CN110570551A - Intelligent security system and working method - Google Patents

Intelligent security system and working method Download PDF

Info

Publication number
CN110570551A
CN110570551A CN201910708289.5A CN201910708289A CN110570551A CN 110570551 A CN110570551 A CN 110570551A CN 201910708289 A CN201910708289 A CN 201910708289A CN 110570551 A CN110570551 A CN 110570551A
Authority
CN
China
Prior art keywords
visitor
subsystem
client
module
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910708289.5A
Other languages
Chinese (zh)
Inventor
杨仁凯
张军
姚帅
白帆
廖宏翔
孙思
魏敏华
马妍捷
赵长发
黄康
熊伟
陈敏
陈麒
但佳霖
邱春云
屈锐华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Yonder Electronic Technology Development Co Ltd
Chongqing Water Group Co Ltd
Original Assignee
Chongqing Yonder Electronic Technology Development Co Ltd
Chongqing Water Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Yonder Electronic Technology Development Co Ltd, Chongqing Water Group Co Ltd filed Critical Chongqing Yonder Electronic Technology Development Co Ltd
Priority to CN201910708289.5A priority Critical patent/CN110570551A/en
Publication of CN110570551A publication Critical patent/CN110570551A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

the invention discloses an intelligent security system and a working method thereof, wherein the intelligent security system comprises a server, a client, a visitor subsystem, an access control subsystem and a permission management subsystem; the server side and the n client sides are in bidirectional connection; the client is respectively connected with the visitor subsystem, the authority management subsystem and the entrance guard subsystem in two directions. According to the invention, a plurality of client sides and server sides of the water plant are connected, and through synchronous recording, the water supply and drainage plants are basic units, the group unified standard and one-network management are realized, and the unified analysis and tracing of the data of the visitors are facilitated. Through setting up different authority levels and open reservation subsystem, the inside personnel of being convenient for is examined and approved the management to the reservation of outside visitor, simultaneously through vehicle identification, and testimony of a witness face is compared and is realized uploading the record in step, has reached to have examined controllably, has accomplished that vehicle personnel come in and go out to leave the trace and can trace back, has improved discrepancy efficiency, has reduced the risk of coming in and going out, has improved the safety control level of water works.

Description

Intelligent security system and working method
Technical Field
the invention relates to the technical field of security, in particular to an intelligent security system and a working method.
background
With the continuous development of social economy and cultural life, providing public services and ensuring public safety become very important works of relevant departments. The waterworks are used as an important source of urban water and are responsible for the national civilization.
the water plant daily personnel of cominging in and going out are more, and under the general condition, personnel's cominging in and going out the water plant is examined and registered through the guard personnel manual work, can appear like this and examine not tight, and the record lacks, and the vacuum wanders away, is difficult to the condition of traceing back.
The Chinese invention patent (application publication number: CN 109035525A) discloses a safety precaution system and a working method thereof, which realizes the reservation and registration management of visitors by arranging a client, a server, a visitor system, an access control system, a face recognition system and a safety education system. However, the entering personnel are not classified, for example, if the inside personnel, the inside visitor and the outside visitor are all managed in a unified way, the working efficiency of the system is reduced, and people feel cumbersome; meanwhile, the patent does not register and manage factory workers, so that whether the workers leave cannot be checked, closed-loop management cannot be realized, the flowing vacuum time of the workers in the factory is reduced, and the safety risk of water plant management is increased.
Disclosure of Invention
Aiming at the problems of low efficiency and low safety of an intelligent security system in the prior art, the invention provides the intelligent security system and a working method thereof, so as to improve the working efficiency and the safety of a water plant.
In order to achieve the purpose, the invention provides the following technical scheme:
An intelligent security system comprises a server, a client, a visitor subsystem, an access control subsystem and a permission management subsystem;
The server side is in bidirectional connection with n client sides, wherein n is greater than or equal to 1 and is a positive integer;
The client is respectively connected with the visitor subsystem, the authority management subsystem and the entrance guard subsystem in two directions.
preferably, the visitor subsystem comprises a reservation module, an audit module, an information push module and a two-dimensional code generation module;
The user performs appointment application to the interviewee through the appointment module, then submits the appointment application to the auditing module, and the interviewee audits the appointment application, after the auditing is successful, the two-dimension code generating module generates the two-dimension code and stores the two-dimension code to the client and the server, and the information pushing module sends the two-dimension code to the user.
preferably, the visitor subsystem further comprises an authentication module for acquiring information of the visited person for authentication, and the user can make a reservation application to the visited person only after the authentication is successful.
Preferably, the access control subsystem comprises a face recognition device and a barrier gate device;
the face recognition device is used for scanning the face of the user, comparing the face with the appointment application in the client side, and successfully releasing the face; the barrier gate device is used for identifying the license plate number of the vehicle, comparing the license plate number with the reservation application in the client side, and successfully releasing the license plate number.
Preferably, the authority management subsystem is used for setting access authority for the user, and the authority setting comprises internal personnel, internal visitors and external visitors.
Preferably, the server comprises a login module, a statistic display module, a processor, an inquiry module, an editing module and a monitoring module;
The login module is used for a manager to log in the intelligent security system;
the statistical display module is used for statistically displaying the information of the visiting users, and comprises: the visitor reservation number, the visited number, the amount to be visited, the number to be audited, the access condition of the internal visitor, the access condition of the external visitor, the equipment number statistics, the equipment state statistics, the visitor occupation ratio and the peak condition statistics;
The query module is used for querying the visiting record of the user, and comprises the unit, the name, the identity card number, the mobile phone number and the visiting time period of the user;
The editing module is used for performing addition, deletion and forbidding operations on personnel and subsystems;
And the monitoring module is used for checking the running state of each client.
A working method of an intelligent security system comprises the following steps:
S1: the server side collects and stores the information of the interviewee and sends the information of the interviewee to the corresponding client side;
S2: the visitor subsystem collects and audits the reservation application information of the external visitor, generates a two-dimensional code after the audit is successful, and pushes the two-dimensional code and the safety notice to the external visitor;
S3: when an external visitor arrives at the entrance of a unit, the entrance guard subsystem reads the two-dimensional code or the identity card, scans the face or the license plate number of the external visitor and compares the face or the license plate number with the reservation application information on the client; if the comparison is successful, go to step S5; if the comparison fails, go to step S4;
S4: if the comparison fails, the external visitor can make a reservation application again on site, and after the application is completed, the step S3 is repeated;
S5: after the comparison is successful, the client sends the visiting information to the visited person, and the access control subsystem passes;
s6: if the external visitor does not make an appointment, the visitor registers the visitor, and the access control subsystem releases the visitor.
preferably, the method further comprises the following steps:
S7: when an external visitor leaves, the entrance guard subsystem reads the two-dimensional code, scans the face or the license plate number of the external visitor at the same time, and compares the face or the license plate number with the reservation application information on the client; if the comparison is successful, go to step S9; if the comparison fails, go to step S8;
S8: if the comparison fails, the visitor accompanies the external visitor to leave or issues a doorstrip to the external visitor, and the door control subsystem releases the doorstrip;
S9: and if the comparison is successful, the client sends the leaving information to the visited person, and the access control subsystem passes the comparison.
in summary, due to the adoption of the technical scheme, compared with the prior art, the invention at least has the following beneficial effects:
The visitor subsystem of the invention interacts in a mode of a WeChat platform with the most common current use and the most users and a group internal private line, does not need to specially establish, download and register APP, is convenient, rapid and reliable to use, and has good convenience and strong popularization.
the invention adopts the server side to uniformly manage a plurality of client sides in an internet mode, summarizes the visiting records of users in the client sides, analyzes big data and avoids the non-uniformity of data of a single client side. Meanwhile, sensitive crowd data given by relevant departments can be input into the main platform, and each client can directly immunize and alarm the reservation and the entrance and the exit of the sensitive crowd, so that the probability of water plant emergencies is reduced.
The invention adopts digital equipment and different authority authentication levels to distinguish unit staff (internal staff and internal visitors) and external visitors, so that the unit staff can enter and exit a unit more efficiently and quickly, and the external visitors can make appointment access to the access unit more quickly and effectively;
when a user enters a unit and leaves the unit, the system can receive the access information pushed by WeChat and short message, record the access time of a user visitor, stop the vacuum wandering time, realize closed-loop management, facilitate understanding of the access journey of the user, have traceability and greatly reduce the safety management risk.
description of the drawings:
fig. 1 is a schematic structural diagram of an intelligent security system according to an exemplary embodiment of the present invention.
Fig. 2 is a schematic flowchart of an external visitor entry unit system according to an exemplary embodiment of the present invention.
fig. 3 is a schematic workflow diagram of an external visitor leaving unit system according to an exemplary embodiment of the present invention.
Detailed Description
the present invention will be described in further detail with reference to examples and embodiments. It should be understood that the scope of the above-described subject matter is not limited to the following examples, and any techniques implemented based on the disclosure of the present invention are within the scope of the present invention.
in the description of the present invention, it is to be understood that the terms "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, are not to be construed as limiting the present invention.
in the description of the present invention, unless otherwise specified and limited, it is to be noted that the terms "mounted," "connected," and "connected" are to be interpreted broadly, and may be, for example, a mechanical connection or an electrical connection, a communication between two elements, a direct connection, or an indirect connection via an intermediate medium, and specific meanings of the terms may be understood by those skilled in the art according to specific situations.
As shown in fig. 1, the present invention provides an intelligent security system, which includes a server, a client, a visitor subsystem, an access control subsystem, and a rights management subsystem. The server side is respectively connected with the client side in a bidirectional mode, and the client side is respectively connected with the visitor subsystem, the authority management subsystem and the entrance guard subsystem in a bidirectional mode. The number of the clients is n, wherein n is more than or equal to 1 and is a positive integer.
The server side is connected with the n client sides, each client side is connected with the server side, the client sides can upload data to the server side for backup storage, and the client sides can also obtain the data from the server side, namely the server side can perform unified networking management on each client side.
the visitor subsystem comprises a reservation module, an auditing module, an information pushing module and a two-dimensional code generating module. The user can access and reserve through the reservation module, and the reservation information is required to be filled in during reservation, wherein the reservation information comprises the user name, the identity card number, the mobile phone number, the license plate number, the user photo and the information of the visited person (the name, the unit and the mobile phone number of the visited person), so that the examination and the verification are convenient; the system also comprises visiting time and ending time (generally one day), so that a user can visit within a specified time (generally one day), the visiting journey of the user is recorded, personnel can not freely go in and out of the water plant at other times, and the safety inside the water plant is guaranteed. After the user makes a reservation, the auditing module audits the reservation information, and after the auditing is passed, the two-dimensional code generating module generates a two-dimensional code and pushes the two-dimensional code to the user through the information pushing module. The user can use the two-dimensional code on entrance guard's subsystem in the reservation time quantum, and entrance guard's subsystem carries out facial scanning and contrasts with the ID card to the user simultaneously, if contrast success the user alright get into the water works. The access control subsystem uploads the visiting and leaving information of the user to the corresponding client, and the client uploads the information to the server and the visitor.
In this embodiment, the visitor subsystem further includes an authentication module, and the authentication module collects identity information of employees of the company, such as an identity card, a photo, a mobile phone number, a license plate number and the like, and the employees can become visited persons after passing the authentication, and the user can make an appointment for the employees on the visitor subsystem.
in the embodiment, the visitor subsystem can be constructed in the form of the WeChat public number, the user can fill in information and apply for reservation only by paying attention to the public number, APP does not need to be specially established, downloaded and registered, the use is convenient, rapid and reliable, and the visitor subsystem has good convenience and strong popularization.
In this embodiment, the entrance guard subsystem includes testimony of a witness comparison device, face identification device and banister device. The testimony comparison device is used for scanning the user two-dimensional code or the identity card and comparing the two-dimensional code or the identity card with prestored data in the client; the face recognition device is used for scanning the face of the user and comparing the face with the data prestored in the client, and the user can enter a water plant only if the face recognition device is successfully compared with the data prestored in the client; the barrier gate device is used for identifying the license plate number of the vehicle and comparing the license plate number with the data prestored in the client, and only if the comparison is successful, the user can enter the water plant.
And the authority management subsystem is used for setting the access authority for personnel accessing the water plant in the client, and because the personnel inside the water plant can frequently access the water plant, the workload of the system can be increased if the reservation registration is carried out every time, so that the working efficiency of the system is reduced. Permission settings may be classified as "inside people", "inside guests", and "outside guests". For example, there are 3 clients in total, the internal staff represents staff registered by the same client (i.e., client 1), the information of the internal staff is stored in the client and the server, and the access of the internal staff is not required to be reserved every time, and the internal staff can directly access a water plant managed by the corresponding client (i.e., client 1) by using an identity card in the access control subsystem; the internal visitor represents a worker registered by other client (i.e., client 2 or client 3) who needs to set access rights on client 1; the external visitor means a person not registered in the client management.
In the embodiment, the external visitor comes in and goes out of the water plant, the visitor subsystem can push a notice (public number or short message) to the external visitor, and the entrance guard subsystem can upload the time of the user coming in and going out to the client and the server for storage after the visitor confirms. Preferably, an external visitor needs to enter and exit the water plant for a long time, the permission subsystem also sets temporary permission for the external visitor, and reservation for entering and exiting the water plant every time is not needed, so that time cost is saved and working efficiency is improved; and the temporary permission has a fixed time period (for example, 1 year), and after the time period expires, the temporary permission fails.
In this embodiment, when the visiting user does not make an appointment, the visitor can be directly found, and the visitor can accompany the visitor to make a manual registration to enter and exit the water plant.
The server side comprises a login module, a statistic display module, a processor, a query module, an editing module and a monitoring module.
the login module is used for allowing an administrator to access the intelligent security system and login by inputting an account and a password; after login is successful, the administrator can operate corresponding system functions and data query according to authorized functions and data authority.
the statistical display module is used for statistically displaying the information of the visiting users, and comprises: visitor reservation quantity, visited quantity, volume to be visited, quantity to be audited, inside visitor access condition, outside visitor access condition, equipment quantity statistics, equipment state statistics, visitor occupation ratio, peak condition statistics and the like, can carry out penetrating type analysis to visitor data according to the time slot of choosing, and the management layer of being convenient for masters the vehicle personnel access condition of each factory.
And the administrator can inquire the visiting records of the user by inputting visiting user information on the inquiry module, wherein the visiting user information comprises units, names, identification numbers, mobile phone numbers, visiting time periods, personnel authentication photos, vehicle license plate identification contrast pictures, visited person units, visited person departments, visited person names, visited person telephones and the like.
The editing module is used for allowing an administrator to perform related operations such as adding, deleting and forbidding on each person and each subsystem; meanwhile, sensitive crowd data given by relevant departments can be edited and input into the server, and each client can directly immunize and alarm the reservation and the entrance and the exit of the sensitive crowd, so that the probability of water plant emergencies is reduced;
The monitoring module is used for checking the running state of each client, for example, whether the access control subsystem is in a normal working state can be checked; when a subsystem is abnormal, an administrator can quickly check and solve the abnormal problem by checking abnormal information.
In this embodiment, the system further includes an alarm module, and the alarm module is connected to the client. If the external visitor M is set as blacklist personnel (unsafe personnel) by the server side, the server side can issue the information of the M to each client side, and when the M makes an appointment on the appointment subsystem or the entrance guard subsystem reads the information (face or identity card) of the M, the alarm module can send alarm information, such as sound and light information.
Referring to fig. 2, the present invention further provides a working method of the intelligent security system, including the following steps:
s1, the server collects and stores the information of the personnel and sends the information of the personnel to the corresponding client; the authority management subsystem sets the authority of the unit personnel, the authority of the unit personnel is stored in the server, and the clients are communicated and interconnected through the server.
s2: the external visitor can fill reservation application information (including unit name, identity card, license plate number, mobile phone number, visitor unit, name and the like)) on the visitor subsystem to perform reservation application, the client generates the two-dimensional code after successful verification, pushes the two-dimensional code and the attendance notes to the external visitor through the visitor subsystem, and simultaneously sends a short message to inform the external visitor to check.
S3: when an external visitor reaches a unit gate, the access control subsystem reads the two-dimensional code or the identity card, scans the face or the license plate number of the external visitor and compares the face or the license plate number with the access information of the reservation application on the client; if the comparison is successful, go to step S5; if the comparison fails, the process proceeds to step S4.
S4: when the access control subsystem acquires the external visitor information and the access information of the reservation application on the client is not successfully compared, for example, the face of the external visitor is not consistent with the picture on the identity card or the license plate number is different from the license plate number filled in by the reservation application information, the external visitor can make the reservation application again on site, and after the application is completed, the step S3 is repeated.
s5: after the comparison is successful, for example, the face of the external visitor is compared with the picture on the identity card to be consistent or the license plate number is the same as the license plate number filled in by the reservation application information, the client sends the visiting information to the visitor, and meanwhile, the access control subsystem passes.
s6: if the external visitor does not make an appointment, the visitor registers the visitor, and the access control subsystem releases the visitor.
Referring to fig. 3, the present invention further includes a working method of the security system when an external visitor leaves, including the following steps:
S7: when an external visitor leaves, the entrance guard subsystem reads the two-dimensional code or the identity card displayed by the external visitor, simultaneously scans the face or the license plate number of the external visitor and compares the face or the license plate number with the access information of the reserved application on the client; if the comparison is successful, go to step S9; if the comparison fails, the process proceeds to step S8.
s8: when the comparison fails, the visitor should accompany the external visitor to leave, and the door bar external visitor is released at the same time, and the access control subsystem is released after the external visitor confirms.
s9: and if the comparison is successful, the client leaves information to the visited person, and the access control subsystem passes the information.
In the embodiment, the access of the user is monitored and recorded, and due to the fact that examination and approval are carried out in advance, the responsibility can be guaranteed to be specific to individuals, the access condition of the user in a factory can be accurately mastered, and safety is greatly improved.
In practical applications, one logical unit may be one physical unit, may be a part of one physical unit, or may be implemented by a combination of a plurality of physical units. In addition, in order to highlight the innovative part of the present invention, elements that are not so closely related to solving the technical problems proposed by the present invention are not introduced in the present embodiment, but this does not indicate that other elements are not present in the present embodiment.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (8)

1. an intelligent security system is characterized by comprising a server, a client, a visitor subsystem, an access control subsystem and a permission management subsystem;
The server side is in bidirectional connection with n client sides, wherein n is greater than or equal to 1 and is a positive integer;
The client is respectively connected with the visitor subsystem, the authority management subsystem and the entrance guard subsystem in two directions.
2. The intelligent security system of claim 1, wherein the visitor subsystem comprises a reservation module, an audit module, an information push module and a two-dimensional code generation module;
The user performs appointment application to the interviewee through the appointment module, then submits the appointment application to the auditing module, and the interviewee audits the appointment application, after the auditing is successful, the two-dimension code generating module generates the two-dimension code and stores the two-dimension code to the client and the server, and the information pushing module sends the two-dimension code to the user.
3. The intelligent security system of claim 2, wherein the visitor subsystem further comprises an authentication module for collecting information of the visitor for authentication, and the user can make a reservation application to the visitor after the authentication is successful.
4. the intelligent security system of claim 1, wherein the access control subsystem comprises a face recognition device and a barrier device;
The face recognition device is used for scanning the face of the user, comparing the face with the appointment application in the client side, and successfully releasing the face; the barrier gate device is used for identifying the license plate number of the vehicle, comparing the license plate number with the reservation application in the client side, and successfully releasing the license plate number.
5. The intelligent security system of claim 1, wherein the rights management subsystem is configured to perform rights setting for the user, and the rights setting includes an internal person, an internal visitor, and an external visitor.
6. The intelligent security system of claim 1, wherein the server comprises a login module, a statistics display module, a processor, an inquiry module, an editing module, and a monitoring module;
the login module is used for a manager to log in the intelligent security system;
the statistical display module is used for statistically displaying the information of the visiting users, and comprises: the visitor reservation number, the visited number, the amount to be visited, the number to be audited, the access condition of the internal visitor, the access condition of the external visitor, the equipment number statistics, the equipment state statistics, the visitor occupation ratio and the peak condition statistics;
the query module is used for querying the visiting record of the user, and comprises the unit, the name, the identity card number, the mobile phone number and the visiting time period of the user;
the editing module is used for performing addition, deletion and forbidding operations on personnel and subsystems;
and the monitoring module is used for checking the running state of each client.
7. A working method of an intelligent security system is characterized by comprising the following steps:
s1: the server side collects and stores the information of the interviewee and sends the information of the interviewee to the corresponding client side;
s2: the visitor subsystem collects and audits the reservation application information of the external visitor, generates a two-dimensional code after the audit is successful, and pushes the two-dimensional code and the safety notice to the external visitor;
S3: when an external visitor arrives at the entrance of a unit, the entrance guard subsystem reads the two-dimensional code or the identity card, scans the face or the license plate number of the external visitor and compares the face or the license plate number with the reservation application information on the client; if the comparison is successful, go to step S5; if the comparison fails, go to step S4;
S4: if the comparison fails, the external visitor can make a reservation application again on site, and after the application is completed, the step S3 is repeated;
S5: after the comparison is successful, the client sends the visiting information to the visited person, and the access control subsystem passes;
s6: if the external visitor does not make an appointment, the visitor registers the visitor, and the access control subsystem releases the visitor.
8. the working method of the intelligent security system of claim 7, further comprising the steps of:
s7: when an external visitor leaves, the entrance guard subsystem reads the two-dimensional code, scans the face or the license plate number of the external visitor at the same time, and compares the face or the license plate number with the reservation application information on the client; if the comparison is successful, go to step S9; if the comparison fails, go to step S8;
s8: if the comparison fails, the visitor accompanies the external visitor to leave or issues a doorstrip to the external visitor, and the door control subsystem releases the doorstrip;
S9: and if the comparison is successful, the client sends the leaving information to the visited person, and the access control subsystem passes the comparison.
CN201910708289.5A 2019-08-01 2019-08-01 Intelligent security system and working method Pending CN110570551A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910708289.5A CN110570551A (en) 2019-08-01 2019-08-01 Intelligent security system and working method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910708289.5A CN110570551A (en) 2019-08-01 2019-08-01 Intelligent security system and working method

Publications (1)

Publication Number Publication Date
CN110570551A true CN110570551A (en) 2019-12-13

Family

ID=68774172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910708289.5A Pending CN110570551A (en) 2019-08-01 2019-08-01 Intelligent security system and working method

Country Status (1)

Country Link
CN (1) CN110570551A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111091642A (en) * 2019-12-31 2020-05-01 航天信息股份有限公司 Intelligent security system and working method thereof
CN111145403A (en) * 2019-12-27 2020-05-12 航天信息股份有限公司 Security management method and system
CN111340398A (en) * 2020-03-24 2020-06-26 张为海 Intelligent unmanned security service platform system
CN111737674A (en) * 2020-08-03 2020-10-02 德能森智能科技(成都)有限公司 Wisdom garden system based on cloud platform
CN111862426A (en) * 2020-07-17 2020-10-30 塔盾信息技术(上海)有限公司 Closed regional man-vehicle management system based on artificial intelligence
CN112184518A (en) * 2020-08-10 2021-01-05 国家电网有限公司 Platform system is a little in workplace
CN112435388A (en) * 2020-10-26 2021-03-02 北京北排水环境发展有限公司 Access control system for underground regeneration water plant
CN112949878A (en) * 2020-12-22 2021-06-11 天博电子信息科技有限公司 Personnel management and control system
CN113379395A (en) * 2021-07-01 2021-09-10 浙江大虫科技股份有限公司 Fire control wisdom camp management and control system
CN113870473A (en) * 2021-09-28 2021-12-31 上海电气集团数字科技有限公司 Intelligent building passing system and passing control strategy
CN114360105A (en) * 2021-12-15 2022-04-15 中用科技有限公司 Wisdom visitor management and control platform
CN114821879A (en) * 2022-06-29 2022-07-29 河北远东通信系统工程有限公司 Park visitor management system
CN115147970A (en) * 2022-06-10 2022-10-04 重庆宝钢汽车钢材部件有限公司 Intelligent entrance guard epidemic prevention system
CN115188117A (en) * 2022-07-05 2022-10-14 江苏信江数字科技有限公司 Park entrance and exit safety management system and method
CN115424371A (en) * 2022-07-07 2022-12-02 江苏信江数字科技有限公司 Intelligent park management system and management method
CN117912154A (en) * 2024-03-14 2024-04-19 深圳湾科技发展有限公司 Park operation management method, system and device thereof

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201142096Y (en) * 2007-03-26 2008-10-29 乐志明 Access registration controller
CN104143056A (en) * 2013-12-31 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method and system
CN105404930A (en) * 2015-12-11 2016-03-16 苏州翊高科技有限公司 Information processing method, server and system for visiting reservation information
CN105491133A (en) * 2015-12-11 2016-04-13 苏州翊高科技有限公司 Intelligent visit system for visitors and intelligent electronic visit list formation method
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN105654580A (en) * 2015-07-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Access control method and system, electronic lock, and management and visitor terminal
CN105678879A (en) * 2016-01-28 2016-06-15 西安艾润物联网技术服务有限责任公司 Visitor's vehicle management method and system
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
CN107958515A (en) * 2017-12-11 2018-04-24 武汉虹信技术服务有限责任公司 A kind of visitor management system to be opened the door based on Quick Response Code and management method
US20180114384A1 (en) * 2016-10-25 2018-04-26 Visible Energy, Inc. Cloud-based keyless access control system for housing facilities
CN108022352A (en) * 2017-12-27 2018-05-11 北京洪泰同创信息技术有限公司 Access control method, door control terminal and access control system
US9990786B1 (en) * 2014-01-17 2018-06-05 Microstrategy Incorporated Visitor credentials
CN108234648A (en) * 2017-12-31 2018-06-29 佛山市华跃计算机系统有限公司 Enterprise's visiting reservation system and method based on wechat service number
CN108257267A (en) * 2018-01-11 2018-07-06 成都千帆科技开发有限公司 cloud access management system
CN108520577A (en) * 2018-03-12 2018-09-11 南京甄视智能科技有限公司 Visitor's reservation management method based on recognition of face
CN108765638A (en) * 2018-04-03 2018-11-06 浙江工业大学 A kind of access control management method based on color code
CN109389723A (en) * 2018-10-11 2019-02-26 平安科技(深圳)有限公司 Utilize the caller management method, device, computer equipment of recognition of face
CN109544749A (en) * 2018-11-22 2019-03-29 佛山市云团科技有限公司 A kind of visitor's processing system and method based on face recognition technology
CN109934563A (en) * 2019-03-20 2019-06-25 钱露露 A kind of business intelligence office system based on wechat public platform

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201142096Y (en) * 2007-03-26 2008-10-29 乐志明 Access registration controller
CN104143056A (en) * 2013-12-31 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method and system
US9990786B1 (en) * 2014-01-17 2018-06-05 Microstrategy Incorporated Visitor credentials
CN105654580A (en) * 2015-07-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Access control method and system, electronic lock, and management and visitor terminal
CN105404930A (en) * 2015-12-11 2016-03-16 苏州翊高科技有限公司 Information processing method, server and system for visiting reservation information
CN105491133A (en) * 2015-12-11 2016-04-13 苏州翊高科技有限公司 Intelligent visit system for visitors and intelligent electronic visit list formation method
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
CN105678879A (en) * 2016-01-28 2016-06-15 西安艾润物联网技术服务有限责任公司 Visitor's vehicle management method and system
US20180114384A1 (en) * 2016-10-25 2018-04-26 Visible Energy, Inc. Cloud-based keyless access control system for housing facilities
CN107958515A (en) * 2017-12-11 2018-04-24 武汉虹信技术服务有限责任公司 A kind of visitor management system to be opened the door based on Quick Response Code and management method
CN108022352A (en) * 2017-12-27 2018-05-11 北京洪泰同创信息技术有限公司 Access control method, door control terminal and access control system
CN108234648A (en) * 2017-12-31 2018-06-29 佛山市华跃计算机系统有限公司 Enterprise's visiting reservation system and method based on wechat service number
CN108257267A (en) * 2018-01-11 2018-07-06 成都千帆科技开发有限公司 cloud access management system
CN108520577A (en) * 2018-03-12 2018-09-11 南京甄视智能科技有限公司 Visitor's reservation management method based on recognition of face
CN108765638A (en) * 2018-04-03 2018-11-06 浙江工业大学 A kind of access control management method based on color code
CN109389723A (en) * 2018-10-11 2019-02-26 平安科技(深圳)有限公司 Utilize the caller management method, device, computer equipment of recognition of face
CN109544749A (en) * 2018-11-22 2019-03-29 佛山市云团科技有限公司 A kind of visitor's processing system and method based on face recognition technology
CN109934563A (en) * 2019-03-20 2019-06-25 钱露露 A kind of business intelligence office system based on wechat public platform

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145403A (en) * 2019-12-27 2020-05-12 航天信息股份有限公司 Security management method and system
CN111091642A (en) * 2019-12-31 2020-05-01 航天信息股份有限公司 Intelligent security system and working method thereof
CN111340398A (en) * 2020-03-24 2020-06-26 张为海 Intelligent unmanned security service platform system
CN111862426A (en) * 2020-07-17 2020-10-30 塔盾信息技术(上海)有限公司 Closed regional man-vehicle management system based on artificial intelligence
CN111737674A (en) * 2020-08-03 2020-10-02 德能森智能科技(成都)有限公司 Wisdom garden system based on cloud platform
CN112184518A (en) * 2020-08-10 2021-01-05 国家电网有限公司 Platform system is a little in workplace
CN112435388A (en) * 2020-10-26 2021-03-02 北京北排水环境发展有限公司 Access control system for underground regeneration water plant
CN112949878A (en) * 2020-12-22 2021-06-11 天博电子信息科技有限公司 Personnel management and control system
CN113379395A (en) * 2021-07-01 2021-09-10 浙江大虫科技股份有限公司 Fire control wisdom camp management and control system
CN113870473A (en) * 2021-09-28 2021-12-31 上海电气集团数字科技有限公司 Intelligent building passing system and passing control strategy
CN114360105A (en) * 2021-12-15 2022-04-15 中用科技有限公司 Wisdom visitor management and control platform
CN115147970A (en) * 2022-06-10 2022-10-04 重庆宝钢汽车钢材部件有限公司 Intelligent entrance guard epidemic prevention system
CN114821879A (en) * 2022-06-29 2022-07-29 河北远东通信系统工程有限公司 Park visitor management system
CN115188117A (en) * 2022-07-05 2022-10-14 江苏信江数字科技有限公司 Park entrance and exit safety management system and method
CN115424371A (en) * 2022-07-07 2022-12-02 江苏信江数字科技有限公司 Intelligent park management system and management method
CN117912154A (en) * 2024-03-14 2024-04-19 深圳湾科技发展有限公司 Park operation management method, system and device thereof

Similar Documents

Publication Publication Date Title
CN110570551A (en) Intelligent security system and working method
CN106097223B (en) Certificate declaration management system and certificate declaration management method
CN108961475B (en) Access control deployment method and access control deployment server
US10720001B1 (en) System and method for verified admission through access controlled locations
CN108257267B (en) Cloud access management system
CN108734813B (en) Method and device for issuing temporary access control card
CN108269330B (en) Access control method, device and system
CN106846577A (en) Personnel's discrepancy authority control method and device based on recognition of face
CN105427222A (en) Rental house management system
CN112949878A (en) Personnel management and control system
CN111553767A (en) Shared house leasing system, method and storage medium based on block chain
CN107248110B (en) Rental housing and floating population information interaction management system
CN112328995B (en) Social management system based on TOF image sensor verification
CN112200948A (en) Smart and safe campus visitor reservation platform
CN111915789A (en) Visitor reservation management method, device, equipment and storage medium
KR102480910B1 (en) Face recognition system for easy registration
CN114360105A (en) Wisdom visitor management and control platform
CN114565997A (en) Intelligent construction site personnel health management system and method
CN112907801A (en) Access control management method and device, electronic equipment and storage medium
CN108364376A (en) A kind of gate inhibition and integrated Work attendance method of checking card
CN111652781A (en) Service processing method, device, equipment and storage medium based on community codes
US20220262184A1 (en) Property management systems
CN111402105B (en) Community management system
US20070067330A1 (en) Security method for verifying and tracking service personnel
CN114282927A (en) U shield management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191213