TW202217760A - Iot security system and method thereof - Google Patents

Iot security system and method thereof Download PDF

Info

Publication number
TW202217760A
TW202217760A TW109136968A TW109136968A TW202217760A TW 202217760 A TW202217760 A TW 202217760A TW 109136968 A TW109136968 A TW 109136968A TW 109136968 A TW109136968 A TW 109136968A TW 202217760 A TW202217760 A TW 202217760A
Authority
TW
Taiwan
Prior art keywords
face
feature
image
face recognition
internet
Prior art date
Application number
TW109136968A
Other languages
Chinese (zh)
Other versions
TWI787664B (en
Inventor
施松村
王智昊
鐘國家
謝凱生
亨德里克
Original Assignee
正修學校財團法人正修科技大學
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 正修學校財團法人正修科技大學 filed Critical 正修學校財團法人正修科技大學
Priority to TW109136968A priority Critical patent/TWI787664B/en
Publication of TW202217760A publication Critical patent/TW202217760A/en
Application granted granted Critical
Publication of TWI787664B publication Critical patent/TWI787664B/en

Links

Images

Landscapes

  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

An IoT security method includes: capturing at least one facial image on an unidentified face with a camera unit in a security monitoring area; searching at least one facial block on the facial image and retrieving at least one facial recognizable feature from the facial block; detecting a unidentified target data corresponding to the unidentified face or a peripheral target thereof; retrieving at least one identifiable feature; identifying the facial recognizable feature of the facial image with a facial recognition procedure to obtain a facial recognition result and further identifying the identifiable feature to obtain an auxiliary verification result; and verifying the facial recognition result with the auxiliary verification result to obtain a final verification result.

Description

物聯網保全系統及其方法 Internet of things security system and method thereof

本發明係關於一種物聯網〔IoT,Internet of Things〕保全系統及其方法;特別是關於一種物聯網多重辨識〔multiple identification〕保全系統及其方法。 The present invention relates to an Internet of Things (IoT, Internet of Things) security system and method thereof; in particular, to a security system and method for multiple identification of the Internet of Things.

舉例而言,有關習用保全系統及其方法,例如:中華民國專利公開第TW-201739284號之〝網路級智慧型居家保全系統及方法〞發明專利申請案,其揭示一種網路級智慧型居家保全系統及方法。該網路級智慧型居家保全方法為用於控制從一廣域網路〔WAN〕至一區域網路〔LAN〕的存取的方法。該方法經由一閘道實施,且該閘道配置在該區域網路及廣域網路之間。 For example, regarding conventional security systems and methods, such as the invention patent application for "Internet-level smart home security system and method" in Patent Publication No. TW-201739284 of the Republic of China, which discloses a network-level smart home security system Security systems and methods. The network-level smart home security method is a method for controlling access from a wide area network (WAN) to a local area network (LAN). The method is implemented via a gateway, and the gateway is configured between the local area network and the wide area network.

承上,前述第TW-201739284號之該方法包含:經由一第一本地通信路徑發送一閘道LAN存取秘密至一行動裝置,且該第一本地通信路徑不包括該廣域網路;在發送該閘道LAN存取秘密之後,僅允許一訊務,而該訊務來自由該閘道維護的一白名單上的IP位址,且該訊務自該廣域網路至該區域網路;經由該廣域網路自該行動裝置接收一遠端存取資訊,且該遠端存取資訊包含〔i〕一認證資訊,且該認證資訊自該閘道LAN存取秘密獲取及〔ii〕一IP位址範圍,且該IP位址範圍與該行動裝置相關聯的一個或多個IP位址;及該閘道驗證該認證資訊,並響應地將該IP位址範圍添加至該白名單。 Continuing from the above, the method of the aforementioned No. TW-201739284 includes: sending a gateway LAN access secret to a mobile device via a first local communication path, and the first local communication path does not include the wide area network; After the gateway LAN access secret, only one traffic is allowed, and the traffic is from an IP address on a white list maintained by the gateway, and the traffic is from the wide area network to the local area network; via the The WAN receives a remote access information from the mobile device, and the remote access information includes [i] an authentication information, and the authentication information is obtained from the gateway LAN access secret and (ii) an IP address and the IP address range is associated with one or more IP addresses of the mobile device; and the gateway verifies the authentication information and responsively adds the IP address range to the whitelist.

另一習用保全系統及其方法,例如:中華民國 專利公告第TW-I574232號之〝具有物聯網通訊功能之保全主機〞發明專利,其揭示一種具有物聯網通訊功能之保全主機。該保全主機包含一連接模組、一通訊模組、一保全中控模組及一聲音輸出模組。 Another conventional security system and its method, eg: Republic of China Patent Announcement No. TW-I574232 for the invention patent of "Security Host with Internet of Things Communication Function", which discloses a security host with Internet of Things communication function. The security host includes a connection module, a communication module, a security central control module and a sound output module.

承上,前述第TW-I574232號之該連接模組連接一偵測器,並接收該偵測器的偵測結果。該通訊模組經由一通訊網路連接一雲端與一電子裝置,並接收該雲端或該電子裝置所傳送的一控制訊號或一播放訊號。該保全中控模組連接該連接模組及通訊模組,而該保全中控模組具有一保全狀態或一解除保全狀態。於該保全狀態時,依據該偵測器的偵測結果判斷是否發生異常,於判斷結果為異常時發出一異常警報,並經由該通訊模組傳送至該雲端。於該解除保全狀態時,該保全中控模組停止判斷是否發生異常或該偵測器停止偵測。 Continuing from the above, the connection module of the aforementioned No. TW-I574232 is connected to a detector, and receives the detection result of the detector. The communication module connects a cloud and an electronic device through a communication network, and receives a control signal or a playing signal sent by the cloud or the electronic device. The security central control module is connected to the connection module and the communication module, and the security central control module has a security state or a security release state. In the security state, it is judged whether an abnormality occurs according to the detection result of the detector, and an abnormality alarm is issued when the judgment result is abnormal, and is transmitted to the cloud through the communication module. When the security is released, the security central control module stops judging whether an abnormality occurs or the detector stops detecting.

承上,前述第TW-I574232號之該聲音輸出模組連接該保全中控模組,依據該異常警報發出一警示聲,且該警示聲依據該播放訊號播放對應的一聲音。該保全中控模組依據該控制訊號產生一控制指令、一驅動訊號或一保全設定訊號,而該控制指令經由該通訊模組傳送至另一該電子裝置,且該另一該電子裝置依據該控制指令進行作動。另外,該驅動訊號經由該連接模組傳送至該偵測器,以便該偵測器依據該驅動訊號進行作動。另外,該保全中控模組依據該保全設定訊號切換為該保全狀態或該解除保全狀態。 Continuing from the above, the sound output module of the aforementioned No. TW-I574232 is connected to the security central control module, and emits a warning sound according to the abnormal alarm, and the warning sound plays a corresponding sound according to the playback signal. The security central control module generates a control command, a driving signal or a security setting signal according to the control signal, and the control command is transmitted to the other electronic device through the communication module, and the other electronic device according to the control commands to operate. In addition, the driving signal is transmitted to the detector through the connection module, so that the detector operates according to the driving signal. In addition, the security central control module switches to the security state or the security release state according to the security setting signal.

另一習用保全系統及其方法,例如:中華民國專利公告第TW-I606428號之〝戶聯網之互助分享保全系統〞發明專利,其揭示一種戶聯網之互助分享保全系統。該戶聯網之互助分享保全系統包含一保全主機,且該保全主機包含一通訊模組、一中控模組、一門禁刷卡模組、一 時間模組及數個區域偵測器擴充模組。 Another conventional security system and method therefor, such as the invention patent of "The Mutual Aid and Sharing Security System of the Internet of Households" in Patent Publication No. TW-I606428 of the Republic of China, which discloses a security system of mutual assistance and sharing of the Internet of Households. The mutual assistance and sharing security system of the household network includes a security host, and the security host includes a communication module, a central control module, an access control card swiping module, a Time module and several area detector expansion modules.

承上,前述第TW-I606428號之該通訊模組用於一戶聯網內的群組芳鄰的資訊分享及路由轉傳,並用於一雲端及一電子裝置的控制訊息的傳送及接收,且用於經由該區域偵測器擴充模組接收來自該偵測器模組的偵測結果及其控制,且該偵測器模組連接於該通訊模組。 Continuing from the above, the communication module of the aforementioned No. TW-I606428 is used for information sharing and routing among group neighbors in a household network, and is used for the transmission and reception of control messages in a cloud and an electronic device. The detection result from the detector module and its control are received through the area detector expansion module, and the detector module is connected to the communication module.

承上,前述第TW-I606428號之該中控模組經由該通訊模組接收來自該偵測器之一異常警報,根據事先所設定之一保全狀態在一燈號蜂鳴器模組發出對應的一警示聲音及顯示在一LED燈號。另外,該異常警報亦選擇經由該戶聯網之一區域網路及具有物聯網通訊功能的該雲端及電子裝置進行同時推播至一群組芳鄰。 Continuing from the above, the central control module of the aforementioned No. TW-I606428 receives an abnormal alarm from the detector via the communication module, and sends out a corresponding light signal buzzer module according to a pre-set security state. A warning sound is displayed and an LED light is displayed. In addition, the abnormal alarm is also selected to be simultaneously pushed and broadcast to a group of neighbors through a local area network of the household network and the cloud and electronic device with the Internet of Things communication function.

承上,前述第TW-I606428號之該門禁刷卡模組及時間模組在於一位以上的芳鄰基於互助分享。另外,在現場協助排除異常警報時,可選擇刷卡並記錄時間戳記,以決定一互惠積分點數,以便決定該互惠積分點數優先贈與給最先到場刷卡的芳鄰。該區域偵測器擴充模組(#n)外接,並連接的該偵測器模組(#m)。 Continuing from the above, the access control card swiping module and the time module of the aforementioned No. TW-I606428 are based on mutual assistance and sharing among more than one neighbor. In addition, when assisting in troubleshooting on-site abnormal alarms, you can choose to swipe the card and record the time stamp to determine a reciprocal point, so that the reciprocal point can be given priority to the neighbor who swiped the card first. The area detector expansion module (#n) is externally connected to the detector module (#m).

然而,前述專利公開第TW-201739284號之網路級智慧型居家保全系統及方法、公告第TW-I574232號之具有物聯網通訊功能之保全主機及公告第TW-I606428號之戶聯網之互助分享保全系統仍必然存在進一步改良的潛在需求。 However, the aforementioned Patent Publication No. TW-201739284 discloses a network-level smart home security system and method, Announcement No. TW-I574232 discloses a security host with Internet of Things communication function, and Announcement No. TW-I606428 discloses mutual assistance sharing of home networking There must still be a potential need for further improvement in the security system.

前述中華民國專利公開第TW-201739284號之發明專利申請案、專利公告第TW-I574232號及專利公告第TW-I606428號之發明專利僅為本發明技術背景之參考及說明目前技術發展狀態而已,其並非用以限制本發明之範圍。 The aforementioned invention patent application of ROC Patent Publication No. TW-201739284, Patent Publication No. TW-I574232 and Patent Publication No. TW-I606428 are only for reference of the technical background of the present invention and to illustrate the current state of technological development. It is not intended to limit the scope of the present invention.

有鑑於此,本發明為了滿足上述需求,其提供 一種物聯網保全系統及其方法,其於一保全監控區域利用一影像攝取單元於一待辨識人臉上攝取至少一人臉影像,並於該人臉影像尋找至少一人臉區塊及取樣至少一人臉辨識特徵,且於該待辨識人臉或其周邊目標另對應偵測至少一目標待辨識資料,且自該目標待辨識資料擷取至少一可辨識特徵,再利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果,並進一步將該可辨識特徵進行辨識,以獲得一輔助驗證結果,且利用該人臉辨識結果及輔助驗證結果進行驗證比對,以獲得一〔最後〕驗證比對結果,以便大幅提升人臉辨識可靠度及辨識安全度。 In view of this, in order to meet the above requirements, the present invention provides An Internet of Things security system and method thereof, which utilize an image capturing unit to capture at least one face image on a face to be identified in a security monitoring area, search for at least one face block in the face image, and sample at least one face Identifying features, and correspondingly detecting at least one target-to-be-identified data on the face to be identified or its surrounding objects, and extracting at least one recognizable feature from the target-to-be-identified data, and then using the face identification feature to perform a face recognition Recognition operation to obtain a face recognition result, and further identify the identifiable feature to obtain an auxiliary verification result, and use the face recognition result and the auxiliary verification result for verification and comparison to obtain a [final] verification Compare the results in order to greatly improve the reliability and security of face recognition.

本發明較佳實施例之主要目的係提供一種物聯網保全系統及其方法,其於一保全監控區域利用一影像攝取單元於一待辨識人臉上攝取至少一人臉影像,並於該人臉影像尋找至少一人臉區塊及取樣至少一人臉辨識特徵,且於該待辨識人臉或其周邊目標另對應偵測至少一目標待辨識資料,且自該目標待辨識資料擷取至少一可辨識特徵,再利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果,並進一步將該可辨識特徵進行辨識,以獲得一輔助驗證結果,且利用該人臉辨識結果及輔助驗證結果進行驗證比對,以獲得一〔最後〕驗證比對結果,以達成提升人臉辨識可靠度及辨識安全度之目的。 The main purpose of the preferred embodiments of the present invention is to provide an Internet of Things security system and method thereof, which utilize an image capturing unit to capture at least a face image on a face to be identified in a security monitoring area, and record the face image on the face image. Finding at least one face block and sampling at least one face recognition feature, and correspondingly detecting at least one target to be recognized data on the to-be-recognized face or its surrounding objects, and extracting at least one recognizable feature from the target to-be-recognized data , and then use the face recognition feature to perform a face recognition operation to obtain a face recognition result, and further identify the identifiable feature to obtain an auxiliary verification result, and use the face recognition result and the auxiliary verification result to carry out Verification and comparison are performed to obtain a [final] verification and comparison result, so as to achieve the purpose of improving the reliability and security of face recognition.

為了達成上述目的,本發明較佳實施例之物聯網保全方法包含: In order to achieve the above purpose, the Internet of Things security method according to the preferred embodiment of the present invention includes:

於一保全監控區域利用一影像攝取單元於一待辨識人臉上攝取至少一人臉影像; Using an image capturing unit to capture at least a face image on a face to be identified in a security monitoring area;

於該人臉影像尋找至少一人臉區塊及取樣至少一人臉辨識特徵; Finding at least one face block in the face image and sampling at least one face recognition feature;

於該待辨識人臉或其周邊目標另對應偵測至 少一目標待辨識資料; The face to be recognized or its surrounding objects are also detected correspondingly to One less target to be identified;

自該目標待辨識資料擷取至少一可辨識特徵; extracting at least one identifiable feature from the target data to be identified;

利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果,並進一步將該可辨識特徵進行辨識,以獲得一輔助驗證結果;及 Use the face recognition feature to perform a face recognition operation to obtain a face recognition result, and further identify the recognizable feature to obtain an auxiliary verification result; and

利用該人臉辨識結果及輔助驗證結果進行驗證比對,以獲得一〔最後〕驗證比對結果,以便進行是否配對驗證。 The face recognition result and the auxiliary verification result are used for verification and comparison to obtain a [final] verification and comparison result, so as to perform pairing verification.

為了達成上述目的,本發明較佳實施例之物聯網保全系統包含: In order to achieve the above-mentioned purpose, the Internet of Things security system of the preferred embodiment of the present invention includes:

一影像攝取單元,其於一保全監控區域在一待辨識人臉上攝取至少一人臉影像; an image capturing unit, which captures at least a face image of a face to be identified in a security monitoring area;

一演算及處理單元,其連接至該影像攝取單元,且於該人臉影像尋找至少一人臉區塊及取樣至少一人臉辨識特徵; a calculation and processing unit, which is connected to the image capturing unit, and searches for at least one face block in the face image and samples at least one face recognition feature;

一人臉辨識單元,其連接至該演算及處理單元,且利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果;及 a face recognition unit, which is connected to the calculation and processing unit, and uses the face recognition feature to perform a face recognition operation to obtain a face recognition result; and

一輔助辨識單元,其連接至該演算及處理單元,且於該待辨識人臉或其周邊目標另對應偵測至少一目標待辨識資料,且自該目標待辨識資料擷取至少一可辨識特徵; an auxiliary recognition unit, which is connected to the calculation and processing unit, and correspondingly detects at least one target to be recognized data on the to-be-recognized face or its surrounding objects, and extracts at least one recognizable feature from the target to-be-recognized data ;

其中利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果,並進一步將該可辨識特徵進行辨識,以獲得一輔助驗證結果,且利用該人臉辨識結果及輔助驗證結果進行驗證比對,以獲得一〔最後〕驗證比對結果。 The face recognition feature is used to perform a face recognition operation to obtain a face recognition result, and the recognizable feature is further identified to obtain an auxiliary verification result, and the face recognition result and the auxiliary verification result are used for verification. Alignment to obtain a [final] validation alignment.

本發明較佳實施例之該目標待辨識資料選自一待辨識語音資料、一待辨識指紋資料、一待辨識車牌影 像資料或其任意組合。 In a preferred embodiment of the present invention, the target data to be recognized is selected from a voice data to be recognized, a fingerprint data to be recognized, a license plate image to be recognized Like data or any combination thereof.

本發明較佳實施例之該可辨識特徵選自一聲紋特徵、一指紋特徵、一車牌影像特徵或其任意組合。 In the preferred embodiment of the present invention, the recognizable feature is selected from a voiceprint feature, a fingerprint feature, a license plate image feature or any combination thereof.

本發明較佳實施例之該影像攝取單元配置於一汽車通道、一門禁通道、一設備機台或其任意組合。 In a preferred embodiment of the present invention, the image capturing unit is disposed in a car passage, an access control passage, an equipment machine, or any combination thereof.

本發明較佳實施例將該人臉辨識結果、輔助驗證結果及驗證比對結果連接傳輸至一雲端物聯網系統。 A preferred embodiment of the present invention connects and transmits the face recognition result, the auxiliary verification result and the verification comparison result to a cloud Internet of Things system.

本發明較佳實施例採用人臉影像真偽辨識方法包含:於該待辨識人臉上攝取至少一人臉紅外線影像;於該人臉紅外線影像尋找至少一溫度分佈特徵;利用一溫度比對單元將該溫度分佈特徵與一人臉區塊溫度參數進行真偽比對,以便產生一人臉真偽比對結果。 In a preferred embodiment of the present invention, the method for identifying the authenticity of a face image includes: capturing at least an infrared image of a face on the face to be identified; searching for at least one temperature distribution feature in the infrared image of the face; using a temperature comparison unit to The temperature distribution feature is compared with the authenticity of the temperature parameter of a face block, so as to generate a comparison result of the authenticity of a person's face.

本發明較佳實施例之該溫度分佈特徵包含一人臉分佈溫度、一人體輪廓分佈溫度及一背景環境分佈溫度。 The temperature distribution feature of the preferred embodiment of the present invention includes a face distribution temperature, a body contour distribution temperature and a background environment distribution temperature.

本發明較佳實施例之該溫度分佈特徵用以辨識一發燒體溫特徵或一高體溫特徵。 The temperature distribution feature of the preferred embodiment of the present invention is used to identify a fever body temperature feature or a hyperthermia feature.

本發明較佳實施例之該人臉區塊溫度參數介於一最低人體溫度及一最高人體溫度之間。 In a preferred embodiment of the present invention, the temperature parameter of the face block is between a minimum body temperature and a maximum body temperature.

本發明較佳實施例之該人臉區塊溫度參數結合一環境溫度參數。 In a preferred embodiment of the present invention, the temperature parameter of the face block is combined with an ambient temperature parameter.

本發明較佳實施例之該人臉影像依一環境溫度產生一已補償人臉影像。 The face image of the preferred embodiment of the present invention generates a compensated face image according to an ambient temperature.

本發明較佳實施例之該溫度比對單元或人臉辨識單元連接一輸出單元,以便輸出該人臉真偽比對結果或人臉辨識結果。 In a preferred embodiment of the present invention, the temperature comparison unit or the face recognition unit is connected to an output unit, so as to output the face authenticity comparison result or the face recognition result.

本發明較佳實施例之該輸出單元連接操作一待機裝置,以便輸出該人臉真偽比對結果或人臉辨識結果至該待機裝置。 In a preferred embodiment of the present invention, the output unit is connected to operate a standby device, so as to output the face authenticity comparison result or the face recognition result to the standby device.

本發明較佳實施例之該溫度分佈特徵與一偽造人臉影像溫度特徵進行真偽比對。 The temperature distribution feature of the preferred embodiment of the present invention is compared with the fake temperature feature of a fake face image.

本發明較佳實施例採用指紋影像真偽辨識系統包含: The preferred embodiment of the present invention adopts a fingerprint image authenticity identification system including:

一指紋影像攝取單元,其於一待辨識手指上攝取至少一手指紅外線影像及至少一指紋影像;一演算及處理單元,其連接至該指紋影像攝取單元,並於該手指紅外線影像尋找至少一溫度分佈特徵,且於該指紋影像尋找至少一指紋區塊及取樣至少一指紋辨識特徵; a fingerprint image capturing unit, which captures at least one finger infrared image and at least one fingerprint image on a finger to be identified; a calculation and processing unit, which is connected to the fingerprint image capturing unit and searches for at least one temperature in the finger infrared image distributing features, and finding at least one fingerprint block in the fingerprint image and sampling at least one fingerprint identification feature;

一溫度比對單元,其連接至該演算及處理單元,且將該溫度分佈特徵與一手指區塊溫度參數進行真偽比對,以便產生一手指真偽比對結果;及 a temperature comparison unit, which is connected to the calculation and processing unit, and performs authenticity comparison between the temperature distribution feature and a finger block temperature parameter, so as to generate a finger authenticity comparison result; and

一指紋辨識單元,其連接至該演算及處理單元,且利用該指紋辨識特徵進行一指紋辨識作業,以獲得一指紋辨識結果。 A fingerprint identification unit is connected to the calculation and processing unit, and uses the fingerprint identification feature to perform a fingerprint identification operation to obtain a fingerprint identification result.

本發明較佳實施例之該溫度分佈特徵包含一手指分佈溫度、一手指輪廓分佈溫度及一背景環境分佈溫度。 The temperature distribution feature of the preferred embodiment of the present invention includes a finger distribution temperature, a finger contour distribution temperature and a background environment distribution temperature.

本發明較佳實施例之該溫度分佈特徵用以辨識一發燒體溫特徵或一高體溫特徵。 The temperature distribution feature of the preferred embodiment of the present invention is used to identify a fever body temperature feature or a hyperthermia feature.

本發明較佳實施例之該手指區塊溫度參數介於一最低人體溫度及一最高人體溫度之間。 In a preferred embodiment of the present invention, the temperature parameter of the finger block is between a minimum body temperature and a maximum body temperature.

本發明較佳實施例之該手指區塊溫度參數結合一環境溫度參數。 In a preferred embodiment of the present invention, the temperature parameter of the finger block is combined with an ambient temperature parameter.

本發明較佳實施例之該溫度比對單元或指紋辨識單元連接一輸出單元,以便輸出該手指真偽比對結果或指紋辨識結果。 In a preferred embodiment of the present invention, the temperature comparison unit or the fingerprint identification unit is connected to an output unit, so as to output the finger authenticity comparison result or the fingerprint identification result.

本發明較佳實施例之該輸出單元連接一醫療管理中心,以便輸出一發燒體溫特徵或一高體溫特徵至該 醫療管理中心。 The output unit of the preferred embodiment of the present invention is connected to a medical management center, so as to output a fever body temperature signature or a hyperthermia signature to the Medical Management Center.

本發明較佳實施例之該輸出單元連接操作一待機裝置,以便輸出該手指真偽比對結果或指紋辨識結果至該待機裝置。 In a preferred embodiment of the present invention, the output unit is connected to operate a standby device, so as to output the finger authenticity comparison result or the fingerprint identification result to the standby device.

本發明較佳實施例之該溫度分佈特徵與一偽造手指影像溫度特徵進行真偽比對。 The temperature distribution characteristic of the preferred embodiment of the present invention is compared with the fake temperature characteristic of a fake finger image.

本發明較佳實施例之該溫度分佈特徵與一環境溫度特徵進行真偽比對。 The temperature distribution characteristic of the preferred embodiment of the present invention is compared with an ambient temperature characteristic.

1:無線保全系統 1: Wireless security system

100:雲端物聯網系統 100: Cloud IoT System

101:中央控制中心 101: Central Control Center

102:行動瀏覽裝置 102: Mobile Browsing Devices

103:醫療管理中心 103: Medical Management Center

1A:人臉紅外線影像 1A: Infrared image of human face

1B:複製人臉影像圖片 1B: Copy face image picture

1C:指紋紅外線影像 1C: Fingerprint infrared image

1D:複製指紋影像圖片 1D: Copy the fingerprint image picture

10:影像攝取單元 10: Image capture unit

10a:指紋影像攝取單元 10a: Fingerprint image capture unit

10b:麥克風裝置 10b: Microphone unit

11:閘道器主機 11: Gateway host

12:感測網路 12: Sensing network

121:短距離無線通訊裝置 121: Short-range wireless communication device

13:管制監控裝置 13: Control monitoring device

131:警示裝置 131: Warning device

2:溫度偵測單元 2: Temperature detection unit

20:演算及處理單元 20: Calculation and processing unit

21:溫度比對單元 21: Temperature comparison unit

30:人臉辨識單元 30: Face recognition unit

30a:指紋辨識單元 30a: Fingerprint recognition unit

31:輔助辨識單元 31: Auxiliary identification unit

40:驗證比對單元 40: Verifying the alignment unit

51:待機電腦裝置 51: Standby computer device

52:待機行動通訊裝置 52: Standby mobile communication device

6:人臉影像真偽辨識系統 6: Face image authenticity recognition system

7:指紋影像真偽辨識系統 7: Fingerprint image authenticity identification system

A:人臉影像 A: face image

2A:車牌影像 2A: License plate image

B:待辨識語音資料 B: Voice data to be recognized

第1圖:本發明較佳實施例之物聯網保全系統之架構示意圖。 Figure 1: A schematic diagram of the architecture of the Internet of Things security system according to the preferred embodiment of the present invention.

第2圖:本發明較佳實施例之物聯網保全方法之流程示意圖。 Fig. 2 is a schematic flow chart of the Internet of Things security method according to the preferred embodiment of the present invention.

第3圖:本發明較佳實施例之物聯網保全系統之方塊示意圖。 Figure 3: A block schematic diagram of the Internet of Things security system according to a preferred embodiment of the present invention.

第4圖:本發明較佳實施例之物聯網保全系統採用無通訊架構之方塊示意圖。 Fig. 4 is a block diagram of the Internet of Things security system adopting a non-communication structure according to a preferred embodiment of the present invention.

第5圖:本發明第一較佳實施例之物聯網保全系統之方塊示意圖。 Fig. 5 is a block diagram of the Internet of Things security system according to the first preferred embodiment of the present invention.

第6圖:本發明第二較佳實施例之物聯網保全系統之方塊示意圖。 Fig. 6 is a block diagram of the Internet of Things security system according to the second preferred embodiment of the present invention.

第7圖:本發明較佳實施例之物聯網保全系統採用人臉影像真偽辨識方法之流程示意圖。 FIG. 7 is a schematic flow chart of the method for authenticating the authenticity of a face image in the IoT security system according to the preferred embodiment of the present invention.

第8圖:本發明較佳實施例之物聯網保全系統採用人臉影像真偽辨識系統之方塊示意圖。 Fig. 8 is a block diagram of a facial image authenticity identification system used in the IoT security system according to the preferred embodiment of the present invention.

第9圖:本發明較佳實施例之物聯網保全系統採用指紋影像真偽辨識方法之流程示意圖。 Fig. 9 is a schematic flow chart of the method for identifying the authenticity of fingerprint images in the Internet of Things security system according to the preferred embodiment of the present invention.

第10圖:本發明較佳實施例之物聯網保全系統採用指 紋影像真偽辨識系統之方塊示意圖。 Figure 10: The Internet of Things security system according to the preferred embodiment of the present invention adopts the index Block diagram of the texture image authenticity identification system.

第11圖:本發明較佳實施例之物聯網保全系統連接醫療管理中心之方塊示意圖。 Fig. 11: A schematic block diagram of the Internet of Things security system connected to the medical management center according to the preferred embodiment of the present invention.

為了充分瞭解本發明,於下文將舉例較佳實施例並配合所附圖式作詳細說明,且其並非用以限定本發明。 In order to fully understand the present invention, preferred embodiments will be exemplified below and described in detail in conjunction with the accompanying drawings, which are not intended to limit the present invention.

本發明較佳實施例之物聯網保全系統及其方法可適用於人臉、聲紋或指紋影像辨識作業之保全系統之前處理,其適用於各種人臉、聲紋或指紋影像真偽辨識裝置及其相關應用設備,例如:各類型電腦系統、家電產品控制系統〔如物聯網〕、自動化控制系統、醫療照護系統、博物館安全系統、門禁系統或其相關保全系統,但其並非用以限定本發明之應用範圍。 The Internet of Things security system and method thereof according to the preferred embodiment of the present invention can be applied to the pre-processing of the security system for face, voiceprint or fingerprint image recognition, and it is suitable for various face, voiceprint or fingerprint image authenticity identification devices and Its related application equipment, such as: various types of computer systems, home appliance product control systems (such as the Internet of Things), automation control systems, medical care systems, museum security systems, access control systems or their related security systems, but they are not intended to limit the present invention. scope of application.

第1圖揭示本發明較佳實施例之本發明較佳實施例之物聯網保全系統之架構示意圖。請參照第1圖所示,舉例而言,本發明較佳實施例之物聯網保全系統包含一無線保全系統1、一閘道器主機11、一感測網路12、一短距離無線通訊裝置〔例如:ZigBee或其它短距離無線通訊〕121、一管制監控裝置13、一警示裝置〔例如:警示燈、蜂鳴器或其它警示裝置〕131及一雲端物聯網系統100,如第1圖之下半部所示,且可依不同需求省略或增加其它周邊設備。 FIG. 1 discloses a schematic diagram of the structure of the Internet of Things security system according to the preferred embodiment of the present invention. Referring to FIG. 1, for example, the IoT security system according to the preferred embodiment of the present invention includes a wireless security system 1, a gateway host 11, a sensing network 12, and a short-range wireless communication device [For example: ZigBee or other short-range wireless communication] 121, a control monitoring device 13, a warning device [for example: warning light, buzzer or other warning device] 131 and a cloud IoT system 100, as shown in FIG. 1 The lower part is shown, and other peripheral devices can be omitted or added according to different needs.

請再參照第1圖之上半部所示,舉例而言,該雲端物聯網系統100連接通訊一中央控制中心101,如此經由該中央控制中心101輸出至少一指令至該雲端物聯網系統100,以便控制操作該雲端物聯網系統100。另外,該雲端物聯網系統100可選擇連接通訊一行動瀏覽裝置102,以便登入至該雲端物聯網系統100。 Please refer to the upper part of FIG. 1 again, for example, the cloud IoT system 100 is connected to a central control center 101 for communication, so that at least one command is output to the cloud IoT system 100 through the central control center 101 , In order to control and operate the cloud IoT system 100 . In addition, the cloud Internet of Things system 100 can optionally connect to a mobile browsing device 102 for logging in to the cloud Internet of Things system 100 .

第2圖揭示本發明較佳實施例之物聯網保全方 法之流程示意圖;第3圖揭示本發明較佳實施例之物聯網保全系統之方塊示意圖,其對應於第2圖之物聯網保全方法。請參照第2及3圖所示,舉例而言,本發明較佳實施例之物聯網保全系統另包含一影像攝取單元10、一演算及處理單元20、一人臉辨識單元30、一輔助辨識單元31及一驗證比對單元40,且可依不同需求省略或增加其它周邊設備。 FIG. 2 discloses the Internet of Things security method according to the preferred embodiment of the present invention. Figure 3 shows a schematic block diagram of the Internet of Things security system according to a preferred embodiment of the present invention, which corresponds to the Internet of Things security method in Figure 2. Referring to Figures 2 and 3, for example, the IoT security system according to the preferred embodiment of the present invention further includes an image capture unit 10, a calculation and processing unit 20, a face recognition unit 30, and an auxiliary recognition unit 31 and a verification and comparison unit 40, and other peripheral devices can be omitted or added according to different requirements.

請再參照第3圖所示,舉例而言,該影像攝取單元10可選自一攝影裝置,且將該攝影裝置配置於一汽車通道、一門禁通道、一設備機台或其任意組合。另外,該輔助辨識單元31可選自一攝影裝置、一指紋影像攝取裝置、一麥克風裝置或其任意組合。 Referring to FIG. 3 again, for example, the image capturing unit 10 can be selected from a photographing device, and the photographing device is disposed in a car passage, an access control passage, an equipment machine, or any combination thereof. In addition, the auxiliary identification unit 31 can be selected from a photographing device, a fingerprint image capturing device, a microphone device or any combination thereof.

請再參照第3圖所示,舉例而言,該演算及處理單元20以適當技術手段連接至該影像攝取單元10,而該人臉辨識單元30及輔助辨識單元31以適當技術手段連接至該演算及處理單元20,且該驗證比對單元40以適當技術手段連接至該人臉辨識單元30及輔助辨識單元31。 Please refer to FIG. 3 again, for example, the calculation and processing unit 20 is connected to the image capturing unit 10 by appropriate technical means, and the face recognition unit 30 and the auxiliary recognition unit 31 are connected to the image capture unit 31 by appropriate technical means The calculation and processing unit 20, and the verification and comparison unit 40 are connected to the face recognition unit 30 and the auxiliary recognition unit 31 by appropriate technical means.

第4圖揭示本發明較佳實施例之物聯網保全系統採用無通訊架構之方塊示意圖,其對應於第1圖之物聯網保全系統。請參照第1及4圖所示,舉例而言,本發明較佳實施例之物聯網保全系統選擇以無線通訊方式連接通訊數個機電設備、一造景盤、一網頁系統及一管制室或其它設備或系統。 FIG. 4 discloses a block diagram of the Internet of Things security system adopting a communication-free structure according to a preferred embodiment of the present invention, which corresponds to the Internet of Things security system of FIG. 1 . Referring to Figures 1 and 4, for example, the Internet of Things security system of the preferred embodiment of the present invention chooses to connect and communicate several electromechanical devices, a layout board, a web system, and a control room by wireless communication. other equipment or systems.

請再參照第2及3圖所示,舉例而言,本發明較佳實施例之物聯網保全方法包含步驟S1A:首先,於一保全監控區域〔例如:商辦大樓、企業總部、住宅大樓或其它〕利用該影像攝取單元10於一待辨識人臉〔或數個待辨識人臉〕上攝取至少一個或數個〔一系列〕人臉影像A。 Please refer to Figures 2 and 3 again. For example, the IoT security method according to the preferred embodiment of the present invention includes step S1A: first, in a security monitoring area (for example, a commercial building, a corporate headquarters, a residential building or Others] use the image capturing unit 10 to capture at least one or several (a series) of face images A on a face (or several faces to be identified) to be identified.

請再參照第2及3圖所示,舉例而言,本發明較佳實施例之物聯網保全方法包含步驟S1B:接著,在一預定時間內〔例如:0.1秒或其它時間〕利用該影像攝取單元10於該待辨識人臉或其周邊目標另對應偵測至少一目標待辨識資料。該目標待辨識資料可選自一待辨識語音資料、一待辨識指紋資料或一待辨識車牌影像資料。 Please refer to Figures 2 and 3 again. For example, the IoT security method according to the preferred embodiment of the present invention includes step S1B: then, use the image capture within a predetermined time (for example: 0.1 second or other time) The unit 10 also detects at least one target to be identified data corresponding to the face to be identified or its surrounding objects. The target to-be-recognized data can be selected from a to-be-recognized voice data, a to-be-recognized fingerprint data, or a to-be-recognized license plate image data.

請再參照第2及3圖所示,舉例而言,本發明較佳實施例之物聯網保全方法包含步驟S2A:接著,利用該演算及處理單元20於該人臉影像A尋找至少一人臉區塊〔facial block,像塊之尺寸為w×h〕及取樣至少一人臉辨識特徵〔facial recognizable feature〕,例如:T字部位。 Referring again to Figures 2 and 3, for example, the IoT security method according to the preferred embodiment of the present invention includes step S2A: then, the calculation and processing unit 20 is used to find at least one face area in the face image A A block [facial block, the size of the image block is w × h ] and sampling at least one face recognition feature [facial recognizable feature], such as: T-shaped part.

請再參照第2及3圖所示,舉例而言,本發明較佳實施例之物聯網保全方法包含步驟S2B:接著,利用該演算及處理單元20自該目標待辨識資料擷取至少一可辨識特徵。該可辨識特徵選自一聲紋特徵、一指紋特徵或一車牌影像特徵〔例如:文字或數字特徵〕。 Referring again to Figures 2 and 3, for example, the IoT security method according to the preferred embodiment of the present invention includes step S2B: then, the calculation and processing unit 20 is used to extract at least one identifiable data from the target to be identified. Identify features. The identifiable feature is selected from a voiceprint feature, a fingerprint feature, or a license plate image feature (eg, character or numerical feature).

請再參照第2及3圖所示,舉例而言,本發明較佳實施例之物聯網保全方法包含步驟S3:接著,利用該人臉辨識單元30將該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果,並進一步利用該輔助辨識單元31將該可辨識特徵進行辨識,以獲得一輔助驗證結果。 Referring again to Figures 2 and 3, for example, the IoT security method of the preferred embodiment of the present invention includes step S3: then, the face recognition feature is used to perform a face recognition operation by the face recognition unit 30 , to obtain a face recognition result, and further use the auxiliary recognition unit 31 to recognize the recognizable feature to obtain an auxiliary verification result.

請再參照第2及3圖所示,舉例而言,本發明較佳實施例之物聯網保全方法包含步驟S4:接著,利用該驗證比對單元40將該人臉辨識結果及輔助驗證結果進行驗證比對,以獲得一〔最後〕驗證比對結果,以便進行是否配對驗證。將該人臉辨識結果、輔助驗證結果及驗證比對結果連接傳輸至一雲端物聯網系統。 Referring again to Figures 2 and 3, for example, the IoT security method according to the preferred embodiment of the present invention includes step S4: then, the verification and comparison unit 40 is used to perform the facial recognition results and the auxiliary verification results. Validation alignment to obtain a [final] validation alignment for pair-wise validation. The face recognition result, the auxiliary verification result and the verification comparison result are connected and transmitted to a cloud Internet of Things system.

第5圖揭示本發明第一較佳實施例之物聯網保全系統之方塊示意圖。請參照第3及5圖所示,舉例而言, 本發明第一較佳實施例另包含一麥克風裝置10b對應偵測一待辨識語音資料B,並利用該演算及處理單元20自該待辨識語音資料B擷取一聲紋特徵,且經由該輔助辨識單元31進行聲紋辨識。 FIG. 5 discloses a block diagram of the Internet of Things security system according to the first preferred embodiment of the present invention. Please refer to Figures 3 and 5, for example, The first preferred embodiment of the present invention further includes a microphone device 10b corresponding to detecting a to-be-recognized voice data B, and using the calculation and processing unit 20 to extract a voiceprint feature from the to-be-recognized voice data B, and through the auxiliary The recognition unit 31 performs voiceprint recognition.

第6圖揭示本發明第二較佳實施例之物聯網保全系統之方塊示意圖。請參照第3及6圖所示,舉例而言,相對於第一實施例,本發明第二較佳實施例之該影像攝取單元10另對應偵測一車牌影像2A,以便收集該待辨識車牌影像資料,並利用該演算及處理單元20自該目標待辨識資料擷取該車牌影像特徵,且經由該輔助辨識單元31進行車牌辨識。 FIG. 6 discloses a block diagram of the Internet of Things security system according to the second preferred embodiment of the present invention. Please refer to FIGS. 3 and 6, for example, compared with the first embodiment, the image capturing unit 10 of the second preferred embodiment of the present invention also detects a license plate image 2A correspondingly, so as to collect the to-be-recognized license plate image data, and use the calculation and processing unit 20 to extract the image features of the license plate from the target data to be recognized, and perform license plate recognition through the auxiliary recognition unit 31 .

第7圖揭示本發明較佳實施例之物聯網保全系統採用人臉影像真偽辨識方法之流程示意圖。第8圖揭示本發明較佳實施例之物聯網保全系統採用人臉影像真偽辨識系統之方塊示意圖。請參照第7及8圖所示,舉例而言,本發明較佳實施例之人臉影像真偽辨識系統6包含一影像攝取單元10、一演算及處理單元20、一溫度比對單元21、一人臉辨識單元30及一驗證比對單元40,且可依不同需求省略該驗證比對單元40或增加其它周邊設備。 FIG. 7 discloses a schematic flowchart of a method for authenticating a face image in an IoT security system according to a preferred embodiment of the present invention. FIG. 8 discloses a block diagram of a facial image authenticity identification system used in the IoT security system according to the preferred embodiment of the present invention. Please refer to FIGS. 7 and 8. For example, the facial image authenticity identification system 6 according to the preferred embodiment of the present invention includes an image capturing unit 10, a calculation and processing unit 20, a temperature comparison unit 21, A face recognition unit 30 and a verification and comparison unit 40 are provided, and the verification and comparison unit 40 may be omitted or other peripheral devices may be added according to different requirements.

請再參照第7及8圖所示,舉例而言,該演算及處理單元20以適當技術手段連接至該影像輸入單元10,且該溫度比對單元21及人臉辨識單元30以適當技術手段連接至該演算及處理單元20,且該驗證比對單元40以適當技術手段連接至該溫度比對單元21及人臉辨識單元30。另外,該驗證比對單元40為一顯示單元或其類似功能之單元,或該驗證比對單元40以適當技術手段連接至一顯示單元或其類似功能之單元。 Please refer to FIGS. 7 and 8 again, for example, the calculation and processing unit 20 is connected to the image input unit 10 by appropriate technical means, and the temperature comparison unit 21 and the face recognition unit 30 are connected by appropriate technical means It is connected to the calculation and processing unit 20, and the verification and comparison unit 40 is connected to the temperature comparison unit 21 and the face recognition unit 30 by appropriate technical means. In addition, the verification and comparison unit 40 is a display unit or a unit with similar functions, or the verification and comparison unit 40 is connected to a display unit or a unit with similar functions by appropriate technical means.

請再參照第7及8圖所示,舉例而言,該影像攝取單元10為一攝影單元〔camera unit〕或一影像攝取單 元〔image capturing unit〕,而該影像攝取單元10用以輸入或攝取至少一個或數個〔一系列〕人臉影像,且該人臉影像包含單一個人臉影像或不同人之數個人臉影像〔m×n〕或影像方塊。 Please refer to FIGS. 7 and 8 again, for example, the image capturing unit 10 is a camera unit or an image capturing unit, and the image capturing unit 10 is used for inputting or capturing At least one or several (series) face images, and the face images include a single face image or several face images ( m × n ) or image blocks of different persons.

請再參照第7及8圖所示,舉例而言,本發明較佳實施例之人臉影像真偽辨識方法包含步驟S1A:首先,舉例而言,利用該影像攝取單元10於至少一待辨識人臉〔或數個待辨識人臉〕上攝取至少一個或數個〔一系列〕人臉紅外線影像1A,以避免利用一複製人臉影像圖片1B進行一人臉影像辨識作業。 Referring again to Figures 7 and 8, for example, the method for identifying the authenticity of a face image according to a preferred embodiment of the present invention includes step S1A: First, for example, the image capturing unit 10 is used to identify at least one face image to be identified. At least one or several (series) infrared images 1A of the human face are captured on the face (or several faces to be identified), so as to avoid using a duplicate face image picture 1B for the face image recognition operation.

請再參照第7及8圖所示,舉例而言,本發明較佳實施例之人臉影像真偽辨識方法包含步驟S1B:接著,舉例而言,在一預定時間內〔例如:0.1秒或其它時間〕利用該影像攝取單元10於該待辨識人臉〔或數個待辨識人臉〕上攝取至少一個或數個人臉影像〔例如:影像之像素座標為(x,y)〕,以確保該人臉影像對應於該人臉紅外線影像1A,否則判定該人臉影像辨識作業為失敗或重啟。 Referring again to Figures 7 and 8, for example, the method for identifying the authenticity of a face image according to a preferred embodiment of the present invention includes step S1B: then, for example, within a predetermined time [for example: 0.1 second or At other times] use the image capturing unit 10 to capture at least one or more face images (for example: the pixel coordinates of the image are ( x , y )) on the face (or several faces to be identified) to ensure that The face image corresponds to the face infrared image 1A, otherwise it is determined that the face image recognition operation is failed or restarted.

請再參照第7及8圖所示,舉例而言,本發明較佳實施例之人臉影像真偽辨識方法包含步驟S2A:接著,舉例而言,利用該演算及處理單元20於該人臉紅外線影像1A計算尋找至少一溫度分佈特徵〔thermal feature distribution〕及其它特徵,例如:體表溫度〔約36.5℃〕。 Referring again to Figures 7 and 8, for example, the method for identifying the authenticity of a human face image according to a preferred embodiment of the present invention includes step S2A: then, for example, using the calculation and processing unit 20 to identify the human face The infrared image 1A is calculated to find at least one thermal feature distribution and other features, such as body surface temperature (about 36.5°C).

請再參照第7及8圖所示,舉例而言,該溫度分佈特徵包含一人臉分佈溫度、一人體輪廓分佈溫度及一背景環境分佈溫度,且該人體輪廓分佈溫度可用以定義一人體頭部輪廓形狀,以便利用該人體輪廓分佈溫度之人體頭部輪廓形狀確認是否為一真實人頭部。 Please refer to Figures 7 and 8. For example, the temperature distribution features include a face distribution temperature, a body contour distribution temperature and a background environment distribution temperature, and the human body contour distribution temperature can be used to define a human head The contour shape is used to confirm whether it is a real human head by using the contour shape of the human head of the human body contour distribution temperature.

請再參照第7及8圖所示,舉例而言,本發明另一較佳實施例之該溫度分佈特徵用以辨識一發燒體溫特 徵〔例如:37℃至38℃之間為低度發燒或38℃以上〕或一高體溫特徵〔例如:39℃至40℃之間為高度發燒或40℃以上〕。本發明另一較佳實施例之該溫度分佈特徵與一偽造人臉影像溫度特徵〔例如:未達體表溫度或非活體人臉〕進行真偽比對。 Please refer to Figures 7 and 8, for example, the temperature distribution feature of another preferred embodiment of the present invention is used to identify a fever temperature characteristic Symptoms [eg: between 37°C and 38°C, low-grade fever or above 38°C] or a hyperthermic feature (eg: between 39°C and 40°C, high fever or above 40°C). In another preferred embodiment of the present invention, the temperature distribution feature is compared with the temperature feature of a fake face image (eg, the body surface temperature is not expressed or a non-living human face) is true and false.

請再參照第7及8圖所示,舉例而言,本發明較佳實施例之人臉影像真偽辨識方法包含步驟S2B:接著,舉例而言,利用該演算及處理單元20於該人臉影像尋找至少一人臉區塊及取樣至少一人臉辨識特徵,例如:T字部位。 Referring again to Figures 7 and 8, for example, the method for identifying the authenticity of a face image according to a preferred embodiment of the present invention includes step S2B: then, for example, the calculation and processing unit 20 is used to identify the face of the human face. The image searches for at least one face block and samples at least one face recognition feature, such as the T-shaped part.

請再參照第7及8圖所示,舉例而言,本發明較佳實施例之人臉影像真偽辨識方法包含步驟S3:接著,舉例而言,利用該溫度比對單元21將該溫度分佈特徵與一人臉區塊溫度參數進行真偽比對,以便產生一人臉真偽比對結果,而該人臉區塊溫度參數可選擇介於一最低人體溫度及一最高人體溫度之間或其它適當範圍,且該人臉區塊溫度參數結合一環境溫度參數,例如:夏天環境溫度、冬天環境溫度、嚴寒環境溫度、白天環境溫度、夜晚環境溫度、高溫工作環境溫度、低溫工作環境溫度或其它環境溫度。 Referring again to Figures 7 and 8, for example, the method for identifying the authenticity of a face image according to a preferred embodiment of the present invention includes step S3: then, for example, using the temperature comparison unit 21 to distribute the temperature The feature is compared with the authenticity of a face block temperature parameter, so as to generate a face authenticity comparison result, and the temperature parameter of the face block can be selected between a minimum body temperature and a maximum body temperature or other suitable range, and the temperature parameter of the face block is combined with an ambient temperature parameter, such as: summer ambient temperature, winter ambient temperature, severe cold ambient temperature, daytime ambient temperature, night ambient temperature, high temperature working environment temperature, low temperature working environment temperature or other environments temperature.

請再參照第7及8圖所示,舉例而言,本發明另一較佳實施例之該人臉影像依一環境溫度〔例如:夏天、冬天、嚴寒、白天、夜晚、高溫或低溫工作環境〕產生一已補償人臉影像,以達成提升人臉影像真偽辨識及人臉影像辨識可靠度。 Please refer to Figures 7 and 8 again, for example, the face image of another preferred embodiment of the present invention is based on an environmental temperature (for example: summer, winter, severe cold, day, night, high temperature or low temperature working environment ] generates a compensated face image, so as to improve the authenticity recognition of the face image and the reliability of the face image recognition.

請再參照第7及8圖所示,舉例而言,本發明較佳實施例之人臉影像真偽辨識方法包含步驟S4:接著,舉例而言,利用該人臉辨識單元30將該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果;倘若該人臉真 偽比對結果為〝非真實人臉〞時,選擇立即終止該人臉辨識作業,並記錄該人臉影像及其人臉辨識特徵於系統。 Referring again to Figures 7 and 8, for example, the method for recognizing the authenticity of a face image according to a preferred embodiment of the present invention includes step S4: then, for example, using the face recognition unit 30 to identify the face Recognition feature to perform a face recognition operation to obtain a face recognition result; if the face is real When the false comparison result is "not real face", choose to terminate the face recognition operation immediately, and record the face image and its face recognition features in the system.

請再參照第7及8圖所示,舉例而言,由於該溫度比對單元21或人臉辨識單元30連接該驗證比對單元40或一輸出單元,因此將該人臉真偽比對結果或人臉辨識結果經由該輸出單元進行輸出,亦可選擇輸出辨識失敗的該人臉影像及其人臉辨識特徵。 Please refer to Figures 7 and 8 again. For example, since the temperature comparison unit 21 or the face recognition unit 30 is connected to the verification and comparison unit 40 or an output unit, the result of the authenticity comparison of the face is obtained. Or the face recognition result is outputted through the output unit, and the face image and the face recognition feature of which the recognition failed can also be selected to be output.

第9圖揭示本發明較佳實施例之物聯網保全系統採用指紋影像真偽辨識方法之流程示意圖。第10圖揭示本發明較佳實施例之物聯網保全系統採用指紋影像真偽辨識系統之方塊示意圖。 FIG. 9 discloses a schematic flowchart of a method for authenticating a fingerprint image by the Internet of Things security system according to a preferred embodiment of the present invention. FIG. 10 discloses a block diagram of a fingerprint image authenticity identification system used in the IoT security system according to the preferred embodiment of the present invention.

請參照第9及10圖所示,舉例而言,本發明較佳實施例之指紋影像真偽辨識系統7包含一指紋影像攝取單元10a、一演算及處理單元20、一溫度比對單元21、一指紋辨識單元30a及一驗證比對單元40,且可依不同需求省略該驗證比對單元40或增加其它周邊設備。 Referring to Figures 9 and 10, for example, the fingerprint image authenticity identification system 7 according to the preferred embodiment of the present invention includes a fingerprint image capturing unit 10a, a calculation and processing unit 20, a temperature comparison unit 21, A fingerprint identification unit 30a and a verification and comparison unit 40, and the verification and comparison unit 40 may be omitted or other peripheral devices may be added according to different requirements.

請再參照第9及10圖所示,舉例而言,該演算及處理單元20以適當技術手段連接至該指紋影像攝取單元10a,且該溫度比對單元21及指紋辨識單元30a以適當技術手段連接至該演算及處理單元20,且該驗證比對單元40以適當技術手段連接至該溫度比對單元21及指紋辨識單元30a。另外,該驗證比對單元40為一顯示單元或其類似功能之單元,或該驗證比對單元40以適當技術手段連接至一顯示單元或其類似功能之單元。 Referring again to Figures 9 and 10, for example, the calculation and processing unit 20 is connected to the fingerprint image capturing unit 10a by appropriate technical means, and the temperature comparison unit 21 and the fingerprint identification unit 30a are connected by appropriate technical means It is connected to the calculation and processing unit 20, and the verification and comparison unit 40 is connected to the temperature comparison unit 21 and the fingerprint identification unit 30a by appropriate technical means. In addition, the verification and comparison unit 40 is a display unit or a unit with similar functions, or the verification and comparison unit 40 is connected to a display unit or a unit with similar functions by appropriate technical means.

請再參照第9及10圖所示,舉例而言,該指紋影像攝取單元10a為一攝影單元或一影像攝取單元,而該指紋影像攝取單元10a用以輸入或攝取至少一個或數個〔一系列〕手指影像及指紋影像,且該手指影像包含單一個手指影像〔或指紋影像〕或不同人之數個手指影像〔或 指紋影像〕〔m×n〕或影像方塊。 Please refer to Figures 9 and 10, for example, the fingerprint image capturing unit 10a is a photographing unit or an image capturing unit, and the fingerprint image capturing unit 10a is used to input or capture at least one or several [a A series of finger images and fingerprint images, and the finger images include a single finger image (or fingerprint image) or several finger images (or fingerprint images) [ m × n ] or image squares of different persons.

請再參照第9及10圖所示,舉例而言,本發明較佳實施例之指紋影像真偽辨識方法包含步驟S1A:首先,舉例而言,利用該指紋影像攝取單元10a於至少一待辨識手指〔或數個待辨識手指〕上攝取至少一個或數個手指紅外線影像1C,以避免利用一複製指紋影像圖片1D進行一指紋影像辨識作業。 Referring again to Figures 9 and 10, for example, the method for identifying the authenticity of a fingerprint image according to a preferred embodiment of the present invention includes step S1A: First, for example, the fingerprint image capturing unit 10a is used for at least one to-be-identified image. At least one or several infrared images 1C of the fingers are captured on the finger (or several fingers to be recognized), so as to avoid using a duplicate fingerprint image picture 1D to perform a fingerprint image recognition operation.

請再參照第9及10圖所示,舉例而言,本發明較佳實施例之指紋影像真偽辨識方法包含步驟S1B:接著,舉例而言,在一預定時間內〔例如:0.1秒或其它時間〕利用該指紋影像攝取單元10a於該待辨識手指〔或數個待辨識手指〕上攝取至少一個或數個指紋影像〔例如:影像之像素座標為(x,y)〕,以確保該指紋影像對應於該手指紅外線影像1C,否則判定該指紋影像辨識作業為失敗或重啟。 Referring again to Figures 9 and 10, for example, the method for identifying the authenticity of a fingerprint image according to a preferred embodiment of the present invention includes step S1B: then, for example, within a predetermined time [for example: 0.1 second or other time] using the fingerprint image capturing unit 10a to capture at least one or several fingerprint images (for example: the pixel coordinates of the image are ( x , y )) on the finger (or several fingers to be identified) to ensure that the fingerprint The image corresponds to the infrared image 1C of the finger, otherwise it is determined that the fingerprint image recognition operation is failed or restarted.

請再參照第9及10圖所示,舉例而言,本發明較佳實施例之指紋影像真偽辨識方法包含步驟S2A:接著,舉例而言,利用該演算及處理單元20於該手指紅外線影像1C計算尋找至少一溫度分佈特徵及其它特徵,例如:體表溫度〔約36.5℃〕。 Referring again to Figures 9 and 10, for example, the method for identifying the authenticity of a fingerprint image according to a preferred embodiment of the present invention includes step S2A: then, for example, using the calculation and processing unit 20 to detect the infrared image of the finger 1C calculation looks for at least one temperature distribution feature and other features, for example: body surface temperature [about 36.5°C].

請再參照第9及10圖所示,舉例而言,該溫度分佈特徵包含一手指分佈溫度、一手指輪廓分佈溫度及一背景環境分佈溫度,且該手指輪廓分佈溫度可用以定義一手指輪廓形狀,以便利用該手指輪廓分佈溫度之手指輪廓形狀確認是否為一真實手指部。本發明較佳實施例之該溫度分佈特徵與一偽造手指影像溫度特徵〔例如:未達體表溫度或非活體手指〕進行真偽比對。 Please refer to Figures 9 and 10, for example, the temperature distribution feature includes a finger distribution temperature, a finger contour distribution temperature and a background environment distribution temperature, and the finger contour distribution temperature can be used to define a finger contour shape , so as to use the finger contour shape of the finger contour distribution temperature to confirm whether it is a real finger. The temperature distribution feature of the preferred embodiment of the present invention is compared with the temperature feature of a fake finger image (for example, not reaching the body surface temperature or a non-living finger).

請再參照第9及10圖所示,舉例而言,本發明較佳實施例之指紋影像真偽辨識方法包含步驟S2B:接 著,舉例而言,利用該演算及處理單元20於該指紋影像尋找至少一指紋區塊〔fingerprint block,像塊之尺寸為w×h〕及取樣至少一指紋辨識特徵〔fingerprint recognizable feature〕,例如:擷取指紋影像之奇異點,且該奇異點包含核心點及三角點。 Referring again to Figures 9 and 10, for example, the method for identifying the authenticity of a fingerprint image according to a preferred embodiment of the present invention includes step S2B: then, for example, using the calculation and processing unit 20 to search for the fingerprint image At least one fingerprint block (fingerprint block, the size of the image block is w × h ) and sampling at least one fingerprint recognizable feature (fingerprint recognizable feature), for example: extracting the singular point of the fingerprint image, and the singular point includes the core point and the triangle point.

舉例而言,指紋種類包含右旋蹄狀紋〔right loop〕、左旋蹄狀紋〔left loop〕、篷形弓狀紋〔tented arch〕、弓狀紋〔plain arch或arch〕、渦狀紋〔whorl,即螺旋狀紋〕、渦流紋〔eddy〕及S狀紋或雙環狀紋〔S-type或twin loop〕。 For example, the types of fingerprints include right loop, left loop, tented arch, plain arch (arch), vortex ( whorl, that is, spiral pattern], eddy pattern (eddy) and S-shaped pattern or double annular pattern (S-type or twin loop).

請再參照第9及10圖所示,舉例而言,本發明較佳實施例之指紋影像真偽辨識方法包含步驟S3:接著,舉例而言,利用該溫度比對單元21將該溫度分佈特徵與一手指區塊溫度參數進行真偽比對,以便產生一手指真偽比對結果,而該手指區塊溫度參數可選擇介於一最低人體溫度及一最高人體溫度之間或其它適當範圍,且該手指區塊溫度參數結合一環境溫度參數,例如:夏天環境溫度、冬天環境溫度、嚴寒環境溫度、白天環境溫度、夜晚環境溫度、高溫工作環境溫度、低溫工作環境溫度或其它環境溫度。 Referring again to Figures 9 and 10, for example, the method for identifying the authenticity of a fingerprint image according to a preferred embodiment of the present invention includes step S3: then, for example, using the temperature comparison unit 21 to characterize the temperature distribution Perform authenticity comparison with a finger block temperature parameter, so as to generate a finger authenticity comparison result, and the finger block temperature parameter can be selected between a minimum body temperature and a maximum body temperature or other appropriate ranges, And the finger block temperature parameter is combined with an ambient temperature parameter, such as: summer ambient temperature, winter ambient temperature, severe cold ambient temperature, day ambient temperature, night ambient temperature, high temperature working ambient temperature, low temperature working ambient temperature or other ambient temperatures.

請再參照第9及10圖所示,舉例而言,本發明較佳實施例之指紋影像真偽辨識方法包含步驟S4:接著,舉例而言,利用該指紋辨識單元30a將指紋辨識特徵進行一指紋辨識作業,以獲得一指紋辨識結果;倘若該手指真偽比對結果為〝非真實手指〞時,選擇立即終止該指紋辨識作業,並記錄該指紋影像及其指紋辨識特徵於系統。 Referring again to Figures 9 and 10, for example, the method for identifying the authenticity of a fingerprint image according to a preferred embodiment of the present invention includes step S4: Next, for example, the fingerprint identification unit 30a is used to perform a fingerprint identification feature. Fingerprint identification operation to obtain a fingerprint identification result; if the authenticity comparison result of the finger is "not a real finger", choose to terminate the fingerprint identification operation immediately, and record the fingerprint image and its fingerprint identification characteristics in the system.

請再參照第9及10圖所示,舉例而言,由於該溫度比對單元21或指紋辨識單元30a連接該驗證比對單元40或一輸出單元,因此將該手指真偽比對結果或指紋辨 識結果經由該輸出單元進行輸出,亦可選擇輸出辨識失敗的該指紋影像及其指紋辨識特徵。 Please refer to Figures 9 and 10. For example, since the temperature comparison unit 21 or the fingerprint identification unit 30a is connected to the verification and comparison unit 40 or an output unit, the authenticity comparison result or fingerprint of the finger is obtained. distinguish The identification result is outputted through the output unit, and the fingerprint image and its fingerprint identification features that fail to be identified can also be selected to be output.

第11圖揭示本發明較佳實施例之物聯網保全系統連接醫療管理中心之方塊示意圖。請參照第11圖所示,相對於第一實施例,本發明第三較佳實施例之人臉影像真偽辨識系統6或指紋影像真偽辨識系統7連接一醫療管理中心103,以便輸出一發燒體溫特徵或一高體溫特徵〔或體溫特徵記錄資料,data profile〕至該醫療管理中心103,且該醫療管理中心103選自一雲端醫療管理中心或一雲端防疫管理中心〔例如:Covid 19防疫〕,且另結合產生一接觸史或活動軌跡,例如:手機訊號軌跡、內部或外部移動軌跡、行駛軌跡或其任意組合。 FIG. 11 shows a schematic block diagram of the Internet of Things security system connected to the medical management center according to the preferred embodiment of the present invention. Referring to FIG. 11, compared to the first embodiment, the facial image authenticity identification system 6 or the fingerprint image authenticity identification system 7 according to the third preferred embodiment of the present invention is connected to a medical management center 103 so as to output a Fever body temperature signature or a hyperthermic body temperature signature [or body temperature signature record data, data profile] to the medical management center 103, and the medical management center 103 is selected from a cloud medical management center or a cloud epidemic prevention management center [eg: Covid 19 epidemic prevention ], and another combination to generate a contact history or activity track, such as a cell phone signal track, an internal or external movement track, a travel track, or any combination thereof.

請再參照第11圖所示,舉例而言,該人臉影像真偽辨識系統6或指紋影像真偽辨識系統7連接一溫度偵測單元2,以便利用該溫度偵測單元2偵測該環境溫度,並經由該演算及處理單元20計算產生該環境溫度參數,且將該溫度分佈特徵與一環境溫度特徵進行真偽比對。 Please refer to FIG. 11 again, for example, the face image authenticity identification system 6 or the fingerprint image authenticity identification system 7 is connected to a temperature detection unit 2 so as to use the temperature detection unit 2 to detect the environment temperature, and the calculation and processing unit 20 calculates and generates the ambient temperature parameter, and compares the temperature distribution feature with an ambient temperature feature.

請再參照第11圖所示,舉例而言,該人臉影像真偽辨識系統6或指紋影像真偽辨識系統7連接操作一待機裝置,以便輸出該手指真偽比對結果或指紋辨識結果至該待機裝置,而該待機裝置包含一待機電腦裝置51、一待機行動通訊裝置52或其它待機裝置,例如:待機門鎖裝置或待機電器裝置,且該待機電腦裝置51或待機行動通訊裝置52可選擇連接通訊於該醫療管理中心103。 Please refer to FIG. 11 again. For example, the face image authenticity identification system 6 or the fingerprint image authenticity identification system 7 is connected to operate a standby device, so as to output the finger authenticity comparison result or the fingerprint identification result to the standby device, and the standby device includes a standby computer device 51, a standby mobile communication device 52 or other standby devices, such as a standby door lock device or a standby electrical device, and the standby computer device 51 or the standby mobile communication device 52 can be Select to connect the communication to the medical management center 103 .

前述較佳實施例僅舉例說明本發明及其技術特徵,該實施例之技術仍可適當進行各種實質等效修飾及/或替換方式予以實施;因此,本發明之權利範圍須視後附申請專利範圍所界定之範圍為準。本案著作權限制使用於中華民國專利申請用途。 The foregoing preferred embodiment is only an example of the present invention and its technical features, and the technology of this embodiment can still be implemented in various substantially equivalent modifications and/or alternative ways; therefore, the scope of the right of the present invention is subject to the appended patent application The scope defined by the scope shall prevail. The copyright in this case is restricted to be used for the purposes of the ROC patent application.

1:無線保全系統 1: Wireless security system

100:雲端物聯網系統 100: Cloud IoT System

101:中央控制中心 101: Central Control Center

102:行動瀏覽裝置 102: Mobile Browsing Devices

11:閘道器主機 11: Gateway host

12:感測網路 12: Sensing network

121:短距離無線通訊裝置 121: Short-range wireless communication device

13:管制監控裝置 13: Control monitoring device

131:警示裝置 131: Warning device

Claims (10)

一種物聯網保全方法,其包含: An Internet of Things security method, which includes: 於一保全監控區域利用一影像攝取單元於一待辨識人臉上攝取至少一人臉影像; Using an image capturing unit to capture at least a face image on a face to be identified in a security monitoring area; 於該人臉影像尋找至少一人臉區塊及取樣至少一人臉辨識特徵; Finding at least one face block in the face image and sampling at least one face recognition feature; 於該待辨識人臉或其周邊目標另對應偵測至少一目標待辨識資料; Correspondingly detect at least one target to-be-identified data on the face to be identified or its surrounding objects; 自該目標待辨識資料擷取至少一可辨識特徵; extracting at least one identifiable feature from the target data to be identified; 利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果,並進一步將該可辨識特徵進行辨識,以獲得一輔助驗證結果;及 Use the face recognition feature to perform a face recognition operation to obtain a face recognition result, and further identify the recognizable feature to obtain an auxiliary verification result; and 利用該人臉辨識結果及輔助驗證結果進行驗證比對,以獲得一驗證比對結果。 The face recognition result and the auxiliary verification result are used for verification and comparison to obtain a verification and comparison result. 依申請專利範圍第1項所述之物聯網保全方法,其中該目標待辨識資料選自一待辨識語音資料、一待辨識指紋資料、一待辨識車牌影像資料或其任意組合。 According to the Internet of Things security method described in item 1 of the scope of the application, the target data to be recognized is selected from a voice data to be recognized, a fingerprint data to be recognized, an image data of a license plate to be recognized, or any combination thereof. 依申請專利範圍第1項所述之物聯網保全方法,其中該可辨識特徵選自一聲紋特徵、一指紋特徵、一車牌影像特徵或其任意組合。 According to the Internet of Things security method described in item 1 of the claimed scope, the recognizable feature is selected from a voiceprint feature, a fingerprint feature, a license plate image feature or any combination thereof. 依申請專利範圍第1項所述之物聯網保全方法,其中該影像攝取單元配置於一汽車通道、一門禁通道、一設備機台或其任意組合。 According to the Internet of Things security method described in item 1 of the scope of the patent application, the image capturing unit is disposed in a car passage, an access control passage, an equipment machine or any combination thereof. 依申請專利範圍第1項所述之物聯網保全方法,其中將該人臉辨識結果、輔助驗證結果及驗證比對結果連接傳輸至一雲端物聯網系統。 According to the Internet of Things security method described in item 1 of the scope of the patent application, the face recognition result, the auxiliary verification result and the verification comparison result are connected and transmitted to a cloud Internet of Things system. 一種物聯網保全系統,其包含: An Internet of Things security system, which includes: 一影像攝取單元,其於一保全監控區域在一待辨識人臉上攝取至少一人臉影像; an image capturing unit, which captures at least a face image of a face to be identified in a security monitoring area; 一演算及處理單元,其連接至該影像攝取單元,且於該 人臉影像尋找至少一人臉區塊及取樣至少一人臉辨識特徵; an arithmetic and processing unit connected to the image capture unit and in the Finding at least one face block in the face image and sampling at least one face recognition feature; 一人臉辨識單元,其連接至該演算及處理單元,且利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果;及 a face recognition unit, which is connected to the calculation and processing unit, and uses the face recognition feature to perform a face recognition operation to obtain a face recognition result; and 一輔助辨識單元,其連接至該演算及處理單元,且於該待辨識人臉或其周邊目標另對應偵測至少一目標待辨識資料,且自該目標待辨識資料擷取至少一可辨識特徵; an auxiliary recognition unit, which is connected to the calculation and processing unit, and correspondingly detects at least one target-to-be-recognized data on the to-be-recognized face or its surrounding objects, and extracts at least one recognizable feature from the target to-be-recognized data ; 其中利用該人臉辨識特徵進行一人臉辨識作業,以獲得一人臉辨識結果,並進一步將該可辨識特徵進行辨識,以獲得一輔助驗證結果,且利用該人臉辨識結果及輔助驗證結果進行驗證比對,以獲得一驗證比對結果。 The face recognition feature is used to perform a face recognition operation to obtain a face recognition result, and the recognizable feature is further identified to obtain an auxiliary verification result, and the face recognition result and the auxiliary verification result are used for verification. Alignment to obtain a validating alignment result. 依申請專利範圍第6項所述之物聯網保全系統,其中該目標待辨識資料選自一待辨識語音資料、一待辨識指紋資料、一待辨識車牌影像資料或其任意組合。 According to the Internet of Things security system described in item 6 of the patent application scope, the target data to be recognized is selected from a voice data to be recognized, a fingerprint data to be recognized, an image data of a license plate to be recognized, or any combination thereof. 依申請專利範圍第6項所述之物聯網保全系統,其中該可辨識特徵選自一聲紋特徵、一指紋特徵、一車牌影像特徵或其任意組合。 According to the Internet of Things security system described in item 6 of the scope of the application, the identifiable feature is selected from a voiceprint feature, a fingerprint feature, a license plate image feature or any combination thereof. 依申請專利範圍第6項所述之物聯網保全系統,其中該影像攝取單元配置於一汽車通道、一門禁通道、一設備機台或其任意組合。 According to the Internet of Things security system described in item 6 of the scope of the patent application, wherein the image capturing unit is arranged in a car passage, an access control passage, an equipment machine or any combination thereof. 依申請專利範圍第6項所述之物聯網保全系統,其中將該人臉辨識結果、輔助驗證結果及驗證比對結果連接傳輸至一雲端物聯網系統。 According to the Internet of Things security system described in Item 6 of the scope of the patent application, the face recognition result, the auxiliary verification result and the verification comparison result are connected and transmitted to a cloud Internet of Things system.
TW109136968A 2020-10-23 2020-10-23 IoT SECURITY SYSTEM AND METHOD THEREOF TWI787664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW109136968A TWI787664B (en) 2020-10-23 2020-10-23 IoT SECURITY SYSTEM AND METHOD THEREOF

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW109136968A TWI787664B (en) 2020-10-23 2020-10-23 IoT SECURITY SYSTEM AND METHOD THEREOF

Publications (2)

Publication Number Publication Date
TW202217760A true TW202217760A (en) 2022-05-01
TWI787664B TWI787664B (en) 2022-12-21

Family

ID=82558547

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109136968A TWI787664B (en) 2020-10-23 2020-10-23 IoT SECURITY SYSTEM AND METHOD THEREOF

Country Status (1)

Country Link
TW (1) TWI787664B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10305895B2 (en) * 2015-04-14 2019-05-28 Blubox Security, Inc. Multi-factor and multi-mode biometric physical access control device
CN104809781A (en) * 2015-04-24 2015-07-29 成都腾悦科技有限公司 Access control system based on fingerprint recognition and face recognition
CN104809783A (en) * 2015-04-24 2015-07-29 成都腾悦科技有限公司 Security access control system
CN106296888B (en) * 2015-06-24 2022-05-13 西安中兴新软件有限责任公司 Unlocking method and device based on face recognition and terminal
TWI621071B (en) * 2017-08-31 2018-04-11 國立勤益科技大學 Access control system for license plate and face recognition using deep learning
CN109598806A (en) * 2018-09-29 2019-04-09 阿里巴巴集团控股有限公司 Admission registration, appearance charging method and the device and electronic equipment of the vehicles
CN110555929B (en) * 2019-08-19 2020-08-14 北京戴纳实验科技有限公司 Laboratory entrance guard verification system and verification method
TWM600418U (en) * 2020-05-05 2020-08-21 研勤科技股份有限公司 Face recognition access control system with temperature sensing

Also Published As

Publication number Publication date
TWI787664B (en) 2022-12-21

Similar Documents

Publication Publication Date Title
US11132881B2 (en) Electronic devices capable of communicating over multiple networks
US9928670B2 (en) Method and system for access control monitoring
US11240474B1 (en) Reporting connectivity problems for electronic devices
TWI596270B (en) Remote entry control system
JP2017506787A (en) Correlation of detective input to identify unauthorized persons
US11064167B2 (en) Input functionality for audio/video recording and communication doorbells
US11195408B1 (en) Sending signals for help during an emergency event
CN204990444U (en) Intelligent security controlgear
CN111063067A (en) Intelligent access control system based on voice control
CN104933791A (en) Intelligent security control method and equipment
US11349707B1 (en) Implementing security system devices as network nodes
KR101908988B1 (en) Method and device for managing application data
CN103955968A (en) Compound security attendance device and system based on android platform
CN106373227A (en) Housing estate door control system
EP3699873B1 (en) Methods and systems for an access control system using visual recognition
KR101265447B1 (en) Elevator security system with multiple authentication methods and Smartphone
JP2008059179A (en) Gate monitoring system and method
US10586434B1 (en) Preventing unauthorized access to audio/video recording and communication devices
CN105488966A (en) Smart home remote alarm system
CN105447372A (en) Intelligent security early warning system
TWI787664B (en) IoT SECURITY SYSTEM AND METHOD THEREOF
KR102251931B1 (en) System for user security using home communication device and method therefor
KR20170121934A (en) Smart doorbell and home security system
CN105957192A (en) Access control system
KR20150137539A (en) Door lock controlling apparatus using mobile terminal and method thereof