CN110913163B - Building permission processing method and device - Google Patents

Building permission processing method and device Download PDF

Info

Publication number
CN110913163B
CN110913163B CN201911087154.8A CN201911087154A CN110913163B CN 110913163 B CN110913163 B CN 110913163B CN 201911087154 A CN201911087154 A CN 201911087154A CN 110913163 B CN110913163 B CN 110913163B
Authority
CN
China
Prior art keywords
software
user
video
server
building
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911087154.8A
Other languages
Chinese (zh)
Other versions
CN110913163A (en
Inventor
郭兴华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Hefeng system integration Co.,Ltd.
Original Assignee
Wuxi Hefeng System Integration Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Hefeng System Integration Co ltd filed Critical Wuxi Hefeng System Integration Co ltd
Priority to CN201911087154.8A priority Critical patent/CN110913163B/en
Publication of CN110913163A publication Critical patent/CN110913163A/en
Application granted granted Critical
Publication of CN110913163B publication Critical patent/CN110913163B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a building permission processing method and a building permission processing device, wherein the method comprises the following steps: the first software initiates a video call connection request to the second software; after the first software is connected with the second software, receiving a message sent by the second software, wherein the message is used for indicating the first software to record a video call; after recording a video call with a preset time length, the first software uploads a video to a server; and the server acquires the sound and/or the feature of the second user in the video and opens the access right of the predetermined building in the predetermined time period to the second user. Through the application, the problem that the entrance guard card needs to be temporarily issued by the foreground to enter the building in the correlation technique is solved, and the convenience and the safety of the temporary visitor entering the building are improved.

Description

Building permission processing method and device
Technical Field
The application relates to the field of intelligent buildings, in particular to a building permission processing method and device.
Background
At present, more people come in and go out of buildings as offices. Generally, each person entering or exiting a building is provided with a door card through which the person enters or exits the building.
The office building visiting guests are more, and for the office building with the entrance guard, in general conditions, the visitor needs to register in the foreground, and an entering and exiting door card is replaced through the mortgage of identification documents such as an identification card and the like. This approach, while seemingly safe, has inconveniences: on one hand, if more temporarily visited guests exist, the time for queuing to receive cards in the foreground may be increased; on the other hand, as long as the guest can speak out the visiting company, the foreground generally does not limit, and the entrance guard card is issued, which may be bored by people.
Aiming at the problem caused by the fact that the entrance guard card needs to be temporarily issued by the foreground to enter the building in the related technology, no good solution is provided at present.
Disclosure of Invention
The application provides a building permission processing method and device, which are used for solving the problem caused by the fact that a foreground needs to temporarily issue an access control card to enter a building in the related technology.
According to one aspect of the invention, a building permission processing method is provided, which comprises the following steps: the method comprises the steps that first software initiates a video call connection request to second software, wherein the first software is software installed on a mobile terminal of a first user, the second software is software installed on a mobile terminal of a second user, and the first user has the capacity of setting authority for the second user; after the first software and the second software are connected, receiving a message sent by the second software, wherein the message is used for indicating the first software to record the video call; after recording a video call with a preset time length, the first software uploads the video to a server; and the server acquires the sound and/or the feature of the second user in the video and opens the access right of the preset building in the preset time period to the second user.
Further, before the server opens the access right to the predetermined building for the predetermined time period to the second user, the method further includes: the first software receives the predetermined time period input by the first user and sends the predetermined time period to the second user.
Further, after the server fails to acquire the sound and/or the feature of the second user in the video, the method further includes: and the server sends a message to the first software, wherein the message is used for indicating that the first software fails to set the authority.
Further, after the server sends the message to the first software, the method further includes: and the first software establishes connection with the second software again and records the video call.
According to another aspect of the present invention, there is also provided a building permission processing system, including first software, second software and a server, wherein: the first software is used for initiating a video call connection request to the second software, wherein the first software is software installed on a mobile terminal of a first user, the second software is software installed on a mobile terminal of a second user, and the first user has the capability of setting authority for the second user; after the first software and the second software are connected, the first software is used for receiving a message sent by the second software, wherein the message is used for indicating the first software to record the video call; the first software is used for uploading the video to a server after recording the video call with the preset duration; the server is used for acquiring the sound and/or the feature of the second user in the video and opening the access right of the preset building in the preset time period to the second user.
Further, before the server opens the access right of the predetermined building in the predetermined time period to the second user, the first software is further used for receiving the predetermined time period input by the first user and sending the predetermined time period to the second user.
Further, after the server fails to acquire the sound and/or the feature of the second user in the video, the server is further configured to send a message to the first software, where the message is used to indicate that the first software fails to set the right.
Further, after the server sends the message to the first software, the first software is further configured to establish a connection with the second software again and record the video call.
According to another aspect of the present application, there is also provided a memory for storing software for performing the above method.
According to another aspect of the present application, there is also provided a processor for executing software, wherein the software is configured to perform the above method.
The method comprises the following steps: the method comprises the steps that first software initiates a video call connection request to second software, wherein the first software is software installed on a mobile terminal of a first user, the second software is software installed on a mobile terminal of a second user, and the first user has the capacity of setting authority for the second user; after the first software and the second software are connected, receiving a message sent by the second software, wherein the message is used for indicating the first software to record the video call; after recording a video call with a preset time length, the first software uploads the video to a server; and the server acquires the sound and/or the feature of the second user in the video and opens the access right of the preset building in the preset time period to the second user. Through the application, the problem that the entrance guard card needs to be temporarily issued by the foreground to enter the building in the correlation technique is solved, and the convenience and the safety of the temporary visitor entering the building are improved.
Drawings
Fig. 1 is a flowchart of a building permission processing method provided according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In the present embodiment, a building authority processing method is provided, and fig. 1 is a flowchart of a building authority processing method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, a first software initiates a video call connection request to a second software, wherein the first software is installed on a mobile terminal of a first user, the second software is installed on a mobile terminal of a second user, and the first user has the ability of setting authority for the second user;
step S104, after the first software is connected with the second software, receiving a message sent by the second software, wherein the message is used for indicating the first software to record the video call;
step S106, after the first software records the video call with the preset duration, the first software uploads the video to a server;
and step S108, the server acquires the sound and/or the feature of the second user in the video and opens the access right of the preset building in the preset time period to the second user.
As a preferable mode, after receiving the video uploaded by the first software, the server needs to determine whether the authority of the user uploading the video can be opened for other users, and if the first user logged in on the first software does not have the ability to set the authority for other users, the server prompts the first user logged in by the first software that the authority is not enough.
Or as a simpler implementation manner, the determination may be performed at the software end, and if the first user logged in through the first software has no authority, the upload button may not be displayed on the first software, or the upload control is disabled.
As a preferable mode, during the process of the first user and the second user communicating, the second software defaults that the second user generates a password, and the second user reads the password during the process of communicating and records the communication process of reading the password.
The server extracts the voiceprint of the password read from the second user video, the second user can use voice to recite the password in the future, and the access control can be opened only under the condition that the password content is the same and the voiceprint is the same.
In order to prevent the password of the second user, the password may preferably be sent to the first software, so that the password may be looked up to the first user when the second user forgets the password. This is more secure than storing the password directly in the second software.
Or the server may extract facial features of the second user through the recorded call video, the second user may acquire the facial features of the second user through a camera in the building access control system in the future to compare the facial features with the video extracted from the call video, and if the facial features and the video are judged to have similarity exceeding a threshold, the access control is opened.
In comparison, the comparison can be performed by means of machine learning. At present, a plurality of open-source machine learning models exist, different training data need to be provided when the models are different and are used, and the models trained by the different training data are different. In this embodiment, the training data may adopt multiple sets, and each set of training data includes three contents: the video recorded by the software, the facial photo of the same person obtained by shooting through the access control system and a label are used for identifying whether the video and the facial photo are of the same person or not. A model is obtained by training with the training data. When the model is applied in the future, the video recorded by the software and the facial picture obtained by photographing by the access control system are input, so that whether the person is the same person or not can be obtained, and whether the access control system can be opened or not can be determined.
When the model is trained, the voice voiceprint can be trained, and at the moment, the training data are the sound recorded by the software, the sound recorded by the entrance guard and a label used for identifying whether the two sounds are the same sound. Another model may be obtained by training through multiple sets of training data. When the model is applied, the sound recorded by the software and the sound recorded by the entrance guard are input, and whether the two sounds are the same sound can be obtained, so that whether the entrance guard can be opened or not is determined.
Alternatively, a mode of double verification of the voiceprint and the image may be adopted, and the entrance guard is opened only in a mode that both the voiceprint and the face feature verification pass.
Or, carrying out weighted calculation on the similarity obtained by verifying the characteristics of the voiceprint and the facial image to obtain a score, and judging whether to open the access according to whether the score exceeds a threshold value. The weighting of the voiceprint and facial features can be flexibly adjusted according to the actual environment, the weight of the voiceprint is reduced if the decibel number near the entrance exceeds a predetermined number (e.g., 80 decibels), and the weight of the voiceprint is reduced to 0 if the decibel exceeds a second predetermined number (e.g., 100 decibels).
Or, the weight of the face recognition can be adjusted, a light sensor is arranged at the entrance guard, if the light brightness is lower than a threshold value, the weight of the face image feature verification is reduced, if the light brightness is lower than a second threshold value, the weight of the face image verification can be reduced to 0, and at the moment, the voiceprint verification is completely used.
Through the steps, the problem caused by the fact that the entrance guard card needs to be temporarily issued by the foreground to enter the building in the related technology is solved, and convenience and safety of temporary visitors entering the building are improved.
Preferably, before the server opens the access right to the predetermined building for the predetermined time period to the second user, the method further comprises: the first software receives a predetermined time period input by a first user and transmits the predetermined time period to a second user.
Preferably, after the server fails to acquire the sound and/or feature of the second user in the video, the method further includes: and the server sends a message to the first software, wherein the message is used for indicating that the first software fails to set the authority.
Preferably, after the server sends the message to the first software, the method further comprises: and the first software establishes connection with the second software again and records the video call.
The embodiment of the application also provides a building permission processing system, which comprises first software, second software and a server, wherein: the first software is used for initiating a video call connection request to second software, wherein the first software is software installed on a mobile terminal of a first user, the second software is software installed on a mobile terminal of a second user, and the first user has the capability of setting authority for the second user; after the first software and the second software are connected, the first software and the second software are used for receiving a message sent by the second software, wherein the message is used for indicating the first software to record a video call; the first software is used for uploading the video to the server after recording the video call with the preset duration; the server is used for acquiring the sound and/or the feature of the second user in the video and opening the access right of the predetermined building in the predetermined time period to the second user.
Preferably, before the server opens the access right of the predetermined building in the predetermined time period to the second user, the first software is further configured to receive the predetermined time period input by the first user and send the predetermined time period to the second user.
Preferably, after the server fails to acquire the sound and/or the feature of the second user in the video, the server is further configured to send a message to the first software, where the message is used to indicate that the first software fails to set the right.
Preferably, after the server sends the message to the first software, the first software is further configured to establish a connection with the second software again and record the video call.
In this embodiment, a memory is provided for storing software for performing the above-described method.
In this embodiment, a processor is provided for executing software for performing the above-described method.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
An embodiment of the present invention provides a storage medium on which a program or software is stored, the program implementing the above method when executed by a processor. The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (8)

1. A building permission processing method is characterized by comprising the following steps:
the method comprises the steps that first software initiates a video call connection request to second software, wherein the first software is software installed on a mobile terminal of a first user, the second software is software installed on a mobile terminal of a second user, and the first user has the capacity of setting authority for the second user;
after the first software and the second software are connected, receiving a message sent by the second software, wherein the message is used for indicating the first software to record the video call;
after recording a video call with a preset time length, the first software uploads the video to a server;
the server acquires the sound and/or the feature of a second user in the video, and opens the access right of a preset building in a preset time period to the second user; the server extracts facial features of a second user through the recorded call video, the second user obtains the facial features of the second user through a camera in the building access control system to compare the facial features with the video extracted from the call video, and if the facial features and the video are judged to have similarity exceeding a threshold value, the access control is opened; when comparing, the method is carried out in a machine learning mode; the training data adopts a plurality of groups, and each group of training data comprises three contents: the video recorded by the software, the facial photo of the same person obtained by shooting through the access control system and a label are used for identifying whether the video and the facial photo are the same person or not; training through the training data to obtain a model; when the model is applied in the future, a video recorded by software and a facial photo obtained by photographing by an access control system are input to obtain whether the person is the same person or not; when the model is trained, the voice voiceprint is also trained, and at the moment, the training data are the sound recorded by the software, the sound recorded by the entrance guard and a label used for identifying whether the two sounds are the same sound; training through a plurality of groups of training data to obtain another model; when the model is applied, the sound recorded by software and the sound recorded by the entrance guard are input, and whether the two sounds are the same sound is obtained; the method comprises the steps of adopting a voiceprint and image dual verification mode, carrying out weighted calculation on similarity obtained by voiceprint and facial image feature verification to obtain a score, and judging whether to open the access according to whether the score exceeds a threshold value; the weighting of the voiceprint and the face characteristic is adjusted according to the actual environment, if the decibel number near the entrance guard exceeds a preset number, the weight of the voiceprint is reduced, and if the decibel exceeds a second preset number, the weight of the voiceprint is reduced to 0; and a light sensor is arranged at the entrance guard, if the light brightness is lower than a threshold value, the weight of the facial image feature verification is reduced, and if the brightness is lower than a second threshold value, the weight of the facial image verification can be reduced to 0.
2. The method of claim 1, wherein before the server opens access to the second user for a predetermined building for a predetermined period of time, the method further comprises:
the first software receives the predetermined time period input by the first user and sends the predetermined time period to the second user.
3. The method according to claim 1 or 2, wherein after the server fails to acquire the sound and/or the feature of the second user in the video, the method further comprises:
and the server sends a message to the first software, wherein the message is used for indicating that the first software fails to set the authority.
4. The method of claim 1, wherein after the server sends the message to the first software, the method further comprises:
and the first software establishes connection with the second software again and records the video call.
5. A building permission processing system comprising first software, second software, and a server, wherein:
the first software is used for initiating a video call connection request to the second software, wherein the first software is software installed on a mobile terminal of a first user, the second software is software installed on a mobile terminal of a second user, and the first user has the capability of setting authority for the second user;
after the first software and the second software are connected, the first software is used for receiving a message sent by the second software, wherein the message is used for indicating the first software to record the video call;
the first software is used for uploading the video to a server after recording the video call with the preset duration;
the server is used for acquiring the sound and/or the feature of a second user in the video and opening the access authority of a preset building in a preset time period to the second user; the server extracts facial features of a second user through the recorded call video, the second user obtains the facial features of the second user through a camera in the building access control system to compare the facial features with the video extracted from the call video, and if the facial features and the video are judged to have similarity exceeding a threshold value, the access control is opened; when comparing, the method is carried out in a machine learning mode; the training data adopts a plurality of groups, and each group of training data comprises three contents: the video recorded by the software, the facial photo of the same person obtained by shooting through the access control system and a label are used for identifying whether the video and the facial photo are the same person or not; training through the training data to obtain a model; when the model is applied in the future, a video recorded by software and a facial photo obtained by photographing by an access control system are input to obtain whether the person is the same person or not; when the model is trained, the voice voiceprint is also trained, and at the moment, the training data are the sound recorded by the software, the sound recorded by the entrance guard and a label used for identifying whether the two sounds are the same sound; training through a plurality of groups of training data to obtain another model; when the model is applied, the sound recorded by software and the sound recorded by the entrance guard are input, and whether the two sounds are the same sound is obtained; the method comprises the steps of adopting a voiceprint and image dual verification mode, carrying out weighted calculation on similarity obtained by voiceprint and facial image feature verification to obtain a score, and judging whether to open the access according to whether the score exceeds a threshold value; the weighting of the voiceprint and the face characteristic is adjusted according to the actual environment, if the decibel number near the entrance guard exceeds a preset number, the weight of the voiceprint is reduced, and if the decibel exceeds a second preset number, the weight of the voiceprint is reduced to 0; and a light sensor is arranged at the entrance guard, if the light brightness is lower than a threshold value, the weight of the facial image feature verification is reduced, and if the brightness is lower than a second threshold value, the weight of the facial image verification can be reduced to 0.
6. The system of claim 5, wherein before the server opens access to the second user for a predetermined building for a predetermined period of time,
the first software is further configured to receive the predetermined time period input by the first user and send the predetermined time period to the second user.
7. The system of claim 5 or 6, wherein after the server fails to acquire the sound and/or feature of the second user in the video,
the server is further used for sending a message to the first software, wherein the message is used for indicating that the first software fails to set the authority.
8. The system of claim 5, wherein after the server sends a message to the first software,
and the first software is also used for establishing connection with the second software again and recording the video call.
CN201911087154.8A 2019-11-08 2019-11-08 Building permission processing method and device Active CN110913163B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911087154.8A CN110913163B (en) 2019-11-08 2019-11-08 Building permission processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911087154.8A CN110913163B (en) 2019-11-08 2019-11-08 Building permission processing method and device

Publications (2)

Publication Number Publication Date
CN110913163A CN110913163A (en) 2020-03-24
CN110913163B true CN110913163B (en) 2022-01-14

Family

ID=69816948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911087154.8A Active CN110913163B (en) 2019-11-08 2019-11-08 Building permission processing method and device

Country Status (1)

Country Link
CN (1) CN110913163B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN104954121B (en) * 2015-06-12 2017-11-24 福建星网锐捷通讯股份有限公司 A kind of remote door access control method and its system using sound wave communication
CN107862773A (en) * 2017-11-22 2018-03-30 上海亦源智能科技有限公司 Can reservation type recognition of face gate inhibition guest system and method
CN108737789A (en) * 2018-06-08 2018-11-02 长春以书会友文化传媒有限公司 A kind of residential property visitor management system
KR20190013005A (en) * 2017-07-31 2019-02-11 주식회사 에스티씨 Digital Door System for preventing Crime and Robbery Preventing Method by Using thereof
CN110415420A (en) * 2019-08-22 2019-11-05 广东鉴面智能科技有限公司 A kind of visitor's intelligent management system and its management method based on recognition of face

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224849B (en) * 2015-10-20 2019-01-01 广州广电运通金融电子股份有限公司 A kind of multi-biological characteristic fusion authentication identifying method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954121B (en) * 2015-06-12 2017-11-24 福建星网锐捷通讯股份有限公司 A kind of remote door access control method and its system using sound wave communication
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
KR20190013005A (en) * 2017-07-31 2019-02-11 주식회사 에스티씨 Digital Door System for preventing Crime and Robbery Preventing Method by Using thereof
CN107862773A (en) * 2017-11-22 2018-03-30 上海亦源智能科技有限公司 Can reservation type recognition of face gate inhibition guest system and method
CN108737789A (en) * 2018-06-08 2018-11-02 长春以书会友文化传媒有限公司 A kind of residential property visitor management system
CN110415420A (en) * 2019-08-22 2019-11-05 广东鉴面智能科技有限公司 A kind of visitor's intelligent management system and its management method based on recognition of face

Also Published As

Publication number Publication date
CN110913163A (en) 2020-03-24

Similar Documents

Publication Publication Date Title
US20190138795A1 (en) Automatic Object Detection and Recognition via a Camera System
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
KR102177235B1 (en) An attendance check system using deep learning based face recognition
CN111402476B (en) Community epidemic prevention safety method based on machine learning
KR102042129B1 (en) Method and apparatus for authenticating user
CN101511085A (en) Method and apparatus for limiting usage of mobile terminal function by using personal identification
KR20060009333A (en) System and method for selectively activating biometric sensors
CN109829691B (en) C/S card punching method and device based on position and deep learning multiple biological features
JP4772509B2 (en) Doorphone and ringing tone control method for doorphone
JP7400866B2 (en) Information processing device, information processing method and program
US9355310B2 (en) Monitoring individuals using distributed data sources
CN110913163B (en) Building permission processing method and device
JPWO2015016262A1 (en) Information processing apparatus, authentication system, authentication method, and program
CN110992565B (en) Automatic judgment method and device for association relationship between personnel and room
CN110708499A (en) Monitoring control method and device
CN112767073A (en) Check-in management control method and device, mobile terminal and storage medium
KR102071185B1 (en) Calling system for controlling peripheral device acording to the type of emergency
JP7353825B2 (en) Image processing device and method, image input device, image processing system, program
CN112669509A (en) Access control management method, system, electronic device and storage medium
CN113052100A (en) Traffic identification method and related device
KR102584918B1 (en) A system and method for managing a gate
CN110334495A (en) Mobile terminal unlocks method and device
CN117156055B (en) One-key help seeking method and system for constructors
CN111862428A (en) Access control method and device
CN110858419B (en) Identity recognition method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211231

Address after: 214000 room 210, No. 63, East Ring Road, Yuqi street, Huishan District, Wuxi City, Jiangsu Province

Applicant after: Wuxi Hefeng system integration Co.,Ltd.

Address before: 230000 commercial building 108, building 20b, Mingzhu garden, intersection of Lianhua Road and Danxia Road, Hefei Economic and Technological Development Zone, Anhui Province

Applicant before: Hefei Yishihui Network Technology Co.,Ltd.