CN114038105A - Identity information security monitoring method and device - Google Patents

Identity information security monitoring method and device Download PDF

Info

Publication number
CN114038105A
CN114038105A CN202111337236.0A CN202111337236A CN114038105A CN 114038105 A CN114038105 A CN 114038105A CN 202111337236 A CN202111337236 A CN 202111337236A CN 114038105 A CN114038105 A CN 114038105A
Authority
CN
China
Prior art keywords
card
identity information
information
face library
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111337236.0A
Other languages
Chinese (zh)
Inventor
吴建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haoyun Technologies Co Ltd
Original Assignee
Haoyun Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haoyun Technologies Co Ltd filed Critical Haoyun Technologies Co Ltd
Priority to CN202111337236.0A priority Critical patent/CN114038105A/en
Publication of CN114038105A publication Critical patent/CN114038105A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a method and a device for monitoring identity information safety, wherein the method comprises the following steps: acquiring face information of people in different areas according to face recognition equipment, and constructing an area face library; traversing the regional face library according to identity information in a preset IC card, and correspondingly binding the identity information in the IC card with the regional face library; triggering a card swiping event and calling the regional face library, acquiring the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, judging to falsely use the IC card and triggering an alarm. The invention ensures the safety monitoring of the IC card by matching the face recognition information with the IC card information for secondary verification.

Description

Identity information security monitoring method and device
Technical Field
The invention relates to the technical field of information theft prevention, in particular to a method and a device for monitoring identity information safety.
Background
At present, an IC card is bound to each user in an access control system, access control equipment opens a door by identifying IC card number authorization information, whether information on the IC card accords with door opening permission or not is identified, whether a card holder corresponds to authority personnel of card information or not cannot be identified, people using the card are prone to being mixed with fish eyes, and potential safety hazards are caused.
Disclosure of Invention
The invention aims to provide an identity information security monitoring method and device to solve the problem of low card holder identity information monitoring efficiency in the prior art.
In order to achieve the above object, the present invention provides a method for monitoring identity information security, comprising:
acquiring face information of people in different areas according to face recognition equipment, and constructing an area face library;
traversing the regional face library according to identity information in a preset IC card, and correspondingly binding the identity information in the IC card with the regional face library;
triggering a card swiping event and calling the regional face library, acquiring the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, judging to falsely use the IC card and triggering an alarm.
Preferably, traversing the regional face library according to the identity information in a preset IC card, and correspondingly binding the identity information in the IC card with the regional face library includes:
positioning a card swiping area according to the identity information in the IC card, traversing the face library of the area according to the card swiping area, selecting and binding the face library of the area with the identity information in the IC card, and setting the authority verification of the IC card in the area.
Preferably, the triggering a card swiping event and calling the regional face library to obtain the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, determining to falsely use the IC card and triggering an alarm, includes:
and positioning the equipment generating the card swiping event to the area, calling the area face library in the area, carrying out face identification on the personnel triggering the card swiping event, matching with the IC card authority verification, and judging to use the IC card and trigger alarm if the personnel triggering the card swiping event are not matched with the IC card authority verification.
Preferably, after triggering a card swiping event and calling the regional face library, acquiring identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, determining to falsely use the IC card and trigger an alarm, the method further includes:
the face information of the falsely used IC card is obtained according to the snapshot equipment, and the face information of the falsely used IC card is uploaded to the client, so that a worker can obtain the identity information of the falsely used IC card and can perform track positioning by calling the video information of the person falsely used IC card.
The invention also provides an identity information security monitoring device, which comprises:
the acquisition module is used for acquiring the face information of people in different areas according to the face recognition equipment and constructing an area face library;
the identification module is used for traversing the regional face library according to identity information in a preset IC card and correspondingly binding the identity information in the IC card with the regional face library;
and the matching module is used for triggering a card swiping event and calling the regional face library to acquire the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, the IC card is judged to be falsely used and an alarm is triggered.
Preferably, the identification module is further configured to:
positioning a card swiping area according to the identity information in the IC card, traversing the face library of the area according to the card swiping area, selecting and binding the face library of the area with the identity information in the IC card, and setting the authority verification of the IC card in the area.
Preferably, the matching module is further configured to:
and positioning the equipment generating the card swiping event to the area, calling the area face library in the area, carrying out face identification on the personnel triggering the card swiping event, matching with the IC card authority verification, and judging to use the IC card and trigger alarm if the personnel triggering the card swiping event are not matched with the IC card authority verification.
Preferably, the positioning module is further included for:
the face information of the falsely used IC card is obtained according to the snapshot equipment, and the face information of the falsely used IC card is uploaded to the client, so that a worker can obtain the identity information of the falsely used IC card and can perform track positioning by calling the video information of the person falsely used IC card. The present invention also provides a terminal device, including:
one or more processors;
a memory coupled to the processor for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the identity information security monitoring method as described in any one of the above.
The present invention also provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the identity information security monitoring method as described in any one of the above.
Compared with the prior art, the invention has the beneficial effects that:
compared with the prior art, the method and the system can ensure the consistency of the card reader and the card holder, can give an alarm immediately after the fraudulent use behavior occurs, and ensure the safety monitoring of the IC card and improve the efficiency of area management by matching the face identification information with the IC card information for secondary verification.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method for monitoring identity information security according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an identity information security monitoring apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be understood that the step numbers used herein are for convenience of description only and are not intended as limitations on the order in which the steps are performed.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The terms "comprises" and "comprising" indicate the presence of the described features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The term "and/or" refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, an embodiment of the invention provides a method for monitoring identity information security. As shown in fig. 1, the identity information security monitoring method includes step S101, step S103, and the following steps:
s101: and acquiring the face information of people in different areas according to the face recognition equipment, and constructing an area face library.
S102: traversing the regional face library according to the identity information in a preset IC card, and correspondingly binding the identity information in the IC card with the regional face library.
Specifically, the face information of different areas is acquired in different areas through the face recognition device, a face library is constructed, the IC card identity information corresponding to the device is acquired by swiping a card through the device by a card holder, the face information is acquired according to the face recognition device at the moment, the face information is matched with the identity information of the IC card, and the face information in the face library of the areas is correspondingly bound, so that secondary verification is performed when the card holder swipes the card.
S103: triggering a card swiping event and calling the regional face library, acquiring the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, judging to falsely use the IC card and triggering an alarm.
Specifically, a card holder swipes a card on the device to trigger a card swiping event, the background server monitors the device event callback port, callback information of the device card swiping is obtained through monitoring, the regional face library is traversed according to the callback information, and whether the card holder triggering the card swiping event is a worker in the region is judged.
The method comprises the steps of setting a management relation among access control equipment, snapshot equipment and areas, finding the corresponding area through equipment generated by an event when a card swiping event is triggered, and snapshotting the snapshot equipment which has the regional authority and calls the local area. Positioning a card swiping area according to the identity information in the IC card, traversing the face library of the area according to the card swiping area, selecting and binding the face library of the area with the identity information in the IC card, and setting the authority verification of the IC card in the area.
The method comprises the steps of positioning the device generating the card swiping event to the area, calling the area face library of the area, carrying out face recognition on the personnel triggering the card swiping event, matching with the IC card authority verification, and judging to use the IC card and trigger alarm if the personnel triggering the card swiping event are not matched. And setting a passable relation between the IC card and the equipment, and judging that the IC card can pass when the card information generated by the card swiping event exists in the authority relation of the door, namely belongs to the area authority.
When the snapshot device is started, the snapshot device collects and uploads the face features of all people in the area to the authentication center, the authentication center compares whether people in the area exist in the face library, if so, a real-time area face library of the area is generated, and whether the card is falsely used is judged by checking whether the information of the card holder exists in the area face library.
After the fake use is judged, the face information of the fake use IC card is obtained according to the snapshot equipment, and the face information of the fake use IC card is uploaded to the client, so that a worker can obtain the identity information of the fake use IC card and perform track positioning by calling the video information of the person of the fake use IC card, and the alarm is realized.
The invention further improves the efficiency of monitoring management by binding the identity information of the IC card with the face information and using the identity information and the face information in the scope of authority area, and improves the efficiency of alarming by collecting the information of the personnel falsely using the IC card.
Referring to fig. 2, another embodiment of the present invention provides an identity information security monitoring apparatus, including:
the obtaining module 11 is configured to obtain face information of people in different areas according to the face recognition device, and construct an area face library.
And the identification module 12 is configured to traverse the regional face library according to identity information in a preset IC card, and correspondingly bind the identity information in the IC card to the regional face library.
Specifically, the obtaining module 11 is connected to the recognition module 12, obtains face information of different areas in different areas through a face recognition device, constructs a face library, and obtains the identity information of the IC card corresponding to the device by swiping the card through the device by a card holder, and obtains the face information according to the face recognition device, matches the face information with the identity information of the IC card, and binds the face information in the face library correspondingly, so as to perform secondary verification when the card holder swipes the card.
And the matching module 13 is used for triggering a card swiping event and calling the regional face library to acquire the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, determining to falsely use the IC card and triggering alarm.
Specifically, the identification module 12 is connected to the matching module 13, the cardholder triggers a card swiping event by swiping a card on the device, the background server monitors the device event callback port, monitors the callback information of the device swiping, and traverses the regional face library according to the callback information to determine whether the cardholder triggering the card swiping event is a worker in the region.
The method comprises the steps of setting a management relation among access control equipment, snapshot equipment and areas, finding the corresponding area through equipment generated by an event when a card swiping event is triggered, and snapshotting the snapshot equipment which has the regional authority and calls the local area. Positioning a card swiping area according to the identity information in the IC card, traversing the face library of the area according to the card swiping area, selecting and binding the face library of the area with the identity information in the IC card, and setting the authority verification of the IC card in the area.
The method comprises the steps of positioning the device generating the card swiping event to the area, calling the area face library of the area, carrying out face recognition on the personnel triggering the card swiping event, matching with the IC card authority verification, and judging to use the IC card and trigger alarm if the personnel triggering the card swiping event are not matched. And setting a passable relation between the IC card and the equipment, and judging that the IC card can pass when the card information generated by the card swiping event exists in the authority relation of the door, namely belongs to the area authority.
When the snapshot device is started, the snapshot device collects and uploads the face features of all people in the area to the authentication center, the authentication center compares whether people in the area exist in the face library, if so, a real-time area face library of the area is generated, and whether the card is falsely used is judged by checking whether the information of the card holder exists in the area face library.
After the fake use is judged, the face information of the fake use IC card is obtained according to the snapshot equipment, and the face information of the fake use IC card is uploaded to the client, so that a worker can obtain the identity information of the fake use IC card and perform track positioning by calling the video information of the person of the fake use IC card, and the alarm is realized.
The invention further improves the efficiency of monitoring management by binding the identity information of the IC card with the face information and using the identity information and the face information in the scope of authority area, and improves the efficiency of alarming by collecting the information of the personnel falsely using the IC card.
Referring to fig. 3, an embodiment of the present invention provides a terminal device, including:
one or more processors;
a memory coupled to the processor for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the identity information security monitoring method as described above.
The processor is used for controlling the overall operation of the terminal equipment so as to complete all or part of the steps of the identity information security monitoring method. The memory is used to store various types of data to support operation at the terminal device, and these data may include, for example, instructions for any application or method operating on the terminal device, as well as application-related data. The Memory may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk.
In an exemplary embodiment, the terminal Device may be implemented by one or more Application Specific 1 integrated circuits (AS 1C), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and is configured to perform the method for monitoring safety of identity information according to any one of the above embodiments, and achieve technical effects consistent with the above method.
In another exemplary embodiment, a computer readable storage medium is also provided, which comprises a computer program, which when executed by a processor, implements the steps of the identity information security monitoring method according to any one of the above embodiments. For example, the computer readable storage medium may be the above-mentioned memory including a computer program, and the above-mentioned computer program may be executed by a processor of a terminal device to implement the identity information security monitoring method according to any one of the above-mentioned embodiments, and achieve the technical effects consistent with the above-mentioned method.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (10)

1. An identity information security monitoring method is characterized by comprising the following steps:
acquiring face information of people in different areas according to face recognition equipment, and constructing an area face library;
traversing the regional face library according to identity information in a preset IC card, and correspondingly binding the identity information in the IC card with the regional face library;
triggering a card swiping event and calling the regional face library, acquiring the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, judging to falsely use the IC card and triggering an alarm.
2. The identity information security monitoring method according to claim 1, wherein traversing the regional face library according to identity information in a preset IC card, and correspondingly binding the identity information in the IC card with the regional face library comprises:
positioning a card swiping area according to the identity information in the IC card, traversing the face library of the area according to the card swiping area, selecting and binding the face library of the area with the identity information in the IC card, and setting the authority verification of the IC card in the area.
3. The identity information security monitoring method according to claim 2, wherein the triggering of the card swiping event and the calling of the regional face library obtain the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event does not match with the information in the regional face library, determining to falsely use the IC card and triggering an alarm, comprises:
and positioning the equipment generating the card swiping event to the area, calling the area face library in the area, carrying out face identification on the personnel triggering the card swiping event, matching with the IC card authority verification, and judging to use the IC card and trigger alarm if the personnel triggering the card swiping event are not matched with the IC card authority verification.
4. The identity information security monitoring method according to claim 3, wherein after triggering a card swiping event and calling the regional face library, acquiring identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, determining to falsely use the IC card and triggering an alarm, the method further comprises:
the face information of the falsely used IC card is obtained according to the snapshot equipment, and the face information of the falsely used IC card is uploaded to the client, so that a worker can obtain the identity information of the falsely used IC card and can perform track positioning by calling the video information of the person falsely used IC card.
5. An identity information security monitoring device, comprising:
the acquisition module is used for acquiring the face information of people in different areas according to the face recognition equipment and constructing an area face library;
the identification module is used for traversing the regional face library according to identity information in a preset IC card and correspondingly binding the identity information in the IC card with the regional face library;
and the matching module is used for triggering a card swiping event and calling the regional face library to acquire the identity information in the regional face library corresponding to the IC card in the card swiping event, and if the IC card information in the card swiping event is not matched with the information in the regional face library, the IC card is judged to be falsely used and an alarm is triggered.
6. The identity information security monitoring device of claim 5, wherein the identification module is further configured to:
positioning a card swiping area according to the identity information in the IC card, traversing the face library of the area according to the card swiping area, selecting and binding the face library of the area with the identity information in the IC card, and setting the authority verification of the IC card in the area.
7. The identity information security monitoring device of claim 6, wherein the matching module is further configured to:
and positioning the equipment generating the card swiping event to the area, calling the area face library in the area, carrying out face identification on the personnel triggering the card swiping event, matching with the IC card authority verification, and judging to use the IC card and trigger alarm if the personnel triggering the card swiping event are not matched with the IC card authority verification.
8. The identity information security monitoring device of claim 7, further comprising a location module configured to:
the face information of the falsely used IC card is obtained according to the snapshot equipment, and the face information of the falsely used IC card is uploaded to the client, so that a worker can obtain the identity information of the falsely used IC card and can perform track positioning by calling the video information of the person falsely used IC card.
9. A terminal device, comprising:
one or more processors;
a memory coupled to the processor for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the identity information security monitoring method of any one of claims 1-4.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the identity information security monitoring method according to any one of claims 1 to 4.
CN202111337236.0A 2021-11-11 2021-11-11 Identity information security monitoring method and device Pending CN114038105A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111337236.0A CN114038105A (en) 2021-11-11 2021-11-11 Identity information security monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111337236.0A CN114038105A (en) 2021-11-11 2021-11-11 Identity information security monitoring method and device

Publications (1)

Publication Number Publication Date
CN114038105A true CN114038105A (en) 2022-02-11

Family

ID=80144072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111337236.0A Pending CN114038105A (en) 2021-11-11 2021-11-11 Identity information security monitoring method and device

Country Status (1)

Country Link
CN (1) CN114038105A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1291763A (en) * 2000-05-31 2001-04-18 成都银晨网讯科技有限公司 Face image recognizing IC card and personal authentication system
CN102799821A (en) * 2012-07-11 2012-11-28 深圳市飞瑞斯科技有限公司 Method for checking intelligent card and identity of card holder, and face identification identity checking device
CN103870729A (en) * 2012-12-07 2014-06-18 大连联达科技有限公司 Teacher identity authentication method based on IC and face recognition technology
CN205375717U (en) * 2016-03-08 2016-07-06 广东履安实业有限公司 Regional intelligence of developments face identification early warning system that deploys to ensure effective monitoring and control of illegal activities
CN107665522A (en) * 2016-07-27 2018-02-06 上海泓申科技发展有限公司 One kind combination authentication means and method
CA3017324A1 (en) * 2017-09-18 2019-03-18 Legic Identsystems Ag Personal identity verification system and method for verifying the identity of an individual
CN110992553A (en) * 2019-12-05 2020-04-10 电子科技大学中山学院 Access control system with face recognition function and use method
CN110992551A (en) * 2019-10-29 2020-04-10 宁波宇东金属箱柜有限公司 Intelligent garage anti-theft method, storage medium and control device
CN111091643A (en) * 2019-12-30 2020-05-01 广州市共能资讯科技有限公司 Building access control system
CN111784889A (en) * 2020-06-24 2020-10-16 北京捷莱特技术有限公司 Access control management system
CN113065448A (en) * 2021-03-29 2021-07-02 南北联合信息科技有限公司 Face recognition method, face recognition system, computer equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1291763A (en) * 2000-05-31 2001-04-18 成都银晨网讯科技有限公司 Face image recognizing IC card and personal authentication system
CN102799821A (en) * 2012-07-11 2012-11-28 深圳市飞瑞斯科技有限公司 Method for checking intelligent card and identity of card holder, and face identification identity checking device
CN103870729A (en) * 2012-12-07 2014-06-18 大连联达科技有限公司 Teacher identity authentication method based on IC and face recognition technology
CN205375717U (en) * 2016-03-08 2016-07-06 广东履安实业有限公司 Regional intelligence of developments face identification early warning system that deploys to ensure effective monitoring and control of illegal activities
CN107665522A (en) * 2016-07-27 2018-02-06 上海泓申科技发展有限公司 One kind combination authentication means and method
CA3017324A1 (en) * 2017-09-18 2019-03-18 Legic Identsystems Ag Personal identity verification system and method for verifying the identity of an individual
CN110992551A (en) * 2019-10-29 2020-04-10 宁波宇东金属箱柜有限公司 Intelligent garage anti-theft method, storage medium and control device
CN110992553A (en) * 2019-12-05 2020-04-10 电子科技大学中山学院 Access control system with face recognition function and use method
CN111091643A (en) * 2019-12-30 2020-05-01 广州市共能资讯科技有限公司 Building access control system
CN111784889A (en) * 2020-06-24 2020-10-16 北京捷莱特技术有限公司 Access control management system
CN113065448A (en) * 2021-03-29 2021-07-02 南北联合信息科技有限公司 Face recognition method, face recognition system, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108269330B (en) Access control method, device and system
CN109767572B (en) Method and device for storing mailings, computer equipment and storage medium
CN113330491B (en) Electronic gate opening method and device and server
WO2015099607A1 (en) An integrated access control and identity management system
CN110768942B (en) Identity authentication system
CN113160472A (en) Intelligent management method, device, system, equipment and medium for community access control
KR20170013597A (en) Method and Apparatus for Strengthening of Security
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
CN110839003A (en) Method and device for identifying number stealing behavior, computer equipment and storage medium
CN111784943A (en) Rapid book borrowing and returning method and system
CN114038105A (en) Identity information security monitoring method and device
US7076664B2 (en) User confirmation system and method
CN112182546A (en) Account number protection method and device, terminal equipment and storage medium
CN113554764A (en) Ticket checking method, device and equipment based on face
CN112687044A (en) Method, system, medium, and apparatus for managing staying person
CN114613044A (en) Pedestrian passageway passing method and device, electronic equipment and storage medium
CN109479195A (en) The method for managing safety element
EP3876176A1 (en) Method for authorizing a person to perform a transaction involving a smart card
CN111754664A (en) Personnel security management system
CN111402473A (en) Cash adding room access control method, control device and storage medium
CN113994401A (en) Shop management system, shop management method, computer program, and recording medium
CN111210367A (en) Hotel management system based on iris intelligent lock
CN111582421A (en) Method and system for preventing smart card from being copied
CN114005208B (en) Access control method, device, equipment and storage medium
CN109447629B (en) Identification card identification method, device and system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination