CN117056890A - Personnel identity verification method, device and storage medium - Google Patents

Personnel identity verification method, device and storage medium Download PDF

Info

Publication number
CN117056890A
CN117056890A CN202310966508.6A CN202310966508A CN117056890A CN 117056890 A CN117056890 A CN 117056890A CN 202310966508 A CN202310966508 A CN 202310966508A CN 117056890 A CN117056890 A CN 117056890A
Authority
CN
China
Prior art keywords
information
verified
person
monitoring area
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310966508.6A
Other languages
Chinese (zh)
Inventor
覃翠妮
温浩源
卢孝华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haoyun Technologies Co Ltd
Original Assignee
Haoyun Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haoyun Technologies Co Ltd filed Critical Haoyun Technologies Co Ltd
Priority to CN202310966508.6A priority Critical patent/CN117056890A/en
Publication of CN117056890A publication Critical patent/CN117056890A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application discloses a personnel identity verification method, a device and a storage medium, wherein the method comprises the following steps: determining a monitoring area; setting a video channel and associating the video channel with a monitoring area; acquiring positioning information sent by a person to be verified, and determining whether the person to be verified has permission to enter a monitoring area according to first I D information carried by the positioning information; if the person to be verified has authority, acquiring a face image of the person to be verified by utilizing a video channel in a preset time period after the positioning information of the person to be verified is acquired, and determining second I D information of the person to be verified according to the face image; and comparing the first I D information with the second I D information, and judging the identity of the person to be verified to be legal when the first I D information is consistent with the second I D information. The application combines the positioning information of the personnel to be verified and a plurality of I D information to judge whether the identity of the personnel to be verified is legal, thereby effectively improving the accuracy and reliability of the personnel identity verification.

Description

Personnel identity verification method, device and storage medium
Technical Field
The present application relates to the field of identity verification technologies, and in particular, to a method and apparatus for verifying personnel identity, and a storage medium.
Background
The face recognition technology has the characteristics of convenience, rapidness, accuracy and the like, is widely accepted, and is successfully applied to the identity confirmation products of people in communities, schools, banks, public security and the like.
The existing personnel identity verification method generally obtains a face image in a video monitoring mode, and personnel identity verification is achieved through identifying the face image, but the existing personnel identity verification method is single in verification mode, and is prone to inaccurate verification, so that the accuracy of personnel identity verification is low.
Disclosure of Invention
The application provides a personnel identity verification method, a device and a storage medium, which are used for solving the technical problems that the existing personnel identity verification method is single in verification mode, and the verification is inaccurate easily, so that the accuracy of personnel identity verification is low.
One embodiment of the present application provides a person authentication method, including:
determining a monitoring area;
setting a video channel and associating the video channel with the monitoring area;
positioning information sent by a person to be verified is obtained, and whether the person to be verified has permission to enter the monitoring area is determined according to first ID information carried by the positioning information;
if the personnel to be verified does not have permission to enter the monitoring area, judging that the identity of the personnel to be verified is illegal, and generating alarm information;
if the personnel to be verified has permission to enter the monitoring area, acquiring a face image of the personnel to be verified by utilizing the video channel in a preset time period after the positioning information of the personnel to be verified is acquired, and determining second ID information of the personnel to be verified according to the face image;
comparing the first ID information with the second ID information, and judging the identity of the person to be verified to be legal when the first ID information is consistent with the second ID information.
Further, the determining the monitoring area includes:
and setting an electronic fence in the preset plane area, and determining a monitoring area according to the electronic fence.
Further, the step of determining a monitoring area according to the electronic fence comprises the following steps of;
and determining a monitoring area in the preset plane area according to the boundary of the electronic fence, and performing origin calibration and scale calibration processing on the monitoring area.
Further, the positioning information is a BLINK signal, and determining whether the person to be verified has permission to enter the monitoring area according to the first ID information carried by the positioning information includes:
and resolving the BLINK signal to obtain first ID information of a person to be verified carried by the BLINK signal, comparing the first ID information with the ID information with authority, and determining whether the person to be verified corresponding to the first ID information has authority to enter the monitoring area according to a comparison result.
Further, the determining the second ID information of the person to be verified according to the face image includes:
matching the face image with a standard face image in the face database, and taking the standard face image with the highest similarity with the face image as a target face image;
and acquiring ID information of the target face image, and taking the ID information as second ID information of the personnel to be verified.
Further, the method further comprises;
and if the face image of the person to be verified is not acquired within a preset time period after the positioning information of the person to be verified is acquired, generating alarm information.
One embodiment of the present application provides a person authentication apparatus including:
the monitoring area determining module is used for determining a monitoring area;
the area association module is used for setting a video channel and associating the video channel with the monitoring area;
the monitoring area permission determining module is used for acquiring positioning information sent by a person to be verified, and determining whether the person to be verified has permission to enter the monitoring area according to first ID information carried by the positioning information;
the alarm generation module is used for judging that the identity of the person to be verified is illegal when the person to be verified does not have permission to enter the monitoring area, and generating alarm information;
the second ID information determining module is used for acquiring a face image of the person to be verified by utilizing the video channel in a preset time period after the positioning information of the person to be verified is acquired when the person to be verified has permission to enter the monitoring area, and determining second ID information of the person to be verified according to the face image;
and the identity verification module is used for comparing the first ID information with the second ID information, and judging that the identity of the person to be verified is legal when the first ID information is consistent with the second ID information.
An embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium includes a stored computer program, where the computer program when executed controls a device in which the computer readable storage medium is located to perform a person authentication method as described above.
According to the embodiment of the application, the positioning information sent by the personnel to be verified is obtained, the ID information carried by the personnel to be verified is determined according to the positioning information, whether the personnel to be verified has the authority of entering and exiting the monitoring area or not is determined, the ID information matched with the personnel to be verified is determined according to the face database, after the personnel to be verified is determined to have the authority of entering and exiting the monitoring area, the carried ID information and the matched ID information are compared, and whether the identity of the personnel to be verified is legal or not can be judged by combining the positioning information of the personnel to be verified and various ID information, so that the accuracy and the reliability of the identity verification of the personnel can be effectively improved.
Furthermore, the embodiment of the application utilizes the UWB module to realize the positioning of the personnel to be verified, thereby not only effectively improving the positioning precision, but also preventing the positioning information from being copied, and effectively improving the reliability of the positioning information; according to the embodiment of the application, the UWB positioning solution face recognition algorithm is used for verifying the identity of the personnel to be verified, so that the personnel identity card can be effectively prevented from being stolen, and the personnel do not carry the card and enter and exit the monitoring area in a illegal manner, and further the management efficiency of personnel standardization behavior can be effectively improved.
Drawings
Fig. 1 is a schematic flow chart of a personnel identity verification method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a personal authentication system according to an embodiment of the present application;
FIG. 3 is another schematic diagram of a personal authentication system according to an embodiment of the present application;
FIG. 4 is another flow chart of a person authentication method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a personal authentication device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the description of the present application, it should be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present application, unless otherwise indicated, the meaning of "a plurality" is two or more.
In the description of the present application, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present application will be understood in specific cases by those of ordinary skill in the art.
Referring to fig. 1, an embodiment of the present application provides a method for authenticating a person, including:
s1, determining a monitoring area;
in the embodiment of the application, the monitoring area can be divided by arranging the electronic fence.
In the embodiment of the application, the monitoring area can be divided and displayed on the area plan view of the system, and the origin calibration and the scale calibration are carried out on the monitoring area.
S2, setting a video channel, and associating the video channel with a monitoring area;
in the embodiment of the application, the image acquisition device can be arranged in the range of the monitoring area, the video channel is arranged based on the image acquisition device, and the video channel is associated with the monitoring area, so that the related video information of the monitoring area can be acquired through the video channel, and the accuracy of personnel identity verification can be improved.
S3, positioning information sent by a person to be verified is obtained, and whether the person to be verified has permission to enter a monitoring area is determined according to first ID information carried by the positioning information;
in the embodiment of the application, each person carries an identity card for sending positioning information, and the identity card comprises a UWB module. The base station can determine the specific position of the current personnel to be verified according to the positioning information, if the personnel to be verified is in the monitoring area, the positioning information is resolved to obtain ID information of the personnel to be verified, which is carried in the positioning information, wherein the positioning information can also carry the authorization state information, the battery voltage information and the movement state information of the identity card. After the first ID information of the person to be verified is obtained, the embodiment of the present application may determine whether the person to be verified has the authority to enter and exit the monitoring area according to the first ID information, where the authority determining manner may be: comparing the first ID information with the ID information of the ID information set with the authority to enter and exit the monitoring area, if the first ID information is in the ID information set, judging that the personnel to be verified has the authority to enter and exit the monitoring area, and if not, judging that the personnel to be verified does not have the authority to enter and exit the monitoring area.
In the embodiment of the application, the base station for receiving the identity card signal can be installed in the actual environment under the line, and the base station is correspondingly added at the corresponding position on the regional plan view on the system.
S4, if the personnel to be verified does not have permission to enter the monitoring area, judging that the identity of the personnel to be verified is illegal, and generating alarm information;
s5, if the personnel to be verified has permission to enter the monitoring area, acquiring a face image of the personnel to be verified by utilizing a video channel in a preset time period after the positioning information of the personnel to be verified is acquired, and determining second ID information of the personnel to be verified according to the face image;
in the embodiment of the application, after determining that the personnel to be verified has the authority to enter and exit the monitoring area according to the first ID, judging whether to acquire the image information of the personnel to be verified in a preset time period after acquiring the positioning information of the personnel to be verified. For example, within 5 seconds after the positioning information of the person to be verified is obtained, if the image information of the person to be verified is not obtained, the current identity verification is judged to be abnormal, and a corresponding abnormal alarm is generated to remind related persons to follow up and process, so that the safety and reliability of the identity verification of the person can be effectively improved.
The embodiment of the application matches the face image obtained by the video channel with the standard face image in the face database, determines the standard face image with the maximum similarity with the face image, and takes the ID information of the standard face image as the second ID information.
S6, comparing the first ID information with the second ID information, and judging the identity of the person to be verified to be legal when the first ID information is consistent with the second ID information.
In the embodiment of the application, if the first ID information and the second ID information are inconsistent, the identity of the person to be verified is judged to be illegal, and at the moment, alarm information is generated. In the embodiment of the application, the ID information carried by the positioning information and the ID information obtained by matching in the face database are compared, so that whether the identity of the current person to be verified is legal or not can be accurately determined, and the accuracy and reliability of the identity verification of the person can be effectively improved.
According to the embodiment of the application, whether the personnel to be verified has the authority to enter and exit the monitoring area is determined by acquiring the positioning information sent by the personnel to be verified, the ID information carried by the personnel to be verified is determined according to the positioning information, the ID information matched with the personnel to be verified is determined according to the face database, after the personnel to be verified is determined to have the authority to enter and exit the monitoring area, the carried ID information and the matched ID information are compared, and whether the identity of the personnel to be verified is legal or not can be judged by combining the positioning information of the personnel to be verified and various ID information, so that the accuracy and the reliability of the identity verification of the personnel can be effectively improved.
Fig. 2-3 are schematic diagrams of two structures of a personal authentication system according to an embodiment of the present application.
In one embodiment, step S1, determining a monitoring area includes:
s11, setting an electronic fence in a preset plane area, and determining a monitoring area according to the electronic fence.
According to the embodiment of the application, the monitoring area is determined by arranging the electronic fence, so that information such as an electronic map, project states, project addresses and the like of the monitoring area can be visually displayed in the system, and when abnormal data appear in the electronic fence, the abnormal position can be quickly and accurately positioned, so that the efficiency of personnel management can be effectively improved.
In one embodiment, step S11, determining a monitoring area according to the electronic fence includes;
and determining a monitoring area in a preset plane area according to the boundary of the electronic fence, and performing origin calibration and scale calibration processing on the monitoring area.
In the embodiment of the application, the origin calibration and the scale calibration are carried out on the monitoring area, so that the accuracy of the monitoring area can be improved.
In one embodiment, the positioning information is a BLINK signal, and step S3 of determining whether the personnel to be verified has permission to enter the monitoring area according to the first ID information carried by the positioning information includes:
and carrying out resolving processing on the BLINK signal, obtaining first ID information of the personnel to be verified carried by the BLINK signal, comparing the first ID information with the authority, and determining whether the personnel to be verified corresponding to the first ID information has the authority to enter a monitoring area according to the comparison result.
In the embodiment of the application, the first ID information of the personnel to be verified, which is carried by the BLINK signal, can be accurately obtained by resolving the BLINK signal, wherein the first ID information is the ID information bound with the identity card of the personnel to be verified.
In one embodiment, step S5, determining the second ID information of the person to be authenticated according to the face image includes:
s51, matching the face image with a standard face image in a face database, and taking the standard face image with the highest similarity with the face image as a target face image;
in the embodiment of the application, a plurality of standard personnel images are preset in a face database, and each standard face image is provided with corresponding ID information.
S52, acquiring ID information of the target face image, and taking the ID information as second ID information of the person to be verified.
In the embodiment of the application, the second ID information is the ID information matched with the person to be verified in the face database, and whether the ID information of the identity card is consistent with the matched ID information can be accurately judged by comparing the first ID information with the second ID information, so that whether the identity of the person to be verified is legal or not can be accurately judged according to the comparison result.
In one embodiment, step S5 further comprises;
and if the face image of the person to be verified is not acquired within a preset time period after the positioning information of the person to be verified is acquired, generating alarm information.
In the embodiment of the application, if the face image of the person to be verified is not acquired in 5S after the positioning information of the person to be verified is acquired, abnormal information may occur, and at this time, alarm information is generated to remind related management personnel to perform corresponding processing.
In the embodiment of the present application, the preset time period may be set and adjusted according to actual needs, for example, set to be within 5S, 8S, or 10S.
Referring to fig. 4, another flow chart of a personal authentication method according to an embodiment of the application is shown,
the embodiment of the application has the following beneficial effects:
according to the embodiment of the application, the positioning information sent by the personnel to be verified is obtained, the ID information carried by the personnel to be verified is determined according to the positioning information, whether the personnel to be verified has the authority of entering and exiting the monitoring area or not is determined, the ID information matched with the personnel to be verified is determined according to the face database, after the personnel to be verified is determined to have the authority of entering and exiting the monitoring area, the carried ID information and the matched ID information are compared, and whether the identity of the personnel to be verified is legal or not can be judged by combining the positioning information of the personnel to be verified and various ID information, so that the accuracy and the reliability of the identity verification of the personnel can be effectively improved.
Furthermore, the embodiment of the application utilizes the UWB module to realize the positioning of the personnel to be verified, thereby not only effectively improving the positioning precision, but also preventing the positioning information from being copied, and effectively improving the reliability of the positioning information; according to the embodiment of the application, the UWB positioning solution face recognition algorithm is used for verifying the identity of the personnel to be verified, so that the personnel identity card can be effectively prevented from being stolen, and the personnel do not carry the card and enter and exit the monitoring area in a illegal manner, and further the management efficiency of personnel standardization behavior can be effectively improved.
Referring to fig. 5, based on the same inventive concept as the above embodiment, an embodiment of the present application provides a personal authentication apparatus, including:
a monitoring area determining module 10 for determining a monitoring area;
the area association module 20 is configured to set a video channel and associate the video channel with the monitoring area;
the monitoring area permission determining module 30 is configured to obtain positioning information sent by a person to be verified, and determine whether the person to be verified has permission to enter the monitoring area according to first ID information carried by the positioning information;
the alarm generation module 40 is configured to determine that the identity of the person to be verified is illegal when the person to be verified does not have permission to enter the monitoring area, and generate alarm information;
the second ID information determining module 50 is configured to obtain a face image of the person to be verified by using the video channel in a preset time period after the positioning information of the person to be verified is obtained when the person to be verified has permission to enter the monitoring area, and determine second ID information of the person to be verified according to the face image;
the identity verification module 60 is configured to compare the first ID information with the second ID information, and determine that the identity of the person to be verified is legal when the first ID information and the second ID information are identical.
In one embodiment, the monitoring area determination module 10 is configured to:
and setting an electronic fence in the preset plane area, and determining a monitoring area according to the electronic fence.
In one embodiment, determining a monitoring area from an electronic fence includes;
and determining a monitoring area in a preset plane area according to the boundary of the electronic fence, and performing origin calibration and scale calibration processing on the monitoring area.
In one embodiment, the monitoring area authority determination module 30 is further configured to:
and carrying out resolving processing on the BLINK signal, obtaining first ID information of the personnel to be verified carried by the BLINK signal, comparing the first ID information with the authority, and determining whether the personnel to be verified corresponding to the first ID information has the authority to enter a monitoring area according to the comparison result.
In one embodiment, the second ID information determination module 50 is further configured to:
matching the face image with a standard face image in a face database, and taking the standard face image with the highest similarity with the face image as a target face image;
and acquiring ID information of the target face image, and taking the ID information as second ID information of the personnel to be verified.
In one embodiment, the second ID information determination module 50 is also used to
And if the face image of the person to be verified is not acquired within a preset time period after the positioning information of the person to be verified is acquired, generating alarm information.
An embodiment of the present application provides a computer-readable storage medium, which includes a stored computer program, where the computer-readable storage medium is controlled to perform a person authentication method as described above, when the computer program is run.
The foregoing is a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application and are intended to be comprehended within the scope of the present application.

Claims (8)

1. A method of authenticating a person, comprising:
determining a monitoring area;
setting a video channel and associating the video channel with the monitoring area;
positioning information sent by a person to be verified is obtained, and whether the person to be verified has permission to enter the monitoring area is determined according to first ID information carried by the positioning information;
if the personnel to be verified does not have permission to enter the monitoring area, judging that the identity of the personnel to be verified is illegal, and generating alarm information;
if the personnel to be verified has permission to enter the monitoring area, acquiring a face image of the personnel to be verified by utilizing the video channel in a preset time period after the positioning information of the personnel to be verified is acquired, and determining second ID information of the personnel to be verified according to the face image;
comparing the first ID information with the second ID information, and judging the identity of the person to be verified to be legal when the first ID information is consistent with the second ID information.
2. The person identity verification method of claim 1, wherein the determining a monitored area includes:
and setting an electronic fence in the preset plane area, and determining a monitoring area according to the electronic fence.
3. The person identity verification method of claim 2, wherein said determining a monitoring area from said electronic fence comprises;
and determining a monitoring area in the preset plane area according to the boundary of the electronic fence, and performing origin calibration and scale calibration processing on the monitoring area.
4. The method for verifying the identity of a person according to claim 1, wherein the positioning information is a BLINK signal, and the determining whether the person to be verified has permission to enter the monitoring area according to the first ID information carried by the positioning information includes:
and resolving the BLINK signal to obtain first ID information of a person to be verified carried by the BLINK signal, comparing the first ID information with the ID information with authority, and determining whether the person to be verified corresponding to the first ID information has authority to enter the monitoring area according to a comparison result.
5. The person authentication method according to claim 1, wherein the determining the second ID information of the person to be authenticated from the face image includes:
matching the face image with a standard face image in the face database, and taking the standard face image with the highest similarity with the face image as a target face image;
and acquiring ID information of the target face image, and taking the ID information as second ID information of the personnel to be verified.
6. The person identity verification method of claim 1, further comprising;
and if the face image of the person to be verified is not acquired within a preset time period after the positioning information of the person to be verified is acquired, generating alarm information.
7. A personal authentication apparatus, comprising:
the monitoring area determining module is used for determining a monitoring area;
the area association module is used for setting a video channel and associating the video channel with the monitoring area;
the monitoring area permission determining module is used for acquiring positioning information sent by a person to be verified, and determining whether the person to be verified has permission to enter the monitoring area according to first ID information carried by the positioning information;
the alarm generation module is used for judging that the identity of the person to be verified is illegal when the person to be verified does not have permission to enter the monitoring area, and generating alarm information;
the second ID information determining module is used for acquiring a face image of the person to be verified by utilizing the video channel in a preset time period after the positioning information of the person to be verified is acquired when the person to be verified has permission to enter the monitoring area, and determining second ID information of the person to be verified according to the face image;
and the identity verification module is used for comparing the first ID information with the second ID information, and judging that the identity of the person to be verified is legal when the first ID information is consistent with the second ID information.
8. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program, when run, controls a device in which the computer readable storage medium is located to perform the person authentication method according to any one of claims 1-6.
CN202310966508.6A 2023-08-02 2023-08-02 Personnel identity verification method, device and storage medium Pending CN117056890A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310966508.6A CN117056890A (en) 2023-08-02 2023-08-02 Personnel identity verification method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310966508.6A CN117056890A (en) 2023-08-02 2023-08-02 Personnel identity verification method, device and storage medium

Publications (1)

Publication Number Publication Date
CN117056890A true CN117056890A (en) 2023-11-14

Family

ID=88668446

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310966508.6A Pending CN117056890A (en) 2023-08-02 2023-08-02 Personnel identity verification method, device and storage medium

Country Status (1)

Country Link
CN (1) CN117056890A (en)

Similar Documents

Publication Publication Date Title
US9544308B2 (en) Compliant authentication based on dynamically-updated credentials
DE102012220130B4 (en) Procedure and system for granting access to secure facilities
US9367677B1 (en) Systems and methods for user authentication using eye movement and pupil size change matching
US7769696B2 (en) Information storing apparatus
CN106097223B (en) Certificate declaration management system and certificate declaration management method
CN111538970B (en) Cloud platform system based on intelligent Internet of things
US11716330B2 (en) Mobile enrollment using a known biometric
US9058474B2 (en) Biometric device, system, and method for individual access control
US20190035042A1 (en) Method and System for Implementing User Biometrics as a Boarding Pass for Public Transportation
CN108900536B (en) Authentication method, authentication device, computer equipment and storage medium
JP2011501281A (en) Personal inspection system and method of conducting personal inspection
CN110659908A (en) Data transaction identity verification system
CN208705952U (en) A kind of rights management unit
CN117056890A (en) Personnel identity verification method, device and storage medium
CN113553555A (en) Client security authentication method and device
CN111310150A (en) Security authentication system based on security computer
KR20170083778A (en) Fingerprint recognition security system for visitors access management
CN113032755B (en) Nuclear power equipment operator verification method, device, equipment and storage medium
KR102384253B1 (en) Method for performing video call certification
CN112825203B (en) Method and apparatus for admission control for a particular area
CN111274568A (en) User side authority control method and device, computer equipment and storage medium
CN208000493U (en) A kind of electricity power enterprise's field work safe safeguard
US8902043B1 (en) Mitigating conformational bias in authentication systems
CN116664081B (en) Case data fixed certificate processing method, device and equipment based on quick-handling identification
KR102307288B1 (en) Method for managing quality of performing video call certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination