CN117272274A - Intelligent electronic safe and identity verification method thereof - Google Patents
Intelligent electronic safe and identity verification method thereof Download PDFInfo
- Publication number
- CN117272274A CN117272274A CN202311292300.7A CN202311292300A CN117272274A CN 117272274 A CN117272274 A CN 117272274A CN 202311292300 A CN202311292300 A CN 202311292300A CN 117272274 A CN117272274 A CN 117272274A
- Authority
- CN
- China
- Prior art keywords
- signal
- identity verification
- identity
- power spectrum
- received
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 74
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000001228 spectrum Methods 0.000 claims abstract description 37
- 230000003595 spectral effect Effects 0.000 claims abstract description 15
- 238000012549 training Methods 0.000 claims abstract description 15
- 230000008569 process Effects 0.000 claims abstract description 11
- 238000003062 neural network model Methods 0.000 claims abstract description 7
- 230000009466 transformation Effects 0.000 claims abstract description 4
- 230000007306 turnover Effects 0.000 claims description 44
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 claims description 42
- 239000010931 gold Substances 0.000 claims description 42
- 229910052737 gold Inorganic materials 0.000 claims description 42
- 238000000354 decomposition reaction Methods 0.000 claims description 9
- 238000011084 recovery Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 6
- 238000004891 communication Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000013528 artificial neural network Methods 0.000 abstract description 6
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 229910000831 Steel Inorganic materials 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/10—Pre-processing; Data cleansing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/25—Fusion techniques
- G06F18/254—Fusion techniques of classification results, e.g. of results related to same input data
- G06F18/256—Fusion techniques of classification results, e.g. of results related to same input data of results relating to different input data, e.g. multimodal recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/02—Preprocessing
- G06F2218/04—Denoising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/12—Classification; Matching
- G06F2218/16—Classification; Matching by matching signal segments
- G06F2218/18—Classification; Matching by matching signal segments by plotting the signal segments against each other, e.g. analysing scattergrams
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention relates to an intelligent electronic safe and an identity verification method thereof, wherein the method comprises the following steps: calculating a power spectrum of the received authentication signal; calculating cross power spectral density between the received signal and the transmitted signal after Fourier transformation; inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model; and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model. According to the invention, the power spectrum and the cross power spectrum density of the identity verification signal are used as training samples to be input into the neural network model for training, so that the neural network can learn more signal characteristics, the problem that the neural network learns from single signal characteristics to information is incomplete is effectively solved, and the accuracy in the identity verification process is greatly improved.
Description
Technical Field
The invention relates to the technical field of electronic safes, in particular to an intelligent electronic safe and an identity verification method thereof.
Background
A safe is a metal article used to store valuables, documents, and vital documents. It is generally made of strong steel and has the functions of fire protection, theft protection, water resistance, etc. to protect the articles stored therein from damage and theft. Traditional safe deposit box uses mechanical lock or trick lock to carry out authentication, has the security low, easily by the risk of cracking.
Disclosure of Invention
In order to solve the above problems, an object of an embodiment of the present invention is to provide an intelligent electronic safe and an authentication method thereof.
An intelligent electronic safe comprising:
the identity sensing device is in communication connection with the terminal control system and is used for verifying the identity of the toll collector, and when the identity of the toll collector is verified successfully, the toll collector controls the terminal control system to send an instruction;
the turnover gold package storage area is communicated with the turnover gold package receiving outlet through a pipeline and is used for bouncing off the corresponding turnover gold package locked by the turnover gold package storage area and enabling the turnover gold package to fall into the receiving outlet according to a program control instruction of the terminal control system;
the turnover gold package delivery inlet is communicated with the turnover gold package recovery area through a pipeline and is used for transmitting corresponding turnover gold packages placed at the turnover gold package delivery inlet to the turnover gold package recovery area according to program control instructions of the terminal control system.
Preferably, the identity sensing device comprises:
the identity verification card is used for transmitting an identity verification signal;
and the identity recognition device is used for receiving the identity verification signal and judging whether the identity verification signal accords with a preset condition, and if the identity verification signal accords with the preset condition, the identity verification of the toll collector is successful.
The invention also provides an identity verification method which is applied to the intelligent electronic safe and comprises the following steps:
step 1: acquiring an identity verification signal received by an identity recognition device and an identity verification signal transmitted by an identity verification card;
step 2: calculating a power spectrum of the received authentication signal;
step 3: performing Fourier transform on the received identity verification signal and the transmitted identity verification signal to obtain a received signal and a transmitted signal after Fourier transform;
step 4: calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform;
step 5: inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model;
step 6: and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model.
Preferably, the step 2: calculating a power spectrum of the received authentication signal, comprising:
step 2.1: segmenting the received identity verification signal according to a preset length to obtain a segmented signal;
step 2.2: performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals;
step 2.3: calculating the power spectrum of each section of signal;
step 2.4: and carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal.
Preferably, the step 2.2: performing an average value removing process on the segmented signal to obtain an average value removed segmented signal, including:
the formula is adopted:
performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; wherein x is 1 i (N) is the ith segment signal, L is the segment number of the segmented signal, i is not less than 1 and not more than L, N is the length of the segmented signal, and N is not less than 0 and not more than N, x 2 i (n) is the segment signal after the mean value is removed.
Preferably, the step 2.4: the weighted average of the power spectrum of each segment of the signal is carried out to obtain the power spectrum of the received identity verification signal, which comprises the following steps:
the formula is adopted:
carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal; wherein x is 2 i (n) is the segment signal after removing the mean value, P i XX (ω) is the self-power spectral density, d (n) is the data window, j is the imaginary unit, ω is the angular frequency, and k is the number of data points in the segmented signal.
Preferably, the step 4: calculating a cross-power spectral density between the fourier transformed received signal and the transmitted signal, comprising:
the formula is adopted:
calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform; wherein P is i XY (omega) is cross-power spectral density, G * (k) H (k) is the fourier transformed transmit signal, which is the transposed receive signal after fourier transformation.
Preferably, in said step 1: after the authentication signal received by the authentication device and the authentication signal transmitted by the authentication card are obtained, the method further comprises the following steps:
performing wavelet decomposition on the identity verification signal to obtain a plurality of wavelet coefficients;
removing the wavelet coefficient containing noise by using a wavelet threshold method to obtain a denoised identity verification signal; the denoising formula of the wavelet threshold method is as follows:
wherein w is i,j An ith wavelet coefficient representing the authentication signal at the jth decomposition scale, sgn representing a sign function, lambda 1 Represents a first denoising threshold value, lambda 2 Represents a second denoising threshold value, and lambda 1 =0.5λ 2 ,Representing the wavelet coefficients after noise removal.
Preferably, the first denoising threshold calculation formula is:
wherein d j For decomposing the wavelet coefficient with the scale j, N represents the length of the authentication signal, and mean represents the median operation.
The invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a method of authentication as described in any of the preceding claims.
The intelligent electronic safe and the identity verification method thereof have the beneficial effects that: compared with the prior art, the power spectrum and the cross power spectrum density of the identity verification signal are used as training samples to be input into the neural network model for training, so that the neural network can learn more signal characteristics, the problem that the neural network learns from single signal characteristics to information is incomplete is effectively solved, and the accuracy rate in the identity verification process is greatly improved.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic view of a turnover package storage area in an embodiment provided by the invention;
FIG. 2 is a schematic view of a turndown ladle pickup outlet according to an embodiment of the present invention;
FIG. 3 is a schematic view of a transfer packet delivery portal in an embodiment provided by the present invention;
FIG. 4 is a schematic view of a recycling area of a turnover purse in an embodiment provided by the invention;
fig. 5 is a flowchart of an authentication method provided by the present invention.
Detailed Description
In the description of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
The embodiment of the invention aims to provide an intelligent electronic safe, which can guarantee the safety of construction workers in real time.
Referring to fig. 1-4, an intelligent electronic safe, comprising: the system comprises an identity sensing device, a terminal control system, a turnover gold package storage area, a turnover gold package receiving outlet and a turnover gold package delivering inlet.
The identity sensing device is in communication connection with the terminal control system and is used for verifying the identity of the toll collector, and when the identity of the toll collector is verified successfully, the toll collector controls the terminal control system to send an instruction;
the turnover gold package storage area is communicated with the turnover gold package receiving outlet through a pipeline and is used for bouncing off the corresponding turnover gold package locked by the turnover gold package storage area and enabling the turnover gold package to fall into the receiving outlet according to a program control instruction of the terminal control system; the storage area consists of 100 independent spaces, and when a background person stores the turnover gold packages, the single space of the storage area corresponds to the single turnover gold package and automatically bounces off for storage.
The turnover gold package delivery inlet is communicated with the turnover gold package recovery area through a pipeline and is used for transmitting corresponding turnover gold packages placed at the turnover gold package delivery inlet to the turnover gold package recovery area according to program control instructions of the terminal control system.
In practical application, the distribution personnel can open the turnover gold package recovery area behind the safe, take out the turnover gold package and count, distribute the package. And after the package distribution is completed, the control system is operated to sequentially store the turnover gold packages according to the space sequence of the turnover gold package storage area. After the charging personnel operate the terminal control system to get the bags, the turnover gold bag storage area locks the corresponding turnover gold bags and flicks off to enable the turnover gold bags to fall into the pipeline to the receiving outlet.
Further, the identity sensing device comprises: an identity verification card and an identity recognition device.
The identity verification card is used for transmitting an identity verification signal;
and the identity recognition device is used for receiving the identity verification signal and judging whether the identity verification signal accords with a preset condition, and if the identity verification signal accords with the preset condition, the identity verification of the toll collector is successful.
The invention also provides an identity verification method which is applied to the intelligent electronic safe and comprises the following steps:
step 1: acquiring an identity verification signal received by an identity recognition device and an identity verification signal transmitted by an identity verification card;
step 2: calculating a power spectrum of the received authentication signal;
further, step 2 includes:
step 2.1: segmenting the received identity verification signal according to a preset length to obtain a segmented signal;
step 2.2: performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; specifically, the invention may employ the formula:
performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; wherein x is 1 i (N) is the ith segment signal, L is the segment number of the segmented signal, i is not less than 1 and not more than L, N is the length of the segmented signal, and N is not less than 0 and not more than N, x 2 i (n) is the segment signal after the mean value is removed.
Step 2.3: calculating the power spectrum of each section of signal;
step 2.4: and carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal. Wherein, the weighted average formula in the invention is as follows:
wherein x is 2 i (n) is the segment signal after removing the mean value, P i XX (ω) is the self-power spectral density, d (n) is the data window, j is the imaginary unit, ω is the angular frequency, and k is the number of data points in the segmented signal.
Step 3: performing Fourier transform on the received identity verification signal and the transmitted identity verification signal to obtain a received signal and a transmitted signal after Fourier transform;
step 4: calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform;
further, step 4 includes:
the formula is adopted:
calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform; wherein P is i XY (omega) is cross-power spectral density, G * (k) H (k) is the fourier transformed transmit signal, which is the transposed receive signal after fourier transformation.
Step 5: inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model;
according to the invention, the power spectrum and the cross power spectrum density of the identity verification signal are used as training samples to be input into the neural network model for training, so that the neural network can learn more signal characteristics, the problem that the neural network learns from single signal characteristics to information is incomplete is effectively solved, and the accuracy in the identity verification process is greatly improved.
Step 6: and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model.
After the step 1, the method further includes:
performing wavelet decomposition on the identity verification signal to obtain a plurality of wavelet coefficients;
removing the wavelet coefficient containing noise by using a wavelet threshold method to obtain a denoised identity verification signal;
in the wavelet threshold denoising process, the advantages and disadvantages of threshold selection directly influence the denoising effect. Since the wavelet coefficient amplitude of the noise has the characteristic of decreasing with the increase of the decomposition scale, the invention introduces the self-adaptive adjustment of the decomposition scale to the denoising threshold value. Further, in the present invention, the first denoising threshold calculation formula is:
wherein d j For decomposing the wavelet coefficient with the scale j, N represents the length of the authentication signal, and mean represents the median operation.
The denoising formula of the wavelet threshold method is as follows:
wherein w is i,j An ith wavelet coefficient representing the authentication signal at the jth decomposition scale, sgn representing a sign function, lambda 1 Represents a first denoising threshold value, lambda 2 Represents a second denoising threshold value, and lambda 1 =0.5λ 2 ,Representing the wavelet coefficients after noise removal.
The invention adjusts the denoising threshold value in a self-adaptive way based on the decomposition scale, and completes the denoising process of the signal by utilizing the threshold value, so that the quality and the definition of the identity verification signal can be improved, and the subsequent training effect can be improved.
The invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a method of authentication as described in any of the preceding claims.
Compared with the prior art, the beneficial effects of the computer readable storage medium provided by the invention are the same as those of the identity verification method described in the technical scheme, and the description is omitted herein.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art can easily think about variations or alternatives within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. An intelligent electronic safe, comprising:
the identity sensing device is in communication connection with the terminal control system and is used for verifying the identity of the toll collector, and when the identity of the toll collector is verified successfully, the toll collector controls the terminal control system to send an instruction;
the turnover gold package storage area is communicated with the turnover gold package receiving outlet through a pipeline and is used for bouncing off the corresponding turnover gold package locked by the turnover gold package storage area and enabling the turnover gold package to fall into the receiving outlet according to a program control instruction of the terminal control system;
the turnover gold package delivery inlet is communicated with the turnover gold package recovery area through a pipeline and is used for transmitting corresponding turnover gold packages placed at the turnover gold package delivery inlet to the turnover gold package recovery area according to program control instructions of the terminal control system.
2. An intelligent electronic safe according to claim 1, wherein said identity sensing means comprises:
the identity verification card is used for transmitting an identity verification signal;
and the identity recognition device is used for receiving the identity verification signal and judging whether the identity verification signal accords with a preset condition, and if the identity verification signal accords with the preset condition, the identity verification of the toll collector is successful.
3. The identity verification method is applied to an intelligent electronic safe and is characterized by comprising the following steps of:
step 1: acquiring an identity verification signal received by an identity recognition device and an identity verification signal transmitted by an identity verification card;
step 2: calculating a power spectrum of the received authentication signal;
step 3: performing Fourier transform on the received identity verification signal and the transmitted identity verification signal to obtain a received signal and a transmitted signal after Fourier transform;
step 4: calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform;
step 5: inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model;
step 6: and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model.
4. A method of authentication according to claim 3, wherein said step 2: calculating a power spectrum of the received authentication signal, comprising:
step 2.1: segmenting the received identity verification signal according to a preset length to obtain a segmented signal;
step 2.2: performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals;
step 2.3: calculating the power spectrum of each section of signal;
step 2.4: and carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal.
5. An authentication method according to claim 4, wherein said step 2.2: performing an average value removing process on the segmented signal to obtain an average value removed segmented signal, including:
the formula is adopted:
performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; wherein x is 1 i (N) is the ith segment signal, L is the segment number of the segmented signal, i is not less than 1 and not more than L, N is the length of the segmented signal, and N is not less than 0 and not more than N, x 2 i (n) is the segment signal after the mean value is removed.
6. An authentication method according to claim 5, wherein said step 2.4: the weighted average of the power spectrum of each segment of the signal is carried out to obtain the power spectrum of the received identity verification signal, which comprises the following steps:
the formula is adopted:
carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal; wherein x is 2 i (n) is de-Segment signal after mean value removal, P i XX (ω) is the self-power spectral density, d (n) is the data window, j is the imaginary unit, ω is the angular frequency, and k is the number of data points in the segmented signal.
7. The authentication method according to claim 6, wherein said step 4: calculating a cross-power spectral density between the fourier transformed received signal and the transmitted signal, comprising:
the formula is adopted:
calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform; wherein P is i XY (omega) is cross-power spectral density, G * (k) H (k) is the fourier transformed transmit signal, which is the transposed receive signal after fourier transformation.
8. An authentication method according to claim 7, characterized in that in said step 1: after the authentication signal received by the authentication device and the authentication signal transmitted by the authentication card are obtained, the method further comprises the following steps:
performing wavelet decomposition on the identity verification signal to obtain a plurality of wavelet coefficients;
removing the wavelet coefficient containing noise by using a wavelet threshold method to obtain a denoised identity verification signal; the denoising formula of the wavelet threshold method is as follows:
wherein w is i,j An ith wavelet coefficient representing the authentication signal at the jth decomposition scale, sgn representing a sign function, lambda 1 Represents a first denoising threshold value, lambda 2 Represents a second denoising threshold value, and lambda 1 =0.5λ 2 ,Representing the wavelet coefficients after noise removal.
9. The authentication method of claim 8, wherein the first denoising threshold calculation formula is:
wherein d j For decomposing the wavelet coefficient with the scale j, N represents the length of the authentication signal, and mean represents the median operation.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of an authentication method according to any one of claims 3-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311292300.7A CN117272274A (en) | 2023-10-08 | 2023-10-08 | Intelligent electronic safe and identity verification method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311292300.7A CN117272274A (en) | 2023-10-08 | 2023-10-08 | Intelligent electronic safe and identity verification method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117272274A true CN117272274A (en) | 2023-12-22 |
Family
ID=89202336
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311292300.7A Pending CN117272274A (en) | 2023-10-08 | 2023-10-08 | Intelligent electronic safe and identity verification method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117272274A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106897693A (en) * | 2017-02-23 | 2017-06-27 | 深圳先进技术研究院 | A kind of personal identification method, apparatus and system |
CN109508728A (en) * | 2018-08-31 | 2019-03-22 | 深圳大学 | A kind of novel auth method for wearable device |
CN111932790A (en) * | 2020-07-22 | 2020-11-13 | 上海交通大学医学院附属新华医院 | Bank intelligent cabinet, control system and control method |
CN113918912A (en) * | 2021-10-11 | 2022-01-11 | 深圳壹账通智能科技有限公司 | Identity authentication method, system, equipment and medium based on brain print recognition |
CN115481689A (en) * | 2022-09-20 | 2022-12-16 | 中国科学技术大学 | System and method for simultaneously recognizing user gesture and identity based on ultrasonic waves |
CN115857013A (en) * | 2022-12-09 | 2023-03-28 | 中国科学院地质与地球物理研究所 | Method for calculating self-noise of seismometer by using improved welch method |
CN116698398A (en) * | 2023-04-28 | 2023-09-05 | 南京理工大学 | Gear fault feature extraction method based on CEEMDAN sub-threshold noise reduction and energy entropy |
-
2023
- 2023-10-08 CN CN202311292300.7A patent/CN117272274A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106897693A (en) * | 2017-02-23 | 2017-06-27 | 深圳先进技术研究院 | A kind of personal identification method, apparatus and system |
CN109508728A (en) * | 2018-08-31 | 2019-03-22 | 深圳大学 | A kind of novel auth method for wearable device |
CN111932790A (en) * | 2020-07-22 | 2020-11-13 | 上海交通大学医学院附属新华医院 | Bank intelligent cabinet, control system and control method |
CN113918912A (en) * | 2021-10-11 | 2022-01-11 | 深圳壹账通智能科技有限公司 | Identity authentication method, system, equipment and medium based on brain print recognition |
CN115481689A (en) * | 2022-09-20 | 2022-12-16 | 中国科学技术大学 | System and method for simultaneously recognizing user gesture and identity based on ultrasonic waves |
CN115857013A (en) * | 2022-12-09 | 2023-03-28 | 中国科学院地质与地球物理研究所 | Method for calculating self-noise of seismometer by using improved welch method |
CN116698398A (en) * | 2023-04-28 | 2023-09-05 | 南京理工大学 | Gear fault feature extraction method based on CEEMDAN sub-threshold noise reduction and energy entropy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103984976B (en) | Method, device and system for using electronic tag | |
CN110517097A (en) | Identify method, apparatus, equipment and the storage medium of abnormal user | |
US20050188213A1 (en) | System for personal identity verification | |
CN103871165B (en) | The safety monitoring method of Possum and device | |
CN1972186A (en) | A mobile identity authentication system and its authentication method | |
WO2007004224A1 (en) | Improved location based authentication system | |
CN107679997A (en) | Method, apparatus, terminal device and storage medium are refused to pay in medical treatment Claims Resolution | |
WO1994020926A1 (en) | High precision on-line dynamic signature verification system | |
CN107657161A (en) | Method of mobile payment and Related product based on recognition of face | |
CN104700094A (en) | Face recognition method and system for intelligent robot | |
CN107578521A (en) | Queuing management method and system, electronic equipment and computer-readable recording medium | |
CN102184377A (en) | Identity identification device and identity identification method based on radio frequency identification technology | |
CN112364803A (en) | Living body recognition auxiliary network and training method, terminal, equipment and storage medium | |
CN105930777A (en) | ATM (Automatic Teller Machine) using fingerprint for identification | |
CN113538770A (en) | Intelligent money box control system and method | |
CN117115881A (en) | Face recognition system based on machine learning | |
CN107886339A (en) | Method and apparatus for output information | |
CN108921563A (en) | A kind of safe verification method and equipment based on human body communication | |
CN117272274A (en) | Intelligent electronic safe and identity verification method thereof | |
CN112862491B (en) | Face payment security method and platform based on security unit and trusted execution environment | |
CN105513168A (en) | Access control method and system for nonferrous metal delivery warehouse | |
CN104169942A (en) | Card swiping method and device for determining mobile terminal for swiping card, utilizing intensity of ultrasonic signal | |
CN108830135A (en) | Computer and telephone intergration signal recognition method, device and storage medium | |
CN113743580B (en) | Artificial immune model obtaining method and terminal equipment | |
CN102402674B (en) | A kind of method for anti-counterfeit based on RF tag and Antiforge system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |