and the first face information, wherein the second preset threshold is greater than or equal to the first preset threshold;
and/or after the one-to-one comparison between the second face information and the first face information is performed, the verification component is further configured to determine that the face epidemic prevention verification of the first user fails, call the first user that the first user is inconsistent with the back-end platform user, remind the first user to rescan the first information of the identification code for epidemic prevention verification, and output the first information if the first similarity between the second face information and the first face information is smaller than the first preset threshold; after the step of comparing the third face information with the second face information, if the second similarity is smaller than the second preset threshold, determining that the face anti-epidemic verification of the first user fails, calling the face of the first user to be replaced, reminding the first user to rescan the second information of the identification code for anti-epidemic verification, and outputting the second information;
and/or after determining that the face epidemic prevention verification of the first user fails, the verification component is further configured to delete the second face information, the third face information and the first epidemic prevention data within a preset time period after the face verification fails;
and/or after determining that the face epidemic prevention verification of the first user fails, the verification component is further configured to determine whether request information for managing a user to request to start an acquisition mode is received if the number of times of the face epidemic prevention verification failure of the first user exceeds a preset number of times; if the request information is received, acquiring target face information of the first user based on the acquisition mode; uploading the target face information to the back-end platform, so that the back-end platform updates the first epidemic prevention data based on the target face information;
and/or the face information is a face image, the verification component is further used for determining a face pitch angle, a face deflection angle and an eye distance of a second face image, and determining a second quality score of the second face image based on the face pitch angle, the face deflection angle and the eye distance of the second face image; the image quality evaluation system is also used for determining a face pitch angle, a face deflection angle and an eye distance of a third face image, and determining a third quality score of the third face image based on the face pitch angle, the face deflection angle and the eye distance of the third face image; selecting a target quality score from the first quality score, the second quality score, and the third quality score; sending the face information corresponding to the target quality score to the back-end platform so that the back-end platform can update the corresponding face information in the epidemic prevention data;
and/or the verification component is further used for setting a local epidemic prevention database, second epidemic prevention data of the local user are stored in the local epidemic prevention database, the second epidemic prevention data comprise fifth face information of the local user and second health code data of the local user, and the verification component is further used for collecting fourth face information of the second user if touch operation on a face recognition button is detected; comparing the fourth face information with the fifth face information in a one-to-many manner; if the similarity between the fourth face information and the fifth face information is greater than or equal to a third preset threshold value, determining that the face epidemic prevention verification of the second user is successful; and determining whether to issue an opening instruction to the access control equipment or not based on the second health code data.
11. An access verification device comprising a memory, a processor and an access verification program stored in said memory and operable on said processor, said processor implementing the steps of the access verification method of any one of claims 1 to 8 when executing said access verification program.
12. A storage medium having stored thereon an access verification program which, when executed by a processor, performs the steps of the access verification method according to any one of claims 1 to 8.
CN202111638287.7A 2021-12-28 2021-12-28 Access control verification method, system, device and storage medium Pending CN114299652A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111638287.7A CN114299652A (en) 2021-12-28 2021-12-28 Access control verification method, system, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111638287.7A CN114299652A (en) 2021-12-28 2021-12-28 Access control verification method, system, device and storage medium

Publications (1)

Publication Number Publication Date
CN114299652A true CN114299652A (en) 2022-04-08

Family

ID=80971502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111638287.7A Pending CN114299652A (en) 2021-12-28 2021-12-28 Access control verification method, system, device and storage medium

Country Status (1)

Country Link
CN (1) CN114299652A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115188121A (en) * 2022-07-20 2022-10-14 中国银行股份有限公司 Epidemic prevention information detection method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107978044A (en) * 2017-11-29 2018-05-01 南京甄视智能科技有限公司 Based on face recognition technology and the high-precision identifying system of RFID technique and recognition methods
CN110796770A (en) * 2019-08-26 2020-02-14 腾讯科技(深圳)有限公司 Access control method and device, storage medium and electronic device
CN110992561A (en) * 2019-11-25 2020-04-10 深圳市菲格特智能科技有限公司 Security verification method and access control system
CN111462384A (en) * 2020-04-29 2020-07-28 杭州电子科技大学 Small-sized access control system based on raspberry group and embedded system
CN111524242A (en) * 2020-04-15 2020-08-11 福建九天达信息科技股份有限公司 Ticket business system for swiping face to enter park in travel industry and use method thereof
CN111540108A (en) * 2020-04-27 2020-08-14 广州海格通信集团股份有限公司 Authority identification method and device, computer equipment and storage medium
CN111751004A (en) * 2020-06-12 2020-10-09 上海仪电(集团)有限公司中央研究院 Automatic health state recognition device and recognition method
CN113487780A (en) * 2021-07-27 2021-10-08 山东健康医疗大数据有限公司 Self-service channel system based on electronic health code

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107978044A (en) * 2017-11-29 2018-05-01 南京甄视智能科技有限公司 Based on face recognition technology and the high-precision identifying system of RFID technique and recognition methods
CN110796770A (en) * 2019-08-26 2020-02-14 腾讯科技(深圳)有限公司 Access control method and device, storage medium and electronic device
CN110992561A (en) * 2019-11-25 2020-04-10 深圳市菲格特智能科技有限公司 Security verification method and access control system
CN111524242A (en) * 2020-04-15 2020-08-11 福建九天达信息科技股份有限公司 Ticket business system for swiping face to enter park in travel industry and use method thereof
CN111540108A (en) * 2020-04-27 2020-08-14 广州海格通信集团股份有限公司 Authority identification method and device, computer equipment and storage medium
CN111462384A (en) * 2020-04-29 2020-07-28 杭州电子科技大学 Small-sized access control system based on raspberry group and embedded system
CN111751004A (en) * 2020-06-12 2020-10-09 上海仪电(集团)有限公司中央研究院 Automatic health state recognition device and recognition method
CN113487780A (en) * 2021-07-27 2021-10-08 山东健康医疗大数据有限公司 Self-service channel system based on electronic health code

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115188121A (en) * 2022-07-20 2022-10-14 中国银行股份有限公司 Epidemic prevention information detection method and device

Similar Documents

Publication Publication Date Title
US11875622B2 (en) Authentication method and user equipment
CN111179484B (en) Visitor management method, device, system and storage medium
KR101944965B1 (en) User authentication system using face recognition and biometric authentication card, and method thereof
KR20160147515A (en) Method for authenticating user and electronic device supporting the same
WO2021189872A1 (en) Identity screening method, handheld device, background server and system
KR20150093044A (en) Management system using a NFC
CN114299652A (en) Access control verification method, system, device and storage medium
JP2022022083A (en) Entry/exit management device, entry/exit management method, entry/exit management program and entry/exit management system
CN111797721A (en) Method and apparatus for identification, storage medium
CN112863031B (en) Access control method, system and storage medium
JP2004126829A (en) Visitor management system and its program
EP3965078A1 (en) Enhanced entry authorization
WO2010058683A1 (en) Electronic data read device and electronic data read method
CN111985382A (en) Biological feature recognition method and device, electronic equipment and storage medium
CN114067471A (en) Medical staff management method, system and storage medium
JP7260145B2 (en) Authentication device, authentication terminal, authentication method, program and recording medium
JP6603767B2 (en) Employment management device, employment management system and program
KR20220062187A (en) Apparatus for Controlling the Entry Using Non-Contact Thermometer
JP2021194370A (en) Temperature monitoring system, temperature monitoring controlling device, temperature monitoring terminal device, temperature monitoring method, and temperature monitoring program
CN111798603A (en) Access control method and device, computer equipment and storage medium
JP2020191585A (en) Information processing device, information processing method, and program
CN111259359A (en) Community-based fingerprint management method and system, community server and storage medium
JP7199015B2 (en) Face authentication device and face authentication method
TWI772666B (en) Financial service device and method for providing identity verification function
JP7153882B2 (en) Face authentication system and face authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination