Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication method and device with monitoring and safety warning functions

A technology of user authentication and safety warning, applied in the direction of alarm, instrument, character and pattern recognition, etc., can solve the problems of not being able to report in time, and achieve the effects of timely alarm and early prevention

Inactive Publication Date: 2018-11-06
TIANJIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users often ignore the potential safety hazards that may exist around them during access operations such as identity authentication information entry, making it easier for criminals to commit acts of infringement, robbery, and peeping information from behind the operator, and once threatened, they cannot report to the police in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device with monitoring and safety warning functions
  • User authentication method and device with monitoring and safety warning functions
  • User authentication method and device with monitoring and safety warning functions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] refer to figure 1 , the user authentication method with monitoring and security warning functions provided by this embodiment is as follows:

[0039] Step S10, the user accesses the self-service terminal.

[0040] In step S20, the camera is turned on to collect real-time images within a certain distance from the user's side and behind and transmit them to the server through the terminal processor for image recognition and analysis in real time.

[0041] In this step, the camera starts to work when the user starts to input identity authentication information. More common is a camera equipped with an infrared sensor module, which can be triggered to start when a human body approaches. The camera collects real-time images within a certain distance from the user's side and behind and sends them to the server for image recognition and analysis. It should be understood that the monitoring range of the above-mentioned camera for image data collection can be set artificially...

Embodiment 2

[0050] Further, refer to figure 2 , in order to enable users to call the police in time when they realize that there may be danger, instead of just acting as a danger reminder, this embodiment further includes step S60 on the basis of embodiment 1: when the server collects from the camera When a human body image other than the user is recognized in the image, the corresponding selection button control can also be displayed through the preset display device of the self-service terminal for the user to choose whether to send an alarm request.

[0051] In this embodiment, the display device preset at the self-service terminal can display corresponding alarm selection button controls for the human body images appearing in the monitoring screen for the user to choose whether to alarm. Once the user thinks that the (suspicious) person may constitute a The threat can send an alarm request in time through the button, so as to avoid the situation that the alarm cannot be reported in t...

Embodiment 3

[0053] In order to ensure that the user can report to the police at any time when there are other (suspicious) personnel in the monitoring range, this embodiment also includes step S70 ( image 3 ): After the user sends a non-alarm request by selecting the button control, the display device continues to display the button control available for alarm until the user ends the visit or the human body image in the monitoring screen disappears.

[0054] For the situation where the user is careless, misjudged or even sends a non-alarm request due to a wrong button click, this step gives the user the opportunity to continue to alarm by reserving the button control available for alarm on the display device. When the user finishes the visit and leaves, the camera turns off automatically, and the server receives the corresponding information, controls the display device to cancel the display button control and closes the monitoring screen. It should be understood that, when the personnel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authentication method and device which can be used for a series of intelligent self-service terminal equipment such as automatic counter personnel machines and electronic access control and have monitoring and safety warning functions. The method includes: determining, by a server, whether user identity authentication information matches pre-stored information, and if yes, confirming that authentication is successful; controlling a self-service terminal by a terminal processor to execute corresponding operations after successful authentication; carrying out real-time image collection in a certain distance range beside and behind the user by a camera while a user carries out access operations, and transmitting the same to the server for image recognition analysis; and sending image data after analysis to the terminal processor, and carrying out real-time display through preset display equipment of the self-service terminal. According to the method, the user is enabled to conveniently observe hidden safety troubles, which may exist around the same, while the access operations are carried out, precaution is facilitated, and in addition, the user can alsobe enabled to raise the alarm in time when a hidden safety trouble is perceived.

Description

technical field [0001] The invention relates to the field of security monitoring, in particular to a user authentication method and device with monitoring and security warning functions. Background technique [0002] At present, a series of intelligent self-service terminal equipment such as automatic teller machines and electronic access control are more and more widely used. However, users often ignore the potential safety hazards that may exist around them during access operations such as identity authentication information entry, making it easier for criminals to commit acts of infringement, robbery, and peeping information from behind the operator, and once threatened, they cannot report to the police in time . Contents of the invention [0003] In view of the above problems, the present invention provides a user authentication method and device with monitoring and security warning functions, which can be applied to self-service terminals involving access authority c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G08B21/02
CPCG08B21/0297G06V20/52
Inventor 尹天翊张龙威林致远郑小慎于洋胡瑜苏仕见张泽豫
Owner TIANJIN UNIVERSITY OF SCIENCE AND TECHNOLOGY