CN108205835A - Access control method and access control system - Google Patents

Access control method and access control system Download PDF

Info

Publication number
CN108205835A
CN108205835A CN201711347579.9A CN201711347579A CN108205835A CN 108205835 A CN108205835 A CN 108205835A CN 201711347579 A CN201711347579 A CN 201711347579A CN 108205835 A CN108205835 A CN 108205835A
Authority
CN
China
Prior art keywords
access control
control terminal
holder
information
traffic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711347579.9A
Other languages
Chinese (zh)
Inventor
徐妙然
刘毅
衷丛洪
向许波
陈朝军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN201711347579.9A priority Critical patent/CN108205835A/en
Publication of CN108205835A publication Critical patent/CN108205835A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

This application discloses a kind of access control method and access control system, wherein, which is applied to access control system, which has entrance guard device, identity card identification device and access control terminal, which includes:The ID card information of identity card identification device reading identity card, and send ID card information to access control terminal;Access control terminal obtains the facial image of the holder of the identity card;The access control terminal obtains the matching result of the head image information and the facial image in the ID card information;If matching result is successful match, access control terminal generates the traffic information of the holder, and triggers entrance guard device unlatching.The technical solution that the application provides can effectively improve the safety of gate inhibition's identification.

Description

Access control method and access control system
Technical field
This application involves gate inhibition's technical fields, and in particular to a kind of access control method and access control system.
Background technology
With the continuous development of economic society, requirement of the people to work and living environment is also continuously improved, in order to meet For people to gathering around there are one the work of safety and comfort, living environment, many building, garden entrance are assembled with gate.
Gate has the effects that managing the stream of people and specification pedestrian comes in and goes out, and gate is from being developed so far, the gate inhibition identification side that uses Formula includes:Brush password card and fingerprint recognition.The recognition speed of brush password card is fast, success rate is high, therefore passage rate is fast, but only Recognize password card, if pedestrian leaves behind, loses password card, just without right of access, in addition password card may also be stolen, these All there is great security risk to management.With respect to brush password card, fingerprint recognition can save the fiber crops for carrying the external medium of these machines It is tired.But the acquisition of fingerprint is easier to, and the possibility pretended is larger, so using loophole in the presence of certain.
As it can be seen that existing gate inhibition's identification method safety is relatively low.
Invention content
The application provides a kind of access control method and access control system, for improving the safety of gate inhibition's identification.
The application first aspect provides a kind of access control method, applied to access control system, the access control system System has entrance guard device, identity card identification device and access control terminal, and the access control method includes:
The ID card information of the identity card identification device reading identity card, and to described in access control terminal transmission ID card information, wherein, the ID card information includes the head image information in identity card;
The access control terminal obtains the facial image of the holder of the identity card;
The access control terminal obtains the matching result of the head image information and the facial image;
If the matching result is successful match, the access control terminal generates the traffic information of the holder, And it triggers the entrance guard device and opens.
Based on invention in a first aspect, in the first possible implementation, described in access control terminal generation After the traffic information of holder, the access control method further includes:
The traffic information is stored in local by the access control terminal;
And/or the access control system further includes:Management server, the access control terminal is by the current letter Breath is sent to the management server, and the management server is used to manage and safeguard the traffic information of each user.
Based on the application in a first aspect, in second of possible realization method, described in the access control terminal acquisition The matching result of head image information and the facial image, including:
The access control terminal extracts network according to face characteristic and extracts the head image information and the face figure respectively The face characteristic of picture matches the face characteristic of the head image information and the facial image, obtains matching result;
Or,
The access control system further includes:Identify server;
The head image information and the facial image are sent to the identification server by the access control terminal, to touch It sends out described and identifies that server extracts the face of the head image information and the facial image according to face characteristic extraction network respectively Feature matches the face characteristic of the head image information and the facial image, and is fed back to the access control terminal Match obtained matching result.
The first possible realization method, the application first party based on the application first aspect, the application first aspect Second of possible realization method in face, in the third possible realization method, the identity card identification device passes through serial ports It is connect with the access control terminal.
The third possible realization method based on the application first aspect, in the 4th kind of possible realization method, institute Traffic information is stated to include:With the relevant face characteristic of the holder;
The traffic information that the access control terminal generates the holder includes:
The face characteristic of the access control terminal based on the holder generates the traffic information of the holder.
The 4th kind of possible realization method based on the application first aspect, in the 5th kind of possible realization method, institute ID card information is stated to further include:Identification card number in the identity card;The traffic information further includes:It is related to the holder Identification card number;
The traffic information that the access control terminal generates the holder includes:
The access control terminal generates the traffic information of the holder based on the identification card number in the identity card.
The 4th kind of possible realization method based on the application first aspect, in the 6th kind of possible realization method, institute Traffic information is stated to further include:With the holder is relevant allows the current time limit;
The traffic information that the access control terminal generates the holder includes:
The allow current time limit that allows current time limit or acquiescence of the access control terminal based on input, described in generation The traffic information of holder.
The 6th kind of possible realization method based on the application first aspect, in the 7th kind of possible realization method, institute Access control method is stated to further include:
When the access control terminal with the holder relevant time for allowing current time limit instruction in obtain again The facial image of the holder is got, then triggers the entrance guard device and opens.
The 4th kind of possible realization method based on the application first aspect, in the 8th kind of possible realization method, institute Traffic information is stated to further include:With the relevant current record of the holder, the current record includes current time, Yi Jitong Capable position;
The traffic information that the access control terminal generates the holder includes:
The time currently passed through based on the holder and position generate the traffic information of the holder.
The 4th kind of possible realization method based on the application first aspect, in the 9th kind of possible realization method, institute Traffic information is stated to further include:With the relevant right of access of the holder, the right of access is the access control terminal control In the range of system each entrance guard device respectively whether transitable permission;
The traffic information that the access control terminal generates the holder includes:
The right of access of right of access or acquiescence of the access control terminal based on input, generates the holder Traffic information.
The application second aspect provides a kind of access control system, including:Identity card identification device, access control terminal and Entrance guard device;
The identity card identification device is used for:The ID card information of reading identity card, wherein, the ID card information includes Head image information in identity card;
The access control terminal is used for:Obtain the facial image of the holder of the identity card;Obtain the head portrait letter The matching result of breath and the facial image;If the matching result is successful match, the access control terminal generates institute The traffic information of holder is stated, and triggers the entrance guard device and opens.
Based on the application second aspect, in the first possible implementation, the access control system further includes:Pipe Server is managed, the management server is used to manage and safeguard the traffic information of each user;
The access control terminal is additionally operable to:
The traffic information is stored in local;
And/or
The traffic information is sent to the management server, the management server is used to managing and safeguarding each use The traffic information at family.
The first possible realization method based on the application second aspect, in second of possible realization method, institute Access control terminal is stated to be specifically used for:Network is extracted according to face characteristic and extracts the head image information and the facial image respectively Face characteristic, the face characteristic of the head image information and the facial image is matched, obtain matching result;
Or, the access control system further includes:Identify server, the access control terminal is specifically additionally operable to:By institute It states head image information and is sent to the identification server with the facial image, to trigger the identification server according to face characteristic Extraction network extracts the face characteristic of the head image information and the facial image respectively, by the head image information and the face The face characteristic of image is matched, and obtained matching result is matched to access control terminal feedback.
Based on the possible realization method of the first of the application second aspect or the application second aspect or this Shen Please second aspect second of possible realization method, in the third possible realization method, the identity card identification device It is connect by serial ports with the access control terminal.
The third possible realization method based on the application second aspect, in the 4th kind of possible realization method, institute Traffic information is stated to include:With the relevant face characteristic of the holder;
The access control terminal is specifically used for:Based on the facial image of the holder, the logical of the holder is generated Row information.
The 4th kind of possible realization method based on the application second aspect, in the 5th kind of possible realization method, institute ID card information is stated to further include:Identification card number in the identity card;The traffic information further includes:It is related to the holder Identification card number;
The access control terminal is specifically additionally operable to:Based on the identification card number in the identity card, the holder is generated Traffic information.
The 4th kind of possible realization method based on the application second aspect, in the 6th kind of possible realization method, institute Traffic information is stated to further include:With the holder is relevant allows the current time limit;
The access control terminal is specifically additionally operable to:Current time limit or when allowing current of acquiescence are allowed based on input Limit generates the traffic information of the holder.
The 6th kind of possible realization method based on the application second aspect, in the 7th kind of possible realization method, institute Access control terminal is stated to be additionally operable to:When with the holder relevant time for allowing current time limit instruction in get again During the facial image of the holder, trigger the entrance guard device and open.
The 4th kind of possible realization method based on the application second aspect, in the 8th kind of possible realization method, institute Traffic information is stated to further include:With the relevant current record of the holder, the current record includes current time, Yi Jitong Capable position;
The access control terminal is specifically additionally operable to:The time currently passed through based on the holder and position, generation The traffic information of the holder.
The 4th kind of possible realization method based on the application second aspect, in the 9th kind of possible realization method, institute Traffic information is stated to further include:With the relevant right of access of the holder, the right of access is the access control terminal control The whether transitable permission of each entrance guard device in the range of system;
The access control terminal is specifically additionally operable to:The right of access of right of access or acquiescence based on input, generation The traffic information of the holder.
Therefore by the head image information in identity card identification device reading identity card in the application, and controlled to gate inhibition Terminal processed sends ID card information, and the facial image of the holder of the identity card is obtained by access control terminal and obtains the head portrait The matching result of information and facial image, when matching result is successful match, access control terminal generation holder is passed through Information, and trigger entrance guard device unlatching.On the one hand, due to face characteristic Existence and uniquenss, even if the identity card quilt of user Criminal usurps, and criminal is also difficult to be utilized identity card triggering entrance guard device and opens, on the other hand, forged identity card Difficulty is larger, and criminal is difficult to trigger entrance guard device unlatching, two sides of summary by way of forging false identities card As it can be seen that relative to traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent in face.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or it will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other attached drawings according to these attached drawings.
Fig. 1 is access control method one embodiment flow diagram that the application provides;
Fig. 2 is access control system one embodiment structure diagram that the application provides.
Specific embodiment
To enable present invention purpose, feature, advantage more apparent and understandable, below in conjunction with the application The technical solution in the embodiment of the present application is clearly and completely described in attached drawing in embodiment, it is clear that described reality It is only some embodiments of the present application to apply example, and not all embodiments.Based on the embodiment in the application, the common skill in this field Art personnel all other embodiments obtained without making creative work belong to the model of the application protection It encloses.
It should be understood that the size of the serial number of each step is not meant to the priority of execution sequence in following methods embodiment, respectively The execution sequence of process should determine that the implementation process without coping with each embodiment forms any limit with its function and internal logic It is fixed.
Embodiment one
Present application example provides a kind of access control method.The access control method is applied to access control system, the door Prohibiting control system has entrance guard device, identity recognition device and access control terminal.As shown in Figure 1, in the embodiment of the present application Access control method includes:
The ID card information of step 101, identity card identification device reading identity card, and it is above-mentioned to the transmission of access control terminal ID card information;
In the embodiment of the present application, identity card identification device is the true and false and captured identity card information that can identify identity card Equipment.In a step 101, identity card identification device first can carry out anti-fake certificate to identification identity card, visit dummy authentication by rear, The ID card information of the identity card is read, wherein, above-mentioned access registrar can include:Pass through the optics word of identity card identification device Symbol identification (Optical Character Recognition, OCR) module obtains the first facial image on above-mentioned identity card, The second facial image stored in the chip of above-mentioned identity card is obtained by the chip read module of the identity card identification device, if Above-mentioned first facial image is consistent with above-mentioned second facial image, it is determined that the anti-fake certificate of above-mentioned identity card passes through;It is if above-mentioned First facial image and above-mentioned second facial image are inconsistent, it is determined that the anti-fake certificate of above-mentioned identity card does not pass through.
Wherein, above-mentioned ID card information includes the head image information in identity card.Further, above-mentioned ID card information can be with Including one or more following information:Name, date of birth, ID card No., address.
In the embodiment of the present application, identity card identification device may be provided at entrance guard device (such as gate mouth), so as to user When wanting through the entrance guard device, identity card can be placed on to the induction region of the identity card identification device, so as to the identity Card reads it and reads the ID card information of the identity card.
In a step 101, the identity card can be obtained when listening to above-mentioned identity card identification device and reading identity card The ID card information that identification device is read.
Step 102, access control terminal obtain the facial image of the holder of above-mentioned identity card;
In a step 102, access control terminal can include camera module, and above-mentioned body is acquired by the camera module The facial image of the holder of part card.Specifically, above-mentioned camera module can be set along with above-mentioned identity card identification device At entrance guard device, when wanting so as to user through the entrance guard device, identity card can be placed on to the identity card identification device Induction region, and by head towards the camera lens of the camera module so that the ID card information of the identity card and the people of the user Face information can be acquired.
It should be noted that the holder of the holder of the identity card not necessarily identity card, for example, when user A's When identity card is stolen by user B, user B is the holder of the identity card at this time, and the actually identity card holds artificial use Family A.
Step 103, access control terminal obtain the matching result of head image information and above-mentioned facial image;
In step 103, (i.e. step 101 obtains the head image information in the above-mentioned ID card information of access control terminal acquisition To ID card information in head image information) with the matching result of facial image (facial image that i.e. step 102 is got).
In a kind of application scenarios, above-mentioned access control terminal can be in local to above-mentioned head image information and above-mentioned face figure As being matched, to obtain above-mentioned matching result.Specifically, step 103 can include:Network difference is extracted according to face characteristic The face characteristic of above-mentioned head image information and above-mentioned facial image is extracted, by the face of above-mentioned head image information and above-mentioned facial image spy Sign is matched, and obtains matching result.
In another application scenarios, above-mentioned access control terminal can also be by server to above-mentioned head image information and upper It states facial image to be matched, and obtains the matching result that server matches obtain.Specifically, above-mentioned access control system may be used also Including:Identify server.Step 103 can include:Above-mentioned access control terminal can be by above-mentioned head image information and above-mentioned face Image is sent to above-mentioned identification server, with trigger above-mentioned identification server according to face characteristic extract network extract respectively it is above-mentioned The face characteristic of head image information and above-mentioned facial image, by the progress of the face characteristic of above-mentioned head image information and above-mentioned facial image Match, and obtained matching result is matched to above-mentioned access control terminal feedback.
Wherein, the face characteristic extraction network that the embodiment of the present application refers to can be trained convolutional neural networks, Certainly, above-mentioned face characteristic extraction network may be other types of face characteristic extraction network, not limit herein.Specifically , existing face matching algorithm may be used to the face characteristic progress in above-mentioned head image information and above-mentioned facial image Match, details are not described herein again.
If step 104, above-mentioned matching result are successful match, above-mentioned access control terminal generates the logical of above-mentioned holder Row information, and trigger above-mentioned entrance guard device and open;
Under normal conditions, if the holder of the accredited artificial identity card of identity card, then the head portrait that step 101 is got The facial image that information and step 102 are got can be with successful match, and if the holder of identity card and the identity card are held Someone is not same people, then the head image information that step 101 is got will be unable to match with the facial image that step 102 identification obtains Success.
At step 104, when the matching result that step 103 is got is successful match, above-mentioned access control terminal life Into the traffic information of above-mentioned holder, and trigger above-mentioned entrance guard device and open that (entrance guard device is currently located position for the holder The entrance guard device put).For example, when above-mentioned entrance guard device is gate mouth, the above-mentioned above-mentioned entrance guard device unlatching of triggering is:In control The gate mouth stated in holder region automatically opens;In another example when above-mentioned entrance guard device is magnetic key operated lock, in above-mentioned triggering Stating entrance guard device unlatching is:Above-mentioned entrance guard device is controlled to power off, so that above-mentioned entrance guard device loses magnetic force, user can be at this time Open the gate of entrance guard device control.
Further, above-mentioned access control system can also include:Management server.In the current letter for generating above-mentioned holder After breath, the traffic information of generation can be stored in local or be sent to the traffic information of generation by access control terminal Management server is stated, by management server management and the traffic information of each user is safeguarded, to facilitate administrative staff to passer Member (passing through the personnel of entrance guard device) is checked.Optionally, the traffic information of above-mentioned holder may include following information:With The above-mentioned relevant face characteristic of holder.Further, the traffic information of above-mentioned holder can also include such as the next item down or two Information above:Identification card number relevant with above-mentioned holder, with above-mentioned holder it is relevant allow the current time limit, with it is above-mentioned accredited The relevant current record (current record may include current time and current position) of people and related to above-mentioned holder Right of access.Above-mentioned every terms of information is illustrated individually below:
1st, for the relevant face characteristic of above-mentioned holder.At step 104, above-mentioned access control terminal generation is above-mentioned The traffic information of holder includes:Based on the face characteristic of above-mentioned holder, the traffic information of above-mentioned holder is generated.Specifically , at step 104, when the matching result that step 103 is got is successful match, the current letter of above-mentioned holder can be created Breath, and (face characteristic can be carried based on the face characteristic extraction network referred in step 103 by the face characteristic of above-mentioned holder Obtain) it is recorded in the traffic information.
2nd, for the relevant identification card number of above-mentioned holder.The identification card number can be read by step 101 and be obtained, That is, the ID card information in step 101 further includes:Identification card number in identity.At step 104, above-mentioned access control terminal The traffic information for generating above-mentioned holder includes:Above-mentioned access control terminal is based on the identification card number in above-mentioned identity card, generation The traffic information of above-mentioned holder.Specifically, at step 104, when the matching result that step 103 is got is successful match When, the traffic information of above-mentioned holder, and the identification card number that the face characteristic of above-mentioned holder and step 101 are read can be created Associated record is in the traffic information.
3rd, for above-mentioned holder is relevant allows the current time limit.At step 104, above-mentioned access control terminal generation The traffic information of above-mentioned holder includes:The permission that allows current time limit or acquiescence of the above-mentioned access control terminal based on input The current time limit generates the traffic information of above-mentioned holder.Wherein, it is above-mentioned allow current time limit instruction allow corresponding personnel (namely Corresponding holder) current time.In the embodiment of the present application, this allows the current time limit can be by administrative staff according to holder Actual conditions are inputted (such as according to the type (such as visitor, staff or owner) of current personnel, the visit mesh of visitor , type (such as common visitor, honored guest) of visitor situations such as input), alternatively, this allows the current time limit to may be that acquiescence is set That has put allows the current time limit.Specifically, when the matching result that step 103 is got is successful match, above-mentioned hold can be created The traffic information of witness, and current time limit and the face characteristic associated record of above-mentioned holder is allowed to lead at this default setting In row information;Alternatively, when the matching result that step 103 is got is successful match, remind administrative staff that input allows to pass through Time limit, so that will be inputted allows the face characteristic associated storage of current time limit and above-mentioned holder in the current letter of the holder In breath.Further, if in the preset duration after administrative staff's input is reminded to allow the current time limit, being not detected allows to pass through The input in time limit, then can also be by the face characteristic associated storage of the operation current time limit of default setting and above-mentioned holder at this In the traffic information of holder.Further, if above-mentioned traffic information includes:With above-mentioned holder is relevant allows the current time limit, Then the access control method in the embodiment of the present application can also include:When above-mentioned access control terminal is related to above-mentioned holder The time for allowing current time limit instruction in get the facial image of above-mentioned holder again, then trigger above-mentioned entrance guard device and open It opens.That is, with above-mentioned holder is relevant allows in the current time limit, which can trigger the gate inhibition by brush face mode Device is opened, without brush identity card again.
4th, for the relevant current record of above-mentioned holder, which includes:Current time and current position It puts.At step 104, the traffic information of the above-mentioned holder of above-mentioned access control terminal generation includes:Worked as based on above-mentioned holder Preceding current time and position generate the traffic information of above-mentioned holder.Specifically, at step 104, when step 103 obtains When the matching result got is successful match, the traffic information of above-mentioned holder can be created, and the face of above-mentioned holder is special The current record associated record such as the time currently passed through with above-mentioned holder and position is levied in the traffic information.
5th, for the relevant right of access of above-mentioned holder.At step 104, above-mentioned access control terminal generation is above-mentioned The traffic information of holder includes:The right of access of right of access or acquiescence of the above-mentioned access control terminal based on input, it is raw Into the traffic information of above-mentioned holder.Wherein, above-mentioned right of access is each gate inhibition in the range of above-mentioned access control terminal control Device respectively whether transitable permission.In the embodiment of the present application, which can be by administrative staff according to holder Actual conditions are inputted (such as according to the type (such as visitor, staff or owner) of current personnel, the visit mesh of visitor , type (such as common visitor, honored guest) of visitor situations such as input), alternatively, the right of access may be that default setting is good Right of access.Specifically, when the matching result that step 103 is got is successful match, the logical of above-mentioned holder can be created Row information, and by the face characteristic associated record of the right of access of default setting and above-mentioned holder in the traffic information;Or Person when the matching result that step 103 is got is successful match, reminds administrative staff to input right of access, to input Right of access and above-mentioned holder face characteristic associated storage in the traffic information of the holder.Further, if carrying In preset duration after administrative staff's input right of access of waking up, the input for allowing the current time limit is not detected, then can also incite somebody to action The face characteristic associated storage of the right of access of default setting and above-mentioned holder is in the traffic information of the holder.Into one Step, if above-mentioned traffic information includes:With the relevant right of access of above-mentioned holder, then the access control side in the embodiment of the present application Method can also include:When entrance guard device of the above-mentioned access control terminal in the range of the access control terminal control is got again During the facial image of above-mentioned holder, based on detecting whether the holder can pass through with the relevant right of access of the holder, if It is then to trigger entrance guard device unlatching, if it is not, not triggering entrance guard device unlatching then.
In the embodiment of the present application, when the matching result that step 103 is got is that it fails to match, it is believed that identity card is held The holder of witness and the identity card is not same people, and above-mentioned entrance guard device is not controlled to open at this time, that is, keeping the gate inhibition to be Locking states.
It should be noted that for different types of entrance guard device, under the different condition after entrance guard device unlock, door Prohibiting device also can locking again.For example, when entrance guard device is gate mouth, gate mouth automatically opens when which unlocks, And after waiting for preset duration or when detecting user by the gate mouth, the entrance guard device can automatic blocking, at this time The gate mouth is automatically closed;In another example when entrance guard device is magnetic key operated lock, after entrance guard device unlock, if the gate inhibition fills The electromagnetism (electromagnetism is typically mounted on doorframe) put does not detach whithin a period of time with iron plate (iron plate is typically mounted on gate), Then entrance guard device automatic blocking (namely being re-powered to the magnetic key operated lock), if the electromagnetism of the entrance guard device is heavy after being detached with iron plate It newly contacts, then the entrance guard device automatic blocking (namely being re-powered to the magnetic key operated lock).
Optionally, the identity card identification device in the embodiment of the present application can be connected by serial ports and above-mentioned access control terminal It connects, which is serial communication interface, is the expansion interface using serial communication mode.
Alternatively, above-mentioned identity card identification device can also be integrated in the access control device (i.e. above-mentioned identity card identification Device is integrated machine with above-mentioned access control device), it does not limit herein.
Therefore by the head image information in identity card identification device reading identity card in the application, and controlled to gate inhibition Terminal processed sends ID card information, and the facial image of the holder of the identity card is obtained by access control terminal and obtains the head portrait The matching result of information and facial image, when matching result is successful match, access control terminal generation holder is passed through Information, and trigger entrance guard device unlatching.On the one hand, due to face characteristic Existence and uniquenss, even if the identity card quilt of user Criminal usurps, and criminal is also difficult to be utilized identity card triggering entrance guard device and opens, on the other hand, forged identity card Difficulty is larger, and criminal is difficult to trigger entrance guard device unlatching, two sides of summary by way of forging false identities card As it can be seen that relative to traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent in face.
Embodiment two
Present application example provides a kind of access control system, as shown in Fig. 2, the access control system in the embodiment of the present application 20 include:Identity card identification device 21, access control terminal 22 and entrance guard device 23;
Wherein, identity card identification device 21 is used for:The ID card information of reading identity card, wherein, the ID card information Including the head image information in identity card;
Access control terminal 22 is used for:Obtain the facial image of the holder of the identity card;Obtain the head image information With the matching result of the facial image;If the matching result is successful match, described in the access control terminal generation The traffic information of holder, and trigger entrance guard device 23 and open.
Optionally, the access control system in the embodiment of the present application may also include:Management server, above-mentioned management server For managing and safeguarding the traffic information of each user.Access control terminal 22 is additionally operable to:The traffic information is stored in this Ground;And/or the traffic information is sent to above-mentioned management server, the management server is each for managing and safeguarding The traffic information of user.
Optionally, access control terminal 22 is specifically used for:Network is extracted according to face characteristic and extracts the head portrait letter respectively The face characteristic of breath and the facial image, the face characteristic of the head image information and the facial image is matched, is obtained Take matching result;Or, the access control system in the embodiment of the present application may also include:Identify server, access control terminal 22 Specifically it is additionally operable to:The head image information and the facial image are sent to identification server, to trigger the identification server It extracts the face characteristic of the head image information and the facial image respectively according to face characteristic extraction network, the head portrait is believed The face characteristic of breath and the facial image is matched, and obtained matching knot is matched to access control terminal feedback Fruit.
Optionally, above-mentioned traffic information includes:With the relevant face characteristic of the holder.Access control terminal 22 is specific For:Based on the facial image of the holder, the traffic information of the holder is generated.
Optionally, the ID card information further includes:Identification card number in the identity card;The traffic information is also wrapped It includes:With the relevant identification card number of the holder.Access control terminal 22 is specifically additionally operable to:Based on the identity in the identity card Card number generates the traffic information of the holder.
Optionally, the traffic information further includes:With the holder is relevant allows the current time limit.Access control terminal 22 are specifically additionally operable to:Based on input allow current time limit or acquiescence allow the current time limit, generate the logical of the holder Row information.
Optionally, access control terminal 22 is additionally operable to:When with the holder is relevant allows current time limit instruction When getting the facial image of the holder in the time again, triggering entrance guard device 23 is opened.
Optionally, the traffic information further includes:With the relevant current record of the holder, the current record includes Current time and current position.Access control terminal 22 is specifically additionally operable to:Based on the holder currently pass through when Between and position, generate the traffic information of the holder.
Optionally, the traffic information further includes:With the relevant right of access of the holder, the right of access is institute State the whether transitable permission of each entrance guard device in the range of access control terminal control.Access control terminal 22 is specifically also used In:The right of access of right of access or acquiescence based on input generates the traffic information of the holder.
Optionally, the identity card identification device 21 in the embodiment of the present application can be connected by serial ports and access control terminal 22 It connects, alternatively, identity card identification device 21 can also be integrated in access control device 22 (i.e. identity card identification device 21 and gate inhibition Control device 22 is integrated machine), it does not limit herein.
Therefore by the head image information in identity card identification device reading identity card in the application, and controlled to gate inhibition Terminal processed sends ID card information, and the facial image of the holder of the identity card is obtained by access control terminal and obtains the head portrait The matching result of information and facial image, when matching result is successful match, access control terminal generation holder is passed through Information, and trigger entrance guard device unlatching.On the one hand, due to face characteristic Existence and uniquenss, even if the identity card quilt of user Criminal usurps, and criminal is also difficult to be utilized identity card triggering entrance guard device and opens, on the other hand, forged identity card Difficulty is larger, and criminal is difficult to trigger entrance guard device unlatching, two sides of summary by way of forging false identities card As it can be seen that relative to traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent in face.
It should be appreciated that the present processes and device, system may be achieved in many ways.It for example, can be by soft Part, hardware, firmware or software, hardware, firmware any combinations realize the present processes and device, equipment.For side Merely to illustrate, the step of the present processes, is not limited to described in detail above suitable for the said sequence of the step of method Sequence, unless specifically stated otherwise.In addition, in some embodiments, the application can be also embodied as being recorded in record Jie Program in matter, these programs include being used to implement the machine readable instructions according to the present processes.Thus, the application is also covered Lid storage is for execution according to the recording medium of the program of the present processes.
It should be noted that it in the above-described embodiments, all emphasizes particularly on different fields to the description of each embodiment, in some embodiment The part not being described in detail may refer to the associated description of other embodiments.
The description of the present application provides for the sake of example and description, and is not exhaustively or by the application It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches Embodiment is stated and be the principle and practical application in order to more preferably illustrate the application, and those of ordinary skill in the art is enable to manage The application is solved so as to design the various embodiments with various modifications suitable for special-purpose.

Claims (10)

1. a kind of access control method, which is characterized in that applied to access control system, the access control system has gate inhibition Device, identity card identification device and access control terminal, the access control method include:
The ID card information of the identity card identification device reading identity card, and send the identity to the access control terminal Information is demonstrate,proved, wherein, the ID card information includes the head image information in identity card;
The access control terminal obtains the facial image of the holder of the identity card;
The access control terminal obtains the matching result of the head image information and the facial image;
If the matching result is successful match, the access control terminal generates the traffic information of the holder, and touches It sends out entrance guard device described and opens.
2. access control method according to claim 1, which is characterized in that held described in access control terminal generation After the traffic information of witness, the access control method further includes:
The traffic information is stored in local by the access control terminal;
And/or
The access control system further includes:Management server;
The traffic information is sent to the management server by the access control terminal, and the management server is used to manage With the traffic information for safeguarding each user.
3. access control method according to claim 1, which is characterized in that
The access control terminal obtains the matching result of the head image information and the facial image, including:
The access control terminal extracts network according to face characteristic and extracts the head image information and the facial image respectively Face characteristic matches the face characteristic of the head image information and the facial image, obtains matching result;
Or,
The access control system further includes:Identify server;
The head image information and the facial image are sent to the identification server by the access control terminal, to trigger The face characteristic that identification server extracts the head image information and the facial image according to face characteristic extraction network respectively is stated, The face characteristic of the head image information and the facial image is matched, and is matched to access control terminal feedback The matching result arrived.
4. access control method according to any one of claims 1 to 3, which is characterized in that
The identity card identification device is connect by serial ports with the access control terminal.
5. access control method according to claim 4, which is characterized in that the traffic information includes:With it is described accredited The relevant face characteristic of people;
The traffic information that the access control terminal generates the holder includes:
The face characteristic of the access control terminal based on the holder generates the traffic information of the holder.
6. access control method according to claim 5, which is characterized in that the ID card information further includes:The body Identification card number in part card;The traffic information further includes:With the relevant identification card number of the holder;
The traffic information that the access control terminal generates the holder includes:
The access control terminal generates the traffic information of the holder based on the identification card number in the identity card.
7. access control method according to claim 5, which is characterized in that the traffic information further includes:It is held with described Witness is relevant to allow the current time limit;
The traffic information that the access control terminal generates the holder includes:
The access control terminal based on input allow current time limit or acquiescence allow the current time limit, generation is described accredited The traffic information of people.
8. access control method according to claim 7, which is characterized in that the access control method further includes:
When the access control terminal with the holder relevant time for allowing current time limit instruction in get again The facial image of the holder then triggers the entrance guard device and opens.
9. access control method according to claim 5, which is characterized in that the traffic information further includes:It is held with described The relevant current record of witness, the current record include current time and current position;
The traffic information that the access control terminal generates the holder includes:
The time currently passed through based on the holder and position generate the traffic information of the holder.
10. a kind of access control system, which is characterized in that including:Identity card identification device, access control terminal and gate inhibition's dress It puts;
The identity card identification device is used for:The ID card information of reading identity card, wherein, the ID card information includes identity Head image information in card;
The access control terminal is used for:Obtain the facial image of the holder of the identity card;Obtain the head image information with The matching result of the facial image;If the matching result is successful match, held described in the access control terminal generation The traffic information of witness, and trigger the entrance guard device and open.
CN201711347579.9A 2017-12-15 2017-12-15 Access control method and access control system Pending CN108205835A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711347579.9A CN108205835A (en) 2017-12-15 2017-12-15 Access control method and access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711347579.9A CN108205835A (en) 2017-12-15 2017-12-15 Access control method and access control system

Publications (1)

Publication Number Publication Date
CN108205835A true CN108205835A (en) 2018-06-26

Family

ID=62603911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711347579.9A Pending CN108205835A (en) 2017-12-15 2017-12-15 Access control method and access control system

Country Status (1)

Country Link
CN (1) CN108205835A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410387A (en) * 2018-09-30 2019-03-01 安徽灵图壹智能科技有限公司 A kind of recognition of face prison safeguard management method and system
CN109727346A (en) * 2018-11-30 2019-05-07 杭州英杰电子有限公司 Directly locking the networking door-locking system and testimony of a witness comparison method for realizing that the testimony of a witness compares
CN110555926A (en) * 2019-07-26 2019-12-10 华中科技大学 Access control method based on multi-certificate recognition and corresponding device
CN110570549A (en) * 2019-07-26 2019-12-13 华中科技大学 Intelligent unlocking method and corresponding device
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113538759A (en) * 2021-07-08 2021-10-22 深圳创维-Rgb电子有限公司 Access control management method, device, equipment and storage medium based on display equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002342804A (en) * 2001-05-15 2002-11-29 Ricoh Co Ltd Device and method for reception of visitor, and recording medium recorded with visitor reception program
CN102129555A (en) * 2011-03-23 2011-07-20 北京深思洛克软件技术股份有限公司 Second-generation identity card-based authentication method and system
CN102663844A (en) * 2012-05-02 2012-09-12 李凯 Method for controlling authority of mobile equipment under different conditions
CN106296919A (en) * 2016-08-10 2017-01-04 广东工业大学 A kind of intelligent access control system and inlet/outlet management method
CN106650560A (en) * 2015-11-04 2017-05-10 上海市公安局刑事侦查总队 Identity authentication method based on identity card and identity authentication processor and system thereof
CN107016755A (en) * 2017-03-24 2017-08-04 新疆习美人工智能科技有限公司 A kind of entrance guard device and fast face recognize certification passing method
CN107038776A (en) * 2017-03-24 2017-08-11 新疆习美人工智能科技有限公司 A kind of gate control system and access control method
CN206672201U (en) * 2017-04-08 2017-11-24 山西平安谷信息技术有限公司 A kind of passageway gate machine system
CN107426499A (en) * 2017-08-05 2017-12-01 重庆智之屋科技发展有限公司 Unattended gate inhibition's guest system and access control method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002342804A (en) * 2001-05-15 2002-11-29 Ricoh Co Ltd Device and method for reception of visitor, and recording medium recorded with visitor reception program
CN102129555A (en) * 2011-03-23 2011-07-20 北京深思洛克软件技术股份有限公司 Second-generation identity card-based authentication method and system
CN102663844A (en) * 2012-05-02 2012-09-12 李凯 Method for controlling authority of mobile equipment under different conditions
CN106650560A (en) * 2015-11-04 2017-05-10 上海市公安局刑事侦查总队 Identity authentication method based on identity card and identity authentication processor and system thereof
CN106296919A (en) * 2016-08-10 2017-01-04 广东工业大学 A kind of intelligent access control system and inlet/outlet management method
CN107016755A (en) * 2017-03-24 2017-08-04 新疆习美人工智能科技有限公司 A kind of entrance guard device and fast face recognize certification passing method
CN107038776A (en) * 2017-03-24 2017-08-11 新疆习美人工智能科技有限公司 A kind of gate control system and access control method
CN206672201U (en) * 2017-04-08 2017-11-24 山西平安谷信息技术有限公司 A kind of passageway gate machine system
CN107426499A (en) * 2017-08-05 2017-12-01 重庆智之屋科技发展有限公司 Unattended gate inhibition's guest system and access control method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410387A (en) * 2018-09-30 2019-03-01 安徽灵图壹智能科技有限公司 A kind of recognition of face prison safeguard management method and system
CN109727346A (en) * 2018-11-30 2019-05-07 杭州英杰电子有限公司 Directly locking the networking door-locking system and testimony of a witness comparison method for realizing that the testimony of a witness compares
CN110555926A (en) * 2019-07-26 2019-12-10 华中科技大学 Access control method based on multi-certificate recognition and corresponding device
CN110570549A (en) * 2019-07-26 2019-12-13 华中科技大学 Intelligent unlocking method and corresponding device
CN110570549B (en) * 2019-07-26 2021-07-06 华中科技大学 Intelligent unlocking method and corresponding device
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113223224B (en) * 2021-05-12 2023-10-24 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113538759A (en) * 2021-07-08 2021-10-22 深圳创维-Rgb电子有限公司 Access control management method, device, equipment and storage medium based on display equipment
CN113538759B (en) * 2021-07-08 2023-08-04 深圳创维-Rgb电子有限公司 Gate inhibition management method, device and equipment based on display equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108205835A (en) Access control method and access control system
CN108205834A (en) Access control management method and access control system
Jain et al. An introduction to biometric recognition
CN104169933A (en) Method, apparatus, and computer-readable recording medium for authenticating a user
CN107992739A (en) User authentication method, apparatus and system
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN107730672A (en) A kind of face identification unit gate control system and control method
CN109410407A (en) A kind of face and fingerprint recognition access control system
KR100965428B1 (en) The system and operating method using two different positioned intelligent cameras for automatic verification of authenticated person's entrance
CN109147104A (en) A kind of electronic lock and its verification method of double verification
CN109215191A (en) Nobody a kind of intelligent access control system and its working method on duty
Ohana et al. Preventing cell phone intrusion and theft using biometrics
JP2004211541A (en) Safe-deposit box using biological recognition technology
CN109461241A (en) A kind of face and fingerprint identification entrance guard system control method
CN106780864A (en) Gate control system based on skeleton identification technology
Prasanthi et al. Palm vein biometric technology: An approach to upgrade security in ATM transactions
CN107590888A (en) A kind of building are registered one's residence gate control system
Schneier Sensible Authentication: According to the author of Beyond Fear, it’s not enough to know who you are; you’ve got to prove it.
CN108198283A (en) A kind of cloud locks concealed fingerprint head design method and system
CN109840969A (en) A kind of security system of fingerprint and face recognition one
KR20090041619A (en) Entrance and exit control system
CN101681498A (en) Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, program, and vein data struc
CN106408690A (en) Nuclear power plant personnel entrance and exit control apparatus and nuclear power plant personnel entrance and exit control method
CN206224637U (en) Gate inhibition's all-in-one
CN105225307B (en) Personnel's bayonet type gate and controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180626