CN116416745A - Security protection method and system based on pupil auxiliary identification - Google Patents

Security protection method and system based on pupil auxiliary identification Download PDF

Info

Publication number
CN116416745A
CN116416745A CN202111653125.0A CN202111653125A CN116416745A CN 116416745 A CN116416745 A CN 116416745A CN 202111653125 A CN202111653125 A CN 202111653125A CN 116416745 A CN116416745 A CN 116416745A
Authority
CN
China
Prior art keywords
pupil
identified
data
identification
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111653125.0A
Other languages
Chinese (zh)
Inventor
许宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202111653125.0A priority Critical patent/CN116416745A/en
Publication of CN116416745A publication Critical patent/CN116416745A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B20/00Energy efficient lighting technologies, e.g. halogen lamps or gas discharge lamps
    • Y02B20/40Control techniques providing energy savings, e.g. smart controller or presence detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a security method and a security system based on pupil auxiliary identification, which can effectively reduce crime rate, even eliminate criminal psychology of criminal suspects and effectively improve security level by performing security verification on whether face information and pupil stimulation identification are blocked by a user, and can realize value in various fields such as schools, insurance, epidemic situation prevention and control, mobile payment and the like, particularly in the security field, whether a person has bad emotion can be judged through emotion of the person identified by the pupil, for example: anger, drug absorption, fear, drunk, etc. Prompt and warning are sent out quickly. The invention has low construction cost and good effect, and can be effectively used in various systems without changing the original security system or slightly modifying the original security system.

Description

Security protection method and system based on pupil auxiliary identification
Technical Field
The application relates to the technical field of security control, in particular to a security method and system based on pupil auxiliary identification
Background
Whether the security is of a country, a group or an individual, the security is indispensable, the country can be stabilized as long as the security is ensured, the enterprise can be vigorous, and the common people can enjoy the peace and happiness industry. But the premise is that the more in-place and timely the prevention is, the safer can be ensured. How to reliably realize the construction of security protection is a technical problem which needs to be solved by the technicians in the field.
Disclosure of Invention
In view of this, the present application provides a security method and system based on pupil auxiliary recognition, so as to prevent in advance more accurately, and further perform security control by more reliable combination.
In order to achieve the above purpose, the present application provides a security method and a security system based on pupil auxiliary identification, comprising the following steps:
the first step: the method comprises the steps that image data acquisition is carried out on a face through image acquisition equipment, the data are calculated and identified through a computer, whether face information is blocked or not is judged, when the face is blocked, the face cannot be completely identified, a blocking object is removed through a prompting mode, the prompting can be set for prompting times, when the prompting times are over or the face cannot be identified, an alarm and/or contact person identification are output;
and a second step of: the image acquisition equipment performs data acquisition on the pupil, the data is calculated and identified by a computer, the pupil is stimulated by emitting light through a programmed light source, the collected pupil information is calculated and judged by the computer, whether the degree of the pupil subjected to light stimulation is synchronous with the contraction and the amplification of the pupil or not is judged, the settable times are identified, and when the set times are over or can not be identified, an alarm and/or contact person identification is output.
According to the security method and the security system based on pupil auxiliary recognition, provided by the application, whether the face information and pupil stimulation recognition are shielded by a user or not is verified, so that the illegal crime rate can be effectively reduced, even the illegal crime psychology is eliminated, the security level is effectively improved, the value can be realized in various fields such as banks, public security fields, personal and business areas, schools, insurance, epidemic situation prevention and control, mobile payment and the like, particularly in the security field, the face recognition rate can be improved in an auxiliary manner through pupil recognition, and whether bad emotion exists or not is judged by setting the emotion of the recognized person, and prompt and early warning are rapidly sent. The invention has low construction cost and good effect, and can be effectively used in various systems without changing the original security system or slightly modifying the original security system.
The specific embodiment is as follows:
the technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, based on the embodiments of the invention, which are within the scope of the invention as defined by the claims, are within the scope of the invention as defined by the claims.
An application scenario of the embodiment of the invention: for example, the bank takes money, the bank door is closed and an identification area is arranged, when a person stands before the person arrives at the bank identification area, the image acquisition camera acquires images of the person, analysis shows that the person has a mask and cannot finish face identification, then an audible voice prompt before the door cannot identify the person, the person can remove the face shielding object, if the person does not remove the mask and still is in the collection area after prompting, an alarm lamp of a monitoring room in the bank is lighted, the security guard can observe and monitor according to the alarm lamp, if no abnormal condition exists, the security guard can send the person to look for identity and make the person enter the bank, and if abnormality is found when the person looks at the monitoring or is checked by people, the person directly alarms. After entering a bank, the cash dispenser withdraws before going to the self-service cash dispenser, the self-service cash dispenser detects whether the face is blocked or not, if the face is blocked or not, the self-service cash dispenser prompts that the face is blocked or not, if the face is blocked or not successfully recognized for the second time, an alarm lamp is monitored inside the bank and is turned on, security personnel can check and solve the problem in the past according to the alarm, and conversely, when the cash dispenser recognizes through a face blocking object, pupil stimulation verification is carried out in the process, the pupil verification is mainly carried out for facial recognition assistance, the facial authentication and the like are prevented from being carried out by utilizing other people's photos and the like, the assistance effect is that the light stimulated by a programmable light source is a lock, the response of eyes after being stimulated is a key, and the authentication is successful when synchronizing, so that the cash dispenser successfully leaves the bank. In this example, if the money taker uses the bank card by a theft or robbery, or more seriously, injury and death are carried out on other people in the process of illegal crime, all the face information is recorded in the process of entering the bank, so that the relevant departments can confirm. If the system is installed in a bank before illegal crimes are carried out, the awareness of illegal crimes can be effectively reduced, the occurrence of the illegal crimes is reduced, the occurrence of more serious illegal crimes is reduced, and the personal property safety is effectively ensured.
Yet another application scenario of the embodiment of the present invention: for example, when a key person is clamped to require a safe to be opened in a home or a bank to conduct illegal crime, general facial recognition, iris recognition or fingerprint recognition is passed, at the moment, the clamped person is afraid, pupil recognition is entered, pupil recognition grabs pupil image data before programming light is not started, the pupil size of the clamped person is found to exceed a threshold value, related departments are contacted for alarming under the condition of no issuing or alarming, success cannot be verified, precious time is used for waiting until a police arrives, and self safety is guaranteed. Unfortunately, the person being held is in danger, and the person can not pass through and alarm when the pupil is identified. The system can protect the life safety of the clamped person, fingerprint, iris, facial recognition and the like are all fixed features, so that the clamped person can be verified after injury, but pupil stimulation recognition is performed only by the vital sign. Examples use the pupil to change in size in the event that a person encounters a hazard, stimulus, etc., and if there is no vital sign, the pupil will not change by light stimulus.
Yet another application scenario of the embodiment of the present invention: for example, the system is designed for prevention, and illegal criminals often use a shield to shield their facial features before or after a crime. However, the system needs to have no shielding object during recognition, so that collected data can be matched with a related security system for preventing and early warning through data intercommunication, thereby discovering illegal crimes in advance and avoiding the illegal crimes from happening again. After the system is installed, behaviors such as illegal crimes and the like which possibly damage society and life and property can be found in time, and data can be transmitted in time for preventing and early warning.
It should be noted that the example security control method and system provided by the invention can be used in a plurality of fields. The foregoing is merely exemplary and is not intended to limit the application of the methods and systems provided herein.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described as different from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other. Meanwhile, the features described in the embodiments of the present specification may be replaced with or combined with each other to enable those skilled in the art to make or use the present application. For system-like embodiments, the description is relatively simple as it is substantially similar to method embodiments, and reference should be made to the description of method embodiments for relevant points.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application and are intended to be comprehended within the scope of the present application.

Claims (5)

1. A security method and system based on pupil auxiliary identification comprises the following steps:
the first step: the method comprises the steps that image data acquisition is carried out on a face through image acquisition equipment, the data are calculated and identified through a computer, whether face information is blocked or not is judged, when the face is blocked, the face cannot be completely identified, a blocking object is removed through a prompting mode, the prompting can be set for prompting times, when the prompting times are over or the face cannot be identified, an alarm and/or contact person identification are output;
and a second step of: the image acquisition equipment performs data acquisition on the pupil, the data is calculated and identified by a computer, the pupil is stimulated by emitting light through a programmed light source, the collected pupil information is calculated and judged by the computer, whether the degree of the pupil subjected to light stimulation is synchronous with the contraction and the amplification of the pupil or not is judged, the settable times are identified, and when the set times are over or can not be identified, an alarm and/or contact person identification is output.
2. The method according to claim 1, wherein: during the identification, a light sensing device is additionally arranged in an area with unstable light, so that the ambient light is adjusted in advance, and the auxiliary identification is performed in cooperation with a programmable light source.
3. The method according to claim 1, wherein: the data and/or database collected by the image is stored in a storage medium, the time limit of storage can be set, the data and/or database is called under legal permission, other system data and/or databases are connected under legal permission, and the data and/or database are called back for the system.
4. The method according to claim 1, wherein: the first step and/or the second step can be embedded into a non-self system for other system assisted identification.
5. The method according to claim 1, wherein: when the pupil is identified, the programming light source is not started, the ambient light is in a normal range, the pupil (pupil size threshold value is set in advance) is monitored through image acquisition, and direct alarm and/or contact person identification are carried out.
CN202111653125.0A 2021-12-31 2021-12-31 Security protection method and system based on pupil auxiliary identification Pending CN116416745A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111653125.0A CN116416745A (en) 2021-12-31 2021-12-31 Security protection method and system based on pupil auxiliary identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111653125.0A CN116416745A (en) 2021-12-31 2021-12-31 Security protection method and system based on pupil auxiliary identification

Publications (1)

Publication Number Publication Date
CN116416745A true CN116416745A (en) 2023-07-11

Family

ID=87049812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111653125.0A Pending CN116416745A (en) 2021-12-31 2021-12-31 Security protection method and system based on pupil auxiliary identification

Country Status (1)

Country Link
CN (1) CN116416745A (en)

Similar Documents

Publication Publication Date Title
US7856558B2 (en) Biometric verification and duress detection system and method
US5731575A (en) Computerized system for discreet identification of duress transaction and/or duress access
US8242905B2 (en) System and method for adjusting a security level and signaling alarms in controlled areas
US20020038818A1 (en) Biometric system and method for detecting duress transactions
CN214123023U (en) Access control system with anti-damage function
CN209912036U (en) Face identification security entrance guard all-in-one
CN111986423A (en) Anti-trailing security alarm system
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
CN111698215A (en) Security prevention and control method, device and system based on biological feature recognition
CN203084795U (en) Bank anti-following linkage door with plurality of identity verifying ways
CN105761378A (en) Device and method for automatically identifying abnormal transactions and reducing losses
CN116416745A (en) Security protection method and system based on pupil auxiliary identification
CN106408690A (en) Nuclear power plant personnel entrance and exit control apparatus and nuclear power plant personnel entrance and exit control method
Joy A systematic review comparing different security measures adopted in automated teller machine
CN114677756A (en) Real-time remote monitoring intelligent early warning system for vault door
CN211115552U (en) Intelligent anti-following bank door
CN115830754B (en) Security access control system and access control method
WO2000010125A1 (en) Electronic authentication system and its card
CN105830350A (en) Personal safety device
JP2005150925A (en) Security system
CN109427118A (en) Intelligent access control system for security protection
CA2629271C (en) A biometric verification and duress detection system and method
KR20010069530A (en) Alarm and arresting system by recognition of the emergency PIN
JP4261960B2 (en) Security device
CN112164167A (en) Safety monitoring system and method based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination