CN112785766A - Access control permission distribution authorization method based on block chain - Google Patents

Access control permission distribution authorization method based on block chain Download PDF

Info

Publication number
CN112785766A
CN112785766A CN202011624308.5A CN202011624308A CN112785766A CN 112785766 A CN112785766 A CN 112785766A CN 202011624308 A CN202011624308 A CN 202011624308A CN 112785766 A CN112785766 A CN 112785766A
Authority
CN
China
Prior art keywords
visitor
access
server
block chain
workload certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011624308.5A
Other languages
Chinese (zh)
Other versions
CN112785766B (en
Inventor
黄林彬
汪劲松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Cirrus Sci Tech Dev Co ltd
Original Assignee
Guangdong Cirrus Sci Tech Dev Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Cirrus Sci Tech Dev Co ltd filed Critical Guangdong Cirrus Sci Tech Dev Co ltd
Priority to CN202011624308.5A priority Critical patent/CN112785766B/en
Publication of CN112785766A publication Critical patent/CN112785766A/en
Application granted granted Critical
Publication of CN112785766B publication Critical patent/CN112785766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses an access control authority distribution authorization method based on a block chain, wherein if a visitor enters an access control for the first time, namely the visiting frequency of the visitor is 0, a face image of the face of the visitor is obtained; identifying whether the face image frame is matched with a face image in a database of a server or not through a face identification algorithm, generating workload certification data through a workload certification algorithm when matching is successful, comparing the workload certification with each node of an access block chain system, counting the number of matching success instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes, judging whether the visitor access times in each node of the access block chain system are consistent or not, and refusing access if the visitor access times are not consistent; unauthorized visitors can be positioned, the application range is wide, the potential safety hazard of the community entrance guard is improved, the access safety of the face recognition entrance guard is improved, and the risk of illegal invasion is reduced; the invention is applied to the technical field of access control block chain systems.

Description

Access control permission distribution authorization method based on block chain
Technical Field
The invention belongs to the technical field of network data communication and block chain, and particularly relates to an access control authority distribution authorization method based on a block chain.
Background
With the rapid development of smart homes, the current access control authority method is only to verify the access control authority by means of passwords, face recognition and the like when a card is swiped, so that the access control safety of a residential area is ensured. However, especially in the cell where the card is swiped, if the access control card is lost and is picked up by a person, stolen, or the card is copied, the person who has stolen the card, copied the card, or the person who picks up the card can easily break into the cell by using the illegally obtained access control card, so that the potential safety hazard is generated, and after the person follows the access control card and a hacker breaks into the server, a series of safety problems such as access authorization and the like are easily caused by face recognition, and illegal face data is uploaded to a database of the server.
Disclosure of Invention
The present invention is directed to a method for assigning and authorizing access rights based on a block chain, so as to solve one or more technical problems in the prior art and provide at least one useful choice or creation condition.
In order to achieve the above object, according to an aspect of the present invention, there is provided a block chain-based access right allocation authorization method, including:
if the visitor enters the entrance guard for the first time, namely the visitor access times are 0: (when the preset initial value of the visitor access frequency corresponding to the visitor is 0 after the face recognition is successful)
Step 1, acquiring a human face image frame of a human face of a visitor accessing an access control for the first time;
step 2, whether the face image frame is matched with a face image in a database of a server or not is recognized through a face recognition algorithm, after the matching is successful, an entrance guard is opened, an entrance guard which is finally entered by a visitor with the successful matching is tracked, the finally entered entrance guard is a target node in an entrance guard block chain system, a matching success command is generated in the target node, when the matching success command exists in the target node, workload certification data is generated through a workload certification algorithm, the matching success command of the visitor and a timestamp corresponding to the matching are stored in the server, and each visitor corresponds to one workload certification data;
step 3, increasing the visitor access times of the visitor by 1, synchronizing the workload certification data and the visitor access times into each node and a server of the access control block chain system, and removing the matching success command from the target node; wherein, the visitor access times corresponding to each visitor are natural numbers with an initial value of 0;
if the visitor does not enter the entrance guard for the first time, namely the visitor access frequency is more than 0: (when the visitor access frequency corresponding to the visitor is more than 0 after the face recognition is successful)
Step 4, starting face recognition when a visitor enters the entrance guard, and after the face recognition is successful, if the visitor does not have workload certification in the server, denying access and not opening the entrance guard; and if the identification is successful: identifying whether the face image frame is matched with the face image in the database of the server through a face identification algorithm, and after the matching is successful, identifying whether the face image frame is matched with the face image in the database of the server
Step 5, if the workload certification exists, comparing the workload certification with each node of the forbidden zone block chain system, and counting the number of successful matching instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes;
step 6, judging whether visitor access times in each node of the access control block chain system are consistent, if the visitor access times are not consistent, refusing access, not opening the access control, if the visitor access times are consistent, judging whether the number of successfully matched instructions is equal to the visitor access times, if so, generating a successfully matched instruction, increasing the visitor access times by 1, synchronizing workload certification data and the visitor access times into each node and a server of the access control block chain system, allowing visitors to access and opening the access control;
step 7, tracking the allowed visitor to the entrance guard which finally enters, wherein the entrance guard which finally enters is a target node in an entrance guard block chain system, a matching success instruction is generated in the target node, when the matching success instruction exists in the target node, workload certification data is generated through a workload certification algorithm, after the face recognition succeeds, if the workload certification data is updated through the workload certification algorithm when the matching success instruction exists, the matching success instruction of the visitor and a timestamp corresponding to the matching are stored in a server, the hash value in the workload certification data is increased, and the visitor access frequency is increased by 1;
and 8, increasing the visitor access times corresponding to the visitors by 1, synchronizing the workload certification data and the visitor access times to each node and a server of the access control block chain system, and removing the matching success command from the target node.
Further, in step 1, the entrance guard is a face recognition gate communicating with the server, and the face recognition gate at least includes: the device comprises a shell, a camera, a liquid crystal screen or an IC card reader, wherein the camera is used for collecting human face image frames; the liquid crystal display is used for displaying the face image information of the visitor.
Further, in step 2, the server is any one of a tower server, a rack server or a blade server, and is powered by a 220V household ac power supply.
Further, the server includes a database storing a plurality of vehicle images, vehicle numbers, license plate numbers, and vehicle type information.
Further, in step 2, the access control blockchain system includes a plurality of access controls and servers as blockchain nodes.
Further, in step 5, if there are a plurality of timestamps in which the difference between the timestamps corresponding to the matching success instructions is smaller than the set time interval, only the matching success instructions corresponding to the timestamp with the earliest time among the timestamps are counted in the number of matching success instructions.
The invention has the beneficial effects that: the invention provides a block chain-based access control permission distribution authorization method, which can be used for positioning unauthorized visitors, has a wide application range, improves the potential safety hazard of community access control, improves the access safety of face recognition access control, and reduces the risk of illegal invasion.
Drawings
The above and other features of the present invention will become more apparent by describing in detail embodiments thereof with reference to the attached drawings in which like reference numerals designate the same or similar elements, it being apparent that the drawings in the following description are merely exemplary of the present invention and other drawings can be obtained by those skilled in the art without inventive effort, wherein:
fig. 1 is a flowchart illustrating a block chain-based method for assigning and authorizing access rights.
Detailed Description
The conception, the specific structure and the technical effects of the present invention will be clearly and completely described in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 is a flowchart illustrating a method for assigning and authorizing access permissions based on a blockchain according to the present invention, and the method for assigning and authorizing access permissions based on a blockchain according to an embodiment of the present invention is described below with reference to fig. 1.
The invention provides a block chain-based access control permission allocation authorization method, which specifically comprises the following steps:
if the visitor enters the entrance guard for the first time, namely the visitor access times are 0:
step 1, acquiring a human face image frame of a human face of a visitor accessing an access control for the first time;
step 2, whether the face image frame is matched with a face image in a database of a server or not is recognized through a face recognition algorithm, after the matching is successful, an entrance guard is opened, an entrance guard which is finally entered by a visitor with the successful matching is tracked, the finally entered entrance guard is a target node in an entrance guard block chain system, a matching success command is generated in the target node, when the matching success command exists in the target node, workload certification data is generated through a workload certification algorithm, the matching success command of the visitor and a timestamp corresponding to the matching are stored in the server, and each visitor corresponds to one workload certification data;
step 3, increasing the visitor access times of the visitor by 1, synchronizing the workload certification data and the visitor access times into each node and a server of the access control block chain system, and removing the matching success command from the target node; wherein, the visitor access times corresponding to each visitor are natural numbers with an initial value of 0;
if the visitor does not enter the entrance guard for the first time, namely the visitor access frequency is more than 0:
step 4, starting face recognition when a visitor enters the entrance guard, and after the face recognition is successful, if the visitor does not have workload certification in the server, denying access and not opening the entrance guard; and if the identification is successful: identifying whether the face image frame is matched with the face image in the database of the server through a face identification algorithm, and after the matching is successful, identifying whether the face image frame is matched with the face image in the database of the server
Step 5, if the workload certification exists, comparing the workload certification with each node of the forbidden zone block chain system, and counting the number of successful matching instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes;
step 6, judging whether visitor access times in each node of the access control block chain system are consistent, if the visitor access times are not consistent, refusing access, not opening the access control, if the visitor access times are consistent, judging whether the number of successfully matched instructions is equal to the visitor access times, if so, generating a successfully matched instruction, increasing the visitor access times by 1, synchronizing workload certification data and the visitor access times into each node and a server of the access control block chain system, allowing visitors to access and opening the access control;
step 7, tracking the allowed visitor to the entrance guard which finally enters, wherein the entrance guard which finally enters is a target node in an entrance guard block chain system, a matching success instruction is generated in the target node, when the matching success instruction exists in the target node, workload certification data is generated through a workload certification algorithm, after the face recognition succeeds, if the workload certification data is updated through the workload certification algorithm when the matching success instruction exists, the matching success instruction of the visitor and a timestamp corresponding to the matching are stored in a server, the hash value in the workload certification data is increased, and the visitor access frequency is increased by 1;
and 8, increasing the visitor access times corresponding to the visitors by 1, synchronizing the workload certification data and the visitor access times to each node and a server of the access control block chain system, and removing the matching success command from the target node.
Further, in step 1, the entrance guard is a face recognition gate communicating with the server, and the face recognition gate at least includes: the device comprises a shell, a camera, a liquid crystal screen or an IC card reader, wherein the camera is used for collecting human face image frames; the liquid crystal display is used for displaying the face image information of the visitor.
Further, in step 2, the server is any one of a tower server, a rack server or a blade server, and is powered by a 220V household ac power supply.
Further, the server includes a database storing a plurality of vehicle images, vehicle numbers, license plate numbers, and vehicle type information.
Further, in step 2, the access control blockchain system includes a plurality of access controls and servers as blockchain nodes.
Further, in step 5, if there are a plurality of timestamps in which the difference between the timestamps corresponding to the matching success instructions is smaller than the set time interval, only the matching success instructions corresponding to the timestamp with the earliest time among the timestamps are counted in the number of matching success instructions.
While the present invention has been described in considerable detail and with particular reference to a few illustrative embodiments thereof, it is not intended to be limited to any such details or embodiments or any particular embodiments, but it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalent modifications thereto.

Claims (6)

1. The block chain-based access control permission distribution authorization method is characterized by comprising the following steps of:
if the visitor enters the entrance guard for the first time, namely the visitor access times are 0:
step 1, acquiring a human face image frame of a human face of a visitor accessing an access control for the first time;
step 2, whether the face image frame is matched with a face image in a database of a server or not is recognized through a face recognition algorithm, after the matching is successful, an entrance guard is opened, an entrance guard which is finally entered by a visitor with the successful matching is tracked, the finally entered entrance guard is a target node in an entrance guard block chain system, a matching success command is generated in the target node, when the matching success command exists in the target node, workload certification data is generated through a workload certification algorithm, the matching success command of the visitor and a timestamp corresponding to the matching are stored in the server, and each visitor corresponds to one workload certification data;
step 3, increasing the visitor access times of the visitor by 1, synchronizing the workload certification data and the visitor access times into each node and a server of the access control block chain system, and removing the matching success command from the target node; wherein, the visitor access times corresponding to each visitor are natural numbers with an initial value of 0;
if the visitor does not enter the entrance guard for the first time, namely the visitor access frequency is more than 0:
step 4, starting face recognition when a visitor enters the entrance guard, and after the face recognition is successful, if the visitor does not have workload certification in the server, denying access and not opening the entrance guard;
step 5, if the workload certification exists, comparing the workload certification with each node of the forbidden zone block chain system, and counting the number of successful matching instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes;
step 6, judging whether visitor access times in each node of the access control block chain system are consistent, if the visitor access times are not consistent, refusing access, not opening the access control, if the visitor access times are consistent, judging whether the number of successfully matched instructions is equal to the visitor access times, if so, generating a successfully matched instruction, increasing the visitor access times by 1, synchronizing workload certification data and the visitor access times into each node and a server of the access control block chain system, allowing visitors to access and opening the access control;
step 7, tracking the allowed visitor to the entrance guard which finally enters, wherein the entrance guard which finally enters is a target node in an entrance guard block chain system, a matching success instruction is generated in the target node, when the matching success instruction exists in the target node, workload certification data is generated through a workload certification algorithm, after the face recognition succeeds, if the workload certification data is updated through the workload certification algorithm when the matching success instruction exists, the matching success instruction of the visitor and a timestamp corresponding to the matching are stored in a server, the hash value in the workload certification data is increased, and the visitor access frequency is increased by 1;
and 8, increasing the visitor access times corresponding to the visitors by 1, synchronizing the workload certification data and the visitor access times to each node and a server of the access control block chain system, and removing the matching success command from the target node.
2. The block chain-based access control permission assignment authorization method according to claim 1, wherein in step 1, the access control is a face recognition gate communicating with a server, the face recognition gate at least comprising: the device comprises a shell, a camera, a liquid crystal screen or an IC card reader, wherein the camera is used for collecting human face image frames; the liquid crystal display is used for displaying the face image information of the visitor.
3. The block chain-based access control authority distribution authorization method according to claim 1, wherein in step 2, the server is any one of a tower server, a rack server or a blade server, and is powered by a 220V household ac power supply.
4. The block chain based access control permission assignment authorization method according to claim 3, wherein the server comprises a database storing a plurality of vehicle images, vehicle numbers, license plate numbers and vehicle type information.
5. The method of claim 1, wherein in step 2, the access control blockchain system comprises a plurality of access controls and servers as blockchain nodes.
6. The method according to claim 1, wherein in step 5, if there are a plurality of timestamps in which the difference between the timestamps corresponding to the successfully matched instructions is smaller than the set time interval, only the successfully matched instruction corresponding to the timestamp with the earliest time among the timestamps is counted in the number of successfully matched instructions.
CN202011624308.5A 2020-12-30 2020-12-30 Access control permission distribution authorization method based on block chain Active CN112785766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011624308.5A CN112785766B (en) 2020-12-30 2020-12-30 Access control permission distribution authorization method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011624308.5A CN112785766B (en) 2020-12-30 2020-12-30 Access control permission distribution authorization method based on block chain

Publications (2)

Publication Number Publication Date
CN112785766A true CN112785766A (en) 2021-05-11
CN112785766B CN112785766B (en) 2022-07-19

Family

ID=75754477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011624308.5A Active CN112785766B (en) 2020-12-30 2020-12-30 Access control permission distribution authorization method based on block chain

Country Status (1)

Country Link
CN (1) CN112785766B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115238257A (en) * 2022-09-26 2022-10-25 深圳市亲邻科技有限公司 Access control face permission updating method and device, computer equipment and storage medium
CN115810232A (en) * 2022-11-23 2023-03-17 睿云联(厦门)网络通讯技术有限公司 Passage control method based on offline two-dimensional code and face characteristic value

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN109584411A (en) * 2018-10-18 2019-04-05 南京中诚区块链研究院有限公司 Intelligent entrance guard management method based on block chain technology
CN110349311A (en) * 2019-07-08 2019-10-18 江苏橙贝科技有限公司 A kind of fingerprint lock control system and method based on block chain technology
CN110473094A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Data grant method and device based on block chain
CN110491008A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based managing caller side and system, storage medium
CN110675537A (en) * 2019-10-31 2020-01-10 深圳市智莱科技股份有限公司 Method and system for access control management of restricted area
CN110717605A (en) * 2019-10-10 2020-01-21 腾讯科技(深圳)有限公司 Access information processing method and device based on block chain
US20200202650A1 (en) * 2018-10-25 2020-06-25 Myomega Systems Gmbh Managing visitor access

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN109584411A (en) * 2018-10-18 2019-04-05 南京中诚区块链研究院有限公司 Intelligent entrance guard management method based on block chain technology
US20200202650A1 (en) * 2018-10-25 2020-06-25 Myomega Systems Gmbh Managing visitor access
CN110349311A (en) * 2019-07-08 2019-10-18 江苏橙贝科技有限公司 A kind of fingerprint lock control system and method based on block chain technology
CN110473094A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Data grant method and device based on block chain
CN110491008A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based managing caller side and system, storage medium
CN110717605A (en) * 2019-10-10 2020-01-21 腾讯科技(深圳)有限公司 Access information processing method and device based on block chain
CN110675537A (en) * 2019-10-31 2020-01-10 深圳市智莱科技股份有限公司 Method and system for access control management of restricted area

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周微: "面向物联网的安全认证方法研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115238257A (en) * 2022-09-26 2022-10-25 深圳市亲邻科技有限公司 Access control face permission updating method and device, computer equipment and storage medium
CN115238257B (en) * 2022-09-26 2023-01-06 深圳市亲邻科技有限公司 Access control face permission updating method and device, computer equipment and storage medium
CN115810232A (en) * 2022-11-23 2023-03-17 睿云联(厦门)网络通讯技术有限公司 Passage control method based on offline two-dimensional code and face characteristic value

Also Published As

Publication number Publication date
CN112785766B (en) 2022-07-19

Similar Documents

Publication Publication Date Title
CN106506442B (en) A kind of smart home multi-user identification and its Rights Management System
CN112785766B (en) Access control permission distribution authorization method based on block chain
CN110491004A (en) A kind of residential communities personnel security management system and method
CN105261105B (en) Safety door inhibition method
US8443437B2 (en) Method and apparatus for enforcing logical access security policies using physical access control systems
KR101828497B1 (en) Access authentication system and method
US20130046800A1 (en) Systems for Distributed Secure Storage of Personal Data, In Particular Biometric Impressions, and System, Local Device, and Method for Monitoring Identity
CN110188603B (en) Privacy anti-leakage method and system for smart community
CN103593594A (en) System and method for providing secure access to an electronic device using facial biometric identification and screen gesture
CN103733633A (en) Video analytics system
CN106296936A (en) Community management system based on cloud platform
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN110942580A (en) Intelligent building visitor management method and system and storage medium
CN113160472A (en) Intelligent management method, device, system, equipment and medium for community access control
CN110689694B (en) Intelligent monitoring system and method based on image processing
CN111292454A (en) Intelligent identity access control identification system and method
CN109285260A (en) A kind of gate control method and device
CN113838228A (en) Command issuing method and device applied to access control management system and storage medium
CN110120114B (en) Human body identification method and system based on access control system and storage medium
CN112669501B (en) Access control method, device and computer readable storage medium
KR102069567B1 (en) Structured Cabling System Using Biometric Authentication
US20090033461A1 (en) Biometric Access Control Protection
CN210136515U (en) Power distribution room behavior safety management and control system
CN116071860B (en) Access control data management method and system
CN113850945B (en) Access control method and multi-access-control-host anti-submergence system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant