TW201131517A - Access control system and computer system - Google Patents

Access control system and computer system Download PDF

Info

Publication number
TW201131517A
TW201131517A TW99106230A TW99106230A TW201131517A TW 201131517 A TW201131517 A TW 201131517A TW 99106230 A TW99106230 A TW 99106230A TW 99106230 A TW99106230 A TW 99106230A TW 201131517 A TW201131517 A TW 201131517A
Authority
TW
Taiwan
Prior art keywords
visitor
image
user
module
access control
Prior art date
Application number
TW99106230A
Other languages
Chinese (zh)
Other versions
TWI406190B (en
Inventor
Shao-Lan Wang
Hong-Ning Zeng
Xiao-Guang Yu
hong-jun Yue
Original Assignee
O2Micro Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by O2Micro Inc filed Critical O2Micro Inc
Priority to TW99106230A priority Critical patent/TWI406190B/en
Publication of TW201131517A publication Critical patent/TW201131517A/en
Application granted granted Critical
Publication of TWI406190B publication Critical patent/TWI406190B/en

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

A key for a user can be created according to at least one first image of the user. The key can be verified with at least one second image of the user captured after the key is created. A visitor can be authenticated according to a first measure of similarity between the key and at least one authentication image of the visitor. The visitor is authenticated as the user if the first measure of similarity is greater than a first predetermined threshold. The key can be refined with at least one most recent image of the visitor if the first measure of similarity is lower than the first predetermined threshold and the visitor is authenticated as the user based on a password.

Description

201131517 六、發明說明: 【發明所屬之技術領域】 本發明是關於一種存取控制系統,尤其是一種具有人 臉識別功能的存取控制系統以及方法。 【先前技術】 存取控制系統可用於控制實體設備或者電腦資訊系 統的存取許可權。在操作中’如果有訪客試圖進入上述實 體設備或者電腦資訊系統,存取控制系統將會驗證該訪客 是否具有權限進入上述設備或系統。如果存取控制系統確 認該訪客為註冊使用者,則將會允許訪客進入相應系統。 人臉識別技術可用於存取控制系統以驗證訪客身 份。存取控制系統透過捕捉訪客的影像並將該訪客影像與 已註冊使用者的人臉範本(template)相比較,以驗證訪 客身份。 然而,如果目前捕捉訪客影像的環境與先前建立人臉 範本的環境不一致,例如,目前環境的背光比先前環墳為 稍亮或稍暗,則存取控制系統可能無法正確驗證該訪客() 此外,在最初的註冊過程中,使用者在建立個人的人臉範 f時可能沒有按照舰要求㈣,例如,在取科做 决的姿勢或者表情。如此,在驗證過程中,存取 么 較長的時間以識別該使用者’或者完全無;識別該 【發明内容】 〇651'TW'CHSpeC+Cla^(nied-201〇〇3〇4).doc 4 201131517 本發明提供一種存取控制系統,一註冊模組,根據一 使用者的至少一個第一影像為該使用者建立一金鑰,並根 據在建立該金鑰之後所捕捉的該使用者的至少一個第二 影像驗證該金鑰;以及一認證模組,根據該金鑰和一訪客 的至少一個驗證影像間的一第一相似度驗證該訪客。 本發明還提供一種電腦系統,包括一處理器,以及一 耦合於該處理器的記憶體,其儲存複數個由該電腦系統執 行之指令,以執行一方法並控制一系統的存取,該方法包 • 括:根據目前捕捉的一使用者的至少一個第一影像建立該 使用者的一金鑰;根據在建立該金鑰之後捕捉的該使用者 的至少-個第二影像進而驗證該金鑰;以及根據該金瑜和 -訪客的至少-個驗證影像之間的:—第—相似度驗證該 訪客。 本發明還提供一種存取控制系統,包括—認證模組, 驗證一訪客是否有權限存取一系統;以及一警報模組,如 果》亥訪客被驗證為未被授權,將該訪客的至少一個影像發 送至一預設地址。 鲁 . 【實施方式】 以下將對本發明的實施例給出詳細的說明。雖然本發 明將結合實施例進行闡述,但應理解這並非意指將本發明 限定於這些實施例。相反地,本發明意在涵蓋由後附申請 專利範圍所界定的本發明精神和範圍内所定義的各種變 化、修改和均等物。 此外,在以下對本發明的詳細描述中,為了提供針對 0651 -TW-CH Spec+Claim(filed-20100304).doc 5 201131517 本餐明的元全的理解,提供了大量的具體細節 。然而,於 ^術領域中具有通常知識者將理解,沒有這些具體細 二1本發明同樣可以實施。在另外的—些實例中,對於大 豕去的方法、程序、元件和電路未作詳細描述,以便於 凸顯本發明之主旨。 根據本㈣的實施例’本發明提供—觀於控制系統 ^子取村權的存取控織統。有利的是,存取控制系統 在註冊=者的過裎中,可基於使用者的至少—個第一影 象(第〜像組)建立使用者的人臉範本金錄,並根據在 建金錄之後所捕捉到之該使用者的至少一個第二影像 (第-影像組)驗證先前所建立的人臉範本金錄。 此外,存取控制系統可以根據已註冊使用者的人臉範 本至、訪客的至少—個影像(驗證影像組)之間的相似 f =繁別4訪客的身份。並且,如果已註冊使用者的人臉 犯本金輪與訪客的驗證影像組之間的相似度在第一預設 臨=值和第二預設臨限值之間,麻據該訪客的驗證影像 組修正對應的人臉範本金鑰。 再者,如果該訪客無法透過驗證,存取 該使用者的至少一個影像(警報影像組)發送至二:: 地址(例如,網頁地址或電子郵件地址)。 圖1所*為根據本發明的—實施例的控制一系统12〇 的存取控⑽統_的方塊圖。當有新使用者註冊時,存 取控制系統將為較用者建立錄,例如,人臉範本 金錄,並且透齡較已註冊制者财在.體中的人臉 範本金錄和訪客的至少-㈣像(驗證影像組),以麟 0651-TW-CH Spec-fClaim(nied-20l00304).doc 6 201131517 該訪客的身份。(在以下文中’“使用者,,表示已經在存取控 制系統中註冊過且已被授權存取系統12〇的人,“訪客,,表 示試圖存取系統120的人;訪客可能是或不是合法使用 者;存取控制系統可用於驗證訪客是否為合法使用者)。 在一實施例中,存取控制系統100包括註冊模组1〇4, 用於註冊使用者並為該使用者建立人臉範本金鑰。照相模 組110 (例如,照相機)用於為該使用者捕捉至少一個影 像(影像組)。人臉範本金鑰可儲存於資料庫1〇8中。在 一實施例中,當該使用者之後試圖通過存取控制系統1〇〇 時,人臉範本金鑰即可用於驗證其身份。 存取控制系統還包括一個耦接於註冊模組1〇4的識別 模組106,其透過比較訪客的至少一個影像(驗證影像组) 與儲存於資料庫108中的人臉範本金錄,進而驗證該訪客 的身份。 此外,存取控制系統1〇〇還包括一個控制器112,用 於接收輸入指令,並根據輸入指令控制註冊模組1〇4和熾 別模組106。控制器112耦合於實體設備或電腦資訊系統 (例如,系統120),用以控制對系統12〇的存取。 當使用者輸入-個註冊指令至存取控制系統1〇〇時, 控制器112可指示註冊模組1〇4為該使用者建立一個人臉 範本金鑰。為回應來自控制器112的指示,註冊模組1〇4 將指示照相模組110捕捉使用者之至少一個第一影像(第 一影像組)。在接收到來自照相模組11〇的第一=像組之 後,註冊模組104即可提取第一影像組的特徵以建立該使 用者的人臉範本金鑰。建立人臉範本金鑰的技術係為熟知 0651 -TW-CH Spec+Claim(filed-20100304).d〇c 7 201131517 此技藝者所熟知的,故在此不再贅述。 ^ 在〜實施例中,在為使用者建立人臉範本金鑰之後, °主冊換紐 104將指示照相模組no捕捉該使用者至少一個 第一影像(第二影像組),並基於該第二影像組驗證先前 所建立的人臉範本金鑰。在一實施例中,註冊模組104將 指不識別模組1〇6驗證是否可基於先前所建立的人臉範本 金錄正確驗證該使用者。換言之’第二影像組可用於驗證 基於第一影像組建立的人臉範本金鑰是否合格。更確切地 η兒5主冊模組104將指示照相模組110捕捉使用者的第二 如像组,並將已建立的人臉範本金錄和第二影像組一起發 送至識別模組1〇6。之後,識別模組1〇6計算人臉範本金 鑰和第二影像組之間之相似度Sreg丨。如果相似度Sr印丨大 於個預设臨限值SPRE,則表示識別模組1 〇6可基於人臉 範本金鑰正確識別使用者,那麼人臉範本金鑰則被認為是 可接受的。否則,人臉範本金鑰被認為是不可接受的,註 冊核組104將基於上述步驟再次建立一個人臉範本金鑰。 如果人臉範本金鑰是可接受的,那麼識別模組將 通知註冊模組104將該人臉範本金鑰儲存於資料庫】 中。在一實施例中,註冊模組104將通知使用者輸入一個 岔碼。該密碼將和人臉範本金鑰一併儲存於資料庫1 中。因此’當訪客試圖通過存取控制系統1〇〇進入系統12〇 時’即可使用人臉範本金鑰驗證訪客身份。如果訪客無法 根據人臉範本金鑰成功通過驗證,那麼存取控制系統1〇〇 即可要求訪客輸入密碼,並透過比較訪客所輸入的密碼和 已儲存密碼,進而驗證使用者的身份。 0651 -TW-CH Spec+Claim(filed-20100304).doc 8 201131517 在另一實施例中’如果系統120包括一個登錄模組(例 如,歡迎模組,在圖1中未示出),那麼,可接受的人臉 範本金鑰將與系統12〇的登錄資訊(例如,一對使用者名 稱和密碼)綁在一起。更確切地說,在建立了一個可接受 的人臉範本金矯之後,註冊模組104將要求使用者輸入一 使用者名稱和一密碼。之後,註冊模組1〇4將檢查所輸入 的使用者名稱和密碼是否能與儲存於系統中的使用者 名稱和密碼中的一對相匹配。如果所輸入的使用者名稱和 密碼與系統120中中的某一對相匹配,註冊模組1〇4即可 將人臉範本金鑰和所匹配的使用者名稱與密碼一併儲存 於資料庫108中,以便以後使用。否則,註冊模組1〇4將 要求使用者再次輸入一對使用者名稱和密碼。如果使用者 所輸入之使用者名稱和密碼達到了預定次數,例如3次, 但每次所輸入的使用者名稱和密碼都無法與系統120中已 有的任何一對使用者名稱和密碼相匹配,那麼註冊模組 104不會將該人臉範本金鑰儲存於資料庫1〇8中,並且拒 絕該使用者的註冊請求。 如果人臉範本金鑰不被接受,那麼識別模組1〇6將通 知註冊模組104為使用者再次建立一個人臉範本金鑰。 有利的是,在建立了人臉範本金鑰之後,註冊模組1〇4 將採用使用者的另一個影像(例如,第二影像組)驗證所 建立的人臉範本金鑰是否為可接受。如果人臉範本金鑰和 第二影像組之間的相似度SREG1大於預設臨限值SPRE,則 表示該人臉範本金鍮可用於驗證相應使用者,那麼註冊模 組104則可將人臉範本金鑰儲存於資料庫1〇8中。否則, 0651 -TW-CH Spec+Claim(filed-20100304).doc 9 201131517 註冊模組104將重新建立人臉範本金鑰。 當-個訪客試圖進入系統!2〇時,該訪客將輸入一個 存取指令至存取控制系'统1〇〇。為回應該存取指令,控制 器112可指示識別模組106執行驗證該訪客的相關操作。 在-實施例中,識別模組i 〇 6可指示照相模組n 〇捕 捉訪客至少-個第-影像(第—驗證影像組)。當收到第 一驗證影像組之後,識別模組1〇6將從資料庫中提取 出-個人臉範本金输,並計算第—驗證影像組與該人臉範 本金鑰之間的相似度SAUT1。 在一實施例中,識別模組106擷取該第一驗證影像組 的特彳玫以計算相似度SAU ri。在一實施例中,如果相似度 Sauti大於一個第一預设g品限值sPRE1 (例如,大於85%、), 該訪客即可通過識別模組1〇6的驗證。因此,訪客可以進 入系統120。 在一實施例中,系統120可包括一個如前述的使用者 名稱和密碼的登錄模組。如果訪客能夠通過識別模組]〇6 的驗證,識別模組106即將與對應的人臉範本金輸一併儲 存的使用者名稱和密碼從資料庫108中取出,並將該使用 者名稱和密碼發送至控制器112。控制器in自動將該使 用者名稱和密碼輸入至系統120的登錄模組中。因此,訪 客不需手動登錄系統120。 如果捕捉該訪客的第一驗證影像組的目前環境與之 月ίι建立人臉範本金餘時的格境不· 致’例如,目前環境較 先前環境稍亮或稍暗,那麼即使該訪客是註冊使用者,相 似度SAUT丨也可能無法滿足第一預設臨限值sPRE1。在一·實 0651 -TW-CH Spec+CIaim(filed-20100304).doc 10 201131517 施例中,如果相似度sAUT1小於第一預設臨限值s_,但 是大於-個第二預設臨限值s_ (例如,在65%到85% 之間)’那麼識別模組106可根據其他資訊驗證該訪客的 身份。在一實施例中,識別模組1〇6可要求訪客輸入密碼。 如果輸入的密碼已被儲存於資料庫1〇8中,那麼該訪客將 通過識別模組106的驗證。由於訪客可被驗證為註冊使用 者但相似度sAUT1卻不能滿足第一預設臨限值SpREi的條 件,那麼目前捕捉第一驗證影像組的環境可能與先前建立 相應的人臉範本金鑰的環境不同。因此’識別模組1〇6將 基於該訪客的第一驗證影像組進一步定義相應的人臉範 本金鍮。如果輸入的密碼並非儲存於資料庫丨〇8中的密碼 中的任何一個’識別模組1〇6即禁止該訪客存取系統12〇。 在另一實施例中,系統12〇包括一個如前述之利用使 用者名稱和密碼的登錄模組,如果相似度Saul介於第一 預設臨限值s_和第二預設臨限值SpRE2之間,則識別模 組106可要求訪客輸入使用者名稱和密碼(而非如前述之 僅輸入密碼)。如果所輸入的使用者名稱和密碼為已儲存 於系統120中的任何一個’那麼訪客即可通過識別模組1〇6 的驗證,並且識別模組106進一步定義相應的人臉範本金 鑰。否則,識別模組106可禁止訪客存取系統12〇。 在另一實施例中,如果相似度Sauti介於第一預設臨 限值sPRE1和第二預設臨限值SpRE2之間,識別模組1〇6可 才曰示照相模組11 〇捕捉該訪客的至少一個第二影像(第二 驗證影像組)。如果第二驗證影像組和人臉範本金鑰間的 相似度SAUT2大於第一預設臨限值SpREi,訪客即可通過識 0651 -TW-CH Spec+Claim(filed-20100304).doc 11 201131517 別模組106的驗證。否則,識別模組106將指示照相模組 no再次捕捉該訪客的至少〆個第三影像(第三驗證影像 組)用於驗證使用者的身份。如果照像模組no捕捉該訪 客的驗證影像組已經達到了預定次數(例如’預定次數為 3次’分別捕捉該訪客的第一.、第二和第三驗證影像組), 但每次捕捉的驗證影像組和人臉範本金鍮間的相似度都 小於第一預設臨限值SPREI,那麼識別模組106將會要求訪 客僅輸入密碼或者同時輸入使用者名稱和密碼,之後的操 作先前已經描述過,於此不再重複描述。 如果相似度SAUT1小於第二預設臨限值SPRE2 1識別模 組106將從資料庫108中取出另一個人臉範本金鑰,並計 算訪客的第一驗證影像組和該另一個人臉範本金鑰間的 相似度。 如果訪客的第一驗證影像組和儲存於資料庫108中的 每個人臉範本金鑰間的相似度小於第二預設臨限值 Spre2 ’識別模組106將判定該訪客不是註冊使用者,並禁 止該使用者存取系統120。在其他的實施例中,識別模组 10 6也可以要求訪客輸入密碼或者同時輸入使用者名稱和 密碼’以驗證該使用者的身份。 有利的是,如果使用者的驗證影像組和人臉範本金鑰 間的相似度介於第一預設臨限值SpREi和第二預設臨限值 SPRE2之間,存取控制系統1〇〇將根據在驗證過程中所捕捉 的使用者影像(例如,制者的驗證影像組,或者最近捕 捉到的使用者f彡像)進-步定義該人臉範本金鑰。如此, 之後使用者在各種環境中都可以更容易地通過存取控制 0651 -TW-CH Spec+Claim(filed-20100304).doc 12 201131517 系統100的驗證,而提高存取控制系統10〇的性能。 在一些實施例中,控制器112是可選的,並且可以省 略。在這種情況下,可以將控制器112的功能整合於註冊 模組104和識別模組106内。因此,註冊模組1〇4和識別 模組10ό將接收輸入指令並執行相應的功能。 圖2所示為根據本發明的另一實施例的用於控制一系 統120的存取控制系統2〇〇的方塊圖。與圖1中標記相同 的元件具有相似的功能,為簡明起見,在此不重複描述。 Φ 圖2將結合圖1進行描述。 在一實施例中,存取控制系統200包括一個驗證平臺 202,用於接收輸入指令,並根據輸入指令控制功能模組 進而執行相應的功能。功能模組可包括註冊模組1〇4、識 別模組106和警報模組210,但不以此為限。驗證平臺2〇2 可控制註冊模組1〇4以註冊使用者,並且控制識別模組1〇6 驗證訪客身份。如果訪客不能成功通過驗證’則驗證平臺 202可進一步控制警報模組21〇將該訪客的至少一個影像 (警報景彡像組)發送至一個預設地址(例如,網路地址或 琴 者電子郵件地址)。 在一實施例中’如果識別模組1〇6確認該訪客不是註 冊使用者,識別模組106即可將一個拒絕訊息發送至驗證 平臺202。為回應該拒絕訊息,驗證平臺202將指示警報 模組210發送該訪客的至少一個影像(警報影像組)至一 個預設地址(例如’電子郵件地址)。在一實施例中,為 回應该指示,警報模組21〇指示照相模組no為該訪客捕 捉預設數量的影像(警報影像組),並將捕捉到之警報影 0651 -TW-CH Spec+Claim(filed-20100304).doi 201131517 像組發送至預設地址。 在一實施例中’所需捕捉影像的預設數量可由一個津禹 合於警報模組210的設定模組212設定。管理者可以輪乂 一個用於編輯該預設數量的數量設定指令至驗證^臺 202。為回應該數量設定指令,驗證平臺2〇2相應地指= 設定模組212編輯該預設數量。 ' 在一實施例中,警報模組210可以電子郵件的方式經 由電子郵件伺服器214發送訪客的警報影像組至—個預= 電子郵件地址。耦合於警報模組21〇的電子郵件伺服器 接收警報模組210所發出的訪客的警報影像組和預設電子 郵件地址,並將一包含訪客警報影像組的電子郵件J 預設電子郵件地址。 ' 設定模組212還可以用於致能和除能警報模組, 並且設定警報模組210中的預設地址。在一實施例中,如 果一個使用者,例如,一個管理者,試圖設定或重設警報 模組210中的預設地址,例如,電子郵件地址,該管^者 可輸入一個地址設定指令以及一個預設置的地址至驗證 平臺202。之後,驗證平臺2〇2指示設定模組212設定= 重設警報模組210中的預設地址。此外,設定模組212還 可將多個輸入地址編輯至警報模組21〇中。如此,警報模 組210即可將未翻訪客特報影像組發送至多個地址。 為了致能警報模組21〇,管理者可以輸入一個警報致 能指令至驗證平臺202。因此,驗證平| 2〇2可指示設定 杈組212致能警報模組21〇。類似地,為除能尊報模电 21〇’管理者可輸入-個警報除能指令至驗證平臺2〇2。因 0651 -TW-CH Spec+Claim(filed-20100304).doc 14 201131517 此,驗證平臺202即可指示設定模組212除能警報模組 210。 有利的是,如果有人無法成功通過存取控制系統2〇〇 的驗證’存取控制系統200可捕捉此人的至少一個影像(警 報影像組)並將該警報影像組發送至一個預設地址。警報 影像組可顯示誰曾試圖進入系統120但未能通過系統驗 證。如此,如果小偷偷竊了一個安裝有系統12〇的設備, 並且試圖啟動該設備,欲經由存取控制系統200進入系統 120而使用所偷竊的設備,未被授權的小偷將無法成功通 過存取控制系統200的認證。此時警報模組21〇即可將捕 捉到的小偷的警報影像組發送至該設備的實際擁有者,或 者發送至某個中央設備或者可代表實際擁有者的某個代 理者。這樣’接收到的警報影像組即可幫助識別小偷。 圖3所示為以根據本發明的一實施例,如圖丨所示的 存取控制系統100所執行的操作流程圖3〇〇。圖3將結合 圖1進行描述。 在步驟302中,使用者輸入一個註冊指令至存取控制 系統100。為回應該註冊指令,控制器112指示註冊模組 104註冊該使用者。在步驟3〇4中,註冊模組1〇4可使用 目前捕捉的該使用者的至少一個第一影像(第一影像組) 為該使用者建立一個金鑰,例如,人臉範本金鑰。在步驟 306中,註冊模組1〇4可根據在建立金鑰之後所捕捉的該 使用者的至少-個第二影像(第二贿組)驗證先前所建 立的金鑰是否合格。在一實施例中,註冊模組1〇4可指示 識別模組106檢查是否能夠透過比較先前所建立的金鑰和 0651 -TW-CH Spec+CIaim(fiIed-20100304).doc 15 201131517 第二影像組進而正確驗證該使用者的身份。 统二=二訪客輸入—個存取指令至存取控制系 定Λ 指令,控制器112指示識別模組 驗證該份。在步驟⑽中,識別模組Η)6計算先 前所建^的=錄和該訪客的至少„個影像(驗證影像組) 之_:=更確切地說,識別模組]〇6透過擷取該訪 客的,¼ as·〜像、.且的特徵以計算相似度。 在步驟312中,如果相似度大於一個第一臨 S P R E丨’訪客將通過識別模組1〇 6的驗證(步驟3⑷。因此, 訪客即可通過存取控㈣統⑽進人系統12G。在步驟316 中,如果相似度小於第一預設臨限值,但大於一個第 二預設臨限值SPRE2’則識別模組i〇6將採用該訪客最近的 影像進一步重新定義此金鑰(步驟318)。此外,如果相似 度小於第一預δ又g品限值SPRE?,識別模組1 〇6將禁止訪客存 取系統120 (步驟320)。 圖4所示為根據本發明的一實施例,以如圖】所示的 存取控制糸統】00往冊使用者的操作流程圖4〇〇。圖4將 結合圊1進行描述。 在步驟402中’使用者輸入註冊指令至存取控制系統 100。在步驟404中,註冊模組1〇4指示照相模組丨1〇捕 捉使用者的至少一個第一影像(第一影像組)。在步驟406 中’註冊模組104擷取第一影像組的特徵。在步驟408中, 註冊模組104基於所擷取到的第一影像組的特徵建立人臉 範本金瑜。 在步驟410中,註冊模組104將指示照相模組110捕 0651-TW-CH Spec+Claim(filed-20100304).doc 16 201131517 捉使用者的至少一個第二影像(第二影像組)。之後,註 冊模組ι〇4連同先前所建立的人臉範本金鍮以及使用者的 第二影像組一併發送至識別模組1〇6。在步驟412中,識 別模組106擷取第二影像組的特徵。在步驟414中,識別 模組106 I於所擷取的第二影像組的特徵計算先前所建立 的人臉範本金鑰和第二影像組間的相似度。 在步驟416中,如果相似度大於一預設臨限值$赃, 則表示人臉範本金鑰對於識別模組1〇6日後正確驗證該使 馨 用者為可接受’人臉範本金鑰即可被存入資料庫1〇8中(步 驟 418)。 在步驟416中’如果相似度不大於預設臨限值心找, 人臉範本金鑰將被視作不可接受的。流程圖4〇〇將返回步 驟404,為使用者再次建立另一個人臉範本金鑰。 圖5所示為根據本發明的一實施例,以如圖j所示的 存取控制系統100驗證訪客的流程圖500。圖5將結合圖 1進行描述。 φ 在步驟502中,訪客輸入一個奏取指令至存取控制系 統100。在步驟504中,識別模組106指示照相模組11〇 捕捉訪客的至少一個影像(驗證影像組 > 在步驟5〇6中, 識別模組106從資料庫i〇8中取出一人臉範本金鑰。在步 驟508中,識別模組1〇6計算該人臉範本金鑰與訪客的驗 證影像組之間的相似度。在步驟51〇中,如果相似度大於 一第一預没8品限值SPRE1,識別模組1〇6將允許該訪客存取 系統120 (步驟512)。 在步驟514中,如果相似度小於第一預設臨限值 0651 -TW-CH Spec+Claim(filed-20100304).doc 17 201131517 但大於一個第二預設臨限值SpRE2,識別模纽〗、 其他資訊,例如,密碼或者使用者名稱和密 刁1根據 訪客的身份。在步驟518中,如果該訪客已被垆\驗證該 過存取控制系統100的驗證,識別模組1〇6 g σ又格可通 存取系統120 ,並採用該訪客最近的影像進訪f 的人臉範本金鑰(步驟520)。在步驟518中,如,義目= 有通過驗證,識別模組1Q6將禁止訪客存客^ 驟 522)。 120 C 步 回到步驟5M,如果相似度小於第二預設臨限值 Spre2,那麼在步驟524中,如果訪客的驗證影像組與儲存 於資料庫1〇8中的所有人臉範本金鑰都不匹配(所有的人 臉本金鑰和該訪客的驗證影像組間的相似度都小於第 ,預設臨限值SPRE2) ’識職組1〇6即可禁止該訪客存取 系統120 (步驟522)。否則,流程圖返回步驟5〇6 1並從 資料庫108中提取另一個人臉範本金鑰。 圖6所示為以根據本發明的另—實施例,如圖)所干 的存取控制系統200的操作流程圖_。與圖3、圖4及 圖5類似的步驟不再描述。圖6將結合圖2進行描 在步驟602巾,存取控制系、統200開始工作。在步驟 604中,存取控制系'統200收到來自訪客的存取指令。在 步驟606中’驗證平臺202指示識別模組1〇6驗證訪客的 身份。如果識別模組1G6確認訪客是註冊使用者中的—個 (步驟存取控制系統20〇將允許訪客存取系统⑽ (步驟6]〇)。否則,在步驟612中,存取控制系統將 禁止訪客存取系統120。此外,在步驟614中,驗證平臺 0651 -TW-CH Spec+C!aim(filed-20100304).doc 201131517 一個影像(警報影 202指示警報模組21〇將該訪客的至少 像組)發送至預設地址。 在貫施例中,警報模組210指示照相模組11〇捕捉 訪客一組預設數量的影像(警報影像組),並將訪客的警 報影像組發送至預設地址(例如,網路或電子郵件地址)。201131517 VI. Description of the Invention: [Technical Field] The present invention relates to an access control system, and more particularly to an access control system and method having a face recognition function. [Prior Art] An access control system can be used to control access permissions of a physical device or a computer information system. In operation 'If a visitor attempts to enter the above-mentioned physical device or computer information system, the access control system will verify that the visitor has access to the above device or system. If the access control system confirms that the visitor is a registered user, the visitor will be allowed to enter the corresponding system. Face recognition technology can be used to access the control system to verify the identity of the visitor. The access control system verifies the identity of the visitor by capturing the image of the visitor and comparing the visitor image to a template of the registered user's face. However, if the current environment for capturing visitor images is inconsistent with the environment in which the face template was previously created, for example, the backlight of the current environment is slightly brighter or slightly darker than the previous ring, the access control system may not be able to properly verify the visitor (). In the initial registration process, the user may not follow the ship requirements (4) when establishing a personal face f, for example, in a posture or expression. In this way, during the verification process, access for a long time to identify the user's or not at all; identify the [invention] 〇651'TW'CHSpeC+Cla^(nied-201〇〇3〇4). Doc 4 201131517 The present invention provides an access control system, a registration module, which establishes a key for the user according to at least one first image of a user, and according to the user captured after the key is established At least one second image verifies the key; and an authentication module validates the visitor based on a first similarity between the key and at least one verification image of a visitor. The invention also provides a computer system comprising a processor, and a memory coupled to the processor, storing a plurality of instructions executed by the computer system to perform a method and controlling access to a system, the method The package includes: establishing a key of the user according to at least one first image of a currently captured user; and verifying the key according to at least one second image of the user captured after the key is established And verifying the visitor based on the:-first similarity between the at least one verification image of the Jinyu and the visitor. The present invention also provides an access control system comprising: an authentication module for verifying whether a visitor has access to a system; and an alert module, if the guest is verified as not authorized, at least one of the visitor The image is sent to a preset address. [Embodiment] Hereinafter, a detailed description will be given of an embodiment of the present invention. While the invention will be described in conjunction with the embodiments, it is understood that the invention is not limited to the embodiments. Rather, the invention is to cover various modifications, modifications and equivalents as defined in the spirit and scope of the invention as defined by the appended claims. Further, in the following detailed description of the present invention, a large number of specific details are provided in order to provide an understanding of the details of the 0651-TW-CH Spec+Claim(filed-20100304).doc 5 201131517. However, those of ordinary skill in the art will understand that the invention may be practiced without these specific details. In other instances, the methods, procedures, components, and circuits of the present invention have not been described in detail in order to facilitate the invention. According to the embodiment of the present invention (4), the present invention provides an access control system for controlling the system. Advantageously, the access control system may establish a user's face model book based on at least one first image (the image group) of the user in the registration of the person, and according to the At least one second image (first image group) of the user captured after recording is verified to the previously created face model book. In addition, the access control system can be based on the similarity between the registered user's face model and the visitor's at least one image (verified image group) f = the identity of the 4 visitors. And, if the similarity between the registered user's face and the verified image group of the visitor is between the first preset value=the second preset threshold value, the verified image of the visitor The group corrects the corresponding face template key. Furthermore, if the visitor cannot pass the verification, at least one image (alarm image group) accessing the user is sent to the second:: address (for example, a web address or an email address). 1 is a block diagram of an access control (10) system for controlling a system 12A according to an embodiment of the present invention. When a new user registers, the access control system will create a record for the user. For example, the face model is recorded, and the face is more than the registered person. At least - (four) image (verified image group), with Lin 0651-TW-CH Spec-fClaim (nied-20l00304).doc 6 201131517 The identity of the visitor. (In the following 'user', means a person who has registered in the access control system and has been authorized to access the system 12, "Visitor," means the person attempting to access the system 120; the visitor may or may not be A legitimate user; the access control system can be used to verify that the visitor is a legitimate user). In one embodiment, the access control system 100 includes a registration module 1-4 for registering a user and establishing a face template key for the user. A camera module 110 (e.g., a camera) is used to capture at least one image (group of images) for the user. The face template key can be stored in the database 1〇8. In one embodiment, the face template key can be used to verify its identity when the user subsequently attempts to access the control system. The access control system further includes an identification module 106 coupled to the registration module 1-4, which compares at least one image of the visitor (verified image group) with the face model registered in the database 108, and further Verify the identity of the visitor. In addition, the access control system 1A further includes a controller 112 for receiving input commands and controlling the registration module 1〇4 and the spur module 106 in accordance with the input commands. Controller 112 is coupled to a physical device or computer information system (e.g., system 120) for controlling access to system 12A. When the user inputs a registration command to the access control system 1 , the controller 112 can instruct the registration module 1 to establish a face template key for the user. In response to an indication from controller 112, registration module 1-4 will instruct camera module 110 to capture at least one first image (first image group) of the user. Upon receiving the first = image group from the camera module 11, the registration module 104 can extract the features of the first image group to establish the user's face template key. The technique for establishing a face template key is well known to 0651-TW-CH Spec+Claim(filed-20100304).d〇c 7 201131517, which is well known to those skilled in the art and therefore will not be described again. ^ In the embodiment, after the face template key is created for the user, the main book change button 104 will instruct the camera module no to capture at least one first image (second image group) of the user, and based on the The second image group verifies the previously created face template key. In one embodiment, the registration module 104 verifies that the unidentified module 1〇6 verifies that the user can be properly verified based on the previously created face model. In other words, the second image group can be used to verify whether the face template key established based on the first image group is qualified. More specifically, the VL 5 master module 104 will instruct the camera module 110 to capture the second avatar of the user, and send the established face model book and the second image group to the recognition module 1〇. 6. Thereafter, the recognition module 1〇6 calculates the similarity Sreg丨 between the face template key and the second image group. If the similarity Sr is greater than the preset threshold SPRE, it means that the recognition module 1 〇6 can correctly identify the user based on the face template key, and the face template key is considered acceptable. Otherwise, the face template key is considered unacceptable, and the registration core group 104 will again establish a face template key based on the above steps. If the face template key is acceptable, the recognition module will notify the registration module 104 to store the face template key in the database. In an embodiment, the registration module 104 will notify the user to enter a weight. This password will be stored in the database 1 along with the face template key. Thus, when a visitor attempts to enter the system 12 via the access control system 1, the face template key can be used to verify the identity of the visitor. If the visitor cannot successfully pass the verification based on the face template key, the access control system 1〇〇 can request the visitor to enter the password and verify the identity of the user by comparing the password entered by the visitor with the stored password. 0651 -TW-CH Spec+Claim(filed-20100304).doc 8 201131517 In another embodiment 'If system 120 includes a login module (eg, a welcome module, not shown in FIG. 1), then The acceptable face template key will be tied to the system's 12-inch login information (for example, a pair of usernames and passwords). More specifically, after an acceptable face model correction is established, the registration module 104 will ask the user to enter a username and a password. The registration module 1〇4 will then check if the entered username and password match a pair of usernames and passwords stored in the system. If the entered username and password match one of the pairs in the system 120, the registration module 1〇4 can store the face template key and the matching username and password in the database. 108 for later use. Otherwise, the registration module 1〇4 will ask the user to enter a pair of usernames and passwords again. If the user name and password entered by the user have reached the predetermined number of times, for example, 3 times, the user name and password entered each time cannot match any pair of user names and passwords already existing in the system 120. The registration module 104 does not store the face template key in the database 1 , 8 and rejects the user's registration request. If the face template key is not accepted, then the recognition module 1 6 will notify the registration module 104 to create a face template key for the user again. Advantageously, after the face template key is established, the registration module 1〇4 will verify that the established face template key is acceptable using another image of the user (eg, the second image group). If the similarity SREG1 between the face template key and the second image group is greater than the preset threshold SPRE, it means that the face template can be used to verify the corresponding user, and the registration module 104 can face the face. The template key is stored in the database 1〇8. Otherwise, 0651 -TW-CH Spec+Claim(filed-20100304).doc 9 201131517 The registration module 104 will re-establish the face template key. When - a visitor tried to enter the system! At 2 o'clock, the visitor will enter an access command to the access control system. To respond to the access command, the controller 112 can instruct the identification module 106 to perform an associated operation to verify the visitor. In an embodiment, the identification module i 〇 6 may instruct the camera module n to capture at least one of the first images (the first verification image group). After receiving the first verification image group, the recognition module 1〇6 extracts the personal face model principal input from the database, and calculates the similarity SAUT1 between the first verification image group and the face template key. . In an embodiment, the recognition module 106 captures the characteristics of the first verification image group to calculate the similarity SAU ri. In an embodiment, if the similarity Sauti is greater than a first predetermined g-product limit sPRE1 (eg, greater than 85%), the visitor may pass the verification of the identification module 1〇6. Therefore, the visitor can enter the system 120. In one embodiment, system 120 can include a login module such as the aforementioned username and password. If the visitor is able to pass the verification of the recognition module 〇6, the identification module 106 will immediately retrieve the user name and password stored with the corresponding face model, and the user name and password will be retrieved from the database 108. Send to controller 112. The controller in automatically inputs the user name and password into the login module of system 120. Therefore, the visitor does not need to manually log into the system 120. If the current environment of the first verified image group of the visitor is captured, the context of the face model is not satisfied. For example, if the current environment is slightly brighter or darker than the previous environment, then even if the visitor is registered The user, the similarity SAUT丨 may also fail to meet the first preset threshold sPRE1. In the example of the actual 0651 - TW-CH Spec + CIaim (filed-20100304).doc 10 201131517, if the similarity sAUT1 is smaller than the first preset threshold s_, but greater than - the second preset threshold S_ (eg, between 65% and 85%) 'The identification module 106 can then verify the identity of the visitor based on other information. In an embodiment, the identification module 1-6 may require the visitor to enter a password. If the entered password has been stored in the database 1, 8, the visitor will pass the verification of the identification module 106. Since the visitor can be verified as a registered user but the similarity sAUT1 cannot satisfy the condition of the first preset threshold SpREi, the environment in which the first verification image group is currently captured may be the same as the environment in which the corresponding face template key was previously established. different. Therefore, the 'identification module 1〇6' further defines a corresponding face model template based on the first verification image group of the visitor. If the entered password is not one of the passwords stored in the library ’ 8, the identification module 〇 6 prohibits the guest access system 12 〇. In another embodiment, the system 12 includes a login module using the username and password as described above, if the similarity Saul is between the first preset threshold s_ and the second preset threshold SpRE2 Between the, the identification module 106 can ask the visitor to enter the username and password (instead of entering the password as described above). If the entered username and password are any ones stored in the system 120 then the visitor can pass the verification of the recognition module 1〇6 and the identification module 106 further defines the corresponding face template key. Otherwise, the identification module 106 can disable the guest access system 12〇. In another embodiment, if the similarity Sauti is between the first preset threshold sPRE1 and the second preset threshold SpRE2, the identification module 1〇6 can display the camera module 11 to capture the At least one second image of the visitor (second verification image set). If the similarity SAUT2 between the second verification image group and the face template key is greater than the first preset threshold SpREi, the visitor can pass the identification of 0651-TW-CH Spec+Claim(filed-20100304).doc 11 201131517 Verification of module 106. Otherwise, the recognition module 106 will instruct the camera module no to capture at least one third image (third verification image group) of the visitor again to verify the identity of the user. If the photo module no captures the visitor's verification image group has reached a predetermined number of times (for example, 'the predetermined number of times is 'three times' respectively captures the visitor's first, second and third verification image groups), but each capture The similarity between the verification image group and the face model is less than the first preset threshold SPREI, then the identification module 106 will ask the visitor to enter only the password or enter the user name and password at the same time, after the operation is previously It has been described, and the description will not be repeated here. If the similarity SAUT1 is smaller than the second preset threshold SPRE2, the identification module 106 will take another face template key from the database 108, and calculate the first verification image group of the visitor and the other face template key. Similarity. If the similarity between the first verification image group of the visitor and each face template key stored in the database 108 is less than the second preset threshold Spre2, the identification module 106 will determine that the visitor is not a registered user, and The user is prohibited from accessing the system 120. In other embodiments, the identification module 106 may also require the visitor to enter a password or simultaneously enter a username and password ' to verify the identity of the user. Advantageously, if the similarity between the user's verification image set and the face template key is between the first preset threshold SpREi and the second preset threshold SPRE2, the access control system 1〇〇 The face template key will be further defined based on the user image captured during the verification process (eg, the manufacturer's verification image set, or the most recently captured user image). In this way, the user can more easily improve the performance of the access control system 10 by accessing the control of the 0651-TW-CH Spec+Claim(filed-20100304).doc 12 201131517 system 100 in various environments. . In some embodiments, controller 112 is optional and may be omitted. In this case, the functions of the controller 112 can be integrated into the registration module 104 and the identification module 106. Therefore, the registration module 1〇4 and the identification module 10ό will receive input commands and perform corresponding functions. 2 is a block diagram of an access control system 2 for controlling a system 120 in accordance with another embodiment of the present invention. The same elements as those in Fig. 1 have similar functions, and the description will not be repeated here for the sake of brevity. Φ Figure 2 will be described in conjunction with Figure 1. In one embodiment, the access control system 200 includes a verification platform 202 for receiving input commands and controlling the functional modules in accordance with the input instructions to perform the corresponding functions. The function module may include the registration module 1-4, the identification module 106, and the alarm module 210, but is not limited thereto. The verification platform 2〇2 can control the registration module 1〇4 to register the user, and the control identification module 1〇6 verifies the identity of the visitor. If the visitor fails to pass the verification, then the verification platform 202 can further control the alarm module 21 to send at least one image of the visitor (alarm scene group) to a preset address (eg, a web address or an email address) address). In one embodiment, if the identification module 1〇6 confirms that the visitor is not a registered user, the identification module 106 can send a rejection message to the verification platform 202. In response to the rejection message, the verification platform 202 will instruct the alert module 210 to send at least one image (alarm image set) of the visitor to a predetermined address (e.g., 'email address'). In an embodiment, in response to the indication, the alarm module 21 indicates that the camera module no captures a preset number of images (alarm image groups) for the visitor, and captures the alarm shadows 0651-TW-CH Spec+ Claim(filed-20100304).doi 201131517 The image group is sent to the default address. In one embodiment, the predetermined number of desired captured images may be set by a setting module 212 that is coupled to the alarm module 210. The manager can rim a quantity setting command for editing the preset number to the verification station 202. In order to respond to the quantity setting command, the verification platform 2〇2 correspondingly refers to the setting module 212 to edit the preset quantity. In an embodiment, the alert module 210 can send the alert image group of the visitor to the pre-email address via the email server 214 via email. The email server coupled to the alarm module 21 receives the alarm image group of the visitor issued by the alarm module 210 and the preset email address, and an email address J containing the guest alarm image group is preset. The setting module 212 can also be used to enable and disable the alarm module and set a preset address in the alarm module 210. In an embodiment, if a user, for example, a manager, attempts to set or reset a preset address in the alarm module 210, for example, an email address, the controller can input an address setting command and a The pre-set address is to the verification platform 202. Thereafter, the verification platform 2〇2 instructs the setting module 212 to set=reset the preset address in the alarm module 210. In addition, the setting module 212 can also edit a plurality of input addresses into the alarm module 21A. In this manner, the alert module 210 can send the unturned guest telegram image set to multiple addresses. To enable the alarm module 21, the administrator can enter an alarm enable command to the verification platform 202. Therefore, the verification level | 2〇2 can indicate that the setting group 212 enables the alarm module 21〇. Similarly, the administrator can input an alarm disable command to the verification platform 2〇2. Since the calibration platform 202 can instruct the setting module 212 to disable the alarm module 210, 0651 - TW-CH Spec+Claim(filed-20100304).doc 14 201131517 Advantageously, if someone cannot successfully pass the verification of the access control system 2, the access control system 200 can capture at least one image of the person (alarm image group) and send the set of alarm images to a predetermined address. Alarm The image group shows who tried to enter system 120 but failed to pass the system verification. Thus, if the thief steals a device with the system 12〇 installed and attempts to activate the device, and the device is to be accessed via the access control system 200 and the stolen device is used, the unauthorized thief will not be able to successfully pass the access control. Authentication of system 200. At this point, the alert module 21 can send the captured thief's alert image set to the actual owner of the device, or to a central device or an agent that can represent the actual owner. Such a 'received alert image set can help identify the thief. Figure 3 is a flow chart showing the operation performed by the access control system 100 as shown in Figure 根据 in accordance with an embodiment of the present invention. Figure 3 will be described in conjunction with Figure 1. In step 302, the user enters a registration command to access control system 100. In response to the registration command, the controller 112 instructs the registration module 104 to register the user. In step 〇4, the registration module 1-4 can use the currently captured at least one first image (first image group) of the user to create a key for the user, for example, a face template key. In step 306, the registration module 1-4 may verify whether the previously established key is qualified based on at least one second image (second bribe group) of the user captured after the key is established. In an embodiment, the registration module 1-4 can instruct the identification module 106 to check whether the second image can be compared by comparing the previously established key with the 0651-TW-CH Spec+CIaim(fiIed-20100304).doc 15 201131517 second image. The group then correctly verifies the identity of the user. The system 2 inputs the access command to the access control system, and the controller 112 instructs the identification module to verify the copy. In step (10), the recognition module Η6 calculates the _image of the previously created 和 and the at least one image of the visitor (verified image group)::=more precisely, the recognition module 〇6 The visitor's characteristics are calculated to calculate the similarity. In step 312, if the similarity is greater than a first pre-SPRE, the visitor will pass the verification of the recognition module 1〇6 (step 3(4). Therefore, the visitor can enter the system 12G through the access control (4) system (10). In step 316, if the similarity is less than the first preset threshold, but greater than a second preset threshold SPRE2', the identification module I〇6 will further redefine the key using the visitor's most recent image (step 318). Furthermore, if the similarity is less than the first pre-δ and g-product limit SPRE?, the identification module 1 〇6 will disable guest access. System 120 (step 320). Figure 4 is a flow chart showing the operation of the user of the access control system shown in Fig. 4 according to an embodiment of the present invention. The description is made in step 1. In step 402, the user inputs a registration command to the access control system 100. In step 404, the registration module 1〇4 instructs the camera module to capture at least one first image (first image group) of the user. In step 406, the registration module 104 captures the first image group. In step 408, the registration module 104 establishes a face model based on the captured characteristics of the first image group. In step 410, the registration module 104 will instruct the camera module 110 to capture 0651-TW- CH Spec+Claim(filed-20100304).doc 16 201131517 Capture at least one second image (second image group) of the user. After that, the registration module ι〇4 together with the previously created face model key and user The second image group is sent to the identification module 1〇6. In step 412, the identification module 106 captures the features of the second image group. In step 414, the identification module 106I is captured. The feature of the second image group calculates the similarity between the previously created face template key and the second image group. In step 416, if the similarity is greater than a preset threshold $赃, the face template key is represented. For the identification module, after 1〇6, it is correct to verify that the user is ok. Accepting the 'face template key' can be stored in the database 1〇8 (step 418). In step 416, 'if the similarity is not greater than the preset threshold, the face template key will be treated as Unacceptable. Flowchart 4〇〇 returns to step 404 to recreate another face template key for the user. Figure 5 shows an access control system as shown in Figure j, in accordance with an embodiment of the present invention. 100 validates the visitor's flow chart 500. Figure 5 will be described in conjunction with Figure 1. φ In step 502, the visitor enters a play command to the access control system 100. In step 504, the recognition module 106 instructs the camera module 11 to capture at least one image of the visitor (verification image group). In step 5〇6, the recognition module 106 takes a face sample from the database i〇8. In step 508, the recognition module 1〇6 calculates the similarity between the face template key and the visitor's verification image group. In step 51, if the similarity is greater than a first pre-emptive 8 limit The value SPRE1, the identification module 1〇6 will allow the guest to access the system 120 (step 512). In step 514, if the similarity is less than the first preset threshold 0651 - TW-CH Spec + Claim (filed-20100304) ).doc 17 201131517 but greater than a second preset threshold SpRE2, identification module, other information, for example, password or username and password 1 according to the identity of the visitor. In step 518, if the visitor has The authentication/certification of the access control system 100 is verified, the identification module 1〇6 g σ is again accessible to the system 120, and the face template key of the visitor f of the visitor's recent image is used (step 520). In step 518, for example, the meaning = verification, identification module 1Q6 will prohibit visitors from logging in. 522). Step 120C returns to step 5M. If the similarity is less than the second preset threshold Spre2, then in step 524, if the visitor's verification image group and all the face model keys stored in the database 1〇8 are Mismatch (all similarities between the face key and the verified image group of the visitor are less than the first, preset threshold SPRE2) 'The job group 1〇6 can disable the guest access system 120 (step 522). Otherwise, the flowchart returns to step 5〇6 1 and another face model key is extracted from the database 108. Figure 6 is a flow chart showing the operation of the access control system 200 in accordance with another embodiment of the present invention. Steps similar to those of Figures 3, 4 and 5 are not described again. Figure 6 will be described in conjunction with Figure 2, in step 602, the access control system, system 200 begins to work. In step 604, the access control system 200 receives an access command from the visitor. In step 606, the verification platform 202 instructs the identification module 1 to verify the identity of the visitor. If the identification module 1G6 confirms that the visitor is one of the registered users (step access control system 20 will allow the guest to access the system (10) (step 6) 。). Otherwise, in step 612, the access control system will disable The guest accesses the system 120. Further, in step 614, the verification platform 0651-TW-CH Spec+C!aim(filed-20100304).doc 201131517 an image (the alarm shadow 202 indicates that the alarm module 21 〇 the visitor's at least The image module is sent to the preset address. In the embodiment, the alarm module 210 instructs the camera module 11 to capture a predetermined number of images (alarm image groups) of the visitor and send the visitor's alarm image group to the pre-set Set an address (for example, a web or email address).

在一實施例中,警報模組210可將訪客的警報影像組 以電子郵件的方式經由電子郵件伺服器214發送至預設電 子郵件地址。電子郵件伺服器214接收由警報模組21〇發 送的訪客警報影像組和預設電子郵件地址,並將附有訪客 的警報影像組的電子郵件發送至預設電子郵件地址。 在步驟616中,如果一個使用者,例如,管理者,將 具有一地址的一個地址設定指令輸入至驗證平臺2〇2,驗 證平臺202將指示設定模組212設定或重設警報模組21〇 的預設地址為所輸入之地址(步驟618)。此外,設定模組 212也可以將多個輸入地址編輯入警報模組21〇中。 此外,設定模組212同樣可以致能或除能警報模組 210。如果設定模組212除能警報模組210,一旦存取控制 系統200碟認訪客不是註冊使用者,警報模組21〇將不會 發送該訪客的警報影像組至預設地址。 綜上所述,本發明提供了 一種用於控制系統存取的存 取控制系統及方法。在一實施例中,存取控制系統根據目 前所捕捉的註冊使用者的至少一個第一影像(第一影像 組)為使用者建立一個人臉範本金錄,並且透過計算人臉 範本金錄和在人臉範本金錄建立之後所捕捉的註冊使用 者的至少一個第二影像(第二影像組)之間的相似度,進 0651 -TW-CH Spec+Claim(filed-20100304).doc 19 201131517 而驗證先前所建立的人臉範本金鑰是否合格。如果相似度 低於一個預設臨限值’人臉範本金鑰將被視為是不可接受 的’並將重複上述操作直到建立出一個合格的人臉範本金 鑰。 存取控制系統可以透過計算已註冊使用者的人臉範 本金鑰與訪客的至少一個影像(驗證影像組)之間的相似 度判斷訪客是否為註冊使用者。如果相似度大於一個第一 預設臨限值,訪客將被驗證為註冊使用者。如果相似度低 於第一預設臨限值但高於一個第二預設臨限值,存取控制 系統將基於其他資訊,例如,密碼或者使用者名稱和密碼 對’驗證訪客的身份。如果基於密碼或者使用者名稱和密 碼對可驗證該訪客是註冊使用者’即根據該訪客最近的影 像進一步定義人臉範本金鑰。 如果相似度低於第二預設臨限值,或者訪客輸入了錯 誤的密碼或使用者名稱和密碼對,存取控制系統將確認該 訪客不是註冊使用者,並禁止該訪客存取系統。此外,如 果訪客不是註冊使用者’存取控制系統可將該訪客的至少 一個影像(警報影像組)發送至一個預設地址。 上文具體實施方式和附圖僅為本發明之常用實施 例。顯然’在不脫離後附申請專利範圍所界定的本發明精 神和保護範圍的前提下可以有各種增補、修改和替換。本 技術領域中具有通常知識者應該理解,本發明在實際應用 中可根據具體的環境和工作要求在不背離發明準則的前 提下在形式'結構、佈局、比例'材料、元素、元件及其 它方面有所變化。因此,在此彼露之實施例僅用於說明而 0651-TW-CH Spec+Claim(flled-20100304).doc 20 201131517 非限制’本發明之範圍由後附申請專利範圍及其合法均等 物界定,而不限於先前之描述。 【圖式簡單說明】 以下結合附圖和具體實施例對本發明的技術方法進 行詳細的描述,以使本發明的特徵和優點更為明顯。其中: 圖1所示為根據本發明的一實施例的存取控制系、 方塊圖;In one embodiment, the alert module 210 can email the visitor's alert image set via email server 214 to a predetermined email address. The email server 214 receives the guest alert image group sent by the alert module 21 and the preset email address, and sends an email with the alert image group of the visitor to the preset email address. In step 616, if a user, for example, an administrator, inputs an address setting command having an address to the verification platform 2〇2, the verification platform 202 will instruct the setting module 212 to set or reset the alarm module 21〇. The default address is the entered address (step 618). In addition, the setting module 212 can also edit a plurality of input addresses into the alarm module 21A. In addition, the setting module 212 can also enable or disable the alarm module 210. If the setting module 212 disables the alarm module 210, once the access control system 200 discards that the visitor is not a registered user, the alarm module 21 will not send the visitor's alarm image group to the preset address. In summary, the present invention provides an access control system and method for controlling system access. In an embodiment, the access control system creates a face model book for the user according to at least one first image (first image group) of the currently registered registered user, and calculates the face sample by The similarity between at least one second image (second image group) of the registered user captured after the creation of the face template is entered into 0651-TW-CH Spec+Claim(filed-20100304).doc 19 201131517 Verify that the previously created face template key is eligible. If the similarity is below a preset threshold 'the face template key will be considered unacceptable' and the above operation will be repeated until a qualified face template key is established. The access control system can determine whether the visitor is a registered user by calculating the similarity between the face model key of the registered user and at least one image of the visitor (verifying the image group). If the similarity is greater than a first preset threshold, the visitor will be verified as a registered user. If the similarity is below the first preset threshold but above a second preset threshold, the access control system will verify the identity of the visitor based on other information, such as a password or username and password pair. If the guest is a registered user based on the password or username and password pair, then the face template key is further defined based on the viewer's recent image. If the similarity is below the second preset threshold, or if the visitor enters an incorrect password or username and password pair, the access control system will confirm that the visitor is not a registered user and prohibit the visitor from accessing the system. In addition, if the visitor is not a registered user's access control system, at least one image (alarm image group) of the visitor can be sent to a preset address. The above detailed description and the drawings are merely illustrative of the common embodiments of the invention. It will be apparent that various additions, modifications and substitutions are possible without departing from the spirit and scope of the invention as defined by the appended claims. It should be understood by those of ordinary skill in the art that the present invention may be applied in the form of 'structure, layout, ratio' materials, elements, components and other aspects in accordance with specific environmental and operational requirements without departing from the inventive principles. Changed. Therefore, the embodiments disclosed herein are for illustrative purposes only and 0651-TW-CH Spec+Claim(flled-20100304).doc 20 201131517 The scope of the present invention is defined by the scope of the appended claims and their legal equivalents. Without being limited to the previous description. BRIEF DESCRIPTION OF THE DRAWINGS The technical method of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments, in which the features and advantages of the invention are more apparent. 1 is an access control system and a block diagram according to an embodiment of the invention;

圖2所示絲據本發明的3 —實施㈣存取 的方塊圖; 圖3所示為根據本發明的一實施例的以— 統執行的操作流程圖; ### 圖4所示為根據本發明的一實施例在存取控制系統中 註冊使用者的例示操作流程圖; ’' 圖5所示為根據本發明的—實施例在存取控制 驗證訪客身份的例示操作流程圖;以及 、 圖6所示為根據本發明的另一實施例的以 系統執行的操作流程圖。 【主要元件符號說明】 100 :存取控制系統 104 : Ί主冊模組 1〇6 :識別模組 108 :資料庫 U0 :照相模組 21 0651-TW-CHSpec+aaim(filed-2〇l〇〇3〇4).c|oc 201131517 112 :控制器 120 :系統 200 :存取控制系統 202 :驗證平臺 210 :警報模組 212 :設定模組 214 :電子郵件伺服器 300、400、500 :流程圖 302〜320、402〜418、502〜522 :步驟 籲Figure 2 is a block diagram showing the operation of the 3-invention (four) of the present invention; Figure 3 is a flow chart showing the operation performed in accordance with an embodiment of the present invention; ### Figure 4 is based on An exemplary operational flow diagram for registering a user in an access control system in accordance with an embodiment of the present invention; '' Figure 5 is a flow chart showing an exemplary operation for verifying a visitor identity in an access control in accordance with an embodiment of the present invention; Figure 6 is a flow chart showing the operation performed by the system in accordance with another embodiment of the present invention. [Main component symbol description] 100: Access control system 104: Ί main book module 1〇6: identification module 108: database U0: camera module 21 0651-TW-CHSpec+aaim (filed-2〇l〇 〇3〇4).c|oc 201131517 112: controller 120: system 200: access control system 202: verification platform 210: alarm module 212: setting module 214: email server 300, 400, 500: flow Figure 302~320, 402~418, 502~522: Step Call

0651-TW-CH Spec+Claim(filed-20100304).doc :>20651-TW-CH Spec+Claim(filed-20100304).doc :>2

Claims (1)

201131517 七、申請專利範圍: 1. 一種存取控制系統,包括: 一註冊模組,根據一使用者的至少一個第一影像為該 使用者建立一金鑰,並根據在建立該金鑰之後所捕捉 的該使用者的至少一個第二影像驗證該金鑰;以及 一認證模組,根據該金鍮和一訪客的至少一個驗證影 像間的一第一相似度驗證該訪客。 2. 如申凊專利範圍第1項之存取控制系統,其中,如果 該第一相似度大於一第一預設臨限值,則該認證模組 驗證該訪客為該使用者。 3·如申請專利範圍第丨項之存取控制系統,其中,如果 忒第一相似度小於一第一預設臨限值,並且該訪客基 於一密碼被驗證為該使用者,則該認證模組根據該訪 客的至少一個最近影像進一步定義該金鑰。 4.如申請專利範圍第1項之存取控制系統,其中,如果 s玄第一相似度小於—第一預設臨限值並且大於一第 一預没臨限值,則該認證模組基於一密碼驗證該訪 客。 5·如申請專利範圍第4項之存取控制系統,其中,如果 該第一相似度小於該第二預設臨限值,則該認證模組 驗證該訪客不是該使用者。 6. 如申請專利範圍第丨項之存取控制系統,還包括: 一控制器,回應於多個輸入指令,控制該註冊模組和 該認證模組。 7. 如申請專利範圍第1項之存取控制系統,還包括: 23 0651-TW-CH Spec+Claim(filed-20100304).doc 201131517 一照相模組,捕捉該使用者的該至少一個第一影像和 該至少一個第二影像,以及該訪客的該至少一個驗證 影像和至少一個最近的影像。 8. 如申請專利範圍第1項之存取控制系統,還包括: 一資料庫,儲存該金鑰,並提供該金鑰至該認證模組。 9. 如申請專利範圍第1項之存取控制系統,其中,該認 證模組透過計算該金餘和該使用者的該至少一個第 二影像間的一第二相似度驗證該金鑰,如果該第二相 似度小於一預設臨限值,則根據該使用者的至少一個 新影像為該使用者建立一新金鑰。 10. 如申請專利範圍第]項之存取控制系統,還包括: 一警報模組,如果該認證模組驗證該訪客不是該使用 者,將該訪客的至少一個影像發送至一預設地址。 11. 如申請專利範圍第10項之存取控制系統,還包括: 一設定模組,回應於一輸入指令,設定和重設該預設 地址。 12. 如申請專利範圍第丨0項之存取控制系統,還包括: 一設定模組,回應於一輸入指令,致能和除能該警報 模組。 13. 如申請專利範圍第10項之存取控制系統,其中,該 警報模組將該訪客的該至少一個影像隨一電子郵件 經由一電子郵件伺服器發送至一預設電子郵件地址。 14. 一種電腦系統,包括: 一處理器,以及 一耦合於該處理器的記憶體,其儲存複數個由該電腦 0651 -TW-CH Spec+Claim(filed-20100304).doc 24 201131517 系統執行之指令,以執行一方法並控制一系統的存 取,該方法包括: 根據目前捕捉的一使用者的至少一個第一影像 建立該使用者的一金鑰; 根據在建立該金鑰之後捕捉的該使用者的至少 —個第二影像進而驗證該金鑰;以及 根據該金鑰和一訪客的至少一個驗證影像之間 的一第一相似度驗證該訪客。 15.如申請專利範圍第14項之電腦系統,其中,該方法 還包括: 如果該第一相似度大於一第一預設臨限值,允許該訪 客存取該系統。 16·如申請專利範圍第14項之電腦系統,其中,該方法 還包括: 如果該第一相似度小於一第一預設臨限值,並且基於 一密碼驗證該訪客為該使用者,根據該訪客的至少一 個最近的影像進一步定義該金鑰。 17. 如申請專利範圍第14項之電腦系統,其中,該方法 還包括: 如果該第一相似度小於一第一預設臨限值並且大於 一第二預設臨限值,基於該密碼驗證該訪客。 18. 如申睛專利範圍第17項之電腦系統,其中,該方法 還包括: 如果該第一相似度小於該第二預設臨限值,禁止該訪 客存取該系統。 25 0651-TW-CH Spec+Claim(filed-201〇〇3〇4).d〇c 201131517 】9.如申請專利範圍第14項之電腦系統,其中,該方法 還包括: ~ "" 採用一照相模組捕捉該使用者的該至少一個第一影 象矛 玄至少一個第二影像,以及該訪客的該至少—個 驗證影像和至少一個最近的影像。 20. 如申請專利範圍第14項之電腦系統,其中,該 還包括: 、 。乂 / 將該金鑰存入一資料庫中;以及 從該資料庫中取出該金鑰。 21. 如申請專利範圍第M項之電腦系統,其中,該方 還包括: ' 透過計算該金鑰和該使用者的該至少一個第二影像 間的一第二相似度驗證該金鑰;以及 如果3玄第一相似度小於一預設臨限值,根據該使用者 的至少一個新影像為該使用者建立一新金输。 22·如申請專利範圍第丨4項之電腦系統,其中,該方法 還包括: Λ ' 如果遠認證模組驗證該訪客不是該使用者,將該訪客 的至少一個影像發送至一預設地址。 23·如申請專利範圍第22項之電腦系統,其中,該方法 還包括: 回應於一輸入指令設定和重設該預設地址。 24.如申請專利範圍第22項之電腦系統,其中,該方法 還包括: / 回應於一輸入指令,致能和除能將該使用者的該至少 0651 -TW-CH Spec+Claim(nied-20100304).doc 26 201131517 一個影像發送至該預設地址的該步驟。 25. —種存取控制系統,包括: 一認證模組,驗證一訪客是否有權限存取一系統;以 及 一警報模組,如果該訪客被驗證為未被授權,將該訪 客的至少一個影像發送至一預設地址。 26·如申請專利範圍帛25項之存取控制系統,還包括: 照相模組,捕捉該訪客的該至少一個影像。201131517 VII. Patent application scope: 1. An access control system, comprising: a registration module, which establishes a key for the user according to at least one first image of a user, and according to the establishment of the key Capture the at least one second image of the user to verify the key; and an authentication module to verify the visitor based on a first similarity between the card and at least one verification image of a visitor. 2. The access control system of claim 1, wherein the authentication module verifies the visitor as the user if the first similarity is greater than a first predetermined threshold. 3. The access control system of claim 3, wherein if the first similarity is less than a first predetermined threshold and the visitor is verified as the user based on a password, the authentication mode The group further defines the key based on at least one recent image of the visitor. 4. The access control system of claim 1, wherein if the first similarity is less than the first preset threshold and greater than a first pre-emptive threshold, the authentication module is based on A password is verified for the visitor. 5. The access control system of claim 4, wherein if the first similarity is less than the second predetermined threshold, the authentication module verifies that the visitor is not the user. 6. The access control system of claim 3, further comprising: a controller that controls the registration module and the authentication module in response to a plurality of input instructions. 7. The access control system of claim 1 of the patent scope further includes: 23 0651-TW-CH Spec+Claim(filed-20100304).doc 201131517 A camera module capturing the at least one first of the user And the at least one second image, and the at least one verification image and the at least one most recent image of the visitor. 8. The access control system of claim 1, further comprising: a database storing the key and providing the key to the authentication module. 9. The access control system of claim 1, wherein the authentication module verifies the key by calculating a second similarity between the gold balance and the at least one second image of the user, if The second similarity is less than a predetermined threshold, and a new key is established for the user according to the at least one new image of the user. 10. The access control system of claim 4, further comprising: an alarm module, if the authentication module verifies that the visitor is not the user, transmitting at least one image of the visitor to a predetermined address. 11. The access control system of claim 10, further comprising: a setting module that sets and resets the preset address in response to an input command. 12. The access control system of claim 00, further comprising: a setting module that enables and disables the alarm module in response to an input command. 13. The access control system of claim 10, wherein the alert module sends the at least one image of the visitor to an alternate email address via an email via an email server. 14. A computer system comprising: a processor, and a memory coupled to the processor, the plurality of memory being stored by the computer 0651-TW-CH Spec+Claim(filed-20100304).doc 24 201131517 system An instruction to perform a method and control access to a system, the method comprising: establishing a key of the user according to at least one first image of a currently captured user; according to the captured after the key is established At least one second image of the user in turn verifies the key; and validating the visitor based on a first similarity between the key and at least one verification image of a visitor. 15. The computer system of claim 14, wherein the method further comprises: allowing the visitor to access the system if the first similarity is greater than a first predetermined threshold. The computer system of claim 14, wherein the method further comprises: if the first similarity is less than a first predetermined threshold, and verifying the visitor as the user based on a password, according to the At least one recent image of the visitor further defines the key. 17. The computer system of claim 14, wherein the method further comprises: if the first similarity is less than a first preset threshold and greater than a second preset threshold, based on the password verification The visitor. 18. The computer system of claim 17, wherein the method further comprises: if the first similarity is less than the second predetermined threshold, the visitor is prohibited from accessing the system. 25 0651-TW-CH Spec+Claim(filed-201〇〇3〇4).d〇c 201131517 】 9. The computer system of claim 14, wherein the method further comprises: ~ "" A camera module is used to capture at least one second image of the at least one first image of the user, and the at least one verification image and the at least one recent image of the visitor. 20. The computer system of claim 14, wherein the method further comprises: , .乂 / Save the key in a repository; and retrieve the key from the repository. 21. The computer system of claim M, wherein the party further comprises: ' verifying the key by calculating a second similarity between the key and the at least one second image of the user; If the first similarity of the 3 Xuan is less than a preset threshold, a new gold input is established for the user according to the at least one new image of the user. 22. The computer system of claim 4, wherein the method further comprises: Λ ' If the remote authentication module verifies that the visitor is not the user, transmitting at least one image of the visitor to a predetermined address. 23. The computer system of claim 22, wherein the method further comprises: setting and resetting the preset address in response to an input command. 24. The computer system of claim 22, wherein the method further comprises: / responding to an input command, enabling and disabling the user of the at least 0651-TW-CH Spec+Claim (nied- 20100304).doc 26 201131517 This step of sending an image to this preset address. 25. An access control system comprising: an authentication module that verifies whether a visitor has access to a system; and an alert module that at least one image of the visitor if the visitor is verified as not authorized Send to a default address. 26. The access control system of claim 25, further comprising: a camera module that captures the at least one image of the visitor. 27.如申j專利範圍第25項之存取控制系統,還包括: 一没疋模组,回應於一輸入指令設定和重設該預設地 址。 从如甲猜專利範圍第25項之存取控制系統,還包括: ^設定模組,簡於-輪人指令致能和 報模 組。 29.如申請專利範圍第25項 敢如祕,w 存取控制系統’其中,該 s報Μ、,且將該訪客的該至 ^ ^ —個影像隨一電子郵件27. The access control system of claim 25, wherein the method further comprises: a module that is configured to reset and reset the preset address in response to an input command. The access control system from the 25th item of the patent scope includes: ^Setting module, simple-turning command enabling and reporting group. 29. If the scope of the patent application is 25, dare to be secret, w access control system 'where the s report, and the visitor's image to the ^ ^ image is accompanied by an email 經由一電子郵件伺服器發 一預設電子郵件地址。 0651 -TW-CH Spec+Claim(filed-20100304).doc 27Send a default email address via an email server. 0651 -TW-CH Spec+Claim(filed-20100304).doc 27
TW99106230A 2010-03-04 2010-03-04 Access control system and computer system TWI406190B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW99106230A TWI406190B (en) 2010-03-04 2010-03-04 Access control system and computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW99106230A TWI406190B (en) 2010-03-04 2010-03-04 Access control system and computer system

Publications (2)

Publication Number Publication Date
TW201131517A true TW201131517A (en) 2011-09-16
TWI406190B TWI406190B (en) 2013-08-21

Family

ID=49484545

Family Applications (1)

Application Number Title Priority Date Filing Date
TW99106230A TWI406190B (en) 2010-03-04 2010-03-04 Access control system and computer system

Country Status (1)

Country Link
TW (1) TWI406190B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4128570B2 (en) * 2003-01-28 2008-07-30 富士通株式会社 Biometric information verification device
CN1627317A (en) * 2003-12-12 2005-06-15 北京阳光奥森科技有限公司 Method for obtaining image of human faces by using active light source
TWI350486B (en) * 2007-11-26 2011-10-11 Ind Tech Res Inst Biometrics method and apparatus and biometric data encryption method thereof
TWM362474U (en) * 2009-04-14 2009-08-01 Chunghwa Telecom Co Ltd Face recognition and verification system used in auto teller machine (ATM)

Also Published As

Publication number Publication date
TWI406190B (en) 2013-08-21

Similar Documents

Publication Publication Date Title
US10432621B2 (en) Toggling biometric authentication
CN109600306B (en) Method, device and storage medium for creating session
US10230722B2 (en) Trusted status transfer between associated devices
US8752145B1 (en) Biometric authentication with smart mobile device
US20110185402A1 (en) Access control system
US20130254858A1 (en) Encoding an Authentication Session in a QR Code
US9730001B2 (en) Proximity based authentication using bluetooth
US20160330199A1 (en) Fallback identity authentication techniques
US9853971B2 (en) Proximity based authentication using bluetooth
US10282532B2 (en) Secure storage of fingerprint related elements
US11792188B2 (en) Application for confirming multi-person authentication
US20170344762A1 (en) Method and device for providing notification indicating loss of terminal
WO2016206090A1 (en) Two-factor authentication method, device and apparatus
JP2017102758A (en) Authentication device, authentication method, and program
JP7475692B2 (en) Authentication device, authentication method, and program
US11792187B2 (en) Multi-person authentication
TW201131517A (en) Access control system and computer system
WO2017012216A1 (en) Login processing method and apparatus, and terminal
US20210336951A1 (en) Fusion template for user authentication and vault for storing and using the same
WO2017210977A1 (en) Method and apparatus for management terminal to access wi-fi
US11528269B2 (en) Application for requesting multi-person authentication
WO2018006353A1 (en) Method and system of using intelligent entrance guard based on mobile terminal and picture password
WO2023047800A1 (en) Authentication device, authentication method, authentication system, and program
KR101235608B1 (en) Method and System on Multi Factor Certification Using Device Identification Information and Multimedia Identification Information
US20240012898A1 (en) Device and method for authenticating a user of a virtual reality helmet

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees