CN117272274A - Intelligent electronic safe and identity verification method thereof - Google Patents

Intelligent electronic safe and identity verification method thereof Download PDF

Info

Publication number
CN117272274A
CN117272274A CN202311292300.7A CN202311292300A CN117272274A CN 117272274 A CN117272274 A CN 117272274A CN 202311292300 A CN202311292300 A CN 202311292300A CN 117272274 A CN117272274 A CN 117272274A
Authority
CN
China
Prior art keywords
signal
identity verification
identity
power spectrum
received
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311292300.7A
Other languages
Chinese (zh)
Inventor
王涤非
梁艺弋
刘溪
梁静
董楠
王晨
赵博雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chinese PLA General Hospital
Original Assignee
Chinese PLA General Hospital
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chinese PLA General Hospital filed Critical Chinese PLA General Hospital
Priority to CN202311292300.7A priority Critical patent/CN117272274A/en
Publication of CN117272274A publication Critical patent/CN117272274A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/10Pre-processing; Data cleansing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/254Fusion techniques of classification results, e.g. of results related to same input data
    • G06F18/256Fusion techniques of classification results, e.g. of results related to same input data of results relating to different input data, e.g. multimodal recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/02Preprocessing
    • G06F2218/04Denoising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/12Classification; Matching
    • G06F2218/16Classification; Matching by matching signal segments
    • G06F2218/18Classification; Matching by matching signal segments by plotting the signal segments against each other, e.g. analysing scattergrams

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to an intelligent electronic safe and an identity verification method thereof, wherein the method comprises the following steps: calculating a power spectrum of the received authentication signal; calculating cross power spectral density between the received signal and the transmitted signal after Fourier transformation; inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model; and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model. According to the invention, the power spectrum and the cross power spectrum density of the identity verification signal are used as training samples to be input into the neural network model for training, so that the neural network can learn more signal characteristics, the problem that the neural network learns from single signal characteristics to information is incomplete is effectively solved, and the accuracy in the identity verification process is greatly improved.

Description

Intelligent electronic safe and identity verification method thereof
Technical Field
The invention relates to the technical field of electronic safes, in particular to an intelligent electronic safe and an identity verification method thereof.
Background
A safe is a metal article used to store valuables, documents, and vital documents. It is generally made of strong steel and has the functions of fire protection, theft protection, water resistance, etc. to protect the articles stored therein from damage and theft. Traditional safe deposit box uses mechanical lock or trick lock to carry out authentication, has the security low, easily by the risk of cracking.
Disclosure of Invention
In order to solve the above problems, an object of an embodiment of the present invention is to provide an intelligent electronic safe and an authentication method thereof.
An intelligent electronic safe comprising:
the identity sensing device is in communication connection with the terminal control system and is used for verifying the identity of the toll collector, and when the identity of the toll collector is verified successfully, the toll collector controls the terminal control system to send an instruction;
the turnover gold package storage area is communicated with the turnover gold package receiving outlet through a pipeline and is used for bouncing off the corresponding turnover gold package locked by the turnover gold package storage area and enabling the turnover gold package to fall into the receiving outlet according to a program control instruction of the terminal control system;
the turnover gold package delivery inlet is communicated with the turnover gold package recovery area through a pipeline and is used for transmitting corresponding turnover gold packages placed at the turnover gold package delivery inlet to the turnover gold package recovery area according to program control instructions of the terminal control system.
Preferably, the identity sensing device comprises:
the identity verification card is used for transmitting an identity verification signal;
and the identity recognition device is used for receiving the identity verification signal and judging whether the identity verification signal accords with a preset condition, and if the identity verification signal accords with the preset condition, the identity verification of the toll collector is successful.
The invention also provides an identity verification method which is applied to the intelligent electronic safe and comprises the following steps:
step 1: acquiring an identity verification signal received by an identity recognition device and an identity verification signal transmitted by an identity verification card;
step 2: calculating a power spectrum of the received authentication signal;
step 3: performing Fourier transform on the received identity verification signal and the transmitted identity verification signal to obtain a received signal and a transmitted signal after Fourier transform;
step 4: calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform;
step 5: inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model;
step 6: and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model.
Preferably, the step 2: calculating a power spectrum of the received authentication signal, comprising:
step 2.1: segmenting the received identity verification signal according to a preset length to obtain a segmented signal;
step 2.2: performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals;
step 2.3: calculating the power spectrum of each section of signal;
step 2.4: and carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal.
Preferably, the step 2.2: performing an average value removing process on the segmented signal to obtain an average value removed segmented signal, including:
the formula is adopted:
performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; wherein x is 1 i (N) is the ith segment signal, L is the segment number of the segmented signal, i is not less than 1 and not more than L, N is the length of the segmented signal, and N is not less than 0 and not more than N, x 2 i (n) is the segment signal after the mean value is removed.
Preferably, the step 2.4: the weighted average of the power spectrum of each segment of the signal is carried out to obtain the power spectrum of the received identity verification signal, which comprises the following steps:
the formula is adopted:
carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal; wherein x is 2 i (n) is the segment signal after removing the mean value, P i XX (ω) is the self-power spectral density, d (n) is the data window, j is the imaginary unit, ω is the angular frequency, and k is the number of data points in the segmented signal.
Preferably, the step 4: calculating a cross-power spectral density between the fourier transformed received signal and the transmitted signal, comprising:
the formula is adopted:
calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform; wherein P is i XY (omega) is cross-power spectral density, G * (k) H (k) is the fourier transformed transmit signal, which is the transposed receive signal after fourier transformation.
Preferably, in said step 1: after the authentication signal received by the authentication device and the authentication signal transmitted by the authentication card are obtained, the method further comprises the following steps:
performing wavelet decomposition on the identity verification signal to obtain a plurality of wavelet coefficients;
removing the wavelet coefficient containing noise by using a wavelet threshold method to obtain a denoised identity verification signal; the denoising formula of the wavelet threshold method is as follows:
wherein w is i,j An ith wavelet coefficient representing the authentication signal at the jth decomposition scale, sgn representing a sign function, lambda 1 Represents a first denoising threshold value, lambda 2 Represents a second denoising threshold value, and lambda 1 =0.5λ 2Representing the wavelet coefficients after noise removal.
Preferably, the first denoising threshold calculation formula is:
wherein d j For decomposing the wavelet coefficient with the scale j, N represents the length of the authentication signal, and mean represents the median operation.
The invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a method of authentication as described in any of the preceding claims.
The intelligent electronic safe and the identity verification method thereof have the beneficial effects that: compared with the prior art, the power spectrum and the cross power spectrum density of the identity verification signal are used as training samples to be input into the neural network model for training, so that the neural network can learn more signal characteristics, the problem that the neural network learns from single signal characteristics to information is incomplete is effectively solved, and the accuracy rate in the identity verification process is greatly improved.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic view of a turnover package storage area in an embodiment provided by the invention;
FIG. 2 is a schematic view of a turndown ladle pickup outlet according to an embodiment of the present invention;
FIG. 3 is a schematic view of a transfer packet delivery portal in an embodiment provided by the present invention;
FIG. 4 is a schematic view of a recycling area of a turnover purse in an embodiment provided by the invention;
fig. 5 is a flowchart of an authentication method provided by the present invention.
Detailed Description
In the description of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
The embodiment of the invention aims to provide an intelligent electronic safe, which can guarantee the safety of construction workers in real time.
Referring to fig. 1-4, an intelligent electronic safe, comprising: the system comprises an identity sensing device, a terminal control system, a turnover gold package storage area, a turnover gold package receiving outlet and a turnover gold package delivering inlet.
The identity sensing device is in communication connection with the terminal control system and is used for verifying the identity of the toll collector, and when the identity of the toll collector is verified successfully, the toll collector controls the terminal control system to send an instruction;
the turnover gold package storage area is communicated with the turnover gold package receiving outlet through a pipeline and is used for bouncing off the corresponding turnover gold package locked by the turnover gold package storage area and enabling the turnover gold package to fall into the receiving outlet according to a program control instruction of the terminal control system; the storage area consists of 100 independent spaces, and when a background person stores the turnover gold packages, the single space of the storage area corresponds to the single turnover gold package and automatically bounces off for storage.
The turnover gold package delivery inlet is communicated with the turnover gold package recovery area through a pipeline and is used for transmitting corresponding turnover gold packages placed at the turnover gold package delivery inlet to the turnover gold package recovery area according to program control instructions of the terminal control system.
In practical application, the distribution personnel can open the turnover gold package recovery area behind the safe, take out the turnover gold package and count, distribute the package. And after the package distribution is completed, the control system is operated to sequentially store the turnover gold packages according to the space sequence of the turnover gold package storage area. After the charging personnel operate the terminal control system to get the bags, the turnover gold bag storage area locks the corresponding turnover gold bags and flicks off to enable the turnover gold bags to fall into the pipeline to the receiving outlet.
Further, the identity sensing device comprises: an identity verification card and an identity recognition device.
The identity verification card is used for transmitting an identity verification signal;
and the identity recognition device is used for receiving the identity verification signal and judging whether the identity verification signal accords with a preset condition, and if the identity verification signal accords with the preset condition, the identity verification of the toll collector is successful.
The invention also provides an identity verification method which is applied to the intelligent electronic safe and comprises the following steps:
step 1: acquiring an identity verification signal received by an identity recognition device and an identity verification signal transmitted by an identity verification card;
step 2: calculating a power spectrum of the received authentication signal;
further, step 2 includes:
step 2.1: segmenting the received identity verification signal according to a preset length to obtain a segmented signal;
step 2.2: performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; specifically, the invention may employ the formula:
performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; wherein x is 1 i (N) is the ith segment signal, L is the segment number of the segmented signal, i is not less than 1 and not more than L, N is the length of the segmented signal, and N is not less than 0 and not more than N, x 2 i (n) is the segment signal after the mean value is removed.
Step 2.3: calculating the power spectrum of each section of signal;
step 2.4: and carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal. Wherein, the weighted average formula in the invention is as follows:
wherein x is 2 i (n) is the segment signal after removing the mean value, P i XX (ω) is the self-power spectral density, d (n) is the data window, j is the imaginary unit, ω is the angular frequency, and k is the number of data points in the segmented signal.
Step 3: performing Fourier transform on the received identity verification signal and the transmitted identity verification signal to obtain a received signal and a transmitted signal after Fourier transform;
step 4: calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform;
further, step 4 includes:
the formula is adopted:
calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform; wherein P is i XY (omega) is cross-power spectral density, G * (k) H (k) is the fourier transformed transmit signal, which is the transposed receive signal after fourier transformation.
Step 5: inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model;
according to the invention, the power spectrum and the cross power spectrum density of the identity verification signal are used as training samples to be input into the neural network model for training, so that the neural network can learn more signal characteristics, the problem that the neural network learns from single signal characteristics to information is incomplete is effectively solved, and the accuracy in the identity verification process is greatly improved.
Step 6: and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model.
After the step 1, the method further includes:
performing wavelet decomposition on the identity verification signal to obtain a plurality of wavelet coefficients;
removing the wavelet coefficient containing noise by using a wavelet threshold method to obtain a denoised identity verification signal;
in the wavelet threshold denoising process, the advantages and disadvantages of threshold selection directly influence the denoising effect. Since the wavelet coefficient amplitude of the noise has the characteristic of decreasing with the increase of the decomposition scale, the invention introduces the self-adaptive adjustment of the decomposition scale to the denoising threshold value. Further, in the present invention, the first denoising threshold calculation formula is:
wherein d j For decomposing the wavelet coefficient with the scale j, N represents the length of the authentication signal, and mean represents the median operation.
The denoising formula of the wavelet threshold method is as follows:
wherein w is i,j An ith wavelet coefficient representing the authentication signal at the jth decomposition scale, sgn representing a sign function, lambda 1 Represents a first denoising threshold value, lambda 2 Represents a second denoising threshold value, and lambda 1 =0.5λ 2Representing the wavelet coefficients after noise removal.
The invention adjusts the denoising threshold value in a self-adaptive way based on the decomposition scale, and completes the denoising process of the signal by utilizing the threshold value, so that the quality and the definition of the identity verification signal can be improved, and the subsequent training effect can be improved.
The invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a method of authentication as described in any of the preceding claims.
Compared with the prior art, the beneficial effects of the computer readable storage medium provided by the invention are the same as those of the identity verification method described in the technical scheme, and the description is omitted herein.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art can easily think about variations or alternatives within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An intelligent electronic safe, comprising:
the identity sensing device is in communication connection with the terminal control system and is used for verifying the identity of the toll collector, and when the identity of the toll collector is verified successfully, the toll collector controls the terminal control system to send an instruction;
the turnover gold package storage area is communicated with the turnover gold package receiving outlet through a pipeline and is used for bouncing off the corresponding turnover gold package locked by the turnover gold package storage area and enabling the turnover gold package to fall into the receiving outlet according to a program control instruction of the terminal control system;
the turnover gold package delivery inlet is communicated with the turnover gold package recovery area through a pipeline and is used for transmitting corresponding turnover gold packages placed at the turnover gold package delivery inlet to the turnover gold package recovery area according to program control instructions of the terminal control system.
2. An intelligent electronic safe according to claim 1, wherein said identity sensing means comprises:
the identity verification card is used for transmitting an identity verification signal;
and the identity recognition device is used for receiving the identity verification signal and judging whether the identity verification signal accords with a preset condition, and if the identity verification signal accords with the preset condition, the identity verification of the toll collector is successful.
3. The identity verification method is applied to an intelligent electronic safe and is characterized by comprising the following steps of:
step 1: acquiring an identity verification signal received by an identity recognition device and an identity verification signal transmitted by an identity verification card;
step 2: calculating a power spectrum of the received authentication signal;
step 3: performing Fourier transform on the received identity verification signal and the transmitted identity verification signal to obtain a received signal and a transmitted signal after Fourier transform;
step 4: calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform;
step 5: inputting the power spectrum and the cross power spectrum density of the identity verification signal as training samples into a neural network model for training to obtain an identity signal identification model;
step 6: and completing the identity verification process of the intelligent electronic safe by using the identity signal recognition model.
4. A method of authentication according to claim 3, wherein said step 2: calculating a power spectrum of the received authentication signal, comprising:
step 2.1: segmenting the received identity verification signal according to a preset length to obtain a segmented signal;
step 2.2: performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals;
step 2.3: calculating the power spectrum of each section of signal;
step 2.4: and carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal.
5. An authentication method according to claim 4, wherein said step 2.2: performing an average value removing process on the segmented signal to obtain an average value removed segmented signal, including:
the formula is adopted:
performing mean value removal processing on the segmented signals to obtain mean value removed segmented signals; wherein x is 1 i (N) is the ith segment signal, L is the segment number of the segmented signal, i is not less than 1 and not more than L, N is the length of the segmented signal, and N is not less than 0 and not more than N, x 2 i (n) is the segment signal after the mean value is removed.
6. An authentication method according to claim 5, wherein said step 2.4: the weighted average of the power spectrum of each segment of the signal is carried out to obtain the power spectrum of the received identity verification signal, which comprises the following steps:
the formula is adopted:
carrying out weighted average on the power spectrum of each section of signal to obtain the power spectrum of the received identity verification signal; wherein x is 2 i (n) is de-Segment signal after mean value removal, P i XX (ω) is the self-power spectral density, d (n) is the data window, j is the imaginary unit, ω is the angular frequency, and k is the number of data points in the segmented signal.
7. The authentication method according to claim 6, wherein said step 4: calculating a cross-power spectral density between the fourier transformed received signal and the transmitted signal, comprising:
the formula is adopted:
calculating cross power spectral density between the received signal and the transmitted signal after the Fourier transform; wherein P is i XY (omega) is cross-power spectral density, G * (k) H (k) is the fourier transformed transmit signal, which is the transposed receive signal after fourier transformation.
8. An authentication method according to claim 7, characterized in that in said step 1: after the authentication signal received by the authentication device and the authentication signal transmitted by the authentication card are obtained, the method further comprises the following steps:
performing wavelet decomposition on the identity verification signal to obtain a plurality of wavelet coefficients;
removing the wavelet coefficient containing noise by using a wavelet threshold method to obtain a denoised identity verification signal; the denoising formula of the wavelet threshold method is as follows:
wherein w is i,j An ith wavelet coefficient representing the authentication signal at the jth decomposition scale, sgn representing a sign function, lambda 1 Represents a first denoising threshold value, lambda 2 Represents a second denoising threshold value, and lambda 1 =0.5λ 2Representing the wavelet coefficients after noise removal.
9. The authentication method of claim 8, wherein the first denoising threshold calculation formula is:
wherein d j For decomposing the wavelet coefficient with the scale j, N represents the length of the authentication signal, and mean represents the median operation.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of an authentication method according to any one of claims 3-9.
CN202311292300.7A 2023-10-08 2023-10-08 Intelligent electronic safe and identity verification method thereof Pending CN117272274A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311292300.7A CN117272274A (en) 2023-10-08 2023-10-08 Intelligent electronic safe and identity verification method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311292300.7A CN117272274A (en) 2023-10-08 2023-10-08 Intelligent electronic safe and identity verification method thereof

Publications (1)

Publication Number Publication Date
CN117272274A true CN117272274A (en) 2023-12-22

Family

ID=89202336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311292300.7A Pending CN117272274A (en) 2023-10-08 2023-10-08 Intelligent electronic safe and identity verification method thereof

Country Status (1)

Country Link
CN (1) CN117272274A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897693A (en) * 2017-02-23 2017-06-27 深圳先进技术研究院 A kind of personal identification method, apparatus and system
CN109508728A (en) * 2018-08-31 2019-03-22 深圳大学 A kind of novel auth method for wearable device
CN111932790A (en) * 2020-07-22 2020-11-13 上海交通大学医学院附属新华医院 Bank intelligent cabinet, control system and control method
CN113918912A (en) * 2021-10-11 2022-01-11 深圳壹账通智能科技有限公司 Identity authentication method, system, equipment and medium based on brain print recognition
CN115481689A (en) * 2022-09-20 2022-12-16 中国科学技术大学 System and method for simultaneously recognizing user gesture and identity based on ultrasonic waves
CN115857013A (en) * 2022-12-09 2023-03-28 中国科学院地质与地球物理研究所 Method for calculating self-noise of seismometer by using improved welch method
CN116698398A (en) * 2023-04-28 2023-09-05 南京理工大学 Gear fault feature extraction method based on CEEMDAN sub-threshold noise reduction and energy entropy

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897693A (en) * 2017-02-23 2017-06-27 深圳先进技术研究院 A kind of personal identification method, apparatus and system
CN109508728A (en) * 2018-08-31 2019-03-22 深圳大学 A kind of novel auth method for wearable device
CN111932790A (en) * 2020-07-22 2020-11-13 上海交通大学医学院附属新华医院 Bank intelligent cabinet, control system and control method
CN113918912A (en) * 2021-10-11 2022-01-11 深圳壹账通智能科技有限公司 Identity authentication method, system, equipment and medium based on brain print recognition
CN115481689A (en) * 2022-09-20 2022-12-16 中国科学技术大学 System and method for simultaneously recognizing user gesture and identity based on ultrasonic waves
CN115857013A (en) * 2022-12-09 2023-03-28 中国科学院地质与地球物理研究所 Method for calculating self-noise of seismometer by using improved welch method
CN116698398A (en) * 2023-04-28 2023-09-05 南京理工大学 Gear fault feature extraction method based on CEEMDAN sub-threshold noise reduction and energy entropy

Similar Documents

Publication Publication Date Title
CN103984976B (en) Method, device and system for using electronic tag
CN110517097A (en) Identify method, apparatus, equipment and the storage medium of abnormal user
US20050188213A1 (en) System for personal identity verification
CN103871165B (en) The safety monitoring method of Possum and device
CN1972186A (en) A mobile identity authentication system and its authentication method
WO2007004224A1 (en) Improved location based authentication system
CN107679997A (en) Method, apparatus, terminal device and storage medium are refused to pay in medical treatment Claims Resolution
WO1994020926A1 (en) High precision on-line dynamic signature verification system
CN107657161A (en) Method of mobile payment and Related product based on recognition of face
CN104700094A (en) Face recognition method and system for intelligent robot
CN107578521A (en) Queuing management method and system, electronic equipment and computer-readable recording medium
CN102184377A (en) Identity identification device and identity identification method based on radio frequency identification technology
CN112364803A (en) Living body recognition auxiliary network and training method, terminal, equipment and storage medium
CN105930777A (en) ATM (Automatic Teller Machine) using fingerprint for identification
CN113538770A (en) Intelligent money box control system and method
CN117115881A (en) Face recognition system based on machine learning
CN107886339A (en) Method and apparatus for output information
CN108921563A (en) A kind of safe verification method and equipment based on human body communication
CN117272274A (en) Intelligent electronic safe and identity verification method thereof
CN112862491B (en) Face payment security method and platform based on security unit and trusted execution environment
CN105513168A (en) Access control method and system for nonferrous metal delivery warehouse
CN104169942A (en) Card swiping method and device for determining mobile terminal for swiping card, utilizing intensity of ultrasonic signal
CN108830135A (en) Computer and telephone intergration signal recognition method, device and storage medium
CN113743580B (en) Artificial immune model obtaining method and terminal equipment
CN102402674B (en) A kind of method for anti-counterfeit based on RF tag and Antiforge system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination