CN103793961B - The security identification method of identity comparison can be carried out in real time - Google Patents

The security identification method of identity comparison can be carried out in real time Download PDF

Info

Publication number
CN103793961B
CN103793961B CN201210431205.6A CN201210431205A CN103793961B CN 103793961 B CN103793961 B CN 103793961B CN 201210431205 A CN201210431205 A CN 201210431205A CN 103793961 B CN103793961 B CN 103793961B
Authority
CN
China
Prior art keywords
data
server
door lock
transmitter receiver
identification
Prior art date
Application number
CN201210431205.6A
Other languages
Chinese (zh)
Other versions
CN103793961A (en
Inventor
刘贞辰
何怡桦
Original Assignee
英华达(上海)科技有限公司
英华达(上海)电子有限公司
英华达股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 英华达(上海)科技有限公司, 英华达(上海)电子有限公司, 英华达股份有限公司 filed Critical 英华达(上海)科技有限公司
Priority to CN201210431205.6A priority Critical patent/CN103793961B/en
Publication of CN103793961A publication Critical patent/CN103793961A/en
Application granted granted Critical
Publication of CN103793961B publication Critical patent/CN103793961B/en

Links

Abstract

The present invention is a kind of security identification method that can carry out identity comparison in real time, it is applied on the transmitter receiver in a safety identification system, this transmitter receiver and a camera head are electrically connected mutually, with when there being stranger to come to visit, this intercommunication function receives the image data that this camera head captures, and be sent in a server by network, make this server be compared by the identification image in dangerous to the safe listings data in this image data and a data base or one listings data; Again, this transmitter receiver can also receive the indication signal that this server produces after comparison, with according to this indication signal, the door lock at gate is set to a lock-out state, this door lock is made to be released from, maybe this door lock is set to a free state, makes user can release door lock in a manual manner, and open gate. Such that just child by independent indwelling in family, also by the security identification method of this transmitter receiver, in real time client can be carried out identity comparison and confirmation, allows client enter to feel at ease, maybe this door lock is set as lock-out state, forbid that client enters.

Description

The security identification method of identity comparison can be carried out in real time

Technical field

The present invention is a kind of security identification method that can carry out identity comparison in real time, espespecially can make a transmitter receiver after the image data obtaining client, a server can be uploaded in real time, and make this server the safety stored in this image data and a data base or dangerous discernment image to be compared, the method whether door lock to control gate is locked.

Background technology

In recent years, along with the change of the transition of social environment and the industrial structure, various different criminal type states emerge in an endless stream, and make us hard to guard against. Wherein, fraudulent act with various personation telecommunication operators, gas personnel or government functionary is the most rampant again. Due to, age immature child for stranger compared with without enough judgments and vigilance, therefore, for often needing independent for the child indwelling head of a family in family, how to instruct child not allow stranger enter house, actually safeguard an arduous problem on home safety.

General speech, tradition is provided with a transmitter receiver in apartment mostly, there to be stranger to come to visit, and when pressing the floor electric bell of the other correspondence in doorway, apartment, resident family in apartment can either directly through this transmitter receiver, get in touch with client, or by the display screen on this transmitter receiver, directly learn the appearance of client, and resident family can also directly press on this transmitter receiver and control switch, directly open gate, apartment, please client enter, and need not in person extremely open the door downstairs with making or have much ado. But, although transmitter receiver has some facilitating functions aforementioned, but for child, but it is easy to because cannot judge whether client nourishes malice, namely when without verification client's identity, curtly by the control switch on pressure transmitter receiver, allowing client enter, the transmitter receiver causing original conception good becomes the big leak of on home safety.

It has been recognised by the inventors that foregoing problems is primarily due to transmitter receiver has the facilitating functions directly opening gate, apartment, therefore child is easy under the luring or cheat of strange client, and presses control switch with namely saying offhandedly, allows strange client enter. Therefore, how the function mode of known transmitter receiver is improved, so that intercommunication function possesses the mechanism of a safety identification, namely become the present invention and desire most ardently the major issue of solution at this.

Summary of the invention

Because known transmitter receiver cannot provide a security mechanism, cause child easily via transmitter receiver, allow the problem that strange client enters, inventor is by feat of practical experience for many years, and after research repeatedly and test, finally a kind of safety method that can carry out identity comparison in real time of the present invention is designed, it would be desirable to effectively promote transmitter receiver safety on using.

One purpose of the present invention, for providing a kind of security identification method that can carry out identity comparison in real time, it is applied on a safety identification system, this safety identification system includes a transmitter receiver, a camera head and a server, this transmitter receiver is provided with a communication unit and a control unit, and can be electrically connected mutually with this camera head, the position at a contiguous gate is located at by this camera head, with when there being client to press electric bell, this camera head can capture the facial characteristics of this client, and produces an image data; This communication unit can be connected with this server by network, a data base it is provided with, for storing a safe listings data (such as relative's list of: user sets itself and identify image) or a dangerous listings data (such as: suspect's list that police office is announced and identify image) in this server; The door lock at this control unit and this gate is electrically connected mutually, in order to setting the state of this door lock, this security identification method can make the control unit of this transmitter receiver perform the following step: receives this image data that this camera head transmits; By this communication unit, this image data is sent in this server, make this server to be compared by the identification image in this image data and this safe listings data or dangerous listings data, and produce an indication signal (as: allow or do not allow); Receive the indication signal of this server passback; According to this indication signal, this door lock is set as lock-out state, makes this door lock to be released from, maybe this door lock is set as free state, make this door lock actively can be released by user, to open this gate. So, when only having child at home, if there being stranger to come to visit, then this transmitter receiver just can pass through this server, judge that the identification image of this stranger is whether in this safe listings data or dangerous listings data, and then instruction child opens gate, or the door lock at gate is set as lock-out state, avoid child arbitrarily to allow stranger enter, be effectively improved the application of home safety and this transmitter receiver.

Another object of the present invention, it is in this data base, also store a contact listings data, this contact listings data is provided with least one set communication data (such as the phone number of child father and mother), and when this image data is not consistent with the identification image in the safe listings data in this data base or dangerous listings data, this server can according to this communication data, this image data is sent in an action communication device corresponding with this communication data, and by a response signal of this action communicator passback, it is sent to this transmitter receiver, make this intercommunication function according to this response signal, set the state of this door lock.

A further object of the present invention, be this image data not with in the safe listings data in this data base or dangerous listings data when identifying that image is consistent, this server can transmit this communication data and this indication signal to this transmitter receiver simultaneously, and this door lock is first set as lock-out state by intercommunication function, further according to this communication data, directly this image data is sent in a corresponding action communication device, with the response signal returned according to this action communicator, again this door lock is set as lock-out state or free state, so, just can promote safety and the accuracy of this security identification method further.

Your juror the technology of the present invention, architectural feature and purpose thereof can there be further understanding and understanding for ease of, hereby to coordinate graphic for embodiment, describe in detail as follows:

Accompanying drawing explanation

Fig. 1 be the present invention security identification method in transmitter receiver schematic diagram;

Fig. 2 is the first preferred embodiment flow chart of the security identification method of the present invention; And

Fig. 3 is the second preferred embodiment flow chart of the security identification method of the present invention.

[primary clustering symbol description]

Safety identification system ... ... 10

Transmitter receiver ... ... 11

Display unit ... ... 112

Communication unit ... ... 114

Control unit ... ... 116

Camera head ... ... 12

Gate ... ... 13

Door lock ... ... 130

Server ... ... 14

Data base ... ... 140

Action communication device ... ... 15

Safe listings data ... ... D1

Dangerous listings data ... ... D2

Contact listings data ... ... D3

Network ... ... N

Detailed description of the invention

The present invention is a kind of security identification method that can carry out identity comparison in real time, refer to Fig. 1, the first preferred embodiment for the present invention, this security identification method is applied on a safety identification system 10, this safety identification system 10 includes a transmitter receiver 11, one camera head 12 and a server 14, and this transmitter receiver includes a display unit 112, one communication unit 114 and a control unit 116, this transmitter receiver 11 is electrically connected with this camera head 12 phase, this camera head 12 is installed in the position at a contiguous gate, apartment 13, and extraneous image can be captured, to produce a signal of video signal.

Referring again to Fig. 1, this communication unit 112 can pass through a network N, it is connected to remotely this server 14, and in this server 14, it is provided with a data base 140, the dangerous listings data D2 of a safe listings data D1 and is stored in this data base 140, this safe listings data D1 can be user one group of data set in advance, image is identified including many, such as: user relative or buddy list, and corresponding facial characteristics, this danger listings data D2 includes many groups and identifies image, for instance: the suspect that police office is announced, and corresponding facial characteristics. In the present embodiment, this safe listings data D1 and this danger listings data D2 is stored in the data base 140 of same server 14, again, when reality is implemented, this transmitter receiver 11 also can pass through network N, is respectively connecting to multiple server 14, to obtain safe listings data D1 or dangerous listings data D2 respectively, such as: this safe listings data D1 system is stored on the personal computer of user erection, and this danger listings data D2 is then set on the website that police office is announced.

Further, door lock 130 phase at this control unit 116 and this gate 13 is electrically connected, this door lock 130 to be set as one " lock-out state " or one " free state ", under " lock-out state ", namely user cannot pass through this transmitter receiver 11, door lock 130 is released with remote mode, under " free state ", the door lock 130 at this gate 13 remains to be controlled by this transmitter receiver 11, makes user can select to maintain the closedown at gate 13 on one's own initiative, or release this door lock 130, to open gate 13.

Refer to Fig. 1 and Fig. 2, the security identification method of the present invention, the control unit 116 of this transmitter receiver 11 can be made to perform the following step:

(201) when there being client to press the electric bell on this gate 13, receiving the signal of video signal that this camera head 12 transmits, meanwhile, this control unit 116 can pass through this display unit 112, is shown in by this signal of video signal on this transmitter receiver 11;

(202) by this communication unit 114, this signal of video signal is sent to this server 14, make this server 14 can by this image data and this data base 140 respectively this listings data D1, D2 identification image compare, if this image data is consistent with the identification image of this safe listings data D, then produce the indication signal of one " permission "; If this signal of video signal is consistent with the identification image of this danger listings data D2, then produce the indication signal of one " not allowing ";

(203) indication signal of this server 14 passback is received;

(204) do you judge that this indication signal is " permission "? if so, then enter step (205), otherwise, enter step (206);

(205) this door lock 130 is set as " free state ";

(206) this door lock 130 is set as " lock-out state ".

Further, by the security identification method of the present invention, this door lock 130 can be set by this transmitter receiver 11 according to this indication signal, namely, if the indication signal of this server 14 passback is " permission ", then this door lock 130 is set as " free state ", make the user can unrestricted choice whether opening door lock 130, otherwise, if the indication signal of this server 14 passback is " not allowing ", then this door lock 130 can be set as " lock-out state " by this transmitter receiver 11, makes user either directly through this transmitter receiver 11, cannot be released by this door lock 130. so, if household only has child, run into have client to press electric bell time, this transmitter receiver 11 just can after receiving the image data of this client, it is automatically connected to this server 14, judge that the identification image of this client is whether in this safe listings data D1 or dangerous listings data D2, and then the door lock 130 at gate 13 is set as lock-out state, child is avoided arbitrarily to allow client enter, or keep the manipulation of this door lock 130 to weigh, for whether child's unrestricted choice allows client enter, it is effectively improved home safety and the application of this transmitter receiver 11.

In addition, in first preferred embodiment of the present invention, if with in this safe listings data D1 or this danger listings data D2 arbitrary, the image data that this server 14 judges client does not identify that image is consistent, then this server 14 will can transmit the indication signal of one " to be confirmed " to this transmitter receiver 11, make this transmitter receiver 11 that this door lock 130 is temporarily set in " lock-out state ", simultaneously, this server 14 also stores a contact listings data D3, this contact listings data D3 includes least one set communication data, this communication data corresponds to an action communication device 15, and this server 14 can according to this communication data, this image data is sent in this action communicator 15, and receive a response message of this action communicator 15 passback, this response signal directly can be sent to this transmitter receiver 11 by this server 14, so that this door lock 130 is set by this transmitter receiver 11 again, such as: if the response message of this action communicator 15 is " permission ", then this transmitter receiver 11 will make this door lock 130 be set in " free state ", otherwise, this transmitter receiver 11 will make this door lock 130 be set in " lock-out state ".

Refer to shown in Fig. 1 and Fig. 3, in second preferred embodiment of the present invention, this transmitter receiver also can directly carry out data transmission with this action communicator 15, namely, this server 14 is when transmitting the indication signal being somebody's turn to do " to be confirmed ", simultaneously by respectively this communication data transfer to this transmitter receiver 11, the control unit 116 of this transmitter receiver 11 will be made to perform the following step:

(301) indication signal and this communication data of " to be confirmed " are received;

(302) this door lock 130 is temporarily set to " lock-out state ";

(303) according to this communication data, and by this communication unit 114, by this image data transmission to this action communicator 15;

(304) response signal of this action communicator 15 passback is received;

(305) do you judge that this response signal is " permission "? if so, then enter step (306), otherwise, enter step (307);

(306) this door lock 130 is reset to " free state ";

(307) this door lock 130 is continuously maintained at " lock-out state ".

Want special one to be mentioned that at this, in the aforementioned embodiment, door lock 130 phase at this transmitter receiver 11 and this gate 13 is electrically connected, again, in other preferred embodiment of the present invention, this transmitter receiver 11 also can be electrically connected to the central monitoring device at a gate 13, with by this central monitoring device, the state of this door lock 130 is set, so, also can reach the technique effect identical with previous embodiment. In addition, in other preferred embodiment of the present invention, this camera head 12 can also when capturing the facial characteristics of client, capture its voice data simultaneously, with in subsequent step, this transmitter receiver 11 by this image data together with voice data, can be transferred to this server 14 and compare, and then promotes the degree of accuracy of security identification method.

Again; shown in Fig. 1; the security identification method of the present invention can also expand further; to reach more perfect protection; such as: this server 14 is when the image data judging client is consistent with the identification image in this danger listings data D2; this server 14 can directly produce an alarm signal (or notifying that this transmitter receiver 11 produces alarm signal), and transmission a to safety system is reported to the police.

The above; being only some preferred embodiments of the present invention, the technical characteristic of the present invention is not limited thereto, and the personage of all correlative technology fields is after the technology contents with reference to the present invention; can think easily and equivalence change, all should without departing from the protection category of the present invention.

Claims (8)

1. the security identification method that can carry out identity comparison in real time, it is characterized in that, it is applied to a safety identification system, this safety identification system includes a transmitter receiver, a server and a camera head, wherein this transmitter receiver includes a communication unit and a control unit, and is electrically connected mutually with this camera head, and the position at a contiguous gate is located at by this camera head, to capture extraneous image, and produce an image data; This communication unit can be connected with this server by a network, is provided with a data base in this server, and for storing a safe listings data or a dangerous listings data, and respectively this listings data includes at least one identification image; The door lock at this control unit and this gate is electrically connected mutually, and to control the state of this door lock, this security identification method can make this control unit perform the following step:
Receive the image data that this camera head transmits;
By this communication unit, this image data is sent in this server, makes this server to be compared with the identification image in respectively this listings data by this image data, and produce an indication signal;
Receive the indication signal of this server passback;And
According to this indication signal, this door lock is set as lock-out state, makes this door lock to be released from, maybe this door lock is set as free state, make this door lock actively can be released by user;
This data base is wherein additionally provided with a contact listings data, this contact listings data includes least one set communication data, after this server completes comparison, this server can pass this indication signal back this transmitter receiver together with this communication data, and this security identification method can also make this control unit perform the following step:
Receive this indication signal and communication data;
This door lock is set as lock-out state;
According to this communication data, and by this communication unit, by this image data transmission a to action communication device corresponding with this communication data;
Receive a response signal of this action communicator passback; And
According to this response signal, this door lock is set as lock-out state or free state.
2. security identification method as claimed in claim 1, it is characterized in that, wherein this camera head can capture a voice data simultaneously, and by this image data together with this data transmission in network telephony to this transmitter receiver, make this transmitter receiver control unit can simultaneously by this image data and data transmission in network telephony to this server, to compare.
3. security identification method as claimed in claim 2, it is characterized in that, wherein when this server judges that this image data is consistent with the identification image in this danger listings data, this server can also directly produce an alarm signal, or this server can notify this transmitter receiver, so that this transmitter receiver produces alarm signal.
4. security identification method as claimed in claim 3, it is characterized in that, wherein this transmitter receiver is additionally provided with a display unit, with after this control unit receives the signal of video signal that this camera head transmits, this control unit can pass through this display unit, it is shown that this signal of video signal.
5. the security identification method that can carry out identity comparison in real time, it is characterized in that, it is applied to a safety identification system, this safety identification system includes a transmitter receiver, a server and a camera head, wherein this transmitter receiver includes a communication unit and a control unit, and is electrically connected mutually with this camera head, and the position at a contiguous gate is located at by this camera head, to capture extraneous image, and produce an image data; This communication unit can be connected with this server by a network, is provided with a data base in this server, and for storing a safe listings data or a dangerous listings data, and respectively this listings data includes at least one identification image; The door lock at this control unit and this gate is electrically connected mutually, and to control the state of this door lock, this security identification method can make this control unit perform the following step:
Receive the image data that this camera head transmits;
By this communication unit, this image data is sent in this server, makes this server to be compared with the identification image in respectively this listings data by this image data, and produce an indication signal;
Receive the indication signal of this server passback; And
According to this indication signal, this door lock is set as lock-out state, makes this door lock to be released from, maybe this door lock is set as free state, make this door lock actively can be released by user;
Wherein, being additionally provided with a contact listings data in this data base, this contact listings data includes least one set communication data, completes comparison at this server, and transmit this indication signal to this transmitter receiver, this security identification method can also make this control unit perform the following step:
This door lock is set as lock-out state;
Treat that this server is according to this communication data, by this image data transmission a to action communication device corresponding with this communication data, and after obtaining a response signal of this action communicator passback, receive the response signal transmitted by this server; And according to this response signal, this door lock is set as lock-out state or free state.
6. security identification method as claimed in claim 5, it is characterized in that, wherein this camera head can capture a voice data simultaneously, and by this image data together with this data transmission in network telephony to this transmitter receiver, make this transmitter receiver control unit can simultaneously by this image data and data transmission in network telephony to this server, to compare.
7. security identification method as claimed in claim 6, it is characterized in that, wherein when this server judges that this image data is consistent with the identification image in this danger listings data, this server can also directly produce an alarm signal, or this server can notify this transmitter receiver, so that this transmitter receiver produces alarm signal.
8. security identification method as claimed in claim 7, it is characterized in that, wherein this transmitter receiver is additionally provided with a display unit, with after this control unit receives the signal of video signal that this camera head transmits, this control unit can pass through this display unit, it is shown that this signal of video signal.
CN201210431205.6A 2012-11-01 2012-11-01 The security identification method of identity comparison can be carried out in real time CN103793961B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210431205.6A CN103793961B (en) 2012-11-01 2012-11-01 The security identification method of identity comparison can be carried out in real time

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210431205.6A CN103793961B (en) 2012-11-01 2012-11-01 The security identification method of identity comparison can be carried out in real time
TW101150934A TWI492189B (en) 2012-11-01 2012-12-28 Security identification method for real-time identity check

Publications (2)

Publication Number Publication Date
CN103793961A CN103793961A (en) 2014-05-14
CN103793961B true CN103793961B (en) 2016-06-08

Family

ID=50669581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210431205.6A CN103793961B (en) 2012-11-01 2012-11-01 The security identification method of identity comparison can be carried out in real time

Country Status (2)

Country Link
CN (1) CN103793961B (en)
TW (1) TWI492189B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618860B (en) * 2014-12-31 2018-04-27 小米科技有限责任公司 Apparatus control method and device
TWI596270B (en) 2015-08-28 2017-08-21 偉林電子股份有限公司 Remote entry control system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980305A (en) * 2010-10-21 2011-02-23 青岛科技大学 Face identification and 3G communication-based intelligent household access control system
CN102074056A (en) * 2010-04-09 2011-05-25 张宏鑫 Intelligent network burglar-proof door
CN201854298U (en) * 2010-07-14 2011-06-01 北京博雅英杰科技股份有限公司 Campus intelligent security management information system
TWM413924U (en) * 2011-04-25 2011-10-11 Chi-Sheng Tsai A multi-function door control system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200733580A (en) * 2006-02-16 2007-09-01 Inventec Appliances Corp Wireless outdoor intercom and the system thereof
CN101136068A (en) * 2006-08-28 2008-03-05 柏宇科技股份有限公司 Built-in radio frequency identification card face shape identification device
TWM420947U (en) * 2011-06-30 2012-01-11 Kelcctv Technology Co Ltd Entrance intercom system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102074056A (en) * 2010-04-09 2011-05-25 张宏鑫 Intelligent network burglar-proof door
CN201854298U (en) * 2010-07-14 2011-06-01 北京博雅英杰科技股份有限公司 Campus intelligent security management information system
CN101980305A (en) * 2010-10-21 2011-02-23 青岛科技大学 Face identification and 3G communication-based intelligent household access control system
TWM413924U (en) * 2011-04-25 2011-10-11 Chi-Sheng Tsai A multi-function door control system

Also Published As

Publication number Publication date
TW201419223A (en) 2014-05-16
TWI492189B (en) 2015-07-11
CN103793961A (en) 2014-05-14

Similar Documents

Publication Publication Date Title
US9426432B2 (en) Remote interactive identity verification of lodging guests
US9342936B2 (en) Smart lock systems and methods
US9769435B2 (en) Monitoring systems and methods
US9109378B2 (en) Smart lock systems and methods
CN204791242U (en) Intelligence lock system
US20150092055A1 (en) Pool monitor systems and methods
US8897433B2 (en) Security system with two-way communication and video
JP2016517488A (en) Electronic lock with remote monitoring
US9113131B1 (en) Covert monitoring and recording of audio and video in controlled-environment facilities
US20140267716A1 (en) Methods for using an image capture device integrated at a building entry with an automation control panel, and systems and devices related thereto
US20140125754A1 (en) Web portal for managing premise security
CN104966344B (en) A kind of security access control system based on video
US20150339869A1 (en) Automatic Wireless Door Opening System and Method of Using the Same
US20150312531A1 (en) Wireless Camera Facilitated Building Security
CN101673422B (en) Household security system and household security method
CN203366408U (en) Multifunctional entrance guard based on function application of FPGA (field programmable gate array) control chip
CN202795514U (en) Video door bell based on remote control
CN104135642A (en) Intelligent monitoring method and relevant equipment
US10388134B1 (en) Video monitoring and alarm verification technology
TWI544778B (en) Remote doorbell control system and its samrt doorbell device
CN105120122A (en) Alarm method and device
US20170103645A1 (en) Dual communication-interface facility monitoring and management system and method
CN103809542A (en) Internet of things method and device for community security
CN201298284Y (en) Wireless video alarm for safety guard
US20120001755A1 (en) Virtual Presence after Security Event Detection

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
C14 Grant of patent or utility model