CN110021101A - A kind of intelligent entrance guard control method and intelligent access control system - Google Patents
A kind of intelligent entrance guard control method and intelligent access control system Download PDFInfo
- Publication number
- CN110021101A CN110021101A CN201910251024.7A CN201910251024A CN110021101A CN 110021101 A CN110021101 A CN 110021101A CN 201910251024 A CN201910251024 A CN 201910251024A CN 110021101 A CN110021101 A CN 110021101A
- Authority
- CN
- China
- Prior art keywords
- gate inhibition
- matching degree
- information
- user
- weight
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present embodiments relate to intelligent entrance guard field, a kind of intelligent entrance guard control method and intelligent access control system are disclosed.The intelligent entrance guard control method therein includes: to obtain the first order correct information that user verifies the first order verification information of system input and prestore in the first order gate inhibition when detecting that first order gate inhibition verifies system verifying user's failure;Determine the first matching degree between first order verification information and first order correct information, corresponding first weight of the first matching degree;When detecting that second level gate inhibition verifies system verifying user's failure, the second level correct information that user verifies the second level verification information of system input and prestore in second level gate inhibition is obtained;Determine the second matching degree between second level verification information and second level correct information, corresponding second weight of the second matching degree;According to the first matching degree, the first weight, the second matching degree and the second weight, access information is generated.The present invention can make the access control system of legitimate user's adaptation abnormal conditions.
Description
Technical field
The present invention relates to intelligent entrance guard technical fields, more particularly to a kind of intelligent entrance guard control method and intelligent entrance guard system
System.
Background technique
Access control system is the system for carrying out control to exit and entrance.With the development of technology, access control system obtains quickly
, there are all kinds of access control systems on the market in development, for example, induction card access control system, fingerprint entrance guard system, iris entrance guard system, face
Portion's identification gate control system, password access system.
Existing all kinds of access control systems are all independent works, to complete the management of gate inhibition.But inventor is realizing this
During invention, find traditional technology the prior art has at least the following problems: since all kinds of access control systems are all independent works, once in a while
It will appear legitimate user and have not been able to the case where passing through gate inhibition, for example, the finger of user is damaged and fails fingerprint entrance guard system
It is enough correctly to identify legitimate user, for another example the face of user is damaged and face recognition access control system is made to have not been able to correctly know
Not Chu legitimate user, however, such situation is avoidable.
Summary of the invention
The embodiment of the present invention is intended to provide a kind of intelligent entrance guard control method and intelligent access control system, can be reliable and secure
Ground adapts to all kinds of abnormal conditions and legally implements gate inhibition's operation.
In order to solve the above technical problems, the embodiment of the present invention the following technical schemes are provided:
In a first aspect, the embodiment of the present invention provides a kind of intelligent entrance guard control method, it is applied to two-stage gate inhibition and verifies system,
The described method includes:
When detecting that first order gate inhibition verifies system verifying user's failure, the user is obtained in the first order gate inhibition
The first order verification information of verifying system input and the first order correct information prestored;
Determine the first matching degree between the first order verification information and the first order correct information, described first
The first weight is corresponded to spending;
When detecting that second level gate inhibition verifies system verifying user's failure, the user is obtained in the second level gate inhibition
The second level verification information of verifying system input and the second level correct information prestored;
Determine the second matching degree between the second level verification information and the second level correct information, described second
The second weight is corresponded to spending;
According to first matching degree, first weight, second matching degree and second weight, gate inhibition is generated
Information.
Further, the access information includes that gate inhibition's opening imformation and gate inhibition forbid information;
It is described according to first matching degree, first weight, second matching degree and second weight, generate
Access information, comprising:
According to first matching degree, first weight, second matching degree and second weight, gate inhibition is calculated
Open value;
Judge whether the open value of the gate inhibition is greater than or equal to gate inhibition's reference threshold;
If so, generating gate inhibition's opening imformation, gate inhibition's opening imformation is used to indicate open gate inhibition;
If it is not, generating the gate inhibition forbids information, the gate inhibition forbids information to be used to indicate and forbids open gate inhibition.
Further, described according to first matching degree, first weight, second matching degree and described second
Weight calculates the open value of gate inhibition, comprising:
According to the following formula, the open value of gate inhibition is calculated,
Formula: S=P1*W1+P2*W2;
Wherein, S is the open value of gate inhibition, P1、P2Respectively the first matching degree, the second matching degree, W1, W be respectively the first power
Weight, the second weight.
Further, the W1It is 0.3, the W2It is 0.5, the P1With P2Value range be 0 to 10.
Further, it is face verification system that the first order gate inhibition, which verifies system, and the second level gate inhibition verifies system
For password validation system.
Further, the first order verification information is the facial image of the user, and the first order correct information is
The face reference picture prestored;
The first matching degree between the determination first order verification information and the first order correct information, comprising:
Extract the facial image whole human face characteristic points and the face reference picture all referring to feature
Point;
The quantity of fixed reference feature point identical with the human face characteristic point is counted, also, seeks the fixed reference feature after statistics
Point occupies the percentage all referring to characteristic point;
By the percentage multiplied by numerical value 10, multiplied result is obtained, and using the multiplied result as the first matching degree.
Further, the second level verification information is the Password Input information of the user, the Password Input information
Including the encrypted message being made of several input numbers, the second level correct information is the password reference information prestored, described
Password reference information includes the encrypted message being made of several preset numbers;
The second matching degree between the determination second level verification information and the second level correct information, described
Two matching degrees correspond to the second weight, comprising:
The quantity of statistics identical preset number with the input number, also, the preset number sought after statistics occupies
The percentage of whole preset numbers;
By the percentage multiplied by numerical value 10, multiplied result is obtained, and using the multiplied result as the second matching degree.
Further, the method also includes:
When detecting that first order gate inhibition verifies system verifying user's success, open gate inhibition.
Further, the method also includes:
When detecting that second level gate inhibition verifies system verifying user's success, open gate inhibition.Second aspect, the present invention are implemented
Example provides a kind of intelligent access control system, comprising:
Camera module, for acquiring the facial image of user;
Password collector, for acquiring the encrypted message of user's input;And
Controller is connect with the camera module and the password collector respectively.
Wherein, the controller includes:
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
A processor executes, so that at least one described processor is able to carry out described in any item intelligent entrance guard control methods as above.
The beneficial effect of the embodiment of the present invention is: being in contrast to the prior art down, provided in an embodiment of the present invention one
Kind intelligent entrance guard control method and intelligent access control system.The method is applied to two-stage gate inhibition and verifies system, is detecting first
When grade gate inhibition verifies system verifying user's failure, the first matching degree and corresponding first weight are obtained, is detecting second level door
When prohibiting the verifying user's failure of verifying system, the second matching degree and corresponding second weight are obtained, according to data acquired, generates gate inhibition
Information, instruction is open or forbids open gate inhibition.The embodiment of the present invention in abnormal cases, provides a kind of gate inhibition for legitimate user
Authentication mode makes it through gate inhibition.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys
The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove
Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is a kind of structural schematic diagram for intelligent access control system that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow diagram of intelligent entrance guard control method provided by Embodiment 2 of the present invention;
Fig. 3 is the flow diagram of step S12 shown in Fig. 2;
Fig. 4 is the flow diagram of step S14 shown in Fig. 2;
Fig. 5 is the flow diagram of step S15 shown in Fig. 2;
Fig. 6 be another embodiment of the present invention provides a kind of intelligent entrance guard control method flow diagram.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
In addition, as long as technical characteristic involved in the various embodiments of the present invention described below is each other not
Constituting conflict can be combined with each other.
Embodiment one
Referring to Fig. 1, Fig. 1 is a kind of structural schematic diagram of intelligent access control system provided in an embodiment of the present invention.Such as Fig. 1 institute
Show, the intelligent access control system 100 includes camera module 10, password collector 20 and controller 30.
It is appreciated that the intelligent access control system 100 is mountable to the various channels that can be passed through, current including people
Door, door of vehicle pass-through etc..The intelligent access control system 100 is a kind of room entry/exit management control system, intelligent management personnel, vehicle
Disengaging allow legitimate user to pass through, static illegal user passes through according to user right.
Before 100 open-authentication of intelligent access control system, the user should be registered as legitimate user.To be installed on
For the intelligent access control system 100 of cell, the user's registration is that the method for legitimate user includes: remote monitoring server
The subscriber identity information of the user (user is neighbours living) is acquired, and subscriber identity information is sent to the user
The corresponding intelligent access control system 100, the intelligent access control system 100 receive the registration request of the user, by the note
The information carried in volume information is matched with the subscriber identity information, if successful match, receives the request of the user.
Wherein, the subscriber identity information includes first order correct information and second level correct information, and the first order correct information is used
In the reference information as the opening first order access control system, the second level correct information user is used for described in conduct opening
The reference information of second level access control system.
In some embodiments, it includes: described in remote monitoring server is that the user's registration, which is the method for legitimate user,
User (user is neighbours living) distribution authorization code, the intelligent access control system 100 receive the registration request of the user
And be sent to remote monitoring server and verified, the registration request includes authorization code information, and remote monitoring server is to institute
It states authorization code to be verified, if being verified, the intelligent access control system 100 receives the registration request of the user, prompts to use
Family inputs first order correct information and second level correct information.Wherein, the first order correct information is used for described in conduct opening
The reference information of first order access control system, the second level correct information user are used for as the open second level access control system
Reference information.
The camera module 10 is installed on the periphery of gate inhibition or gate inhibition, for acquiring the facial image of user.
Wherein, the camera module 10 nobody close to when, low power consumpting state is in, when user carries out the first order door
When access control system or the second level access control system are verified, triggering wakes up the camera module 10, acquires the facial image of user.Institute
Stating triggering and waking up the camera module 10 includes the electronic display for clicking, touching the intelligent access control system 100;Alternatively, connecing
Receive the verifying instruction that the intelligent terminal that user carries issues.For example, when user carries out first order access control system verifying, touching
" image " button or " verifying 1 " button, triggering for touching the electronic display of the intelligent access control system 100 wake up the camera shooting
Mould group 10 acquires the facial image of the user.
In the present embodiment, the camera module 10 includes two cameras, and one is visible image capturing head, another is
Near-infrared camera, described two cameras can be binocular camera, or monocular cam.In some embodiments
In, the camera module 10 further includes supplementary lighting module and illuminant module, and the supplementary lighting module is connected with the visible image capturing head,
The illuminant module is connect with the supplementary lighting module, to improve shooting effect.
Described two cameras are simultaneously or difference preset time acquires the facial image of the same user, the preset time
Less than 1S, visible light facial image and near-infrared facial image are acquired respectively.Wherein, the visible light facial image is used for face
Identification, the near-infrared facial image avoid illegal user and hold legal use for judging whether object collected is people
The facial image photo at family, to pass through the intelligent access control system 100.If visible image capturing head does not collect facial image,
Visible image capturing head and near-infrared camera resurvey user's facial image.
The password collector 20 is installed on the periphery of gate inhibition or gate inhibition, for acquiring the encrypted message of user's input,
The password collector 20 can be hardware input keyboard, or soft keyboard, the hardware input keyboard or software disk will
Encrypted message collected is sent to the controller 30.
The controller 30 is connect with the camera module 10 and the password collector 20 respectively.Wherein, the control
Device 30 includes at least one processor;And the memory being connect at least one described processor communication.Wherein, described to deposit
Reservoir is stored with the instruction that can be executed by least one described processor, and described instruction is executed by least one described processor,
So that at least one described processor is able to carry out intelligent entrance guard control method disclosed in the embodiment of the present invention, the intelligent door
Taboo control method in abnormal cases, provides a kind of gate inhibition's authentication mode, makes it through gate inhibition for legitimate user.
The processor can be connected with the memory by bus or other modes, and memory is as a kind of non-easy
Lose property computer readable storage medium, can be used for storing non-volatile software program, non-volatile computer executable program with
And module.Processor is by running non-volatile software program, instruction and module stored in memory, thereby executing intelligence
The various function application and data processing of energy access control method.
Memory may include high-speed random access memory, can also include nonvolatile memory, for example, at least one
A disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory is optional
Including the memory remotely located relative to processor, these remote memories can pass through network connection to processor.It is above-mentioned
The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
In embodiments of the present invention, defeated by the facial image and password collector acquisition user of camera module acquisition user
The encrypted message entered, in abnormal cases, when the facial image and encrypted message of legitimate user is unverified successful, controller root
According to the matching degree of the matching degree of facial image, weight and encrypted message, weight, access information is generated, so that legal use
Family still is able to pass through gate inhibition.
Embodiment two
Referring to Fig. 2, being a kind of flow diagram of intelligent entrance guard control method provided by Embodiment 2 of the present invention.Such as figure
Shown in 2, the intelligent entrance guard control method is applied to two-stage gate inhibition and verifies system, including first order gate inhibition verifies system and second
Grade gate inhibition verifies system, wherein it is face verification system that the first order gate inhibition, which verifies system, and the second level gate inhibition verifies system
System is password validation system.
The described method includes:
S11: when detecting that first order gate inhibition verifies system verifying user's failure, the user is obtained in the first order
The first order correct information that gate inhibition verifies the first order verification information of system input and prestores.
For example, when user's food hypersenstivity, face edema or there are more substandard convex blocks;In another example the face of user
There are when shelter (such as hospital gauze) on damaged or face, the first order verification information and the first order verification information
Incomplete matching, first order gate inhibition verify system authentication failed.
It is face verification system that the first order gate inhibition, which verifies system, and the corresponding first order verification information is camera shooting mould
Group is in user's facial image of acquisition, and the first order correct information is in user's registration, and system acquisition or user are from figure
The facial image of at least one angle of user inputted in valut.For example, prompting user when user inputs registration information
Open photographing module, acquire the facial image of the user, if user's facial image meets preset requirement, access control system or
It is first order correct information that server, which automatically saves the facial image,.Wherein, described in the user inputs from picture library
The facial image of at least one angle of user includes: the image that the user is selected under a certain path, according to the user's
Image determines the facial image of the user;Alternatively, pull the image of the user to the interface of the registration information, according to
The image of the user determines the facial image of the user.
S12: determining the first matching degree between the first order verification information and the first order correct information, described
One matching degree corresponds to the first weight.
Wherein, the first order verification information is the facial image of the user, and the first order correct information is to prestore
Face reference picture.
Specifically, as shown in figure 3, step S12 includes:
S121: extract the facial image whole human face characteristic points and the face reference picture all referring to
Characteristic point.
The method of facial modeling can be roughly divided into: (1) being based on gray scale and its change information;(2) based on variable
Shape template;(3) it is based on neural network;(4) it is based on active contour model;(5) it is based on active shape model;(6) it is based on active table
See model.
It based on active apparent model include: variation by control parameter vector controlled shape and texture specifically, described, from
And synthesize different faces;Search is iterated to the facial image each proportional positions, rotation angle, is obtained rough
Positioning;Constantly adjustment control parameter vector, so that the gray scale and image grayscale difference of synthesis face reach minimum value, to obtain essence
Determine position;According to calculation formula, the position of each characteristic point can be obtained.It further, in some embodiments, can first really
Determine eye position;According to the regularity of distribution of face position, thereby determines that the position and direction of face, obtain the initial position of face
And initial size, search window is reduced, search time is reduced, is returned by the variation of control parameter vector controlled shape and texture
Step.
S122: the quantity of statistics fixed reference feature point identical with the human face characteristic point, also, seek the reference after statistics
Characteristic point occupies the percentage all referring to characteristic point.
By selecting face characteristic manner appropriate and matching strategy, to the facial image and the face reference picture
It is matched.Under same model, the human face characteristic point and fixed reference feature point are compared, if the two position consistency
Or overlapping, then the human face characteristic point is identical as the fixed reference feature point.
S123: by the percentage multiplied by numerical value 10, multiplied result is obtained, and using the multiplied result as the first matching
Degree.
In the present embodiment, with the first matching degree described in the digital representation within 1-10, number is bigger, then it represents that the people
A possibility that face image and the matching degree of the face reference picture are higher, and the user is legitimate user is also higher.
S13: when detecting that second level gate inhibition verifies system verifying user's failure, the user is obtained in the second level
The second level correct information that gate inhibition verifies the second level verification information of system input and prestores.
Wherein, the second level verification information is the Password Input information of the user, and the Password Input information includes
The encrypted message being made of several input numbers, the second level correct information is the password reference information prestored, the password
Reference information includes the encrypted message being made of several preset numbers.
S14: determining the second matching degree between the second level verification information and the second level correct information, described
Two matching degrees correspond to the second weight.
Specifically, as shown in figure 4, step S14 includes:
S141: the quantity of statistics identical preset number with the input number, also, seek the preset number after statistics
Occupy the percentage of whole preset numbers.
S142: by the percentage multiplied by numerical value 10, multiplied result is obtained, and using the multiplied result as the second matching
Degree.
S15: it according to first matching degree, first weight, second matching degree and second weight, generates
Access information.
Wherein, the access information includes that gate inhibition's opening imformation and gate inhibition forbid information.
Specifically, as shown in figure 5, step S15 includes:
S151: according to first matching degree, first weight, second matching degree and second weight, meter
Calculate the open value of gate inhibition.
According to the following formula, the open value of gate inhibition, formula: S=P are calculated1*W1+P2*W2;Wherein, S is the open value of gate inhibition, P1、
P2Respectively the first matching degree, the second matching degree, W1, W be respectively the first weight, the second weight.The W1It is 0.3, the W2For
0.5, the P1With P2Value range be 0 to 10.
It is appreciated that the first weight W1With the second weight W2Value be not limited to the present embodiment disclosed number
Value states the first weight W according to the requirement of the security level of the intelligent access control system is adjustable1With the second weight W2Take
Value.In some embodiments, the first weight W can dynamically be adjusted according to different time in one day1With second weight
W2Value, the adaptability of the intelligent access control system is improved, for example, the illegal users such as thief are easier to occur at night
Period, adjust the first weight W1With the second weight W2Value, can be to avoid illegal user's wheel and deal.
S152: judge whether the open value of the gate inhibition is greater than or equal to gate inhibition's reference threshold.
Generally, gate inhibition's reference threshold is the intelligent access control system according to its specification requirement, built in front of factory
Parameter.It is appreciated that gate inhibition's reference threshold can be arranged according to practical application request in the user.
S153: if so, generating gate inhibition's opening imformation, gate inhibition's opening imformation is used to indicate open gate inhibition.
Wherein, system verifying user failure is verified in first order gate inhibition and second level gate inhibition verifies system verifying user's failure
When, according to first matching degree, first weight, second matching degree and second weight, it is open to calculate gate inhibition
Value, if the open value of the gate inhibition is greater than or equal to gate inhibition's reference threshold, open gate inhibition.
S154: if it is not, generating the gate inhibition forbids information, the gate inhibition forbids information to be used to indicate and forbids open gate inhibition.
Wherein, system verifying user failure is verified in first order gate inhibition and second level gate inhibition verifies system verifying user's failure
When, according to first matching degree, first weight, second matching degree and second weight, it is open to calculate gate inhibition
Value forbids open gate inhibition if the open value of the gate inhibition is less than gate inhibition's reference threshold.
In some embodiments, referring to Fig. 6, be another embodiment of the present invention provides a kind of intelligent entrance guard control method
Flow diagram.As shown in fig. 6, the intelligent entrance guard control method further include:
S16: detect that first order gate inhibition verifies whether system verifying user succeeds.
Before step S11, detect that first order gate inhibition verifies whether system verifying user succeeds, if success, directly
Enter step S18, i.e., when detecting that first order gate inhibition verifies system verifying user's success, open gate inhibition.If unsuccessful, jump
Go to step S11.
S17: detect that second level gate inhibition verifies whether system verifying user succeeds.
Before step S14, detect that second level gate inhibition verifies whether system verifying user succeeds, if success, directly
Enter step S18, i.e., when detecting that second level gate inhibition verifies system verifying user's success, open gate inhibition.If unsuccessful, jump
Go to step S14.
S18: open gate inhibition.
In embodiments of the present invention, be applied to two-stage gate inhibition verify system, detect first order gate inhibition verify system test
When demonstrate,proving user's failure, the first matching degree and corresponding first weight are obtained, is used detecting that second level gate inhibition verifying system is verified
When family fails, obtain the second matching degree and corresponding second weight, according to data acquired, generate access information, instruction it is open or
Person forbids open gate inhibition.The embodiment of the present invention can adapt to reliable and securely all kinds of abnormal conditions and legally implement gate inhibition behaviour
Make.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;At this
It under the thinking of invention, can also be combined between the technical characteristic in above embodiments or different embodiment, step can be with
It is realized with random order, and there are many other variations of different aspect present invention as described above, for simplicity, they do not have
Have and is provided in details;Although the present invention is described in detail referring to the foregoing embodiments, the ordinary skill people of this field
Member is it is understood that it is still possible to modify the technical solutions described in the foregoing embodiments, or to part of skill
Art feature is equivalently replaced;And these are modified or replaceed, each reality of the application that it does not separate the essence of the corresponding technical solution
Apply the range of a technical solution.
Claims (10)
1. a kind of intelligent entrance guard control method is applied to two-stage gate inhibition and verifies system, which is characterized in that the described method includes:
When detecting that first order gate inhibition verifies system verifying user's failure, obtains the user and verified in the first order gate inhibition
The first order verification information of system input and the first order correct information prestored;
Determine the first matching degree between the first order verification information and the first order correct information, first matching degree
Corresponding first weight;
When detecting that second level gate inhibition verifies system verifying user's failure, obtains the user and verified in the second level gate inhibition
The second level verification information of system input and the second level correct information prestored;
Determine the second matching degree between the second level verification information and the second level correct information, second matching degree
Corresponding second weight;
According to first matching degree, first weight, second matching degree and second weight, gate inhibition's letter is generated
Breath.
2. the method according to claim 1, wherein the access information includes that gate inhibition's opening imformation and gate inhibition prohibit
Only information;
It is described according to first matching degree, first weight, second matching degree and second weight, generate gate inhibition
Information, comprising:
According to first matching degree, first weight, second matching degree and second weight, it is open to calculate gate inhibition
Value;
Judge whether the open value of the gate inhibition is greater than or equal to gate inhibition's reference threshold;
If so, generating gate inhibition's opening imformation, gate inhibition's opening imformation is used to indicate open gate inhibition;
If it is not, generating the gate inhibition forbids information, the gate inhibition forbids information to be used to indicate and forbids open gate inhibition.
3. according to the method described in claim 2, it is characterized in that, it is described according to first matching degree, first weight,
Second matching degree and second weight calculate the open value of gate inhibition, comprising:
According to the following formula, the open value of gate inhibition is calculated,
Formula: S=P1*W1+P2*W2;
Wherein, S is the open value of gate inhibition, P1、P2Respectively the first matching degree, the second matching degree, W1, W be respectively the first weight,
Two weights.
4. according to the method described in claim 3, it is characterized in that, the W1It is 0.3, the W2It is 0.5, the P1With P2Take
Being worth range is 0 to 10.
5. according to the method described in claim 4, it is characterized in that, it is face verification system that the first order gate inhibition, which verifies system,
System, it is password validation system that the second level gate inhibition, which verifies system,.
6. according to the method described in claim 5, it is characterized in that, the first order verification information is the face figure of the user
Picture, the first order correct information are the face reference picture prestored;
The first matching degree between the determination first order verification information and the first order correct information, comprising:
Extract the facial image whole human face characteristic points and the face reference picture all referring to characteristic point;
The quantity of fixed reference feature point identical with the human face characteristic point is counted, also, the fixed reference feature point sought after statistics accounts for
According to the percentage all referring to characteristic point;
By the percentage multiplied by numerical value 10, multiplied result is obtained, and using the multiplied result as the first matching degree.
7. according to the method described in claim 6, it is characterized in that, the second level verification information is defeated for the password of the user
Enter information, the Password Input information includes the encrypted message being made of several input numbers, and the second level correct information is
The password reference information prestored, the password reference information include the encrypted message being made of several preset numbers;
The second matching degree between the determination second level verification information and the second level correct information, described second
The second weight is corresponded to spending, comprising:
The quantity of statistics identical preset number with the input number, also, the preset number sought after statistics occupies whole
The percentage of preset number;
By the percentage multiplied by numerical value 10, multiplied result is obtained, and using the multiplied result as the second matching degree.
8. method according to any one of claims 1 to 7, which is characterized in that the method also includes:
When detecting that first order gate inhibition verifies system verifying user's success, open gate inhibition.
9. method according to any one of claims 1 to 7, which is characterized in that the method also includes:
When detecting that second level gate inhibition verifies system verifying user's success, open gate inhibition.
10. a kind of intelligent access control system characterized by comprising
Camera module, for acquiring the facial image of user;
Password collector, for acquiring the encrypted message of user's input;And
Controller is connect with the camera module and the password collector respectively.
Wherein, the controller includes:
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
It manages device to execute, so that at least one described processor is able to carry out the described in any item intelligent entrance guard controlling parties of claim 1-9
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910251024.7A CN110021101A (en) | 2019-03-29 | 2019-03-29 | A kind of intelligent entrance guard control method and intelligent access control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910251024.7A CN110021101A (en) | 2019-03-29 | 2019-03-29 | A kind of intelligent entrance guard control method and intelligent access control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110021101A true CN110021101A (en) | 2019-07-16 |
Family
ID=67190224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910251024.7A Pending CN110021101A (en) | 2019-03-29 | 2019-03-29 | A kind of intelligent entrance guard control method and intelligent access control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110021101A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110751760A (en) * | 2019-10-22 | 2020-02-04 | 珠海格力电器股份有限公司 | Adjusting method of biological information identification level, intelligent door lock and control method thereof |
CN113205004A (en) * | 2021-04-08 | 2021-08-03 | 武汉大学 | Face recognition method based on multi-stage security system and multi-stage security system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205451A (en) * | 2015-08-25 | 2015-12-30 | 东莞酷派软件技术有限公司 | Fingerprint verification method, fingerprint verification device and terminal |
CN105321234A (en) * | 2014-07-28 | 2016-02-10 | 王大刚 | Multi-resolution-way embedded entrance guard management system |
CN106778222A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | Unlocking method and device |
CN107358699A (en) * | 2017-07-17 | 2017-11-17 | 深圳市斑点猫信息技术有限公司 | A kind of safe verification method and system |
CN108376434A (en) * | 2018-02-22 | 2018-08-07 | 陈崇 | A kind of intelligent home control system based on Internet of Things |
-
2019
- 2019-03-29 CN CN201910251024.7A patent/CN110021101A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105321234A (en) * | 2014-07-28 | 2016-02-10 | 王大刚 | Multi-resolution-way embedded entrance guard management system |
CN105205451A (en) * | 2015-08-25 | 2015-12-30 | 东莞酷派软件技术有限公司 | Fingerprint verification method, fingerprint verification device and terminal |
CN106778222A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | Unlocking method and device |
CN107358699A (en) * | 2017-07-17 | 2017-11-17 | 深圳市斑点猫信息技术有限公司 | A kind of safe verification method and system |
CN108376434A (en) * | 2018-02-22 | 2018-08-07 | 陈崇 | A kind of intelligent home control system based on Internet of Things |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110751760A (en) * | 2019-10-22 | 2020-02-04 | 珠海格力电器股份有限公司 | Adjusting method of biological information identification level, intelligent door lock and control method thereof |
CN113205004A (en) * | 2021-04-08 | 2021-08-03 | 武汉大学 | Face recognition method based on multi-stage security system and multi-stage security system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3719678B1 (en) | Identity verification method and apparatus | |
CN110555359B (en) | Automatic retry of facial recognition | |
US20200285875A1 (en) | Process for updating templates used in facial recognition | |
CN103324909B (en) | Facial feature detection | |
CN103514439A (en) | Facial recognition | |
CN102483845B (en) | Organism authentication apparatus, biometrics authentication system and biometric authentication method | |
CN110491004A (en) | A kind of residential communities personnel security management system and method | |
CN103514440A (en) | Facial recognition | |
US20170032601A1 (en) | Access control system and data processing method thereof | |
CN109118616A (en) | access control method and access control device | |
JP2019522278A (en) | Identification method and apparatus | |
US11663853B2 (en) | Iris authentication device, iris authentication method, and recording medium | |
CN109756458A (en) | Identity identifying method and system | |
CN103973964A (en) | Image capturing method and image capturing apparatus | |
US20210224523A1 (en) | Face liveness detection systems and methods | |
US20210019385A1 (en) | Methods, systems, and media for secure authentication of users using one or more biometric recognition systems | |
WO2018145309A1 (en) | Method for controlling unmanned aerial vehicle, unmanned aerial vehicle, and remote control device | |
CN111881429A (en) | Activity detection method and apparatus, and face verification method and apparatus | |
CN110021101A (en) | A kind of intelligent entrance guard control method and intelligent access control system | |
JP2008033810A (en) | Face image collation device | |
CN205140028U (en) | Gate inhibition system | |
KR101057720B1 (en) | User Authentication System and Method | |
CN116453196B (en) | Face recognition method and system | |
KR102215535B1 (en) | Partial face image based identity authentication method using neural network and system for the method | |
CN109147123A (en) | Unlocking method, device, electronic equipment and the computer storage medium of door-control lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190716 |
|
RJ01 | Rejection of invention patent application after publication |