Nothing Special   »   [go: up one dir, main page]

CN111949966B - Encryption and unlocking method, server, terminal and lock - Google Patents

Encryption and unlocking method, server, terminal and lock Download PDF

Info

Publication number
CN111949966B
CN111949966B CN202010883932.0A CN202010883932A CN111949966B CN 111949966 B CN111949966 B CN 111949966B CN 202010883932 A CN202010883932 A CN 202010883932A CN 111949966 B CN111949966 B CN 111949966B
Authority
CN
China
Prior art keywords
unlocking
server
terminal
lock
face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010883932.0A
Other languages
Chinese (zh)
Other versions
CN111949966A (en
Inventor
王红宾
吕昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yitu Technology Co ltd
Original Assignee
Shanghai Yitu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yitu Technology Co ltd filed Critical Shanghai Yitu Technology Co ltd
Priority to CN202010883932.0A priority Critical patent/CN111949966B/en
Publication of CN111949966A publication Critical patent/CN111949966A/en
Application granted granted Critical
Publication of CN111949966B publication Critical patent/CN111949966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Software Systems (AREA)
  • Biomedical Technology (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Collating Specific Patterns (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an encryption and unlocking method, a server, a terminal and a lock, wherein the encryption method comprises the following steps: acquiring an unlocking request sent by at least one terminal; acquiring at least two face images sent by a terminal; performing living body detection on at least two face images; extracting features of a face image detected by a living body, and comparing the extracted features with a plurality of face features stored in advance; and when the comparison result shows that the plurality of authority users have the identical faces in the face images acquired from the terminal by the server, sending an unlocking instruction. According to the method, the face characteristics are compared, and when all authority users have consistent faces in the face images acquired from the terminal by the server, unlocking is performed, so that the real-time remote unlocking of the cooperation of multiple persons is realized, the unlocking safety is ensured, and the requirements of online and real-time remote unlocking are met.

Description

Encryption and unlocking method, server, terminal and lock
Technical Field
The invention relates to the field of face recognition, in particular to an encryption and unlocking method, a server, a terminal and a lock.
Background
The common encryption mode has a plurality of inconveniences, and the risks of incapability of unlocking, such as key loss and forgetting of the password, of the key lock and the password lock, can be caused. Along with the development of computer vision, the face encryption and unlocking are applied to various aspects of life and production, namely, the mobile phone is used for locking a screen, and the door control system is large, so that the face is fully illustrated to be widely applied to the field of biological characteristic locking.
However, prior art face unlocking applications are limited to single person scenarios. In some specific situations, however, single person operation may carry risks such as lack of consensus or override. The prior art also develops multi-person collaborative unlocking, and usually, the password is managed by a plurality of persons, so that real-time multi-person collaborative unlocking cannot be performed remotely.
Disclosure of Invention
In order to solve the problems of the prior art, at least one embodiment of the present invention provides an encryption, unlocking method, a server, a terminal, and a lock, which solve the various problems mentioned in the background section above.
In a first aspect, an embodiment of the present invention provides an unlocking method, including: the method comprises the steps that a server obtains an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock; the server acquires at least two face images sent by the terminal; the server performs living body detection on the at least two face images; extracting features of a face image detected by a living body, and comparing the extracted features with a plurality of face features stored in advance, wherein the plurality of face features are face features of a plurality of authority users associated with the identification information of the lock; and when the comparison result shows that the plurality of right users have identical faces in the face images obtained by the server from the terminal, the server sends an unlocking instruction.
In some embodiments, the unlocking is terminated when one of the face images acquired by the server fails the live detection.
In some embodiments, when the comparison result is that the extracted features are inconsistent with the face features of the plurality of authority users stored in advance, the unlocking is terminated.
In some embodiments, further comprising: after the unlocking request is obtained, the server obtains the information of the associated authority user according to the identification information of the lock; the server sends reminding information to the associated user according to the information of the associated authority user, wherein the reminding information comprises one or more of the following: unlocking progress and abnormal information.
In some embodiments, the anomaly information includes one or more of the following: and the living body detection failure information and the face feature comparison failure information.
In some embodiments, the server sends a reminder to the associated rights user according to the information of the associated rights user as: and the server instructs the terminal to create a session, and the reminding information is displayed through the session.
In some embodiments, after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, the unlocking is terminated.
In a second aspect, an embodiment of the present invention further provides an encryption method, including: the method comprises the steps that a server obtains a registration request, wherein the registration request carries identification information of a lock to be encrypted; the server acquires at least two face images sent by at least one terminal, wherein the at least two face images are associated with the identification of the lock to be encrypted; the server performs living body detection on the at least two face images; extracting features of the at least two face images after passing the living body detection; establishing an association relationship between the identification of the lock to be encrypted and the characteristics of the at least two face images, so that a user corresponding to the characteristics of the at least two face images is a right user, and the right user can unlock the lock through the server; and encrypting the lock according to the association relation.
In some embodiments, the at least one terminal includes a first terminal and a second terminal, and the server acquires at least two face images sent by the at least one terminal, including: the method comprises the steps that the server obtains a first face image sent by a first terminal, wherein the first face image comprises at least one face image; the server acquires a second face image sent by a second terminal, wherein the second face image comprises at least one face image; the method further comprises the steps of: and the server sends the first face image to the second terminal and sends the second face image to the first terminal.
In some embodiments, further comprising: the server acquires confirmation information of the second face image sent by the first terminal; and the server acquires the confirmation information of the first face image sent by the second terminal.
In some embodiments, further comprising: the server stores the facial image characteristics of the authorized user; and the server stores the association relation between the identification of the lock to be encrypted and the characteristics of the face image of the authorized user.
In a third aspect, an embodiment of the present invention further provides a server, including an unlocking device, where the unlocking device includes: the first acquisition module is used for acquiring an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock; the first acquisition module is further used for acquiring at least two face images sent by the terminal; the first living body detection module is used for carrying out living body detection on the at least two face images; the comparison module is used for extracting the characteristics of the face image detected by the living body, and comparing the extracted characteristics with a plurality of face characteristics stored in advance, wherein the plurality of face characteristics are the face characteristics of a plurality of authority users associated with the identification information of the lock; and the unlocking module is used for sending an unlocking instruction by the server when the comparison result of the comparison module is that the plurality of right users have identical faces in face images obtained by the server from the terminal.
In some embodiments, the method further comprises a terminating unlocking module, configured to terminate unlocking when one face image acquired by the server fails to pass through the live detection; or stopping unlocking when the comparison result is that the extracted features are inconsistent with the face features of the prestored multiple authority users; or after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, stopping unlocking.
In some embodiments, the first obtaining module is further configured to obtain information of the associated rights user according to identification information of the lock; the server also comprises a first sending module, which is used for sending reminding information to the associated user, wherein the reminding information comprises one or more of the following: unlocking progress and abnormal information.
In some embodiments, further comprising an encryption device comprising: the second acquisition module is further used for acquiring a registration request, wherein the registration request carries identification information of a lock to be encrypted; the second acquisition module is further configured to acquire at least two face images sent by at least one terminal, where the at least two face images are associated with the identifier of the lock to be encrypted; the second living body detection module is used for carrying out living body detection on the at least two face images; a second feature extraction module for extracting features of the at least two face images after passing through the living body detection; the association relation establishing module is used for establishing association relation between the identification of the lock to be encrypted and the characteristics of the at least two face images, so that the user corresponding to the characteristics of the at least two face images is an authorized user, and the authorized user can unlock the lock through the server; and the encryption module is used for encrypting the lock according to the association relation.
In some embodiments, the second acquisition module is further configured to: acquiring a first face image sent by a first terminal, wherein the first face image comprises at least one face image; acquiring a second face image sent by a second terminal, wherein the second face image comprises at least one face image; the encryption device further includes: and the second sending module is used for sending the first face image to the second terminal and sending the second face image to the first terminal.
In some embodiments, the second acquisition module is further configured to: acquiring confirmation information of the second face image sent by the first terminal; and acquiring the confirmation information of the first face image sent by the second terminal.
In some embodiments, the server further comprises: the storage module is used for storing the facial image characteristics of the authority user and storing the association relation between the identification of the lock to be encrypted and the characteristics of the facial image of the authority user.
In a fourth aspect, an embodiment of the present invention further provides an unlocking method, including: the terminal acquires a request of a user for unlocking, and the unlocking instruction carries identification information of the lock; the terminal sends an unlocking request to a server, wherein the unlocking request carries identification information of a lock; the terminal acquires images acquired by image acquisition equipment connected with the terminal and acquires face images therefrom; the terminal sends the face image to the server so that the server compares the face image with face features of at least two authority users associated with the identification information of the lock; the terminal acquires an unlocking instruction sent by the server; and the terminal communicates with the lock according to an unlocking instruction sent by the server, and performs unlocking operation on the lock.
In some embodiments, when the image acquired by the image acquisition device includes at least two face images at the same time, the acquiring face images therefrom specifically includes: collecting the at least two face images; the terminal sends the face image to the server, and specifically comprises the following steps: and sending the at least two face images to the server.
In some embodiments, further comprising: and sending the invitation information to other authority users so that the other authority users can cooperatively unlock according to the invitation information.
In some embodiments, further comprising: obtaining reminding information sent by the server, wherein the reminding information comprises one or more of the following: unlocking progress and abnormal information.
In some embodiments, further comprising: and acquiring a terminating unlocking instruction sent by the server, wherein the terminating unlocking instruction is sent to the terminal by the server under a preset condition.
In a fifth aspect, an embodiment of the present invention further provides an encryption method, including: the terminal sends a registration request to a server, wherein the registration request carries identification information of a lock to be encrypted; the terminal acquires images acquired by an image acquisition device connected with the terminal and acquires face images therefrom; transmitting the face image to the server, wherein the face image is associated with the identification information of the lock to be encrypted; acquiring an encryption instruction sent by the server, wherein the encryption instruction is sent by the server after establishing an association relation between the identification of the lock to be encrypted and at least two facial image features, and at least one of the at least two facial image features is a feature of a facial image sent by the terminal; and carrying out communication with the lock to be encrypted according to the encryption instruction, and carrying out encryption operation on the lock.
In some embodiments, when the image acquired by the image acquisition device includes at least two face images at the same time, the acquiring face images therefrom specifically includes: collecting the at least two face images; the sending the face image to the server specifically includes: and sending the at least two face images to the server.
In some embodiments, further comprising: and sending the invitation information to other users so that the other users can send face images of the other users to a server for collaborative encryption according to the invitation information.
In some embodiments, further comprising: acquiring face images of the other users sent to the server by the other users; and sending confirmation or non-confirmation information of the face images of the other users according to the instruction of the users.
In a sixth aspect, an embodiment of the present invention further provides a terminal, including an unlocking device, where the unlocking device includes: the third acquisition module is used for acquiring a request of a user for unlocking, and the unlocking instruction carries identification information of the lock; the third sending module is used for sending an unlocking request to the server, wherein the unlocking request carries the identification information of the lock; the third acquisition module is further used for acquiring images acquired by the image acquisition equipment connected with the terminal and acquiring face images therefrom; the third sending module is further configured to send the face image to the server, so that the server compares the face image with face features of at least two authorized users associated with the identification information of the lock; the third acquisition module is further used for acquiring an unlocking instruction sent by the server; the third sending module is further configured to communicate with the lock according to an unlocking instruction sent by the server, and perform an unlocking operation on the lock.
In some embodiments, the third sending module is further configured to send the invitation information to other rights users, so that the other rights users can perform collaborative unlocking according to the invitation information.
In some embodiments, the third obtaining module is further configured to obtain reminder information sent by the server, where the reminder information includes one or more of the following: unlocking progress and abnormal information.
In some embodiments, the third obtaining module is further configured to obtain a termination unlocking instruction sent by the server, where the termination unlocking instruction is sent by the server to the terminal under a preset condition.
In some embodiments, further comprising an encryption device comprising: a fourth sending module, configured to send a registration request to a server, where the registration request carries identification information of a lock to be encrypted; the fourth acquisition module is used for acquiring images acquired by the image acquisition device connected with the fourth acquisition module and acquiring face images from the images; the fourth sending module is further configured to send the face image to the server, where the face image is associated with identification information of the lock to be encrypted; the fourth obtaining module is further configured to obtain an encryption instruction sent by the server, where the encryption instruction is sent by the server after an association relationship between the identifier of the lock to be encrypted and at least two facial image features is established, and at least one of the at least two facial image features is a feature of a facial image sent by the terminal; the fourth sending module is further configured to communicate with the lock to be encrypted according to the encryption instruction, and perform encryption operation on the lock.
In some embodiments, the fourth sending module is further configured to send invitation information to other users, so that the other users can send face images of the other users to a server according to the invitation information to perform collaborative encryption.
In some embodiments, the fourth obtaining module is further configured to obtain the face image of the other user sent by the server and sent to the server by the other user; the fourth sending module is further configured to send confirmation or non-confirmation information of the face image of the other user according to a user instruction.
In a seventh aspect, an embodiment of the present invention further provides a lock, including a lock body, a communication unit, and a processor, where the communication unit communicates with the terminal in any one of the sixth aspect, and the processing unit encrypts or unlocks the lock body according to information acquired by the communication unit.
In an eighth aspect, an embodiment of the present invention further provides a computer apparatus, including: the system comprises at least one processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete communication with each other through the communication bus; a memory coupled to the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of the first, second, fourth or fifth aspects described above to be implemented.
In a ninth aspect, an embodiment of the present invention further provides a chip, configured to perform the method in the first aspect. Specifically, the chip includes: a processor for calling and running a computer program from a memory, such that a device on which the chip is mounted is for performing the method of the first, second, fourth or fifth aspect described above.
In a tenth aspect, embodiments of the present invention also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method as in the first, second, fourth or fifth aspects above.
In an eleventh aspect, embodiments of the present invention also provide a computer program product comprising computer program instructions for causing a computer to perform the method of the first, second, fourth or fifth aspects described above.
Therefore, the unlocking method of the embodiment of the invention compares the facial image characteristics sent by the extraction terminal with the facial characteristics of the plurality of stored authority users, and unlocks when all authority users have identical faces in the facial images acquired by the server from the terminal, thereby realizing the real-time remote unlocking of the cooperation of a plurality of persons, ensuring the unlocking safety on one hand and meeting the requirements of online and real-time remote unlocking of various scenes on the other hand. According to the encryption method, the face image features sent by the terminal are associated with the lock to be encrypted, so that the unlocking operation can be performed only after all right users associated with the lock perform online coordination.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an embodiment of an unlocking method of the present invention;
FIG. 2 is a flow chart of an embodiment of the encryption method of the present invention;
FIG. 3 is a block diagram illustrating an unlocking mechanism of a server according to an embodiment of the present invention;
FIG. 4 is a block diagram illustrating an encryption device of a server according to an embodiment of the present invention;
FIG. 5 is a flowchart of an unlocking method according to an embodiment of the present invention;
FIG. 6 is a flow chart of an embodiment of the encryption method of the present invention;
FIG. 7 is a block diagram illustrating an unlocking apparatus of a terminal according to an embodiment of the present invention;
FIG. 8 is a block diagram illustrating an embodiment of an encryption device for a terminal according to the present invention;
Fig. 9 is a basic structural block diagram of the computer device of the present embodiment.
Detailed description of the preferred embodiments
The application will be described in detail below with reference to the drawings and the specific embodiments so that the objects, features and advantages of the application will be more clearly understood. It should be understood that the aspects described below in conjunction with the drawings and detailed embodiments are merely exemplary and should not be construed as limiting the scope of the application in any way. The singular forms "a," "an," and "the" include plural referents unless the context clearly dictates otherwise. As used in this disclosure, the terms "first" and "second" are used interchangeably to distinguish one type of element from another or another type, respectively, and are not intended to represent the location or importance of the individual elements.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In order to make the person skilled in the art better understand the solution of the present application, the technical solution of the embodiment of the present application will be clearly and completely described below with reference to the accompanying drawings.
In some specific situations, the multi-face collaborative encryption unlocking is a very practical technical scheme. For example, in the protection of important public equipment of enterprises, common property of couples, important secrets of collective, large payment management and the like, certain decisions can be made on the basis of the consensus among multiple people, and the collaborative encryption unlocking scheme of the multiple faces can effectively and conveniently maintain the consensus protocol so as to ensure the collective benefit. However, the prior art cannot meet the real-time remote multi-user collaborative unlocking, and the present inventors propose the following specific ways to solve the above problems.
In a first aspect, an embodiment of the present invention provides an unlocking method, fig. 1 is a flowchart of a specific embodiment of the unlocking method of the present invention, and according to the method shown in fig. 1, the method of the present embodiment includes:
Step 110, the server obtains an unlocking request sent by at least one terminal, where the unlocking request carries identification information of a lock. In this step, the server obtains the unlocking request sent by the terminal, and it can be understood that the multi-user collaborative unlocking includes at least two authority users, and it can be set that only when all authority users perform collaboration, the unlocking can be completed, or it can also be set that all authority users are not required, for example, a certain proportion of people are preset to complete collaborative unlocking, or the authority users are set with levels, and different unlocking weights are given to authority users with different levels. The embodiment is not limited to this, and for convenience of description, the embodiment of the application takes the case that all right users cooperate to complete unlocking. The authority user is a user with unlocking authority, and in the embodiment of the application, the server confirms the authority user through facial image feature comparison. The specific method for extracting the facial image features and comparing the facial image features can be performed by adopting the existing and future technologies, and the embodiment of the application is not limited to the existing and future technologies.
In an embodiment of the present application, it is understood that a server may manage a plurality of locks, and for each individual lock, the locks may be distinguished by, for example, a serial number, or identification information. Taking one lock as an example, the server can store the face image feature of the authority user corresponding to the lock and the association relation between the lock and the authority user, namely the face feature, for the lock in advance, and the pre-storage process can be realized by an encryption process, and can be particularly seen in a specific embodiment corresponding to fig. 2. It will be appreciated that in describing embodiments of the present application, the rights user stored in the server, that is, the face features or face image features comprising the rights user, are sometimes not distinguished from each other.
However, in any mode, the unlocking request sent by the terminal can carry the identification information of the lock, so that the server can implement the subsequent unlocking step according to the association relationship between the pre-stored lock and the authorized user.
And 120, the server acquires at least two face images sent by the terminal. It can be understood that at least two users participating in collaborative unlocking, that is, at least two authorized users associated with one lock, are provided, but the server side is not limited to whether the at least two users are performed through the same terminal or different terminals when the collaborative unlocking is performed. For example, each user may perform cooperative unlocking through a respective terminal, or at least two users may perform cooperative unlocking through the same terminal, which is not limited by the present application.
Therefore, the server may receive at least two face images sent by at least one terminal, and the server may acquire one face image from each of the two terminals in the cooperative unlocking process, or acquire face images from two or more terminals respectively in the cooperative unlocking process, acquire one face image sent by the terminal from some of the terminals, and acquire a plurality of face images sent by the terminal from another of the terminals. The server acquires several face images from several terminals, respectively, which are determined by the operations of the terminal users participating in the cooperative unlocking, and the server is not limited thereto. However, in the collaborative unlocking process, the server receives at least two face images sent by the terminal, so that the server can conveniently identify which lock of the locks managed by the server is subjected to collaborative unlocking operation, and the face images sent by the terminal and received by the server can all carry the identification number of the lock to be unlocked.
Step 130, the server performs living body detection on the at least two face images; in this step, the server performs living body detection on at least two received face images. The living body detection can specifically employ various prior art techniques including various anti-attack techniques and the like. The server can perform living detection when a face image is obtained, or can perform living detection after the face image with the same number of authorized users is obtained.
After the biopsy has passed, subsequent steps may be performed. And when the acquired face image fails to pass through the living body detection, the server can make a decision to terminate unlocking. Meanwhile, the server can send the information of stopping unlocking to the users participating in collaborative unlocking. Specifically, the server may select a reserved contact address, such as a cell phone number, a mailbox number, or the server may send the information to a terminal participating in collaborative unlocking, where the information is sent to the user by a variety of methods, for example, the server may send the information to a reserved contact address of the authorized user of the lock. Further, the server may instruct the terminal to create a session through which information to be transmitted is displayed. This way, the user can be informed about the possible abnormality or risk by obtaining information or progress about the unlocking at any time.
It can be understood that the server may send the information to the terminal participating in the collaborative unlocking through various existing technologies, and the description of the present application is omitted. The transmission method of the subsequent server for transmitting various other information may refer to various methods or combinations of the methods using the present step, and for simplicity of description, repeated description will not be made.
And 140, extracting the characteristics of the face image detected by the living body, and comparing the extracted characteristics with a plurality of face characteristics stored in advance, wherein the plurality of face characteristics are the face characteristics of a plurality of authority users associated with the identification information of the lock.
In this step, the server extracts the facial image features of the face detected by the living body, and any existing or future technique may be adopted for the feature extraction method. And comparing the extracted face features with the face features stored in advance. At least two rights users are in the multi-person collaborative unlocking, so that at least two stored face features are realized. The server inquires authority users associated with the locks of the identification numbers stored in advance at the server side according to the identification numbers to be unlocked carried by the acquired face images, namely inquires face characteristics of the authority users corresponding to the identification numbers. And comparing the obtained face characteristics with the face characteristics stored in the implementation mode.
Specifically, each time a face image sent by a terminal is obtained, the image is compared with the face features of N (N is at least 2) authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful.
At this time, the server may further send the information that the authority user is successfully compared or verified to the authority user or to the terminal participating in collaborative unlocking. This way, the user may be enabled to obtain information or progress regarding the unlocking, knowing what anomalies or risks may be present, in various ways. For example, other non-authorized users can perform unlocking operation, and the authorized users can know the unlocking operation through reserved information, so that the safety can be further improved.
Further, the server can use the information as the reminding information and display the reminding information through the session in a mode of instructing the terminal to create the session. The mode of the session can transmit and update the unlocking state in real time, and user experience is improved.
Specifically, the server may also set a progress bar according to the number of authorized users and the number of authenticated users, so as to intuitively display the unlocking progress in the session. For example, when there are four authorized users, one of the facial image features is successfully compared, i.e. the verification is passed, the current quarter progress bar is displayed.
Further, if the face image feature is compared with N preset stored authority users, the server considers that the face is not any authority user according to preset conditions, verification is considered to be failed, and at this time, the server can terminate unlocking. And correspondingly, the information can also be sent to the authorized user or the terminal participating in unlocking.
The preset condition of success or failure of the server to the facial feature comparison can be realized by a technology updated continuously in the field, and the application is not limited.
When the server confirms that the received first face image is one of N authority users through face feature comparison, when the server acquires one face image sent by the terminal again, the face image can be compared with the face features of the rest (N-1) authority users, if the comparison is successful, the unlocking progress is updated to be one half, and if the verification fails, the unlocking is stopped, and a message is sent. Of course, the server may also compare the face image received each time with all N authorized users. The invention is not limited either.
And 150, when the comparison result shows that the plurality of right users have identical faces in face images obtained from the terminal by the server, the server sends an unlocking instruction.
And (3) repeating the face feature comparison of the step 140, and considering that the unlocking is successful when the face image features acquired from the terminal are successfully compared and all authorized users are verified. The server can send an unlocking instruction to the terminal so that the terminal can communicate with the lock to be unlocked after receiving the unlocking instruction, and unlocking operation is achieved.
According to the unlocking method, the face image features sent by the terminal are extracted and compared with the face features of the plurality of stored authority users, and when all authority users have identical faces in the face images obtained by the server from the terminal, unlocking is carried out, so that the real-time remote unlocking of the cooperation of multiple persons is realized, on one hand, the unlocking safety is ensured, and on the other hand, the requirements of online and real-time remote unlocking of various scenes are met.
In another specific embodiment, after the unlocking request is obtained, the server obtains the information of the associated authority user according to the identification information of the lock; the server sends reminding information to the associated user according to the information of the associated authority user, wherein the reminding information comprises one or more of the following: unlocking progress, anomaly information, which may include one or more of: and the living body detection failure information and the face feature comparison failure information.
Further, in another embodiment, after the unlocking request is obtained, if the server does not send the unlocking instruction within a preset time, the unlocking is terminated, and the risk can be reduced by limiting the unlocking time, so that the security index is further improved.
In a second aspect, an embodiment of the present invention provides an encryption method, and fig. 2 is a flowchart of a specific embodiment of the encryption method of the present invention, where, according to the method shown in fig. 2, the method of the present embodiment includes:
Step 210, the server acquires a registration request, wherein the registration request carries identification information of a lock to be encrypted; in general, when a user obtains a lock device, an application can be downloaded and installed through a corresponding two-dimensional code, and when the user opens the application, an initialization flow of device configuration can be entered. After purchasing the lock, the settings that the user wants to make before decrypting are encryption settings. The lock device may be configured with a module or a port for accessing to a network, for example, WIFI may be accessed to a WIFI network or other networks in the present or future, and specifically, the lock device may also be configured with a terminal, for example, a mobile phone terminal, or the like. The network configuration method and the hardware used can adopt various prior art, and the application is not limited by the application.
After the network configuration of the lock device is successful, the terminal can send the acquired identification information of the lock device to the server to request registration. Correspondingly, the server acquires a registration request sent by the terminal, wherein the registration request carries identification information of the lock to be encrypted. The server may also establish a library of lock devices managed by the server through the identification information, or the server itself may store the lock devices managed by the server, and may determine whether the lock belongs to the lock device managed by the server itself according to the identification information.
Step 220, the server acquires at least two face images sent by at least one terminal, wherein the at least two face images are associated with the identification of the lock to be encrypted; it can be understood that under the condition of cooperative unlocking, at least two authority users can perform cooperative unlocking, namely, at least two authority users associated with one lock are provided, so that in this step, the server acquires at least two face images sent by at least one terminal, and in order to enable the server to know which authority user of the lock the received face image is, the at least two face images can also carry the identification of the lock to be encrypted, so that the at least two face images are associated with the identification of the lock to be encrypted.
Step 230, the server performs living body detection on the at least two face images; in this step, the server performs living body detection on at least two received face images. The living body detection can specifically employ various prior art techniques including various anti-attack techniques and the like.
After the biopsy has passed, subsequent steps may be performed. When the acquired face image fails to pass through the living body detection, the server can send reminding information to the user or the terminal, and the specific reminding mode can refer to the embodiment corresponding to fig. 1. When the user fails to pass the live detection, the server can terminate the encryption process, and can further remind the user to restart the encryption process.
Step 240, extracting features of the at least two face images after passing through the living body detection; in this step, the server extracts the facial image features of the face detected by the living body, and any existing or future technique may be adopted for the feature extraction method.
Step 250, establishing an association relationship between the identification of the lock to be encrypted and the features of the at least two face images, so that the user corresponding to the features of the at least two face images is a right user, and the right user can unlock the lock through the server;
As can be seen from step 220, the at least two face images acquired by the server may further carry the identification of the lock to be encrypted, so that the at least two face images are associated with the identification of the lock to be encrypted. Correspondingly, in this step, for the face image detected by the living body, after extracting the feature data, the association relationship between the feature of the face image and the lock to be encrypted is established, specifically, the association relationship between the feature of the face image and the lock identifier to be encrypted is established, and the users corresponding to the features of the at least two face images are set as authority users, that is, all authority users can cooperatively unlock the lock device in the future cooperative unlocking process.
And step 260, encrypting the lock according to the association relation. After the authority user is set and the association relation between the face image characteristics of the authority user and the lock is finished, the server can send an instruction to the terminal to finish the encryption setting of the lock equipment. The terminal can communicate with the lock device to complete encryption setting of the lock according to the received instruction.
The encryption method of the embodiment of the invention associates the face image characteristics sent by the terminal with the lock to be encrypted, so that the unlocking operation can be performed only after all right users associated with the lock perform online collaboration.
It will be understood that at least two users participating in the collaborative encryption, that is, at least two authorized users associated with one lock, are used, but the server side is not limited to whether the at least two users are performed by the same terminal or different terminals during the collaborative encryption. If the processing is performed by different terminals, in a further embodiment, the at least one terminal includes a first terminal and a second terminal, and the server acquires at least two face images sent by the at least one terminal, specifically including: the method comprises the steps that the server obtains a first face image sent by a first terminal, wherein the first face image comprises at least one face image; the server acquires a second face image sent by a second terminal, wherein the second face image comprises at least one face image.
Since two terminals send the face image to the server for encryption, the method may further include: the server sends the first face image to the second terminal, and sends the second face image to the first terminal, so that users operating at different terminals can confirm users operating at other terminals, and the security of encryption results is further improved.
Therefore, further, the server also acquires the confirmation information of the second face image sent by the first terminal; and the server acquires the confirmation information of the first face image sent by the second terminal. When the server confirms that each authority user is confirmed by other users, the encryption process is further carried out. According to the method, each authority user is approved by other users on line, meanwhile, all other users are approved by each user, and after that, all mutually approved users are set as authority users by the server, so that the confirmation process is further enhanced, and the safety is improved.
In one embodiment, the encryption method further comprises: the server stores the facial image characteristics of the authorized user; and the server stores the association relation between the identification of the lock to be encrypted and the characteristics of the face image of the authorized user. Through the step, in the subsequent decryption process, the server can directly acquire the facial image characteristics of the authority user from the local and acquire the association relationship between the lock identification and the characteristics of the facial image of the authority user. The timeliness and the storage safety of the data are guaranteed.
In a third aspect, fig. 3 is a block diagram of a specific embodiment of an unlocking device of the server according to the present invention, where, according to the embodiment shown in fig. 3, the unlocking device of the server includes a first acquisition module 301, a first living body detection module 302, a comparison module 303, and an unlocking module 304, where the first acquisition module 301 is configured to acquire an unlocking request sent by at least one terminal, and the unlocking request carries identification information of a lock;
The first acquiring module 301 is further configured to acquire at least two face images sent by the terminal;
a first living body detection module 302, configured to perform living body detection on the at least two face images;
A comparison module 303, configured to extract features of a face image detected by a living body, and compare the extracted features with a plurality of face features stored in advance, where the plurality of face features are face features of a plurality of authorized users associated with identification information of the lock;
And the unlocking module 304 is configured to send an unlocking instruction when the comparison result of the comparison module indicates that the plurality of authorized users all have identical faces in face images obtained from the terminal by the server.
In this embodiment, the operations executed by each module of the server unlocking device may specifically refer to the method corresponding to fig. 1, so as to achieve the same technical effects.
In one embodiment, the unlocking device of the further server further comprises a termination unlocking module, wherein the termination unlocking module is used for terminating unlocking when one face image acquired by the server does not pass through the live detection; or stopping unlocking when the comparison result is that the extracted features are inconsistent with the face features of the prestored multiple authority users; or after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, stopping unlocking.
Further, in an embodiment, the first obtaining module of the unlocking device of the server is further configured to obtain information of the associated rights user according to the identification information of the lock; the server also comprises a first sending module, which is used for sending reminding information to the associated user, wherein the reminding information comprises one or more of the following: unlocking progress and abnormal information.
Fig. 4 is a block diagram illustrating an embodiment of an encryption apparatus of a server according to the present invention, and the encryption apparatus of a server according to the present embodiment includes: a second acquisition module 401, a second living body detection module 402, a second feature extraction module 403, an association relationship establishment module 404, and an encryption module 405. The second obtaining module 401 is further configured to obtain a registration request, where the registration request carries identification information of a lock to be encrypted;
The second obtaining module 401 is further configured to obtain at least two face images sent by at least one terminal, where the at least two face images are associated with the identifier of the to-be-encrypted lock;
a second living body detection module 402, configured to perform living body detection on the at least two face images;
a second feature extraction module 403 for extracting features of the at least two face images after passing through the living body detection;
The association relationship establishing module 404 is configured to establish an association relationship between the identification of the lock to be encrypted and the features of the at least two face images, so that a user corresponding to the features of the at least two face images is a right user, and the right user can unlock the lock through the server;
and the encryption module 405 is configured to encrypt the lock according to the association relationship.
The operations executed by each module of the server encryption device in this embodiment may specifically refer to the method corresponding to fig. 2, so as to achieve the same technical effects.
Further, in an embodiment, in the encryption device of the server, the second obtaining module is further configured to: acquiring a first face image sent by a first terminal, wherein the first face image comprises at least one face image; acquiring a second face image sent by a second terminal, wherein the second face image comprises at least one face image; the encryption device further includes: and the second sending module is used for sending the first face image to the second terminal and sending the second face image to the first terminal.
Further, in an embodiment, in the encryption device of the server, the second obtaining module is further configured to: acquiring confirmation information of the second face image sent by the first terminal; and acquiring the confirmation information of the first face image sent by the second terminal.
Further, in one embodiment, the encryption device of the server further includes: the storage module is used for storing the facial image characteristics of the authority user and storing the association relation between the identification of the lock to be encrypted and the characteristics of the facial image of the authority user.
In a fourth aspect, an embodiment of the present invention provides an unlocking method, and fig. 5 is a flowchart of a specific embodiment of the unlocking method of the present invention, where, according to the method shown in fig. 5, the method of the present embodiment includes:
step 510, the terminal obtains a request for unlocking from the user, wherein the unlocking instruction carries identification information of the lock; it can be understood that in this step, the terminal may acquire, according to the operation of the user, a request for unlocking by the user, where the information for requesting unlocking may carry identification information of the lock, so that the terminal may carry identification information to be unlocked when sending the unlocking request to the server.
In step 520, the terminal sends an unlocking request to the server, where the unlocking request carries identification information of the lock. In this step, the terminal server sends an unlocking request, where the unlocking request carries identification information of the lock. In addition, the information sent by the terminal can also comprise information of the terminal and the like, so that the terminal is convenient to receive when the subsequent server sends the information to the terminal, and a user can know the unlocking progress and other information in time.
Step 530, the terminal acquires the image acquired by the connected image acquisition equipment and acquires the face image from the image acquired by the connected image acquisition equipment; the terminal is not particularly limited in the present application, and may be, for example, a tablet computer, a mobile phone or other devices, and the connected image acquisition device is not limited, and may be an image acquisition device of the terminal, for example, a camera, or an image acquisition device connected to the terminal through a port.
It can be understood that, since the collaborative unlocking includes at least two authorized users, the total number of face images sent to the server by all the terminals participating in the collaborative unlocking should be at least two. However, the present application is not limited to the case that the at least two users are performed through the same terminal or through different terminals when the cooperative unlocking is performed. For example, each user may perform cooperative unlocking through a respective terminal, or at least two users may perform cooperative unlocking through the same terminal, which is not limited by the present application. That is, by one terminal, face images of one user may be transmitted to the server, or face images of at least two users may be transmitted. For example, when two users cooperatively unlock through one terminal, if the two users are simultaneously within the camera image acquisition range of the terminal, the image acquired by the image acquisition device simultaneously contains at least two face images.
At this time, further, when the image collected by the image collecting device includes at least two face images at the same time, the collecting face images therefrom specifically includes: collecting the at least two face images; the terminal sends the face image to the server, and specifically comprises the following steps: and sending the at least two face images to the server. At this time, a plurality of faces may be detected on the same screen. And sending the data of the collected faces to a server. The method is that the same-screen multi-face is supported in the process of collecting the faces by the terminal camera.
Step 540, the terminal sends the face image to the server, so that the server compares the face image with at least two rights user face features associated with the identification information of the lock; in this step, the terminal sends a face image to the server, carrying the identification number of the device to be unlocked.
Step 550, the terminal acquires an unlocking instruction sent by the server; the server can confirm whether an unlocking instruction can be sent to the terminal or not through a method corresponding to the method shown in fig. 1, or whether an abnormality is encountered in the unlocking process, and reminding information needs to be sent to the terminal. Correspondingly, the terminal acquires an unlocking instruction sent by the server. Or when the server receives the unlocking command, the terminal sends the unlocking termination command to the terminal under the preset condition. Both the preset condition and the transmission method can be referred to as the corresponding method in fig. 1.
And step 560, the terminal communicates with the lock according to the unlocking instruction sent by the server, and performs unlocking operation on the lock. And the terminal communicates with the lock equipment after receiving the instruction sent by the server, and performs several operations on the lock.
According to the embodiment of the invention, after the request of unlocking is acquired by the user, the acquired face image and the serial number of the equipment to be unlocked are transmitted to the server together, and when all authority users have consistent faces in the face image acquired by the server from the terminal, the unlocking is performed, so that the real-time remote unlocking of the cooperation of multiple persons is realized, the unlocking safety is ensured, and the requirements of online and real-time remote unlocking of various scenes are met.
In another embodiment, further, when there is more than one terminal performing cooperative unlocking, the unlocking method further includes: and sending the invitation information to other authority users so that the other authority users can cooperatively unlock according to the invitation information.
In another specific embodiment, further, the unlocking method further includes: obtaining reminding information sent by the server, wherein the reminding information comprises one or more of the following: unlocking progress and abnormal information.
Further, when an unlocking abnormality occurs, the terminal may further obtain an instruction for terminating the transmission of the unlocking command by the server, where the instruction for terminating the unlocking is sent by the server to the terminal under a preset condition. The preset conditions and the specific transmission method can be referred to as the corresponding method in fig. 1.
In a fifth aspect, an embodiment of the present invention provides an encryption method, and fig. 6 is a flowchart of a specific embodiment of a decryption method according to the present invention, where, according to the method shown in fig. 6, the method includes:
Step 610, the terminal sends a registration request to the server, where the registration request carries identification information of the lock to be encrypted; in general, when a user obtains a lock device, an application can be downloaded and installed through a corresponding two-dimensional code, and when the user opens the application, an initialization flow of device configuration can be entered. After purchasing the lock, the settings that the user wants to make before decrypting are encryption settings. The lock device may be configured with a module or a port for accessing to a network, for example, WIFI may be accessed to a WIFI network or other networks in the present or future, and specifically, the lock device may also be configured with a terminal, for example, a mobile phone terminal, or the like. The network configuration method and the hardware used can adopt various prior art, and the application is not limited by the application. After the setting is completed, the terminal may send the acquired identification information of the lock device to the server, and request registration.
Step 620, the terminal acquires an image acquired by an image acquisition device connected with the terminal and acquires a face image from the image acquired by the image acquisition device; the terminal is not particularly limited in the present application, and may be, for example, a tablet computer, a mobile phone or other devices, and the connected image acquisition device is not limited, and may be an image acquisition device of the terminal, for example, a camera, or an image acquisition device connected to the terminal through a port.
Since the collaborative unlocking includes at least two authority users, the total number of face images sent to the server by all the terminals participating in the collaborative unlocking should be at least two. However, the present application is not limited to the case that the at least two users are performed through the same terminal or through different terminals when the cooperative unlocking is performed. For example, each user may perform cooperative unlocking through a respective terminal, or at least two users may perform cooperative unlocking through the same terminal, which is not limited by the present application. That is, by one terminal, face images of one user may be transmitted to the server, or face images of at least two users may be transmitted. For example, when two users cooperatively unlock through one terminal, if the two users are simultaneously within the camera image acquisition range of the terminal, the image acquired by the image acquisition device simultaneously contains at least two face images.
Therefore, in this step, the terminal acquires the image acquired by the image acquisition device connected with the terminal and acquires the face image therefrom, which may be one or more than two. And the terminal supports the same-screen multi-face in the face collecting process.
Step 630, sending the face image to the server, wherein the face image is associated with the identification information of the lock to be encrypted; in the step, the face image acquired in the last step is sent to a server and carries the identification information of the lock to be encrypted.
Step 640, obtaining an encryption instruction sent by the server, where the encryption instruction is sent by the server after establishing an association relationship between the identification of the lock to be encrypted and at least two facial image features, where at least one of the at least two facial image features is a feature of a facial image sent by the terminal;
As can be appreciated from the corresponding embodiment of fig. 2, the server, upon receiving the face image carrying the lock identification, performs a series of steps such as in vivo detection, feature extraction, etc. For example, for a face image detected by a living body, after extracting its characteristic data, the server establishes an association relationship between the characteristic of the face image and a lock to be encrypted, and after completing these actions, the server sends an encryption instruction to the terminal, and correspondingly, the terminal acquires the encryption instruction sent by the server.
And step 650, performing encryption operation on the lock according to the encryption instruction and the lock to be encrypted. And the terminal communicates with the lock to be encrypted according to the received encryption instruction, and encrypts the lock to be encrypted.
The terminal of the embodiment of the invention sends the acquired face images and the identification number of the lock to be encrypted to the server, so that the server correlates the face characteristic with the lock to be encrypted, and the unlocking operation can be performed only after all right users correlated with the lock perform online coordination.
Further, in one embodiment, when the image acquired by the image acquisition device includes at least two face images at the same time, the acquiring face images therefrom specifically includes: collecting the at least two face images; the sending the face image to the server specifically includes: and sending the at least two face images to the server.
Further, in one embodiment, the encryption method further includes: and sending the invitation information to other users so that the other users can send face images of the other users to a server for collaborative encryption according to the invitation information.
Further, in one embodiment, the encryption method further includes: acquiring face images of the other users sent to the server by the other users; and sending confirmation or non-confirmation information of the face images of the other users according to the instruction of the users. Each cooperative encryption user is authorized by other users online, and at the same time, each user also authorized all other users, and after that, all mutually authorized users are set as authorized users by the server, so that the confirmation process is further enhanced, and the security is improved.
In a sixth aspect, an embodiment of the present invention provides a terminal, fig. 7 is a block diagram illustrating a specific embodiment of an unlocking device of the terminal according to the present invention, and according to fig. 7, the unlocking device of the terminal of the present embodiment includes a third obtaining module 701 and a third sending module 702, where,
A third obtaining module 701, configured to obtain a request for unlocking by a user, where the unlocking instruction carries identification information of a lock;
a third sending module 702, configured to send an unlocking request to a server, where the unlocking request carries identification information of a lock;
the third acquisition module is further used for acquiring images acquired by the image acquisition equipment connected with the terminal and acquiring face images therefrom;
The third sending module is further configured to send the face image to the server, so that the server compares the face image with face features of at least two authorized users associated with the identification information of the lock;
the third acquisition module is further used for acquiring an unlocking instruction sent by the server;
the third sending module is further configured to communicate with the lock according to an unlocking instruction sent by the server, and perform an unlocking operation on the lock.
The operations executed by the modules of the terminal unlocking device in this embodiment may specifically refer to the method corresponding to fig. 5, so as to achieve the same technical effects.
Further, in an embodiment, the third sending module is further configured to send the invitation information to other authorized users, so that the other authorized users can perform collaborative unlocking according to the invitation information.
Further, in an embodiment, the third obtaining module is further configured to obtain reminder information sent by the server, where the reminder information includes one or more of the following: unlocking progress and abnormal information.
Further, in an embodiment, the third obtaining module is further configured to obtain a termination unlocking instruction sent by the server, where the termination unlocking instruction is sent by the server to the terminal under a preset condition.
Fig. 8 is a block diagram illustrating a structure of an embodiment of an encryption apparatus of a terminal according to the present invention, and the encryption apparatus of a terminal according to the present embodiment includes: a fourth transmission module 801, and a fourth acquisition module 802, wherein,
A fourth sending module 801, configured to send a registration request to a server, where the registration request carries identification information of a lock to be encrypted;
A fourth acquiring module 802, configured to acquire an image acquired by an image acquisition device connected to the fourth acquiring module and acquire a face image therefrom;
The fourth sending module is further configured to send the face image to the server, where the face image is associated with identification information of the lock to be encrypted;
The fourth obtaining module is further configured to obtain an encryption instruction sent by the server, where the encryption instruction is sent by the server after an association relationship between the identifier of the lock to be encrypted and at least two facial image features is established, and at least one of the at least two facial image features is a feature of a facial image sent by the terminal;
The fourth sending module is further configured to communicate with the lock to be encrypted according to the encryption instruction, and perform encryption operation on the lock.
The operations executed by the modules of the terminal encryption device in this embodiment may specifically refer to the method corresponding to fig. 6, so as to achieve the same technical effects.
Further, in an embodiment, the fourth sending module is further configured to send invitation information to other users, so that the other users can send face images of the other users to a server according to the invitation information to perform collaborative encryption.
Further, in an embodiment, the fourth obtaining module is further configured to obtain the face image of the other user sent by the server and sent to the server by the other user; the fourth sending module is further configured to send confirmation or non-confirmation information of the face image of the other user according to a user instruction.
In a seventh aspect, an embodiment of the present invention further provides a lock, which is characterized by including a lock body, a communication unit, and a processor, where the communication unit communicates with the terminal in the sixth aspect, and the processing unit encrypts or unlocks the lock body according to information acquired by the communication unit.
In an eighth aspect, an embodiment of the present application further provides a computer device, where the computer device may be a neural network server, referring specifically to fig. 9, and fig. 9 is a basic structural block diagram of the computer device in this embodiment.
The computer device 9 comprises a memory 91, a processor 92, a network interface 93 communicatively connected to each other via a system bus. It should be noted that only computer device 9 having components 91-93 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be understood by those skilled in the art that the computer device 9 herein is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an Application SPECIFIC INTEGRATED Circuit (ASIC), a Programmable gate array (Field-Programmable GATE ARRAY, FPGA), a digital Processor (DIGITAL SIGNAL Processor, DSP), an embedded device, etc.
The computer device 9 may be a desktop computer, a notebook computer, a palm computer, a cloud server, or the like. The computer device 9 may perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad, or a voice control device.
The memory 91 includes at least one type of readable storage medium, and the memory may store an executable instruction controller, a microcontroller, a microprocessor, or other data processing chip, including at least one type of readable storage medium. The readable storage medium includes a non-volatile memory (non-volatile memory) or a volatile memory, for example, a flash memory (flash memory), a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a random access memory (random access memory, RAM), a read-only memory (ROM), an erasable programmable read-only memory (erasable programmable read-only memory, EPROM), an electrically erasable programmable read-only memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-only memory, EEPROM), a programmable read-only memory (programmable read-only memory, PROM), a magnetic memory, a magnetic disk, an optical disk, etc., and the RAM may include a static RAM or a dynamic RAM. In some embodiments, the storage 91 may be an internal storage unit of the computer device 9, for example, a hard disk or a memory of the computer device 9. In other embodiments, the memory 91 may also be an external storage device of the computer device 9, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the computer device 9. Of course, the memory 91 may also comprise both an internal memory unit of the computer device 9 and an external memory device. In this embodiment, the memory 91 is generally used for storing an operating system and various application software installed on the computer device 9, such as program codes for performing encryption and decryption, and the like. Further, the memory 91 may be used to temporarily store various types of data that have been output or are to be output.
In an embodiment of the present application, the processor 92 may be a central processing unit (Central Processing Unit, CPU) or an image processor (Graphic Processing Unit, GPU). The processor 92 may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor, such as a single-chip microcomputer or the like.
The processor 92 is typically used to control the overall operation of the computer device 9. In this embodiment, the memory 91 is configured to store program codes or instructions, the program codes include computer operation instructions, and the processor 92 is configured to execute the program codes or instructions stored in the memory 91 or process data, such as program codes for performing encryption and decryption.
The buses described herein may be an industry standard architecture (Industry Standard Architecture, ISA) bus, a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus system may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
In a ninth aspect, an embodiment of the present invention further provides a chip, configured to perform the method in the first aspect. Specifically, the chip includes: a processor for calling and running a computer program from a memory, such that a device on which the chip is mounted is for performing the method of the first, second, fourth or fifth aspect described above.
In addition, in a tenth aspect, embodiments of the present invention also provide a computer-readable storage medium, which may be a computer-readable signal medium or a computer-readable medium. A processor in a computer reads computer readable program code stored in a computer readable medium, enabling the processor to perform the functional actions specified in the method of each step or combination of steps in the first, second, fourth or fifth aspects described above for a device on which the chip is mounted; a means for generating a functional action specified in each block of the block diagram or a combination of blocks.
The computer readable medium includes, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared memory or semiconductor system, apparatus or device for storing program code or instructions including computer operating instructions, or any suitable combination of the foregoing, and the processor for executing the program code or instructions stored by the memory.
The definition of the memory and the processor may refer to the description of the foregoing embodiments of the computer device, and will not be repeated herein. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the method of any of the above first, second, fourth or fifth aspects.
In an eleventh aspect, embodiments of the present invention also provide a computer program product comprising computer program instructions for causing a computer to perform the method of the first, second, fourth or fifth aspects described above.
Those of skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Those skilled in the art may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In embodiments of the present application, the disclosed systems, devices, and methods may be implemented in other ways. For example, the division of the units is only one logic function division, and other division manners are also possible in actual implementation. For example, multiple units or components may be combined or may be integrated into another system. In addition, the coupling between the individual units may be direct coupling or indirect coupling. In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or may exist alone physically, or the like.
It should be understood that, in various embodiments of the present application, the size of the sequence number of each process does not mean that the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
The functions, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored on a machine-readable storage medium. Accordingly, aspects of the present application may be embodied in a software product, which may be stored on a machine-readable storage medium, which may include instructions for causing an electronic device to perform all or part of the processes of the aspects described in embodiments of the present application. The storage medium may include a ROM, a RAM, a removable disk, a hard disk, a magnetic disk, or an optical disk, etc. various media in which program codes can be stored.
The above is merely an embodiment of the present application, and the scope of the present application is not limited thereto. Those skilled in the art can make changes or substitutions within the technical scope of the present disclosure, and such changes or substitutions should be included in the scope of the present disclosure.

Claims (10)

1. An unlocking method, comprising:
the method comprises the steps that a server obtains an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock;
the server acquires at least two face images sent by the terminal;
the server performs living body detection on the at least two face images;
extracting features of a face image detected by a living body, and comparing the extracted features with a plurality of face features stored in advance, wherein the plurality of face features are face features of a plurality of authority users associated with the identification information of the lock;
Each time a face image sent by a terminal is obtained, the image is compared with the face features of at least two authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful; at the moment, the service transmits the information that the authority users are successfully compared or pass verification to the authority users or to the terminals participating in collaborative unlocking;
when the comparison result shows that the plurality of right users have identical faces in face images obtained by the server from the terminal, the server sends an unlocking instruction;
after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, the unlocking is terminated.
2. An encryption method, comprising:
the method comprises the steps that a server obtains a registration request, wherein the registration request carries identification information of a lock to be encrypted;
the server acquires at least two face images sent by at least one terminal, wherein the at least two face images are associated with the identification of the lock to be encrypted;
extracting features of the at least two face images after passing the living body detection;
Establishing an association relationship between the identification of the lock to be encrypted and the characteristics of the at least two face images, so that a user corresponding to the characteristics of the at least two face images is a right user, and the right user can unlock the lock through the server;
Each time a face image sent by a terminal is obtained, the image is compared with the face features of at least two authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful; at the moment, the service transmits the information that the authority users are successfully compared or pass verification to the authority users or to the terminals participating in collaborative unlocking;
after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, stopping unlocking;
And encrypting the lock according to the association relation.
3. A server comprising an unlocking device, the unlocking device comprising:
The first acquisition module is used for acquiring an unlocking request sent by at least one terminal, wherein the unlocking request carries identification information of a lock;
the first acquisition module is further used for acquiring at least two face images sent by the terminal;
the first living body detection module is used for carrying out living body detection on the at least two face images;
The comparison module is used for extracting the characteristics of the face image detected by the living body, and comparing the extracted characteristics with a plurality of face characteristics stored in advance, wherein the plurality of face characteristics are the face characteristics of a plurality of authority users associated with the identification information of the lock;
Each time a face image sent by a terminal is obtained, the image is compared with the face features of at least two authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful; at the moment, the service transmits the information that the authority users are successfully compared or pass verification to the authority users or to the terminals participating in collaborative unlocking;
The unlocking module is used for sending an unlocking instruction by the server when the comparison result of the comparison module is that the plurality of right users have identical faces in face images obtained by the server from the terminal;
after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, the unlocking is terminated.
4. An unlocking method, comprising:
The terminal acquires a request for unlocking, wherein the unlocking request carries identification information of a lock;
the terminal sends an unlocking request to a server, wherein the unlocking request carries identification information of a lock;
The terminal acquires images acquired by image acquisition equipment connected with the terminal and acquires face images therefrom;
the terminal sends the face image to the server so that the server compares the face image with face features of at least two authority users associated with the identification information of the lock;
Each time a face image sent by a terminal is obtained, the image is compared with the face features of at least two authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful; at the moment, the service transmits the information that the authority users are successfully compared or pass verification to the authority users or to the terminals participating in collaborative unlocking;
the terminal acquires an unlocking instruction sent by the server;
The terminal communicates with the lock according to an unlocking instruction sent by the server, and performs unlocking operation on the lock;
after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, the unlocking is terminated.
5. An encryption method, comprising:
the terminal sends a registration request to a server, wherein the registration request carries identification information of a lock to be encrypted;
The terminal acquires images acquired by an image acquisition device connected with the terminal and acquires face images therefrom;
transmitting the face image to the server, wherein the face image is associated with the identification information of the lock to be encrypted;
Acquiring an encryption instruction sent by the server, wherein the encryption instruction is sent by the server after establishing an association relation between the identification of the lock to be encrypted and at least two facial image features, and at least one of the at least two facial image features is a feature of a facial image sent by the terminal;
Each time a face image sent by a terminal is obtained, the image is compared with the face features of at least two authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful; at the moment, the service transmits the information that the authority users are successfully compared or pass verification to the authority users or to the terminals participating in collaborative unlocking;
after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, stopping unlocking;
and carrying out communication with the lock to be encrypted according to the encryption instruction, and carrying out encryption operation on the lock.
6. A terminal comprising an unlocking means, the unlocking means comprising:
the third acquisition module is used for acquiring a request for unlocking by a user, wherein the unlocking request carries identification information of a lock;
the third sending module is used for sending an unlocking request to the server, wherein the unlocking request carries the identification information of the lock;
the third acquisition module is further used for acquiring images acquired by the image acquisition equipment connected with the terminal and acquiring face images therefrom;
The third sending module is further configured to send the face image to the server, so that the server compares the face image with face features of at least two authorized users associated with the identification information of the lock;
Each time a face image sent by a terminal is obtained, the image is compared with the face features of at least two authority users stored in advance, and if the comparison result is that the face image is a certain authority user, the comparison is considered to be successful; at the moment, the service transmits the information that the authority users are successfully compared or pass verification to the authority users or to the terminals participating in collaborative unlocking;
the third acquisition module is further used for acquiring an unlocking instruction sent by the server;
the third sending module is further used for communicating with the lock according to an unlocking instruction sent by the server, and unlocking the lock;
after the unlocking request is obtained, if the server does not send an unlocking instruction within a preset time, the unlocking is terminated.
7. A lock comprising a lock body, a communication unit for communicating with the terminal of claim 6, and a processor for encrypting or unlocking the lock body based on information obtained by the communication unit.
8. A computer device, comprising: the system comprises at least one processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete communication with each other through the communication bus; a memory coupled to the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any one of claims 1 or 2 or 4 or 5 to be implemented.
9. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to execute: the method of any one of claims 1 or 2 or 4 or 5.
10. A computer-readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, implements the steps of the method according to any of the preceding claims 1 or 2 or 4 or 5.
CN202010883932.0A 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock Active CN111949966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010883932.0A CN111949966B (en) 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010883932.0A CN111949966B (en) 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock

Publications (2)

Publication Number Publication Date
CN111949966A CN111949966A (en) 2020-11-17
CN111949966B true CN111949966B (en) 2024-09-13

Family

ID=73366777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010883932.0A Active CN111949966B (en) 2020-08-28 2020-08-28 Encryption and unlocking method, server, terminal and lock

Country Status (1)

Country Link
CN (1) CN111949966B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800454B (en) * 2021-03-22 2021-08-13 北京焦点新干线信息技术有限公司 Case data processing method, related device and computer readable medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107808433A (en) * 2017-10-11 2018-03-16 燕南指通(北京)科技有限公司 Control method, system and the lockset of lockset

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100266132A1 (en) * 2009-04-15 2010-10-21 Microsoft Corporation Service-based key escrow and security for device data
CN106837058A (en) * 2017-01-13 2017-06-13 珠海易时代科技有限公司 A kind of high security refers to vein safe cabinet system and unlocking method
CN107733868A (en) * 2017-09-13 2018-02-23 深圳市三阶微控实业有限公司 Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107808433A (en) * 2017-10-11 2018-03-16 燕南指通(北京)科技有限公司 Control method, system and the lockset of lockset

Also Published As

Publication number Publication date
CN111949966A (en) 2020-11-17

Similar Documents

Publication Publication Date Title
KR101958909B1 (en) Method of using one device to unlock another device
CN107113315B (en) Identity authentication method, terminal and server
US20140329497A1 (en) Smartdevices Enabled Secure Access to Multiple Entities (SESAME)
CN105227316A (en) Based on mobile Internet account login system and the method for facial image authentication
EP3213459A1 (en) A multi-user strong authentication token
US20140143860A1 (en) Two tier verification system and method
CN104052817A (en) Intelligent door and intelligent door control method and system
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN104303481A (en) Method and apparatus for remote portable wireless device authentication
CN108200037B (en) Method and system for executing security operation by using security device
CN109858220A (en) Electronic contract signs method, apparatus, terminal device and storage medium
CN108650219B (en) User identity identification method, related device, equipment and system
CN109166216A (en) A kind of control method and device of smart bluetooth door lock
CN112184952A (en) Intelligent lock control system, method and storage medium
CN107911211B (en) Two-dimensional code authentication system based on quantum communication network
CN111949966B (en) Encryption and unlocking method, server, terminal and lock
CN104469736A (en) Data processing method, server and terminal
WO2018006332A1 (en) Intelligent entrance guard management method and system based on mobile terminal
CN111966991A (en) Equipment unlocking method, device, equipment and storage medium
CN110738764A (en) Security control system and method based on intelligent lock
CN112887922B (en) Message sending method and electronic equipment
CN104579639B (en) The realization of multi-party collaborative authorization secret key and move the system of controlled in wireless with it
CN105072084B (en) The method for building up of mobile terminal and external equipment data connection
CN113468565B (en) Intelligent door lock control method and system
CN105610778A (en) Account registration method, account registration apparatus and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant