Two-dimensional code access control system based on face feature values, and running method thereof

A face feature and control system technology, applied in the field of access control based on biometrics, can solve problems such as theft of two-dimensional codes and the inability to verify the legality of the two-dimensional code holder's identity, so as to improve security and ensure convenience Effect

Inactive Publication Date: 2018-12-04
一石数字技术成都有限公司
View PDF11 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to realize the dual verification of the QR code for entering / exiting the access control and the holder of the QR code at the same time, and solve the problem that the QR code existing in the existing access control system is forwarded and embezzled at will, and the QR code cannot be held The problem of verifying the legality of the identity of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code access control system based on face feature values, and running method thereof
  • Two-dimensional code access control system based on face feature values, and running method thereof
  • Two-dimensional code access control system based on face feature values, and running method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0046] The two-dimensional code registration request carries the user's face image (such as selfie, registration photo, etc.) and the user's personal information (generally including name, phone number, address, ID number); the background server verifies the personal information, The face image is also sent to the front-end recognition processing device, so that the front-end recognition processing device extracts the face feature information of the face image, specifically, the background server sends the face image to the front-end recognition processing device, and also sends the front-end recognition processing device The processing device sends an instruction to analyze the face image. After receiving the analysis instruction, the front-end recognition processing device extracts the face feature information from the face image sent by the acquired server, and sends the extracted face feature information to the background server; the background server According to the face ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-dimensional code access control system based on face feature values, and a running method thereof. The system includes a user terminal, and an image collecting device, afront end identifying and processing device and a background server which are sequentially connected. The running method of the system comprises the following steps: a user sends a two-dimensional code registration request to the background server through the user terminal; the background server sends an access control two-dimensional code to the user terminal according to the request; the image collecting device collects the face image of the user and an access control two-dimensional code image; the front end identifying and processing device extracts face feature information of the face image, parses the face feature information included in the access control two-dimensional code image and compares the similarity between the two pieces of the face feature information, and the backgroundserver verifies the validity of the access control two-dimensional code; and after the similarity meets conditions and the validity verification of the access control two-dimensional code is passed,an access control is controlled to be open. The validity of the two-dimensional code user and the validity of the used two-dimensional code are verified based on the information provided by the user in order to perform security management of the access control.

Description

technical field [0001] The invention relates to the field of access control based on biometric identification, in particular to a two-dimensional code access control system and operating method based on facial feature values. Background technique [0002] QR code access control is a new type of access control application technology that has emerged following the development of smart phone terminals, computer network technology, and Internet of Things technology. Two-dimensional code, namely QR Code (Quick Response Code), is a coding method that has been widely used on mobile devices in recent years. It can store more information than traditional bar codes (Bar Code), and can also represent More data types, such as: characters, numbers, Chinese and so on. Due to the generation of the two-dimensional code, the production cost is low and the convenience is good, and it has gradually been widely used in the access control system. [0003] Commonly used two-dimensional code acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00563
Inventor 王泽民卢荣新施国鹏
Owner 一石数字技术成都有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products