CN116416745A - Security protection method and system based on pupil auxiliary identification - Google Patents
Security protection method and system based on pupil auxiliary identification Download PDFInfo
- Publication number
- CN116416745A CN116416745A CN202111653125.0A CN202111653125A CN116416745A CN 116416745 A CN116416745 A CN 116416745A CN 202111653125 A CN202111653125 A CN 202111653125A CN 116416745 A CN116416745 A CN 116416745A
- Authority
- CN
- China
- Prior art keywords
- pupil
- identified
- data
- identification
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 210000001747 pupil Anatomy 0.000 title claims abstract description 35
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000000638 stimulation Effects 0.000 claims abstract description 6
- 230000000903 blocking effect Effects 0.000 claims description 3
- 230000003321 amplification Effects 0.000 claims description 2
- 230000008602 contraction Effects 0.000 claims description 2
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 2
- 230000001360 synchronised effect Effects 0.000 claims description 2
- 230000008451 emotion Effects 0.000 abstract description 4
- 230000002265 prevention Effects 0.000 abstract description 4
- 238000010276 construction Methods 0.000 abstract description 3
- 230000000694 effects Effects 0.000 abstract description 3
- 238000012795 verification Methods 0.000 abstract description 3
- 238000010521 absorption reaction Methods 0.000 abstract 1
- 239000003814 drug Substances 0.000 abstract 1
- 229940079593 drug Drugs 0.000 abstract 1
- 230000001815 facial effect Effects 0.000 description 5
- 230000006378 damage Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 208000027418 Wounds and injury Diseases 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 208000014674 injury Diseases 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B20/00—Energy efficient lighting technologies, e.g. halogen lamps or gas discharge lamps
- Y02B20/40—Control techniques providing energy savings, e.g. smart controller or presence detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a security method and a security system based on pupil auxiliary identification, which can effectively reduce crime rate, even eliminate criminal psychology of criminal suspects and effectively improve security level by performing security verification on whether face information and pupil stimulation identification are blocked by a user, and can realize value in various fields such as schools, insurance, epidemic situation prevention and control, mobile payment and the like, particularly in the security field, whether a person has bad emotion can be judged through emotion of the person identified by the pupil, for example: anger, drug absorption, fear, drunk, etc. Prompt and warning are sent out quickly. The invention has low construction cost and good effect, and can be effectively used in various systems without changing the original security system or slightly modifying the original security system.
Description
Technical Field
The application relates to the technical field of security control, in particular to a security method and system based on pupil auxiliary identification
Background
Whether the security is of a country, a group or an individual, the security is indispensable, the country can be stabilized as long as the security is ensured, the enterprise can be vigorous, and the common people can enjoy the peace and happiness industry. But the premise is that the more in-place and timely the prevention is, the safer can be ensured. How to reliably realize the construction of security protection is a technical problem which needs to be solved by the technicians in the field.
Disclosure of Invention
In view of this, the present application provides a security method and system based on pupil auxiliary recognition, so as to prevent in advance more accurately, and further perform security control by more reliable combination.
In order to achieve the above purpose, the present application provides a security method and a security system based on pupil auxiliary identification, comprising the following steps:
the first step: the method comprises the steps that image data acquisition is carried out on a face through image acquisition equipment, the data are calculated and identified through a computer, whether face information is blocked or not is judged, when the face is blocked, the face cannot be completely identified, a blocking object is removed through a prompting mode, the prompting can be set for prompting times, when the prompting times are over or the face cannot be identified, an alarm and/or contact person identification are output;
and a second step of: the image acquisition equipment performs data acquisition on the pupil, the data is calculated and identified by a computer, the pupil is stimulated by emitting light through a programmed light source, the collected pupil information is calculated and judged by the computer, whether the degree of the pupil subjected to light stimulation is synchronous with the contraction and the amplification of the pupil or not is judged, the settable times are identified, and when the set times are over or can not be identified, an alarm and/or contact person identification is output.
According to the security method and the security system based on pupil auxiliary recognition, provided by the application, whether the face information and pupil stimulation recognition are shielded by a user or not is verified, so that the illegal crime rate can be effectively reduced, even the illegal crime psychology is eliminated, the security level is effectively improved, the value can be realized in various fields such as banks, public security fields, personal and business areas, schools, insurance, epidemic situation prevention and control, mobile payment and the like, particularly in the security field, the face recognition rate can be improved in an auxiliary manner through pupil recognition, and whether bad emotion exists or not is judged by setting the emotion of the recognized person, and prompt and early warning are rapidly sent. The invention has low construction cost and good effect, and can be effectively used in various systems without changing the original security system or slightly modifying the original security system.
The specific embodiment is as follows:
the technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, based on the embodiments of the invention, which are within the scope of the invention as defined by the claims, are within the scope of the invention as defined by the claims.
An application scenario of the embodiment of the invention: for example, the bank takes money, the bank door is closed and an identification area is arranged, when a person stands before the person arrives at the bank identification area, the image acquisition camera acquires images of the person, analysis shows that the person has a mask and cannot finish face identification, then an audible voice prompt before the door cannot identify the person, the person can remove the face shielding object, if the person does not remove the mask and still is in the collection area after prompting, an alarm lamp of a monitoring room in the bank is lighted, the security guard can observe and monitor according to the alarm lamp, if no abnormal condition exists, the security guard can send the person to look for identity and make the person enter the bank, and if abnormality is found when the person looks at the monitoring or is checked by people, the person directly alarms. After entering a bank, the cash dispenser withdraws before going to the self-service cash dispenser, the self-service cash dispenser detects whether the face is blocked or not, if the face is blocked or not, the self-service cash dispenser prompts that the face is blocked or not, if the face is blocked or not successfully recognized for the second time, an alarm lamp is monitored inside the bank and is turned on, security personnel can check and solve the problem in the past according to the alarm, and conversely, when the cash dispenser recognizes through a face blocking object, pupil stimulation verification is carried out in the process, the pupil verification is mainly carried out for facial recognition assistance, the facial authentication and the like are prevented from being carried out by utilizing other people's photos and the like, the assistance effect is that the light stimulated by a programmable light source is a lock, the response of eyes after being stimulated is a key, and the authentication is successful when synchronizing, so that the cash dispenser successfully leaves the bank. In this example, if the money taker uses the bank card by a theft or robbery, or more seriously, injury and death are carried out on other people in the process of illegal crime, all the face information is recorded in the process of entering the bank, so that the relevant departments can confirm. If the system is installed in a bank before illegal crimes are carried out, the awareness of illegal crimes can be effectively reduced, the occurrence of the illegal crimes is reduced, the occurrence of more serious illegal crimes is reduced, and the personal property safety is effectively ensured.
Yet another application scenario of the embodiment of the present invention: for example, when a key person is clamped to require a safe to be opened in a home or a bank to conduct illegal crime, general facial recognition, iris recognition or fingerprint recognition is passed, at the moment, the clamped person is afraid, pupil recognition is entered, pupil recognition grabs pupil image data before programming light is not started, the pupil size of the clamped person is found to exceed a threshold value, related departments are contacted for alarming under the condition of no issuing or alarming, success cannot be verified, precious time is used for waiting until a police arrives, and self safety is guaranteed. Unfortunately, the person being held is in danger, and the person can not pass through and alarm when the pupil is identified. The system can protect the life safety of the clamped person, fingerprint, iris, facial recognition and the like are all fixed features, so that the clamped person can be verified after injury, but pupil stimulation recognition is performed only by the vital sign. Examples use the pupil to change in size in the event that a person encounters a hazard, stimulus, etc., and if there is no vital sign, the pupil will not change by light stimulus.
Yet another application scenario of the embodiment of the present invention: for example, the system is designed for prevention, and illegal criminals often use a shield to shield their facial features before or after a crime. However, the system needs to have no shielding object during recognition, so that collected data can be matched with a related security system for preventing and early warning through data intercommunication, thereby discovering illegal crimes in advance and avoiding the illegal crimes from happening again. After the system is installed, behaviors such as illegal crimes and the like which possibly damage society and life and property can be found in time, and data can be transmitted in time for preventing and early warning.
It should be noted that the example security control method and system provided by the invention can be used in a plurality of fields. The foregoing is merely exemplary and is not intended to limit the application of the methods and systems provided herein.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described as different from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other. Meanwhile, the features described in the embodiments of the present specification may be replaced with or combined with each other to enable those skilled in the art to make or use the present application. For system-like embodiments, the description is relatively simple as it is substantially similar to method embodiments, and reference should be made to the description of method embodiments for relevant points.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application and are intended to be comprehended within the scope of the present application.
Claims (5)
1. A security method and system based on pupil auxiliary identification comprises the following steps:
the first step: the method comprises the steps that image data acquisition is carried out on a face through image acquisition equipment, the data are calculated and identified through a computer, whether face information is blocked or not is judged, when the face is blocked, the face cannot be completely identified, a blocking object is removed through a prompting mode, the prompting can be set for prompting times, when the prompting times are over or the face cannot be identified, an alarm and/or contact person identification are output;
and a second step of: the image acquisition equipment performs data acquisition on the pupil, the data is calculated and identified by a computer, the pupil is stimulated by emitting light through a programmed light source, the collected pupil information is calculated and judged by the computer, whether the degree of the pupil subjected to light stimulation is synchronous with the contraction and the amplification of the pupil or not is judged, the settable times are identified, and when the set times are over or can not be identified, an alarm and/or contact person identification is output.
2. The method according to claim 1, wherein: during the identification, a light sensing device is additionally arranged in an area with unstable light, so that the ambient light is adjusted in advance, and the auxiliary identification is performed in cooperation with a programmable light source.
3. The method according to claim 1, wherein: the data and/or database collected by the image is stored in a storage medium, the time limit of storage can be set, the data and/or database is called under legal permission, other system data and/or databases are connected under legal permission, and the data and/or database are called back for the system.
4. The method according to claim 1, wherein: the first step and/or the second step can be embedded into a non-self system for other system assisted identification.
5. The method according to claim 1, wherein: when the pupil is identified, the programming light source is not started, the ambient light is in a normal range, the pupil (pupil size threshold value is set in advance) is monitored through image acquisition, and direct alarm and/or contact person identification are carried out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111653125.0A CN116416745A (en) | 2021-12-31 | 2021-12-31 | Security protection method and system based on pupil auxiliary identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111653125.0A CN116416745A (en) | 2021-12-31 | 2021-12-31 | Security protection method and system based on pupil auxiliary identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116416745A true CN116416745A (en) | 2023-07-11 |
Family
ID=87049812
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111653125.0A Pending CN116416745A (en) | 2021-12-31 | 2021-12-31 | Security protection method and system based on pupil auxiliary identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116416745A (en) |
-
2021
- 2021-12-31 CN CN202111653125.0A patent/CN116416745A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7856558B2 (en) | Biometric verification and duress detection system and method | |
US5731575A (en) | Computerized system for discreet identification of duress transaction and/or duress access | |
US8242905B2 (en) | System and method for adjusting a security level and signaling alarms in controlled areas | |
US20020038818A1 (en) | Biometric system and method for detecting duress transactions | |
CN214123023U (en) | Access control system with anti-damage function | |
CN209912036U (en) | Face identification security entrance guard all-in-one | |
CN111986423A (en) | Anti-trailing security alarm system | |
CN111462417A (en) | Multi-information verification system and multi-information verification method for unmanned bank | |
CN111698215A (en) | Security prevention and control method, device and system based on biological feature recognition | |
CN203084795U (en) | Bank anti-following linkage door with plurality of identity verifying ways | |
CN105761378A (en) | Device and method for automatically identifying abnormal transactions and reducing losses | |
CN116416745A (en) | Security protection method and system based on pupil auxiliary identification | |
CN106408690A (en) | Nuclear power plant personnel entrance and exit control apparatus and nuclear power plant personnel entrance and exit control method | |
Joy | A systematic review comparing different security measures adopted in automated teller machine | |
CN114677756A (en) | Real-time remote monitoring intelligent early warning system for vault door | |
CN211115552U (en) | Intelligent anti-following bank door | |
CN115830754B (en) | Security access control system and access control method | |
WO2000010125A1 (en) | Electronic authentication system and its card | |
CN105830350A (en) | Personal safety device | |
JP2005150925A (en) | Security system | |
CN109427118A (en) | Intelligent access control system for security protection | |
CA2629271C (en) | A biometric verification and duress detection system and method | |
KR20010069530A (en) | Alarm and arresting system by recognition of the emergency PIN | |
JP4261960B2 (en) | Security device | |
CN112164167A (en) | Safety monitoring system and method based on artificial intelligence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |