CN112785766A - Access control permission distribution authorization method based on block chain - Google Patents
Access control permission distribution authorization method based on block chain Download PDFInfo
- Publication number
- CN112785766A CN112785766A CN202011624308.5A CN202011624308A CN112785766A CN 112785766 A CN112785766 A CN 112785766A CN 202011624308 A CN202011624308 A CN 202011624308A CN 112785766 A CN112785766 A CN 112785766A
- Authority
- CN
- China
- Prior art keywords
- visitor
- access
- server
- block chain
- workload certification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The invention discloses an access control authority distribution authorization method based on a block chain, wherein if a visitor enters an access control for the first time, namely the visiting frequency of the visitor is 0, a face image of the face of the visitor is obtained; identifying whether the face image frame is matched with a face image in a database of a server or not through a face identification algorithm, generating workload certification data through a workload certification algorithm when matching is successful, comparing the workload certification with each node of an access block chain system, counting the number of matching success instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes, judging whether the visitor access times in each node of the access block chain system are consistent or not, and refusing access if the visitor access times are not consistent; unauthorized visitors can be positioned, the application range is wide, the potential safety hazard of the community entrance guard is improved, the access safety of the face recognition entrance guard is improved, and the risk of illegal invasion is reduced; the invention is applied to the technical field of access control block chain systems.
Description
Technical Field
The invention belongs to the technical field of network data communication and block chain, and particularly relates to an access control authority distribution authorization method based on a block chain.
Background
With the rapid development of smart homes, the current access control authority method is only to verify the access control authority by means of passwords, face recognition and the like when a card is swiped, so that the access control safety of a residential area is ensured. However, especially in the cell where the card is swiped, if the access control card is lost and is picked up by a person, stolen, or the card is copied, the person who has stolen the card, copied the card, or the person who picks up the card can easily break into the cell by using the illegally obtained access control card, so that the potential safety hazard is generated, and after the person follows the access control card and a hacker breaks into the server, a series of safety problems such as access authorization and the like are easily caused by face recognition, and illegal face data is uploaded to a database of the server.
Disclosure of Invention
The present invention is directed to a method for assigning and authorizing access rights based on a block chain, so as to solve one or more technical problems in the prior art and provide at least one useful choice or creation condition.
In order to achieve the above object, according to an aspect of the present invention, there is provided a block chain-based access right allocation authorization method, including:
if the visitor enters the entrance guard for the first time, namely the visitor access times are 0: (when the preset initial value of the visitor access frequency corresponding to the visitor is 0 after the face recognition is successful)
Step 1, acquiring a human face image frame of a human face of a visitor accessing an access control for the first time;
step 2, whether the face image frame is matched with a face image in a database of a server or not is recognized through a face recognition algorithm, after the matching is successful, an entrance guard is opened, an entrance guard which is finally entered by a visitor with the successful matching is tracked, the finally entered entrance guard is a target node in an entrance guard block chain system, a matching success command is generated in the target node, when the matching success command exists in the target node, workload certification data is generated through a workload certification algorithm, the matching success command of the visitor and a timestamp corresponding to the matching are stored in the server, and each visitor corresponds to one workload certification data;
step 3, increasing the visitor access times of the visitor by 1, synchronizing the workload certification data and the visitor access times into each node and a server of the access control block chain system, and removing the matching success command from the target node; wherein, the visitor access times corresponding to each visitor are natural numbers with an initial value of 0;
if the visitor does not enter the entrance guard for the first time, namely the visitor access frequency is more than 0: (when the visitor access frequency corresponding to the visitor is more than 0 after the face recognition is successful)
Step 4, starting face recognition when a visitor enters the entrance guard, and after the face recognition is successful, if the visitor does not have workload certification in the server, denying access and not opening the entrance guard; and if the identification is successful: identifying whether the face image frame is matched with the face image in the database of the server through a face identification algorithm, and after the matching is successful, identifying whether the face image frame is matched with the face image in the database of the server
Step 5, if the workload certification exists, comparing the workload certification with each node of the forbidden zone block chain system, and counting the number of successful matching instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes;
step 6, judging whether visitor access times in each node of the access control block chain system are consistent, if the visitor access times are not consistent, refusing access, not opening the access control, if the visitor access times are consistent, judging whether the number of successfully matched instructions is equal to the visitor access times, if so, generating a successfully matched instruction, increasing the visitor access times by 1, synchronizing workload certification data and the visitor access times into each node and a server of the access control block chain system, allowing visitors to access and opening the access control;
step 7, tracking the allowed visitor to the entrance guard which finally enters, wherein the entrance guard which finally enters is a target node in an entrance guard block chain system, a matching success instruction is generated in the target node, when the matching success instruction exists in the target node, workload certification data is generated through a workload certification algorithm, after the face recognition succeeds, if the workload certification data is updated through the workload certification algorithm when the matching success instruction exists, the matching success instruction of the visitor and a timestamp corresponding to the matching are stored in a server, the hash value in the workload certification data is increased, and the visitor access frequency is increased by 1;
and 8, increasing the visitor access times corresponding to the visitors by 1, synchronizing the workload certification data and the visitor access times to each node and a server of the access control block chain system, and removing the matching success command from the target node.
Further, in step 1, the entrance guard is a face recognition gate communicating with the server, and the face recognition gate at least includes: the device comprises a shell, a camera, a liquid crystal screen or an IC card reader, wherein the camera is used for collecting human face image frames; the liquid crystal display is used for displaying the face image information of the visitor.
Further, in step 2, the server is any one of a tower server, a rack server or a blade server, and is powered by a 220V household ac power supply.
Further, the server includes a database storing a plurality of vehicle images, vehicle numbers, license plate numbers, and vehicle type information.
Further, in step 2, the access control blockchain system includes a plurality of access controls and servers as blockchain nodes.
Further, in step 5, if there are a plurality of timestamps in which the difference between the timestamps corresponding to the matching success instructions is smaller than the set time interval, only the matching success instructions corresponding to the timestamp with the earliest time among the timestamps are counted in the number of matching success instructions.
The invention has the beneficial effects that: the invention provides a block chain-based access control permission distribution authorization method, which can be used for positioning unauthorized visitors, has a wide application range, improves the potential safety hazard of community access control, improves the access safety of face recognition access control, and reduces the risk of illegal invasion.
Drawings
The above and other features of the present invention will become more apparent by describing in detail embodiments thereof with reference to the attached drawings in which like reference numerals designate the same or similar elements, it being apparent that the drawings in the following description are merely exemplary of the present invention and other drawings can be obtained by those skilled in the art without inventive effort, wherein:
fig. 1 is a flowchart illustrating a block chain-based method for assigning and authorizing access rights.
Detailed Description
The conception, the specific structure and the technical effects of the present invention will be clearly and completely described in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 is a flowchart illustrating a method for assigning and authorizing access permissions based on a blockchain according to the present invention, and the method for assigning and authorizing access permissions based on a blockchain according to an embodiment of the present invention is described below with reference to fig. 1.
The invention provides a block chain-based access control permission allocation authorization method, which specifically comprises the following steps:
if the visitor enters the entrance guard for the first time, namely the visitor access times are 0:
step 1, acquiring a human face image frame of a human face of a visitor accessing an access control for the first time;
step 2, whether the face image frame is matched with a face image in a database of a server or not is recognized through a face recognition algorithm, after the matching is successful, an entrance guard is opened, an entrance guard which is finally entered by a visitor with the successful matching is tracked, the finally entered entrance guard is a target node in an entrance guard block chain system, a matching success command is generated in the target node, when the matching success command exists in the target node, workload certification data is generated through a workload certification algorithm, the matching success command of the visitor and a timestamp corresponding to the matching are stored in the server, and each visitor corresponds to one workload certification data;
step 3, increasing the visitor access times of the visitor by 1, synchronizing the workload certification data and the visitor access times into each node and a server of the access control block chain system, and removing the matching success command from the target node; wherein, the visitor access times corresponding to each visitor are natural numbers with an initial value of 0;
if the visitor does not enter the entrance guard for the first time, namely the visitor access frequency is more than 0:
step 4, starting face recognition when a visitor enters the entrance guard, and after the face recognition is successful, if the visitor does not have workload certification in the server, denying access and not opening the entrance guard; and if the identification is successful: identifying whether the face image frame is matched with the face image in the database of the server through a face identification algorithm, and after the matching is successful, identifying whether the face image frame is matched with the face image in the database of the server
Step 5, if the workload certification exists, comparing the workload certification with each node of the forbidden zone block chain system, and counting the number of successful matching instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes;
step 6, judging whether visitor access times in each node of the access control block chain system are consistent, if the visitor access times are not consistent, refusing access, not opening the access control, if the visitor access times are consistent, judging whether the number of successfully matched instructions is equal to the visitor access times, if so, generating a successfully matched instruction, increasing the visitor access times by 1, synchronizing workload certification data and the visitor access times into each node and a server of the access control block chain system, allowing visitors to access and opening the access control;
step 7, tracking the allowed visitor to the entrance guard which finally enters, wherein the entrance guard which finally enters is a target node in an entrance guard block chain system, a matching success instruction is generated in the target node, when the matching success instruction exists in the target node, workload certification data is generated through a workload certification algorithm, after the face recognition succeeds, if the workload certification data is updated through the workload certification algorithm when the matching success instruction exists, the matching success instruction of the visitor and a timestamp corresponding to the matching are stored in a server, the hash value in the workload certification data is increased, and the visitor access frequency is increased by 1;
and 8, increasing the visitor access times corresponding to the visitors by 1, synchronizing the workload certification data and the visitor access times to each node and a server of the access control block chain system, and removing the matching success command from the target node.
Further, in step 1, the entrance guard is a face recognition gate communicating with the server, and the face recognition gate at least includes: the device comprises a shell, a camera, a liquid crystal screen or an IC card reader, wherein the camera is used for collecting human face image frames; the liquid crystal display is used for displaying the face image information of the visitor.
Further, in step 2, the server is any one of a tower server, a rack server or a blade server, and is powered by a 220V household ac power supply.
Further, the server includes a database storing a plurality of vehicle images, vehicle numbers, license plate numbers, and vehicle type information.
Further, in step 2, the access control blockchain system includes a plurality of access controls and servers as blockchain nodes.
Further, in step 5, if there are a plurality of timestamps in which the difference between the timestamps corresponding to the matching success instructions is smaller than the set time interval, only the matching success instructions corresponding to the timestamp with the earliest time among the timestamps are counted in the number of matching success instructions.
While the present invention has been described in considerable detail and with particular reference to a few illustrative embodiments thereof, it is not intended to be limited to any such details or embodiments or any particular embodiments, but it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalent modifications thereto.
Claims (6)
1. The block chain-based access control permission distribution authorization method is characterized by comprising the following steps of:
if the visitor enters the entrance guard for the first time, namely the visitor access times are 0:
step 1, acquiring a human face image frame of a human face of a visitor accessing an access control for the first time;
step 2, whether the face image frame is matched with a face image in a database of a server or not is recognized through a face recognition algorithm, after the matching is successful, an entrance guard is opened, an entrance guard which is finally entered by a visitor with the successful matching is tracked, the finally entered entrance guard is a target node in an entrance guard block chain system, a matching success command is generated in the target node, when the matching success command exists in the target node, workload certification data is generated through a workload certification algorithm, the matching success command of the visitor and a timestamp corresponding to the matching are stored in the server, and each visitor corresponds to one workload certification data;
step 3, increasing the visitor access times of the visitor by 1, synchronizing the workload certification data and the visitor access times into each node and a server of the access control block chain system, and removing the matching success command from the target node; wherein, the visitor access times corresponding to each visitor are natural numbers with an initial value of 0;
if the visitor does not enter the entrance guard for the first time, namely the visitor access frequency is more than 0:
step 4, starting face recognition when a visitor enters the entrance guard, and after the face recognition is successful, if the visitor does not have workload certification in the server, denying access and not opening the entrance guard;
step 5, if the workload certification exists, comparing the workload certification with each node of the forbidden zone block chain system, and counting the number of successful matching instructions in the server if the workload certification is consistent with the workload certification of the visitor corresponding to all the nodes;
step 6, judging whether visitor access times in each node of the access control block chain system are consistent, if the visitor access times are not consistent, refusing access, not opening the access control, if the visitor access times are consistent, judging whether the number of successfully matched instructions is equal to the visitor access times, if so, generating a successfully matched instruction, increasing the visitor access times by 1, synchronizing workload certification data and the visitor access times into each node and a server of the access control block chain system, allowing visitors to access and opening the access control;
step 7, tracking the allowed visitor to the entrance guard which finally enters, wherein the entrance guard which finally enters is a target node in an entrance guard block chain system, a matching success instruction is generated in the target node, when the matching success instruction exists in the target node, workload certification data is generated through a workload certification algorithm, after the face recognition succeeds, if the workload certification data is updated through the workload certification algorithm when the matching success instruction exists, the matching success instruction of the visitor and a timestamp corresponding to the matching are stored in a server, the hash value in the workload certification data is increased, and the visitor access frequency is increased by 1;
and 8, increasing the visitor access times corresponding to the visitors by 1, synchronizing the workload certification data and the visitor access times to each node and a server of the access control block chain system, and removing the matching success command from the target node.
2. The block chain-based access control permission assignment authorization method according to claim 1, wherein in step 1, the access control is a face recognition gate communicating with a server, the face recognition gate at least comprising: the device comprises a shell, a camera, a liquid crystal screen or an IC card reader, wherein the camera is used for collecting human face image frames; the liquid crystal display is used for displaying the face image information of the visitor.
3. The block chain-based access control authority distribution authorization method according to claim 1, wherein in step 2, the server is any one of a tower server, a rack server or a blade server, and is powered by a 220V household ac power supply.
4. The block chain based access control permission assignment authorization method according to claim 3, wherein the server comprises a database storing a plurality of vehicle images, vehicle numbers, license plate numbers and vehicle type information.
5. The method of claim 1, wherein in step 2, the access control blockchain system comprises a plurality of access controls and servers as blockchain nodes.
6. The method according to claim 1, wherein in step 5, if there are a plurality of timestamps in which the difference between the timestamps corresponding to the successfully matched instructions is smaller than the set time interval, only the successfully matched instruction corresponding to the timestamp with the earliest time among the timestamps is counted in the number of successfully matched instructions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011624308.5A CN112785766B (en) | 2020-12-30 | 2020-12-30 | Access control permission distribution authorization method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011624308.5A CN112785766B (en) | 2020-12-30 | 2020-12-30 | Access control permission distribution authorization method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112785766A true CN112785766A (en) | 2021-05-11 |
CN112785766B CN112785766B (en) | 2022-07-19 |
Family
ID=75754477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011624308.5A Active CN112785766B (en) | 2020-12-30 | 2020-12-30 | Access control permission distribution authorization method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112785766B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115238257A (en) * | 2022-09-26 | 2022-10-25 | 深圳市亲邻科技有限公司 | Access control face permission updating method and device, computer equipment and storage medium |
CN115810232A (en) * | 2022-11-23 | 2023-03-17 | 睿云联(厦门)网络通讯技术有限公司 | Passage control method based on offline two-dimensional code and face characteristic value |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108521418A (en) * | 2018-04-04 | 2018-09-11 | 广州广电运通金融电子股份有限公司 | A kind of identity identifying method and system merging block chain and living things feature recognition |
CN109584411A (en) * | 2018-10-18 | 2019-04-05 | 南京中诚区块链研究院有限公司 | Intelligent entrance guard management method based on block chain technology |
CN110349311A (en) * | 2019-07-08 | 2019-10-18 | 江苏橙贝科技有限公司 | A kind of fingerprint lock control system and method based on block chain technology |
CN110473094A (en) * | 2019-07-31 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Data grant method and device based on block chain |
CN110491008A (en) * | 2019-08-29 | 2019-11-22 | 恒大智慧科技有限公司 | A kind of community-based managing caller side and system, storage medium |
CN110675537A (en) * | 2019-10-31 | 2020-01-10 | 深圳市智莱科技股份有限公司 | Method and system for access control management of restricted area |
CN110717605A (en) * | 2019-10-10 | 2020-01-21 | 腾讯科技(深圳)有限公司 | Access information processing method and device based on block chain |
US20200202650A1 (en) * | 2018-10-25 | 2020-06-25 | Myomega Systems Gmbh | Managing visitor access |
-
2020
- 2020-12-30 CN CN202011624308.5A patent/CN112785766B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108521418A (en) * | 2018-04-04 | 2018-09-11 | 广州广电运通金融电子股份有限公司 | A kind of identity identifying method and system merging block chain and living things feature recognition |
CN109584411A (en) * | 2018-10-18 | 2019-04-05 | 南京中诚区块链研究院有限公司 | Intelligent entrance guard management method based on block chain technology |
US20200202650A1 (en) * | 2018-10-25 | 2020-06-25 | Myomega Systems Gmbh | Managing visitor access |
CN110349311A (en) * | 2019-07-08 | 2019-10-18 | 江苏橙贝科技有限公司 | A kind of fingerprint lock control system and method based on block chain technology |
CN110473094A (en) * | 2019-07-31 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Data grant method and device based on block chain |
CN110491008A (en) * | 2019-08-29 | 2019-11-22 | 恒大智慧科技有限公司 | A kind of community-based managing caller side and system, storage medium |
CN110717605A (en) * | 2019-10-10 | 2020-01-21 | 腾讯科技(深圳)有限公司 | Access information processing method and device based on block chain |
CN110675537A (en) * | 2019-10-31 | 2020-01-10 | 深圳市智莱科技股份有限公司 | Method and system for access control management of restricted area |
Non-Patent Citations (1)
Title |
---|
周微: "面向物联网的安全认证方法研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115238257A (en) * | 2022-09-26 | 2022-10-25 | 深圳市亲邻科技有限公司 | Access control face permission updating method and device, computer equipment and storage medium |
CN115238257B (en) * | 2022-09-26 | 2023-01-06 | 深圳市亲邻科技有限公司 | Access control face permission updating method and device, computer equipment and storage medium |
CN115810232A (en) * | 2022-11-23 | 2023-03-17 | 睿云联(厦门)网络通讯技术有限公司 | Passage control method based on offline two-dimensional code and face characteristic value |
Also Published As
Publication number | Publication date |
---|---|
CN112785766B (en) | 2022-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106506442B (en) | A kind of smart home multi-user identification and its Rights Management System | |
CN112785766B (en) | Access control permission distribution authorization method based on block chain | |
CN110491004A (en) | A kind of residential communities personnel security management system and method | |
CN105261105B (en) | Safety door inhibition method | |
US8443437B2 (en) | Method and apparatus for enforcing logical access security policies using physical access control systems | |
KR101828497B1 (en) | Access authentication system and method | |
US20130046800A1 (en) | Systems for Distributed Secure Storage of Personal Data, In Particular Biometric Impressions, and System, Local Device, and Method for Monitoring Identity | |
CN110188603B (en) | Privacy anti-leakage method and system for smart community | |
CN103593594A (en) | System and method for providing secure access to an electronic device using facial biometric identification and screen gesture | |
CN103733633A (en) | Video analytics system | |
CN106296936A (en) | Community management system based on cloud platform | |
US20200098208A1 (en) | Security control device, security control method, security system and storage medium | |
CN110942580A (en) | Intelligent building visitor management method and system and storage medium | |
CN113160472A (en) | Intelligent management method, device, system, equipment and medium for community access control | |
CN110689694B (en) | Intelligent monitoring system and method based on image processing | |
CN111292454A (en) | Intelligent identity access control identification system and method | |
CN109285260A (en) | A kind of gate control method and device | |
CN113838228A (en) | Command issuing method and device applied to access control management system and storage medium | |
CN110120114B (en) | Human body identification method and system based on access control system and storage medium | |
CN112669501B (en) | Access control method, device and computer readable storage medium | |
KR102069567B1 (en) | Structured Cabling System Using Biometric Authentication | |
US20090033461A1 (en) | Biometric Access Control Protection | |
CN210136515U (en) | Power distribution room behavior safety management and control system | |
CN116071860B (en) | Access control data management method and system | |
CN113850945B (en) | Access control method and multi-access-control-host anti-submergence system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |