CN117275123A - Verification mode configuration method and device and computer equipment - Google Patents

Verification mode configuration method and device and computer equipment Download PDF

Info

Publication number
CN117275123A
CN117275123A CN202311231190.3A CN202311231190A CN117275123A CN 117275123 A CN117275123 A CN 117275123A CN 202311231190 A CN202311231190 A CN 202311231190A CN 117275123 A CN117275123 A CN 117275123A
Authority
CN
China
Prior art keywords
parameter
verification
format
bit
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311231190.3A
Other languages
Chinese (zh)
Inventor
李志福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Entropy Technology Co ltd
Original Assignee
Xiamen Entropy Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Entropy Technology Co ltd filed Critical Xiamen Entropy Technology Co ltd
Priority to CN202311231190.3A priority Critical patent/CN117275123A/en
Publication of CN117275123A publication Critical patent/CN117275123A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides a verification mode configuration method, a verification mode configuration device and computer equipment. The verification mode configuration method applied to the verification equipment comprises responding to a mode configuration instruction to obtain a first parameter; under the condition that the first parameter is in a first format, analyzing the first parameter according to the first format to determine a target verification mode; in the first format, the binary form of the first parameter includes first selection bits and logic bits, the first selection bits are in one-to-one correspondence with the plurality of verification means, the value of each first selection bit is used for indicating whether the corresponding verification means is required to be used, and the logic bits are used for indicating the logic relationship between the verification means required to be used. The method greatly simplifies the parameter expression and enhances the expansibility of the parameters by adopting the first parameters in the first format, thereby realizing the centralized configuration and management of the verification mode of the verification equipment more flexibly and conveniently.

Description

Verification mode configuration method and device and computer equipment
Technical Field
The present disclosure relates to the field of identity verification technologies, and in particular, to a verification method and apparatus, and a computer device.
Background
With the development of identity verification technology, verification means which can be supported by verification equipment are more and more, such as a human face, palm prints, palm veins, fingerprints, finger veins, voiceprints, irises, retina, passwords, work numbers, cards, identity cards and the like. Along with the increase of the verification means, the combination verification among the verification means is too many, so that the development process needs to define the corresponding value of each verification means, and the related configuration and analysis scheme is too complicated and is not easy to expand.
Disclosure of Invention
The present application aims to solve at least one of the above technical drawbacks, and in particular, the problems related to the identity configuration and the analysis scheme in the prior art are too complicated and not easy to expand.
In a first aspect, the present application provides an authentication mode configuration method, applied to an authentication device, where the authentication mode configuration method includes:
responding to the mode configuration instruction to obtain a first parameter;
under the condition that the first parameter is in a first format, analyzing the first parameter according to the first format to determine a target verification mode; in the first format, the binary form of the first parameter includes first selection bits and logic bits, the first selection bits are in one-to-one correspondence with the plurality of verification means, the value of each first selection bit is used for indicating whether the corresponding verification means is required to be used, and the logic bits are used for indicating the logic relationship between the verification means required to be used.
In one embodiment, after obtaining the first parameter, the method further includes:
under the condition that the first parameter is in the second format, the first parameter is analyzed according to the second format so as to determine a target verification mode; under the second format, the binary form of the first parameter includes second selection bits corresponding to the multiple verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the corresponding verification mode to be selected is the target verification mode.
In one embodiment, before responding to the mode configuration instruction, the method further comprises:
sending a registration request to a system platform; the registration request carries a second parameter and a third parameter, the binary form of the second parameter comprises third selection bits which are in one-to-one correspondence with a plurality of verification means, the value of each third selection bit is used for indicating whether the corresponding verification means are supported, the binary form of the third parameter comprises fourth selection bits which are in one-to-one correspondence with a plurality of verification modes to be selected, and the value of each fourth selection bit is used for indicating whether the corresponding verification mode to be selected is supported or not to be selected as a target verification mode;
and determining the first parameter as a first format or a second format according to a registration completion instruction fed back by the system platform.
In one embodiment, determining, according to a registration completion instruction fed back by the system platform, the first parameter to be in the first format or the second format includes:
if the registration completion instruction carries the parameter with the same value as the second parameter, determining that the first parameter is in a first format;
if the registration completion instruction carries the same parameter as the value of the third parameter, determining that the first parameter is in the second format.
In one embodiment, when performing authentication by using the target authentication mode determined based on the first parameter in the first format, the method further includes:
if the logic relation is' and the identity verification is passed, generating a fourth parameter according to the value of the first parameter;
if the logic relationship is ' and the identity authentication is not passed, or the logic relationship is ' OR ', the last authentication means used by the user is taken as a target means; setting an initial parameter with the same bit number as the first parameter, setting the value of the bit corresponding to the target means in the initial parameter as a first numerical value and setting the values of the rest bits as a second numerical value according to the corresponding relation between the first selected bit in the first format and the verification means, and obtaining a fourth parameter;
and uploading the fourth parameter to the system platform.
In a second aspect, the present application provides a verification manner configuration method, applied to a system platform, where the verification manner configuration method includes:
generating a first parameter according to a first format in response to a first configuration operation in support of configuration based on the first format; in the first format, the binary form of the first parameter includes a first selection bit and a logic bit, the first selection bit corresponds to a plurality of verification means one by one, the value of each first selection bit is used for indicating whether the verification device needs to use the corresponding verification means, and the logic bit is used for indicating the logic relationship between the verification means needing to be used;
and issuing a mode configuration instruction carrying the first parameter to the verification equipment.
In one embodiment, before issuing the mode configuration instruction carrying the first parameter to the verification device, the method further includes:
generating a first parameter according to the second format in response to a second configuration operation in support of configuration based on the second format; under the second format, the binary form of the first parameter includes second selection bits corresponding to the multiple verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the verification device selects the corresponding verification mode to be selected as the target verification mode.
In one embodiment, before generating the first parameter, the method further includes:
responding to a registration request sent by verification equipment to obtain a second parameter and a third parameter; the binary form of the second parameter comprises third selection bits which are in one-to-one correspondence with a plurality of verification means, the value of each third selection bit is used for indicating whether the verification device supports the use of the corresponding verification means, the binary form of the third parameter comprises fourth selection bits which are in one-to-one correspondence with a plurality of verification modes to be selected, and the value of each fourth selection bit is used for indicating whether the verification device supports the selection of the corresponding verification mode to be selected as a target verification mode;
in the case of supporting configuration based on the first format, transmitting a registration completion instruction carrying the same parameter as the value of the second parameter to the authentication device;
in case of supporting the configuration based on the second format, a registration completion instruction carrying the same parameter as the value of the third parameter is sent to the authentication device.
In a third aspect, the present application provides an authentication mode configuration apparatus, applied to an authentication device, where the authentication mode configuration apparatus includes:
the first response module is used for responding to the mode configuration instruction to obtain a first parameter;
The analysis module is used for analyzing the first parameter according to the first format under the condition that the first parameter is in the first format so as to determine a target verification mode; in the first format, the binary form of the first parameter includes first selection bits and logic bits, the first selection bits are in one-to-one correspondence with the plurality of verification means, the value of each first selection bit is used for indicating whether the corresponding verification means is required to be used, and the logic bits are used for indicating the logic relationship between the verification means required to be used.
In a fourth aspect, the present application provides an authentication mode configuration apparatus, applied to a system platform, where the authentication mode configuration apparatus includes:
the first response module is used for responding to the first configuration operation and generating a first parameter according to the first format under the condition of supporting configuration based on the first format; in the first format, the binary form of the first parameter includes a first selection bit and a logic bit, the first selection bit corresponds to a plurality of verification means one by one, the value of each first selection bit is used for indicating whether the verification device needs to use the corresponding verification means, and the logic bit is used for indicating the logic relationship between the verification means needing to be used;
and the issuing module is used for issuing the mode configuration instruction carrying the first parameter to the verification equipment.
In a fifth aspect, the present application provides a computer device comprising one or more processors, and a memory having stored therein computer readable instructions which, when executed by the one or more processors, perform the steps of the verification manner configuration method of any of the embodiments described above.
From the above technical solutions, the embodiments of the present application have the following advantages:
based on the verification manner configuration method in this embodiment, when the verification device receives a manner configuration instruction carrying a first parameter in a first format, verification means which needs to be included in a target verification manner are determined according to a first selection bit and a logic bit included in the first parameter, then logic relations among the verification means are determined according to the logic bit, and finally a complete target verification manner is determined. By adopting the first parameters in the first format, parameter expression is greatly simplified, the expansibility of the parameters is enhanced, the verification device does not need to store all mode combinations, and the verification mode can be dynamically determined by analyzing the first parameters, so that centralized configuration and management of the verification mode of the verification device are more flexibly and conveniently realized.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a flowchart of a verification manner configuration method applied to a verification device according to an embodiment of the present application;
FIG. 2 is a flowchart of a verification method configuration method applied to a system platform according to an embodiment of the present application;
FIG. 3 is a schematic block diagram of a verification mode configuration apparatus applied to a verification device according to an embodiment of the present application;
FIG. 4 is a schematic block diagram of a verification mode configuration device applied to a system platform according to an embodiment of the present application;
fig. 5 is an internal structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The application provides a verification mode configuration method which is applied to verification equipment. The verification device may be a device for performing traffic management by verifying an identity, such as an entrance guard device and an attendance device. The access control device will be described later as an example. The conventional technology can analyze the parameters of a specific format through carrying the parameters in the instruction by the access control equipment so as to determine the selected verification mode. The specific format adopted is: each bit of the binary form of the parameter corresponds to a to-be-selected verification mode, the to-be-selected verification mode needs to cover the possibility of any combination of all verification means, which leads to quite complex parameters, and each time one verification means is added to the access control equipment, a plurality of bits are needed to cover the newly added to-be-selected verification mode, so that the expansibility is poor and the burden on an developer is heavy. For example, in an access device supporting cards and passwords, there are four combinations of only cards, only passwords, passwords or cards, passwords and cards. The binary form of the parameters in this format requires at least four bits. However, if a fingerprint authentication is added, there will be eleven combinations of only cards, only passwords, only fingerprints, passwords or cards, passwords or fingerprints, cards or fingerprints, password card, password fingerprint, card fingerprint, password or card or fingerprint, password card fingerprint. The parameters of this format are increased to at least eleven bits. The single verification means supported by the existing access control equipment can reach more than ten times, and parameters which at least need hundreds of bits can appear by utilizing the parameters in the format. In order to solve the problem, the verification manner configuration method provided in the embodiment of the present application includes step S102 and step S104.
S102, responding to the mode configuration instruction to obtain a first parameter.
It can be understood that the mode configuration instruction is an instruction for configuring an authentication mode to the access control device, and the authentication mode may be formed by a single authentication means or may be formed by combining a plurality of authentication means. When managing the region that the area is great, probably need a plurality of entrance guard's equipment, for convenient management, can dispose the system platform and carry out unified management to each entrance guard's equipment. The mode configuration instruction can be issued to the access control equipment by the system platform. Or the user can generate the data after the local operation of the access control equipment. The first parameters are parameters written in a specific first format. The first format establishes a corresponding relation between the value of the first parameter and the selection of the target verification mode, so that the access control equipment can determine the target verification mode by analyzing the first parameter.
In addition, in some embodiments, since one door access device may manage multiple doors, the mode configuration instructions may instruct the door access device to use all of the managed doors with the same target authentication mode. However, the mode configuration instruction can also include a serial number indicating the door to which the mode configuration instruction is directed, so that different verification modes can be adopted for different doors under the same access control equipment.
S104, when the first parameter is in the first format, analyzing the first parameter according to the first format to determine the target verification mode.
It can be understood that the first parameter of the conventional technology is issued to the access control device after all the combination modes to be selected are combined, so that the number of bits of the first parameter is long and the expansibility is poor. In order to solve the problem of this type,
it has been found that each verification means is composed of more than one verification means and a logical relationship between the verification means (and/or). The first parameter of the first format used in the embodiment decouples the verification means to be used and the logic relationship between the verification means to be used, and only two parts forming the verification mode are indicated in the first parameter, and the two parts are combined into the target verification mode by self after being analyzed by the access control equipment. Specifically, in the first format, the binary form of the first parameter includes a first select bit and a logic bit. The first selection bit corresponds to a plurality of verification means one by one. The plurality of verification means may include all verification means in the whole intelligent management system, and each time one verification means is newly added in the system, only one first selection bit is newly added under the binary form of the first parameter. Since each first selected bit is a binary bit, the value can only be taken between 0 and 1. Based on this, it is possible to indicate with 0 and 1, respectively, whether the authentication means corresponding to the first selection bit needs to be used. Therefore, the value of each first selection bit can be used for indicating whether the access control equipment needs to use the corresponding verification means to form the target verification mode. The logic bit is used for indicating the logic relation among all verification means to be used, namely that all verification means to be used can be used for opening the door through verification (the 'and' relation), or only one of the verification means can be used for opening the door through verification (the 'or' relation).
Specifically, assuming that there are 11 verification means, a first parameter of at least 12 bits may be set, with bit 0 as a logical bit, bit 1 corresponding to a face, bit 2 corresponding to a palm print, bit 3 corresponding to a palm vein, bit 4 corresponding to a fingerprint, bit 5 corresponding to a finger vein, bit 6 corresponding to a voiceprint, bit 7 corresponding to an iris, bit 8 corresponding to a retina, bit 9 corresponding to a password, bit 10 corresponding to a job number, and bit 11 corresponding to a card. A value of 0 for each first selection bit indicates that no corresponding authentication means is required, and a value of 1 indicates that a corresponding authentication means is required. A value of a logical bit of 0 represents a relationship using "or", and a value of 1 represents a relationship using "and". In the first format, if the card encryption code plus the face is required to be used as the target verification mode (i.e. the "and" relationship), the value of the first parameter should be 101000000011. If a card or password or face is required for the target verification, the value of the first parameter should be 101000000010. Therefore, in the case of using eleven verification means, the first parameter of the first format can be realized by only 12 bits, and compared with the case of using hundreds of bits in the traditional coding mode, the first parameter is greatly simplified. When the verification means is added, all combination conditions are not required to be exhausted, a plurality of corresponding digits are required to be added, and the corresponding first selection bits are only required to be added for the newly added verification means.
The first parameter is not necessarily in a binary form in the mode configuration instruction, but after the first parameter is extracted, the access control device converts the first parameter into a binary form, so that the values of each first selection bit and each logic bit can be analyzed according to the definition of the first format in the description, and the logic relationship between the verification means to be used and the verification means to be used is combined to obtain the target verification mode.
Based on the verification manner configuration method in this embodiment, when the verification device receives a manner configuration instruction carrying a first parameter in a first format, verification means which needs to be included in a target verification manner are determined according to a first selection bit and a logic bit included in the first parameter, then logic relations among the verification means are determined according to the logic bit, and finally a complete target verification manner is determined. By adopting the first parameters in the first format, parameter expression is greatly simplified, the expansibility of the parameters is enhanced, the verification device does not need to store all mode combinations, and the verification mode can be dynamically determined by analyzing the first parameters, so that centralized configuration and management of the verification mode of the verification device are more flexibly and conveniently realized.
In one embodiment, after obtaining the first parameter, the method further includes: and under the condition that the first parameter is in the second format, analyzing the first parameter according to the second format to determine the target verification mode. Under the second format, the binary form of the first parameter includes second selection bits corresponding to the multiple verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the corresponding verification mode to be selected is the target verification mode.
It is understood that the second format herein represents the format used in the conventional art in the above description. In order to increase the compatibility of the access control device, the access control device may be compatible with the old format for the case that some system platforms have not completed upgrades. That is, if the verification device confirms that the acquired first parameter is in the second format, the verification device may also sequentially read the values of the bits of the first parameter according to the parsing mode of the second format, so as to find a verification mode to be selected as the target verification mode from multiple verification modes to be selected. For example, a second selection bit of 0 indicates that the corresponding verification method to be selected is not selected as the target verification method, and a second selection bit of 1 indicates that the corresponding verification method to be selected is selected as the target verification method. The eleven combinations of the card only, the password only, the fingerprint only, the password or the card, the password or the fingerprint, the card or the fingerprint, the password plus card, the password plus fingerprint, the card plus fingerprint, the password or the card or the fingerprint plus card plus fingerprint sequentially correspond to the 0 th bit to the 10 th bit of the first parameter. If cryptographic fingerprinting is required as the target authentication means, the binary form of the first parameter in the second format is 10000000000. If a password or card is required as the target authentication means, the binary form of the first parameter in the second format is 00010000000.
In one embodiment, before responding to the mode configuration instruction, the method further comprises:
(1) And sending a registration request to the system platform.
It can be understood that if the system platform is required to be used for managing a plurality of access control devices, each access control device needs to complete registration on the system platform, so that the system platform can acquire relevant information of each access control device to complete registration, and thus the relevant information of each access control device which completes registration can be displayed in the front-end interface. In the part related to verification mode configuration, in order to facilitate the system platform to issue a mode configuration instruction, if the access control device needs to use the first parameter in the first format, the system platform needs to be informed of which verification means the access control device supports to use. If the access control device needs to use the first parameter in the second format, the system platform needs to be informed of which verification modes to be selected are supported by the access control device. Because the access control device does not determine which format of the first parameter is supported by the system platform, the two kinds of information need to be respectively put into the registration request in a mode of the second parameter and the third parameter. Of course, if compatibility requirements are not considered to determine that each system platform supports the first parameters in the first format, the registration request may carry only the second parameters.
Specifically, the binary form of the second parameter includes a third selection bit that corresponds one-to-one to the plurality of verification means. Since each third selected bit is a binary bit, the value can only be taken between 0 and 1. It may be indicated with 0 and 1, respectively, whether the device supports the use of the authentication means corresponding to the third selection bit. Thus, the value of each third selection bit may be used to indicate whether the use of the corresponding authentication means is supported. Assuming a total of 11 verification means, a second parameter of at least 11 bits may be set, and in order to keep the number of bits consistent with the first parameter of the first format, the logical bits may be replaced with invalid bits, so a second parameter of 12 bits may be set. The 0 th bit is used as an invalid bit, the 1 st bit corresponds to a human face, the 2 nd bit corresponds to a palm print, the 3 rd bit corresponds to a palm vein, the 4 th bit corresponds to a fingerprint, the 5 th bit corresponds to a finger vein, the 6 th bit corresponds to a voiceprint, the 7 th bit corresponds to an iris, the 8 th bit corresponds to a retina, the 9 th bit corresponds to a password, the 10 th bit corresponds to a work number, and the 11 th bit corresponds to a card. A value of 0 for each third selection bit indicates that the corresponding authentication means is not supported for use, and a value of 1 indicates that the corresponding authentication means is supported for use. If the access control device supports three verification means, namely a card, a password and a human face, the value of the second parameter is 101000000010. After the verification means is newly added to the access control equipment, the corresponding third selection bit is only added to the second parameter.
The binary form of the third parameter includes a fourth selection bit that corresponds one-to-one to the plurality of verification modes to be selected. The various alternative verification schemes herein cover all arbitrary combinations, and each fourth selected bit is a binary bit, which can only be valued between 0 and 1. Whether the device supports the use of the verification mode to be selected corresponding to the fourth selection bit can be respectively indicated by 0 and 1 as target verification modes. Therefore, the value of each fourth selection bit is used to indicate whether the corresponding verification mode to be selected is supported to be selected as the target verification mode. Specifically, eleven combinations of only the card, only the password, only the fingerprint, the password or the card, the password or the fingerprint, the card or the fingerprint, the password plus the card, the password plus the fingerprint, the card plus the fingerprint, the password or the card or the fingerprint plus the password plus the card plus the fingerprint sequentially correspond to the 0 th bit to the 10 th bit of the third parameter. If the verification means supported by the access control device are a password and a card, the value of the fourth selection bit corresponding to the password and the card related verification mode to be selected should be 1, that is, the third parameter should be 00001001011.
The second parameter and the third parameter are not necessarily in binary form in the registration request, but after the second parameter and the third parameter are extracted, the system platform converts them into binary form for parsing according to the format supported by the system platform.
(2) And determining the first parameter as a first format or a second format according to a registration completion instruction fed back by the system platform.
After the second parameter and the third parameter are read, the system platform feeds back different registration completion instructions to the access control equipment according to different formats supported by the system platform, so that the access control equipment can determine whether the format of the first parameter carried by the mode configuration instruction received in the future is the first format or the second format according to the registration completion instructions. In a specific embodiment, if the registration completion instruction fed back by the system platform carries the same parameter as the value of the second parameter, the first parameter is determined to be in the first format. If the registration completion instruction carries the same parameter as the value of the third parameter, determining that the first parameter is in the second format. The access control device can compare the parameters fed back in the registration completion instruction with the second parameters and the third parameters, so that the format used by the first parameters is determined.
In one embodiment, when performing authentication by using the target authentication mode determined based on the first parameter in the first format, the method further includes:
(1) If the logical relationship is "and the authentication is passed, a fourth parameter is generated according to the value of the first parameter.
It will be appreciated that when the user needs to open the door, a prompt may be issued to the user regarding the item to be authenticated, the user then performing the corresponding authentication within the specified time. Taking the card encryption code and the human face as the target verification mode as an example, the user needs to verify by respectively using the correct card, the correct password and the correct human face in the set time, the access control equipment judges that the identity verification passes, and the door is opened for the user, otherwise, the user judges that the identity verification fails. In order to keep the user's authentication record in file, a fourth parameter for the record will be sent to the system platform. Since the user authentication passes, the value of the first parameter can be directly used as the value of the fourth parameter to upload, which represents that the user passes each authentication means in the target authentication mode. In the above example, the value of the fourth parameter is 101000000011. And the system platform can determine whether the final result of each verification event passes or fails according to whether the fourth parameter is consistent with the first parameter.
(2) If the logical relationship is "and the authentication fails, or if the logical relationship is" or ", the last authentication means used by the user is the target means. Setting an initial parameter with the same bit number as the first parameter, setting the value of the bit corresponding to the target means as a first numerical value according to the corresponding relation between the first selected bit and the verification means in the first format, and setting the values of the rest bits of the initial parameter as a second numerical value to obtain a fourth parameter.
It can be understood that if the logical relationship is the AND, the last verification means used is the verification means with errors, and the verification means needs to be recorded and reported to the system platform. And when the logic relationship is OR, the verification is only performed once each time, and the result of the last verification means is required to be reported to the system platform. Therefore, in these cases, the verification means last used by the user is taken as the target means, and in order to report the relevant information of the target means to the system platform, the embodiment refers to the definition of the first selected bit by the first format, and the bits in the fourth parameter are associated with each verification means. After determining the target means, namely, setting the value of the bit corresponding to the target means in the fourth parameter to be different from other bits, the system platform can also know the result of each verification event by comparing the fourth parameter with the first parameter. Taking the above method of using the card encryption code plus the human face as the target verification method as an example, if the user uses the correct card encryption code to verify first, but uses the fingerprint last time, the bit corresponding to the fingerprint in the first selected bit is the fourth bit, the first value is 1, the second value is 0, and the fourth parameter should be 000010000000. Taking the above verification mode using a card or a password or a human face as a target as an example, if the user uses the card for verification, the verification passes, the bit corresponding to the card is the eleventh bit, and the value of the fourth parameter should be 100000000000. If the user uses the fingerprint for verification, the verification is not passed, and the bit corresponding to the fingerprint is the fourth bit, the fourth parameter should be 000010000000.
(3) And uploading the fourth parameter to the system platform.
The application provides a verification mode configuration method applied to a system platform, referring to fig. 2, the verification mode configuration method includes step S202 and step S204.
S202, in the case of supporting configuration based on the first format, generating a first parameter according to the first format in response to the first configuration operation. In the first format, the binary form of the first parameter includes first selection bits and logic bits, the first selection bits are in one-to-one correspondence with the plurality of verification means, the value of each first selection bit is used for indicating whether the verification device needs to use the corresponding verification means, and the logic bits are used for indicating the logic relationship between the verification means which need to be used.
It can be understood that the target verification mode adopted by each access control device can be set by the user through the front-end interface corresponding to the system platform, and the verification means supported by the target access control device and the selection items of the logic relationship are displayed on the front-end interface. Through the first configuration operation, the user can select verification means which are needed to be contained in the target verification mode of the target access control equipment and logic relations among the verification means. The system platform can generate corresponding first parameters according to the first configuration operation and the definition of the first format.
S204, issuing a mode configuration instruction carrying the first parameter to the verification device.
In one embodiment, before issuing the mode configuration instruction carrying the first parameter to the verification device, the method further includes: in the event that configuration based on the second format is supported, in response to a second configuration operation, the first parameter is generated in accordance with the second format. Under the second format, the binary form of the first parameter includes second selection bits corresponding to the multiple verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the verification device selects the corresponding verification mode to be selected as the target verification mode.
It can be understood that the system platform may not be updated, only the first parameter in the second format is supported, and then the system platform displays all the verification modes to be selected supported by the target access control device on the front end interface, the user can select the verification mode to be selected as the target verification mode from the verification modes through the second configuration operation, and then the first parameter is generated according to the specification of the second format.
In one embodiment, before generating the first parameter, the method further includes:
(1) And responding to the registration request sent by the verification device, and obtaining a second parameter and a third parameter. The binary form of the second parameter comprises third selection bits which are in one-to-one correspondence with a plurality of verification means, the value of each third selection bit is used for indicating whether the verification device supports the use of the corresponding verification means, the binary form of the third parameter comprises fourth selection bits which are in one-to-one correspondence with a plurality of verification modes to be selected, and the value of each fourth selection bit is used for indicating whether the verification device supports the selection of the corresponding verification mode to be selected as a target verification mode.
The description of this step may refer to the description of the authentication device transmitting the registration request above.
(2) In the case of supporting configuration based on the first format, a registration completion instruction carrying the same parameter as the value of the second parameter is transmitted to the authentication device.
(3) In case of supporting the configuration based on the second format, a registration completion instruction carrying the same parameter as the value of the third parameter is sent to the authentication device.
It can be understood that the system platform knows the format type of the first parameter supported by itself, and when the information related to the access control equipment needs to be fed back, the corresponding parameter value can be selected as the value of the parameter during feedback according to the type supported by itself. Specifically, the second parameter and the third parameter are presented in the form of variables with different names, the names of the variables corresponding to the supported formats can be preset in the system platform, when a registration request is received, corresponding values can be found from the registration request according to the preset names, feedback parameters are formed based on the same names and values, and the feedback parameters are placed in a registration completion instruction.
The present application provides a verification manner configuration device, which is applied to a verification apparatus, referring to fig. 3, and the verification manner configuration device includes a first response module 310 and an analysis module 320.
The first response module 310 is configured to obtain a first parameter in response to the mode configuration instruction.
The parsing module 320 is configured to parse the first parameter according to the first format to determine a target verification manner if the first parameter is in the first format. In the first format, the binary form of the first parameter includes first selection bits and logic bits, the first selection bits are in one-to-one correspondence with the plurality of verification means, the value of each first selection bit is used for indicating whether the corresponding verification means is required to be used, and the logic bits are used for indicating the logic relationship between the verification means required to be used.
In one embodiment, the parsing module 320 is further configured to parse the first parameter according to the second format to determine a target verification manner if the first parameter is in the second format; under the second format, the binary form of the first parameter includes second selection bits corresponding to the multiple verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the corresponding verification mode to be selected is the target verification mode.
In one embodiment, the verification mode configuration device further comprises a registration module and a format determination module. The registration module is used for sending a registration request to the system platform; the registration request carries a second parameter and a third parameter, the binary form of the second parameter comprises third selection bits which are in one-to-one correspondence with a plurality of verification means, the value of each third selection bit is used for indicating whether the corresponding verification means are supported, the binary form of the third parameter comprises fourth selection bits which are in one-to-one correspondence with a plurality of verification modes to be selected, and the value of each fourth selection bit is used for indicating whether the corresponding verification mode to be selected is supported or not to be selected as a target verification mode. The format determining module is used for determining the first parameter to be in a first format or a second format according to a registration completion instruction fed back by the system platform.
In one embodiment, the format determining module is configured to determine that the first parameter is in the first format if the registration completion instruction carries a parameter having a value identical to that of the second parameter; if the registration completion instruction carries the same parameter as the value of the third parameter, determining that the first parameter is in the second format.
In one embodiment, the verification manner configuration device further includes a verification result reporting module. The verification result reporting module is used for generating a fourth parameter according to the value of the first parameter if the logic relation is' and the identity verification is passed; if the logic relationship is ' and the identity authentication is not passed, or the logic relationship is ' OR ', the last authentication means used by the user is taken as a target means; setting an initial parameter with the same bit number as the first parameter, setting the value of the bit corresponding to the target means as a first numerical value according to the corresponding relation between the first selected bit and the verification means in the first format, and setting the values of the rest bits of the initial parameter as a second numerical value to obtain a fourth parameter; and uploading the fourth parameter to the system platform.
The present application provides a verification manner configuration device, which is applied to a system platform, referring to fig. 4, and includes a first response module 410 and a issuing module 420.
The first response module 410 is configured to generate, in response to a first configuration operation, a first parameter according to a first format in the case of supporting configuration based on the first format. In the first format, the binary form of the first parameter includes first selection bits and logic bits, the first selection bits are in one-to-one correspondence with the plurality of verification means, the value of each first selection bit is used for indicating whether the verification device needs to use the corresponding verification means, and the logic bits are used for indicating the logic relationship between the verification means which need to be used.
The issuing module 420 is configured to issue a mode configuration instruction carrying the first parameter to the verification device.
In one embodiment, the first response module 410 is further configured to generate, in response to the second configuration operation, a first parameter according to the second format if configuration based on the second format is supported; under the second format, the binary form of the first parameter includes second selection bits corresponding to the multiple verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the verification device selects the corresponding verification mode to be selected as the target verification mode.
In one embodiment, the verification manner configuration device further includes a second response module. The second response module is used for responding to the registration request sent by the verification device to obtain a second parameter and a third parameter; the binary form of the second parameter comprises third selection bits which are in one-to-one correspondence with a plurality of verification means, the value of each third selection bit is used for indicating whether the verification device supports the use of the corresponding verification means, the binary form of the third parameter comprises fourth selection bits which are in one-to-one correspondence with a plurality of verification modes to be selected, and the value of each fourth selection bit is used for indicating whether the verification device supports the selection of the corresponding verification mode to be selected as a target verification mode. In the case of supporting configuration based on the first format, a registration completion instruction carrying the same parameter as the value of the second parameter is transmitted to the authentication device. In case of supporting the configuration based on the second format, a registration completion instruction carrying the same parameter as the value of the third parameter is sent to the authentication device.
For specific limitations of the verification manner configuration device, reference may be made to the above limitation of the verification manner configuration method, and no further description is given here. The above-described respective modules in the verification manner configuration apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules. It should be noted that, in the embodiment of the present application, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation.
The present application provides a computer device comprising one or more processors and a memory having stored therein computer readable instructions which, when executed by the one or more processors, perform the steps of the verification manner configuration method of any of the embodiments described above.
Schematically, as shown in fig. 5, fig. 5 is a schematic internal structure of a computer device according to an embodiment of the present application. Referring to FIG. 5, a computer device 500 includes a processing component 502 that further includes one or more processors and memory resources represented by memory 501 for storing instructions, such as applications, executable by the processing component 502. The computer device can be used as a processing core in access control equipment and also can be used as an operation carrier of a system platform. The application program stored in the memory 501 may include one or more modules, each corresponding to a set of instructions. Further, the processing component 502 is configured to execute instructions to perform the steps of the verification manner configuration method of any of the embodiments described above.
The computer device 500 may also include a power supply component 503 configured to perform power management of the computer device 500, a wired or wireless network interface 504 configured to connect the computer device 500 to a network, and an input output (I/O) interface 505.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the present specification, each embodiment is described in a progressive manner, and each embodiment focuses on the difference from other embodiments, and may be combined according to needs, and the same similar parts may be referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (11)

1. An authentication mode configuration method, which is applied to an authentication device, includes:
responding to the mode configuration instruction to obtain a first parameter;
under the condition that the first parameter is in a first format, analyzing the first parameter according to the first format to determine a target verification mode; in the first format, the binary form of the first parameter includes a first selection bit and a logic bit, the first selection bit corresponds to a plurality of verification means one by one, the value of each first selection bit is used for indicating whether the corresponding verification means is needed to be used, and the logic bit is used for indicating the logic relationship between the verification means needed to be used.
2. The authentication method according to claim 1, further comprising, after obtaining the first parameter:
if the first parameter is in the second format, analyzing the first parameter according to the second format to determine a target verification mode; and under the second format, the binary form of the first parameter comprises second selection bits corresponding to a plurality of verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the corresponding verification mode to be selected is the target verification mode.
3. The authentication mode configuration method according to claim 2, further comprising, before the responding to the mode configuration instruction, before obtaining the first parameter:
sending a registration request to a system platform; the registration request carries a second parameter and a third parameter, the binary form of the second parameter comprises third selection bits which are in one-to-one correspondence with a plurality of verification means, the value of each third selection bit is used for indicating whether the corresponding verification means is supported to be used, the binary form of the third parameter comprises fourth selection bits which are in one-to-one correspondence with a plurality of verification modes to be selected, and the value of each fourth selection bit is used for indicating whether the corresponding verification mode to be selected is supported to be selected as the target verification mode;
And determining the first parameter as the first format or the second format according to a registration completion instruction fed back by the system platform.
4. The authentication method according to claim 3, wherein the determining, according to the registration completion instruction fed back by the system platform, the first parameter is in the first format or the second format includes:
if the registration completion instruction carries the parameter which is the same as the value of the second parameter, determining that the first parameter is in the first format;
and if the registration completion instruction carries the parameter which is the same as the value of the third parameter, determining that the first parameter is in the second format.
5. The authentication means configuration method according to claim 1, further comprising, when performing authentication using the target authentication means determined based on the first parameter of the first format:
if the logic relation is' and the identity verification is passed, generating a fourth parameter according to the value of the first parameter;
if the logic relationship is ' and the identity authentication is not passed, or the logic relationship is ' OR ', the last authentication means used by the user is taken as a target means; setting an initial parameter with the same bit number as the first parameter, setting the value of the bit corresponding to the target means in the initial parameter as a first numerical value and the values of the rest bits as a second numerical value according to the corresponding relation between the first selected bit and the verification means in the first format, and obtaining the fourth parameter;
Uploading the fourth parameter to a system platform.
6. The verification mode configuration method is characterized by being applied to a system platform, and comprises the following steps:
in the case of supporting configuration based on a first format, generating a first parameter according to the first format in response to a first configuration operation; in the first format, the binary form of the first parameter includes a first selection bit and a logic bit, the first selection bit corresponds to a plurality of verification means one by one, the value of each first selection bit is used for indicating whether the verification device needs to use the corresponding verification means, and the logic bit is used for indicating the logic relationship between the verification means needing to be used;
and issuing a mode configuration instruction carrying the first parameter to verification equipment.
7. The authentication means configuration method according to claim 6, further comprising, before the issuing of the means configuration instruction carrying the first parameter to the authentication device:
generating the first parameter according to a second format in response to a second configuration operation in support of configuration based on the second format; and under the second format, the binary form of the first parameter comprises second selection bits corresponding to a plurality of verification modes to be selected one by one, and the value of each second selection bit is used for indicating whether the verification equipment selects the corresponding verification mode to be selected as a target verification mode.
8. The authentication method of claim 7, further comprising, prior to generating the first parameter:
responding to a registration request sent by the verification equipment to obtain a second parameter and a third parameter; the binary form of the second parameter comprises third selection bits which are in one-to-one correspondence with a plurality of verification means, the value of each third selection bit is used for indicating whether the verification device supports the use of the corresponding verification means, the binary form of the third parameter comprises fourth selection bits which are in one-to-one correspondence with a plurality of verification modes to be selected, and the value of each fourth selection bit is used for indicating whether the verification device supports the selection of the corresponding verification mode to be selected as the target verification mode;
transmitting a registration completion instruction carrying the same parameter as the value of the second parameter to the authentication device in support of configuration based on the first format;
in the case of supporting configuration based on the second format, the registration completion instruction carrying the same parameter as the value of the third parameter is transmitted to the authentication device.
9. An authentication form configuring apparatus, characterized by being applied to an authentication device, comprising:
The first response module is used for responding to the mode configuration instruction to obtain a first parameter;
the analysis module is used for analyzing the first parameter according to the first format under the condition that the first parameter is in the first format so as to determine a target verification mode; in the first format, the binary form of the first parameter includes a first selection bit and a logic bit, the first selection bit corresponds to a plurality of verification means one by one, the value of each first selection bit is used for indicating whether the corresponding verification means is needed to be used, and the logic bit is used for indicating the logic relationship between the verification means needed to be used.
10. An authentication mode configuration device, which is applied to a system platform, comprising:
the first response module is used for responding to a first configuration operation and generating a first parameter according to a first format under the condition of supporting configuration based on the first format; in the first format, the binary form of the first parameter includes a first selection bit and a logic bit, the first selection bit corresponds to a plurality of verification means one by one, the value of each first selection bit is used for indicating whether the verification device needs to use the corresponding verification means, and the logic bit is used for indicating the logic relationship between the verification means needing to be used;
And the issuing module is used for issuing the mode configuration instruction carrying the first parameter to the verification equipment.
11. A computer device comprising one or more processors and a memory having stored therein computer readable instructions which, when executed by the one or more processors, perform the steps of the verification manner configuration method of any one of claims 1-8.
CN202311231190.3A 2023-09-22 2023-09-22 Verification mode configuration method and device and computer equipment Pending CN117275123A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311231190.3A CN117275123A (en) 2023-09-22 2023-09-22 Verification mode configuration method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311231190.3A CN117275123A (en) 2023-09-22 2023-09-22 Verification mode configuration method and device and computer equipment

Publications (1)

Publication Number Publication Date
CN117275123A true CN117275123A (en) 2023-12-22

Family

ID=89202123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311231190.3A Pending CN117275123A (en) 2023-09-22 2023-09-22 Verification mode configuration method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN117275123A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117994882A (en) * 2024-04-02 2024-05-07 杭州海康威视数字技术股份有限公司 Pass permission authentication equipment and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117994882A (en) * 2024-04-02 2024-05-07 杭州海康威视数字技术股份有限公司 Pass permission authentication equipment and method
CN117994882B (en) * 2024-04-02 2024-08-20 杭州海康威视数字技术股份有限公司 Pass permission authentication equipment and method

Similar Documents

Publication Publication Date Title
CN109150828B (en) Verification registration method and system
WO2016110002A1 (en) Screen interface unlocking method and screen interface unlocking device
CN106713370B (en) A kind of identity identifying method, server and mobile terminal
JP4548660B2 (en) Method and apparatus for managing workflow in single sign-on framework
US20080148375A1 (en) Authentication system, authentication device, and authentication method
CN117275123A (en) Verification mode configuration method and device and computer equipment
CN104240013A (en) Door access control method and door access control platform
CN110825634A (en) Parameter quality checking method, device and equipment and computer readable storage medium
CN112860778B (en) Database management method, device, equipment and medium for desktop application program
CN111415443A (en) Remote unlocking method and device
CN112905437A (en) Method and device for testing case and storage medium
CN104240014A (en) Door access control method and door access control platform
JP3977548B2 (en) User authentication device, user authentication method, user authentication card, and computer-readable recording medium
US20060089809A1 (en) Data processing apparatus
US20090271449A1 (en) Work support apparatus for information processing device
WO2024140916A1 (en) Internet of things permission matrix model and interaction method thereof
US20080046750A1 (en) Authentication method
KR101944698B1 (en) Method for auto login of single sign on using the login result of computer operating system, and computer readable recording medium applying the same
US20060129894A1 (en) Verifying system and verifying method
WO2018232443A1 (en) Method and system for identity proofing
US20220046128A1 (en) Method and system for remote interaction between at least one user and a human operator and between at least one user and at least one automated agent
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium
CN111541543A (en) Information verification method and device, computer equipment and storage medium
CN104113418A (en) Rule-configuration-based compound identity authentication method in ERP (enterprise resource planning) system
KR20030052194A (en) A system for user verification using biometric information, a method for registering certificates in the system and a user verification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination