CN108205835A - Access control method and access control system - Google Patents
Access control method and access control system Download PDFInfo
- Publication number
- CN108205835A CN108205835A CN201711347579.9A CN201711347579A CN108205835A CN 108205835 A CN108205835 A CN 108205835A CN 201711347579 A CN201711347579 A CN 201711347579A CN 108205835 A CN108205835 A CN 108205835A
- Authority
- CN
- China
- Prior art keywords
- access control
- control terminal
- holder
- information
- traffic information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
This application discloses a kind of access control method and access control system, wherein, which is applied to access control system, which has entrance guard device, identity card identification device and access control terminal, which includes:The ID card information of identity card identification device reading identity card, and send ID card information to access control terminal;Access control terminal obtains the facial image of the holder of the identity card;The access control terminal obtains the matching result of the head image information and the facial image in the ID card information;If matching result is successful match, access control terminal generates the traffic information of the holder, and triggers entrance guard device unlatching.The technical solution that the application provides can effectively improve the safety of gate inhibition's identification.
Description
Technical field
This application involves gate inhibition's technical fields, and in particular to a kind of access control method and access control system.
Background technology
With the continuous development of economic society, requirement of the people to work and living environment is also continuously improved, in order to meet
For people to gathering around there are one the work of safety and comfort, living environment, many building, garden entrance are assembled with gate.
Gate has the effects that managing the stream of people and specification pedestrian comes in and goes out, and gate is from being developed so far, the gate inhibition identification side that uses
Formula includes:Brush password card and fingerprint recognition.The recognition speed of brush password card is fast, success rate is high, therefore passage rate is fast, but only
Recognize password card, if pedestrian leaves behind, loses password card, just without right of access, in addition password card may also be stolen, these
All there is great security risk to management.With respect to brush password card, fingerprint recognition can save the fiber crops for carrying the external medium of these machines
It is tired.But the acquisition of fingerprint is easier to, and the possibility pretended is larger, so using loophole in the presence of certain.
As it can be seen that existing gate inhibition's identification method safety is relatively low.
Invention content
The application provides a kind of access control method and access control system, for improving the safety of gate inhibition's identification.
The application first aspect provides a kind of access control method, applied to access control system, the access control system
System has entrance guard device, identity card identification device and access control terminal, and the access control method includes:
The ID card information of the identity card identification device reading identity card, and to described in access control terminal transmission
ID card information, wherein, the ID card information includes the head image information in identity card;
The access control terminal obtains the facial image of the holder of the identity card;
The access control terminal obtains the matching result of the head image information and the facial image;
If the matching result is successful match, the access control terminal generates the traffic information of the holder,
And it triggers the entrance guard device and opens.
Based on invention in a first aspect, in the first possible implementation, described in access control terminal generation
After the traffic information of holder, the access control method further includes:
The traffic information is stored in local by the access control terminal;
And/or the access control system further includes:Management server, the access control terminal is by the current letter
Breath is sent to the management server, and the management server is used to manage and safeguard the traffic information of each user.
Based on the application in a first aspect, in second of possible realization method, described in the access control terminal acquisition
The matching result of head image information and the facial image, including:
The access control terminal extracts network according to face characteristic and extracts the head image information and the face figure respectively
The face characteristic of picture matches the face characteristic of the head image information and the facial image, obtains matching result;
Or,
The access control system further includes:Identify server;
The head image information and the facial image are sent to the identification server by the access control terminal, to touch
It sends out described and identifies that server extracts the face of the head image information and the facial image according to face characteristic extraction network respectively
Feature matches the face characteristic of the head image information and the facial image, and is fed back to the access control terminal
Match obtained matching result.
The first possible realization method, the application first party based on the application first aspect, the application first aspect
Second of possible realization method in face, in the third possible realization method, the identity card identification device passes through serial ports
It is connect with the access control terminal.
The third possible realization method based on the application first aspect, in the 4th kind of possible realization method, institute
Traffic information is stated to include:With the relevant face characteristic of the holder;
The traffic information that the access control terminal generates the holder includes:
The face characteristic of the access control terminal based on the holder generates the traffic information of the holder.
The 4th kind of possible realization method based on the application first aspect, in the 5th kind of possible realization method, institute
ID card information is stated to further include:Identification card number in the identity card;The traffic information further includes:It is related to the holder
Identification card number;
The traffic information that the access control terminal generates the holder includes:
The access control terminal generates the traffic information of the holder based on the identification card number in the identity card.
The 4th kind of possible realization method based on the application first aspect, in the 6th kind of possible realization method, institute
Traffic information is stated to further include:With the holder is relevant allows the current time limit;
The traffic information that the access control terminal generates the holder includes:
The allow current time limit that allows current time limit or acquiescence of the access control terminal based on input, described in generation
The traffic information of holder.
The 6th kind of possible realization method based on the application first aspect, in the 7th kind of possible realization method, institute
Access control method is stated to further include:
When the access control terminal with the holder relevant time for allowing current time limit instruction in obtain again
The facial image of the holder is got, then triggers the entrance guard device and opens.
The 4th kind of possible realization method based on the application first aspect, in the 8th kind of possible realization method, institute
Traffic information is stated to further include:With the relevant current record of the holder, the current record includes current time, Yi Jitong
Capable position;
The traffic information that the access control terminal generates the holder includes:
The time currently passed through based on the holder and position generate the traffic information of the holder.
The 4th kind of possible realization method based on the application first aspect, in the 9th kind of possible realization method, institute
Traffic information is stated to further include:With the relevant right of access of the holder, the right of access is the access control terminal control
In the range of system each entrance guard device respectively whether transitable permission;
The traffic information that the access control terminal generates the holder includes:
The right of access of right of access or acquiescence of the access control terminal based on input, generates the holder
Traffic information.
The application second aspect provides a kind of access control system, including:Identity card identification device, access control terminal and
Entrance guard device;
The identity card identification device is used for:The ID card information of reading identity card, wherein, the ID card information includes
Head image information in identity card;
The access control terminal is used for:Obtain the facial image of the holder of the identity card;Obtain the head portrait letter
The matching result of breath and the facial image;If the matching result is successful match, the access control terminal generates institute
The traffic information of holder is stated, and triggers the entrance guard device and opens.
Based on the application second aspect, in the first possible implementation, the access control system further includes:Pipe
Server is managed, the management server is used to manage and safeguard the traffic information of each user;
The access control terminal is additionally operable to:
The traffic information is stored in local;
And/or
The traffic information is sent to the management server, the management server is used to managing and safeguarding each use
The traffic information at family.
The first possible realization method based on the application second aspect, in second of possible realization method, institute
Access control terminal is stated to be specifically used for:Network is extracted according to face characteristic and extracts the head image information and the facial image respectively
Face characteristic, the face characteristic of the head image information and the facial image is matched, obtain matching result;
Or, the access control system further includes:Identify server, the access control terminal is specifically additionally operable to:By institute
It states head image information and is sent to the identification server with the facial image, to trigger the identification server according to face characteristic
Extraction network extracts the face characteristic of the head image information and the facial image respectively, by the head image information and the face
The face characteristic of image is matched, and obtained matching result is matched to access control terminal feedback.
Based on the possible realization method of the first of the application second aspect or the application second aspect or this Shen
Please second aspect second of possible realization method, in the third possible realization method, the identity card identification device
It is connect by serial ports with the access control terminal.
The third possible realization method based on the application second aspect, in the 4th kind of possible realization method, institute
Traffic information is stated to include:With the relevant face characteristic of the holder;
The access control terminal is specifically used for:Based on the facial image of the holder, the logical of the holder is generated
Row information.
The 4th kind of possible realization method based on the application second aspect, in the 5th kind of possible realization method, institute
ID card information is stated to further include:Identification card number in the identity card;The traffic information further includes:It is related to the holder
Identification card number;
The access control terminal is specifically additionally operable to:Based on the identification card number in the identity card, the holder is generated
Traffic information.
The 4th kind of possible realization method based on the application second aspect, in the 6th kind of possible realization method, institute
Traffic information is stated to further include:With the holder is relevant allows the current time limit;
The access control terminal is specifically additionally operable to:Current time limit or when allowing current of acquiescence are allowed based on input
Limit generates the traffic information of the holder.
The 6th kind of possible realization method based on the application second aspect, in the 7th kind of possible realization method, institute
Access control terminal is stated to be additionally operable to:When with the holder relevant time for allowing current time limit instruction in get again
During the facial image of the holder, trigger the entrance guard device and open.
The 4th kind of possible realization method based on the application second aspect, in the 8th kind of possible realization method, institute
Traffic information is stated to further include:With the relevant current record of the holder, the current record includes current time, Yi Jitong
Capable position;
The access control terminal is specifically additionally operable to:The time currently passed through based on the holder and position, generation
The traffic information of the holder.
The 4th kind of possible realization method based on the application second aspect, in the 9th kind of possible realization method, institute
Traffic information is stated to further include:With the relevant right of access of the holder, the right of access is the access control terminal control
The whether transitable permission of each entrance guard device in the range of system;
The access control terminal is specifically additionally operable to:The right of access of right of access or acquiescence based on input, generation
The traffic information of the holder.
Therefore by the head image information in identity card identification device reading identity card in the application, and controlled to gate inhibition
Terminal processed sends ID card information, and the facial image of the holder of the identity card is obtained by access control terminal and obtains the head portrait
The matching result of information and facial image, when matching result is successful match, access control terminal generation holder is passed through
Information, and trigger entrance guard device unlatching.On the one hand, due to face characteristic Existence and uniquenss, even if the identity card quilt of user
Criminal usurps, and criminal is also difficult to be utilized identity card triggering entrance guard device and opens, on the other hand, forged identity card
Difficulty is larger, and criminal is difficult to trigger entrance guard device unlatching, two sides of summary by way of forging false identities card
As it can be seen that relative to traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent in face.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or it will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application, for those of ordinary skill in the art, without having to pay creative labor, may be used also
To obtain other attached drawings according to these attached drawings.
Fig. 1 is access control method one embodiment flow diagram that the application provides;
Fig. 2 is access control system one embodiment structure diagram that the application provides.
Specific embodiment
To enable present invention purpose, feature, advantage more apparent and understandable, below in conjunction with the application
The technical solution in the embodiment of the present application is clearly and completely described in attached drawing in embodiment, it is clear that described reality
It is only some embodiments of the present application to apply example, and not all embodiments.Based on the embodiment in the application, the common skill in this field
Art personnel all other embodiments obtained without making creative work belong to the model of the application protection
It encloses.
It should be understood that the size of the serial number of each step is not meant to the priority of execution sequence in following methods embodiment, respectively
The execution sequence of process should determine that the implementation process without coping with each embodiment forms any limit with its function and internal logic
It is fixed.
Embodiment one
Present application example provides a kind of access control method.The access control method is applied to access control system, the door
Prohibiting control system has entrance guard device, identity recognition device and access control terminal.As shown in Figure 1, in the embodiment of the present application
Access control method includes:
The ID card information of step 101, identity card identification device reading identity card, and it is above-mentioned to the transmission of access control terminal
ID card information;
In the embodiment of the present application, identity card identification device is the true and false and captured identity card information that can identify identity card
Equipment.In a step 101, identity card identification device first can carry out anti-fake certificate to identification identity card, visit dummy authentication by rear,
The ID card information of the identity card is read, wherein, above-mentioned access registrar can include:Pass through the optics word of identity card identification device
Symbol identification (Optical Character Recognition, OCR) module obtains the first facial image on above-mentioned identity card,
The second facial image stored in the chip of above-mentioned identity card is obtained by the chip read module of the identity card identification device, if
Above-mentioned first facial image is consistent with above-mentioned second facial image, it is determined that the anti-fake certificate of above-mentioned identity card passes through;It is if above-mentioned
First facial image and above-mentioned second facial image are inconsistent, it is determined that the anti-fake certificate of above-mentioned identity card does not pass through.
Wherein, above-mentioned ID card information includes the head image information in identity card.Further, above-mentioned ID card information can be with
Including one or more following information:Name, date of birth, ID card No., address.
In the embodiment of the present application, identity card identification device may be provided at entrance guard device (such as gate mouth), so as to user
When wanting through the entrance guard device, identity card can be placed on to the induction region of the identity card identification device, so as to the identity
Card reads it and reads the ID card information of the identity card.
In a step 101, the identity card can be obtained when listening to above-mentioned identity card identification device and reading identity card
The ID card information that identification device is read.
Step 102, access control terminal obtain the facial image of the holder of above-mentioned identity card;
In a step 102, access control terminal can include camera module, and above-mentioned body is acquired by the camera module
The facial image of the holder of part card.Specifically, above-mentioned camera module can be set along with above-mentioned identity card identification device
At entrance guard device, when wanting so as to user through the entrance guard device, identity card can be placed on to the identity card identification device
Induction region, and by head towards the camera lens of the camera module so that the ID card information of the identity card and the people of the user
Face information can be acquired.
It should be noted that the holder of the holder of the identity card not necessarily identity card, for example, when user A's
When identity card is stolen by user B, user B is the holder of the identity card at this time, and the actually identity card holds artificial use
Family A.
Step 103, access control terminal obtain the matching result of head image information and above-mentioned facial image;
In step 103, (i.e. step 101 obtains the head image information in the above-mentioned ID card information of access control terminal acquisition
To ID card information in head image information) with the matching result of facial image (facial image that i.e. step 102 is got).
In a kind of application scenarios, above-mentioned access control terminal can be in local to above-mentioned head image information and above-mentioned face figure
As being matched, to obtain above-mentioned matching result.Specifically, step 103 can include:Network difference is extracted according to face characteristic
The face characteristic of above-mentioned head image information and above-mentioned facial image is extracted, by the face of above-mentioned head image information and above-mentioned facial image spy
Sign is matched, and obtains matching result.
In another application scenarios, above-mentioned access control terminal can also be by server to above-mentioned head image information and upper
It states facial image to be matched, and obtains the matching result that server matches obtain.Specifically, above-mentioned access control system may be used also
Including:Identify server.Step 103 can include:Above-mentioned access control terminal can be by above-mentioned head image information and above-mentioned face
Image is sent to above-mentioned identification server, with trigger above-mentioned identification server according to face characteristic extract network extract respectively it is above-mentioned
The face characteristic of head image information and above-mentioned facial image, by the progress of the face characteristic of above-mentioned head image information and above-mentioned facial image
Match, and obtained matching result is matched to above-mentioned access control terminal feedback.
Wherein, the face characteristic extraction network that the embodiment of the present application refers to can be trained convolutional neural networks,
Certainly, above-mentioned face characteristic extraction network may be other types of face characteristic extraction network, not limit herein.Specifically
, existing face matching algorithm may be used to the face characteristic progress in above-mentioned head image information and above-mentioned facial image
Match, details are not described herein again.
If step 104, above-mentioned matching result are successful match, above-mentioned access control terminal generates the logical of above-mentioned holder
Row information, and trigger above-mentioned entrance guard device and open;
Under normal conditions, if the holder of the accredited artificial identity card of identity card, then the head portrait that step 101 is got
The facial image that information and step 102 are got can be with successful match, and if the holder of identity card and the identity card are held
Someone is not same people, then the head image information that step 101 is got will be unable to match with the facial image that step 102 identification obtains
Success.
At step 104, when the matching result that step 103 is got is successful match, above-mentioned access control terminal life
Into the traffic information of above-mentioned holder, and trigger above-mentioned entrance guard device and open that (entrance guard device is currently located position for the holder
The entrance guard device put).For example, when above-mentioned entrance guard device is gate mouth, the above-mentioned above-mentioned entrance guard device unlatching of triggering is:In control
The gate mouth stated in holder region automatically opens;In another example when above-mentioned entrance guard device is magnetic key operated lock, in above-mentioned triggering
Stating entrance guard device unlatching is:Above-mentioned entrance guard device is controlled to power off, so that above-mentioned entrance guard device loses magnetic force, user can be at this time
Open the gate of entrance guard device control.
Further, above-mentioned access control system can also include:Management server.In the current letter for generating above-mentioned holder
After breath, the traffic information of generation can be stored in local or be sent to the traffic information of generation by access control terminal
Management server is stated, by management server management and the traffic information of each user is safeguarded, to facilitate administrative staff to passer
Member (passing through the personnel of entrance guard device) is checked.Optionally, the traffic information of above-mentioned holder may include following information:With
The above-mentioned relevant face characteristic of holder.Further, the traffic information of above-mentioned holder can also include such as the next item down or two
Information above:Identification card number relevant with above-mentioned holder, with above-mentioned holder it is relevant allow the current time limit, with it is above-mentioned accredited
The relevant current record (current record may include current time and current position) of people and related to above-mentioned holder
Right of access.Above-mentioned every terms of information is illustrated individually below:
1st, for the relevant face characteristic of above-mentioned holder.At step 104, above-mentioned access control terminal generation is above-mentioned
The traffic information of holder includes:Based on the face characteristic of above-mentioned holder, the traffic information of above-mentioned holder is generated.Specifically
, at step 104, when the matching result that step 103 is got is successful match, the current letter of above-mentioned holder can be created
Breath, and (face characteristic can be carried based on the face characteristic extraction network referred in step 103 by the face characteristic of above-mentioned holder
Obtain) it is recorded in the traffic information.
2nd, for the relevant identification card number of above-mentioned holder.The identification card number can be read by step 101 and be obtained,
That is, the ID card information in step 101 further includes:Identification card number in identity.At step 104, above-mentioned access control terminal
The traffic information for generating above-mentioned holder includes:Above-mentioned access control terminal is based on the identification card number in above-mentioned identity card, generation
The traffic information of above-mentioned holder.Specifically, at step 104, when the matching result that step 103 is got is successful match
When, the traffic information of above-mentioned holder, and the identification card number that the face characteristic of above-mentioned holder and step 101 are read can be created
Associated record is in the traffic information.
3rd, for above-mentioned holder is relevant allows the current time limit.At step 104, above-mentioned access control terminal generation
The traffic information of above-mentioned holder includes:The permission that allows current time limit or acquiescence of the above-mentioned access control terminal based on input
The current time limit generates the traffic information of above-mentioned holder.Wherein, it is above-mentioned allow current time limit instruction allow corresponding personnel (namely
Corresponding holder) current time.In the embodiment of the present application, this allows the current time limit can be by administrative staff according to holder
Actual conditions are inputted (such as according to the type (such as visitor, staff or owner) of current personnel, the visit mesh of visitor
, type (such as common visitor, honored guest) of visitor situations such as input), alternatively, this allows the current time limit to may be that acquiescence is set
That has put allows the current time limit.Specifically, when the matching result that step 103 is got is successful match, above-mentioned hold can be created
The traffic information of witness, and current time limit and the face characteristic associated record of above-mentioned holder is allowed to lead at this default setting
In row information;Alternatively, when the matching result that step 103 is got is successful match, remind administrative staff that input allows to pass through
Time limit, so that will be inputted allows the face characteristic associated storage of current time limit and above-mentioned holder in the current letter of the holder
In breath.Further, if in the preset duration after administrative staff's input is reminded to allow the current time limit, being not detected allows to pass through
The input in time limit, then can also be by the face characteristic associated storage of the operation current time limit of default setting and above-mentioned holder at this
In the traffic information of holder.Further, if above-mentioned traffic information includes:With above-mentioned holder is relevant allows the current time limit,
Then the access control method in the embodiment of the present application can also include:When above-mentioned access control terminal is related to above-mentioned holder
The time for allowing current time limit instruction in get the facial image of above-mentioned holder again, then trigger above-mentioned entrance guard device and open
It opens.That is, with above-mentioned holder is relevant allows in the current time limit, which can trigger the gate inhibition by brush face mode
Device is opened, without brush identity card again.
4th, for the relevant current record of above-mentioned holder, which includes:Current time and current position
It puts.At step 104, the traffic information of the above-mentioned holder of above-mentioned access control terminal generation includes:Worked as based on above-mentioned holder
Preceding current time and position generate the traffic information of above-mentioned holder.Specifically, at step 104, when step 103 obtains
When the matching result got is successful match, the traffic information of above-mentioned holder can be created, and the face of above-mentioned holder is special
The current record associated record such as the time currently passed through with above-mentioned holder and position is levied in the traffic information.
5th, for the relevant right of access of above-mentioned holder.At step 104, above-mentioned access control terminal generation is above-mentioned
The traffic information of holder includes:The right of access of right of access or acquiescence of the above-mentioned access control terminal based on input, it is raw
Into the traffic information of above-mentioned holder.Wherein, above-mentioned right of access is each gate inhibition in the range of above-mentioned access control terminal control
Device respectively whether transitable permission.In the embodiment of the present application, which can be by administrative staff according to holder
Actual conditions are inputted (such as according to the type (such as visitor, staff or owner) of current personnel, the visit mesh of visitor
, type (such as common visitor, honored guest) of visitor situations such as input), alternatively, the right of access may be that default setting is good
Right of access.Specifically, when the matching result that step 103 is got is successful match, the logical of above-mentioned holder can be created
Row information, and by the face characteristic associated record of the right of access of default setting and above-mentioned holder in the traffic information;Or
Person when the matching result that step 103 is got is successful match, reminds administrative staff to input right of access, to input
Right of access and above-mentioned holder face characteristic associated storage in the traffic information of the holder.Further, if carrying
In preset duration after administrative staff's input right of access of waking up, the input for allowing the current time limit is not detected, then can also incite somebody to action
The face characteristic associated storage of the right of access of default setting and above-mentioned holder is in the traffic information of the holder.Into one
Step, if above-mentioned traffic information includes:With the relevant right of access of above-mentioned holder, then the access control side in the embodiment of the present application
Method can also include:When entrance guard device of the above-mentioned access control terminal in the range of the access control terminal control is got again
During the facial image of above-mentioned holder, based on detecting whether the holder can pass through with the relevant right of access of the holder, if
It is then to trigger entrance guard device unlatching, if it is not, not triggering entrance guard device unlatching then.
In the embodiment of the present application, when the matching result that step 103 is got is that it fails to match, it is believed that identity card is held
The holder of witness and the identity card is not same people, and above-mentioned entrance guard device is not controlled to open at this time, that is, keeping the gate inhibition to be
Locking states.
It should be noted that for different types of entrance guard device, under the different condition after entrance guard device unlock, door
Prohibiting device also can locking again.For example, when entrance guard device is gate mouth, gate mouth automatically opens when which unlocks,
And after waiting for preset duration or when detecting user by the gate mouth, the entrance guard device can automatic blocking, at this time
The gate mouth is automatically closed;In another example when entrance guard device is magnetic key operated lock, after entrance guard device unlock, if the gate inhibition fills
The electromagnetism (electromagnetism is typically mounted on doorframe) put does not detach whithin a period of time with iron plate (iron plate is typically mounted on gate),
Then entrance guard device automatic blocking (namely being re-powered to the magnetic key operated lock), if the electromagnetism of the entrance guard device is heavy after being detached with iron plate
It newly contacts, then the entrance guard device automatic blocking (namely being re-powered to the magnetic key operated lock).
Optionally, the identity card identification device in the embodiment of the present application can be connected by serial ports and above-mentioned access control terminal
It connects, which is serial communication interface, is the expansion interface using serial communication mode.
Alternatively, above-mentioned identity card identification device can also be integrated in the access control device (i.e. above-mentioned identity card identification
Device is integrated machine with above-mentioned access control device), it does not limit herein.
Therefore by the head image information in identity card identification device reading identity card in the application, and controlled to gate inhibition
Terminal processed sends ID card information, and the facial image of the holder of the identity card is obtained by access control terminal and obtains the head portrait
The matching result of information and facial image, when matching result is successful match, access control terminal generation holder is passed through
Information, and trigger entrance guard device unlatching.On the one hand, due to face characteristic Existence and uniquenss, even if the identity card quilt of user
Criminal usurps, and criminal is also difficult to be utilized identity card triggering entrance guard device and opens, on the other hand, forged identity card
Difficulty is larger, and criminal is difficult to trigger entrance guard device unlatching, two sides of summary by way of forging false identities card
As it can be seen that relative to traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent in face.
Embodiment two
Present application example provides a kind of access control system, as shown in Fig. 2, the access control system in the embodiment of the present application
20 include:Identity card identification device 21, access control terminal 22 and entrance guard device 23;
Wherein, identity card identification device 21 is used for:The ID card information of reading identity card, wherein, the ID card information
Including the head image information in identity card;
Access control terminal 22 is used for:Obtain the facial image of the holder of the identity card;Obtain the head image information
With the matching result of the facial image;If the matching result is successful match, described in the access control terminal generation
The traffic information of holder, and trigger entrance guard device 23 and open.
Optionally, the access control system in the embodiment of the present application may also include:Management server, above-mentioned management server
For managing and safeguarding the traffic information of each user.Access control terminal 22 is additionally operable to:The traffic information is stored in this
Ground;And/or the traffic information is sent to above-mentioned management server, the management server is each for managing and safeguarding
The traffic information of user.
Optionally, access control terminal 22 is specifically used for:Network is extracted according to face characteristic and extracts the head portrait letter respectively
The face characteristic of breath and the facial image, the face characteristic of the head image information and the facial image is matched, is obtained
Take matching result;Or, the access control system in the embodiment of the present application may also include:Identify server, access control terminal 22
Specifically it is additionally operable to:The head image information and the facial image are sent to identification server, to trigger the identification server
It extracts the face characteristic of the head image information and the facial image respectively according to face characteristic extraction network, the head portrait is believed
The face characteristic of breath and the facial image is matched, and obtained matching knot is matched to access control terminal feedback
Fruit.
Optionally, above-mentioned traffic information includes:With the relevant face characteristic of the holder.Access control terminal 22 is specific
For:Based on the facial image of the holder, the traffic information of the holder is generated.
Optionally, the ID card information further includes:Identification card number in the identity card;The traffic information is also wrapped
It includes:With the relevant identification card number of the holder.Access control terminal 22 is specifically additionally operable to:Based on the identity in the identity card
Card number generates the traffic information of the holder.
Optionally, the traffic information further includes:With the holder is relevant allows the current time limit.Access control terminal
22 are specifically additionally operable to:Based on input allow current time limit or acquiescence allow the current time limit, generate the logical of the holder
Row information.
Optionally, access control terminal 22 is additionally operable to:When with the holder is relevant allows current time limit instruction
When getting the facial image of the holder in the time again, triggering entrance guard device 23 is opened.
Optionally, the traffic information further includes:With the relevant current record of the holder, the current record includes
Current time and current position.Access control terminal 22 is specifically additionally operable to:Based on the holder currently pass through when
Between and position, generate the traffic information of the holder.
Optionally, the traffic information further includes:With the relevant right of access of the holder, the right of access is institute
State the whether transitable permission of each entrance guard device in the range of access control terminal control.Access control terminal 22 is specifically also used
In:The right of access of right of access or acquiescence based on input generates the traffic information of the holder.
Optionally, the identity card identification device 21 in the embodiment of the present application can be connected by serial ports and access control terminal 22
It connects, alternatively, identity card identification device 21 can also be integrated in access control device 22 (i.e. identity card identification device 21 and gate inhibition
Control device 22 is integrated machine), it does not limit herein.
Therefore by the head image information in identity card identification device reading identity card in the application, and controlled to gate inhibition
Terminal processed sends ID card information, and the facial image of the holder of the identity card is obtained by access control terminal and obtains the head portrait
The matching result of information and facial image, when matching result is successful match, access control terminal generation holder is passed through
Information, and trigger entrance guard device unlatching.On the one hand, due to face characteristic Existence and uniquenss, even if the identity card quilt of user
Criminal usurps, and criminal is also difficult to be utilized identity card triggering entrance guard device and opens, on the other hand, forged identity card
Difficulty is larger, and criminal is difficult to trigger entrance guard device unlatching, two sides of summary by way of forging false identities card
As it can be seen that relative to traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent in face.
It should be appreciated that the present processes and device, system may be achieved in many ways.It for example, can be by soft
Part, hardware, firmware or software, hardware, firmware any combinations realize the present processes and device, equipment.For side
Merely to illustrate, the step of the present processes, is not limited to described in detail above suitable for the said sequence of the step of method
Sequence, unless specifically stated otherwise.In addition, in some embodiments, the application can be also embodied as being recorded in record Jie
Program in matter, these programs include being used to implement the machine readable instructions according to the present processes.Thus, the application is also covered
Lid storage is for execution according to the recording medium of the program of the present processes.
It should be noted that it in the above-described embodiments, all emphasizes particularly on different fields to the description of each embodiment, in some embodiment
The part not being described in detail may refer to the associated description of other embodiments.
The description of the present application provides for the sake of example and description, and is not exhaustively or by the application
It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches
Embodiment is stated and be the principle and practical application in order to more preferably illustrate the application, and those of ordinary skill in the art is enable to manage
The application is solved so as to design the various embodiments with various modifications suitable for special-purpose.
Claims (10)
1. a kind of access control method, which is characterized in that applied to access control system, the access control system has gate inhibition
Device, identity card identification device and access control terminal, the access control method include:
The ID card information of the identity card identification device reading identity card, and send the identity to the access control terminal
Information is demonstrate,proved, wherein, the ID card information includes the head image information in identity card;
The access control terminal obtains the facial image of the holder of the identity card;
The access control terminal obtains the matching result of the head image information and the facial image;
If the matching result is successful match, the access control terminal generates the traffic information of the holder, and touches
It sends out entrance guard device described and opens.
2. access control method according to claim 1, which is characterized in that held described in access control terminal generation
After the traffic information of witness, the access control method further includes:
The traffic information is stored in local by the access control terminal;
And/or
The access control system further includes:Management server;
The traffic information is sent to the management server by the access control terminal, and the management server is used to manage
With the traffic information for safeguarding each user.
3. access control method according to claim 1, which is characterized in that
The access control terminal obtains the matching result of the head image information and the facial image, including:
The access control terminal extracts network according to face characteristic and extracts the head image information and the facial image respectively
Face characteristic matches the face characteristic of the head image information and the facial image, obtains matching result;
Or,
The access control system further includes:Identify server;
The head image information and the facial image are sent to the identification server by the access control terminal, to trigger
The face characteristic that identification server extracts the head image information and the facial image according to face characteristic extraction network respectively is stated,
The face characteristic of the head image information and the facial image is matched, and is matched to access control terminal feedback
The matching result arrived.
4. access control method according to any one of claims 1 to 3, which is characterized in that
The identity card identification device is connect by serial ports with the access control terminal.
5. access control method according to claim 4, which is characterized in that the traffic information includes:With it is described accredited
The relevant face characteristic of people;
The traffic information that the access control terminal generates the holder includes:
The face characteristic of the access control terminal based on the holder generates the traffic information of the holder.
6. access control method according to claim 5, which is characterized in that the ID card information further includes:The body
Identification card number in part card;The traffic information further includes:With the relevant identification card number of the holder;
The traffic information that the access control terminal generates the holder includes:
The access control terminal generates the traffic information of the holder based on the identification card number in the identity card.
7. access control method according to claim 5, which is characterized in that the traffic information further includes:It is held with described
Witness is relevant to allow the current time limit;
The traffic information that the access control terminal generates the holder includes:
The access control terminal based on input allow current time limit or acquiescence allow the current time limit, generation is described accredited
The traffic information of people.
8. access control method according to claim 7, which is characterized in that the access control method further includes:
When the access control terminal with the holder relevant time for allowing current time limit instruction in get again
The facial image of the holder then triggers the entrance guard device and opens.
9. access control method according to claim 5, which is characterized in that the traffic information further includes:It is held with described
The relevant current record of witness, the current record include current time and current position;
The traffic information that the access control terminal generates the holder includes:
The time currently passed through based on the holder and position generate the traffic information of the holder.
10. a kind of access control system, which is characterized in that including:Identity card identification device, access control terminal and gate inhibition's dress
It puts;
The identity card identification device is used for:The ID card information of reading identity card, wherein, the ID card information includes identity
Head image information in card;
The access control terminal is used for:Obtain the facial image of the holder of the identity card;Obtain the head image information with
The matching result of the facial image;If the matching result is successful match, held described in the access control terminal generation
The traffic information of witness, and trigger the entrance guard device and open.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711347579.9A CN108205835A (en) | 2017-12-15 | 2017-12-15 | Access control method and access control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711347579.9A CN108205835A (en) | 2017-12-15 | 2017-12-15 | Access control method and access control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108205835A true CN108205835A (en) | 2018-06-26 |
Family
ID=62603911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711347579.9A Pending CN108205835A (en) | 2017-12-15 | 2017-12-15 | Access control method and access control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108205835A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109410387A (en) * | 2018-09-30 | 2019-03-01 | 安徽灵图壹智能科技有限公司 | A kind of recognition of face prison safeguard management method and system |
CN109727346A (en) * | 2018-11-30 | 2019-05-07 | 杭州英杰电子有限公司 | Directly locking the networking door-locking system and testimony of a witness comparison method for realizing that the testimony of a witness compares |
CN110555926A (en) * | 2019-07-26 | 2019-12-10 | 华中科技大学 | Access control method based on multi-certificate recognition and corresponding device |
CN110570549A (en) * | 2019-07-26 | 2019-12-13 | 华中科技大学 | Intelligent unlocking method and corresponding device |
CN113223224A (en) * | 2021-05-12 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | Traffic processing method and device |
CN113538759A (en) * | 2021-07-08 | 2021-10-22 | 深圳创维-Rgb电子有限公司 | Access control management method, device, equipment and storage medium based on display equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002342804A (en) * | 2001-05-15 | 2002-11-29 | Ricoh Co Ltd | Device and method for reception of visitor, and recording medium recorded with visitor reception program |
CN102129555A (en) * | 2011-03-23 | 2011-07-20 | 北京深思洛克软件技术股份有限公司 | Second-generation identity card-based authentication method and system |
CN102663844A (en) * | 2012-05-02 | 2012-09-12 | 李凯 | Method for controlling authority of mobile equipment under different conditions |
CN106296919A (en) * | 2016-08-10 | 2017-01-04 | 广东工业大学 | A kind of intelligent access control system and inlet/outlet management method |
CN106650560A (en) * | 2015-11-04 | 2017-05-10 | 上海市公安局刑事侦查总队 | Identity authentication method based on identity card and identity authentication processor and system thereof |
CN107016755A (en) * | 2017-03-24 | 2017-08-04 | 新疆习美人工智能科技有限公司 | A kind of entrance guard device and fast face recognize certification passing method |
CN107038776A (en) * | 2017-03-24 | 2017-08-11 | 新疆习美人工智能科技有限公司 | A kind of gate control system and access control method |
CN206672201U (en) * | 2017-04-08 | 2017-11-24 | 山西平安谷信息技术有限公司 | A kind of passageway gate machine system |
CN107426499A (en) * | 2017-08-05 | 2017-12-01 | 重庆智之屋科技发展有限公司 | Unattended gate inhibition's guest system and access control method |
-
2017
- 2017-12-15 CN CN201711347579.9A patent/CN108205835A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002342804A (en) * | 2001-05-15 | 2002-11-29 | Ricoh Co Ltd | Device and method for reception of visitor, and recording medium recorded with visitor reception program |
CN102129555A (en) * | 2011-03-23 | 2011-07-20 | 北京深思洛克软件技术股份有限公司 | Second-generation identity card-based authentication method and system |
CN102663844A (en) * | 2012-05-02 | 2012-09-12 | 李凯 | Method for controlling authority of mobile equipment under different conditions |
CN106650560A (en) * | 2015-11-04 | 2017-05-10 | 上海市公安局刑事侦查总队 | Identity authentication method based on identity card and identity authentication processor and system thereof |
CN106296919A (en) * | 2016-08-10 | 2017-01-04 | 广东工业大学 | A kind of intelligent access control system and inlet/outlet management method |
CN107016755A (en) * | 2017-03-24 | 2017-08-04 | 新疆习美人工智能科技有限公司 | A kind of entrance guard device and fast face recognize certification passing method |
CN107038776A (en) * | 2017-03-24 | 2017-08-11 | 新疆习美人工智能科技有限公司 | A kind of gate control system and access control method |
CN206672201U (en) * | 2017-04-08 | 2017-11-24 | 山西平安谷信息技术有限公司 | A kind of passageway gate machine system |
CN107426499A (en) * | 2017-08-05 | 2017-12-01 | 重庆智之屋科技发展有限公司 | Unattended gate inhibition's guest system and access control method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109410387A (en) * | 2018-09-30 | 2019-03-01 | 安徽灵图壹智能科技有限公司 | A kind of recognition of face prison safeguard management method and system |
CN109727346A (en) * | 2018-11-30 | 2019-05-07 | 杭州英杰电子有限公司 | Directly locking the networking door-locking system and testimony of a witness comparison method for realizing that the testimony of a witness compares |
CN110555926A (en) * | 2019-07-26 | 2019-12-10 | 华中科技大学 | Access control method based on multi-certificate recognition and corresponding device |
CN110570549A (en) * | 2019-07-26 | 2019-12-13 | 华中科技大学 | Intelligent unlocking method and corresponding device |
CN110570549B (en) * | 2019-07-26 | 2021-07-06 | 华中科技大学 | Intelligent unlocking method and corresponding device |
CN113223224A (en) * | 2021-05-12 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | Traffic processing method and device |
CN113223224B (en) * | 2021-05-12 | 2023-10-24 | 支付宝(杭州)信息技术有限公司 | Traffic processing method and device |
CN113538759A (en) * | 2021-07-08 | 2021-10-22 | 深圳创维-Rgb电子有限公司 | Access control management method, device, equipment and storage medium based on display equipment |
CN113538759B (en) * | 2021-07-08 | 2023-08-04 | 深圳创维-Rgb电子有限公司 | Gate inhibition management method, device and equipment based on display equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108205835A (en) | Access control method and access control system | |
CN108205834A (en) | Access control management method and access control system | |
Jain et al. | An introduction to biometric recognition | |
CN104169933A (en) | Method, apparatus, and computer-readable recording medium for authenticating a user | |
CN107992739A (en) | User authentication method, apparatus and system | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN107730672A (en) | A kind of face identification unit gate control system and control method | |
CN109410407A (en) | A kind of face and fingerprint recognition access control system | |
KR100965428B1 (en) | The system and operating method using two different positioned intelligent cameras for automatic verification of authenticated person's entrance | |
CN109147104A (en) | A kind of electronic lock and its verification method of double verification | |
CN109215191A (en) | Nobody a kind of intelligent access control system and its working method on duty | |
Ohana et al. | Preventing cell phone intrusion and theft using biometrics | |
JP2004211541A (en) | Safe-deposit box using biological recognition technology | |
CN109461241A (en) | A kind of face and fingerprint identification entrance guard system control method | |
CN106780864A (en) | Gate control system based on skeleton identification technology | |
Prasanthi et al. | Palm vein biometric technology: An approach to upgrade security in ATM transactions | |
CN107590888A (en) | A kind of building are registered one's residence gate control system | |
Schneier | Sensible Authentication: According to the author of Beyond Fear, it’s not enough to know who you are; you’ve got to prove it. | |
CN108198283A (en) | A kind of cloud locks concealed fingerprint head design method and system | |
CN109840969A (en) | A kind of security system of fingerprint and face recognition one | |
KR20090041619A (en) | Entrance and exit control system | |
CN101681498A (en) | Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, program, and vein data struc | |
CN106408690A (en) | Nuclear power plant personnel entrance and exit control apparatus and nuclear power plant personnel entrance and exit control method | |
CN206224637U (en) | Gate inhibition's all-in-one | |
CN105225307B (en) | Personnel's bayonet type gate and controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180626 |