WO2020042463A1 - Procédé, appareil, dispositif et support de déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique - Google Patents

Procédé, appareil, dispositif et support de déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique Download PDF

Info

Publication number
WO2020042463A1
WO2020042463A1 PCT/CN2018/122624 CN2018122624W WO2020042463A1 WO 2020042463 A1 WO2020042463 A1 WO 2020042463A1 CN 2018122624 W CN2018122624 W CN 2018122624W WO 2020042463 A1 WO2020042463 A1 WO 2020042463A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
target
unlocking
preset
access control
Prior art date
Application number
PCT/CN2018/122624
Other languages
English (en)
Chinese (zh)
Inventor
付美蓉
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020042463A1 publication Critical patent/WO2020042463A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Definitions

  • the present application relates to the field of smart homes, and in particular, to an access control unlocking method, device, device, and medium based on biometric recognition.
  • Smart home is based on the house, using integrated wiring technology, network communication technology, smart home system design scheme security prevention technology, automatic control technology, audio and video technology to integrate facilities related to home life, build efficient residential facilities and family schedule Management system to improve home safety, convenience, comfort, and artistry, and to achieve an environmentally friendly and energy-saving living environment.
  • the access control system is also an important part of the smart home.
  • the smart home access control system uses different recognition methods to identify the user's identity, such as fingerprint recognition, key recognition, face recognition, and voice recognition.
  • fingerprint recognition e.g., fingerprint recognition
  • key recognition e.g., key recognition
  • face recognition e.g., face recognition
  • voice recognition e.g., voice recognition
  • the main purpose of this application is to provide a method, device, device, and medium for unlocking an access control based on biometrics, aiming to achieve security and efficiency of unlocking an access control based on biometrics.
  • the present application provides a method for unlocking an access control based on biometrics.
  • the method for unlocking an access control based on biometrics includes the following steps:
  • the present application also provides a biometric identification-based access control unlocking device.
  • the biometric identification-based access control unlocking device includes:
  • a receiving comparison module configured to receive broadcast information of a router, obtain new device information in the broadcast information, and compare the new device information with each preset identification information in a preset identification set;
  • a matching obtaining module configured to obtain biometric information of an unlocking requester if target identification information matching the newly connected device information exists in the preset identification set;
  • a comparison module configured to compare the biometric information with the target unlock information corresponding to the target identification information
  • the matching and unlocking module is configured to perform an unlocking operation on the access control if the biometric information matches the target unlocking information.
  • the present application also provides an access control unlocking device based on biometric identification
  • the biometric-based access control unlocking device includes: a memory, a processor, and computer-readable instructions stored on the memory and executable on the processor, wherein:
  • the present application also provides a computer storage medium
  • Computer-readable instructions are stored on the computer storage medium, and when the computer-readable instructions are executed by a processor, the steps of the method for unlocking an access control based on biometric identification as described above are implemented.
  • the method, device, device, and medium for unlocking an access control based on biometric identification obtained in the embodiments of the present application obtain the newly connected device information in the broadcast information by receiving broadcast information of the router, and compare the newly connected device information with the The preset identification information in the identification set is compared; if the target identification information matching the newly connected device information exists in the preset identification set, the biometric information of the unlocking requester is obtained; The feature information is compared with the target unlock information corresponding to the target identification information; if the biometric information matches the target unlock information, an unlock operation is performed on the access control.
  • the electronic lock receives the broadcast information of the router, and the new device information in the router broadcast information matches the preset identification information before collecting biometric information. By reducing the amount of biological data information collection, the information processing is also reduced. This improves the information processing efficiency.
  • the target unlock information corresponding to the biometric information and the target identification information is compared in this application, the unlocking security is higher.
  • FIG. 1 is a schematic structural diagram of a device for a hardware operating environment involved in a solution according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for unlocking an access control based on biometric identification in this application;
  • FIG. 3 is a functional module schematic diagram of an embodiment of an access control unlocking device based on biometric recognition of the present application.
  • FIG. 1 is a smart lock (also called an electronic lock or a biometric-based access control unlocking device) for a hardware operating environment involved in the solution of the embodiment of the present application.
  • the biometric-based access control unlocking device may be A separate biometric-based access control unlocking device may also be formed by combining other devices with a biometric-based access control unlocking device.
  • the smart lock may include a processor 1001, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen, an input unit such as a keyboard for entering an access password, and the optional user interface 1003 may further include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a wireless fidelity WIreless-FIdelity, WIFI interface).
  • the memory 1005 may be a high-speed RAM memory or a non-volatile memory. memory), such as disk storage.
  • the memory 1005 may optionally be a storage device independent of the foregoing processor 1001.
  • the smart lock may further include a camera, RF (Radio Frequency (radio frequency) circuit, sensor, audio circuit, WiFi module; input unit, display screen, touch screen; optional network interface except wireless interface except WiFi, Bluetooth, etc. I will not repeat them here.
  • RF Radio Frequency
  • the smart lock structure shown in FIG. 1 does not constitute a limitation on the smart lock, and may include more or fewer components than shown, or some components may be combined, or different components may be arranged.
  • the electronic lock stores computer software products stored in a storage medium (storage medium: also called computer storage medium, computer medium, readable medium, readable storage medium, computer-readable storage medium, or directly called medium Etc., which can be a non-volatile readable storage medium, such as RAM, magnetic disks, and optical disks, including a number of instructions for making a terminal device (which can be a mobile phone, computer, server, air conditioner, or network device, etc.)
  • the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and computer-readable instructions.
  • the network interface 1004 is mainly used to connect to the background server and perform data communication with the background server;
  • the user interface 1003 is mainly used to connect to the client (user terminal, also called terminal, such as a mobile phone), and the client
  • the terminal 1001 performs data communication; and the processor 1001 may be used to call the computer-readable instructions stored in the memory 1005 and execute the steps in the method for unlocking an access control based on biometrics provided in the following embodiments of the present application.
  • the method for unlocking an access control based on biometrics includes: Collins
  • Step S10 Receive broadcast information of the router, acquire new device information in the broadcast information, and compare the new device information with each preset identification information in a preset identification set.
  • the execution subject in this application is the electronic lock shown in Figure 1.
  • the electronic lock is installed on the door.
  • the electronic lock communicates with the terminal (user's mobile phone) and the server (access control management system).
  • the electronic lock is provided with a network interface.
  • the electronic lock receives the broadcast information sent by the router, the electronic lock acquires the newly connected device information included in the broadcast information, and the electronic lock compares the newly connected device information with each preset identification information in a preset identification set, where the It is assumed that the identification set refers to a preset set containing identification information.
  • the preset identification set includes terminal identification information that has the right to trigger unlock.
  • the identification information refers to information that uniquely identifies the device. For example, the preset of Wang xx electronic lock.
  • the identification set includes Wang xx ’s mobile phone identification information 1, Wang xx ’s mobile phone identification information 2 and Wang xx son ’s mobile phone identification information 3.
  • the electronic lock is based on the new device information and each preset identification information in the preset identification set. Compare the results to determine whether to collect biometric information.
  • the router will broadcast the newly connected device information (that is, the user's mobile phone information). Because the electronic lock communicates with the router in advance, the electronic lock receives the broadcast information of the router, the electronic lock obtains the new device information (user mobile phone information) in the broadcast information, and the electronic lock combines the user's mobile phone information with each preset in the preset identification set.
  • the identification information is compared, that is, the device identification information corresponding to the user with the electronic lock unlocking is preset in the preset identification set, for example, the mobile phone identification information of Wang xx set by the electronic lock of Wang xx family 1, and the wife of Wang xx
  • the mobile phone identification information 2 and the mobile phone identification information 3 of Wang xx's son determine whether to obtain biometric information based on the comparison result.
  • the triggering conditions for acquiring the biometric information by the electronic lock are different from the existing conditions for acquiring the biometric information.
  • the biometric information of the existing electronic lock is collected in real time. In this embodiment, only the electronic lock is used. Receive the broadcast information of the router and the new device information in the router broadcast information matches the preset identification information before acquiring biometric information. By reducing the amount of biometric information acquisition, it also reduces the amount of biometric information acquisition processing. , which improves the processing efficiency and recognition accuracy of biometric information acquisition.
  • the electronic lock compares the newly connected device information with each preset identification information in the preset identification set, and also realizes one-time verification of unlocking the access control based on biometric recognition.
  • step S20 if target identification information matching the newly connected device information exists in the preset identification set, biometric information of the unlocking requester is obtained.
  • the unlock operation is directly performed at this time, such a verification scheme may also make mistakes, for example, the user ’s mobile phone is stolen, and then the error is caused. Unlocking situation; therefore, if target identification information matching the newly connected device information exists in the preset identification set in this embodiment, only the electronic lock is authenticated for the first time by the user, and the electronic lock also needs to obtain an unlock request Party (the unlocking requester refers to the user corresponding to the new device information), and performs secondary verification based on the biometric information.
  • the biometric information includes fingerprints, irises, facial expressions, ears, palm prints, palm veins, etc., speech recognition, brain wave recognition, saliva extraction of DNA, and the like.
  • Step S30 Compare the biometric information with the target unlock information corresponding to the target identification information.
  • the electronic lock compares the obtained biometric information with the target unlock information corresponding to the target identification information.
  • the new device information corresponds to the target identification information A
  • the electronic lock corresponds to the user with the collected biometric information and the target identification information A.
  • the unlocking information of A is compared.
  • the target unlocking information refers to the unlocking information corresponding to the preset target identification information, that is, the user stores his fingerprint information, facial expression information, sound information, iris information, Palm print information and the like.
  • the biometric information of the unlocking requester is compared with the target unlocking information corresponding to the target identification information, the purpose of which is to implement secondary verification of user identity information.
  • step S40 if the biometric information matches the target unlock information, an unlock operation is performed on the access control.
  • the electronic lock compares the biometric information with the target unlock information, and performs the unlock operation by matching the biometric information with the target unlock information, so that unlocking is more convenient and efficient.
  • the smart lock may also repeatedly obtain the biometric information and perform multiple comparisons of the biometric information, specifically:
  • biometric information does not match the target unlock information, obtain new biometric information; compare the new biometric information with the target unlock information until the new biometric information and The target unlock information matches, or until the number of comparisons exceeds a preset threshold, and when it is detected that the number of comparisons exceeds the preset threshold, prompt information is generated and sent to a preset terminal.
  • the electronic lock in order to prevent the collected biometric information from being not clear enough to be identified, can repeatedly acquire new biometric information; the electronic lock compares the new biometric information with the target unlock information. Until the new biometric information matches the target unlock information for unlocking, or the electronic lock counts the number of comparisons, and the electronic lock determines that the number of comparisons exceeds a preset threshold, where the preset threshold refers to a preset setting Information comparison threshold.
  • the electronic lock When the comparison exceeds a preset threshold, no new biometric information is obtained for comparison, the electronic lock is temporarily locked, and a prompt message is sent to the preset terminal, where the preset terminal is Refers to the terminal corresponding to each preset identification information in the preset identification set in the foregoing embodiment, so that the preset terminal knows the unlocking situation. Make the setting of the electronic lock more humane.
  • this embodiment of the method for unlocking an access control based on biometrics in this application is further proposed.
  • This embodiment is a refinement of step S20 in the first embodiment.
  • Locks can obtain biometric information from different sources, specifically:
  • Step S21 If target identification information matching the newly-connected device information exists in the preset identification set, the smart lock turns on a preset acquisition device, and uses the preset acquisition device to collect a creature that unlocks the requester Characteristic information, and / or;
  • a preset acquisition device is provided on the electronic lock.
  • the preset acquisition device refers to a preset acquisition device on the electronic lock.
  • a camera device is used to collect a user's face image
  • a microphone device is used to collect a user.
  • the voice information, the fingerprint collection device is used to collect user fingerprint information, etc.
  • the electronic lock controls the preset collection device to collect the information through the preset.
  • the device collects the biometric information of the user whose identity is to be verified outside the door, so as to verify the identity of the biometric information.
  • Step S22 if target identification information matching the newly connected device information exists in the preset identification set, receiving verification information sent by the terminal corresponding to the target identification information, and determining whether the verification information complies with the real-time collection rule If the verification information complies with the real-time collection rule, the verification information is used as the biometric information of the unlocking requester.
  • the electronic lock determines that there is target identification information in the preset identification set that matches the newly-connected device information, and then the electronic lock receives the target identification information corresponding to the verification information sent by the terminal, and the electronic lock determines whether the verification information conforms to real-time Collection rule, where the real-time collection rule refers to a rule set in advance to determine that the verification information is collected in real time (that is, the verification information is collected at the current time).
  • the real-time collection rule refers to a rule set in advance to determine that the verification information is collected in real time (that is, the verification information is collected at the current time).
  • an electronic lock receives a selfie photo of a face image sent by a terminal. The lock determines that the face image was taken at the current time according to the real-time acquisition rule.
  • the electronic lock After the electronic lock determines that the verification information meets the real-time collection rules, the electronic lock uses the verification information as the biometric information of the unlocking requestor for comparison. This embodiment is to prevent the user ’s mobile phone from being lost. Sending biometric authentication information to the electronic lock for unlocking guarantees both security and convenience.
  • the electronic lock can also receive the verification information sent by the terminal, and when the verification information meets the real-time collection rules, the verification information is compared as biometric information.
  • the specific application scenario is as follows: users bathe at home Suddenly come to the guest, the guest calls the owner to open the door. The owner can collect his fingerprint information on the terminal and send the fingerprint information to the electronic lock for unlocking.
  • the unlocking is controlled by the terminal and is performed with existing terminal application software The essential difference between unlocking is that the existing terminal application software unlocks, but only sends the unlock instruction to the electronic lock, which cannot accurately identify the user.
  • the method for unlocking the access control based on biometrics in this embodiment is more intelligent and secure. , Efficient and convenient.
  • this embodiment of the method for unlocking an access control based on biometrics is further proposed.
  • two specific implementation methods for unlocking an access control based on biometrics are illustrated.
  • the method for unlocking an access control based on biometrics includes:
  • Implementation method 1 When the electronic lock obtains voice information, the specific processing flow includes:
  • step S31 the voice information is input into a preset voice recognition model to obtain voiceprint features and semantic information corresponding to the voice information.
  • the electronic lock inputs the voice information into a preset voice recognition model, analyzes the acquired voice information through the preset voice recognition model, and obtains a voiceprint feature corresponding to the voice information (a voiceprint feature refers to user voice characteristic information) and Semantic information (semantic information refers to the user's speech content, that is, what the user said).
  • the preset speech recognition model refers to a preset algorithm for recognizing a user's voice, for example, a hidden Markov model.
  • the preset speech recognition model aims to recognize speech content corresponding to a speech waveform.
  • the preset speech The recognition model extracts relevant information reflecting the features of the voice from the voice waveform.
  • the preset voice recognition model can extract relevant information of the features of the voice according to the psychological model of the human auditory system, and can also extract the features of the voice according to the principle of the human vocal tract.
  • the electronic lock inputs the voice waveform into a preset voice recognition model, the semantic information (also called text information) corresponding to the voice information is obtained.
  • voice recognition can be performed on the voice information.
  • the voiceprint characteristics corresponding to the voice information are determined to identify the speaker's identity based on the voiceprint characteristics; on the other hand, the text information corresponding to the voice information is determined.
  • the voice information can also be denoised.
  • the specific voice denoising is combined with the existing technology. The details are not described in the examples.
  • Step S32 comparing the voiceprint feature with the target voiceprint corresponding to the target identification information, and comparing the semantic information with the target semantics corresponding to the target identification information;
  • the electronic lock compares the voiceprint feature with the target voiceprint corresponding to the target identification information, that is, in this embodiment, by comparing the user voiceprint feature with the target voiceprint, the identity of the user is achieved based on the voice information.
  • the electronic lock compares the target semantics corresponding to the target identification information of the semantic information, that is, the user can set the unlocking voice in advance, and constantly update the unlocking voice to realize secondary recognition of the user's identity based on the voice information.
  • step S41 if the voiceprint feature matches the target voiceprint and the semantic information matches the target semantics, an unlock operation is performed on the access control.
  • the electronic lock obtains the result of the voice information recognition comparison. If the voiceprint feature matches the target voiceprint and the semantic information matches the target semantics, the electronic lock performs an unlock operation to open the door.
  • This embodiment specifically discloses a specific implementation manner of performing user identity verification and unlocking through voice recognition, and realizing intelligent unlocking based on voice information.
  • Implementation method 2 When the electronic lock obtains face image information, the specific processing flow includes:
  • step S33 the face image information is input into a preset image recognition model, and facial feature data is obtained by processing the preset image recognition model.
  • the electronic lock inputs the face image information into a preset image recognition model, and obtains facial feature data by processing the preset image recognition model, that is, the camera inputs the collected face image into a preset image recognizer.
  • the preset image recognizer can recognize and obtain the face recognition data corresponding to the face image, and the face recognition data (face recognition data: refers to facial features and facial expression data, such as blinking, beaking and other actions related data).
  • the preset image recognizer refers to a model that is preset for facial image recognition training.
  • the preset image recognizer optionally includes an Adaboost iterative algorithm classifier, SVM (Support Vector Machine (Support Vector Machine) classifier; the face image is recognized through a preset image recognizer, and the face recognition data corresponding to the face image is obtained.
  • SVM Serial Vector Machine
  • Step S34 Compare the facial feature data with target feature data corresponding to the target identification information.
  • the electronic lock compares the facial feature data corresponding to the face image with the target feature data corresponding to the target identification information, and realizes the intelligent unlocking of the electronic lock by comparing the facial feature data.
  • step S42 if the facial feature data matches the target feature data, an unlock operation is performed on the access control.
  • the electronic lock obtains a comparison result between the face feature data and the target feature data, and the electronic lock matches the face feature data with the target feature data according to the comparison result, that is, the electronic lock passes the comparison of the face feature data , The electronic lock performs the unlock operation.
  • a second embodiment of the method for unlocking an access control based on biometrics in this application is further proposed.
  • a user can update the identification information in a preset identification set, specifically ,include: Collins
  • Step S50 Receive an identification update request, and obtain update identification information included in the identification update request.
  • the user can input new mobile phone identification information on the mobile phone (or server) to trigger the update instruction in the preset identity set, the electronic lock receives the identity update request, and obtains the update identity information contained in the identity update request, for example, the preset identity
  • the device identification information corresponding to the user with the electronic lock unlock is set in the collection in advance, for example, the mobile phone identification information 1 of Wang xx set by the electronic lock of Wang xx family, the mobile phone identification information 2 of Wang xx wife and the mobile phone identification of Wang xx son Message 3, now Wang xx replaces the mobile phone, and Wang xx's new mobile phone identification information 4, then you need to delete the preset identification set mobile phone identification information 1 and add the mobile phone identification information 4, the user can add the mobile phone identification information 1,
  • the corresponding terminal or server of the mobile phone identification information 2 and mobile phone identification information 3 triggers an identity update request, and updates the identification information carried in the identity update request: mobile phone identification information 4.
  • the electronic lock receives the identification update request and obtains the identification update request, and includes the
  • Step S60 Send the updated identification information to a terminal corresponding to the preset identification information in the preset identification set, so that the terminal corresponds to a user for confirmation.
  • the electronic lock sends the updated identification information to the terminal corresponding to the preset identification information in the preset identification set, that is, the electronic lock sends mobile phone identification information 4 to mobile phone identification information 1, mobile phone identification information 2, mobile phone identification information 3 Corresponding terminal so that the user of the corresponding terminal of the mobile phone identification information 1, the mobile phone identification information 2, and the mobile phone identification information 3 confirms.
  • the corresponding terminals of the mobile phone identification information 1, the mobile phone identification information 2, and the mobile phone identification information 3 confirm the information and return the information to the electronic lock.
  • Step S70 Receive feedback information sent by the terminal, and determine whether to confirm the pass according to the feedback information.
  • the electronic lock receives the feedback information sent by the terminal, and determines whether the confirmation is passed according to the feedback information. That is, when the electronic lock receives the feedback information sent by the terminal, the electronic lock determines whether the user agrees to add the terminal corresponding to the update identification information in the feedback information. .
  • step S80 if the confirmation is passed, the update identification information is added to the preset identification set.
  • the electronic lock adds the updated identification information to the preset identification set.
  • the process of key distribution is realized by updating the information in the preset identification set, and convenient update operations are implemented.
  • multiple terminals can be set to confirm with the user, making the electronic lock more secure. high.
  • An emergency unlock is set in the electronic lock in this embodiment, and specifically includes:
  • Step S90 Receive an emergency unlock instruction, obtain emergency unlock verification information in the emergency unlock instruction, and compare the emergency unlock verification information with preset emergency unlock verification information.
  • An emergency unlock is set in this embodiment. For example, if the newly connected device information obtained by the electronic lock does not match each of the preset identification information in the preset identification set, the electronic lock does not collect biometric information, and therefore does not perform identification unlocking . To ensure the security of electronic locks, if emergency unlocking is required at this time, rely on the server corresponding to the electronic lock (also known as the access control management system). The system triggers the unlock instruction, and the electronic lock obtains the emergency unlock verification information in the emergency unlock instruction, and compares the emergency unlock verification information with preset emergency unlock verification information.
  • step S100 if the emergency unlock verification information matches the preset emergency unlock verification information, an unlock operation is performed on the access control.
  • the electronic lock After the electronic lock determines that the emergency unlock verification information matches the preset emergency unlock verification information, the electronic lock performs an unlocking operation on the access control.
  • An emergency unlock operation is provided in this embodiment.
  • Such an implementation manner not only ensures the security of the access control unlocking method based on biometric recognition, but also ensures the reliability of the access control unlocking method based on biometric recognition.
  • an embodiment of the present application further proposes an access control unlocking device based on biometric identification.
  • the access control unlocking device based on biometric identification includes:
  • a receiving and comparing module 10 configured to receive broadcast information of a router, obtain new device information in the broadcast information, and compare the new device information with each preset identification information in a preset identification set;
  • a matching obtaining module 20 configured to obtain biometric information of an unlocking requester if target identification information matching the newly connected device information exists in the preset identification set;
  • a comparison module 30 configured to compare the biometric information with the target unlock information corresponding to the target identification information
  • the matching and unlocking module 40 is configured to perform an unlocking operation on the access control if the biometric information matches the target unlocking information.
  • the method for unlocking the access control based on biometrics is applied to a smart lock, and the smart lock is communicatively connected to a terminal;
  • the matching acquisition module 20 includes:
  • the smart lock starts a preset collection device if target identification information matching the newly connected device information exists in the preset identification set, and collects an unlock request through the preset collection device Party's biometric information, and / or;
  • a matching receiving unit configured to: if target identification information matching the newly-connected device information exists in the preset identification set, receive verification information sent by the terminal corresponding to the target identification information, and determine whether the verification information meets the requirements A real-time collection rule, and if the verification information meets the real-time collection rule, the verification information is used as the biometric information of the unlocking requester.
  • the biometric information includes voice information
  • the comparison module 30 includes:
  • a voice recognition unit configured to input the voice information into a preset voice recognition model, and obtain voiceprint features and semantic information corresponding to the voice information;
  • a voice comparison unit configured to compare the voiceprint feature with a target voiceprint corresponding to the target identification information, and compare the semantic information with target semantics corresponding to the target identification information;
  • the matching and unlocking module 40 is further configured to perform an unlocking operation on the access control if the voiceprint feature matches the target voiceprint and the semantic information matches the target semantics.
  • the biometric information includes face image information
  • the comparison module 30 includes:
  • An information input unit configured to input the face image information into a preset image recognition model, and obtain facial feature data by processing the preset image recognition model;
  • a feature comparison unit configured to compare the facial feature data with target feature data corresponding to the target identification information
  • the matching and unlocking module 40 is further configured to perform an unlocking operation on the access control if the facial feature data matches the target feature data.
  • the access control unlocking device based on biometric identification includes:
  • a receiving update module configured to receive an identification update request, and obtain update identification information included in the identification update request
  • An update confirmation module configured to send the update identification information to a terminal corresponding to the preset identification information in the preset identification set, so that the terminal corresponds to a user for confirmation;
  • a receiving and judging module configured to receive feedback information sent by the terminal, and determine whether to confirm the pass according to the feedback information
  • a confirmation adding module is configured to add the update identification information to the preset identification set if the confirmation is passed.
  • the access control unlocking device based on biometric identification includes:
  • An obtaining module configured to obtain new biometric information if the biometric information does not match the target unlock information
  • a comparison determination module configured to compare the new biometric information with the target unlock information until the new biometric information matches the target unlock information, or until the number of comparisons exceeds a preset number Threshold, when it is detected that the number of comparisons exceeds the preset threshold, a prompt message is generated and sent to a preset terminal.
  • the access control unlocking device based on biometric identification includes:
  • a receiving instruction module configured to receive an emergency unlock instruction, obtain emergency unlock verification information in the emergency unlock instruction, and compare the emergency unlock verification information with preset emergency unlock verification information;
  • the matching unlocking module is configured to perform an unlocking operation on the access control if the emergency unlocking verification information matches the preset emergency unlocking verification information.
  • an embodiment of the present application also provides a computer storage medium.
  • Computer-readable instructions are stored on the computer storage medium, and when the computer-readable instructions are executed by a processor, the operations in the method for unlocking an access control based on biometric recognition provided by the foregoing embodiment are implemented.
  • the device embodiment since it is basically similar to the method embodiment, it is described relatively simply. For the relevant part, refer to the description of the method embodiment.
  • the device embodiments described above are merely schematic, and the units described as separate components may or may not be physically separated. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this application. Those of ordinary skill in the art can understand and implement without creative efforts.
  • the methods in the above embodiments can be implemented by means of software plus a necessary universal hardware platform, and of course, also by hardware, but in many cases the former is better.
  • Implementation Based on such an understanding, the technical solution of this application that is essentially or contributes to the existing technology can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium (such as ROM / RAM) as described above. , Magnetic disk, optical disc), including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in the embodiments of the present application.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

L'invention concerne un procédé de déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique et un appareil, un dispositif et un support de déverrouillage de contrôle d'accès, le procédé comprenant les étapes suivantes consistant à : recevoir des informations de diffusion d'un routeur, acquérir des informations de dispositif nouvellement connecté dans les informations de diffusion et comparer les informations de dispositif nouvellement connecté avec chaque information d'identification prédéfinie d'un ensemble d'identification prédéfini (S10) ; si des informations d'identification cibles correspondant aux informations de dispositif nouvellement connecté existent dans l'ensemble d'identification prédéfini, acquérir des informations biométriques d'un demandeur de déverrouillage (S20) ; comparer les informations biométriques avec des informations de déverrouillage cibles correspondant aux informations d'identification cibles (S30) ; si les informations biométriques correspondent aux informations de déverrouillage cibles, effectuer une opération de déverrouillage d'un contrôle d'accès (S40). L'invention permet ainsi d'améliorer l'efficacité et la sécurité du déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique.
PCT/CN2018/122624 2018-08-31 2018-12-21 Procédé, appareil, dispositif et support de déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique WO2020042463A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811009650.7A CN109389711A (zh) 2018-08-31 2018-08-31 基于生物特征识别的门禁解锁方法、装置、设备和介质
CN201811009650.7 2018-08-31

Publications (1)

Publication Number Publication Date
WO2020042463A1 true WO2020042463A1 (fr) 2020-03-05

Family

ID=65418526

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/122624 WO2020042463A1 (fr) 2018-08-31 2018-12-21 Procédé, appareil, dispositif et support de déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique

Country Status (2)

Country Link
CN (1) CN109389711A (fr)
WO (1) WO2020042463A1 (fr)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225406A (zh) * 2019-03-28 2019-09-10 郑州朝虹科技有限公司 一种智能电视控制系统
CN110164017A (zh) * 2019-06-05 2019-08-23 福建深视智能科技有限公司 一种二次智能解锁的方法及终端
CN110766844A (zh) * 2019-12-30 2020-02-07 恒大智慧科技有限公司 智慧社区内门禁的身份识别方法、设备及可读存储介质
CN111275855A (zh) * 2020-01-17 2020-06-12 珠海格力电器股份有限公司 一种门锁控制方法、装置、系统、电子设备及存储介质
CN112562137B (zh) * 2020-12-25 2022-11-18 珠海格力电器股份有限公司 解锁指令同步方法、装置、电子设备和存储介质
CN113763620B (zh) * 2021-09-14 2023-07-18 孟琦 组合门禁、用于控制组合门禁的方法及装置、存储介质
CN115841715B (zh) * 2022-12-19 2023-09-19 厦门狄耐克智能交通科技有限公司 一种基于人脸识别的智能家居系统及使用方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617659A (zh) * 2013-11-01 2014-03-05 南京物联传感技术有限公司 一种无线开锁方法
CN206438851U (zh) * 2016-12-21 2017-08-25 深圳大学 智能远程门锁报警装置
CN107424249A (zh) * 2017-04-19 2017-12-01 南京穆尊信息科技有限公司 智能电子锁系统及其蓝牙开锁方法
US20180040184A1 (en) * 2015-06-22 2018-02-08 Schlage Lock Company Llc Multifunctional access control device
CN108305360A (zh) * 2018-01-16 2018-07-20 厦门中控智慧信息技术有限公司 门禁控制方法和相关装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203882365U (zh) * 2014-06-12 2014-10-15 武汉九万里科技有限公司 一种基于无线网络的智能锁、智能锁系统
US9530264B2 (en) * 2014-12-15 2016-12-27 Assa Abloy Inc. Using low power radio to control a higher power communication interface
CN104851167A (zh) * 2015-05-14 2015-08-19 深圳市家信信息科技开发有限公司 一种非接触式开锁方法和锁体装置
CN108171847A (zh) * 2018-01-04 2018-06-15 北京神器科技有限公司 一种门禁设备的解锁方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617659A (zh) * 2013-11-01 2014-03-05 南京物联传感技术有限公司 一种无线开锁方法
US20180040184A1 (en) * 2015-06-22 2018-02-08 Schlage Lock Company Llc Multifunctional access control device
CN206438851U (zh) * 2016-12-21 2017-08-25 深圳大学 智能远程门锁报警装置
CN107424249A (zh) * 2017-04-19 2017-12-01 南京穆尊信息科技有限公司 智能电子锁系统及其蓝牙开锁方法
CN108305360A (zh) * 2018-01-16 2018-07-20 厦门中控智慧信息技术有限公司 门禁控制方法和相关装置

Also Published As

Publication number Publication date
CN109389711A (zh) 2019-02-26

Similar Documents

Publication Publication Date Title
WO2020042463A1 (fr) Procédé, appareil, dispositif et support de déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique
WO2019144738A1 (fr) Procédé de vérification de service financier, appareil et dispositif, et support d'informations informatique
WO2019143210A1 (fr) Dispositif électronique d'authentification d'utilisateur à l'aide d'un signal audio et procédé associé
WO2013100699A1 (fr) Procédé, appareil et support d'enregistrement lisible par ordinateur pour authentifier un utilisateur
WO2018072567A1 (fr) Procédé et système d'appel à l'aide d'urgence basés sur une identification par empreinte digitale pour un terminal mobile, et terminal mobile
WO2016129930A1 (fr) Procédé de fonctionnement pour une fonction vocale et dispositif électronique le prenant en charge
WO2016204466A1 (fr) Procédé d'authentification d'utilisateur et dispositif électronique prenant en charge ce procédé
WO2020207035A1 (fr) Procédé, appareil et dispositif d'interception de canular téléphonique, et support d'informations
WO2015126135A1 (fr) Procédé et appareil de traitement d'informations biométriques dans un dispositif électronique
WO2020159288A1 (fr) Dispositif électronique et son procédé de commande
WO2022019693A1 (fr) Procédé d'authentification d'utilisateur non présentielle fondée sur un identifiant décentralisé (did) utilisant un justificatif d'identité vérifiable (vc) d'authentification d'utilisateur non présentielle, et serveur de prise en charge d'authentification l'utilisant
WO2020017706A1 (fr) Dispositif électronique et procédé pour le commander
WO2016000307A1 (fr) Procédé et système de lancement d'un mode utilisateur sur un terminal mobile, basés sur l'identification de l'iris
WO2020000637A1 (fr) Procédé, appareil et dispositif de commande d'équipement à base de son, et support d'informations
WO2017071363A1 (fr) Procédé de partage de mot de passe, système de partage de mot de passe, et dispositif terminal
EP3900310A1 (fr) Procédé d'inférence d'emplacement d'un dispositif ido, serveur, et dispositif électronique le prenant en charge
WO2017161832A1 (fr) Procédé de commande d'ascenseur, dispositif de commande d'ascenseur, et terminal
WO2019051898A1 (fr) Procédé et appareil de commande de dispositif, et support d'informations lisible par ordinateur
WO2022098189A1 (fr) Système d'authentification d'identité utilisant des informations biométriques d'utilisateur
WO2023128342A1 (fr) Procédé et système d'identification d'un individu à l'aide d'une voix chiffrée de manière homomorphe
WO2020206899A1 (fr) Procédé, appareil et dispositif de vérification d'identité basée sur un horodatage, et support d'informations
WO2023128345A1 (fr) Procédé et système d'identification personnelle utilisant une image chiffrée de manière homomorphe
WO2016006831A1 (fr) Serrure de porte mettant en oeuvre la reconnaissance de l'iris et système associé, terminal de communication mobile et passerelle de réseau mise en oeuvre dans ledit terminal, et procédé d'authentification d'utilisateur associé
KR20160072386A (ko) 특징점을 기반으로 한 얼굴 인식을 이용한 홈네트워크 시스템 및 그 제어 방법
CN106846557A (zh) 通过无线路由器实现的门禁管理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18932238

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/06/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18932238

Country of ref document: EP

Kind code of ref document: A1